teamviewerqs_cs.exe

TeamViewer QS

TeamViewer

This is a setup program which is used to install the application. The file has been seen being downloaded from solicad.com.
Publisher:
TeamViewer  (signed and verified)

Product:
TeamViewer QS

Version:
11.0.59518.0

MD5:
fce036a2edcc3cfed24180c4acd61ef5

SHA-1:
55aed67d81e02f5fe2948c4589d41f8fab5730c3

SHA-256:
4b0923f644ab7c6f82071e46e9eaa68e385370fc8cb2d1974bb28ab3dfe70861

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/1/2024 12:02:28 AM UTC  (today)

File size:
7.2 MB (7,498,640 bytes)

Product version:
11.0.59518.0

Copyright:
TeamViewer

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\teamviewerqs_cs.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/30/2014 2:00:00 AM

Valid to:
9/6/2017 1:59:59 AM

Subject:
CN=TeamViewer, O=TeamViewer, L=Goeppingen, S=Baden Wuerttemberg, C=DE

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56729300C78306C4267CA44A10ADCD03

File PE Metadata
Compilation timestamp:
12/27/2015 7:26:01 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:bKqAxOI6xFPuXQKNlq15/RU4jegYwyrqJV/M5EU8hApsET:vk6xBYV7q75NYw6CZM5ahApsET

Entry address:
0x33B6

Entry point:
81, EC, D4, 02, 00, 00, 55, 56, 6A, 20, 33, ED, 5E, 89, 6C, 24, 0C, 68, 01, 80, 00, 00, C7, 44, 24, 0C, 30, A2, 40, 00, 89, 6C, 24, 18, FF, 15, B4, 80, 40, 00, FF, 15, B0, 80, 40, 00, 66, 3D, 06, 00, 74, 11, 55, E8, 69, 31, 00, 00, 3B, C5, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 53, 57, 68, B0, A3, 40, 00, E8, E6, 30, 00, 00, 68, A8, A3, 40, 00, E8, DC, 30, 00, 00, 68, 9C, A3, 40, 00, E8, D2, 30, 00, 00, 6A, 09, E8, 37, 31, 00, 00, 6A, 07, E8, 30, 31, 00, 00, A3, 64, A2, 42, 00, FF, 15, 44, 80, 40, 00, 55, FF...
 
[+]

Code size:
24.5 KB (25,088 bytes)

The file teamviewerqs_cs.exe has been seen being distributed by the following URL.