Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 19:53

General

  • Target

    Stremio+4.4.168.exe

  • Size

    112.9MB

  • MD5

    763b10b7a9293ccc9307b650a01db702

  • SHA1

    b033764307a4df6cc81c654467630f2df67297ef

  • SHA256

    44ecc6a7624b2fdf03cb9b419f111892515fb036fe23f88e51456dce69066046

  • SHA512

    f6f8d0a78cfaa2c440567fc0e636ab6129c495991f679c93ae0b7e211d9e290e7d4628891fef35f0383662bc2237e21410dd849f1d6074a8994dfd8deeee5e0c

  • SSDEEP

    3145728:XddpqKUfzM8/I/6Uj2jDxXz8sGd1TiDlSugSbc+cYOsNCO1JTN:tdoK18wiucDZxG7TOlS/SI+JNCO19N

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Modifies system certificate store 2 TTPs 17 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stremio+4.4.168.exe
    "C:\Users\Admin\AppData\Local\Temp\Stremio+4.4.168.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio.exe
      "C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 1100
          4⤵
          • Program crash
          PID:3232
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe
        "C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe" --type=renderer --autoplay-policy=no-user-gesture-required --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=2 --mojo-platform-channel-handle=3108 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:688
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe
        "C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=Stremio --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=3152 /prefetch:8
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4504
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 1152
          4⤵
          • Program crash
          PID:2124
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3604
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1156
          4⤵
          • Program crash
          PID:3232
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4416
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:2896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1096
          4⤵
          • Program crash
          PID:4920
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5032
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:4320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1084
          4⤵
          • Program crash
          PID:988
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2124
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1108
          4⤵
          • Program crash
          PID:3692
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:232
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 1096
          4⤵
          • Program crash
          PID:2320
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4196
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:4056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1160
          4⤵
          • Program crash
          PID:2396
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4888
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1092
          4⤵
          • Program crash
          PID:1372
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1640
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:1208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 1156
          4⤵
          • Program crash
          PID:4544
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3236
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 1152
          4⤵
          • Program crash
          PID:3300
      • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe
        C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:388
        • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe
          C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv
          4⤵
          • Executes dropped EXE
          PID:3460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 1088
          4⤵
          • Program crash
          PID:5080
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3216 -ip 3216
    1⤵
      PID:4480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2948 -ip 2948
      1⤵
        PID:1508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3604 -ip 3604
        1⤵
          PID:2480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4416 -ip 4416
          1⤵
            PID:3516
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5032 -ip 5032
            1⤵
              PID:4884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2124 -ip 2124
              1⤵
                PID:636
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 232 -ip 232
                1⤵
                  PID:3748
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4196 -ip 4196
                  1⤵
                    PID:4596
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4888 -ip 4888
                    1⤵
                      PID:1404
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 1640 -ip 1640
                      1⤵
                        PID:3664
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3236 -ip 3236
                        1⤵
                          PID:2476
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 388 -ip 388
                          1⤵
                            PID:4296

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe

                            Filesize

                            49.1MB

                            MD5

                            58a451f04d8da2f547edf753fbe03fdf

                            SHA1

                            dfe60e0de8f4f892fdd5719d7b9657ad232f7414

                            SHA256

                            2a9d34c190c8c639c2817a371cd8ab6e5d8c8f5d0c45b8c72fbb1d9d4c1e9227

                            SHA512

                            0580068222d415ac6cb1f48a236ce425a57cf860cd802bfd31e76a296d269b8d4b9dd174d5d88552616ed7c99c1e758b23c4f69fa5f23c522f1f312f1a8d3ca6

                          • C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio.exe

                            Filesize

                            300KB

                            MD5

                            c0fbaeea5372c54a2f39716fcbc6afec

                            SHA1

                            e54790d82d0abdc75607fa0384bb886fc9b8027b

                            SHA256

                            cc7b6317d48368cb5791a1e95de5306b6152777b09758d14666d82f4b315dabd

                            SHA512

                            002aa47f5223eb113d3b2bfe1c88eb0ba588b1fc79465340b06c69dde1b897fef73c1f2540712ff22a658a6fe7b8bca4d2b6d4ec9c3d643838ff70275ebd8816

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\2a5e0455-ef51-4171-a545-521a9097c96f.tmp

                            Filesize

                            483B

                            MD5

                            967a3198e51d2f6e885e5586967e1572

                            SHA1

                            6f586cef15726fa9fc72ecd80c52fdabed6c084e

                            SHA256

                            b1a0fb9dd4448e3235583e8656b784832f814805176f5d1b32c4d541d0af623a

                            SHA512

                            97692787843a6d9986cf9b7686776b1d352f8032e662b070406b29ebcc0fc6745baf39f31aababe58e3854261588cc1d65a0780c60fdcefda3ec2d7622957364

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\4211ce1a-e332-4dc3-a934-01069f535133.tmp

