unofficial tiaras moonshine mod sanctuary-v228-online.exe

UO Tiaras Moonshine Mod

ShaggyZE/Draconis

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from hoggshobbies.com.
Publisher:
ShaggyZE/Draconis

Product:
UO Tiaras Moonshine Mod

Description:
UO Tiaras Moonshine Mod 228.0.0.0

Version:
228.0.0.0

MD5:
f5f65d456262f380626b08573e70e165

SHA-1:
f3c5df9ee36bd11263af9c28abf4003b27b21541

SHA-256:
4ff35eb07e1a6dbfce5761a459b2cf74ce0528efce73a2c0290ec3733bc89c71

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 10:01:49 AM UTC  (today)

File size:
9.2 MB (9,619,535 bytes)

Product version:
228.0.0.0

Copyright:
© ShaggyZE/Draconis

Trademarks:
UO Tiaras Moonshine Mod by ShaggyZE/Draconis

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\unofficial tiaras moonshine mod sanctuary-v228-online.exe

File PE Metadata
Compilation timestamp:
12/5/2009 4:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:iuNYTmS/YS9LGbr3Ybd7l0s216wMEx8JFggZ2ot8pN1xsm:iuvSAFob12HGCot8f

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9998

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file unofficial tiaras moonshine mod sanctuary-v228-online.exe has been seen being distributed by the following URL.