× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6a807a3dcad856a4a69efd292669693dd064a2cd355e546cd49380ba4cc20378
File name: TeamViewer
Detection ratio: 0 / 57
Analysis date: 2016-12-22 10:16:32 UTC ( 2 years, 3 months ago )
Antivirus Result Update
Ad-Aware 20161222
AegisLab 20161222
AhnLab-V3 20161222
Alibaba 20161222
ALYac 20161222
Antiy-AVL 20161222
Arcabit 20161222
Avast 20161222
AVG 20161222
Avira (no cloud) 20161222
AVware 20161222
Baidu 20161207
BitDefender 20161222
Bkav 20161221
CAT-QuickHeal 20161222
ClamAV 20161222
CMC 20161222
Comodo 20161222
CrowdStrike Falcon (ML) 20161024
Cyren 20161222
DrWeb 20161222
Emsisoft 20161222
ESET-NOD32 20161222
F-Prot 20161222
F-Secure 20161222
Fortinet 20161222
GData 20161222
Ikarus 20161222
Sophos ML 20161216
Jiangmin 20161222
K7AntiVirus 20161222
K7GW 20161222
Kaspersky 20161222
Kingsoft 20161222
Malwarebytes 20161222
McAfee 20161222
McAfee-GW-Edition 20161222
Microsoft 20161222
eScan 20161222
NANO-Antivirus 20161222
nProtect 20161222
Panda 20161221
Qihoo-360 20161222
Rising 20161222
Sophos AV 20161222
SUPERAntiSpyware 20161222
Symantec 20161222
Tencent 20161222
TheHacker 20161219
TotalDefense 20161222
TrendMicro 20161222
TrendMicro-HouseCall 20161222
Trustlook 20161222
VBA32 20161222
VIPRE 20161222
ViRobot 20161222
WhiteArmor 20161221
Yandex 20161221
Zillya 20161220
Zoner 20161222
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
TeamViewer GmbH

