Fixed: How To Fix Teamview As Spyware

Quick and Easy PC Repair

  • 1. Download and install ASR Pro
  • 2. Open the program and click on "Scan"
  • 3. Click on "Repair" to start the restoration process
  • Download this software now to maximize your computer's performance.

    In some cases, your computer may display a message that Teamview can be used as spyware. There can be several reasons for this problem.

    No. Teamviewer is specifically designed to be used for remote access to a computer. Does it look like other private support tools like RHUB Remote Enable Appliances, logmein, etc. No one can blur your personal information as you have the ability to see what is happening on the desktop computer.

    How is TeamViewer used to spy on victims?

    g.These teams now allow cybercriminals to spy on their victims and steal their personal information in a variety of ways. In addition, the malware can now be used to install malware, and Doctor Web researchers claim that it was used to spread threats belonging to the Trojan.Keylogger and Trojan.PWS.Stealer families.

    If these technicians trust you, everything should be fine in general. If you don’t have it installed, it’s a standalone client, so you don’t need to remove them. Remember that the Teamviewer program itself is an excellent Teamviewer, has many owners. Just make sure:

    2, you reload the number to access, make sure the problem can’t be re-linked to this

    3. Check the settings in Teamviewer to make sure that automatic access is usually disabled

    <title> </section> <p> <title> </p> <div><div style="background: rgba(156, 156, 156, 0.07);margin:20px 0 20px 0;padding:20px 10px 20px 10px;border: solid 1px rgba(0,0,0,0.03);text-align: left;"><h2><span class="ez-toc-section" id="Quick_and_Easy_PC_Repair-2"></span>Quick and Easy PC Repair<span class="ez-toc-section-end"></span></h2> <p>Is your PC running slow and constantly displaying errors? Have you been considering a reformat but don't have the time or patience? Fear not, dear friend! The answer to all your computing woes is here: <a href="https://link.advancedsystemrepairpro.com/d7b96561?clickId=firewallbeta.com" target="_blank" rel="nofollow">ASR Pro</a>. This amazing software will repair common computer errors, protect you from file loss, malware, hardware failure and optimize your PC for maximum performance. So long as you have this program installed on your machine, you can kiss those frustrating and costly technical problems goodbye!</p> <li>1. Download and install <a href="https://link.advancedsystemrepairpro.com/d7b96561?clickId=firewallbeta.com" target="_blank" rel="nofollow">ASR Pro</a></li> <li>2. Open the program and click on "Scan"</li> <li>3. Click on "Repair" to start the restoration process</li> <br><a href="https://link.advancedsystemrepairpro.com/d7b96561?clickId=firewallbeta.com" target="_blank" rel="nofollow" alt="download"><img src="/wp-content/download10.png" style="width:340px;"></a></div></p> <p><img alt="" src="https://documents.trendmicro.com/images/TEx/articles/20180416195823396-893-mrbyrxt-800.jpg"></p> </div> <p>TeamViewer is a file sharing and communication program that also allows IT professionals to remotely access devices connected to employee organizations. Unfortunately, its power, given the tool company, also makes it popular with cybercriminals, and TeamViewer is actually being used in a new range of cybercriminals, from vendor hacks to phishing scams. We recently investigated another exploitation case. </p> <p>On January 20, the security auditor found fewatoms a malicious URL. The URL is a directory open to potential victims to purchase a destructive self-extracting archive. Upon further analysis of the attached archive, we discovered that it is in fact a Trojan spyware (identified by Trend Micro as TROJANSPY.WIN32.TEAMFOSTEALER.THOABAAI) that collects and exchanges view data under TeamViewer. If the Trojan really downloads, it starts andon a working device, it is the victim, creates a folder %User Temp%PmIgYzA and dumps most of the files Temp%PmIgYzAFZhIG to:</p> <ul> <li>%User.ico</li> <li>%UserTemp%PmIgYzAconfig.bin</li> <li>%User Temp%PmIgYzA�.0</li> <li>%User Temp%PmIgYzATV.dll (malware)</li> <li>%User useful Startup%Gateway Layer 1.3957.lnk (Shortcut for TeamViewer.exe deprecated)</li> </ul> <p>And some safe files:<br /><str></p> <li>%UserTemp%PmIgYzATeamViewer.exe</li> <li>%UserTemp%PmIgYzATeamViewer_Resource_en.dll</li> </ul> <p>(Note: %user temp% is the current user’s temporary folder; %User Startup% is the last user’s startup folder)</p> <p></p> <p>Fig. 1. Files removed by Trojan spyware</p> <p>When it enters the victim’s system, the malware launches TeamViewer.Aus, which is an exe that maliciously loads the DLL %User Temp%PmIgYzATV.dll. Trojan spyware collects about user and device data below) (listed and connect to hxxp://intersys32[.]com website to send and receive information.