Overview
overview
7Static
static
3Stremio+4.4.168.exe
windows7-x64
7Stremio+4.4.168.exe
windows10-2004-x64
7QtQuick/Co...in.dll
windows7-x64
3QtQuick/Co...in.dll
windows10-2004-x64
3QtQuick/Co...in.dll
windows7-x64
3QtQuick/Co...in.dll
windows10-2004-x64
3QtQuick/Co...in.dll
windows7-x64
3QtQuick/Co...in.dll
windows10-2004-x64
3QtQuick/Co...dar.js
windows7-x64
3QtQuick/Co...dar.js
windows10-2004-x64
3QtQuick/Co...Box.js
windows7-x64
3QtQuick/Co...Box.js
windows10-2004-x64
3QtQuick/Co...enu.js
windows7-x64
3QtQuick/Co...enu.js
windows10-2004-x64
3QtQuick/Co...Bar.js
windows7-x64
3QtQuick/Co...Bar.js
windows10-2004-x64
3QtQuick/Co...iew.js
windows7-x64
3QtQuick/Co...iew.js
windows10-2004-x64
3QtQuick/Co...del.js
windows7-x64
3QtQuick/Co...del.js
windows10-2004-x64
3QtQuick/Co...ils.js
windows7-x64
3QtQuick/Co...ils.js
windows10-2004-x64
3QtQuick/Co...ent.js
windows7-x64
3QtQuick/Co...ent.js
windows10-2004-x64
3QtQuick/Co...tem.js
windows7-x64
3QtQuick/Co...tem.js
windows10-2004-x64
3QtQuick/Co...nu.vbs
windows7-x64
1QtQuick/Co...nu.vbs
windows10-2004-x64
1QtQuick/Co...se.vbs
windows7-x64
1QtQuick/Co...se.vbs
windows10-2004-x64
1QtQuick/Co...low.js
windows7-x64
3QtQuick/Co...low.js
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
Stremio+4.4.168.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Stremio+4.4.168.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
QtQuick/Controls.2/Fusion/qtquickcontrols2fusionstyleplugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
QtQuick/Controls.2/Fusion/qtquickcontrols2fusionstyleplugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
QtQuick/Controls.2/Imagine/qtquickcontrols2imaginestyleplugin.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
QtQuick/Controls.2/Imagine/qtquickcontrols2imaginestyleplugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
QtQuick/Controls.2/qtquickcontrols2plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
QtQuick/Controls.2/qtquickcontrols2plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
QtQuick/Controls/Calendar.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
QtQuick/Controls/Calendar.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
QtQuick/Controls/ComboBox.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
QtQuick/Controls/ComboBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
QtQuick/Controls/Menu.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
QtQuick/Controls/Menu.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
QtQuick/Controls/MenuBar.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
QtQuick/Controls/MenuBar.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
QtQuick/Controls/Private/BasicTableView.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
QtQuick/Controls/Private/BasicTableView.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
QtQuick/Controls/Private/CalendarHeaderModel.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
QtQuick/Controls/Private/CalendarHeaderModel.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
QtQuick/Controls/Private/CalendarUtils.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
QtQuick/Controls/Private/CalendarUtils.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
QtQuick/Controls/Private/ColumnMenuContent.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
QtQuick/Controls/Private/ColumnMenuContent.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
QtQuick/Controls/Private/ContentItem.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
QtQuick/Controls/Private/ContentItem.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
QtQuick/Controls/Private/EditMenu.vbs
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
QtQuick/Controls/Private/EditMenu.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
QtQuick/Controls/Private/EditMenu_base.vbs
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
QtQuick/Controls/Private/EditMenu_base.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
QtQuick/Controls/Private/FastGlow.js
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
QtQuick/Controls/Private/FastGlow.js
