Analysis
-
max time kernel
305s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2022, 19:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hotpink.itch.io/tl2/download/eyJleHBpcmVzIjoxNjY0MjIxOTc2LCJpZCI6MTY0ODgxNX0%3d.DWsNtMtr6gLE%2br5BRRlrKyCqJMQ%3d
Resource
win10v2004-20220812-en
General
-
Target
https://hotpink.itch.io/tl2/download/eyJleHBpcmVzIjoxNjY0MjIxOTc2LCJpZCI6MTY0ODgxNX0%3d.DWsNtMtr6gLE%2br5BRRlrKyCqJMQ%3d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4788 Tentacle Locker 2.exe 1836 UnityCrashHandler64.exe -
Loads dropped DLL 2 IoCs
pid Process 4788 Tentacle Locker 2.exe 4788 Tentacle Locker 2.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Tentacle Locker 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Tentacle Locker 2.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Tentacle Locker 2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Tentacle Locker 2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1776 chrome.exe 1776 chrome.exe 5000 chrome.exe 5000 chrome.exe 4672 chrome.exe 4672 chrome.exe 2888 chrome.exe 2888 chrome.exe 3448 chrome.exe 3448 chrome.exe 3376 chrome.exe 3376 chrome.exe 628 chrome.exe 628 chrome.exe 4564 chrome.exe 4564 chrome.exe 3860 chrome.exe 3860 chrome.exe 4872 chrome.exe 4872 chrome.exe 4872 chrome.exe 4872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4948 7zG.exe Token: 35 4948 7zG.exe Token: SeSecurityPrivilege 4948 7zG.exe Token: SeSecurityPrivilege 4948 7zG.exe Token: 33 3340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3340 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 4948 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4788 Tentacle Locker 2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 5080 5000 chrome.exe 83 PID 5000 wrote to memory of 5080 5000 chrome.exe 83 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 456 5000 chrome.exe 86 PID 5000 wrote to memory of 1776 5000 chrome.exe 87 PID 5000 wrote to memory of 1776 5000 chrome.exe 87 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88 PID 5000 wrote to memory of 804 5000 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://hotpink.itch.io/tl2/download/eyJleHBpcmVzIjoxNjY0MjIxOTc2LCJpZCI6MTY0ODgxNX0%3d.DWsNtMtr6gLE%2br5BRRlrKyCqJMQ%3d1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7c5b4f50,0x7fff7c5b4f60,0x7fff7c5b4f702⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1676 /prefetch:22⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4312 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2132 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14674504726752829809,14070032094110114598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4384
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\" -spe -an -ai#7zMap30767:124:7zEvent186561⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4948
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2.exe"C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityCrashHandler64.exe"C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityCrashHandler64.exe" --attach 4788 26993840005122⤵
- Executes dropped EXE
PID:1836
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x3381⤵
- Suspicious use of AdjustPrivilegeToken
PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37.7MB
MD5e11f77cc60c018c5ca5af68d041942cc
SHA15bb8ab69e942f916ad7d5d047f35a3417247ca71
SHA256cf63ae0aed72d3caf89fca70b04e798a00910e770dcae28a3574f9f3bc2517a3
SHA512e912484a75200db5075df8838c03392fba635f1c4d55dbcf504d14568e5532b17337f72e6c2f53fb255cae81dbc31157cd8ea1d9dd6ef3fa44b93b4c33998e6d
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\MonoBleedingEdge\EmbedRuntime\mono-2.0-bdwgc.dll
Filesize4.7MB
MD556a620b8458f4551d519cb87a1af3eda
SHA129a89877a8fe29209345f97c45d0fee9c607092f
SHA2567c8120272b62b78773b557d573b7c69f9bc8010c77bcdc9306f67650eca3061c
SHA512d8fedcca0078b1e3b1aec14127c5c22015b734010a312343bc31a0389df28f43cf85a94de301641e42ac3b9c4dd4c174c25336499cefc4130264c2cf34721ce8
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\MonoBleedingEdge\EmbedRuntime\mono-2.0-bdwgc.dll
Filesize4.7MB
MD556a620b8458f4551d519cb87a1af3eda
SHA129a89877a8fe29209345f97c45d0fee9c607092f
SHA2567c8120272b62b78773b557d573b7c69f9bc8010c77bcdc9306f67650eca3061c
SHA512d8fedcca0078b1e3b1aec14127c5c22015b734010a312343bc31a0389df28f43cf85a94de301641e42ac3b9c4dd4c174c25336499cefc4130264c2cf34721ce8
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\MonoBleedingEdge\etc\mono\config
Filesize3KB
MD5d9bc824737177af5792846f26507231c
SHA1c44835e4881d95a97b597bebff5deba0233a5887
SHA25660099cf91bb1a5717fc1f2d23cf36a61d3bfb70d9489fbb6f4bae98c560bf3d5
SHA512f9558f9e985643d8205b5534998412a5896bb6f5712bce5d6cf27469200eed64f29efc01936ab00c4a93625b0fc573036fba00ba2c4eb1d1d7c47555608f11e8
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2.exe
Filesize635KB
MD57d61a4223e8a48bbf1cc6c48980d8bd9
SHA1ba03ca13350eab918021e466780cf5b08ac9cae1
SHA256bf202fc61a9835b9e2bfb4d037961ff39b599198c1fa9edd37e2ea31c918a15f
SHA5121feced2efc72540e30a2d2977a9c207824d4d585c6440d969b5462c59e57e997187add4a3c23b81f37efc7011593190e04840db3d3cc79c1e1ead7f5be0f57f8
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2.exe
Filesize635KB
MD57d61a4223e8a48bbf1cc6c48980d8bd9
SHA1ba03ca13350eab918021e466780cf5b08ac9cae1
SHA256bf202fc61a9835b9e2bfb4d037961ff39b599198c1fa9edd37e2ea31c918a15f
SHA5121feced2efc72540e30a2d2977a9c207824d4d585c6440d969b5462c59e57e997187add4a3c23b81f37efc7011593190e04840db3d3cc79c1e1ead7f5be0f57f8
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AIModule.dll
Filesize43KB
MD58b55778e393a534668dc3e27c1e76290
SHA16fbc69efc03d4e99ad8f8ee912b8a0b4b938e4f2
SHA25656b4b067badf18a3e1c438adc7d8988e91df872204546d5de6664a760204a0d3
SHA51253fbb36007420ae063524029188c978df767571921c1d02516127eeef57ee4e793b051935e9cec6b7cfd74b9b7d6c608e5b746429677b8944a018d1081610e1b
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ARModule.dll
Filesize12KB
MD5109eed5381dbe7237c30fa7bc26aec17
SHA125341ad5e71057a4f468f439ddf5845096608ca3
SHA2561ef346647fb27220e02e0ac6752b8cb5d0572c481876a5ae499799d5d9dee896
