elpow_spy.sys - Dangerous

%sysdir%\drivers\elpow_spy.sys

Manual removal instructions:

Antivirus Report of %sysdir%\drivers\elpow_spy.sys:
%sysdir%\drivers\elpow_spy.sys Malware
%sysdir%\drivers\elpow_spy.sysDangerous
%sysdir%\drivers\elpow_spy.sysHigh Risk
%sysdir%\drivers\elpow_spy.sys
elpow_spy.sys is rootkit Spyware.ElpowKeylogger.
elpow_spy.sys is used to hide files, processes and registry.
elpow_spy.sys is a kernel mode rootkit.
Rootkit logs keystrokes, mouse clicks, passwords, web-activity, e-mail activity and screen shots.
Rootkit creates new system drivers.
Related files:
%SysDir%\drivers\elpow_spy.sys
%Windir%\Keyloggerelow_spy\elpow_log.exe
%Windir%\Keyloggerelow_spy\elpow_log.init
%Windir%\Keyloggerelow_spy\pk_manual.chm
%Windir%\Keyloggerelow_spy\unins000.exe
%Windir%\Keyloggerelow_spy\unins000.dat
%Windir%\Keyloggerelow_spy\web.flt
%Windir%\elpow_spyBLOB
%Windir%\elpow_spyCLICKING
%Windir%\elpow_spyIDLELOG
%Windir%\elpow_spyINDEX
%Windir%\elpow_spyKEYLOG
%Windir%\elpow_spyMAILLOG
%Windir%\elpow_spyOPTIONS
%Windir%\elpow_spyPASLOG
%Windir%\elpow_spySCREEN
%Windir%\elpow_spyWEBLOG
Adds the value:
"ImagePath" = "\??\%SysDir%\drivers\elpow_spy.sys"
"Type" = "1"
"Start" = "1"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\elpow_spy
to the Windows startup registry keys.
Added to registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\elpow_spy
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_ELPOW_SPY

Remove elpow_spy.sys now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.