× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f03a57732b32dc3ed5f0c50005d3ce65e507739597301902abd51419bac51f3b
File name: joiyk.jpg
Detection ratio: 14 / 71
Analysis date: 2019-01-28 20:27:24 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190128
CrowdStrike Falcon (ML) malicious_confidence_60% (D) 20181023
Cylance Unsafe 20190128
DrWeb Trojan.PWS.Spy.21017 20190128
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CTRG 20190128
Fortinet W32/GenKryptik.CWZU!tr 20190128
Sophos ML heuristic 20181128
Microsoft Trojan:Win32/Fuerboos.C!cl 20190128
Palo Alto Networks (Known Signatures) generic.ml 20190128
Rising Trojan.GenKryptik!8.AA55 (RDM+:cmRtazqMowmV9OLaUZxvA1qpKOG0) 20190128
Trapmine malicious.moderate.ml.score 20190123
VBA32 BScope.TrojanSpy.Noon 20190128
Webroot Trojan.Dropper.Gen 20190128
Ad-Aware 20190128
AegisLab 20190128
AhnLab-V3 20190128
Alibaba 20180921
ALYac 20190128
Antiy-AVL 20190128
Arcabit 20190128
Avast 20190130
Avast-Mobile 20190128
AVG 20190130
Avira (no cloud) 20190128
Babable 20180918
Baidu 20190128
BitDefender 20190128
Bkav 20190125
CAT-QuickHeal 20190128
ClamAV 20190128
CMC 20190128
Comodo 20190128
Cybereason 20190109
Cyren 20190128
eGambit 20190128
Emsisoft 20190128
F-Prot 20190128
F-Secure 20190128
GData 20190128
Ikarus 20190128
Jiangmin 20190128
K7AntiVirus 20190128
K7GW 20190128
Kaspersky 20190128
Kingsoft 20190128
Malwarebytes 20190128
MAX 20190128
McAfee 20190128
McAfee-GW-Edition 20190128
eScan 20190128
NANO-Antivirus 20190128
Panda 20190128
Qihoo-360 20190128
SentinelOne (Static ML) 20190124
Sophos AV 20190128
SUPERAntiSpyware 20190123
Symantec 20190128
TACHYON 20190128
Tencent 20190128
TheHacker 20190125
TotalDefense 20190128
TrendMicro 20190128
TrendMicro-HouseCall 20190128
Trustlook 20190128
VIPRE 20190128
ViRobot 20190128
Yandex 20190125
Zillya 20190128
ZoneAlarm by Check Point 20190128
Zoner 20190128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
TeamViewer GmbH