SHA512bd8ed799082fc6b42fb6779966dd2e3250db26446bfe9feac9d46c2e387f8f89e71f7864d58ca5fe59c7e980345324a5ad09228382fc494c0a3a6b24daa8517a
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AccessibilityModule.dll
Filesize12KB
MD5b90b1badb4e5c36b9444130e21501942
SHA19139c598bfe5d6b6a9c77172331f5398d8431e84
SHA25627c81d9dc5ee8af1e6faa786b9ce4dce55fc26e06f7c9007274974a4dcc1221d
SHA512de35df45aaa1ccee39dcf852c7e4cd3e8ec9e6ba8f096edfc54718ccf4f434012f91efbb1356b0f9583626db4b9644df440c216d08720272100eab895dff5837
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AndroidJNIModule.dll
Filesize56KB
MD5de1dd1539164e232ddec706d223d0244
SHA15e94da940d9b508213cb9ad9d26e1d6eef046797
SHA2561a3648520d865e747947bb701fc833601943efa47ac25fb1a3403baf9b69ad85
SHA5120a74eb089bcbb043278fd12d4e085c87563c3d38ee78a4f40eb865ff83eaac06ad3400d85a205b5bd7623772b2b473c29351bad67073dd26b017038178ca571f
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AnimationModule.dll
Filesize142KB
MD5a77b120f6ef3602d800ed64efd7214c6
SHA1ed27bede8703ad1f16275bb3cf073560ffedfe13
SHA256755210a00063bfac7d1aecc1386366899ddec520b7a59333a35d56e5e5b06937
SHA51227cf071b540b22aac27135a34379cd050e24a43267ff7b8917ce84660571e86590e42322cb640ed4f75b886f8c138612b09178b8543f016391ded13841df065c
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AssetBundleModule.dll
Filesize20KB
MD5e64529fd1863e79de0bbbab2b15d331d
SHA1e6eb9483d716d7ab50d098039f3f8d23cda93b61
SHA256117c73d2f2d5c1dc305042a4c6234eb6604ccaef638ba9b59b39cf577ccced55
SHA512f72ab2b28a5785c426449a64be2a1f22316e0d75c4c15065f85d4793394620e2eca85739f07bc7dea0a52b00c43f7d73aa1cc1d1b5e69d18504868d50f9db7e7
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.AudioModule.dll
Filesize56KB
MD589e3062668580f45e34205eb6430bb5a
SHA1f5747eb9adce58c7bc89d8bd270d7004a452ad7a
SHA256d42dae67434d16375e86d1410d5de19eb9652bb6a4967b1a4a7a46a52ddabad3
SHA5121bd368328b39a2348e2d3942e6994ce1168c382e46b7b88f20023eff6d0d342714751bf16337356c9394809fe2c23401cc112bed1ead5d42a201a04984bebcc4
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ClothModule.dll
Filesize15KB
MD5aff11cda61b524a45c4d74698d6009ce
SHA12e0dba7bd27c6a28464f6e73de2129701a6c50c6
SHA2560d0054a29186e6bab97f3d87d910eaef275b1b1947cd6b3dd066afb2b9fa50de
SHA512a73b63a10b86d31f3ba100efc080bf1f337aef73d34f1cdc1ffe56aa19651f390f1c15b4b16f05ad5dd3d6198a782e80da9e9f9721d325d8bd913d12791a249e
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ClusterInputModule.dll
Filesize10KB
MD506c2bc569fc29736d518bf3904064856
SHA1b35528cdfa96e6c30a293f4062cf3a763684f9ab
SHA256dde94a7a664619924ff74df8136e996abae44e79dd5915bcc4c60c8794613c50
SHA5128142b5f61d763d896ccbd6e403b3ea7fd9efb207e3ef8009d0ee7a351d065490133c57d52da21a9ba030058da62c769290a4194054157504fb15df4702823dd7
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ClusterRendererModule.dll
Filesize9KB
MD5d71dd876b0d77d734d6c3f18eae41c67
SHA1ce7a5a4131b089c046c9bbf041d3ce51addbb74f
SHA256af31c81061ab37ea7250140581aa172387810ab0b2ed2fc206ae6e0036d39f58
