IOC Report
SecuriteInfo.com.Trojan.DownLoader28.22066.19106.30146.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.DownLoader28.22066.19106.30146.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Uninstall the ModSource UI Addon Pack.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Updater\ModSource UI Addon Pack Auto Updater Silent.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Updater\ModSource UI Addon Pack Auto Updater.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\ModSource UI Addon Pack\ModSource UI Addon Pack.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsb13F9.tmp\NSISdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsk44DC.tmp\NSISdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsk44DC.tmp\StartMenu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\StarWarsGalaxies\ModSource UI Addon Pack Uninstall.log
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\Changelog_PreNGE_UI.txt
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\Readme ModSource UI Addon Pack.html
HTML document, ASCII text, with very long lines (542), with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\Readme_Anachs_PreNGE_UI.txt
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\readme_BattleBackground.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\reticle_readme.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Icons\Readme.ico
MS Windows icon resource - 4 icons, 32x32, 32 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Icons\Uninstall.ico
MS Windows icon resource - 4 icons, 32x32, 32 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Icons\Update.ico
MS Windows icon resource - 4 icons, 32x32, 32 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Icons\Web.ico
MS Windows icon resource - 4 icons, 32x32, 32 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Program Files\StarWarsGalaxies\Sample\item_close_metal_can_cntner.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\item_fusioncutter_end.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\item_open_metal_can_cntner.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_button_arrow_back.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_button_arrow_forward.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_button_confirm.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_dialog_warning.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_incoming_mail.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_increment_big.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_menu_close.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_negative.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_rollover.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_select_info.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_select_popup.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_select_rotate.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_toggle_mouse_mode.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Sample\ui_use_toolbar.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Program Files\StarWarsGalaxies\Texture\heavyweapons_reticule.dds
Microsoft DirectDraw Surface (DDS): 256 x 256, 256-bit color, compressed using DXT3
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_background_arrow.dds
Microsoft DirectDraw Surface (DDS): 1024 x 1024, compressed using DXT3
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_activate.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_attack.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_big.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_crafting.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_deactivate.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_death_blow.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_default.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_drag_bad.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_drag_scroll.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_drop.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_eat.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_equip.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_hourglass.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_intended_attack.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_mission_details.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_move.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_open.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_pickup.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_resize_hor.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_resize_se.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_resize_sw.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_resize_vert.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_stop_talk.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_talk.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_throw.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_trade_accepted.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_trade_start.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_unequip.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_cursor_use.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Texture\ui_target_inactive.dds
