rfusclient.exe

Remote Manipulator System

Usoris Systems

The application rfusclient.exe by Usoris Systems has been detected as a potentially unwanted program by 21 anti-malware scanners.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.6.0.5

MD5:
0e58a36f10637cfc4cc83a043069b6d8

SHA-1:
548b2df0c74b15da6dbf97f0bb03b961092820d3

SHA-256:
cbe15f0941511b170895e45835cec3e8ae797fbc70e21ac4182badfab213a0fe

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 10:22:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.RemoteAdmin.RFS
676

Agnitum Outpost
Riskware.RemoteAdmin.DJ
7.1.1

Avira AntiVirus
APPL/MonitorTool.Gen
3.6.1.96

AVG
Potentially harmful program RemoteAdmin.CXW
2014.0.4311

Bitdefender
Application.RemoteAdmin.RFS
1.0.20.450

Clam AntiVirus
Win.Trojan.Rfusclient
0.98/21511

Dr.Web
riskware program Program.RemoteAdmin.706
9.0.1.05190

Emsisoft Anti-Malware
Application.RemoteAdmin.RFS
9.0.0.4799

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant)
9.9401

Fortinet FortiGate
Riskware/RemoteAdmin_RemoteUtilities
7/5/2015

F-Secure
Application.RemoteAdmin.RFS
11.2015-31-03_3

G Data
Application.RemoteAdmin.RFS
15.3.24

IKARUS anti.virus
Application.RemoteAdmin.RFS
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.202.15432

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
15.0.0.543

McAfee
Artemis!B8456A8EA917
5600.6714

Norman
Application.RemoteAdmin.RFS
03.12.2014 13:20:04

Rising Antivirus
PE:Trojan.StartPage!6.213
23.00.65.15329

Sophos
Remote Admin
4.98

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.186

VIPRE Antivirus
Threat.4150696
38552

File size:
4.8 MB (5,073,152 bytes)

Product version:
5.6.0.5

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\syswow64\spom\rfusclient.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/11/2013 10:00:00 AM

Valid to:
2/12/2014 9:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67FD5AEC0D8F9F6F1CAA40589F568A0C

File PE Metadata
Compilation timestamp:
1/23/2014 4:54:34 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:wx1ewOROKGrLW4oVIGY5zbAM1oScBmaFlRx1Hh0nkivGkR6hG/svPFwTfTHHvU04:wT7gOKG1b0730zvGksUsvNsvpW8I

Entry address:
0x3E0028

Entry point:
55, 8B, EC, 83, C4, F0, 53, B8, 68, A1, 7C, 00, E8, F7, F4, C2, FF, 8B, 1D, 14, 5C, 7F, 00, A1, F0, 54, 7F, 00, 83, 38, 06, 7C, 05, E8, 3E, 6A, C3, FF, E8, C5, A0, FE, FF, 8B, 03, B2, 01, E8, B0, 2B, E3, FF, 8B, 03, E8, 5D, 0E, E3, FF, 8B, 03, BA, C8, 00, 7E, 00, E8, 01, 08, E3, FF, 8B, 03, C6, 40, 6F, 00, 8B, 0D, 0C, 58, 7F, 00, 8B, 03, 8B, 15, 18, 05, 7C, 00, E8, 50, 0E, E3, FF, 8B, 0D, 98, 58, 7F, 00, 8B, 03, 8B, 15, F0, DD, 72, 00, E8, 3D, 0E, E3, FF, 8B, 0D, 5C, 62, 7F, 00, 8B, 03, 8B, 15, 58, 33, 77...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
3.9 MB (4,059,648 bytes)

Remove rfusclient.exe - Powered by Reason Core Security