Is "GPX File Viewer" on Microsoft Edge Add-ons Safe to Install?

Free Software Apps · edge · v3.0.0

View your GPX files quickly from Google Drive or local computer. Open GPX files quickly from Google Drive or your local hard drive.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

232 security findings detected across all analyzers

Severity Breakdown

0
Critical
10
High
159
Medium
0
Low
0
Info

Finding Categories

10
Malware Signatures
1
Network
157
IoC Indicators

YARA Rules Matched

7 rules(10 hits)
postinstall environment access postinstall obfuscation postinstall file manipulation postinstall crypto operations postinstall system command postinstall network communication UsingIntrusivePermissionsWithGeolocation

Detailed Findings

74 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
15
IP Addresses
11
Domains
133
Strings
157

All Indicators · 157

Domain
detected Domain: convertlatlngs.call

XIOC detected Domain: convertlatlngs.call

extracted_from_files

Domain
detected Domain: n.callinithooks.call

XIOC detected Domain: n.callinithooks.call

extracted_from_files

Domain
detected Domain: info.author

XIOC detected Domain: info.author

extracted_from_files

Domain
detected Domain: this.to

XIOC detected Domain: this.to

extracted_from_files

Domain
detected Domain: parser.processor.call

XIOC detected Domain: parser.processor.call

extracted_from_files

Domain
detected Domain: document.documentelement.style

XIOC detected Domain: document.documentelement.style

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

Domain
detected Domain: he.prototype.addlayer.call

XIOC detected Domain: he.prototype.addlayer.call

extracted_from_files

Domain
detected Domain: i.fire

XIOC detected Domain: i.fire

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

Domain
detected Domain: custom-select.is

XIOC detected Domain: custom-select.is

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

URL
detected URL: https://microsoftedge.microsoft.com/addons/detail/

XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/

extracted_from_files

URL
detected URL: https://chrome.google.com/webstore/detail/$

XIOC detected URL: https://chrome.google.com/webstore/detail/$

extracted_from_files

URL
detected URL: https://

XIOC detected URL: https://

extracted_from_files

URL
detected URL: https://github.com/mapbox/togeojson

XIOC detected URL: https://github.com/mapbox/togeojson

extracted_from_files

URL
detected URL: http://leafletjs.com

XIOC detected URL: http://leafletjs.com

extracted_from_files

URL
detected URL: https://github.com/shramov/leaflet-plugins.

XIOC detected URL: https://github.com/shramov/leaflet-plugins.

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Node.normalize

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/API/Node.normalize

extracted_from_files

URL
detected URL: https://map-welcome.freeonlineapps.net/

XIOC detected URL: https://map-welcome.freeonlineapps.net/

extracted_from_files

Domain
detected Domain: map-welcome.freeonlineapps.net

XIOC detected Domain: map-welcome.freeonlineapps.net

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://getbootstrap.com/)

XIOC detected URL: https://getbootstrap.com/)

extracted_from_files

URL
detected URL: https://github.com/twbs/bootstrap/blob/master/LICENSE)

XIOC detected URL: https://github.com/twbs/bootstrap/blob/master/LICENSE)

extracted_from_files

URL
detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=888319

XIOC detected URL: https://bugzilla.mozilla.org/show_bug.cgi?id=888319

extracted_from_files

URL
detected URL: http://localhost:8012/gps-log-viewer-master/kuhkopfsteig-fv.gpx';

XIOC detected URL: http://localhost:8012/gps-log-viewer-master/kuhkopfsteig-fv.gpx';

