This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Indication of Infection
* The Trojan is running in the process list.
* Presence of files and registry entries mentioned
* Network activities
Methods of Infection
Trojans are not viruses, and as such do not contain any method to replicate by themselves. However they may be downloaded by other viruses and/or Trojans to be installed on the user's system. Alternatively they may be installed by visiting a malicious web page (either by clicking on a link, or by the website hosting a scripted exploit which installs the malwares).
Backdoor.Win32.Bredolab.ou(Kaspersky), TROJ_BREDOLAB.J(TrendMicro), Trojan-Downloader.Win32.Bredolab(Ikarus), Trojan-Downloader:W32/Bredolab.ED(F-Secure), TrojanDropper:Win32/Oficla.A(Microsoft)