rutserv.exe

Remote Manipulator System

Usoris Systems LLC

The application rutserv.exe by Usoris Systems has been detected as a potentially unwanted program by 7 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “TektonIT - R-Server”. This file is typically installed with the program Remote Manipulator System - Server by TektonIT.
Publisher:
TektonIT  (signed by Usoris Systems LLC)

Product:
Remote Manipulator System

Description:
RMS

Version:
5.1.0.0

MD5:
77924b64450702a795d22ace4fe37b8f

SHA-1:
cf6b226a727355d9d6115e22f5bdc7bc9b3b4a69

SHA-256:
c416263b697c89b0969c7a9ceaf74c4e415a9002f36b886cd5e5f15e06397ecf

Scanner detections:
7 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 6:44:31 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.RemoteAdmin.DK
7.1.1

Avira AntiVirus
SPR/Rmansys.A.4
8.3.1.6

ESET NOD32
Win32/RemoteAdmin.RemoteUtilities.A potentially unsafe (variant)
9.11973

Fortinet FortiGate
PossibleThreat
8/6/2015

IKARUS anti.virus
not-a-virus:RemoteAdmin.Win32.RMS
t3scan.1.9.5.0

McAfee
Artemis!77924B644507
5600.6681

Sophos
Mal/Generic-S
4.98

File size:
4.5 MB (4,763,992 bytes)

Product version:
5.1.0.0

Copyright:
Copyright © 2011 TektonIT. All rights reserved.

Trademarks:
Remote Manipulator System, TektonIT

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\remote manipulator system - server\rutserv.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
11/24/2011 2:00:00 AM

Valid to:
11/28/2012 2:00:00 PM

Subject:
CN=Usoris Systems LLC, O=Usoris Systems LLC, L=Victoria, S=Mahe, C=SC

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
03EE40D56B7E363E2EECC7050C4C0A7E

File PE Metadata
Compilation timestamp:
12/12/2011 8:39:02 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:/9qQQuoKuPVySW45gYbeMXPHA5d+3AHglQL90X/gd72iKl9GsHxmJJ2OT2T4Ha5u:/9lo97ZiglK94gd72iiEsHxmJJ2R7P45

Entry address:
0x3B3D68

Entry point:
55, 8B, EC, 83, C4, F0, B8, 78, D5, 79, 00, E8, 44, 82, C5, FF, E8, FF, 90, FE, FF, E8, 6E, 38, C5, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
3.7 MB (3,874,816 bytes)

Service
Display name:
TektonIT - R-Server

Service name:
RManService

Description:
Allows Remote Manipulator System users to connect to this machine.

Type:
Win32OwnProcess


The file rutserv.exe has been discovered within the following program.

rmansys.ru
About 8% of users remove it
 
Powered by Should I Remove It?

Remove rutserv.exe - Powered by Reason Core Security