Analysis
-
max time kernel
1197s -
max time network
1236s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/04/2023, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
DREDGE v1.0.3.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DREDGE v1.0.3.rar
Resource
win10v2004-20230220-en
General
-
Target
DREDGE v1.0.3.rar
-
Size
595.8MB
-
MD5
f8819df51c8a39fc2f26ebeff3ef4134
-
SHA1
dc915a4da9b1ef33d661f198d41fa813705fcfad
-
SHA256
96e8ff34a2ee56688c954a431836722622f7094f62edb3b023c62fb3333eac8c
-
SHA512
71e521a5f28874d8763a331e98ed709a39de7dc26a974315172b080f10f51adad0f88b5961a696350592adfc5e18687769bd16ff68a5027b3c1d14d83ec64d4d
-
SSDEEP
12582912:fuWZF//IeLl81z2i2MMn0GFU7DyTQ5UppwWByWPrq5ZJQoy:mW/oeLAT0UiTdwWrPu5ly
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 1336 DREDGE.exe 240 UnityCrashHandler32.exe 1624 UnityCrashHandler32.exe 1712 DREDGE.exe 1828 UnityCrashHandler32.exe 880 UnityCrashHandler32.exe 2000 DREDGE.exe 872 UnityCrashHandler32.exe 1780 UnityCrashHandler32.exe -
Loads dropped DLL 64 IoCs
pid Process 1336 DREDGE.exe 1336 DREDGE.exe 1336 DREDGE.exe 1336 DREDGE.exe 1336 DREDGE.exe 1336 DREDGE.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 1316 WerFault.exe 1316 WerFault.exe 1316 WerFault.exe 1316 WerFault.exe 1316 WerFault.exe 1712 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 2000 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1316 1336 WerFault.exe 37 920 1712 WerFault.exe 42 820 2000 WerFault.exe 46 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications\7zFM.exe rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications\7zFM.exe\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\MRUListEx = ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 19002f433a5c000000000000000000000000000000000000000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\NodeSlot = "2" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 = 4c00310000000000545680bc1000372d5a697000380008000400efbe545680bc545680bc2a0000000b03010000000200000000000000000000000000000037002d005a0069007000000014000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\rar_auto_file\shell\open\command rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications\7zFM.exe\shell rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\rar_auto_file\shell\open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\rar_auto_file\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\NodeSlot = "3" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.rar\ = "rar_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 88003100000000005556b802110050524f4752417e310000700008000400efbeee3a851a5556b8022a0000003c000000000001000000000000000000460000000000500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications\7zFM.exe\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\rar_auto_file\ rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Applications\7zFM.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\rar_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1336 DREDGE.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 240 UnityCrashHandler32.exe 1712 DREDGE.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 1828 UnityCrashHandler32.exe 2000 DREDGE.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe 872 UnityCrashHandler32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1160 rundll32.exe 1624 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 1624 7zFM.exe Token: 35 1624 7zFM.exe Token: SeSecurityPrivilege 1624 7zFM.exe Token: SeSecurityPrivilege 1624 7zFM.exe Token: SeShutdownPrivilege 240 UnityCrashHandler32.exe Token: SeShutdownPrivilege 1828 UnityCrashHandler32.exe Token: SeShutdownPrivilege 872 UnityCrashHandler32.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1624 7zFM.exe 1624 7zFM.exe 1624 7zFM.exe 1624 7zFM.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1160 rundll32.exe 1336 DREDGE.exe 1336 DREDGE.exe 1336 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 1712 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe 2000 DREDGE.