General Info

File name

TeamViewerQJ_fr.exe

Full analysis
https://app.any.run/tasks/4d55a5a9-2413-484e-b585-50e1f45d4943
Verdict
Malicious activity
Analysis date
1/10/2019, 15:59:36
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
teamviewer
tvrat
rat
Indicators:

MIME:
application/x-dosexec
File info:
PE32 executable (GUI) Intel 80386, for MS Windows
MD5

6cbc43f2cfe24df2b7e3dda9f6d8f20b

SHA1

6b214d2336ce9c4ca5985da980b862ac09205f8a

SHA256

3fd023a275cb3f4755915cf12233932449c4c650b86a36ee43203f0ed28d7e9c

SSDEEP

98304:PEvcmLomD+KVa9HvGtNLFXHk2/RODe0GxyiBBIY:P92KH+lFU20rGdKY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
off

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Loads dropped or rewritten executable
  • TeamViewer.exe (PID: 3284)
  • TeamViewer.exe (PID: 2372)
  • TeamViewerQJ_fr.exe (PID: 3240)
Application was dropped or rewritten from another process
  • TeamViewer.exe (PID: 2372)
  • TeamViewer.exe (PID: 3284)
Creates files in the user directory
  • TeamViewer.exe (PID: 3284)
Connects to unusual port
  • TeamViewer.exe (PID: 2372)
Application launched itself
  • TeamViewer.exe (PID: 3284)
Executable content was dropped or overwritten
  • TeamViewerQJ_fr.exe (PID: 3240)

No info indicators.

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.exe
|   Win32 Executable MS Visual C++ (generic) (42.2%)
.exe
|   Win64 Executable (generic) (37.3%)
.dll
|   Win32 Dynamic Link Library (generic) (8.8%)
.exe
|   Win32 Executable (generic) (6%)
.exe
|   Generic Win/DOS Executable (2.7%)
EXIF
EXE
MachineType:
Intel 386 or later, and compatibles
TimeStamp:
2012:02:24 20:19:59+01:00
PEType:
PE32
LinkerVersion:
10
CodeSize:
28672
InitializedDataSize:
445952
UninitializedDataSize:
16896
EntryPoint:
0x39e3
OSVersion:
5
ImageVersion:
6
SubsystemVersion:
5
Subsystem:
Windows GUI
FileVersionNumber:
9.0.32494.0
ProductVersionNumber:
9.0.32494.0
FileFlagsMask:
0x0000
FileFlags:
(none)
FileOS:
Win32
ObjectFileType:
Executable application
FileSubtype:
null
LanguageCode:
Neutral
CharacterSet:
Unicode
Comments:
TeamViewer Remote Control Application
CompanyName:
TeamViewer
FileVersion:
9.0.32494.0
LegalCopyright:
TeamViewer
ProductName:
TeamViewer QJ
ProductVersion:
9.0.32494.0
Summary
Architecture:
IMAGE_FILE_MACHINE_I386
Subsystem:
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date:
24-Feb-2012 19:19:59
Detected languages
English - United States
Comments:
TeamViewer Remote Control Application
CompanyName:
TeamViewer
FileVersion:
9.0.32494.0
LegalCopyright:
TeamViewer
ProductName:
TeamViewer QJ
ProductVersion:
9.0.32494.0
DOS Header
Magic number:
MZ
Bytes on last page of file:
0x0090
Pages in file:
0x0003
Relocations:
0x0000
Size of header:
0x0004
Min extra paragraphs:
0x0000
Max extra paragraphs:
0xFFFF
Initial SS value:
0x0000
Initial SP value:
0x00B8
Checksum:
0x0000
Initial IP value:
0x0000
Initial CS value:
0x0000
Overlay number:
0x0000
OEM identifier:
0x0000
OEM information:
0x0000
Address of NE header:
0x000000D0
PE Headers
Signature:
PE
Machine:
IMAGE_FILE_MACHINE_I386
Number of sections:
6
Time date stamp:
24-Feb-2012 19:19:59
Pointer to Symbol Table:
0x00000000
Number of symbols:
0
Size of Optional Header:
0x00E0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
Sections
Name Virtual Address Virtual Size Raw Size Charateristics Entropy
.text 0x00001000 0x00006F10 0x00007000 IMAGE_SCN_CNT_CODE,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ 6.49788
.rdata 0x00008000 0x00002A92 0x00002C00 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ 4.39389
.data 0x0000B000 0x00067EBC 0x00000200 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 1.47278
.ndata 0x00073000 0x000AD000 0x00000000 IMAGE_SCN_CNT_UNINITIALIZED_DATA,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 0
.rsrc 0x00120000 0x00006610 0x00006800 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ 5.06771
.reloc 0x00127000 0x00000F8A 0x00001000 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_DISCARDABLE,IMAGE_SCN_MEM_READ 4.97036
Resources
1

2

3

4

5

6

7

103

105

106

111

Imports
    KERNEL32.dll

    USER32.dll

    GDI32.dll

    SHELL32.dll

    ADVAPI32.dll

    COMCTL32.dll

    ole32.dll

    VERSION.dll

Exports

    No exports.