Resource
win10v2004-20241007-en
General
-
Target
Stremio+4.4.168.exe
-
Size
112.9MB
-
MD5
763b10b7a9293ccc9307b650a01db702
-
SHA1
b033764307a4df6cc81c654467630f2df67297ef
-
SHA256
44ecc6a7624b2fdf03cb9b419f111892515fb036fe23f88e51456dce69066046
-
SHA512
f6f8d0a78cfaa2c440567fc0e636ab6129c495991f679c93ae0b7e211d9e290e7d4628891fef35f0383662bc2237e21410dd849f1d6074a8994dfd8deeee5e0c
-
SSDEEP
3145728:XddpqKUfzM8/I/6Uj2jDxXz8sGd1TiDlSugSbc+cYOsNCO1JTN:tdoK18wiucDZxG7TOlS/SI+JNCO19N
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation QtWebEngineProcess.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation stremio-runtime.exe -
Executes dropped EXE 27 IoCs
pid Process 652 stremio.exe 1572 stremio-runtime.exe 4396 QtWebEngineProcess.exe 208 QtWebEngineProcess.exe 4288 ffprobe.exe 3316 stremio-runtime.exe 1656 ffprobe.exe 3832 stremio-runtime.exe 1600 ffprobe.exe 1840 stremio-runtime.exe 2772 ffprobe.exe 4816 stremio-runtime.exe 1460 ffprobe.exe 3316 stremio-runtime.exe 2584 ffprobe.exe 3832 stremio-runtime.exe 3676 ffprobe.exe 2632 stremio-runtime.exe 432 ffprobe.exe 4728 stremio-runtime.exe 1468 ffprobe.exe 2352 stremio-runtime.exe 3132 ffprobe.exe 936 stremio-runtime.exe 5036 ffprobe.exe 3208 stremio-runtime.exe 4148 ffprobe.exe -
Loads dropped DLL 64 IoCs
pid Process 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 4448 1572 WerFault.exe 91 4612 3316 WerFault.exe 101 852 3832 WerFault.exe 106 2680 1840 WerFault.exe 111 2304 4816 WerFault.exe 116 4620 3316 WerFault.exe 121 1936 3832 WerFault.exe 126 3580 2632 WerFault.exe 131 1672 4728 WerFault.exe 136 4144 2352 WerFault.exe 141 1588 936 WerFault.exe 146 4936 3208 WerFault.exe 151 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stremio+4.4.168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stremio-runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QtWebEngineProcess.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QtWebEngineProcess.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\shell\open\command Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.torrent\ = "stremio" Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\open Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\URL Protocol Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\ = "URL:Stremio Protocol" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.torrent\stremio_backup Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe,1" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe,0" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\URL Protocol Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\open\command Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\ = "URL:BitTorrent magnet" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe\" \"%1\"" Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\DefaultIcon Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\shell\open Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe,1" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\ = "BitTorrent file" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\open\ = "Play with Stremio" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe \"%1\"" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\shell\ = "open" Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\LNV\\Stremio-4\\stremio.exe\" \"%1\"" Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.torrent Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\magnet\shell Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\DefaultIcon Stremio+4.4.168.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell Stremio+4.4.168.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\stremio\shell\ = "open" Stremio+4.4.168.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 QtWebEngineProcess.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 QtWebEngineProcess.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C QtWebEngineProcess.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 652 stremio.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 3816 Stremio+4.4.168.exe 208 QtWebEngineProcess.exe 208 QtWebEngineProcess.exe 4396 QtWebEngineProcess.exe 652 stremio.exe 652 stremio.