URL:

https://getpopcorntime.is/

Full analysis: https://app.any.run/tasks/da6e4eb9-cc0c-479e-943b-3b1902881b26
Verdict: Malicious activity
Analysis date: June 17, 2019, 19:29:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

361761B56C9BF7B034BCCDAC67C3DE8F

SHA1:

47F87D4E49004F68EAFF54803C8EE168F69D739F

SHA256:

F67C680545222DCAE77CB46FB327737EC2FEE4D32A02D64C7AAF42FE77F38D64

SSDEEP:

3:N8hmVhRFN:2ABr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PopcornTime-latest.exe (PID: 1156)
      • PopcornTime-latest.exe (PID: 3532)
      • node.exe (PID: 3880)
      • PopcornTimeDesktop.exe (PID: 948)
      • QtWebEngineProcess.exe (PID: 2364)
      • node.exe (PID: 3472)
      • Updater.exe (PID: 1500)
      • node.exe (PID: 3128)
      • QtWebEngineProcess.exe (PID: 1416)
    • Loads dropped or rewritten executable

      • PopcornTimeDesktop.exe (PID: 948)
      • QtWebEngineProcess.exe (PID: 2364)
      • QtWebEngineProcess.exe (PID: 1416)
    • Connects to CnC server

      • node.exe (PID: 3128)
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2796)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2796)
      • PopcornTime-latest.exe (PID: 1156)
      • PopcornTime-latest.exe (PID: 3532)
      • PopcornTime-latest.tmp (PID: 3492)
    • Reads Windows owner or organization settings

      • PopcornTime-latest.tmp (PID: 3492)
    • Reads the Windows organization settings

      • PopcornTime-latest.tmp (PID: 3492)
    • Starts SC.EXE for service management

      • PopcornTime-latest.tmp (PID: 3492)
    • Uses TASKKILL.EXE to kill process

      • PopcornTime-latest.tmp (PID: 3492)
    • Modifies the open verb of a shell class

      • PopcornTime-latest.tmp (PID: 3492)
    • Creates files in the program directory

      • Updater.exe (PID: 1500)
    • Uses NETSH.EXE for network configuration

      • PopcornTime-latest.tmp (PID: 3492)
    • Executed as Windows Service

      • Updater.exe (PID: 1500)
    • Starts CMD.EXE for commands execution

      • PopcornTimeDesktop.exe (PID: 948)
    • Creates files in the Windows directory

      • Updater.exe (PID: 1500)
    • Application launched itself

      • node.exe (PID: 3880)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2796)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2796)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2796)
      • PopcornTimeDesktop.exe (PID: 948)
    • Changes settings of System certificates

      • chrome.exe (PID: 2796)
    • Creates files in the user directory

      • chrome.exe (PID: 2796)
    • Application was dropped or rewritten from another process

      • PopcornTime-latest.tmp (PID: 3428)
      • PopcornTime-latest.tmp (PID: 3492)
    • Creates a software uninstall entry

      • PopcornTime-latest.tmp (PID: 3492)
    • Dropped object may contain Bitcoin addresses

      • PopcornTime-latest.tmp (PID: 3492)
    • Creates files in the program directory

      • PopcornTime-latest.tmp (PID: 3492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
62
Malicious processes
10
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs popcorntime-latest.exe popcorntime-latest.tmp no specs popcorntime-latest.exe popcorntime-latest.tmp sc.exe no specs sc.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs netsh.exe no specs netsh.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs updater.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs msiexec.exe no specs msiexec.exe no specs popcorntimedesktop.exe qtwebengineprocess.exe no specs cmd.exe no specs cmd.exe no specs node.exe node.exe no specs node.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs qtwebengineprocess.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=940,16708445020135051685,17252138367246493940,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=9891132836805981860 --mojo-platform-channel-handle=4552 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=940,16708445020135051685,17252138367246493940,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=9086785745406744739 --mojo-platform-channel-handle=4596 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
948"C:\Program Files\Popcorn Time\PopcornTimeDesktop.exe" C:\Program Files\Popcorn Time\PopcornTimeDesktop.exe
PopcornTime-latest.tmp
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.0.0
Modules
Images
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\secur32.dll
c:\windows\system32\wininet.dll
c:\windows\system32\webio.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\oleacc.dll
1040"C:\Windows\system32\taskkill.exe" /f /IM PopcornTimeDesktopC:\Windows\system32\taskkill.exePopcornTime-latest.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1116"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=940,16708445020135051685,17252138367246493940,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=8474599293499279482 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8474599293499279482 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1140"C:\Windows\system32\sc.exe" delete "Update service"C:\Windows\system32\sc.exePopcornTime-latest.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1156"C:\Users\admin\Downloads\PopcornTime-latest.exe" C:\Users\admin\Downloads\PopcornTime-latest.exe
chrome.exe
User:
admin
Company:
Popcorn Time
Integrity Level:
MEDIUM
Description:
Popcorn Time Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\downloads\popcorntime-latest.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1416"C:\Program Files\Popcorn Time\QtWebEngineProcess.exe" --type=renderer --disable-accelerated-video-decode --enable-threaded-compositing --no-sandbox --disable-webrtc-hw-encoding --lang=en --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-gpu-compositing --channel="948.1.437480851\1353831543" /prefetch:673131151C:\Program Files\Popcorn Time\QtWebEngineProcess.exePopcornTimeDesktop.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\popcorn time\qtwebengineprocess.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\popcorn time\qt5webenginecore.dll
c:\program files\popcorn time\qt5quick.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1500"C:\Program Files\Popcorn Time\Updater.exe"C:\Program Files\Popcorn Time\Updater.exe
services.exe
User:
SYSTEM
Company:
Popcorn Time
Integrity Level:
SYSTEM
Description:
Updater
Exit code:
0
Version:
1.2.1.0
Modules
Images
c:\program files\popcorn time\updater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\version.dll
1520"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=940,16708445020135051685,17252138367246493940,131072 --enable-features=PasswordImport --service-pipe-token=953879581538579774 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=953879581538579774 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
2 022
Read events
1 546
Write events
471
Delete events
5

