The practice of using cracking tools
or any pirated software
is not only considered illegal activity
but it is a serious security risk
Cracking applications are used for illegally breaking (cracking) various copy-protection and registration techniques used in commercial software. These programs may be distributed via Web sites, Usenet, and P2P networks.
Keygen and Crack Sites Distribute VIRUX and FakeAV
...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...
University of Washington spyware study
...warez/piracy sites ranked the highest in downloading spyware...just opening the web page usually sets off an exploit, never mind actually downloading anything. And by the time the malware is finished downloading, often the machine is trashed and rendered useless.
Bad Web Sites: Malware
...One of the most aggressive and intrusive of all bad websites on the Internet are serial, warez, software cracking type sites...they sneak malware onto your system...Where do trojan viruses originate? One of the biggest malware distributors on the Internet are serial/warez/code cracking sites.
When you use these kind of programs, be forewarned
that some of the worst types of malware infections can be contracted and spread by visiting crack, keygen, warez and other pirated software sites
. In many cases, those sites are infested with a smörgåsbord of malware
and an increasing source of system infection. Those who attempt to get software for free can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired
. When that happens there is nothing you can do besides reformatting
and reinstalling the OS.
I strongly recommend that you remove all cracks
immediately to reduce the risk of infection/reinfection. If not, then we are just wasting time
trying to clean your system. Further, other tools used during the disinfection process may detect crack and keygens so we need to ensure they have been removed.Using these types of programs or the websites visited to get them is almost a guaranteed way to get yourself infected!!
The first thing you need to do after removing the cracks is to identify the process causing the high CPU utilization and where it is running from.
There are tools to investigate running processes, services and gather additional information to identify them or resolve problems:-- These tools will provide information about each process, CPU usage, file description and its path location Most of them are stand-alone apps in a zip file so no installation is necessary.
-- System Explorer provides a security check of running processing using their online security database when you first launch the program. If you want process the initial scan, press the "Start Security Check" button. Keep in mind, that the check is not a guarantee of what is or is not detected as malware. Further investigation is always recommended. At the Security Check page you can also check the file through the VirusTotal database by pressing the Check MD5 button.
Anytime you come across a suspicious file or one that you do not recognize, search the name using Google <- click here for an example
Or search the following databases:
If you cannot find any information, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to one of the following online services that analyzes suspicious files (like you did with the program you downloaded):
In the "File to upload & scan
" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
Edited by quietman7, 12 June 2011 - 07:23 AM.