teamviewerqs_es.exe

TeamViewer QS

TeamViewer

This is a setup program which is used to install the application. The file has been seen being downloaded from customdesign.teamviewer.com.
Publisher:
TeamViewer  (signed and verified)

Product:
TeamViewer QS

Version:
11.0.63017.0

MD5:
ed3a4a9bdf93333bd6ce4aa2b2a98b59

SHA-1:
4fcb286de1d007e47323257f81ec19fed3b21588

SHA-256:
25e0f7cb4ef9e61ee2da2cb96f0225cc8d03a995e67792478bef86f649684311

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 2:35:54 PM UTC  (today)

File size:
7.2 MB (7,586,392 bytes)

Product version:
11.0.63017.0

Copyright:
TeamViewer

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/29/2014 6:00:00 PM

Valid to:
9/5/2017 5:59:59 PM

Subject:
CN=TeamViewer, O=TeamViewer, L=Goeppingen, S=Baden Wuerttemberg, C=DE

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56729300C78306C4267CA44A10ADCD03

File PE Metadata
Compilation timestamp:
12/27/2015 12:26:01 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:mKlsTmyovqH/mcftndyy9JXl5HPNLmsk0ID6x5raC0JINgL3Se:RlsTJoyHOcftdXrvJmJ0rx5wP

Entry address:
0x33B6

Entry point:
81, EC, D4, 02, 00, 00, 55, 56, 6A, 20, 33, ED, 5E, 89, 6C, 24, 0C, 68, 01, 80, 00, 00, C7, 44, 24, 0C, 30, A2, 40, 00, 89, 6C, 24, 18, FF, 15, B4, 80, 40, 00, FF, 15, B0, 80, 40, 00, 66, 3D, 06, 00, 74, 11, 55, E8, 69, 31, 00, 00, 3B, C5, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 53, 57, 68, B0, A3, 40, 00, E8, E6, 30, 00, 00, 68, A8, A3, 40, 00, E8, DC, 30, 00, 00, 68, 9C, A3, 40, 00, E8, D2, 30, 00, 00, 6A, 09, E8, 37, 31, 00, 00, 6A, 07, E8, 30, 31, 00, 00, A3, 64, A2, 42, 00, FF, 15, 44, 80, 40, 00, 55, FF...
 
[+]

Entropy:
7.9712  (probably packed)

Code size:
24.5 KB (25,088 bytes)

The file teamviewerqs_es.exe has been seen being distributed by the following URL.