rutserv.exe

Remote Manipulator System

Usoris Systems

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 21 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - RMS Host”.
Publisher:
TektonIT  (signed by Usoris Systems)

Product:
Remote Manipulator System

Description:
RMS

Version:
6.0.0.4

MD5:
dd2f3e5a5317bbfe96cbab703d8f496e

SHA-1:
3d90011d3f7626133b660d47be8a78a55561d1fe

SHA-256:
d8ec3b788a817dabff866ddaca99e94ef2f25ba888d3b05d5ceaa4c1bf1cd70c

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 4:52:48 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Graftor.154269
-10

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

AhnLab V3 Security
Unwanted/Win32.RemoteAdmin.R163478
3.7.4.14

Avira AntiVirus
BDS/Backdoor.Gen2
8.3.3.4

Arcabit
Trojan.Application.Graftor.D25A9D
1.0.0.741

AVG
RemoteAdmin
2018.0.2468

Bitdefender
Gen:Variant.Application.Graftor.154269
1.0.20.225

Bkav FE
W32.HfsAdware
1.3.0.8042

Dr.Web
Program.RemoteAdmin.785
9.0.1.045

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
11.13742

F-Secure
Gen:Variant.Application.Graftor
11.2017-14-02_3

G Data
Gen:Variant.Application.Graftor.154269
17.2.25

IKARUS anti.virus
not-a-virus:RemoteAdmin.Agent
t3scan.2.1.6.0

K7 AntiVirus
Trojan
13.231.20114

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.-1166

Malwarebytes
RiskWare.RemoteAdmin
v2017.02.14.03

MicroWorld eScan
Gen:Variant.Application.Graftor.154269
18.0.0.135

NANO AntiVirus
Riskware.Win32.RemoteAdmin.doyiwn
1.0.38.8984

Panda Antivirus
Trj/Genetic.gen
17.02.14.03

Vba32 AntiVirus
Backdoor.RMS
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
50548

File size:
6.1 MB (6,360,320 bytes)

Product version:
6.0.0.4

Copyright:
Copyright © 2014 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\syswow64\sysfiles\rutserv.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/27/2014 6:00:00 AM

Valid to:
3/29/2015 5:59:59 AM

Subject:
CN=Usoris Systems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Usoris Systems, L=Victoria, S=Mahe, C=SC

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
727FDD149C55BFA6C0EAA7CF024D49E4

File PE Metadata
Compilation timestamp:
12/18/2014 6:42:57 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x513694

Entry point:
55, 8B, EC, 83, C4, F0, B8, 64, 9D, 8F, 00, E8, D8, C0, AF, FF, E8, F3, 4C, FE, FF, E8, 92, 66, AF, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
5.1 MB (5,316,096 bytes)

Service
Display name:
TektonIT - RMS Host

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


Remove rutserv.exe - Powered by Reason Core Security