File name:

efaf621eee9f0008ceaea8e183779fd985064db70f08ea45af09cf265865f6e8.zip

Full analysis: https://app.any.run/tasks/72eedbe2-49a8-4ba6-a05d-c009af7dab7f
Verdict: Malicious activity
Threats:

NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.

Analysis date: May 22, 2025, 15:14:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
netsupport
rmm-tool
auto
remote
arch-exec
tool
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

D0B05AD3B2F695B70F35F0399B9F518A

SHA1:

E518EA8C7983A93A688BE4E52D51E9491AF459DB

SHA256:

B1718FEE203F1C5B619FF5D78E8ED543F951C4BF64E23C7DEE9203952FD45006

SSDEEP:

98304:mC/NBx+TTc+w/cG8IT3B/WyqoF2F+y9EB/x+vlnkiegAhczYhAA6q8dFSBKa352m:IoEfnOn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NETSUPPORT mutex has been found

      • client32.exe (PID: 8184)
      • client32.exe (PID: 2504)
      • client32.exe (PID: 1760)
      • client32.exe (PID: 1804)
      • client32.exe (PID: 660)
      • client32.exe (PID: 6032)
      • client32.exe (PID: 5400)
      • client32.exe (PID: 5552)
      • client32.exe (PID: 7172)
    • NETSUPPORT has been found (auto)

      • WinRAR.exe (PID: 8116)
      • WinRAR.exe (PID: 7496)
    • Connects to the CnC server

      • client32.exe (PID: 8184)
    • NETSUPPORT has been detected (YARA)

      • client32.exe (PID: 8184)
    • NETSUPPORT has been detected (SURICATA)

      • client32.exe (PID: 8184)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 8116)
      • WinRAR.exe (PID: 7496)
    • Connects to the server without a host name

      • client32.exe (PID: 8184)
    • Application launched itself

      • WinRAR.exe (PID: 7496)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 8116)
      • WinRAR.exe (PID: 7496)
    • Drop NetSupport executable file

      • WinRAR.exe (PID: 7496)
      • WinRAR.exe (PID: 8116)
    • Start notepad (likely ransomware note)

      • WinRAR.exe (PID: 8116)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7496)
      • WinRAR.exe (PID: 8116)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8116)
    • Reads the computer name

      • client32.exe (PID: 8184)
      • client32.exe (PID: 5552)
      • client32.exe (PID: 1804)
      • client32.exe (PID: 660)
      • client32.exe (PID: 1760)
      • client32.exe (PID: 5400)
      • client32.exe (PID: 7172)
    • Checks supported languages

      • client32.exe (PID: 8184)
      • remcmdstub.exe (PID: 6268)
      • remcmdstub.exe (PID: 7256)
      • client32.exe (PID: 5552)
      • client32.exe (PID: 1804)
      • client32.exe (PID: 1760)
      • client32.exe (PID: 660)
      • client32.exe (PID: 5400)
      • client32.exe (PID: 7172)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 8116)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2025:05:22 15:13:30
ZipCRC: 0x5634ec80
ZipCompressedSize: 2640814
ZipUncompressedSize: 2645794
ZipFileName: efaf621eee9f0008ceaea8e183779fd985064db70f08ea45af09cf265865f6e8.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
18
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #NETSUPPORT winrar.exe no specs sppextcomobj.exe no specs slui.exe no specs #NETSUPPORT winrar.exe #NETSUPPORT client32.exe #NETSUPPORT client32.exe no specs remcmdstub.exe no specs conhost.exe no specs remcmdstub.exe no specs conhost.exe no specs notepad.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs #NETSUPPORT client32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22805\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22805\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22805\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22805\pcicl32.dll
1012\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeremcmdstub.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1760"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22692\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22692\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22692\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22692\pcicl32.dll
1804"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22769\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22769\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22769\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22769\pcicl32.dll
2504"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.20608\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.20608\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.20608\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.20608\pcicl32.dll
2800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeremcmdstub.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5400"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22951\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22951\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22951\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22951\pcicl32.dll
5552"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22651\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22651\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22651\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22651\pcicl32.dll
6032"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22845\client32.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.22845\client32.exe
WinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Client Application
Exit code:
255
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.22845\client32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\appdata\local\temp\rar$exa8116.22845\pcicl32.dll
6268"C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.21256\remcmdstub.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa8116.21256\remcmdstub.exeWinRAR.exe
User:
admin
Company:
NetSupport Ltd
Integrity Level:
MEDIUM
Description:
NetSupport Remote Command Prompt
Exit code:
0
Version:
V14.10
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa8116.21256\remcmdstub.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
7 939
Read events
7 921
Write events
18
Delete events
0