Screenshots

Processes

Total processes
37
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

+
drop and start start teamviewerqj_fr.exe teamviewer.exe no specs teamviewer.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3240
CMD
"C:\Users\admin\AppData\Local\Temp\TeamViewerQJ_fr.exe"
Path
C:\Users\admin\AppData\Local\Temp\TeamViewerQJ_fr.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
TeamViewer
Description
Version
9.0.32494.0
Modules
Image
c:\users\admin\appdata\local\temp\teamviewerqj_fr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\version.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\riched20.dll
c:\windows\system32\uxtheme.dll
c:\users\admin\appdata\local\temp\nsrf16b.tmp\tvgetversion.dll
c:\windows\system32\winspool.drv
c:\users\admin\appdata\local\temp\nsrf16b.tmp\system.dll
c:\users\admin\appdata\local\temp\nsrf16b.tmp\nsis7z.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\sspicli.dll
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer.exe

PID
3284
CMD
"C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer.exe"
Path
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer.exe
Indicators
No indicators
Parent process
TeamViewerQJ_fr.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
TeamViewer GmbH
Description
TeamViewer 9
Version
9.0.32494.0
Modules
Image
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvfw32.dll
c:\windows\system32\winmm.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\avicap32.dll
c:\windows\system32\version.dll
c:\windows\system32\quartz.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\riched20.dll
c:\windows\system32\magnification.dll
c:\windows\system32\d3d9.dll
c:\windows\system32\d3d8thk.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\d3d11.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer_resource_fr.dll
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer_staticres.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\mpr.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll

PID
2372
CMD
"C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer.exe" --dre
Path
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer.exe
Indicators
Parent process
TeamViewer.exe
User
admin
Integrity Level
HIGH
Version:
Company
TeamViewer GmbH
Description
TeamViewer 9
Version
9.0.32494.0
Modules
Image
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvfw32.dll
c:\windows\system32\winmm.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\avicap32.dll
c:\windows\system32\version.dll
c:\windows\system32\quartz.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\riched20.dll
c:\windows\system32\magnification.dll
c:\windows\system32\d3d9.dll
c:\windows\system32\d3d8thk.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\d3d11.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer_resource_fr.dll
c:\users\admin\appdata\local\temp\teamviewer\version9\teamviewer_staticres.dll
c:\windows\system32\mapi32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\wbem\wbemprox.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\wbem\wbemsvc.dll
c:\windows\system32\wbem\fastprox.dll
c:\windows\system32\ntdsapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\wship6.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\winsta.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\drprov.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\netprofm.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\browcli.dll
c:\windows\system32\npmproxy.dll
c:\windows\system32\napinsp.dll
c:\windows\system32\pnrpnsp.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\winrnr.dll
c:\windows\system32\credssp.dll
c:\windows\system32\samcli.dll
c:\windows\system32\samlib.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\devenum.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\dsound.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll
c:\windows\system32\schannel.dll
c:\windows\system32\sxs.dll

Registry activity

Total events
813
Read events
781
Write events
31
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
3240
TeamViewerQJ_fr.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3240
TeamViewerQJ_fr.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3284
TeamViewer.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Name
TeamViewer.exe
3284
TeamViewer.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3284
TeamViewer.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3284
TeamViewer.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2372
TeamViewer.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Name
TeamViewer.exe
2372
TeamViewer.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2372
TeamViewer.exe
delete key
HKEY_LOCAL_MACHINE\SOFTWARE\TeamViewer\Version9\Temp
2372
TeamViewer.exe
write
HKEY_CURRENT_USER\Software\TeamViewer\Version9
Meeting_UserName
Admin