SHA512914fbae86bb097db5209a2708b71a455a0ef228363700341dc44fc8e9520bbf62c171c25145823a64e59ba4c89ac92331273c8895f82b81801501d68327bbd7a
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.CoreModule.dll
Filesize981KB
MD50807fbda5f38fdd3aae301acf7867e00
SHA14020d4bc4665124825591fc41a9f7481cd45a156
SHA256e6854b93e4cdd00497c2bdb7939d572e08b23d8ab09979347b9190b57df5360a
SHA512a7f788973647899191db353d94213342a3973508cfa14af9425144b1ad55e2b49fd350166706d74cc004557b78b0d049c8b6413eb8e46a17ed61b79992717c42
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.CrashReportingModule.dll
Filesize9KB
MD539232443a68655614c20bc65f553f9f9
SHA170ef8f9ed652b2e7907a6f27545f7364d4ddd039
SHA25600d5b8c37a88ff8fc3b0d8794953251609ca2fc7154441d1d87bd9c42d9a50b0
SHA512dcd17ff7352402772aae0b9447c4cbe5a9af623aee5344c9b3704e6cc27da1308c725745630033aa80c21b3817a5654e0d9f7b200dba8deb8bd7cc57df3a6d87
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.DSPGraphModule.dll
Filesize17KB
MD5ba83b9b3d5e726bb1df3cee21585b9a4
SHA13790b8df759638f373053ac59d42310344f070ba
SHA256f31b6399fa169b3973c257c9250a2bec3734fe1ae85a17b115206d9044958197
SHA512efed968b84cdd9ee96fd9dc5ac447ab727a62bdd294d1ff76b7611cb6430636969ad0d51ced3970db41720e5f262405f3aac1cc5cfb91c00c5da0a7b389a1c08
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.DirectorModule.dll
Filesize13KB
MD5c57fa2959d24c25ef617339924008e84
SHA1a54948818e7214964a307116aafdb763777e9212
SHA256dee7f3988a3c3dc9ff6b9b9aae9f0506c6d90fcd4afc581f52cad72cd7539e84
SHA512efea1e8afcb1cac08e8812543f9ecc6221897d491ae53a7c23b05a5fcb68e90c1b5557fcedefc9217ad9880a3c745c2795116c1ce0a910b70845e071686183f1
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.GameCenterModule.dll
Filesize26KB
MD51a0d5e7c8fb11afba9f20f7c80547bf4
SHA19fb9bc0262c0f718821148e658c8117427bea570
SHA256159f125cabcd385153eadb7647c0fc8ad7f58227367d5605c6188bcd522bea39
SHA512d7ea3984b96188eb39e8f94dd4930e9d7daa973fd29b138b183496517f54d5b93ee5ce4392b9e03c28e0c2046e748611bcd690a73b358c9eb536abf85f6f3f22
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.GridModule.dll
Filesize13KB
MD57b59c0ee5372d9cd63bf08df2da407a1
SHA1cb02e2fd44aa2859a7a2a4887079b0c564c03e9e
SHA256ffdad551b362c15ec09b5b18f5c135c11cd5ee1b64e54e0b5a792b6a48c52fd1
SHA512414e9a915f9ff2774ca8574a912d1bcd2479d0656895fce10a2d60400f96038285ad078adbe6cd6e304769f3fa88b45234831370b552bdc1d180705a7bd1bd94
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.HotReloadModule.dll
Filesize8KB
MD5866392913f2906efb27c39ba7badf402
SHA14ee1d5a21312ad902c5498e3d602c56bfb0c2cb8
SHA25696fcd4ae091f115bc75e1ba2847ac4a8b623f851b7f930f4b7f5d3455c65fa25
SHA5122a98656fcbeb82b6599608699c78d29dd0e923d62423bd9327fea3530f00212dbbbe46e97aedaf5a46d726d8620412ff5a86c067f26b1cea503eaab3f816ad7f
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.IMGUIModule.dll
Filesize152KB
MD5aab5929372d5c3f7dbf926da6773ae8d
SHA1645c25a4abec147d97423f4829075bb832bc4e62
SHA25610fefeb0cd80584cb71f0b9fc024568ae261662487a0eaf351ebaef206e05e91
SHA5120acd66936f0239ef52555b93e4c68d0eb6b1054d67909a5beccd1282b60d66e913f4c4007a040139b9848ceb86862823b84dfa832c7d78640a3faf71f1cf8ead
