Threat Descriptons



Category :


Type :



Useful, legitimate software which could possibly be misused for malicious purposes.


Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

This is a legitimate remote administration tool that can be exploited to give full system control to a remote user.&

This program is usually utilized by authorized system administrators for administrative purposes. It may however be converted for malicious use as a hacker tool if some of its files are repacked, repackaged or trojanized.

The legitimate program may also be modified to force it to listen to a different port, potentially providing an entry point for a remote attacker.

If the presence of the tool on the system is unnecessary or unexpected, it should be removed.


Repacked- This involves packing the original program file using a binary compressor such as morphine, upx, aspack

Repackaged- Bundled together with other programs and silently installed

Trojanized- The program is silently installed without the user's knowledge or authorization

More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.