rutserv.exe

Remote Manipulator System

Usoris Systems

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 15 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - RMS Host”. This file is typically installed with the program Remote Manipulator System - Host by TektonIT.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
6.0.0.4

MD5:
13b2bad4e17ce849587746dc186ebce2

SHA-1:
2d1c673dbcc75e561a9e35c9994e01395b5025d0

SHA-256:
5631cffa8b148ffa478f49a178de266508b685fef86c32fb7a899379e732249a

Scanner detections:
15 / 68

Status:
Potentially unwanted

Analysis date:
4/18/2024 1:41:55 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

Bitdefender
Gen:Variant.Graftor.154269
1.0.20.255

Dr.Web
Program.RemoteAdmin.753
9.0.1.051

Emsisoft Anti-Malware
Gen:Variant.Graftor.154269
8.15.02.20.01

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
9.11104

Fortinet FortiGate
Riskware/Agent
2/20/2015

F-Secure
Gen:Variant.Graftor.154269
11.2015-20-02_6

G Data
Gen:Variant.Graftor.154269
15.2.25

IKARUS anti.virus
not-a-virus:RemoteAdmin.Agent
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.193.14824

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.2460

McAfee
Artemis!13B2BAD4E17C
5600.6849

MicroWorld eScan
Gen:Variant.Graftor.154269
16.0.0.153

Sophos
Remote Admin
4.98

Trend Micro House Call
Suspicious_GEN.F47V0129
7.2.51

File size:
6.1 MB (6,360,320 bytes)

Product version:
6.0.0.4

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\remote manipulator system - host\rutserv.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/27/2014 4:00:00 AM

Valid to:
3/29/2015 3:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727FDD149C55BFA6C0EAA7CF024D49E4

File PE Metadata
Compilation timestamp:
12/18/2014 4:42:57 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:Ph9zApjxisR0CMkbRGg49WNQZJY6rAT9KlRqwT5v:PhyposR0C1bu6UAZKlQw1

Entry address:
0x513694

Entry point:
55, 8B, EC, 83, C4, F0, B8, 64, 9D, 8F, 00, E8, D8, C0, AF, FF, E8, F3, 4C, FE, FF, E8, 92, 66, AF, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
5.1 MB (5,316,096 bytes)

Service
Display name:
TektonIT - RMS Host

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


The file rutserv.exe has been discovered within the following program.

rmansys.ru
About 2% of users remove it
 
Powered by Should I Remove It?

Remove rutserv.exe - Powered by Reason Core Security