extracted_from_files

Domain
detected Domain: req.open

XIOC detected Domain: req.open

extracted_from_files

Domain
detected Domain: ll.meta.hr

XIOC detected Domain: ll.meta.hr

extracted_from_files

Domain
detected Domain: b.lat

XIOC detected Domain: b.lat

extracted_from_files

Domain
detected Domain: a.lat

XIOC detected Domain: a.lat

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: properties.name

XIOC detected Domain: properties.name

extracted_from_files

Domain
detected Domain: feature.id

XIOC detected Domain: feature.id

extracted_from_files

Domain
detected Domain: bulix.org

XIOC detected Domain: bulix.org

extracted_from_files

Domain
detected Domain: nav-link.show

XIOC detected Domain: nav-link.show

extracted_from_files

Domain
detected Domain: points.map

XIOC detected Domain: points.map

extracted_from_files

Domain
detected Domain: info.hr

XIOC detected Domain: info.hr

extracted_from_files

Domain
detected Domain: textarea.form-control.is

XIOC detected Domain: textarea.form-control.is

extracted_from_files

Domain
detected Domain: form-control.is

XIOC detected Domain: form-control.is

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: schemas-microsoft.com

XIOC detected Domain: schemas-microsoft.com

extracted_from_files

Domain
detected Domain: e.prototype.initialize.call

XIOC detected Domain: e.prototype.initialize.call

extracted_from_files

Domain
detected Domain: i.target

XIOC detected Domain: i.target

extracted_from_files

Domain
detected Domain: t.crs

XIOC detected Domain: t.crs

extracted_from_files

Domain
detected Domain: t.circle

XIOC detected Domain: t.circle

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: update.call

XIOC detected Domain: update.call

extracted_from_files

Domain
detected Domain: reset.call

XIOC detected Domain: reset.call

extracted_from_files

Domain
detected Domain: drawlast.next

XIOC detected Domain: drawlast.next

extracted_from_files

Domain
detected Domain: i.next

XIOC detected Domain: i.next

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: ctx.save

XIOC detected Domain: ctx.save

extracted_from_files

Domain
detected Domain: e.save

XIOC detected Domain: e.save

extracted_from_files

Domain
detected Domain: e.click

XIOC detected Domain: e.click

extracted_from_files

Domain
detected Domain: t.options.crs

XIOC detected Domain: t.options.crs

extracted_from_files

Domain
detected Domain: map.options.crs

XIOC detected Domain: map.options.crs

extracted_from_files

Domain
detected Domain: ln.prototype.onadd.call

XIOC detected Domain: ln.prototype.onadd.call

extracted_from_files

URL
detected Domain: ln.prototype.gettileurl.call

XIOC detected Domain: ln.prototype.gettileurl.call

extracted_from_files

Domain
detected Domain: n.prototype.getevents.call

XIOC detected Domain: n.prototype.getevents.call

extracted_from_files

Domain
detected Domain: n.prototype.onadd.call

XIOC detected Domain: n.prototype.onadd.call

extracted_from_files

Domain
detected Domain: containspoint.call

XIOC detected Domain: containspoint.call

extracted_from_files

Domain
detected Domain: this.options.style

XIOC detected Domain: this.options.style

extracted_from_files

Domain
detected Domain: sn.prototype.onadd.call

XIOC detected Domain: sn.prototype.onadd.call

extracted_from_files

Domain
detected Domain: source.fire

XIOC detected Domain: source.fire

extracted_from_files

Domain
detected Domain: sn.prototype.onremove.call

XIOC detected Domain: sn.prototype.onremove.call

extracted_from_files

Domain
detected Domain: source.off

XIOC detected Domain: source.off

extracted_from_files

Domain
detected Domain: sn.prototype.getevents.call

XIOC detected Domain: sn.prototype.getevents.call

extracted_from_files

Domain
detected Domain: draggable.off

XIOC detected Domain: draggable.off

extracted_from_files

Domain
detected Domain: marker.fire

XIOC detected Domain: marker.fire

extracted_from_files

Domain
detected Domain: ke.prototype.setstyle.call

XIOC detected Domain: ke.prototype.setstyle.call

extracted_from_files

Domain
detected Domain: latlng.lat

XIOC detected Domain: latlng.lat

extracted_from_files

Domain
detected Domain: e.options.crs

XIOC detected Domain: e.options.crs

extracted_from_files

Domain
detected Domain: info.name

XIOC detected Domain: info.name

extracted_from_files

Domain
detected Domain: setlatlngs.call

XIOC detected Domain: setlatlngs.call

extracted_from_files

Domain
detected Domain: li.earth

XIOC detected Domain: li.earth

extracted_from_files

Domain
detected Domain: i.off

XIOC detected Domain: i.off

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

Domain
detected Domain: t.fire

XIOC detected Domain: t.fire

extracted_from_files

IP
detected IP: ed::

XIOC detected IP: ed::

