Usoris Systems

Publisher Information

Usoris Systems is a software publisher located in Victoria, Mahe in SC*. A majority of the programs developed by the company can be classified as adware or other potentially unwanted programs. Thre are 2 additional code signing certificates issued to this publisher.
Remove Usoris Systems Malware - Powered by Reason Core Security
Authority:
VeriSign, Inc.

Valid from:
1/26/2014 7:00:00 PM

Valid to:
3/28/2015 7:59:59 PM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727fdd149c55bfa6c0eaa7cf024d49e4

Scanner detections:
Detections  (66% detected)

Scan engine
Details
Detections

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
100.00%

Trend Micro House Call
Suspicious_GEN.F47V1127, Suspicious_GEN.F47V1218, Suspicious_GEN.F47V1204, Suspicious_GEN.F47V1219, Suspicious_GEN.F47V0129, Suspicious_GEN.F47V1220
71.43%

Antiy Labs AVL
RiskWare[RemoteAdmin:not-a-virus]/Win32.Agent
66.67%

Agnitum Outpost
Riskware.RemoteAdmin.DJ, Riskware.RemoteAdmin.DI, Riskware.RemoteAdmin.DK
54.76%

Dr.Web
Tool.RemoteControl.10, Threat.Undefined, Program.RemoteAdmin.702, Program.RemoteAdmin.753, hacktool program Tool.RemoteControl.10
50.00%

K7 AntiVirus
Trojan , Unwanted-Program
45.24%

K7 Gateway Antivirus
Trojan , Unwanted-Program
42.86%

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant), Win32/RemoteAdmin.RemoteUtilities.B potentially unsafe (variant), Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
40.48%

Fortinet FortiGate
Riskware/Agent
38.10%

McAfee
Artemis!556976896311, Artemis!200F5518BD3A, Artemis!9213CBA613C4, Artemis!8E065FAFD8B2, Artemis!BF6B1BE2BD13, Artemis!13B2BAD4E17C
33.33%

25 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (9a9cad56988e3c52f154187752ef453e)

0 / 68
rms.host6.0ru.msi  (8a942148a4fa0df0ad367e8ee449d5c2)

0 / 68
host6.0en.msi  (79dc9835d864c29cfff59520dd5c0ce6)

0 / 68
host6.0en_mod.msi  (8ec1d3143a0cb1caf1b09d9ebc6deafc)

0 / 68
host6.0en.msi  (170a2c6330580bc4645318122144f01e)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (b9363c0f9b79815075082fd8e5e161b5)

0 / 68
rut.host5.6en.msi  (5a27da0c6413edbcf6049ea8428979a7)

5 / 68      (PUP)
host6.0en.msi  (243b29e033704a543aaa1f808afc89c5)

12 / 68    (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (89115874150ef172929e8dfe0b560b54)

18 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (98b97121402bb7aaa8009c5608d2c890)

0 / 68
viewer.msi  (edaa190524664114c38214076c502560)

18 / 68    (PUP)
host.msi  (568c3d00d4e3fadd436b4961aa8aa68f)

21 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (114eec208404fcbcb5f47f730272a077)

6 / 68      (PUP)

4 / 68      (inconclusive)
internetidadmin.exe (Remote Utilities by Usoris Systems)  (f5eff81236d7c58711783cf5d6156986)

16 / 68    (PUP)
rutview.exe (Remote Manipulator System by TektonIT)  (baa9274be432a68c58a58454e6c01eb9)

8 / 68      (PUP)
rut.host5.6en.msi  (5ef1d387afa2d2e697162a43c4dde892)

0 / 68
rut.host5.6en.msi  (8a0b76ef5d4a075d74e14857892c23ed)

1 / 68      (inconclusive)
ru.server.2.0b2.en.msi  (c9051bfe1c17d829de36255caa79bfcc)

17 / 68    (PUP)
rms.viewer5.6ru.msi  (5c09d539132d0a1d89c1a0724a6d0090)

5 / 68      (PUP)
internetidadmin.exe (Remote Utilities by Usoris Systems)  (c41f48e0bd8361293b9f352284bed517)

7 / 68      (PUP)

6 / 68      (PUP)
host6.0en.msi  (3016c3d318d722df6196a3e4995b4f84)

12 / 68    (PUP)
rfusclient.exe (Remote Utilities by Usoris Systems)  (9213cba613c4f005130b8864542b2fd1)

2 / 68      (inconclusive)
server2.0.msi  (4c2a0cf589c1ea2597ea4b3d75e59fd2)

11 / 68    (PUP)
rwln.dll (Remote Manipulator System by TektonIT)  (ce8162b35f8853fb34ba2ff47b4aac73)

11 / 68    (PUP)
ripcserver.dll (Remote Manipulator System by TektonIT)  (a2c0939df5f3c48227dd31c3f95b6de1)

19 / 68    (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (3a0f8eded8325feabe74c0921271c6e6)

19 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (13b2bad4e17ce849587746dc186ebce2)

11 / 68    (PUP)
ripcserver.dll (Remote Utilities by Usoris Systems)  (f42fe85f30459f37d534de060f7f8b9d)

 
Latest 30 of 62 files

Downloads URLs for files signed by Usoris Systems.

5 / 68      (PUP)

4 / 68      (PUP)

22 / 68    (PUP)
http://rmansys.ru/.../Agent.exe  (5569768963110423096f62d5c4cb1958)

The following websites host and distribute files published by Usoris Systems.

The certificates below are also signed by Usoris Systems.

2810859351B08906D00293C09A255A  (Feb 01, 2015 to May 03, 2017)

67FD5AEC0D8F9F6F1CAA40589F568A0C  (Feb 11, 2013 to Feb 12, 2014)

The following publishers (by Authenticode signature organization name) are related.

Remove Usoris Systems Malware - Powered by Reason Core Security
* Note, the details and description above are based on the code signing digital signature issued to Usoris Systems by VeriSign, Inc. on January 26, 2014 with the serial number '727fdd149c55bfa6c0eaa7cf024d49e4'.