Microsoft DirectDraw Surface (DDS): 32 x 32, 32-bit color, ARGB8888
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_all_targets.inc
ASCII text, with CRLF, LF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_buttonbar_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_chat_window_skinned.inc
ASCII text, with very long lines (908), with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_mfd_status_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_pet.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_radar_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_secondary_targets_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_sml_group_window.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_targets_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_ground_hud_toolbar_skinned.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_hud_space.inc
ASCII text
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_hud_space_buttonbar.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_hud_space_toolbar.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_palette_ground.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_palette_space.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_pda_collections.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_pda_exp_mon_skinned.inc
ASCII text
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_pda_location_display.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_pda_net_status.inc
ASCII text, with CRLF line terminators
dropped
C:\Program Files\StarWarsGalaxies\Ui\ui_styles.inc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ModSource UI Addon Pack.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\ModSource_UI_Addon_Pack.ver
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsa449D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsb13F8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsb13F9.tmp\ZipDLL.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk44DC.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk44DC.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\nsk44DC.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ModSource UI Addon Pack\Mod-Source - Your Source for SWG Modding Stuff.lnk
MS Windows shortcut, Item id list present, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ModSource UI Addon Pack\ModSource UI Addon Pack Updater.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Sat Aug 15 16:43:06 2009, mtime=Tue Feb 7 17:59:46 2023, atime=Sat Aug 15 16:43:06 2009, length=116184, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ModSource UI Addon Pack\Pre-NGE UI Changelog.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ModSource UI Addon Pack\Readme ModSource UI Addon Pack.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Sat Aug 15 16:19:08 2009, mtime=Tue Feb 7 17:59:46 2023, atime=Sat Aug 15 16:19:08 2009, length=24877, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ModSource UI Addon Pack\Uninstall the ModSource UI Addon Pack.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModSource UI Addon Pack Silent Updater.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Sat Aug 15 16:43:04 2009, mtime=Tue Feb 7 17:59:44 2023, atime=Sat Aug 15 16:43:04 2009, length=116158, window=hide
dropped
There are 92 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader28.22066.19106.30146.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader28.22066.19106.30146.exe
malicious
C:\Users\user\AppData\Local\Temp\ModSource UI Addon Pack\ModSource UI Addon Pack.exe
C:\Users\user\AppData\Local\Temp\ModSource UI Addon Pack\ModSource UI Addon Pack.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Program Files\StarWarsGalaxies\Mods\ModSource UI Addon Pack\Documentation\Readme ModSource UI Addon Pack.html
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1800,i,4957897538365028636,534134650291675046,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
http://modsource.org
unknown
http://modsource.org/Files/SWG/Mods/ModSource_UI_Addon_Pack.ver/TIMEOUT=30000downloadhttp://users.on
unknown
file:///C:/Program%20Files/StarWarsGalaxies/Mods/ModSource%20UI%20Addon%20Pack/Documentation/Readme%20ModSource%20UI%20Addon%20Pack.html
http://www.modsource.org/DC:
unknown
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
216.58.209.45
http://users.on.net/~anach/Files/SWG/ModSource_UI_Addon_Pack.ver
203.16.214.120
http://users.on.net/~anach/Files/SWG/ModSource_UI_Addon_Pack.zip
203.16.214.120
http://tassyp2p.optikal.net/viewtopic.php?f=45&t=837
unknown
http://modsource.org/Files/SWG/Mods/ModSource_UI_Addon_Pack.ver
162.55.0.134
http://modsource.org/Files/SWG/Mods/ModSource_UI_Addon_Pack.zip
162.55.0.134
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.modsource.orgw8
unknown
http://modsource.org/Files/SWG/Mods/ModSource_UI_Addon_Pack.ver/TIMEOUT=30000download
unknown
https://www.bplaced.net/apple-touch-icon.png
unknown
http://www.modsource.org/
unknown
