Should I block it?

No, this file is 100% safe to run.

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
RegQueryValueExA, RegOpenKeyExA, RegCloseKey, SetFileSecurityA, RegSetValueExA, RegQueryInfoKeyA, RegOpenKeyExW, RegFlushKey, RegEnumValueA, RegEnumKeyExW, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyW, RegDeleteKeyA, RegCreateKeyExA, GetUserNameA, GetFileSecurityA, CryptGetProvParam, CryptImportKey, CryptExportKey, CryptReleaseContext, CryptDestroyKey, CryptGetUserKey, CryptAcquireContextA
comctl32.dll
_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
crypt32.dll
CertSetCertificateContextProperty, CertGetCertificateContextProperty, CertOpenStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertDeleteCertificateFromStore, CertFreeCertificateContext, CertAddEncodedCertificateToStore, CertCloseStore, CertFindCertificateInStore, CertOpenSystemStoreA
gdi32.dll
UnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32W, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExtFloodFill, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
kernel32.dll
GetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle, TlsSetValue, TlsGetValue, LocalAlloc, lstrcpyA, lstrcmpA, WriteConsoleOutputA, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualProtect, UnmapViewOfFile, TerminateProcess, SuspendThread, SizeofResource, SetThreadPriority, SetThreadLocale, SetPriorityClass, SetLastError, SetEvent, SetErrorMode, SetConsoleMode, SetConsoleCursorPosition, SetConsoleCtrlHandler, ScrollConsoleScreenBufferA, ResumeThread, ResetEvent, ReleaseSemaphore, ReadConsoleInputA, QueryDosDeviceA, OutputDebugStringA, OpenProcess, MulDiv, MapViewOfFile, LockResource, LocalFree, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVolumeInformationA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetSystemTime, GetSystemInfo, GetSystemDirectoryA, GetStringTypeExA, GetShortPathNameA, GetProfileStringA, GetLogicalDrives, GetLocalTime, GetLargestConsoleWindowSize, GetFullPathNameA, GetFileAttributesA, GetExitCodeThread, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetConsoleScreenBufferInfo, GetCPInfo, FreeResource, InterlockedExchange, FormatMessageA, FindResourceA, FindNextFileA, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsA, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateSemaphoreA, CreateFileMappingA, CreateEventA, CreateDirectoryA, CompareStringW, Beep
ole32.dll
CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, CoCreateGuid
oleaut32.dll
SysFreeString, SysReAllocStringLen, SysAllocStringLen, GetErrorInfo, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
shell32.dll
Shell_NotifyIconA, ShellExecuteW, ShellExecuteA, ExtractIconA, SHGetSpecialFolderLocation, SHGetPathFromIDListA
user32.dll
GetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA, DllMain, SwitchToThisWindow
version.dll
VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
wininet.dll
HttpQueryInfoA, HttpSendRequestA, HttpOpenRequestA, InternetReadFile, InternetConnectA, InternetCloseHandle, InternetOpenA
winspool.drv
OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter

TeaTimer.exe

Spybot - Search & Destroy by Safer Networking Ltd. (Signed)

Remove TeaTimer.exe
Version:   1, 6, 4, 26
MD5:   896a1db9a972ad2339c2e8569ec926d1
SHA1:   8182d70aa0c5f18cf5adc939a1dfe48518bc3c21
SHA256:   edb395ca46f79bc6668427df05dcd163f2bc874ddbb6484d0a30448f6c9d08e2

What is TeaTimer.exe?

System settings protector for Spybot Search & Destroy (S&D) is a spyware and adware removal computer program that scans the computer hard disk and/or RAM for malicious software. In addition to spyware and adware detection and disinfection, Spybot-S&D can repair the registry, winsock LSPs, ActiveX objects, browser hijackers and BHOs, PUPS, computer cookies, trackerware, heavy duty, homepage hijackers, keyloggers, LSP, tracks, trojans, spybots, revision, and other kinds of malware.

About TeaTimer.exe (from Safer Networking Ltd.)

Spybot-S&D is free for private use. Even if you don’t see the symptoms, your computer may be infected. The creators of spyware are constantly developing new ways of invading your privacy. Team Spybot

DetailsDetails

File name:TeaTimer.exe
Publisher:Safer Networking Limited
Product name:Spybot - Search & Destroy
Description:System settings protector
Typical file path:C:\Program Files\spybot - search & destroy\teatimer.exe
File version:1, 6, 4, 26
Product version:1, 6, 0, 30
Size:2.04 MB (2,144,088 bytes)
Certificate
Issued to:Safer Networking Ltd.
Authority (CA):VeriSign
Effective date:Thursday, March 23, 2006
Expiration date:Wednesday, April 8, 2009
Digital DNA
Entropy:6.748113
File packed:No
.NET CLR:No
More details

ResourcesPrograms

The following programs will install this file
Safer-Networking Ltd.
6% remove
Spybot Search & Destroy (S&D) is a spyware and adware removal computer program compatible with Microsoft Windows. It scans the computer hard disk and/or RAM for malicious software. In addition to spyware and adware detection and disinfection, Spybot-S&D can repair the registry, winsock LSPs, ActiveX objects, browser hijackers and BHOs, PUPS, computer cookies, trackerware, heavy duty, homepage hijackers, keyloggers, LSP, tracks, trojans,...

BehaviorsBehaviors

Startup files (user) run
Runs under the registry key 'HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'
  • 'SpybotSD TeaTimer' → C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.03344496%
0.028634%
Kernel CPU:0.01385327%
0.013761%
User CPU:0.01959170%
0.014873%
Kernel CPU time:5,642,203 ms/min
100,923,805ms/min
User CPU time:658 ms/min
0 ms/min
CPU cycles:32,217,338/sec
17,470,203/sec
Context switches:264/sec
284/sec
Memory
Private memory:44.78 MB
21.59 MB
Private (maximum):37.14 MB
Private (minimum):15.33 MB
Non-paged memory:44.78 MB
21.59 MB
Virtual memory:110.05 MB
140.96 MB
Virtual memory (peak):151.75 MB
169.69 MB
Working set:20.4 MB
18.61 MB
Working set (peak):87.69 MB
37.95 MB
Page faults:66,651,168/min
2,039/min
I/O
I/O read transfer:800.64 KB/sec
1.02 MB/min
I/O read operations:70/sec
343/min
I/O write transfer:70.46 KB/sec
274.99 KB/min
I/O write operations:3/sec
227/min
I/O other transfer:1.75 KB/sec
448.09 KB/min
I/O other operations:121/sec
1,671/min
Resource allocations
Threads:4
12
Handles:139
600
GUI GDI count:72
103
GUI GDI peak:95
142
GUI USER count:37
49
GUI USER peak:48
71

BehaviorsProcess properties

Integrety level:Medium
Platform:64-bit
Command line:"C:\Program Files\spybot - search & destroy\teatimer.exe"
Owner:User
Parent process:explorer.exe (by Microsoft)

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Microsoft Windows XP 41.67%
Windows 7 Home Premium 33.33%
Windows 7 Ultimate 16.67%
Windows XP Professional 8.33%

Distribution by countryDistribution by country

United States installs about 45.45% of Spybot - Search & Destroy.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE