Usoris Systems LLC

Publisher Information

Usoris Systems LLC is a software publisher located in Victoria, Mahe in SC*. Thre are 3 additional code signing certificates issued to this publisher.
Authority:
DigiCert Inc

Valid from:
11/24/2011 2:00:00 AM

Valid to:
11/28/2012 2:00:00 PM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
03ee40d56b7e363e2eecc7050c4c0a7e

Status:
Inconclusive detections from multiple engines

Scan engine
Details
Detections

Kaspersky
not-a-virus:RemoteAdmin.Win32.RMS, not-a-virus:RemoteAdmin.Win32.Agent, Worm.Win32.AutoRun, not-a-virus:HEUR:RemoteAdmin.Win32.Agent
89.47%

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities, Win32/RemoteAdmin.RemoteUtilities.A potentially unsafe (variant), Win32/RemoteAdmin.RemoteUtilities (variant)
84.21%

AVG
RemoteAdmin, Worm/Generic2
68.42%

VIPRE Antivirus
Trojan.Win32.Generic, Worm.Win32.AutoRun
63.16%

Fortinet FortiGate
W32/RemoteAdmin.REMOTEUTILITIES, Riskware/Agent, W32/AutoRun.DTEG!worm, Riskware/RMS
57.89%

McAfee
Artemis!E4067D2EE37D, Artemis!75E3B4AB9BF8, Artemis!82D926146575, Artemis!81C32F1404F1, Artemis!1574F70C4BF1, Artemis!C5AF5EF0067D, Artemis!80AECBE8F2D8, Artemis!1B0CD8439C9C, Artemis!1997184FFCED
52.63%

Sophos
Generic PUA EG, Generic PUA GO (PUA), Generic PUA DB (PUA), Generic PUA IB (PUA), Generic PUA GF, Generic PUA OP, Generic PUA LH (PUA)
47.37%

IKARUS anti.virus
Application.Remoteadmin.RMS, Worm.Win32.AutoRun, not-a-virus:RemoteAdmin.Win32.RMS
47.37%

Trend Micro House Call
TROJ_GEN.R47H1DM, ADW_KRADARE, TROJ_GEN.R08NH07IQ14, TROJ_GEN.R021H07AG14, Suspicious_GEN.F47V0925, TROJ_GEN.R021H07IU13
42.11%

NANO AntiVirus
Trojan.Win32.RemoteAdmin.bdpkzb, Trojan.Win32.RemoteAdmin.bdpkyv, Trojan.Win32.RemoteAdmin.bdouis, Trojan.Win32.RemoteAdmin.bdouiy, Trojan.Win32.RemoteAdmin.bdoucf
42.11%

0 / 68
rms.host5.3ru.msi  (03ae16c4ce68c57ae0b78241302891b8)

0 / 68
rutserv.exe (Remote Manipulator System by TektonIT)  (3ab1199a89efc527b45e3102350dd066)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (8fcdc79fbf167461ac468c2d65276e66)

15 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (8de5a9c3fb74e4eb3188564944b4ddf7)

0 / 68
rms.server5.1ru.msi  (44ce58b6fd37add55afc40de4f51679c)

0 / 68
rversionlib.dll (Remote Manipulator System by TektonIT)  (9bfc9ec8b7305226cecb2fdd654d600d)

0 / 68
RIPCServer.dll (Remote Manipulator System by TektonIT)  (32b572010fd555f4fb8722827e2c26ba)

0 / 68
hookdrv.dll (Remote Manipulator System by TektonIT)  (731edb5d128d638e44e5e1fc00b5d48f)

0 / 68
RWLN.dll (Remote Manipulator System by TektonIT)  (979c96f783610021da1300b2d1b93b76)

0 / 68
rut.server5.1en.msi  (f815237e646ee087f140886df3e61812)

9 / 68      (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (1997184ffced4f6832247821f8dd7845)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (4cc29e2a4cca375ce636f76c18dd9bef)

3 / 68      (inconclusive)
rutserv.exe (Remote Utilities by Usoris Systems)  (9450d76f0980691ed06fb8777ea00ee4)

8 / 68      (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (5af91219f0e8fa923aea55e78522173c)

9 / 68      (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (2eae6e46c2951383c808f0c4791b733d)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (f65eb9487ee7a6a1c81c01f240a9292e)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (f65eb9487ee7a6a1c81c01f240a9292e)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (cba5c1d01858cfb5ddbe4a4c4eba894d)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (f65eb9487ee7a6a1c81c01f240a9292e)

10 / 68    (PUP)
rutserv.exe (Remote Manipulator System by TektonIT)  (1b0cd8439c9cac63dd77bd269b7f1acc)

0 / 68
rut.server5.2en.msi  (54a9fe9395bb704b166b8b710687799a)

0 / 68
rfusclient.exe (Remote Manipulator System by TektonIT)  (a8c53dc5e009e739070f4624c5bf5343)

0 / 68
internetidadmin.exe (Remote Utilities by Usoris Systems)  (465a66e61b4066001ba2a510021ca9f3)

3 / 68      (inconclusive)

0 / 68
rut.viewer5.1en.msi  (3298735c1abe625a720d36d008d61069)

0 / 68
rfusclient.exe (Remote Utilities by Usoris Systems)  (ed03ba28b819b7a5366af337fc9519c7)

1 / 68      (inconclusive)
rutserv.exe (Remote Utilities by Usoris Systems)  (480c342357529d08dabaf62e521b8d37)

0 / 68

9 / 68      (PUP)
rfusclient.exe (Remote Manipulator System by TektonIT)  (80aecbe8f2d88833180a0a6aa695cb02)

 
Latest 30 of 157 files

The certificates below are also signed by Usoris Systems LLC.

060D6D4F59F257499A3C0F672517F576  (Mar 17, 2016 to Mar 22, 2018)

045C13C254346C04EF3304E6ACD100C5  (Jun 30, 2015 to Jul 05, 2016)

0E2B613069249FF447DA41815260C2FD  (Oct 17, 2012 to Jan 02, 2014)

* Note, the details and description above are based on the code signing digital signature issued to Usoris Systems LLC by DigiCert Inc on November 24, 2011 with the serial number '03ee40d56b7e363e2eecc7050c4c0a7e'.