rutserv.exe

Remote Manipulator System

Usoris Systems LLC

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 10 anti-malware scanners. It runs as a windows Service named “TektonIT - R-Server”. This file is typically installed with the program Remote Manipulator System - Host by TektonIT.
Publisher:
TektonIT  (signed by Usoris Systems LLC)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.3.0.0

MD5:
38daaf395100a422806f0c7398fe5142

SHA-1:
493b0f2f9e2af05698ef9862bcef49f40cca8be4

Scanner detections:
10 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 5:55:48 PM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
RemoteAdmin.W32.Agent
2.1.4+

Agnitum Outpost
Riskware.RemoteAdmin
7.1.1

Comodo Security
UnclassifiedMalware
23016

Dr.Web
Program.RemoteAdmin.569
9.0.1.011

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
10.12100

Fortinet FortiGate
Riskware/Agent
1/11/2016

K7 AntiVirus
Trojan
13.2016901

Kaspersky
not-a-virus:RemoteAdmin.Win32.Agent
14.0.0.832

McAfee
Artemis!38DAAF395100
5600.6523

ViRobot
Worm.Win32.A.AutoRun.5295952[h]
2014.3.20.0

File size:
5.1 MB (5,295,952 bytes)

Product version:
5.3.0.0

Copyright:
Copyright © 2012 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\remote manipulator system - host\rutserv.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
11/24/2011 7:00:00 AM

Valid to:
11/28/2012 7:00:00 PM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
03EE40D56B7E363E2EECC7050C4C0A7E

File PE Metadata
Compilation timestamp:
7/29/2012 3:46:00 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:CYtYRBXdAZ63TCSPM1pG8TDLHiBTYBHabN4cFxju6RirYuTt1VNHOzsgTRTtU2uT:CQY3mZ4TYBHaBD1u69uTfVNHOzsNZ

Entry address:
0x41DF64

Entry point:
55, 8B, EC, 83, C4, F0, B8, AC, 7B, 80, 00, E8, C4, E0, BE, FF, E8, A7, 93, FE, FF, E8, E2, 96, BE, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.5746

Developed / compiled with:
Microsoft Visual C++

Code size:
4.1 MB (4,312,576 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess, InteractiveProcess


The file rutserv.exe has been discovered within the following program.

rmansys.ru
About 2% of users remove it
 
Powered by Should I Remove It?

Remove rutserv.exe - Powered by Reason Core Security