Usoris Systems

Publisher Information

Usoris Systems is a software publisher located in Victoria, Mahe in SC*. Thre are 2 additional code signing certificates issued to this publisher.
Authority:
VeriSign, Inc.

Valid from:
2/11/2013 3:00:00 AM

Valid to:
2/12/2014 2:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67fd5aec0d8f9f6f1caa40589f568a0c

Status:
Inconclusive detections from multiple engines

Scan engine
Details
Detections

Dr.Web
Threat.Undefined, Program.RemoteAdmin.702, riskware program Program.RemoteAdmin.706, Program.RemoteAdmin.675, Program.RemoteAdmin.785
90.00%

Agnitum Outpost
Riskware.RemoteAdmin, Riskware.RemoteAdmin.DK, Riskware.RemoteAdmin.DJ, Riskware.RemoteAdmin.DI
60.00%

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant), Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant), Win32/RemoteAdmin.RemoteUtilities.A potentially unsafe (variant)
60.00%

Kaspersky
not-a-virus:RemoteAdmin.Win32.RemoteUtilities, not-a-virus:RemoteAdmin.Win32.Agent, not-a-virus:RemoteAdmin.Win32.RMS
55.00%

K7 AntiVirus
Unwanted-Program , Trojan
55.00%

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud), VIRUS_UNKNOWN, Win32.Troj.Agent.lw.(kcloud)
55.00%

K7 Gateway Antivirus
Unwanted-Program , Trojan
50.00%

Antiy Labs AVL
Trojan[RemoteAdmin:not-a-virus]/Win32.RMS, RemoteAdmin/Win32.RMS.gen, Trojan[RemoteAdmin:not-a-virus]/Win32.Agent, RiskWare[RemoteAdmin:not-a-virus]/Win32.Agent
40.00%

Avira AntiVirus
APPL/MonitorTool.Gen, APPL/RemoteAdmin.AA
40.00%

Trend Micro House Call
TROJ_GEN.F47V0116, TROJ_GEN.F47V0203, TROJ_GEN.F47V0127, TROJ_GEN.F47V0201, TROJ_GEN.F47V0124, Suspicious_GEN.F47V0708
35.00%

0 / 68
agent.exe (Remote Utilities by Usoris)  (4a9fcd3ed63f9c731f8252e45d234b6e)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (f90e74a5e8a5d09301256f2f53961cbe)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (9d8c4efd9b68ccb39f68efc5318b5b40)

0 / 68
rms.host5.5ru_mod.msi  (7dadb8194d306bb8016e9743d2db8dde)

0 / 68
rms.host5.5ru.msi  (c30c1e34cb43a867d5b775a385faa8ab)

0 / 68
MSVCR90.DLL (Microsoft Visual Studio 2008 by Microsoft)  (3954d1463c7d8f9ed307326a3c7beef2)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (c1d414b2790c92a6156d3c51942d901e)

0 / 68
rutview.exe (Remote Manipulator System by TektonIT)  (3a97ceaa1ff8815fecc3852beca35fc5)

0 / 68
rms.host5.5ru.msi  (36bf5b944847d8d415ecd4fdb1e96ad7)

0 / 68
rms.host5.6ru.msi  (9882101157ad0d7b0fde48fb1a664889)

0 / 68
rutserv.exe (Remote Manipulator System by TektonIT)  (850530b2b2299cd578123b896f94a34f)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (83875c5430f695d99559b7e6ee1ad438)

0 / 68
rutview.exe (Remote Utilities by Usoris Systems)  (5e96a9775e7a5d1205ee77061e5e3d02)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (80dd2ad110f59012bdf86c9a2e928a12)

1 / 68      (inconclusive)
rutserv.exe (Remote Utilities by Usoris Systems)  (aa3a46e2f479c68be3d7965298fa5f73)

8 / 68      (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (2103669d76485a79a36f3c5db39866dc)

17 / 68    (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (56e7c73aa5bf9555d9cdf7a79637da43)

0 / 68
rms.host5.5ru.msi  (fe0f74086998e4d7c32ddb7b45821626)

0 / 68
rutview.exe (Remote Manipulator System by TektonIT)  (19d0c948a27c95ea5a1aa8bb3adc1921)

25 / 68    (PUP)
agent.exe (Remote Manipulator System by TektonIT)  (7fa81aa8b50ed62cc19b4945df15d7c9)

19 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (14886f6d81641714968551754f2827bd)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (d1457bbd57cf1cd6b227461d163d878d)

0 / 68
rms.host5.6ru.msi  (35fa81dc151749778bed74981aa7a59d)

9 / 68      (PUP)
rutview.exe (Remote Utilities by Usoris Systems)  (1cc062dc459626cb3eed13f68bbd135a)

0 / 68
rut.viewer5.5en.msi  (b68823bee310dc36c9fd7f5472cd1239)

0 / 68
rut.viewer5.4en.msi  (0943f4ebcf882ddff40dcd6685b6d4b5)

0 / 68
rut.host5.4en.msi  (a5079e9f51dad2b1820295992a7a76c3)

14 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (3d49b75df140bd962f7f83b7f3124607)

9 / 68      (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (dd15ef60a54488a40afd0aecb5e5611c)

9 / 68      (PUP)
rutview.exe (Remote Utilities by Usoris Systems)  (30cf817f69ff37c25c24ea481a6b37d1)

 
Latest 30 of 134 files

Downloads URLs for files signed by Usoris Systems.

The following websites host and distribute files published by Usoris Systems.

The certificates below are also signed by Usoris Systems.

2810859351B08906D00293C09A255A  (Feb 01, 2015 to May 03, 2017)

727FDD149C55BFA6C0EAA7CF024D49E4  (Jan 27, 2014 to Mar 29, 2015)

The following publishers (by Authenticode signature organization name) are related.

* Note, the details and description above are based on the code signing digital signature issued to Usoris Systems by VeriSign, Inc. on February 11, 2013 with the serial number '67fd5aec0d8f9f6f1caa40589f568a0c'.