If you think you might have been infected with Poweliks, please download and run Malwarebytes Anti-Rootkit, in addition, we have created a removal guide on our forums that will help you remove more stubborn infections. To double your protection, we recommend running Malwarebytes Anti-Malware along Malwarebytes Anti-Rootkit and Malwarebytes Anti-Exploit. There are other tools out there that can remove maybe one variant of Poweliks malware, but Malwarebytes Anti-Rootkit goes beyond that, we have even made sure to make it easy for us to push updated detection methods to your version of Malwarebytes Anti-Rootkit when the malware authors change the way they do things.
We have seen a lot of cries for help from our forum members as well as users across the net and have made it one of our top priorities to detect and crush this particular malware, and with the just released Malwarebytes Anti-Rootkit (1.08) we can. When the computer restarted, it would execute the code in the keys and inject into the legitimate process once again. In order to gain persistence, or be able to start once the system rebooted, it would place code inside hidden registry keys. The traditional infection approach versus the memory only approach (i.e.