teamviewerqs_es.exe

TeamViewer GmbH

This is a setup program which is used to install the application. The file has been seen being downloaded from www.smida.eu and multiple other hosts.
Publisher:
TeamViewer GmbH  (signed and verified)

MD5:
58563db9eae7deb5223f93eccd5a0e93

SHA-1:
178d062916ab1e9da40a5370ac1c4eb11a387a50

SHA-256:
6ab89c8910742d48af368d3dafbbcd5ac82973498766fca3d70bdbab991cf908

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/16/2024 12:47:35 PM UTC  (today)

File size:
1.5 MB (1,551,280 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\teamviewerqs_es.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/16/2008 1:00:00 AM

Valid to:
2/23/2011 12:59:59 AM

Subject:
CN=TeamViewer GmbH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TeamViewer GmbH, S=Baden Wuerttemberg, C=DE

Issuer:
CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
25C902D026E31244C125996771C9DC01

File PE Metadata
Compilation timestamp:
4/27/2007 9:59:31 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:uuO3RMzeqvbID1eb5X0qXYej+eL29IN8j23f3fDEi09fdchDLBZN1vFRphHtuo4c:WRMzJXYFe2U3PbE96PxvHtuF52h

Entry address:
0x331B0

Entry point:
60, BE, 00, F0, 42, 00, 8D, BE, 00, 20, FD, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
20 KB (20,480 bytes)

The file teamviewerqs_es.exe has been seen being distributed by the following 2 URLs.