</p> <ul> <li>Operating system</li> <li>Operating system architecture</li> <li>username</li> <li>Computer size</li> <li>RAM name</li> <li>Availability of audiovisual products</li> <li>Administrator rights</li> </ul> <p>When p Browsing the website found a lot of malware associated with that particular URL, such as a trojan like CoinSteal and another information stealer and malware called Dropper Fareit.</p> <div></p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="3"><span class="ez-toc-section" id="Is_QuickSupport_app_safe"></span>Is QuickSupport app safe?<span class="ez-toc-section-end"></span></h2> <p>Don’t download QuickSupport or AnyDesk A fraudster posing as companies like Apple or your major financial institutions may ask you to download the AnyDesk smartphone app or TeamViewer QuickSupport to take control of your computer and bank accounts.</p> </div> <p></p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="2"><span class="ez-toc-section" id="Is_TeamViewer_QuickSupport_safe"></span>Is TeamViewer QuickSupport safe?<span class="ez-toc-section-end"></span></h2> <p>TeamViewer is definitely considered completely secure by current standards and is also used by financial and government institutions. Two-factor authentication for your TeamViewer card. Beyond names and details, protect your access data with a choice factor.</p> </div> </div> <p><img src="/posts/can-teamview-be-used-as-spyware.png" style="margin-top:20px; margin-bottom:20px; display: block; margin: 0 auto;" alt="can teamview be used as spyware"></p> <p>Figure 2. Malware associated with our Intersys32</p> <div></p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="1"><span class="ez-toc-section" id="Is_Teamview_secure"></span>Is Teamview secure?<span class="ez-toc-section-end"></span></h2> <p>TeamViewer data traffic is protected by RSA public / private key exchange and AES session encryption (256 bit). This technology is used in a form similar to https / SSL and is considered completely secure by today’s standards.</p> </div> <p>Preventing and fixing URLs</p> <p>This misuse is not new to teamviewer. Known malware developers should have released this tool in 2016 to similarly deploy other keylogger backdoors on the device. A report published in the year 2017 also showed how TeamViewer was being used as a control for the type of computer that was infected, and not just as an actual malware downloader. </p> <p>Given the potential for abuse by more and more malware delivery schemes disguised as legitimate platforms, users should secure their endpoints with layered protection in mind. </p> <p>The following Trend Micro products can protect users from this threat: </p> <p>Trend Micro™ Security, Smart Protection Suites per application</p> </div> <p>updated TeamViewer:</p> <blockquote><p>The malware described in this article may not be the official teamviewer software. This and a modified pirated version of most programs. It is strongly recommended to download the software only from the official TeamViewer website. Obtaining utilities from a trusted source is the best way to protect yourself from horrors like the Trojan Too spyware trojan described on the right. TeamViewer recommends always using the latest software to take advantage of popular security measures.</p></blockquote> <div> <p>Indicators of compromise</p> <p>SHA<br />b2ab87d5408a19b0d65d49b74c0f3d879ac55c3e57117e4117ff500394e2ad17</p> <p>Malicious URL:<br />hxxp://rosalos[.ug]/xxx/<br />hxxp : / /intersys32[.Additional ]com</p> <p>with ideas from Rafael Centeno and Patrick Roderno</p> </div> <div> <p>Hide</p> <section><img src="https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110930/teamviewer-biohazard.jpg" style="margin-top:20px; margin-bottom:20px; display: block; margin: 0 auto;" alt="can teamview be used as spyware"></p> <p>Do you like it? Add this infographic type to your website:<br />1. Click the current field below. 