473,666 Members | 2,539 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Unknown Virus/Malware

1 New Member
About a week ago, something started messing with my mouse on my laptop. Right clicks, left clicks, opening up files, etc. It then got worse. It would open up a web page's source code and making changes within the coding. It messes with the volume while trying to watch a movie, and seems to be click happy. I've installed and run the Malwarebytes Anti-Malware program which seemed to help for a couple of days. Well, it's started back up. Any ideas on what I can do? Thank you
May 24 '16 #1
3 9386
ryno du preez
91 New Member
Try running combo fix from Bleeping computer and adware remover also run Eset online scanner. Also, check your antivirus software if it is not compromised in any way. (process logs)

If the above fails you have two options that you may want to consider, Restore your computer to an earlier date or Format and reinstall
Jul 20 '16 #2
sicarie
4,677 Recognized Expert Moderator Specialist
I would recommend running AVG and Kaspersky (both) on your computer. As ryno stated, the other options would be to restore from an earlier state (which might be risky if there is malware it may have deliberately infected this portion of your computer).

The other option would be to save your personal files to a USB or CD, reinstall your computer, and then re-scan the files on the USB/CD (as they may be infected) before moving them back to your new computer.

After that, make sure you rotate your passwords (don't re-use any passwords from when you machine was compromised), keep one of the free antivirus programs updated, and practice safe browsing habits (don't click on links in emails - always type them into the URL bar, if a pop-up says your computer is infected don't click on/install anything, force-quit your browser, don't ever give out your password, don't install software unless it's from a trusted source and needed, etc...).
Feb 12 '17 #3
tmudgal16
10 New Member
Unknown malware is just that malware that has not been discovered yet. These types of attacks are known as zero-day attacks. This means that no signatures exist for such antivirus and antispyware software.
Feb 13 '23 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

2
4575
by: Rea | last post by:
Hi! I've searched high and low for this on the net but stil haven't found an answer. I'm trying to install both postnuke and xoops on a win2k server with php 4.3.3. and mysql installed. Both applications are loading terribly slow. When the page finally has been rendered I got the following error:
383
12074
by: John Bailo | last post by:
The war of the OSes was won a long time ago. Unix has always been, and will continue to be, the Server OS in the form of Linux. Microsoft struggled mightily to win that battle -- creating a poor man's DBMS, a broken email server and various other /application/ servers to try and crack the Internet and IS markets. In the case where they didn't spend their own money to get companies to
87
5320
by: Sony Music CDs install Malware | last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be cautioned about SONY music CDs. They contain 'viewer' type software that is actually a trojan horse for a "rootkit". The licence agreement gives no indication whatsoever that the 'viewer' software contains the implementation of a nasty near-impossible to remove rootkit software. http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html ...
3
2147
by: vighnesh | last post by:
Hai All Can anybody please tell me what are the standard registry locations that are affected by Virus's , Spyware and Adware Programs. Thanks in advance Regards Vighneswar
6
2446
by: VB Programmer | last post by:
Just loaded up one of my ASP.NET 2.0 projects. When I ran the webapp (IE) I was warned with this message... Your system may be vulnerable to BloodHound Virus! We recommend you DOWNLOAD one of these security software programs to prevent malware infections... Looked "spamish", so I didn't do anything as instructed above. Is this a message from Microsoft? I'm up to date with Norton, have done a full system scan, with no viruses...
1
3740
by: =?Utf-8?B?RXZlcnQ=?= | last post by:
Sinds enige tijd heb ik op onze NT4 pc's en server een hardnekkig virus, malware of spyware zitten. Het begon met het starten van een bestand dirx9.exe genaamd door een sleutel in de registry HKLM\software\Microsoft\Windows\Currentversion\Run. Deze sleutel opent dirx9.exe . Ik heb de sleutel verwijderd, het bestand verwijderd opnieuw opgestart. Twee dagen geen problem gehad, derde dag stond hetzelfde bestandje dirx9.exe weer bij de...
3
1848
by: PowerIsKnowledge888 | last post by:
Well I'm new here and programming but i have this malware on the other account on my PC but i wanted to know how to write them i dont have money and i dont want to buy campies virus protection and this would be a great experience for me if anyone can help me great if not ill keep looking and thankyou for you time and help.
0
1621
by: BobLewiston | last post by:
A day or two ago AVAST! AntiVirus warned me I was attempting to access a dangerous website. (I don't remember what website it was.) I took the warning and didn't access the website. Later I did a sweep with AVAST! It reported three malware infections. All 3 were of High severity and of the same type (Win32:Malware-gen). Two of the infections were within two different copies I had of the GMER executable, one on my main disk (C), and the...
0
8883
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8787
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8561
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8645
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7389
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
5672
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4372
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
2013
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1778
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.