http://unguilded.traumschmiede.com/Files/Mods/ModSource_UI_Addon_Pack.ver
unknown
http://unguilded.traumschmiede.com/Files/Mods/ModSource_UI_Addon_Pack.zip
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://users.on.net/~anach/Files/SWG/ModSource_UI_Addon_Pack.verhttp://unguilded.traumschmiede.com/F
unknown
https://www.bplaced.net/favicon-16x16.png
unknown
http://www.modsource.org
unknown
http://www.modsource.orgopen
unknown
https://www.bplaced.net/safari-pinned-tab.svg
unknown
https://www.bplaced.net/impressum
unknown
https://www.bplaced.net/gfx/emblem_b_xs.png
unknown
https://www.bplaced.net/datenschutz
unknown
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
142.250.180.174
https://www.bplaced.net/contact
unknown
https://www.bplaced.net/privacy
unknown
https://www.bplaced.net/favicon-32x32.png
unknown
https://www.bplaced.net/favicon.ico
unknown
http://modsource.org/Files/SWG/Mods/ModSource_UI_Addon_Pack.ziphttp://users.on.net/~anach/Files/SWG/
unknown
https://www.bplaced.net/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
users.on.net
203.16.214.120
accounts.google.com
216.58.209.45
modsource.org
162.55.0.134
www.google.com
142.250.180.132
clients.l.google.com
142.250.180.174
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
162.55.0.134
modsource.org
United States
239.255.255.250
unknown
Reserved
203.16.214.120
users.on.net
Australia
216.58.209.45
accounts.google.com
United States
142.250.180.174
clients.l.google.com
United States
127.0.0.1
unknown
unknown
142.250.180.132
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ModSource\ModSource UI Addon Pack
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ModSource\ModSource UI Addon Pack
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
StartMenuFolder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ModSource UI Addon Pack
InstallPath
HKEY_CURRENT_USER\Software\Modsource\ModSource UI Addon Pack
Start Menu Folder
HKEY_CURRENT_USER\Software\Modsource\ModSource UI Addon Pack
Language
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blocklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_USERSS-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry
TraceTimeLast
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
There are 49 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23990760000
heap
page read and write
1457E060000
trusted library allocation
page read and write
1457D518000
heap
page read and write
27C53807000
heap
page read and write
6F0000
heap
page read and write
36BD87F000
stack
page read and write
36BD47E000
stack
page read and write
6BB000
heap
page read and write
7BE000
stack
page read and write
6A6000
heap
page read and write
1457D402000
heap
page read and write
4ABF000
stack
page read and write
1457E2D0000
trusted library allocation
page read and write
1457E200000
trusted library allocation
page read and write
1457E496000
heap
page read and write
21A0000
heap
page read and write
1457D518000
heap
page read and write
36BD177000
stack
page read and write
6B0000
heap
page read and write
1457D559000
heap
page read and write
22C0000
heap
page read and write
239905B8000
heap
page read and write
27C537D5000
heap
page read and write
239912C0000
trusted library allocation
page read and write
433000
unkown
page read and write
4C5D000
stack
page read and write
6C5000
heap
page read and write
1457CC56000
heap
page read and write
6C2000
heap
page read and write
409000
unkown
page write copy
1457E457000
heap
page read and write
426000
unkown
page read and write
340E000
stack
page read and write
3296000
heap
page read and write
23990580000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
22E0000
heap
page read and write
6E7000
heap
page read and write
6F5000
heap
page read and write
6EB000
heap
page read and write
3270000
trusted library allocation
page read and write
ACDA4F9000
stack
page read and write
75B000
heap
page read and write
723000
heap
page read and write
409000
unkown
page write copy
68A000
heap
page read and write
26DC000
heap
page read and write
249E000
stack
page read and write
1457CC79000
heap
page read and write
3428000
heap
page read and write
421000
unkown
page read and write
14500000000
trusted library allocation
page read and write
1457CD13000
heap
page read and write
6F1000
heap
page read and write
1457CD25000
heap
page read and write
6F8000
heap
page read and write
1457E496000
heap
page read and write
1457E360000
trusted library allocation
page read and write
1457E224000
trusted library allocation
page read and write
36BD9FF000
stack
page read and write
36BCDFF000
stack
page read and write
1457D513000
heap
page read and write
ACDA479000
stack
page read and write
1457D518000
heap
page read and write
1457D559000
heap
page read and write
8EF000
stack
page read and write
364F000
stack
page read and write
6A3000
heap
page read and write
1457DA00000
trusted library allocation
page read and write
97000
stack
page read and write
269F000
stack
page read and write
6E7000
heap
page read and write
ACDA67F000
stack
page read and write
1457E464000
heap
page read and write
36BD97F000
stack
page read and write
1457E201000