2. Press to ctrl+a, select all. 3.Press Ctrl+C to copy it. 4. Paste the code directly on your page (Ctrl+V).</p> <p></p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="4"><span class="ez-toc-section" id="What_kind_of_malware_is_using_TeamViewer_app"></span>What kind of malware is using TeamViewer app?<span class="ez-toc-section-end"></span></h2> <p>In the past, hackers used the malicious TeamViewer app to surprise people with malware to steal data from TeamSpy. To protect your own system abouttons of such spyware, avoid downloading software from third party websites, rewrite your system and scan it regularly with antivirus software.</p> </div> </p> <a href="https://link.advancedsystemrepairpro.com/d7b96561?clickId=firewallbeta.com" target="_blank" rel="nofollow"> Download this software now to maximize your computer's performance. </a> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="6"><span class="ez-toc-section" id="Is_Teamview_a_spyware"></span>Is Teamview a spyware?<span class="ez-toc-section-end"></span></h2> <p>TeamViewer cannot monitor your trusted device without your consent. This lets you know that your procedure is available remotely. teamviewer is often a remote desktop software for creating Windows, Mac OS X and Android operating systems. allows IT users to remotely shut down other computers over the Internet.</p> </div> <p> </p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="7"><span class="ez-toc-section" id="Can_someone_hack_you_through_TeamViewer"></span>Can someone hack you through TeamViewer?<span class="ez-toc-section-end"></span></h2> <p>TeamViewer’s official answer is “no”. People who have access to remote control toys could weakly use passwords, reuseUsing passwords despite simplifying the use of the connection. If this password is deemed violated, an unauthorized person may gain control of remote controlled machines.</p> </div> <p> </p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="8"><span class="ez-toc-section" id="Is_Teamview_secure-2"></span>Is Teamview secure?<span class="ez-toc-section-end"></span></h2> <p>ENCRYPTION AND AUTHENTICATION TeamViewer traffic is protected by public/private key exchange and AES (256-bit) rsa session encryption. This technology is required in a form comparable to https/SSL and is considered absolutely secure by current standards.</p> </div> <p></p> <div style="box-shadow: rgba(67, 71, 85, 0.27) 0px 0px 0.25em, rgba(90, 125, 188, 0.05) 0px 0.25em 1em;padding:20px 10px 20px 10px;"> <p><h2 id="9"><span class="ez-toc-section" id="Can_someone_hack_my_phone_using_TeamViewer"></span>Can someone hack my phone using TeamViewer?<span class="ez-toc-section-end"></span></h2> <p>Other non-users can access your TeamViewer account using only the login ID, username and password, i.e. H someone who is trying to make your TeamViewer account available must this enter the unique code you receive for your mobile phone. However, two-factor verification is not required for this TeamViewer account holder.</p> </div> <p> </p> </p> <p><a href="https://firewallbeta.com/fr/corrige-comment-corriger-teamview-en-tant-que-logiciel-espion/" class="translate">Teamview Peut Il Etre Utilise Comme Logiciel Espion</a><br /> <a href="https://firewallbeta.com/pt/corrigido-como-corrigir-o-teamview-como-spyware/" class="translate">O Teamview Pode Ser Usado Como Spyware</a><br /> <a href="https://firewallbeta.com/ru/%d0%b8%d1%81%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d0%b5%d0%bd%d0%be-%d0%ba%d0%b0%d0%ba-%d0%b2%d0%be%d1%81%d1%81%d1%82%d0%b0%d0%bd%d0%be%d0%b2%d0%b8%d1%82%d1%8c-teamview-%d0%ba%d0%b0%d0%ba-%d1%88%d0%bf%d0%b8/" class="translate">Mozhno Li Ispolzovat Teamview Kak Shpionskoe Po</a><br /> <a href="https://firewallbeta.com/es/corregido-como-arreglar-teamview-dado-ese-spyware/" class="translate">Se Puede Usar Teamview Como Spyware</a><br /> <a href="https://firewallbeta.com/pl/naprawiono-jak-naprawic-teamview-w-zwiazku-z-tym-oprogramowaniem-szpiegujacym/" class="translate">Czy Teamview Moze Byc Uzywany Jako Oprogramowanie Szpiegujace</a><br /> <a href="https://firewallbeta.com/ko/%ec%88%98%ec%a0%95%eb%90%a8-%ec%8a%a4%ed%8c%8c%ec%9d%b4%ec%9b%a8%ec%96%b4%ec%b2%98%eb%9f%bc-teamview%eb%a5%bc-%ec%88%98%ec%a0%95%ed%95%98%eb%8a%94-%eb%b0%a9%eb%b2%95/" class="translate">Teamview를 