Modification events

(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\efaf621eee9f0008ceaea8e183779fd985064db70f08ea45af09cf265865f6e8.zip
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7496) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(8116) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
110
Suspicious files
23
Text files
89
Unknown types
0

Dropped files

PID
Process
Filename
Type
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\HTCTL32.DLLexecutable
MD5:2D3B207C8A48148296156E5725426C7F
SHA256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\TCCTL32.DLLexecutable
MD5:EAB603D12705752E3D268D86DFF74ED4
SHA256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\NSM.LICtext
MD5:390C964070626A64888D385C514F568E
SHA256:AD0D05305FDEB3736C1E8D49C3A6746073D27B4703EB6DE6589BDC4AA72D7B54
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\PCICHEK.DLLexecutable
MD5:A0B9388C5F18E27266A31F8C5765B263
SHA256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\NSM.inibinary
MD5:88B1DAB8F4FD1AE879685995C90BD902
SHA256:60FE386112AD51F40A1EE9E1B15ECA802CED174D7055341C491DEE06780B3F92
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\PCICL32.DLLexecutable
MD5:00587238D16012152C2E951A087F2CC9
SHA256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\pcicapi.dllexecutable
MD5:DCDE2248D19C778A41AA165866DD52D0
SHA256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\client32.exeexecutable
MD5:EE75B57B9300AAB96530503BFAE8A2F2
SHA256:06A0A243811E9C4738A9D413597659CA8D07B00F640B74ADC9CB351C179B3268
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\client32.initext
MD5:3B540FBEEB9A0483349BAAAABA856BEC
SHA256:2B03E51A717CC65B4378672A59410DF133F9F4D087BBA252B5E16E2ED681D290
8116WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa8116.19824\msvcr100.dllexecutable
MD5:0E37FBFA79D349D672456923EC5FBBE3
SHA256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
19
DNS requests
13
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.122:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8184
client32.exe
POST
200
94.158.245.131:443
http://94.158.245.131/fakeurl.htm
unknown
malicious
8184
client32.exe
POST
94.158.245.131:443
http://94.158.245.131/fakeurl.htm
unknown
malicious
8184
client32.exe
POST
200
94.158.245.131:443
http://94.158.245.131/fakeurl.htm
unknown
malicious
8184
client32.exe
POST
94.158.245.131:443
http://94.158.245.131/fakeurl.htm
unknown
malicious
6656
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6656
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.122:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5796
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8184
client32.exe
94.158.245.131:443
MivoCloud SRL
MD
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.168.122
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.65
  • 40.126.32.138
  • 40.126.32.72
  • 20.190.160.132
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.136
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
8184
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
8184
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
8184
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
8184
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Response
8184
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
8184
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Checkin
8184
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Checkin
8184
client32.exe
Misc activity
ET REMOTE_ACCESS NetSupport Remote Admin Response
8184
client32.exe
Potentially Bad Traffic
ET INFO HTTP traffic on port 443 (POST)
8184
client32.exe
A Network Trojan was detected
REMOTE [ANY.RUN] NetSupport RAT
No debug info