rutserv.exe

Remote Manipulator System

Usoris Systems LLC

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 12 anti-malware scanners. It runs as a windows Service named “TektonIT - R-Server”.
Publisher:
TektonIT  (signed by Usoris Systems LLC)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.4.0.1

MD5:
13339f362abcd80d5ea6f21a84d14351

SHA-1:
1c8502090dd30e3473e98d6f61e58cf946779cf5

Scanner detections:
12 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 6:25:09 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

AhnLab V3 Security
Unwanted/Win32.RemoteAdmin
2015.12.10

Avira AntiVirus
SPR/RemoteAdmin.511
8.3.2.4

AVG
RemoteAdmin
2017.0.2728

Baidu Antivirus
Hacktool.Win32.RMS
4.0.3.16529

Dr.Web
Tool.RemoteControl.12
9.0.1.0150

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
10.12700

K7 AntiVirus
Unwanted-Program
13.212.18068

Kaspersky
not-a-virus:RemoteAdmin.Win32.RMS
14.0.0.136

McAfee
Artemis!13339F362ABC
5600.6384

NANO AntiVirus
Trojan.Win32.RemoteAdmin.cprmxl
1.0.10.5081

VIPRE Antivirus
Trojan.Win32.Generic
45736

File size:
5.1 MB (5,359,968 bytes)

Product version:
5.4.0.1

Copyright:
Copyright © 2012 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\remote manipulator system - host\rutserv.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
10/17/2012 3:00:00 AM

Valid to:
1/2/2014 2:00:00 PM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0E2B613069249FF447DA41815260C2FD

File PE Metadata
Compilation timestamp:
12/28/2012 7:17:16 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:YN4jEtI3cPBAS4mv+n4M7BBTxxH5KWNossp7SMpWWoSDPFR9OHfQ6uTyTB9/TrOB:Y2+I3QYRNo17SAWWoSFOHfDdmMHJ+X

Entry address:
0x42AF9C

Entry point:
55, 8B, EC, 83, C4, F0, B8, F0, 45, 81, 00, E8, 8C, 10, BE, FF, E8, FB, 82, FE, FF, E8, AA, C6, BD, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
4.2 MB (4,364,288 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess, InteractiveProcess


Remove rutserv.exe - Powered by Reason Core Security