스파이웨어로 사용할 수 있습니까</a><br /> <a href="https://firewallbeta.com/sv/fast-hur-man-fixar-teamview-som-spionprogram/" class="translate">Kan Teamview Anvandas Som Spionprogram</a><br /> <a href="https://firewallbeta.com/de/behoben-so-beheben-sie-teamview-wahrend-spyware/" class="translate">Kann Teamview Als Spyware Verwendet Werden</a><br /> <a href="https://firewallbeta.com/it/risolto-come-riparare-teamview-come-spyware/" class="translate">Puo Essere Utilizzato Come Spyware Teamview</a><br /> <a href="https://firewallbeta.com/nl/opgelost-hoe-om-te-gaan-met-teamview-als-spyware/" class="translate">Kan Teamview Worden Gebruikt Als Spyware</a></p> <div class="extra-hatom" style="display: none !important;"><span class="entry-title">Fixed: How To Fix Teamview As Spyware</span></div><div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img src="https://firewallbeta.com/wp-content/uploads/harleyjoseph.jpg" width="100" height="100" alt="Harley Joseph" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://firewallbeta.com/author/harleyjoseph/" class="vcard author" rel="author" itemprop="url"><span class="fn" itemprop="name">Harley Joseph</span></a></div><div class="saboxplugin-desc"><div itemprop="description"></div></div><div class="clearfix"></div></div></div><div class='yarpp yarpp-related yarpp-related-website yarpp-template-thumbnails'> <!-- YARPP Thumbnails --> <h3>Related posts:</h3> <div class="yarpp-thumbnails-horizontal"> <a class='yarpp-thumbnail' rel='norewrite' href='https://firewallbeta.com/en/cg-framework-did-not-exist-cannot-install/' title='Fixed: How To Fix Cg.framework Did Not Exist, Could Not Be Installed'> <img width="150" height="150" src="https://firewallbeta.com/wp-content/uploads/2021/11/cg-framework-did-not-exist-cannot-install-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" loading="lazy" data-pin-nopin="true" srcset="https://firewallbeta.com/wp-content/uploads/2021/11/cg-framework-did-not-exist-cannot-install-150x150.png 150w, https://firewallbeta.com/wp-content/uploads/2021/11/cg-framework-did-not-exist-cannot-install-120x120.png 120w" sizes="(max-width: 150px) 100vw, 150px" /><span class="yarpp-thumbnail-title">Fixed: How To Fix Cg.framework Did Not Exist, Could Not Be Installed</span></a> <a class='yarpp-thumbnail' rel='norewrite' href='https://firewallbeta.com/en/how-to-interpret-a-linux-core-dump-file/' title='Fixed: How To Fix Interpretation Of Linux Kernel Dump File.'> <img width="150" height="150" src="https://firewallbeta.com/wp-content/uploads/2021/11/how-to-interpret-a-linux-core-dump-file-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" loading="lazy" data-pin-nopin="true" srcset="https://firewallbeta.com/wp-content/uploads/2021/11/how-to-interpret-a-linux-core-dump-file-150x150.png 150w, https://firewallbeta.com/wp-content/uploads/2021/11/how-to-interpret-a-linux-core-dump-file-120x120.png 120w" sizes="(max-width: 150px) 100vw, 150px" /><span class="yarpp-thumbnail-title">Fixed: How To Fix Interpretation Of Linux Kernel Dump File.</span></a> <a class='yarpp-thumbnail' rel='norewrite' href='https://firewallbeta.com/en/lzw-print-error/' title='Fixed: How To Fix Lzw Printing Error.'> <img width="150" height="150" src="https://firewallbeta.com/wp-content/uploads/2022/01/lzw-print-error-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" loading="lazy" data-pin-nopin="true" srcset="https://firewallbeta.com/wp-content/uploads/2022/01/lzw-print-error-150x150.jpg 150w, https://firewallbeta.com/wp-content/uploads/2022/01/lzw-print-error-120x120.jpg 120w" sizes="(max-width: 150px) 100vw, 150px" /><span class="yarpp-thumbnail-title">Fixed: How To Fix Lzw Printing Error.</span></a> <a class='yarpp-thumbnail' rel='norewrite' href='https://firewallbeta.com/en/python-windows-installer-script/' title='Fixed: How To Fix Windows Installer Python Script'> <img width="150" height="150" src="https://firewallbeta.com/wp-content/uploads/2022/02/python-windows-installer-script-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" loading="lazy" data-pin-nopin="true" srcset="https://firewallbeta.com/wp-content/uploads/2022/02/python-windows-installer-script-150x150.png 150w, https://firewallbeta.com/wp-content/uploads/2022/02/python-windows-installer-script-120x120.png 120w" sizes="(max-width: 150px) 100vw, 150px" /><span class="yarpp-thumbnail-title">Fixed: How To Fix Windows Installer Python Script</span></a> </div> </div> </div><!