teamviewer.exe

TeamViewer

Download Manager

This is part of the Air Installer, a download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application teamviewer.exe, “TeamViewer ” by Download Manager has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the AirInstaller Download Manager installer. The file has been seen being downloaded from www.installer-assist.com.
Publisher:
DownloadManagercerts   (signed by Download Manager)

Product:
TeamViewer

Description:
TeamViewer

Version:
2.0.67.0

MD5:
5c10701aee592b757a4f4aa4a34b2f88

SHA-1:
30282242b37ceed3b5bc8edcf8259fc8172670ba

SHA-256:
50cab7041dd20d03597544fdb2435ba8812fac1eb4d624ee3642080b286e850f

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 8:23:22 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Air Software (M)
16.8.7.21

File size:
910.8 KB (932,704 bytes)

Product version:
2.0.67.0

Copyright:
(c) DownloadManagercerts

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\teamviewer.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/9/2014 7:00:00 PM

Valid to:
7/11/2017 6:59:59 PM

Subject:
CN=Download Manager, O=Download Manager, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6771A39C2739AF7082C1C8D8234BB168

File PE Metadata
Compilation timestamp:
9/2/2014 3:11:46 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:sWuN+lLUnxkKPXGUmJ7Yvi2HiylD2G3JcCxqkjiWRH8UBp:VFlL4hXIJ06c1ZR0gXRfB

Entry address:
0x2A06C0

Entry point:
60, BE, 00, E0, 5C, 00, 8D, BE, 00, 30, E3, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8744

Packer / compiler:
UPX 2.90LZMA

Code size:
844 KB (864,256 bytes)

The file teamviewer.exe has been seen being distributed by the following URL.

Remove teamviewer.exe - Powered by Reason Core Security