Product TeamViewer
Original name TeamViewer.exe
Internal name TeamViewer
File version 7.0.15723.0
Description TeamViewer Remote Control Application
Signature verification Signed file, verified signature
Signing date 10:56 AM 10/23/2012
Signers
[+] TeamViewer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 8/8/2011
Valid to 12:59 AM 8/8/2014
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 34DB009ABDE83388E437A4CDF44EE43DF3DB1505
Serial number 3D 27 AF BE A5 99 6F 13 E5 B5 62 44 21 F1 62 95
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-10-23 09:55:13
Entry Point 0x003989B0
Number of sections 6
PE sections
Overlays
MD5 e41f3252b6c55fcc5aacb4360985a7c6
File type data
Offset 7245312
Size 6056
Entropy 7.30
PE imports
RegCreateKeyExW
SetSecurityDescriptorOwner
RegOpenCurrentUser
RegCloseKey
LookupAccountSidW
ConvertSidToStringSidW
SetEntriesInAclW
RegCreateKeyW
OpenServiceW
ControlService
RegDeleteValueW
RegDeleteKeyW
GetSecurityInfo
RegQueryValueExW
LsaOpenPolicy
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
RegFlushKey
DeleteAce
CreateWellKnownSid
LsaClose
RegOpenKeyExW
SetSecurityInfo
LookupAccountNameW
EqualSid
CryptReleaseContext
LsaLookupNames
CryptAcquireContextA
GetUserNameW
GetSidIdentifierAuthority
RegQueryInfoKeyW
CryptGenRandom
RegEnumKeyExW
OpenThreadToken
InitiateSystemShutdownW
GetAce
CreateProcessAsUserW
StartServiceW
LsaFreeMemory
RevertToSelf
LogonUserW
RegSetValueExW
FreeSid
MakeSelfRelativeSD
OpenSCManagerW
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
CloseServiceHandle
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
capGetDriverDescriptionW
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Destroy
ImageList_SetBkColor
ImageList_Create
ImageList_Draw
DestroyPropertySheetPage
CreatePropertySheetPageW
ImageList_Remove
ImageList_DragMove
ImageList_DragLeave
PropertySheetW
ImageList_GetIcon
ImageList_BeginDrag
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_EndDrag
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
CertFreeCertificateContext
CryptVerifyMessageSignature
CertGetNameStringW
CryptHashCertificate
GetBitmapBits
CreatePolygonRgn
GetTextMetricsW
Polygon
TextOutW
CreateFontIndirectW
PatBlt
OffsetRgn
CreatePen
GetRgnBox
RoundRect
CreateRectRgnIndirect
EndPath
CombineRgn
SetStretchBltMode
GetViewportOrgEx
GetObjectType
Rectangle
GetLayout
GetDeviceCaps
LineTo
DeleteDC
SetBkMode
SetLayout
CreateBitmap
CreateFontW
SetPixel
GetPixel
SetWindowOrgEx
DeleteObject
GetObjectW
BitBlt
GetBkMode
CreateDIBSection
CreateCompatibleBitmap
RealizePalette
SetTextColor
CreatePatternBrush
GetCurrentObject
ExtTextOutW
GetClipBox
MoveToEx
CreatePalette
GetStockObject
SetViewportOrgEx
SelectPalette
GetDIBits
CreateRoundRectRgn
SelectClipRgn
CreateCompatibleDC
StrokeAndFillPath
StretchBlt
SetBrushOrgEx
CreateRectRgn
SelectObject
SetDIBColorTable
Ellipse
GetTextColor
CreateSolidBrush
SetBkColor
BeginPath
GetTextExtentPoint32W
SetRectRgn
GetAdaptersInfo
GetAdapterIndex
GetIfEntry
IpRenewAddress
DeleteIPAddress
GetIpAddrTable
FlushIpNetTable
SendARP
GetBestInterface
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
CreateWaitableTimerA
GetOverlappedResult
SetEvent
LockResource
GetDriveTypeA
HeapDestroy
SetFileTime
QueueUserAPC
lstrcmpW
SystemTimeToTzSpecificLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
CompareFileTime
GetConsoleMode
GetLocaleInfoA
LocalAlloc
MapViewOfFileEx
GetVolumeInformationW
LoadLibraryExW
GetFileInformationByHandle
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetTempPathW
WaitForSingleObject
GetSystemTimeAsFileTime
SetThreadAffinityMask
GetThreadTimes
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
GetLogicalDriveStringsW
FindClose
TlsGetValue
FormatMessageA
SetFileAttributesW
WritePrivateProfileStringW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
CopyFileW
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
GetFileAttributesW
RaiseException
EnumSystemLocalesA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
GetPrivateProfileStringW
MoveFileW
SetFilePointer
GetFullPathNameW
InterlockedExchangeAdd
CreateSemaphoreA
CreateThread
GetSystemDirectoryW
MoveFileExW
GetSystemDefaultUILanguage
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
ExitThread
SetEnvironmentVariableA
SetPriorityClass
WaitForMultipleObjectsEx
TerminateProcess
WriteConsoleA
CreateWaitableTimerW
GlobalAlloc
LocalFileTimeToFileTime
CreateEventW
SetEndOfFile
SetWaitableTimer
GetProcAddress
SleepEx
WriteConsoleW
CloseHandle
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
lstrcmpiW
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
OpenProcess
GetDateFormatW
SetErrorMode
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
GetComputerNameW
WriteFile
CompareStringW
lstrcpyW
WaitNamedPipeW
GetModuleFileNameW
FreeEnvironmentStringsW
FindFirstFileA
GetCurrentThreadId
InterlockedIncrement
CompareStringA
ResetEvent
CreateFileMappingA
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
HeapCreate
LoadLibraryA
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
LCMapStringA
GetTimeFormatW
SetProcessShutdownParameters
GetEnvironmentStringsW
GlobalUnlock
WaitForSingleObjectEx
lstrlenW
VirtualFree
GetQueuedCompletionStatus
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
CreateIoCompletionPort
ProcessIdToSessionId
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
InterlockedCompareExchange
CancelIo
GetCurrentThread
lstrcpynW
ExpandEnvironmentStringsW
QueryPerformanceFrequency
ReleaseSemaphore
TlsFree
GetModuleHandleA
ReadFile
FindNextFileW
GetPriorityClass
GetACP
GlobalLock
GetModuleHandleW
GetFileAttributesExW
SizeofResource
WideCharToMultiByte
IsValidCodePage
UnmapViewOfFile
FindResourceExW
PostQueuedCompletionStatus
CreateProcessW
Sleep
ReadFileEx
OpenEventA
VirtualAlloc
GetTimeFormatA
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
AlphaBlend
DrawDibClose
DrawDibOpen
DrawDibDraw
GetAcceptExSockaddrs