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ImageConversionModule.dll
Filesize12KB
MD53ea5c6f6e88d525ef7646eb9271ef1ed
SHA19a72fa8f37834ae773e36730384e8a26524e9640
SHA256eb4c9c86a7e8ccfe725870e74956a291119a0dd26786a7ed1620340761789ae4
SHA51265b3a7b15163881c45a25fa3805c0420017eb2c08a29778d88f002a176a9de2a0040f0644ae48ed23fb000ce6daea23d9f0bc2ece4c3bf693e4f8181d3d769f6
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.InputLegacyModule.dll
Filesize25KB
MD5dd2e03879d977feceab29344e132dac4
SHA1dee4beb1292260dfd3e2df9b59c3b80ef0aa30a2
SHA256565c72e9a82dec16f45f43c97176dc6f8470d38adcec78fd146d696420483b49
SHA51288e40d2214c6d423ee9cdd246be0c5efd8fa9b1c24059274ec2c07d641be302299c8e41583ff109bff671cab15ec7605a399c4fdfd608f1744b2962ffdb14e87
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.InputModule.dll
Filesize12KB
MD58d99ea6b6f7609f72a2cbaea3723284a
SHA1f1d75dd8a728b2276cb04696995118dd1af330c4
SHA256a7cc5015b925745e009d04de144e76777a09b62dbb652002c868a54e25f648c8
SHA51288b8465294d4e81d4e08d4e63563c31ee8d6798e043a0be33aaa32ef07ee5461f24addf0a25582588a49b385b2a14e8142b6de820c079cd7126d0e77d084f483
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.JSONSerializeModule.dll
Filesize10KB
MD52e1b098c51ef386bd7b509bd5175add5
SHA15ec8ad589650211873fe61ddfb5414eedf694f16
SHA256e22bd82a6ac4481dc9886edf3d0ccaa3f0d925abe4751cd74a6a46718a69b826
SHA512385c28732edaf6b38451cc59517391e03a7e080ff53715487ebc24b4368a2687428e4e9aa27a6679c531a020332389181e2b5c57c5dd147b58c5d2c4be06da7e
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.LocalizationModule.dll
Filesize9KB
MD57c41dd15e03ccdca8a236c2ec11572d1
SHA1785ff41515fb06a4a5f8646dd7ccb3c240d2d402
SHA2565df505b94a6b9a71a4a9276d309999e226357d7b5faa891e82e659663ddf5af4
SHA51223d00d6771d712ba6ad3e88a11ea4a5783833fc8a4c85992e08d9e7dc5a6b344ccd8765912dedee9c9b5a6ab3c068a03376454123ff68a05870af0014cdd5d1f
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.ParticleSystemModule.dll
Filesize131KB
MD503305fe06d256d2d65b925c0defc1087
SHA1688b35553c214624583d0be9c91c72e4b7746ea6
SHA2567b91bf10085d2b7d20e3eef5ff2a995ef709bb82b0aba68fcfc6c01b629042b8
SHA51298fd96f2a0b728efb431b1e03d04a7c8e5421a11bba151c3ce73a030074cffc01a849501313170cc4619b589daf63ea71b25232d67f34e758f036a705aec0762
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\UnityEngine.dll
Filesize83KB
MD5571c6a0ac673055ce8fca215ad44258e
SHA12fdb4673aa6068a4ccb77b603fde16b94c859d09
SHA25679e04323bf6c4715586f158e24b40be18cb754ad5da6c3d7b755b699df5cad5a
SHA51253a3fc5a0e93010693d8ad54572303c139213a726496b3a914d7698beb273f739801117d644a582ff8baaa33f9d43418e4695256d83034f38811dce34bcf0361
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Managed\mscorlib.dll
Filesize3.7MB
MD5b1c61f21317fe9d030da7168e8b942b0
SHA183fdc4ca1e6933d4714c50b2f0e5d6d65a3626df
SHA2566ccc31f484d45e33bc6400217b8f7e40e39fc29918c034702b46d95f5a56fe8e
SHA512e47ae7d5a7aa5371ed88d221f9b51fb8844bccbb530b8ae99572008e4522eec71b8d1af1ecdaace951d93c1f9d284b9bb1998f8a2a9042bca3b198a5e7188c84
