rutserv.exe

Remote Manipulator System

Usoris Systems

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 10 anti-malware scanners. It runs as a windows Service named “TektonIT - R-Server”. This file is typically installed with the program Remote Manipulator System - Host by TektonIT.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.5.2.0

MD5:
3d49b75df140bd962f7f83b7f3124607

SHA-1:
059d1b9e4a2128b5a61ea68ef14ab406aadb54b2

Scanner detections:
10 / 68

Status:
Potentially unwanted

Analysis date:
4/20/2024 1:58:46 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin
7.1.1

AVG
RemoteAdmin
2016.0.3000

Dr.Web
Program.RemoteAdmin.675
9.0.1.0244

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant)
9.10658

K7 AntiVirus
Trojan
13.185.13866

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.1493

McAfee
Artemis!3D49B75DF140
5600.6656

NANO AntiVirus
Riskware.Win32.RemoteAdmin.csslrv
0.28.6.62995

Qihoo 360 Security
Win32/Virus.RemoteAdmin.8af
1.0.0.1015

Trend Micro House Call
Suspicious_GEN.F47V0708
7.2.244

File size:
5.7 MB (6,004,992 bytes)

Product version:
5.5.2.0

Copyright:
Copyright © 2013 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\remote manipulator system - host\rutserv.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/11/2013 3:00:00 AM

Valid to:
2/12/2014 2:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67FD5AEC0D8F9F6F1CAA40589F568A0C

File PE Metadata
Compilation timestamp:
6/30/2013 7:13:00 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:l2EIikm6vOWnSocKhFQSSnzqqvIwYHklYggFLMD1W+t/UFlZ9OTWZnatTQT9zxlw:l2EIid6v3beP8u1W+tcFPCanamkPiyv

Entry address:
0x4C1348

Entry point:
55, 8B, EC, 83, C4, F0, B8, EC, 9C, 8A, 00, E8, 00, E2, B4, FF, E8, 87, 74, FE, FF, E8, 8A, 88, B4, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
4.8 MB (4,981,248 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess, InteractiveProcess


The file rutserv.exe has been discovered within the following program.

rmansys.ru
About 2% of users remove it
 
Powered by Should I Remove It?

Remove rutserv.exe - Powered by Reason Core Security