Product TeamViewer
Original name TeamViewer_Service.exe
Internal name TeamViewer
File version 13.2.26558.0
Description TeamViewer 13
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-12-06 11:25:49
Entry Point 0x0000A402
Number of sections 6
PE sections
PE imports
VirtualProtect
GetStartupInfoA
GetVersion
GetModuleHandleA
Ord(1775)
Ord(2438)
Ord(4080)
Ord(4710)
Ord(2393)
Ord(3597)
Ord(1641)
Ord(3136)
Ord(6383)
Ord(5440)
Ord(6375)
Ord(3626)
Ord(755)
Ord(3798)
Ord(1233)
Ord(3259)
Ord(5290)
Ord(2446)
Ord(2864)
Ord(2414)
Ord(6215)
Ord(815)
Ord(641)
Ord(1175)
Ord(2152)
Ord(5277)
Ord(2514)
Ord(4425)
Ord(5199)
Ord(567)
Ord(1134)
Ord(4465)
Ord(2863)
Ord(5300)
Ord(4627)
Ord(1168)
Ord(3738)
Ord(4853)
Ord(2982)
Ord(3810)
Ord(4234)
Ord(825)
Ord(3081)
Ord(5307)
Ord(4441)
Ord(4424)
Ord(540)
Ord(4078)
Ord(2554)
Ord(6376)
Ord(1727)
Ord(823)
Ord(1949)
Ord(1644)
Ord(2379)
Ord(2725)
Ord(4998)
Ord(3654)
Ord(800)
Ord(3749)
Ord(2512)
Ord(470)
Ord(4274)
Ord(5261)
Ord(4079)
Ord(1146)
Ord(3147)
Ord(2124)
Ord(324)
Ord(2621)
Ord(2584)
Ord(3262)
Ord(1576)
Ord(920)
Ord(4353)
Ord(5065)
Ord(4407)
Ord(4220)
Ord(4275)
Ord(3663)
Ord(3346)
Ord(2396)
Ord(3831)
Ord(6394)
Ord(6374)
Ord(5280)
Ord(3825)
Ord(2976)
Ord(1089)
Ord(2985)
Ord(3922)
Ord(6052)
Ord(4160)
Ord(4376)
Ord(1776)
Ord(818)
Ord(535)
Ord(3830)
Ord(2385)
Ord(3079)
Ord(2055)
Ord(4837)
Ord(5241)
Ord(5450)
Ord(2648)
Ord(5714)
Ord(5289)
Ord(3571)
Ord(4622)
Ord(561)
Ord(4486)
Ord(4698)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4673)
Ord(5302)
Ord(860)
Ord(5731)
??0Init@ios_base@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??1_Winit@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0_Winit@std@@QAE@XZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1Init@ios_base@std@@QAE@XZ
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
__p__fmode
__CxxFrameHandler
_ftol
memset
__dllonexit
_except_handler3
_onexit
exit
_XcptFilter
??1type_info@@UAE@XZ
__setusermatherr
_controlfp
_adjust_fdiv
_acmdln
__p__commode
__getmainargs
memcpy
_setmbcp
strcpy
_initterm
_exit
__set_app_type
Shell_NotifyIconA
LoadMenuA
EnumWindows
CreateIconIndirect
KillTimer
LoadBitmapA
GetSystemMetrics
AppendMenuA
EnableWindow
PostMessageA
DrawIcon
GetMenuItemID
GetCursorPos
DestroyIcon
SendMessageA
GetClientRect
SetMenuDefaultItem
IsIconic
GetSubMenu
SetTimer
LoadIconA
TrackPopupMenu
GetSystemMenu
SetForegroundWindow
ModifyMenuA
Number of PE resources by type
RT_ICON 10
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 11
GERMAN 1
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
TeamViewer

SubsystemVersion
4.0

InitializedDataSize
438272

ImageVersion
0.0

ProductName
TeamViewer

FileVersionNumber
13.2.26558.0

UninitializedDataSize
0

LanguageCode
English (British)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

PrivateBuild
TeamViewer Remote Control Application

FileTypeExtension
exe

OriginalFileName
TeamViewer_Service.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
13.2.26558.0

TimeStamp
2016:12:06 12:25:49+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
TeamViewer

ProductVersion
13.2.26558.0

FileDescription
TeamViewer 13

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
TeamViewer GmbH

MachineType
Intel 386 or later, and compatibles

CompanyName
TeamViewer GmbH

CodeSize
40960

FileSubtype
0

ProductVersionNumber
13.2.0.0

EntryPoint
0xa402

ObjectFileType
Executable application

File identification
MD5 acb7dfc0d79125a3cc45fe942d05768e
SHA1 21133972916cb032c606d147e87abf8a16f67016
SHA256 f03a57732b32dc3ed5f0c50005d3ce65e507739597301902abd51419bac51f3b
ssdeep
6144:LiZli8o745hSRKAi5PEiqwoDp88mcOYR+i2c9uI8WGd8Vk0GwA:LMlTTrdGwoe8mduR2cwWGdckZwA

authentihash d6606dfcee1e5d30844a524aaff2b244306477d846d7252ea04c9e80285c0239
imphash ac58c9164bbe684f46291a5663f4f36c
File size 472.0 KB ( 483328 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-28 20:27:24 UTC ( 3 months, 3 weeks ago )
Last submission 2019-01-28 20:27:24 UTC ( 3 months, 3 weeks ago )
File names joiyk.jpg
TeamViewer
TeamViewer_Service.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs