rutserv.exe

Remote Manipulator System

Usoris Systems

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 4 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - RMS Host”.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.6.0.6

MD5:
99ff342f31356c42a0c5f806585041bc

SHA-1:
0079844310911a564d8ee81509dc2ea1650d7a27

SHA-256:
443a8759fc128877b65568737b58f7339003dc87424db1b6fc796c169e23babb

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 3:07:51 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Potentially harmful program RemoteAdmin.CWZ
2013.0.4447

Dr.Web
hacktool program Tool.RemoteControl.10, is riskware program Program.RemoteAdmin.785
9.0.1.05190

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe application
6.3.12010.0

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
15.0.2.529

File size:
5.8 MB (6,062,848 bytes)

Product version:
5.6.0.6

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\remote manipulator system - host\rutserv.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/27/2014 6:00:00 AM

Valid to:
3/29/2015 5:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727FDD149C55BFA6C0EAA7CF024D49E4

File PE Metadata
Compilation timestamp:
2/8/2014 7:45:26 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:Kpfs0fEmQlEnRANqSOkdtOCBSlHpLriILi4BEw7Vq/byGo0AyG5vc1iTGXThTySN:KFs4ZLi4r7ibyGo0jB1iT0/cNi

Entry address:
0x4D03D8

Entry point:
55, 8B, EC, 83, C4, F0, B8, 30, 86, 8B, 00, E8, EC, F2, B3, FF, E8, 1F, 6C, FE, FF, E8, F6, 98, B3, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 32, 13, 00, 00, 00, 19, 00, 00, 02, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DE, 24, DF, CE, A4, 80, 7D, 44, 8C, 75, EB, 87...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
4.8 MB (5,041,152 bytes)

Service
Display name:
TektonIT - RMS Host

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


Remove rutserv.exe - Powered by Reason Core Security