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe 652 stremio.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3816 wrote to memory of 652 3816 Stremio+4.4.168.exe 90 PID 3816 wrote to memory of 652 3816 Stremio+4.4.168.exe 90 PID 3816 wrote to memory of 652 3816 Stremio+4.4.168.exe 90 PID 652 wrote to memory of 1572 652 stremio.exe 91 PID 652 wrote to memory of 1572 652 stremio.exe 91 PID 652 wrote to memory of 1572 652 stremio.exe 91 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 4396 652 stremio.exe 92 PID 652 wrote to memory of 208 652 stremio.exe 94 PID 652 wrote to memory of 208 652 stremio.exe 94 PID 652 wrote to memory of 208 652 stremio.exe 94 PID 1572 wrote to memory of 4288 1572 stremio-runtime.exe 95 PID 1572 wrote to memory of 4288 1572 stremio-runtime.exe 95 PID 652 wrote to memory of 3316 652 stremio.exe 101 PID 652 wrote to memory of 3316 652 stremio.exe 101 PID 652 wrote to memory of 3316 652 stremio.exe 101 PID 3316 wrote to memory of 1656 3316 stremio-runtime.exe 103 PID 3316 wrote to memory of 1656 3316 stremio-runtime.exe 103 PID 652 wrote to memory of 3832 652 stremio.exe 106 PID 652 wrote to memory of 3832 652 stremio.exe 106 PID 652 wrote to memory of 3832 652 stremio.exe 106 PID 3832 wrote to memory of 1600 3832 stremio-runtime.exe 108 PID 3832 wrote to memory of 1600 3832 stremio-runtime.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stremio+4.4.168.exe"C:\Users\Admin\AppData\Local\Temp\Stremio+4.4.168.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio.exe"C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 11164⤵
- Program crash
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe" --type=renderer --autoplay-policy=no-user-gesture-required --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=2 --mojo-platform-channel-handle=3116 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=Stremio --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=3160 /prefetch:83⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 11004⤵
- Program crash
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 10924⤵
- Program crash
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 11004⤵
- Program crash
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 10964⤵
- Program crash
PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 10924⤵
- Program crash
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 10884⤵
- Program crash
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 10844⤵
- Program crash
PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 10844⤵
- Program crash
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 10884⤵
- Program crash
PID:4144
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:936 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 11084⤵
- Program crash
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\stremio-runtime.exe C:/Users/Admin/AppData/Local/Programs/LNV/Stremio-4/server.js3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exeC:\Users\Admin\AppData\Local\Programs\LNV\Stremio-4\ffprobe.exe -show_entries "stream=index,bit_rate,max_bit_rate,codec_type,codec_name,start_time,start_pts,r_frame_rate,sample_rate,channels,channel_layout,time_base,has_b_frames,nb_frames,width,height,color_space,color_transfer,color_primaries,codec_tag_string : stream_tags=title,language,duration,bps,number_of_bytes : format=format_name,duration,bit_rate,max_bit_rate" -print_format json http://127.0.0.1:11470/samples/hevc.mkv4⤵
- Executes dropped EXE
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 11604⤵
- Program crash
PID:4936