extracted_from_files

Domain
detected Domain: info.duration.total

XIOC detected Domain: info.duration.total

extracted_from_files

URL
detected Domain: geticonurl.call

XIOC detected Domain: geticonurl.call

extracted_from_files

Domain
detected Domain: map.off

XIOC detected Domain: map.off

extracted_from_files

Domain
detected Domain: layer.off

XIOC detected Domain: layer.off

extracted_from_files

Domain
detected Domain: t.off

XIOC detected Domain: t.off

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: map.fire

XIOC detected Domain: map.fire

extracted_from_files

Domain
detected Domain: i.lat-t.lat

XIOC detected Domain: i.lat-t.lat

extracted_from_files

Domain
detected Domain: pananim.run

XIOC detected Domain: pananim.run

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: t.watch

XIOC detected Domain: t.watch

extracted_from_files

Domain
detected Domain: this.options.crs

XIOC detected Domain: this.options.crs

extracted_from_files

Domain
detected Domain: proxy.style

XIOC detected Domain: proxy.style

extracted_from_files

Domain
detected Domain: t.center

XIOC detected Domain: t.center

extracted_from_files

Domain
detected Domain: xe.prototype.addto.call

XIOC detected Domain: xe.prototype.addto.call

extracted_from_files

Domain
detected Domain: southwest.lat

XIOC detected Domain: southwest.lat

extracted_from_files

Domain
detected Domain: northeast.lat

XIOC detected Domain: northeast.lat

extracted_from_files

Domain
detected Domain: this.lat-t.lat

XIOC detected Domain: this.lat-t.lat

extracted_from_files

Domain
detected Domain: s.lat

XIOC detected Domain: s.lat

extracted_from_files

Domain
detected Domain: r.lat

XIOC detected Domain: r.lat

extracted_from_files

Domain
detected Domain: i.center

XIOC detected Domain: i.center

extracted_from_files

Domain
detected Domain: e.center

XIOC detected Domain: e.center

extracted_from_files

Domain
detected Domain: hi.off

XIOC detected Domain: hi.off

extracted_from_files

Domain
detected Domain: hi.fire

XIOC detected Domain: hi.fire

extracted_from_files

Domain
detected Domain: n.lat

XIOC detected Domain: n.lat

extracted_from_files

Domain
detected Domain: i.lat

XIOC detected Domain: i.lat

extracted_from_files

Domain
detected Domain: o.lat

XIOC detected Domain: o.lat

extracted_from_files

Domain
detected Domain: e.lat

XIOC detected Domain: e.lat

extracted_from_files

Domain
detected Domain: i.lat-e.lat

XIOC detected Domain: i.lat-e.lat

extracted_from_files

Domain
detected Domain: t.style.top

XIOC detected Domain: t.style.top

extracted_from_files

Domain
detected Domain: dropdown-menu.show

XIOC detected Domain: dropdown-menu.show

extracted_from_files

Domain
detected Domain: nav-item.show

XIOC detected Domain: nav-item.show

extracted_from_files

Domain
detected Domain: he.prototype.removelayer.call

XIOC detected Domain: he.prototype.removelayer.call

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: h.fn.call

XIOC detected Domain: h.fn.call

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: l.mixin.events

XIOC detected Domain: l.mixin.events

extracted_from_files

Domain
detected Domain: this.lat

XIOC detected Domain: this.lat

extracted_from_files

Domain
detected Domain: t.lat

XIOC detected Domain: t.lat

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: getbootstrap.com

XIOC detected Domain: getbootstrap.com

extracted_from_files

IP
detected IP: 1::bef

XIOC detected IP: 1::bef

extracted_from_files

IP
detected IP: 4::bef

XIOC detected IP: 4::bef

extracted_from_files

Domain
detected Domain: fileinput.click

XIOC detected Domain: fileinput.click

extracted_from_files

Domain
detected Domain: leafletjs.com

XIOC detected Domain: leafletjs.com

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: si.call

XIOC detected Domain: si.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: ri.call

XIOC detected Domain: ri.call

extracted_from_files

Domain
detected Domain: bugzilla.mozilla.org

XIOC detected Domain: bugzilla.mozilla.org

extracted_from_files

Domain
detected Domain: joomla.org

XIOC detected Domain: joomla.org

extracted_from_files

Domain
detected Domain: normalize.min.css.map

XIOC detected Domain: normalize.min.css.map

extracted_from_files

Domain
detected Domain: tile.openstreetmap.org

XIOC detected Domain: tile.openstreetmap.org

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: file.name

XIOC detected Domain: file.name

extracted_from_files

Domain
detected Domain: this.fire

XIOC detected Domain: this.fire

extracted_from_files

Domain
detected Domain: toast.show

XIOC detected Domain: toast.show

extracted_from_files

Domain
detected Domain: modal.show

XIOC detected Domain: modal.show

extracted_from_files

Domain
detected Domain: modal-backdrop.show

XIOC detected Domain: modal-backdrop.show

extracted_from_files

IP
detected Domain: tooltip.show

XIOC detected Domain: tooltip.show

extracted_from_files

Domain
detected Domain: a.bg

XIOC detected Domain: a.bg

extracted_from_files

Domain
detected Domain: button.bg

XIOC detected Domain: button.bg

extracted_from_files

Domain
detected Domain: bootstrap.min.css.map

XIOC detected Domain: bootstrap.min.css.map

extracted_from_files

Domain
detected Domain: form-control-file.is

XIOC detected Domain: form-control-file.is

extracted_from_files

Domain
detected Domain: form-check-input.is

XIOC detected Domain: form-check-input.is

extracted_from_files

Domain
detected Domain: custom-control-input.is

XIOC detected Domain: custom-control-input.is

extracted_from_files

Domain
detected Domain: custom-file-input.is

XIOC detected Domain: custom-file-input.is

extracted_from_files

Domain
detected Domain: t.properties

XIOC detected Domain: t.properties

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

IP
detected IP: 9::bef

XIOC detected IP: 9::bef

extracted_from_files

Security Analysis Summary

Security Analysis Overview

GPX File Viewer is a edge extension published by Free Software Apps. Version 3.0.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 232 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 10 finding(s)
  • Medium: 159 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

GPX File Viewer is published by Free Software Apps on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions