Jump to content

Persistent infection win 7 and win 10, kernel mode driver malware not detected

Recommended Posts


i have contacted in the past as well for this persistent infection in my windows 10 and windows 7 pc i dont remember the
last login so created this new one.

i have seen that this virus malware etc comes when i connect to internet, even if i have installed alll known antiviruses.

only outpost firewall detects it saying unsigned kernel mode driver is about to beinstalled i chose to deny but system
still gets infected some how.

here is how other antiviruses react to it.

kaspersky- protection gets disabled altogether. usb scanner does not detect any thing

malwarebytes- protection gets disabled, and even the chamleon is not able to get it working again.

norton does not detect anything

emsisoft detected download manager trying to download some malware with the original file being downloaded simultaneously.

eset secuirty just gets ddisabled .

tried all usb scanners as well avast avira kaspersky norton nothing found.

tried rootkit scanners as well nothing found.

the issue came on win 10 so formatted and installed win 7 but same issue on it as well.

system becomes use less either the internet will not connect or if connected system cpu usage will be 100%.

so installed ubuntu dual boot with windows and run the windows 7 in vmware in it.

even on clean install in vmware it gets infected as the sytem goes online with any of the combinations of antivirus and
firewalls (outpost or tinywall or comodo)

All windows 7 and 10 systems were fully updated.

Some one suggested that it is a network malware.

Also some one stole my 50GB data when i was using my previous ISP. they did not do anything asked them to provide details
of what was downlaoded they never reverted back so switched ISP.

emsisoft is somehow not disabled but it does not detect anything either,

i have now spyshelter, osarmor and voodoshield , tinywall no one detects anything or stops kernel mode driver  install or
from getting infected.

when i check my ip in browser it one times said DOD united states.  i checked it is department of defense usa??   am i part of some bot network? or has some one hijacked my ip i dont know.

now i have to use snapshots in vmware machine as i go online it gets infected and i revert back to snapshot to get it
working again.

Also the vmware tools show error when it gets infected saying vmware tools are not installed.

i ran sigverif in windows+r and it does not detect any unsigned driver.

I think i have rootkit which comes from internet every time i connect even on a clean install pc. and then it some how by
passes all the firewalls and downloads more malware which are undetected and make system unusable, taskmanager antivrius
says you dont have access or file not found etc when run.

Also when i log into gmail it says logged in from 1 more location that has same ip and browser as mine.

this is my past post

 i have been using vmware since then and use trial version of every antivirus available. but no one stops or detects anything.

pls help, 

Edited by spartan
updated information
Link to post
Share on other sites
  • stapp changed the title to Persistent infection win 7 and win 10, kernel mode driver not detected

Hello Spartan,

Welcome to the Emsisoft Support Forums. Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions.

All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:

NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer.

  • Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed. We reserve the right to refuse help to anyone who is unwilling to uninstall Pirated/Illegal software

  • We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system.

Start only one thread requesting help. Keep all questions in your thread. DO NOT start a new topic.

If you don't know, stop and ask! Don't keep going on.

Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there)

Once your case has been solved, the thread will be closed.

Your thread will be closed after 72-hours of no activity.

DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and the such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response.

DO NOT post any logs without first completing the steps in this guide, they will be deleted.

DO NOT copy and paste logs into your threads. All logs are to be attached to your post.

Download to your Desktop:

  • Emsisoft Emergency Kit
  • Farbar Recovery Scan Tool
    • NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

All scans are to be run in Normal Mode. Do not run anything in "Safe Mode", unless you are instructed to do so by the Malware Removal Specialist handling your case.

Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at http://www.malwarete…kb/SafeMode.php

WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

Let's get started:

  • Install and Run Emsisoft Emergency Kit (EEK):
    • Double click EmergencyKitScanner.exe to install EEK
    • When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection.
    • Click "Yes" to Update Emsisoft Emergency Kit
    • Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
    • Save the scan log somewhere that you can find it.
    • Exit Emsisoft Emergency Kit.
  • Run Farbar Recovery Scan Tool (FRST):
    • Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings.
    • Press Scan button.
    • Farbar Recovery Scan Tool will produce the following logs:
      • FRST.txt
      • Addition.txt
  • Attach the following logs to your reply:
    • Emsisoft Emergency Kit log (C:\EEK\Reports)
    • FRST.txt
    • Addition.txt

IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way.

Once a Malware Removal Specialist has replied to your request for malware removal, they will handle your case from start to finish. You will have 72 hours to reply to any instructions given by the Malware Removal Specialist handling your case. Failure to comply with requests for information or instructions from the Malware Removal Specialist handling your case will result in the locking of your thread.

Link to post
Share on other sites

Thread Closed

Reason: Lack of Response

PM either Kevin, Elise, or Arthur to have this thread reopened.

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread

Link to post
Share on other sites
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...