Modification events

(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3320) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2796-13205273394886250
Value:
259
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3488-13197474229333984
Value:
0
(PID) Process:(2796) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2796-13205273394886250
Value:
259
Executable files
64
Suspicious files
251
Text files
2 412
Unknown types
38

Dropped files

PID
Process
Filename
Type
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\da81ad3d-0ad4-42d4-af9b-1190a0267d60.tmp
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp
MD5:
SHA256:
2796chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
23
DNS requests
16
Threats
266

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2796
chrome.exe
172.217.16.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2796
chrome.exe
185.248.160.75:443
getpopcorntime.is
unknown
2796
chrome.exe
216.58.210.13:443
accounts.google.com
Google Inc.
US
whitelisted
2796
chrome.exe
74.125.133.198:443
www.youtube.com
Google Inc.
US
whitelisted
2796
chrome.exe
216.58.206.6:443
static.doubleclick.net
Google Inc.
US
whitelisted
2796
chrome.exe
216.58.206.2:443
googleads.g.doubleclick.net
Google Inc.
US
whitelisted
2796
chrome.exe
216.58.207.86:443
i.ytimg.com
Google Inc.
US
whitelisted
2796
chrome.exe
66.102.1.198:443
yt3.ggpht.com
Google Inc.
US
whitelisted
2796
chrome.exe
74.125.206.188:5228
mtalk.google.com
Google Inc.
US
whitelisted
2796
chrome.exe
172.217.22.14:443
android.clients.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.16.131
whitelisted
getpopcorntime.is
  • 185.248.160.75
  • 5.2.79.134
  • 185.198.57.17
  • 62.141.46.79
unknown
accounts.google.com
  • 216.58.210.13
shared
www.youtube.com
  • 74.125.133.198
whitelisted
ssl.google-analytics.com
  • 172.217.21.232
whitelisted
googleads.g.doubleclick.net
  • 216.58.206.2
whitelisted
www.google.com
  • 216.58.208.36
malicious
static.doubleclick.net
  • 216.58.206.6
whitelisted
yt3.ggpht.com
  • 66.102.1.198
whitelisted
i.ytimg.com
  • 216.58.207.86
  • 172.217.16.150
  • 172.217.22.54
  • 172.217.22.118
  • 216.58.210.22
  • 172.217.18.118
  • 172.217.23.182
  • 172.217.21.214
  • 216.58.205.246
  • 172.217.21.246
  • 172.217.22.22
  • 172.217.18.22
  • 172.217.18.182
  • 216.58.206.22
whitelisted

Threats

PID
Process
Class
Message
1500
Updater.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
3128
node.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
3128
node.exe
Potential Corporate Privacy Violation
ET P2P Vuze BT UDP Connection (5)
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1048
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
3128
node.exe
A Network Trojan was detected
ET CNC Ransomware Tracker Reported CnC Server group 69
3128
node.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
3128
node.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
3128
node.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent transfer
Process
Message
Updater.exe
Service: Start
PopcornTimeDesktop.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
PopcornTimeDesktop.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
PopcornTimeDesktop.exe
js: Uncaught ReferenceError: ui is not defined
PopcornTimeDesktop.exe
js: Uncaught TypeError: Cannot read property 'file_path' of undefined
PopcornTimeDesktop.exe
"[ShaderManager] cache a new shader material type(10): gl material 16to8bit: 0, planar: 1, has alpha: 0, 2d texture: 1, 2nd plane rg: 0, xyz: 0"
PopcornTimeDesktop.exe
input yuv limited range
PopcornTimeDesktop.exe
creating VBO...
PopcornTimeDesktop.exe
creating VAO...
PopcornTimeDesktop.exe
vao updated