Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
TeamViewer.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
TeamViewer.exe
Resource
win10v2004-20230220-es
Target
TeamViewer.exe
Size
77.3MB
MD5
a289a61d06872f3d0e23cb37363f12fd
SHA1
67a8ff96438ab30940b25c901e526b58ae13ef78
SHA256
33fab460c7d793ef2c0965347953dd8999838bc10d322263d92f603a04865195
SHA512
d4c52c530c8d22daefb2611f5765e078180f4b7c37af0a08c823da9334c91449f43a8bb53d9c348ce23cf766d2d8337bff043a52dad3b71d20a2ee750dc8775b
SSDEEP
393216:S26lJWo8wHDgTMCeDTObSik9CxEq84RTZ+sYX4XVzW8UIcx9bxfoH+6UO+sbQZrr:SCLNoTObSicituQjH+Al8if8/c3jq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleFileNameW
DeleteCriticalSection
SetLastError
GetCurrentThreadId
RaiseException
WideCharToMultiByte
LocalFree
FormatMessageW
FormatMessageA
SetEvent
CreateEventW
CreateMutexW
ReleaseMutex
CloseHandle
CreateFileW
WaitForMultipleObjects
WaitForSingleObject
PostQueuedCompletionStatus
TerminateThread
TlsAlloc
QueueUserAPC
DecodePointer
TlsFree
CreateEventA
GetTickCount
GetUserDefaultLCID
GetStringTypeExW
LCMapStringW
LoadLibraryA
FreeLibrary
TlsGetValue
GetSystemTimeAsFileTime
UnregisterWaitEx
RegisterWaitForSingleObject
SetWaitableTimer
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
TlsSetValue
SleepEx
CreateIoCompletionPort
CreateWaitableTimerW
UnregisterWait
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ResetEvent
MulDiv
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetPrivateProfileStringW
WritePrivateProfileStringW
GlobalAlloc
GlobalFree
GlobalSize
GlobalLock
GlobalUnlock
DeleteFileW
FindFirstFileW
GetFileAttributesW
FindClose
VerifyVersionInfoW
VerSetConditionMask
GetCommandLineW
ExpandEnvironmentStringsW
WriteFile
ReadFile
SetErrorMode
SetProcessShutdownParameters
GetCurrentProcessId
ReleaseSemaphore
WaitForSingleObjectEx
CreateDirectoryW
DuplicateHandle
CreateSemaphoreA
CopyFileW
MoveFileExW
GetTempPathW
GetUserGeoID
GetGeoInfoW
GetLocaleInfoW
GlobalMemoryStatusEx
GetComputerNameW
MoveFileW
GetStringTypeExA
LCMapStringA
FileTimeToSystemTime
GetLocalTime
SystemTimeToFileTime
SetFilePointer
GetFileInformationByHandle
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LocalAlloc
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
SetFileTime
GetTempFileNameW
GetNativeSystemInfo
GetSystemPowerStatus
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetProcessId
ProcessIdToSessionId
OpenEventW
InitializeCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
OpenProcess
FindNextFileW
WaitNamedPipeW
ResumeThread
CreateProcessW
TerminateProcess
QueryFullProcessImageNameW
K32GetModuleFileNameExW
K32EnumProcesses
GetExitCodeProcess
GetSystemInfo
GetCurrentThread
SetThreadPriority
lstrlenW
GlobalReAlloc
GetTimeFormatW
LockResource
FindResourceExW
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
GetSystemDirectoryW
LoadLibraryW
GetSystemTime
GetTimeZoneInformation
GetDateFormatW
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionEx
SetEnvironmentVariableW
Sleep
GetProcessTimes
SetPriorityClass
GetPriorityClass
GetVersionExW
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
CreateSemaphoreW
GetFullPathNameW
CompareStringW
GetNumberFormatW
GetCurrencyFormatW
GetSystemDefaultLCID
OutputDebugStringW
GetTempPathA
GetTempFileNameA
GetCPInfo
LocalSize
DebugBreak
SetEndOfFile
FlushViewOfFile
SetHandleInformation
SetFileCompletionNotificationModes
CancelIoEx
CancelIo
SwitchToThread
SetConsoleCtrlHandler
GetFileType
GetConsoleMode
CreateFileA
FlushFileBuffers
ConnectNamedPipe
SetNamedPipeHandleState
PeekNamedPipe
CreateNamedPipeW
GetNamedPipeHandleStateW
CancelSynchronousIo
QueueUserWorkItem
CreateNamedPipeA
SetConsoleMode
GetNumberOfConsoleInputEvents
ReadConsoleInputW
ReadConsoleW
WriteConsoleW
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
GetConsoleCursorInfo
SetConsoleCursorInfo
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
SetConsoleTextAttribute
WriteConsoleInputW
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetDiskFreeSpaceW
GetFileSizeEx
RemoveDirectoryW
SetFilePointerEx
DeviceIoControl
ReOpenFile
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetLongPathNameW
GetShortPathNameW
ReadDirectoryChangesW
GetStdHandle
GetStartupInfoW
CreateThread
CompareFileTime
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleExW
GetACP
RtlVirtualUnwind
ReadConsoleA
GetOverlappedResult
K32EnumProcessModules
GetSystemFirmwareTable
OpenMutexW
CreateFileMappingA
OpenFileMappingA
MapViewOfFileEx
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetSystemDefaultLangID
GetExitCodeThread
GetDriveTypeW
GetFileAttributesExW
GetLogicalDriveStringsW
GetVolumeInformationW
SetFileAttributesW
lstrcmpW
AreFileApisANSI
HeapCreate
OutputDebugStringA
LockFile
GetFullPathNameA
UnlockFileEx
HeapValidate
GetDiskFreeSpaceA
GetFileAttributesA
DeleteFileA
HeapCompact
UnlockFile
LockFileEx
OpenEventA
OpenThread
GetComputerNameExA
GetComputerNameExW
SetUnhandledExceptionFilter
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetEnvironmentVariableA
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetDiskFreeSpaceExW
WTSGetActiveConsoleSessionId
GetThreadTimes
GetTickCount64
GetDynamicTimeZoneInformation
GetActiveProcessorCount
GetActiveProcessorGroupCount
GetCurrentProcessorNumberEx
SetThreadGroupAffinity
Wow64RevertWow64FsRedirection
GetLastError
LeaveCriticalSection
EnterCriticalSection
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetEnvironmentVariableW
LoadLibraryExA
VirtualQuery
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
GetStringTypeW
RtlPcToFileHeader
InitOnceBeginInitialize
InitOnceComplete
SleepConditionVariableSRW
FindFirstFileExW
CreateDirectoryExW
GetLocaleInfoEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringEx
CompareStringEx
GetFileTime
GetWindowsDirectoryW
CopyFileExW
WaitForMultipleObjectsEx
CreateWaitableTimerA
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwindEx
RtlUnwind
ExitThread
FreeLibraryAndExitThread
SetStdHandle
GetConsoleOutputCP
ExitProcess
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
GetCommandLineA
CreatePipe
SetThreadExecutionState
GetSystemTimes
Wow64DisableWow64FsRedirection
GetLogicalProcessorInformationEx
ImmNotifyIME
ImmGetCompositionStringW
ImmAssociateContextEx
ImmReleaseContext
ImmGetContext
ImmIsIME
ImmSetCandidateWindow
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