-- .entry-content --> </article><!-- #post-53343 --> <nav class="navigation post-navigation" aria-label="Posts"> <h2 class="screen-reader-text">Post navigation</h2> <div class="nav-links"><div class="nav-previous"><a href="https://firewallbeta.com/fr/etapes-pour-resoudre-le-probleme-de-desactivation-du-pare-feu-windows/" rel="prev">Étapes Pour Résoudre Le Problème De Désactivation Du Pare-feu Windows</a></div><div class="nav-next"><a href="https://firewallbeta.com/ru/%d0%bb%d1%83%d1%87%d1%88%d0%b8%d0%b9-%d1%81%d0%bf%d0%be%d1%81%d0%be%d0%b1-%d0%b2%d0%be%d1%81%d1%81%d1%82%d0%b0%d0%bd%d0%be%d0%b2%d0%b8%d1%82%d1%8c-%d0%b0%d0%b2%d1%82%d0%be%d0%bc%d0%b0%d1%82%d0%b8/" rel="next">Лучший способ восстановить автоматически удаленные сообщения в Outlook 2007</a></div></div> </nav> </div><!-- #primary --> <aside id="secondary" class="tg-site-sidebar widget-area "> <section id="search-2" class="widget widget_search"><form role="search" method="get" class="search-form" action="https://firewallbeta.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Search …" value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form></section></aside><!-- #secondary --> </div> <!-- /.site-content from header.php --> </div> <!-- /.tg-container from header.php --> </main> <!-- /#content from header.php --> <footer id="colophon" class="site-footer tg-site-footer "> <div class="tg-site-footer-widgets"> <div class="tg-container"> </div><!-- /.tg-container--> </div><!-- /.tg-site-footer-widgets --> <div class="tg-site-footer-bar tg-site-footer-bar--center"> <div class="tg-container tg-container--flex tg-container--flex-top"> <div class="tg-site-footer-section-1"> Copyright © 2022 <a href="https://firewallbeta.com/" title="Firewall Beta">Firewall Beta</a>. Powered by <a href="https://masteriyo.com/themes/elearning" target="_blank" rel="nofollow">eLearning</a> and <a href="https://wordpress.org/" target="_blank" rel="nofollow">WordPress</a>. </div> <div class="tg-site-footer-section-2"> </div> </div> </div> </footer><!-- #colophon --> </div><!-- #page --> <a href="#" id="tg-scroll-to-top" class="tg-scroll-to-top"> <i class="tg-icon tg-icon-arrow-up"> <span class="screen-reader-text">Scroll to top</span> </i> </a> <div class="tg-overlay-wrapper"></div> <link rel='stylesheet' id='yarppRelatedCss-css' href='https://firewallbeta.com/wp-content/plugins/yet-another-related-posts-plugin/style/related.css?ver=5.27.8' type='text/css' media='all' /> <script type='text/javascript' src='https://firewallbeta.com/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9' id='regenerator-runtime-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0' id='wp-polyfill-js'></script> <script type='text/javascript' id='contact-form-7-js-extra'> /* <![CDATA[ */ var wpcf7 = {"api":{"root":"https:\/\/firewallbeta.com\/wp-json\/","namespace":"contact-form-7\/v1"}}; /* ]]> */ </script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.6.1' id='contact-form-7-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/themes/elearning/assets/js/navigation.min.js?ver=1.0.7' id='elearning-navigation-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/themes/elearning/assets/js/skip-link-focus-fix.min.js?ver=1.0.7' id='elearning-skip-link-focus-fix-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/themes/elearning/assets/js/elearning-custom.min.js?ver=1.0.7' id='elearning-custom-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/plugins/easy-table-of-contents/vendor/smooth-scroll/jquery.smooth-scroll.min.js?ver=2.2.0' id='jquery-smooth-scroll-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/plugins/easy-table-of-contents/vendor/js-cookie/js.cookie.min.js?ver=2.2.1' id='js-cookie-js'></script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/plugins/easy-table-of-contents/vendor/sticky-kit/jquery.sticky-kit.min.js?ver=1.9.2' id='jquery-sticky-kit-js'></script> <script type='text/javascript' id='ez-toc-js-js-extra'> /* <![CDATA[ */ var ezTOC = {"smooth_scroll":"1","visibility_hide_by_default":"","width":"auto","scroll_offset":"30"}; /* ]]> */ </script> <script type='text/javascript' src='https://firewallbeta.com/wp-content/plugins/easy-table-of-contents/assets/js/front.min.js?ver=2.0.31-1659366117' id='ez-toc-js-js'></script> </body> </html>