Files activity

Executable files
11
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\nsrF16B.tmp\TvGetVersion.dll
executable
MD5: 211bc689de1f590a283a8d6484d44308
SHA256: 751cdbb5943e5c3d3663967a8a13b8664ca25f39c400dda5bdb582046b9ee2e7
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tv_x64.dll
executable
MD5: 24a4e0aa22ef8b91651023e7e6c0a8e3
SHA256: 18b10dc0a79b1ff04c557a01392e1a1869d4bc84bcd05db8e249f81b543c7aed
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\nsrF16B.tmp\nsis7z.dll
executable
MD5: 87853c0f20f065793bdc707ece66190b
SHA256: 66b2f36274ddfeef35b1d6ae6e5755f834446e5d78a719063347543793987161
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tv_w32.dll
executable
MD5: 4ced559981e38eb824b4281fb32118cb
SHA256: 65e5cfbccf322eaecd7cab279cdffa60065c810212757d3025f1c8bd543457ce
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer_StaticRes.dll
executable
MD5: a4fb5bdae0bdf1dfd3d12b7c6e835555
SHA256: 5c0cbbbaa79abd13dcd77bc36052b52e59a93a83efe4f0db925309ceffe533d0
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer_Resource_fr.dll
executable
MD5: 70fc3973d2b52174b708ddba356e3856
SHA256: 2583ae64ee68924859dbefdaa5278e50fcd4f31df3c0ff2f855611e1ccad2820
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer.exe
executable
MD5: f6b470cbd6602125ff460bea4cf7ee76
SHA256: f189d27a6be37cd98b62a9e486f5127f35ea8dd92d7a5ac01956b719d70249e8
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\nsrF16B.tmp\System.dll
executable
MD5: bf712f32249029466fa86756f5546950
SHA256: 7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tv_w32.exe
executable
MD5: 83de0cc30f2e7f7108f550aebddce4c7
SHA256: 3f0d1ebb16bd71ba05893d4bc8463548b37843e75b046725af1486f853924847
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tv_x64.exe
executable
MD5: 8c8e7948b3940bc2987d06d633df4aea
SHA256: fce242f4f43fcdc292855a8ebeb858aa6d0b798d356c92949fc36b3e37ac15ea
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\TeamViewer_Desktop.exe
executable
MD5: 263290b1bf147ba92f3eeb455e290655
SHA256: 7253439b60a0770e26b0e3ef0fda2f44a05d6e35eecde0664aade4ec969a8e2b
3284
TeamViewer.exe
C:\Users\admin\AppData\Roaming\TeamViewer\TeamViewer9_Logfile.log
text
MD5: e7de982d93f49dbbb6b4bfd1247ddfdf
SHA256: f2612aa7f16c4a49954ea57ccc8be9764afba9c288b78938683ee0fadd346f9d
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tvinfo.ini
text
MD5: 177b400edad63dbe9c59ddc68d7dfc7a
SHA256: 1a5cf37fb4d373dcf91fcc86e6716c19d28456fd4578f9ebe25cc30c621af66c
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\TeamViewer\Version9\tvqjfiles.7z
compressed
MD5: ac14cb4198dec60cc2187249207f8e01
SHA256: 1014e3a8b206064efb106e566895358489387fdaaea89a74068f8ac58b691767
3240
TeamViewerQJ_fr.exe
C:\Users\admin\AppData\Local\Temp\nsbF15A.tmp
––
MD5:  ––
SHA256:  ––
2372
TeamViewer.exe
C:\Users\admin\AppData\Roaming\TeamViewer\TeamViewer9_Logfile.log
text
MD5: 2a21c2864c8bc590121c803826cf4ea6
SHA256: d7f0605c06ba18e268547e115ca01b443e358d59ef4d13a47012cc3491985880

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
2
TCP/UDP connections
11
DNS requests
6
Threats
3

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
–– –– GET 200 195.138.255.16:80 http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI%3D DE
der
whitelisted
–– –– GET 200 195.138.255.17:80 http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCECsuburZdTZsFIpu26N8jAc%3D DE
der
whitelisted

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2372 TeamViewer.exe 188.172.246.190:5938 ANEXIA Internetdienstleistungs GmbH AT suspicious
2372 TeamViewer.exe 185.188.32.6:5938 TeamViewer GmbH DE suspicious
2372 TeamViewer.exe 62.138.209.160:5938 PlusServer GmbH DE suspicious
2372 TeamViewer.exe 52.168.20.22:443 Microsoft Corporation US whitelisted
–– –– 195.138.255.16:80 AS33891 Netzbetrieb GmbH DE unknown
–– –– 195.138.255.17:80 AS33891 Netzbetrieb GmbH DE unknown

DNS requests

Domain IP Reputation
ping3.teamviewer.com 188.172.246.190
213.227.168.190
188.172.198.158
188.172.219.158
213.227.162.126
shared
master6.teamviewer.com 185.188.32.6
shared
client.teamviewer.com 52.168.20.22
shared
ocsp.usertrust.com 195.138.255.16
195.138.255.24
whitelisted
ocsp.comodoca.com 195.138.255.17
195.138.255.10
whitelisted

Threats

PID Process Class Message
2372 TeamViewer.exe Potential Corporate Privacy Violation POLICY [PTsecurity] TeamViewer negotiation
2372 TeamViewer.exe Potential Corporate Privacy Violation POLICY [PTsecurity] TeamViewer connection
2372 TeamViewer.exe Potential Corporate Privacy Violation POLICY [PTsecurity] TeamViewer negotiation

Debug output strings

No debug info.