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\Resources\unity default resources
Filesize3.7MB
MD56d1ec6209dec108d21f75c97fc131175
SHA11558fcc52df0423be5c714eb734ca987f8c2c0a3
SHA2564ee7f542f2353300b9f4a4503a970c2b59b5fe00d4be12fc6ed1119addf15d85
SHA512f2df65774eb9340e3d6935d6e0ee1463401a2bc875c1ea9fdd387228678029bfadbaf60e7374facfb1964eb2132ceb87357dbee3728e02d515bc6fca89d2f0b0
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\app.info
Filesize35B
MD5896b9af68b30963009b3547e0ee06965
SHA160f7ef5d91c82d85595d75c5130ac7a09b1ae4bb
SHA2568294288730b6a3cec339bc7deadf06836572283573036a76ce38ee688916fec2
SHA512f87170ba1dcddb966f7a2c9ca9b78178c22c21486f40d60ef589aa3697f8e1e22c92bc03827d6fe85079653fad0cfc0d5fe404295023744fc62e279a2e7a68ca
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\boot.config
Filesize69B
MD583d24a08fd75d5119ab7f9c29cc00c99
SHA198d0409c4904fde4aa88eb5d6be984770c65ba97
SHA2560897d346ec7ebf2f16af69367f17e876be00e1fe987beef03b41cedc660b44be
SHA51210bc77a292c1570363bd34186e82094a9873aac622a9ccf6a7e465de351ba63ed56c92eb13d294008db25d5a62f6cadb6c0796c6fec3e603e8ad92d07f0d7f22
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\Tentacle Locker 2_Data\data.unity3d
Filesize13.5MB
MD5002d2a498d12d0c549a5646e80c2db13
SHA1a55002b9f1cee1d10529335d0af83a5d6619cbd3
SHA25695075527f69a13c8e9dfe568fd94d50fd1d6ac4a65aa14f6eef99bb6c74783a5
SHA5127662eb55d9bbe137831b255f6c64fda6f92bacb010c98cc82d875389efb17f6ff78b67c3baff7902cef48ec98984967f6d2b53fd36e593247b6c4f43c50bdf60
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityCrashHandler64.exe
Filesize1.0MB
MD54d5d7dc0dd10dfc526589dd016facae4
SHA1fa56f647f4c7ad5228828817e91470d5a13ea9b0
SHA256320e901e6d4353bece9cd878143434985b2c5923bb6f33db449ec48193bea354
SHA512677200daeb69f345d34bfba72442d7b6f2dccc737d32ac037eedf38abbf73fecda3ac7f69ceab303cc22c699b2cbf1cb085ef51eacbb4fb6dde2b26753ed6b97
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityCrashHandler64.exe
Filesize1.0MB
MD54d5d7dc0dd10dfc526589dd016facae4
SHA1fa56f647f4c7ad5228828817e91470d5a13ea9b0
SHA256320e901e6d4353bece9cd878143434985b2c5923bb6f33db449ec48193bea354
SHA512677200daeb69f345d34bfba72442d7b6f2dccc737d32ac037eedf38abbf73fecda3ac7f69ceab303cc22c699b2cbf1cb085ef51eacbb4fb6dde2b26753ed6b97
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityPlayer.dll
Filesize24.7MB
MD5796ea91fdf4681d67016f87c0577b50a
SHA117a3b8c2971ed0243670a349a8540bdea3bbd390
SHA2565afbce032938c3649a09ec7bbd06f539587f3fb57557096840cb330cfbcbd5b9
SHA512b74b598ef3ebbd3683eb83f5c7ae9d2f3fb61ead6ac7cecefb37d8c1f60ed9c2e26173e36a6fb696f91c45e1162e31e8502640db37f28fe90265b0699d412ed0
-
C:\Users\Admin\Downloads\TentacleLocker2_SEP22_PC_Public\TentacleLocker2_SEP22_PC_Public\UnityPlayer.dll
Filesize24.7MB
MD5796ea91fdf4681d67016f87c0577b50a
SHA117a3b8c2971ed0243670a349a8540bdea3bbd390
SHA2565afbce032938c3649a09ec7bbd06f539587f3fb57557096840cb330cfbcbd5b9
SHA512b74b598ef3ebbd3683eb83f5c7ae9d2f3fb61ead6ac7cecefb37d8c1f60ed9c2e26173e36a6fb696f91c45e1162e31e8502640db37f28fe90265b0699d412ed0