trusted library allocation
page read and write
1457E20B000
trusted library allocation
page read and write
1457CC76000
heap
page read and write
23990740000
heap
page read and write
1457DCE0000
trusted library section
page readonly
301E000
stack
page read and write
1457E42D000
heap
page read and write
1457E0A3000
trusted library allocation
page read and write
1457DD10000
trusted library section
page readonly
27C537E0000
heap
page read and write
1457D518000
heap
page read and write
6F0000
heap
page read and write
1457E320000
trusted library allocation
page read and write
1457E0F0000
trusted library allocation
page read and write
1457CCFD000
heap
page read and write
1457D400000
heap
page read and write
1457E415000
heap
page read and write
401000
unkown
page execute read
6BA000
heap
page read and write
1457E230000
trusted library allocation
page read and write
1457E240000
trusted library allocation
page read and write
ACDA0DB000
stack
page read and write
36BD37B000
stack
page read and write
1457E476000
heap
page read and write
1457D518000
heap
page read and write
1457D415000
heap
page read and write
1457E49A000
heap
page read and write
36BD6FE000
stack
page read and write
1457CBF0000
trusted library allocation
page read and write
27C53750000
heap
page read and write
407000
unkown
page readonly
407000
unkown
page readonly
36BD67E000
stack
page read and write
19A000
stack
page read and write
27C5380B000
heap
page read and write
1457E220000
trusted library allocation
page read and write
1457E20E000
trusted library allocation
page read and write
6EB000
heap
page read and write
239907B5000
heap
page read and write
36BCD7B000
stack
page read and write
1457E208000
trusted library allocation
page read and write
1457E460000
heap
page read and write
22F0000
heap
page read and write
19A000
stack
page read and write
33FF000
stack
page read and write
239907B0000
heap
page read and write
1457E206000
trusted library allocation
page read and write
27C537D0000
heap
page read and write
1457CC58000
heap
page read and write
1457DD00000
trusted library section
page readonly
23991340000
trusted library allocation
page read and write
9B000
stack
page read and write
1457E080000
trusted library allocation
page read and write
1457CCAF000
heap
page read and write
1457E40F000
heap
page read and write
3421000
heap
page read and write
429000
unkown
page read and write
1457E469000
heap
page read and write
746000
heap
page read and write
1457D502000
heap
page read and write
6ED000
heap
page read and write
1457E360000
remote allocation
page read and write
1457E227000
trusted library allocation
page read and write
4C60000
heap
page read and write
239905C0000
heap
page read and write
40D000
unkown
page read and write
1457E350000
trusted library allocation
page read and write
421000
unkown
page read and write
680000
heap
page read and write
450000
heap
page read and write
28F0000
heap
page read and write
28EF000
stack
page read and write
1457E340000
trusted library allocation
page read and write
6F8000
heap
page read and write
6ED000
heap
page read and write
2316000
heap
page read and write
1457CA00000
heap
page read and write
75F000
heap
page read and write
1457E46F000
heap
page read and write
36BD27A000
stack
page read and write
6E1000
heap
page read and write
31E0000
heap
page read and write
735000
heap
page read and write
22C4000
heap
page read and write
1457E0E0000
trusted library allocation
page read and write
2310000
heap
page read and write
1457E20C000
trusted library allocation
page read and write
1457C9F0000
heap
page read and write
1457CBD1000
trusted library allocation
page read and write
32FF000
stack
page read and write
1457E49A000
heap
page read and write
1457E49A000
heap
page read and write
36BDA7F000
stack
page read and write
6AF000
stack
page read and write
57E000
stack
page read and write
1457E221000
trusted library allocation
page read and write
400000
unkown
page readonly
73C000
heap
page read and write
401000
unkown
page execute read
67F000
stack
page read and write
1457E207000
trusted library allocation
page read and write
BCBD17E000
stack
page read and write
36BDC7E000
stack
page read and write
9FF000
stack
page read and write
23991330000
trusted library allocation
page read and write
239907B9000
heap
page read and write
1457E070000
trusted library allocation
page read and write
1457CB60000
trusted library allocation
page read and write
6F5000
heap
page read and write
4D0000
heap
page read and write
1457DCD0000
trusted library section
page readonly
ACDA57E000
stack
page read and write
3439000
heap
page read and write
1457CC00000
heap
page read and write
1457E494000
heap
page read and write
1457D500000
heap
page read and write
8BF000
stack
page read and write
429000
unkown
page read and write
1457E360000
remote allocation
page read and write
36BD5FF000
stack
page read and write
311F000
stack
page read and write
1457E49F000
heap
page read and write
407000
unkown
page readonly
1457CA60000
heap
page read and write
1457DCC0000
trusted library section
page readonly
2BD2000
heap
page read and write
6F2000
heap
page read and write
6EB000
heap
page read and write
1457CC93000
