ripcserver.dll

Remote Manipulator System

Usoris Systems

The module ripcserver.dll by Usoris Systems has been detected as a potentially unwanted program by 9 anti-malware scanners. This file is typically installed with the program Remote Manipulator System - Host by TektonIT.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS unit

Version:
6.0.0.0

MD5:
a2c0939df5f3c48227dd31c3f95b6de1

SHA-1:
99fa87b995fc78c3edacb231a31cce33a337f371

SHA-256:
fe7be342564d8ed7fd584f0e47601dd4a3e4aeb3af51fadb49ec70a2b7827e6a

Scanner detections:
9 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 6:40:33 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DJ
7.1.1

Comodo Security
Heur.Packed.Unknown
20281

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant)
9.10825

Fortinet FortiGate
Riskware/Agent
2/20/2015

K7 AntiVirus
Trojan
13.186.14225

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.2460

Panda Antivirus
Generic Suspicious
15.02.20.01

Qihoo 360 Security
Win32/Virus.RemoteAdmin.0b7
1.0.0.1015

Trend Micro House Call
Suspicious_GEN.F47V1127
7.2.51

File size:
145.3 KB (148,736 bytes)

Product version:
6.0.0.0

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
TektonIT, Remote Manipulator System

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\remote manipulator system - host\ripcserver.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/27/2014 4:00:00 AM

Valid to:
3/29/2015 3:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727FDD149C55BFA6C0EAA7CF024D49E4

File PE Metadata
Compilation timestamp:
11/26/2014 6:59:36 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
1536:4N+2zUKhpXMEvo5JgC61vU+zc2XtAs0NaYuvHlIO6rvkWgYzMDi6N92PPGT/uTPW:k+2YKnMA3ssMJkvRYGT/aO

Entry address:
0x1C474

Entry point:
55, 8B, EC, 83, C4, C0, B8, 08, 98, 41, 00, E8, 74, C7, FE, FF, 6A, 00, 6A, 00, 68, C0, 3E, 42, 00, B9, 1C, 95, 41, 00, 33, D2, 33, C0, E8, ED, 98, FE, FF, E8, 50, 97, FE, FF, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
109 KB (111,616 bytes)

The file ripcserver.dll has been discovered within the following program.

rmansys.ru
About 2% of users remove it
 
Powered by Should I Remove It?

Remove ripcserver.dll - Powered by Reason Core Security