rutserv.exe

Remote Manipulator System

Usoris Systems LLC

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 9 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - R-Server”.
Publisher:
TektonIT  (signed by Usoris Systems LLC)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.1.2.0

MD5:
2eae6e46c2951383c808f0c4791b733d

SHA-1:
71b2cf65f52986e498510e5c47c29684bd840d0f

SHA-256:
f8f80415a94fee505bed770e087c3e2620acb479858b406d2718c360be96f085

Scanner detections:
9 / 68

Status:
Potentially unwanted

Analysis date:
5/1/2024 8:43:43 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

AVG
RemoteAdmin
2017.0.2537

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.A potentially unsafe (variant)
10.11330

Fortinet FortiGate
Riskware/RMS
12/6/2016

IKARUS anti.virus
not-a-virus:RemoteAdmin.Win32.RMS
t3scan.1.8.6.0

Kaspersky
not-a-virus:RemoteAdmin.Win32.RMS
14.0.0.-818

NANO AntiVirus
Trojan.Win32.RemoteAdmin.bdouby
0.30.0.296

Sophos
Remote Admin
4.98

VIPRE Antivirus
Trojan.Win32.Generic
38490

File size:
4.6 MB (4,772,696 bytes)

Product version:
5.1.2.0

Copyright:
Copyright © 2012 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\help\666\rutserv.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
11/24/2011 12:00:00 PM

Valid to:
11/29/2012 12:00:00 AM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
03EE40D56B7E363E2EECC7050C4C0A7E

File PE Metadata
Compilation timestamp:
1/28/2012 5:28:11 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:7S2MCo9rddGSPEReVgBDHMiieL/ENtC9dkDiQ2gWm4CFvc2qJc2G+3TYTebPhJOH:7JCFS1Evkdk+Q2gWjYvc2qJc2G+5/f4n

Entry address:
0x3B4D80

Entry point:
55, 8B, EC, 83, C4, F0, B8, 34, F2, 79, 00, E8, 88, 72, C5, FF, E8, A3, 9D, FE, FF, E8, B2, 28, C5, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
3.7 MB (3,882,496 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


Remove rutserv.exe - Powered by Reason Core Security