PUP.RemoteAdmin

Threat Scorecard

Ranking: 578
Threat Level: 10 % (Normal)
Infected Computers: 35,596
First Seen: August 9, 2016
Last Seen: August 28, 2024
OS(es) Affected: Windows

SpyHunter Detects & Remove PUP.RemoteAdmin

File System Details

PUP.RemoteAdmin may create the following file(s):
# File Name MD5 Detections
1. rutserv.exe 4f40ef14a8143151764c3eb6c972398b 9
2. agent.exe e0f4afe374d75608d604fbf108eac64f 5
3. YP.exe 5d52ceb951384666ffb7a0b7e9b034fc 4
4. r_server.exe 5fac5d64ffa2a16f0d1b46e59dccb74e 2
5. r_server.exe 931a1078f3715b24b8db597b0c272e83 1
6. r_server.exe 04e8cc2176d8afbec93c49494e929727 0
7. r_server.exe 7e461a76790f2f2a7c92e7a28d107400 0
8. r_server.exe ae3414e3729cf48a579f13dbc3d553c5 0
9. r_server.exe 30f611079f3f1a9f35bb91ca4c2bc24a 0
10. r_server.exe ce62b207980efa57e736016d1bb28733 0
11. r_server.exe 345617f5aa87da373949d2154aa8f2a2 0
12. r_server.exe 5666ab553d46aef4c973f405baf85d5a 0
13. r_server.exe 43e39bf6057b3f34851b07cbd5bdd632 0
14. r_server.exe b0a6773fcfcc204c70278fc7f5f65f8a 0
15. r_server.exe e4cf6c20827c10e0b71dffd9dc67631f 0
16. r_server.exe b5e9e9519990063da86347b1a16fbf8d 0
17. r_server.exe d135ab89ec60f46f6409b01182d895d9 0
18. r_server.exe aeb5a35f1c184b6d36e9ee79544a57f5 0
19. r_server.exe 742446162ae0d01c1da180f2eac8647f 0
20. r_server.exe 064735e788d7387756f01ecd843ac739 0
21. r_server.exe 3d21956348590f6e6b8aea51498d9371 0
22. r_server.exe 253c7d543a85bcf8ad2d1fef01b59c33 0
23. r_server.exe d6daeb56814fdd68000792d1ad777a62 0
24. r_server.exe 44b37cfcfbb6f944dbe3ffa1997d3c7d 0
25. r_server.exe 64535a3af4919ef4bcdf931d0c782f05 0
26. r_server.exe 07dc6279075617a7b64f66dd79233753 0
27. r_server.exe 60dd6cfed32dfa797d445abb0c14cc38 0
28. r_server.exe 33f7ae550cf0a82300baac3535b79ce4 0
29. r_server.exe f8a9827179bfefaef7468a92a2fccddb 0
30. 5961315 523057fbbe6c89336b9cb2b1c1b78d26 0
More files

Registry Details

PUP.RemoteAdmin may create the following registry entry or registry entries:
Regexp file mask
%HOMEDRIVE%\Log\rfusclient.exe
%HOMEDRIVE%\rfusclient.exe
%HOMEDRIVE%\rutserv.exe
%PROGRAMFILES%\Java\rfusclient.exe
%PROGRAMFILES%\Java\rutserv.exe
%PROGRAMFILES%\Microsoft Games\rfusclient.exe
%PROGRAMFILES%\rtsd\rfusclient.exe
%PROGRAMFILES%\rtsd\rutserv.exe
%PROGRAMFILES%\System\rfusclient.exe
%PROGRAMFILES%\System\rutserv.exe
%PROGRAMFILES(x86)%\Java\rfusclient.exe
%PROGRAMFILES(x86)%\Java\rutserv.exe
%PROGRAMFILES(x86)%\System\rfusclient.exe
%PROGRAMFILES(x86)%\System\rutserv.exe

Directories

PUP.RemoteAdmin may create the following directory or directories:

%ALLUSERSPROFILE%\CardWindows
%ALLUSERSPROFILE%\WindowsVolume
%APPDATA%\RMS-Agent
%Homedrive%\Remote Manipulator System
%PROGRAMFILES%\Remote Manipulator System - Host
%PROGRAMFILES%\Remote Manipulator System - Server
%PROGRAMFILES%\Remote Manipulator System - Viewer
%PROGRAMFILES%\Remote Utilities - Host
%PROGRAMFILES%\Remote Utilities - Server
%PROGRAMFILES%\Remote Utilities - Viewer
%PROGRAMFILES%\Server
%PROGRAMFILES(x86)%\Remote Manipulator System - Host
%PROGRAMFILES(x86)%\Remote Manipulator System - Server
%PROGRAMFILES(x86)%\Remote Manipulator System - Viewer
%PROGRAMFILES(x86)%\Remote Utilities - Host
%PROGRAMFILES(x86)%\Remote Utilities - Server
%PROGRAMFILES(x86)%\Remote Utilities - Viewer
%PROGRAMFILES(x86)%\Server
%Windir%\ehome\ASCON

Related Posts

Trending

Most Viewed

Loading...