rutserv.exe

Remote Manipulator System

Usoris Systems

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 22 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - RMS Host”.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.6.0.6

MD5:
9a9cad56988e3c52f154187752ef453e

SHA-1:
0f9cf3a9cf3d030694179437df7502937cc15cff

SHA-256:
e5012d6b2bd849ae649114175d012b5ee17992286879be7963446f9e577a8161

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 4:09:38 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.154269
358

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

Avira AntiVirus
APPL/RemoteAdmin.U.3
7.11.205.2

AVG
RemoteAdmin
2017.0.2836

Bitdefender
Gen:Variant.Graftor.154269
1.0.20.210

Comodo Security
UnclassifiedMalware
20839

Dr.Web
Tool.RemoteControl.10
9.0.1.042

Emsisoft Anti-Malware
Gen:Variant.Graftor.154269
8.16.02.11.03

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities (variant)
10.11069

Fortinet FortiGate
Riskware/Agent
2/11/2016

F-Secure
Gen:Variant.Graftor.154269
11.2016-11-02_5

G Data
Gen:Variant.Graftor.154269
16.2.24

K7 AntiVirus
Trojan
13.192.14746

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.677

McAfee
Artemis!9A9CAD56988E
5600.6492

MicroWorld eScan
Gen:Variant.Graftor.154269
17.0.0.126

NANO AntiVirus
Trojan.Win32.RemoteAdmin.daooja
0.30.0.64812

Panda Antivirus
Trj/CI.A
16.02.11.03

Qihoo 360 Security
Win32/Virus.RemoteAdmin.0b7
1.0.0.1015

Sophos
Remote Admin
4.98

Trend Micro House Call
TROJ_GEN.R08NH07JE14
7.2.42

VIPRE Antivirus
Trojan.Win32.Generic
36966

File size:
5.8 MB (6,062,848 bytes)

Product version:
5.6.0.6

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\197\rutserv.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/27/2014 4:00:00 AM

Valid to:
3/29/2015 3:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727FDD149C55BFA6C0EAA7CF024D49E4

File PE Metadata
Compilation timestamp:
2/8/2014 5:45:26 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:Kpfs0fEmQlEnRANqSOkdtOCBSlHpLriILXlJuKWA+P/qc1iTGXThTySgAcMD+7Zq:KFs4ZLNWA+P/11iT0/cNi

Entry address:
0x4D03D8

Entry point:
55, 8B, EC, 83, C4, F0, B8, 30, 86, 8B, 00, E8, EC, F2, B3, FF, E8, 1F, 6C, FE, FF, E8, F6, 98, B3, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 32, 13, 00, 00, 00, 19, 00, 00, 02, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DE, 24, DF, CE, A4, 80, 7D, 44, 8C, 75, EB, 87...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
4.8 MB (5,041,152 bytes)

Service
Display name:
TektonIT - RMS Host

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


Remove rutserv.exe - Powered by Reason Core Security