                            Filesize

                            4KB

                            MD5

                            cb0168d653da5f4e054340e7d77d5841

                            SHA1

                            e3b1a670d5b305787f2bf6084235867825fdf94c

                            SHA256

                            891cfadb4d5e39e626111965c1b24f22e4ae4a183b4e410cc79d47305283d489

                            SHA512

                            04b352def519f28fd7fc56ba3d7921ad51677b4bc4a821ae201a133ae089fdeef6e73c94340f363f7c52854778c0a1bf310f44c0ed4bf9f185d407b7b5835a11

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\9eff5b17-1b3a-4d89-859a-e1ff49287c3a.tmp

                            Filesize

                            625B

                            MD5

                            28dbbbb60cafa9ba093ae501f057c7a1

                            SHA1

                            ad1e73421d60cf5832e5c1af4e01f60e5d690f5e

                            SHA256

                            28be9d988334ee9a67bc9ef1a98f447e338a37fed376fdfd30364b119fb68580

                            SHA512

                            306f6e7524607b99d7b019a75f6285fc800fef66bea1161bd69e77bf3f9f4f5609369141a2418e973cca82703433d738db57727fa995d33fa2fe3a334f72df5d

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Local Storage\leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Network Persistent State~RFe591dfe.TMP

                            Filesize

                            59B

                            MD5

                            2800881c775077e1c4b6e06bf4676de4

                            SHA1

                            2873631068c8b3b9495638c865915be822442c8b

                            SHA256

                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                            SHA512

                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\eef8250f-a2ea-4abf-bb66-ed64f257f1c3\index-dir\temp-index

                            Filesize

                            2KB

                            MD5

                            44e4388f58c45cd03628673f49b65d5c

                            SHA1

                            be4b739f7bcd09f34a03c423dc90e4e4777df1e3

                            SHA256

                            91ca5a00952bd92ee14b58280bf129d7baedd0fae1127b85b6760845f733838b

                            SHA512

                            44c9be0c0ecc0df6fa1ef99e05f6d54c4b6d8338c3436c2853f4de3c01664c071e81a0696af08c940e09379a61895dbcb55955a44e273f0669a67465e2b264eb

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\eef8250f-a2ea-4abf-bb66-ed64f257f1c3\index-dir\temp-index

                            Filesize

                            72B

                            MD5

                            e0fb84848f764b6da93e4548c31ccf2c

                            SHA1

                            2fd1f457bb7bcf138308592cbf778c5a8e8bd839

                            SHA256

                            6be57282ab1140e2ad1e44b0968a184cc2b11f7416d74444f6c9804d794a84b5

                            SHA512

                            504731c6fc91842e8d82450c4153bb6ba8d783e7add9dfd97c654905f86be18ac0859840eb29b36fcec3a84bee3c32e7fdaba4d9af3c5d5bf016f0498c4e1c01

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\eef8250f-a2ea-4abf-bb66-ed64f257f1c3\index-dir\the-real-index~RFe585d7d.TMP

                            Filesize

                            48B

                            MD5

                            d898180cf64519f21d237fdb7289de24

                            SHA1

                            d88d5d03c97552e2302fbcdc011bee808a089317

                            SHA256

                            04af46590b01cbe48b448aff72b3d2778debc33935a0ccae1a900477d3ac16cb

                            SHA512

                            563ddb0552f91865253e9884da1586aad94a92fdd5f669fac6931aaffee8296111403eb38cfdd22a59ac541e34f79f8b8bf6a3d4ac5cbd65417dd5d2a1cad78a

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\index.txt

                            Filesize

                            106B

                            MD5

                            3394fed6954653ac7e5612eb6988970f

                            SHA1

                            6f551a193aca23b7373ff85667b9b2f456407719

                            SHA256

                            7de09cfd2bcfc2c1a4c09ed4a5f9ac2b7fe8eae8fe162face6bd3da74827e6c8

                            SHA512

                            d72f8820f6a4e9e520a57c19475fde15059f6410b2a2494e51fd2ff519349dd7da78b9e8240aa0700d1b39ff6439f15f8e791d6269ee4cfeda98ae6a969c3185

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\index.txt.tmp

                            Filesize

                            106B

                            MD5

                            40ce13109b8fa2337c88c5918c414ddf

                            SHA1

                            19fbbaec091f6066d71f1619d3428751744bfd75

                            SHA256

                            58c42e0f7e281e39df758f59386a1bd5f31f9273b5157bb223bbd973dee62868

                            SHA512

                            74126dc27ad1eef9c95fbaed6a6be69ec1369f6a4119b46b0e2cfc9f746e4948443216d32ef33ee2c842e30a9ef0c56f9c5aad2a5836df580daac51f328ed0a0

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\index.txt.tmp

                            Filesize

                            101B

                            MD5

                            e160d2def31686da8eab8c6667bc5495

                            SHA1

                            2d37760cda8fdcc79ecb5b1f4bdebb538431b1d6

                            SHA256

                            23b1406bda651baac72f87487f79d232b2b8679f06015d54d6c6605639ef10a9

                            SHA512

                            9ff136f1aebeaa722982b871990a699ce65831532f3e7ecabd1ca66b2a8f959aafbf161c7ea7a29249db68a8b35fafd7e449d7781ddde3885a1be8b74f752d5f

