Sunday, November 16, 2008

Desktop.Scout Spyware

Click here to remove Desktop.Scout malware
Desktop.Scout description:
Desktop.Scout Category:Spyware,RAT,Hacker Tool
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.
Hacker Tools are designed to penetrate remote computers
in order to use them as zombies or to download other malicious programs to computer.

Detection Desktop.Scout :

Desktop.Scout Files:
[%DESKTOP%]\desktop scout client.lnk
[%DESKTOP%]\desktop scout viewer.lnk
[%PROGRAMS%]\desktop scout\desktop scout client.lnk
[%PROGRAMS%]\desktop scout\desktop scout help.lnk
[%PROGRAMS%]\desktop scout\server admin utility.lnk
[%SYSTEM%]\secsvc.exe
[%SYSTEM%]\svctask32.dll
[%SYSTEM%]\svcuser.exe
[%WINDOWS%]\stem32\secsvc.exe
[%WINDOWS%]\stem32\svctask32.dll
[%WINDOWS%]\stem32\svcuser.exe
[%DESKTOP%]\desktop scout client.lnk
[%DESKTOP%]\desktop scout viewer.lnk
[%PROGRAMS%]\desktop scout\desktop scout client.lnk
[%PROGRAMS%]\desktop scout\desktop scout help.lnk
[%PROGRAMS%]\desktop scout\server admin utility.lnk
[%SYSTEM%]\secsvc.exe
[%SYSTEM%]\svctask32.dll
[%SYSTEM%]\svcuser.exe
[%WINDOWS%]\stem32\secsvc.exe
[%WINDOWS%]\stem32\svctask32.dll
[%WINDOWS%]\stem32\svcuser.exe

Desktop.Scout Folders:
[%APPDATA%]\DTSCache
[%PROFILE%]\start menu\programs\desktop scout
[%PROGRAMS%]\desktop scout 4
[%PROGRAM_FILES%]\desktop scout
[%PROGRAM_FILES%]\dts4

Desktop.Scout Registry Keys:
HKEY_CLASSES_ROOT\dtskeyfile
HKEY_CURRENT_USER\software\microsoft\gpdts4
HKEY_LOCAL_MACHINE\software\microsoft\gpdts4
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dtsagntsvc
HKEY_CURRENT_USER\software\microsoft\gpdts3
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\desktop scout 4_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\desktop scout_is1
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_dtsagntsvc

Desktop.Scout Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\scout service\security

Removing Desktop.Scout:

you can run trial version of ExterminateIt, or remove Desktop.Scout manually.


To completely manually remove Desktop.Scout malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Desktop.Scout.


Also Be Aware of the Following Threats:
Removing AppInit Malware Malware
Wenpi Trojan Cleaner
Removing HSLab.Logger Spyware
WatchDog Spyware Cleaner
Fakealert.DriveCleaner2006 Trojan Removal instruction

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home