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1572 -ip 15721⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3316 -ip 33161⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3832 -ip 38321⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1840 -ip 18401⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4816 -ip 48161⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3316 -ip 33161⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3832 -ip 38321⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2632 -ip 26321⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4728 -ip 47281⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2352 -ip 23521⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 936 -ip 9361⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3208 -ip 32081⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49.1MB
MD558a451f04d8da2f547edf753fbe03fdf
SHA1dfe60e0de8f4f892fdd5719d7b9657ad232f7414
SHA2562a9d34c190c8c639c2817a371cd8ab6e5d8c8f5d0c45b8c72fbb1d9d4c1e9227
SHA5120580068222d415ac6cb1f48a236ce425a57cf860cd802bfd31e76a296d269b8d4b9dd174d5d88552616ed7c99c1e758b23c4f69fa5f23c522f1f312f1a8d3ca6
-
Filesize
300KB
MD5c0fbaeea5372c54a2f39716fcbc6afec
SHA1e54790d82d0abdc75607fa0384bb886fc9b8027b
SHA256cc7b6317d48368cb5791a1e95de5306b6152777b09758d14666d82f4b315dabd
SHA512002aa47f5223eb113d3b2bfe1c88eb0ba588b1fc79465340b06c69dde1b897fef73c1f2540712ff22a658a6fe7b8bca4d2b6d4ec9c3d643838ff70275ebd8816
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\9486f5c4-41e9-4c0f-9f8e-53af2ab0dbab.tmp
Filesize401B
MD5cec770f6573c5da8ac8ce759d1439687
SHA17765f7083293c73f1e5e6fdae507eb3259059cbb
SHA2569d51850ba920145b69aed1760a963bc78a2638b830e2f1e79dcc5fc985b5fd40
SHA512bfb41c22524185b2905f371f04fb4b95667d8c258c4c628444fcff349b1960109ff11139e7479d1ac5e9965668503e2d49d14978de41d818e3f9d1ba67cb9c32
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Local Storage\leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Network Persistent State~RFe593a6f.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\545e214a-ce53-40c3-aa49-d146b39e6c29\index-dir\temp-index
Filesize72B
MD57cf6013a1a53f636a9c9a577133c6e85
SHA1bdd9f82375a91a842a0a8905da7e72995b7e7e06
SHA2564b987e7bafef4fb14004c3ff224a1b46745f2474de7dc859ff31bad79530c367
SHA5129d432f5235929c4fd25c906c8946b9a8852816104f5f867823ea6f0de3b12be211eba09b0ab794fd1eb9f794a9584fa02a7d5a85f81c8ca7bcf1d0d95678ca69
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\545e214a-ce53-40c3-aa49-d146b39e6c29\index-dir\the-real-index~RFe587dc6.TMP
Filesize48B
MD542075a26c1ad354d09b90e2de0931bab
SHA19366a2b62eb94612705086930d9b261b075a2930
SHA256cef9ebb1c9d7e3758f65778c49dd6e5e27784bfa6ffa3336d7cffd6d9ad3e9e7
SHA512483c85647ebc33941b0bdb7960a3c24985a515355d08ed9d28c76775fbb93aafd7abf91d6705e734eeac291870cff1a1b9f69f11483b4994e41d83b6d693ada0
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\index.txt
Filesize106B
MD52280b7f723f2f3900ef3ace8b90ca0d0
SHA1d413773991994ff67cb3a91b7370e1a261cadc09
SHA256219ab78bf63d6cd414be4909b55106eeb03b74cf59bf68f9f64c2b4fdc02f3c6
SHA51295b10515810c8c5e6892a111d51a1688d1823e378892c529717b4b9ec69b35ff04b30901ebed3a474ccbe6c3d9919ca4c593e199230cec02d318a16979296e8b
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\CacheStorage\88fcf258722d55f5951a2da9c15b52822bdffa79\index.txt.tmp
Filesize101B
MD59a4301d72aecbfcb25461de14f52febf
SHA1f1f743ca760a4b0974072e0636494909c3d19179
SHA25660d993d0eee8f399f5b218bbd3dde74b5d5cf6920985ec3d9f06e422c7c1be31
SHA512032206e23ad24582e8e638ed7fd8a835af0fccb99c03628d3fce40a99c4244f490c8b1c1cc7412975949b859df451b7294f013b6b833d6e8c933d6dd4a683b93
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\ScriptCache\index-dir\temp-index
Filesize72B
MD515771296eac30cad7433e48366b1b464
SHA1c561db52a3c6a7480cb2cbb2e2df9b195c2d7f38
SHA2566dc5a824103cfbe7f9bc85a4b1a6b76e8c9b198dda787267d754de0081c52258
SHA5125e84269dbe07e4eceeb7d99ae581bfd804143701cfad05e816ac5f74e96d53748293837da4bdc6119a1bb9bf8f02d90215cb3b436b082b1084f2ff203bf12001
-
C:\Users\Admin\AppData\Local\Smart Code ltd\Stremio\QtWebEngine\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe587903.TMP
Filesize48B
MD5d259ef91730350bb1ba8ee80e31ff756
SHA1071c38ec3f6956a91e7590ecd1d1d2099f317e53
SHA256448ecd462fde7f0f482c343a5f0f1d6abed440b1edb70959306585deac1bf04d
SHA512fc666b1411ef9fd03c910237f4a4c48b848dd0f2c578a44c87ae28c3ce4dfcf7b3e10b41e6898ef44b70a6c229c421edd0dbc616805f89be455392e718e61eda
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7