Home > tips and triks > Characteristic PC Infected with Malware Dorkbot.Bx
Characteristic PC Infected with Malware Dorkbot.Bx
Posted on Kamis, 05 Januari 2012 by internet marketing
1. CPU 100%
Just like its forerunner (BitCoinMiner), DorkBot.Bx will also make the CPU becomes gradual. Shows the percentage of CPU utilization 100%. This is because the action of malware that try to break the cryptographic block BitCoin and actively trying to make sending details.
2. Bad of bandwidth
With frequent use of cryptographic action of your pc system resources, will certainly make use of the CPU is slow (100%). But behind it is to note the activities of the Internet bandwith utilization, as a result of trojan viruses DorkBot.Bx creates your bandwith to be elegant.
3. Covering a directory on a USB generate or detachable disk
Just like BitCoinMiner trojan viruses, trojan viruses DorkBot.Bx was also doing the same thing is to hide the files on the USB or detachable generate and make a quick way similar incorrect name of the directory. It seems the trend quick way also motivate trojan viruses DorkBot.Bx
4. Connecting to Hosting server BitCoin
Trojan DorkBot.Bx try to go to Hosting server BitCoin to execute cryptographic distribution BitCoin prevents spyware experts use the account on BitCoin. In this way, the spyware experts gained from being able to quickly execute cryptographic prevents BitCoin through the help of computer systems already contaminated.
5. Be connected to IRC / Distant Server
Trojan DorkBot.Bx also try to go to IRC / Distant Hosting server for the distribution of people BitCoin details required by the spyware experts.
6. Installing details files malware
In obtain to shorten the action, malware DorkBot.Bx also to obtain some specific spyware details files from IRC / Distant Hosting server if you want to stay modified and are not quickly familiar by the computer virus. Files of different spyware is what sometimes creates it difficult to identify the presence of computer virus trojan viruses DorkBot.Bx.
7. Installing details files Document Specialist (CA)
Basically, the Document Specialist (CA) is used in online payment purchases such as banks, PayPal, and thousands of other sites that use the SSL protocol. By downloading the details file CA, spyware makers want to ensure that sufferers of contaminated computer systems already have modified so that CAs can work safely BitCoin.
8. Transfer details have been obtained
The main objective of the trojan viruses DorkBot.Bx is getting details from the visitor's pc system that is contaminated.
9. Open various ports
DorkBot.Bx Trojan also starts various slots on the individuals pc system to be able to quickly go to the IRC / Distant Hosting server, and execute various actions with privacy.
10. Using Facebook Chat
This method is probably the most common customers. DorkBot.Bx provide a URL hyperlink that has been converted into a short, so customers will be quickly misled. If the hyperlink is started out, then the person will obtain a details file using the details file name and symbol are quite 'sexy'.
Another feature is to modify the registry and make some details files to invade computer systems. To be able to directly effective when the person joins the USB or detachable pushes, malware DorkBot.Bx make use of security holes of Windows is Windows Icon owner that creates the quick way from the trojan viruses details file will be effective once to access the generate.
Artikel Terkait
Category Article dropbox, tips and triks
Arsip Blog
-
▼
2012
(4523)
-
▼
Januari
(43)
- some faults in web design
- username password nod32 29 januari 2012
- Graphical User Interface (GUI)
- PHP Framework
- Backlink dari Blog Indonesia Pagerank Tinggi
- Pius & Refrizal Pimpin Pengesahan Usul Ruang Bangg...
- username password nod32 20 januari 2012
- causes a slow laptop
- Cut The Rope for PC
- Soal Rekaman Rapat, Mekeng: Kita akan Tuntut Sekjen!
- Rio Bangga Rampok Rp 35 Juta di Alfa Express Cilan...
- Guru Jujur Kaget Lihat Tabungan Berisi Miliaran Dolar
- SOPA (Stop Online Piracy Act)
- Wireless Headset offers freedom of movement that y...
- Camel Wrestling Festival in Selcuk-Ephesus
- FSB, CPU external frequency and the frequency mult...
- Username and Password NOD32, 18 Januari 2012
- how to lock the mouse and keyboard
- New Scams on Facebook
- Terong Sibuah Ungu Kaya akan Manfaat Kesehatan
- Sign Blogging
- Why Go Do-Follow?
- Make Money Online!
- Something To Believe In
- Inilah Proses Pembuatan Animasi "Shaun The Sheep"
- Pengakuan Tokoh-Tokoh Non Muslim Terhadap Al-Qur'an
- How to Make Web Site More 'Popular'
- new from Google
- How to land a great job Magazine
- TES
- Internet Multimedia Applications
- session
- JQuery first
- Give a little surprise by using MySpace Layouts
- Why Go Prepaid? Benefits of prepaid cards for inte...
- trade mishap recuperation with SANRAD V-Switch Pla...
- Suggestions for users of Microsoft Word
- Watermarking Techniques
- competent facts change, Finding attribute
- Characteristic PC Infected with Malware Dorkbot.Bx
- Breaking the Chains!
- Perawatan Kecantikan Kulit dengan Buah Kiwi
- Devinisi and Usefulness Steganography
-
▼
Januari
(43)