Useful, legitimate software which could possibly be misused for malicious purposes.
Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
This is a legitimate remote administration tool that can be exploited to give full system control to a remote user.&
This program is usually utilized by authorized system administrators for administrative purposes. It may however be converted for malicious use as a hacker tool if some of its files are repacked, repackaged or trojanized.
The legitimate program may also be modified to force it to listen to a different port, potentially providing an entry point for a remote attacker.
If the presence of the tool on the system is unnecessary or unexpected, it should be removed.
Repacked- This involves packing the original program file using a binary compressor such as morphine, upx, aspack
Repackaged- Bundled together with other programs and silently installed
Trojanized- The program is silently installed without the user's knowledge or authorization