rutserv.exe

Remote Manipulator System

Usoris Systems LLC

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 15 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - R-Server”.
Publisher:
TektonIT  (signed by Usoris Systems LLC)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.1.2.0

MD5:
8de5a9c3fb74e4eb3188564944b4ddf7

SHA-1:
9278f12ae435018e25c7b93ef7029c998e2d82f8

SHA-256:
93264c781337b0b8597f6e8babc27e82e1e63a4aabbff5ea7afa0155178a65c4

Scanner detections:
15 / 68

Status:
Potentially unwanted

Analysis date:
4/20/2024 1:41:49 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

Avira AntiVirus
SPR/Rmansys.A.3
8.3.2.4

AVG
RemoteAdmin
2018.0.2495

Baidu Antivirus
Hacktool.Win32.RMS
4.0.3.17117

Comodo Security
UnclassifiedMalware
23989

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.D potentially unsafe (variant)
11.12891

Fortinet FortiGate
Riskware/RMS
1/17/2017

IKARUS anti.virus
not-a-virus:RemoteAdmin.Win32.RMS
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.212.18466

Kaspersky
not-a-virus:RemoteAdmin.Win32.RMS
14.0.0.-1029

McAfee
Artemis!8DE5A9C3FB74
5600.6151

NANO AntiVirus
Trojan.Win32.RemoteAdmin.cjgjst
1.0.14.5380

Qihoo 360 Security
Win32/Virus.RemoteAdmin.4c1
1.0.0.1077

Sophos
Generic PUA JC (PUA)
4.98

VIPRE Antivirus
Trojan.Win32.Generic
46614

File size:
4.6 MB (4,772,696 bytes)

Product version:
5.1.2.0

Copyright:
Copyright © 2012 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\syswow64\rms_s\rutserv.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
11/24/2011 4:00:00 AM

Valid to:
11/28/2012 4:00:00 PM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
03EE40D56B7E363E2EECC7050C4C0A7E

File PE Metadata
Compilation timestamp:
1/27/2012 9:28:11 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x3B4D80

Entry point:
55, 8B, EC, 83, C4, F0, B8, 34, F2, 79, 00, E8, 88, 72, C5, FF, E8, A3, 9D, FE, FF, E8, B2, 28, C5, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
3.7 MB (3,882,496 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


Remove rutserv.exe - Powered by Reason Core Security