AcceptEx
NetUserModalsGet
NetWkstaGetInfo
NetServerEnum
NetUserGetInfo
NetApiBufferFree
VarUI4FromStr
OleCreateFontIndirect
SysStringLen
UnRegisterTypeLib
RegisterTypeLib
VariantClear
SysAllocStringLen
LoadRegTypeLib
SysAllocString
VariantInit
LoadTypeLib
SysFreeString
OleCreatePropertyFrame
SetupDiOpenDevRegKey
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
DragQueryFileW
DragFinish
Ord(680)
Ord(155)
DragAcceptFiles
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
ExtractIconExW
SHGetSpecialFolderLocation
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
ExtractIconW
SHGetSpecialFolderPathW
SHGetMalloc
SHBrowseForFolderW
PathCompactPathW
GetUserNameExW
IsNetworkAlive
MapWindowPoints
GetMessagePos
SetWindowRgn
RedrawWindow
LoadBitmapW
SetRectEmpty
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
GetClipboardViewer
SetScrollPos
IsWindow
ClientToScreen
ScrollWindowEx
WindowFromPoint
CopyRect
SetMenuItemInfoW
SetActiveWindow
GetDC
ChangeClipboardChain
GetAsyncKeyState
ReleaseDC
GetDlgCtrlID
SendMessageW
UnregisterClassA
IsDialogMessageW
GetMenuStringW
IsWindowEnabled
GetClassInfoW
CreateAcceleratorTableW
GetWindow
GetNextDlgTabItem
CallNextHookEx
IsClipboardFormatAvailable
CreateWindowExW
LoadImageW
BlockInput
GetActiveWindow
GetUpdateRgn
GetWindowTextW
SetDlgItemTextW
GetWindowTextLengthW
LoadAcceleratorsW
InvalidateRgn
DrawTextW
DestroyWindow
DrawEdge
GetClassInfoExW
MapDialogRect
GetCursorInfo
MsgWaitForMultipleObjectsEx
EqualRect
SetClassLongW
ShowScrollBar
GetMessageW
ShowWindow
SetMenuInfo
EnumDisplayMonitors
PeekMessageW
InsertMenuItemW
SetWindowPlacement
EnumDisplaySettingsW
SetClipboardViewer
TranslateMessage
SetThreadDesktop
GetDlgItemTextW
ActivateKeyboardLayout
SetClipboardData
MsgWaitForMultipleObjects
SetParent
RegisterClassW
OpenDesktopW
GetWindowPlacement
LoadStringW
IsIconic
EnumDisplayDevicesW
TrackPopupMenuEx
DrawFocusRect
CreateMenu
GetKeyboardLayout
SwitchToThisWindow
MonitorFromPoint
SetWindowContextHelpId
GetSysColorBrush
ToUnicode
GetWindowLongW
CharNextW
IsChild
SetFocus
VkKeyScanExW
GetMonitorInfoW
EmptyClipboard
BeginPaint
OffsetRect
DefWindowProcW
ReleaseCapture
CopyIcon
KillTimer
MapVirtualKeyW
SendNotifyMessageW
CheckMenuRadioItem
RegisterWindowMessageW
GetClipboardData
GetParent
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
UpdateWindow
SetCapture
DrawIcon
EnumChildWindows
IntersectRect
CreateIconIndirect
SendDlgItemMessageW
PostMessageW
MonitorFromRect
EndDialog
GetCursor
CreateDialogParamW
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
PtInRect
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
SetCursor
BringWindowToTop
FindWindowW
ScreenToClient
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
AttachThreadInput
DestroyAcceleratorTable
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
DispatchMessageW
InsertMenuW
FillRect
SetForegroundWindow
ExitWindowsEx
OpenClipboard
GetCursorPos
EndPaint
CreateDialogIndirectParamW
ChildWindowFromPointEx
DrawTextExW
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
SendInput
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
GetLastInputInfo
RegisterClassExW
UnhookWindowsHookEx
LoadIconW
MoveWindow
DialogBoxParamW
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
UpdateLayeredWindow
TrackMouseEvent
DestroyIcon
IsWindowVisible
GetDesktopWindow
SetCursorPos
SystemParametersInfoW
MessageBoxW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClassNameW
AdjustWindowRect
GetClientRect
EnableMenuItem
CloseDesktop
IsRectEmpty
IsMenu
GetFocus
EnableWindow
CloseClipboard
GetMenuItemInfoW
TranslateAcceleratorW
CreateEnvironmentBlock
LoadUserProfileW
UnloadUserProfile
DestroyEnvironmentBlock
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
HttpQueryInfoW
HttpSendRequestA
InternetQueryDataAvailable
InternetQueryOptionW
InternetConnectW
InternetWriteFile
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
InternetSetOptionW
InternetErrorDlg
HttpAddRequestHeadersA
InternetGoOnlineA
InternetOpenW
HttpEndRequestA
HttpSendRequestExA
mixerGetLineControlsW
waveOutReset
waveInOpen
waveOutUnprepareHeader
waveOutGetDevCapsW
timeBeginPeriod
waveOutGetNumDevs
waveOutOpen
waveInPrepareHeader
waveOutPause
timeEndPeriod
mixerGetLineInfoW
waveInGetDevCapsW
waveOutClose
waveInAddBuffer
waveInClose
waveOutRestart
waveInGetNumDevs
mixerGetID
mixerGetControlDetailsW
mixerOpen
mixerSetControlDetails
mixerClose
waveOutPrepareHeader
waveInUnprepareHeader
mixerGetDevCapsW
waveInStart
waveOutWrite
waveInReset
WinVerifyTrust
htonl
getsockname
WSARecvFrom
WSARecv
accept
ioctlsocket
WSAStartup
connect
shutdown
WSADuplicateSocketW
WSAResetEvent
htons
WSASetLastError
select
getservbyport
WSAWaitForMultipleEvents
gethostname
getsockopt
recv
WSACloseEvent
ntohl
inet_addr
send
WSASend
ntohs
WSAGetLastError
WSAAddressToStringA
gethostbyaddr
listen
__WSAFDIsSet
WSACleanup
gethostbyname
inet_ntoa
WSAEventSelect
closesocket
setsockopt
WSASetEvent
socket
getpeername
bind
recvfrom
sendto
getservbyname
WSACreateEvent
WSASocketW
WTSFreeMemory
WTSQuerySessionInformationW
WTSCloseServer
WTSEnumerateSessionsW
WTSEnumerateProcessesW
ImageEnumerateCertificates
ImageGetCertificateHeader
ImageGetCertificateData
OleLockRunning
CoUninitialize
CoImpersonateClient
CoMarshalInterThreadInterfaceInStream
OleUninitialize
DoDragDrop
StringFromGUID2
CreateStreamOnHGlobal
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
CoGetInterfaceAndReleaseStream
RevokeDragDrop
OleDuplicateData
CLSIDFromString
CoGetClassObject
ProgIDFromCLSID
CoRegisterClassObject
OleInitialize
CoTaskMemRealloc
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CLSIDFromProgID
CoInitializeSecurity
PropVariantClear
CoRevertToSelf
Number of PE resources by type
RT_ICON 6
TYPELIB 1
RT_MANIFEST 1
REGISTRY 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
GERMAN 10
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
TeamViewer

SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.0.15723.0

LanguageCode
English (British)

FileFlagsMask
0x003f

FileDescription
TeamViewer Remote Control Application

CharacterSet
Unicode

InitializedDataSize
2268160

PrivateBuild
TeamViewer Remote Control Application

EntryPoint
0x3989b0

OriginalFileName
TeamViewer.exe

MIMEType
application/octet-stream

LegalCopyright
TeamViewer GmbH

FileVersion
7.0.15723.0

TimeStamp
2012:10:23 10:55:13+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
TeamViewer

ProductVersion
7.0

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
TeamViewer GmbH

CodeSize
4976128

ProductName
TeamViewer

ProductVersionNumber
7.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 8cb26fd1201568d36b40511d3d5afde4
SHA1 9ac512b0d57aff5f6c6e08f72f0616ed841f7b97
SHA256 6a807a3dcad856a4a69efd292669693dd064a2cd355e546cd49380ba4cc20378
ssdeep
98304:atMglNBePTQQHJ5wl/S4ORsUeDOX1eytTxxYF9ep7s/mJCCJUt4nFEBuo+d+7Dla:atxEj06yFDOsqseJmFfzCzT

authentihash d327857031d4d3c3c8a939cbf57bc12685dbdd8ddfbe7238353eee3d239a332e
imphash f6779f96d3f1943abee454c54ae1bc7f
File size 6.9 MB ( 7251368 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (73.1%)
Win64 Executable (generic) (17.3%)
Win32 Dynamic Link Library (generic) (4.1%)
Win32 Executable (generic) (2.8%)
Generic Win/DOS Executable (1.2%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2014-02-03 12:56:51 UTC ( 5 years, 2 months ago )
Last submission 2014-03-28 14:26:24 UTC ( 5 years ago )
File names TeamViewer.exe
TeamViewer.exe
TeamViewer.exe
vt-upload-koSl04
TeamViewer.exe
TeamViewer.exe
TeamViewer.exe
TeamViewer.exe
TeamViewer
TeamViewer.exe
TeamViewer.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.