heap
page read and write
239912D0000
trusted library allocation
page read and write
6EE000
heap
page read and write
23990578000
heap
page read and write
3120000
heap
page read and write
27C55200000
heap
page read and write
1457E0A0000
trusted library allocation
page read and write
407000
unkown
page readonly
3410000
heap
page read and write
4C0000
heap
page read and write
1457E310000
trusted library allocation
page read and write
4C6000
heap
page read and write
1457E48D000
heap
page read and write
6F0000
heap
page read and write
1457DBE0000
trusted library allocation
page read and write
6EC000
heap
page read and write
2319000
heap
page read and write
3410000
heap
page read and write
1457CC71000
heap
page read and write
1457CC40000
heap
page read and write
36BD7FA000
stack
page read and write
30000
heap
page read and write
BCBD0FF000
stack
page read and write
21F0000
heap
page read and write
24A0000
heap
page read and write
71D000
heap
page read and write
ACDA5F9000
stack
page read and write
239915B0000
trusted library allocation
page read and write
239907C0000
trusted library allocation
page read and write
1457E49F000
heap
page read and write
368E000
stack
page read and write
409000
unkown
page read and write
1457CC13000
heap
page read and write
BCBD07B000
stack
page read and write
1457E350000
trusted library allocation
page read and write
1457CCB5000
heap
page read and write
241F000
stack
page read and write
31E4000
heap
page read and write
21DF000
stack
page read and write
354E000
stack
page read and write
6BB000
heap
page read and write
27C539D0000
heap
page read and write
6FB000
heap
page read and write
22D0000
heap
page read and write
1457CBF3000
trusted library allocation
page read and write
245E000
stack
page read and write
409000
unkown
page read and write
1457E230000
trusted library allocation
page read and write
239915A0000
trusted library allocation
page read and write
1457D559000
heap
page read and write
3411000
heap
page read and write
291A000
heap
page read and write
1457E360000
remote allocation
page read and write
4C30000
trusted library allocation
page read and write
30000
heap
page read and write
1457E660000
trusted library allocation
page read and write
1457CC7B000
heap
page read and write
1457E330000
trusted library allocation
page read and write
31E6000
heap
page read and write
1457E494000
heap
page read and write
23991580000
trusted library allocation
page read and write
31E9000
heap
page read and write
4EC0000
trusted library allocation
page read and write
23991600000
trusted library allocation
page read and write
42F000
unkown
page readonly
1457D559000
heap
page read and write
350F000
stack
page read and write
259E000
stack
page read and write
21FE000
stack
page read and write
1457CB70000
trusted library section
page read and write
1457D701000
trusted library allocation
page read and write
4CA000
heap
page read and write
1457E244000
trusted library allocation
page read and write
1457E44B000
heap
page read and write
20DE000
stack
page read and write
745000
heap
page read and write
36BDB7A000
stack
page read and write
1457E200000
trusted library allocation
page read and write
49E000
stack
page read and write
42F000
unkown
page readonly
401000
unkown
page execute read
21F4000
heap
page read and write
239905C0000
heap
page read and write
6F0000
heap
page read and write
6F5000
heap
page read and write
1457CC8C000
heap
page read and write
1457CCA2000
heap
page read and write
26C4000
heap
page read and write
1457E205000
trusted library allocation
page read and write
1457E469000
heap
page read and write
239904F0000
heap
page read and write
1457CC29000
heap
page read and write
239905C0000
heap
page read and write
43D000
unkown
page readonly
706000
heap
page read and write
1457E200000
trusted library allocation
page read and write
1457D559000
heap
page read and write
535000
heap
page read and write
27C53800000
heap
page read and write
1457D518000
heap
page read and write
223E000
stack
page read and write
1457D559000
heap
page read and write
7EE000
stack
page read and write
6C5000
heap
page read and write
500000
heap
page read and write
375E000
stack
page read and write
400000
unkown
page readonly
23990500000
trusted library allocation
page read and write
400000
unkown
page readonly
8FE000
stack
page read and write
6EB000
heap
page read and write
1457DCF0000
trusted library section
page readonly
23990570000
heap
page read and write
43D000
unkown
page readonly
2FD0000
heap
page read and write
36BD57B000
stack
page read and write
3290000
heap
page read and write
1457E420000
heap
page read and write
1457E400000
heap
page read and write
6ED000
heap
page read and write
239905D8000
heap
page read and write
1457CD02000
heap
page read and write
6C5000
heap
page read and write
530000
heap
page read and write
792000
heap
page read and write
2C65000
heap
page read and write
1457E43E000
heap
page read and write
23991590000
heap
page readonly
There are 322 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Program%20Files/StarWarsGalaxies/Mods/ModSource%20UI%20Addon%20Pack/Documentation/Readme%20ModSource%20UI%20Addon%20Pack.html