About

One of the most recognized remote support tools, commonly misused in intrusions for interactive remote sessions owing to its widespread presence in corporate environments and no-configuration quick access.

📂Log File Locations

Run-Only [One Time Use] TeamViewer Installed Significance
%LocalAppData%\TeamViewer\Logs\TeamViewer15_Logfile.log C:\Program Files\TeamViewer\TeamViewer15_Logfile.log Wealth of Information!
%appdata%\TeamViewer\Connections.txt %appdata%\TeamViewer\Connections.txt Outgoing TeamViewer Connection Details
%temp%\TeamViewer\Connections_incoming.txt C:\Program Files\TeamViewer\Connections_incoming.txt Incoming TeamViewer Connection Details

TeamViewer15_Logfile.log

It stores each and every successful connection in a nice Keyword-Value format.

Start:              2023/01/09 09:46:04.501 (UTC)
Version:            15.37.3 
Version short hash: 9191c897b9c
ID:                 1430886940 //ID of the Target host
Loglevel:           Info
License:            10000
IC:                 1704214562
CPU:                Intel64 Family 6 Model 85 Stepping 4, GenuineIntel
CPU extensions:     l9
OS:                 Win_10.0.19044_W (64-bit)
IP:                 192.168.50.194 //IP of the Target Host
MID:                v95db4d5636b078d5bb4fdb78503a236c000c293a236c306f2db9b628a1f4910da6d0fc1267f8<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~0dd0c5b4e712d7cef7750d93b4e6b006
MIDv:               2
Proxy-Settings:     Type=1 IP= User=
IE                  11.789.19041.0
AppPath:            C:\\Users\\sansdfir\\AppData\\Local\\Temp\\TeamViewer\\TeamViewer.exe
UserAccount:        sansdfir //User on the Target host

Successful Remote Connection

CPersistentParticipantManager::AddParticipant: [1430897608,-1706173441] type=6 name=WIN10VM

Legend:


Public IP of the Source Host

2023/01/09 19:26:13.353 1472 3160 S0 UDPv4: punch received a=106.205.243.107:53628: (*)

File Download

Write file indicates that a file was dropped/downloaded on the Target