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\Database\MANIFEST-000001

                            Filesize

                            41B

                            MD5

                            5af87dfd673ba2115e2fcf5cfdb727ab

                            SHA1

                            d5b5bbf396dc291274584ef71f444f420b6056f1

                            SHA256

                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                            SHA512

                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\ScriptCache\index-dir\temp-index

                            Filesize

                            72B

                            MD5

                            872743d3e80e5de0d31984916797e734

                            SHA1

                            645708423eea721f515fbb12ba7179b6d6f1a8d8

                            SHA256

                            3bf4979fa132e2f2bcccb07c98224514dc105404cc2360ce5d806dccb3d3f5d4

                            SHA512

                            b0d4e6d9b28caa2dc5e30e2cb1dabcfb6f074c9c33ab7a7b619562d6c03aa7e639d1b081ea90bbc092323e6084070dd0dc1309656d956929575e1eb276c9d8a7

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe585b0c.TMP

                            Filesize

                            48B

                            MD5

                            2d08e65cac1096f34ec207187a9edcda

                            SHA1

                            85787ebc7ec628e53e693d29f1e6905219f7ac07

                            SHA256

                            fc52f7b9f4f35dbbff84456a2ab65c3996d3f01c6db2633547de3cc92893afc9

                            SHA512

                            997ba5e308ad8a3bca68b0c974525d14b9eebae556e49563cbade1f78afd26d0030eba0c03e3ea2442cc1e999e8d2d1eb8279c68003b638fcfbe871a4e2c4874

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\TransportSecurity~RFe5980a0.TMP

                            Filesize

                            419B

                            MD5

                            daeed1e5ec1c95b945131204cb032c81

                            SHA1

                            08605b8efabe1d977fa165bf93649ba400a8e5c4

                            SHA256

                            7edb8e1462786df26c85a3e2c41931b3a2da6e846a50b79c235dc769d7e5f2ab

                            SHA512

                            f9b670bb02b86da2465072286e85b085d30193f21c78ae2abfd131e468e64d654aa6de16442d5942084164156ca30b517353e8b2bc1d9c828434a79fcba3e52b

                          • C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\cefdb360-ec27-4e82-a035-f6c5f35bfdac.tmp

                            Filesize

                            3KB

                            MD5

                            c182e9fb07f738714901db022c355aaf

                            SHA1

                            e75abe9c352929812a267f078afd0d3e8f5c1a1f

                            SHA256

                            950e6f7ed0b32135d4e7b1059cdee6fd9eb718442fb93f510cb12bd37b23aed6

                            SHA512

                            6631a6fd18b3ccc2112e0b4c1551cc1ea6eee56ccfcccae62bf7fed6c73536a8306e8feb81ac236cca78df1afdb3f4427a6c4b54616b170d904dcc67c3c7c41b

                          • C:\Users\Admin\AppData\Local\Temp\nsmB075.tmp\System.dll

                            Filesize

                            12KB

                            MD5

                            cff85c549d536f651d4fb8387f1976f2

                            SHA1

                            d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                            SHA256

                            8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                            SHA512

                            531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                          • C:\Users\Admin\AppData\Local\Temp\nsmB075.tmp\nsProcess.dll

                            Filesize

                            4KB

                            MD5

                            f0438a894f3a7e01a4aae8d1b5dd0289

                            SHA1

                            b058e3fcfb7b550041da16bf10d8837024c38bf6

                            SHA256

                            30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                            SHA512

                            f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

                          • memory/4680-4024-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4012-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4044-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4042-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4041-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4040-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4038-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4037-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4036-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4035-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4034-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4033-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4032-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4031-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4030-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4029-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4028-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4027-0x000000000B800000-0x000000000B801000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4043-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4025-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4023-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4022-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4021-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4020-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4019-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4018-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4016-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4015-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4014-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4045-0x000000000B810000-0x000000000B811000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4011-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4005-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4004-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4003-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4002-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4001-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4000-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3999-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3998-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3997-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3996-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4017-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4013-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4006-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4008-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4009-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-4010-0x000000000B7E0000-0x000000000B7E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3992-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3990-0x00000000058C0000-0x00000000058C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3989-0x00000000058C0000-0x00000000058C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3988-0x00000000058C0000-0x00000000058C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3987-0x00000000058C0000-0x00000000058C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3986-0x00000000058C0000-0x00000000058C1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3976-0x0000000004140000-0x0000000004580000-memory.dmp

                            Filesize

                            4.2MB

                          • memory/4680-3978-0x0000000004580000-0x0000000004780000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4680-3995-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3994-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4680-3993-0x000000000ABD0000-0x000000000ABD1000-memory.dmp

                            Filesize

                            4KB