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 832 wrote to memory of 1160 832 cmd.exe 30 PID 832 wrote to memory of 1160 832 cmd.exe 30 PID 832 wrote to memory of 1160 832 cmd.exe 30 PID 1160 wrote to memory of 1624 1160 rundll32.exe 31 PID 1160 wrote to memory of 1624 1160 rundll32.exe 31 PID 1160 wrote to memory of 1624 1160 rundll32.exe 31 PID 1336 wrote to memory of 240 1336 DREDGE.exe 38 PID 1336 wrote to memory of 240 1336 DREDGE.exe 38 PID 1336 wrote to memory of 240 1336 DREDGE.exe 38 PID 1336 wrote to memory of 240 1336 DREDGE.exe 38 PID 1336 wrote to memory of 1316 1336 DREDGE.exe 40 PID 1336 wrote to memory of 1316 1336 DREDGE.exe 40 PID 1336 wrote to memory of 1316 1336 DREDGE.exe 40 PID 1336 wrote to memory of 1316 1336 DREDGE.exe 40 PID 240 wrote to memory of 1624 240 UnityCrashHandler32.exe 41 PID 240 wrote to memory of 1624 240 UnityCrashHandler32.exe 41 PID 240 wrote to memory of 1624 240 UnityCrashHandler32.exe 41 PID 240 wrote to memory of 1624 240 UnityCrashHandler32.exe 41 PID 1712 wrote to memory of 1828 1712 DREDGE.exe 43 PID 1712 wrote to memory of 1828 1712 DREDGE.exe 43 PID 1712 wrote to memory of 1828 1712 DREDGE.exe 43 PID 1712 wrote to memory of 1828 1712 DREDGE.exe 43 PID 1712 wrote to memory of 920 1712 DREDGE.exe 44 PID 1712 wrote to memory of 920 1712 DREDGE.exe 44 PID 1712 wrote to memory of 920 1712 DREDGE.exe 44 PID 1712 wrote to memory of 920 1712 DREDGE.exe 44 PID 1828 wrote to memory of 880 1828 UnityCrashHandler32.exe 45 PID 1828 wrote to memory of 880 1828 UnityCrashHandler32.exe 45 PID 1828 wrote to memory of 880 1828 UnityCrashHandler32.exe 45 PID 1828 wrote to memory of 880 1828 UnityCrashHandler32.exe 45 PID 2000 wrote to memory of 872 2000 DREDGE.exe 47 PID 2000 wrote to memory of 872 2000 DREDGE.exe 47 PID 2000 wrote to memory of 872 2000 DREDGE.exe 47 PID 2000 wrote to memory of 872 2000 DREDGE.exe 47 PID 2000 wrote to memory of 820 2000 DREDGE.exe 48 PID 2000 wrote to memory of 820 2000 DREDGE.exe 48 PID 2000 wrote to memory of 820 2000 DREDGE.exe 48 PID 2000 wrote to memory of 820 2000 DREDGE.exe 48 PID 872 wrote to memory of 1780 872 UnityCrashHandler32.exe 49 PID 872 wrote to memory of 1780 872 UnityCrashHandler32.exe 49 PID 872 wrote to memory of 1780 872 UnityCrashHandler32.exe 49 PID 872 wrote to memory of 1780 872 UnityCrashHandler32.exe 49
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\DREDGE v1.0.3.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DREDGE v1.0.3.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\DREDGE v1.0.3.rar"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1624
-
-
-
C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" --attach 1336 21012482⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" "1336" "2101248"3⤵
- Executes dropped EXE
PID:1624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 21242⤵
- Loads dropped DLL
- Program crash
PID:1316
-
-
C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" --attach 1712 5939202⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" "1712" "593920"3⤵
- Executes dropped EXE
PID:880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 20362⤵
- Loads dropped DLL
- Program crash
PID:920
-
-
C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" --attach 2000 5939202⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe"C:\Users\Admin\Desktop\DREDGE v1.0.3\UnityCrashHandler32.exe" "2000" "593920"3⤵
- Executes dropped EXE
PID:1780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 19922⤵
- Program crash
PID:820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zE85698FAD\DREDGE v1.0.3\MonoBleedingEdge\etc\mono\4.5\Browsers\Compat.browser
Filesize1KB
MD50d831c1264b5b32a39fa347de368fe48
SHA1187dff516f9448e63ea5078190b3347922c4b3eb
SHA2568a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
SHA5124b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
-
C:\Users\Admin\AppData\Local\Temp\7zE85698FAD\DREDGE v1.0.3\MonoBleedingEdge\etc\mono\4.5\DefaultWsdlHelpGenerator.aspx
Filesize59KB
MD5f7be9f1841ff92f9d4040aed832e0c79
SHA1b3e4b508aab3cf201c06892713b43ddb0c43b7ae
SHA256751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
SHA512380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
Filesize
7B
MD5ba0a6ddd94c73698a3658f92ac222f8a
SHA11b669334dae8ebafa433f0175b5fd418a7bc0975
SHA256b6234d2ea0d6022be63db80d7b80e221097fe4a469dc44febcd2a9241effdeba
SHA5120882b702e0f4c1db1701789796ab1d12d72627811b67299bf36b9b25c29465cc24e72483d171c435368dc9f777837d2bd45ccff293de2207d32ba58a6ac01023
-
Filesize
5B
MD576bf79e9a0a4c128d97dbd6900773f4b
SHA18abb38a924d5bf8a1ee12fe96aa2d2be942704d6
SHA25645095e3e3f29ea73ffab2e23158b7cd2afa6532004b5a9b6f06d4e5e068a89aa
SHA5128cd54c07d87c41103d963eb7dfd2642b07bb67ceb731b477fc9cd9b736ab03833dc2e2d0b2eb399002d76d405a20d5816d19d77ef760d7dac0c1a67d80662535
-
Filesize
626KB
MD532c3c8c2a30047c9cb3cd2aec4fe4a5e
SHA11e4f9907b29f52f87e829aed2328dc1edfd3f56f
SHA25664707769579ec19306dd3e0882ff518f781777b5c748c848165f089ff11e544e
SHA5126da51f6e7de57232e29e80fcaec6a9ae72635fdad68a5b27b9f61078b80b9bdc9798285cbc3fc4c25b3f3fd459222847ec6dec6f464014d04298331b011b1ba4
-
Filesize
626KB
MD532c3c8c2a30047c9cb3cd2aec4fe4a5e
SHA11e4f9907b29f52f87e829aed2328dc1edfd3f56f
SHA25664707769579ec19306dd3e0882ff518f781777b5c748c848165f089ff11e544e
SHA5126da51f6e7de57232e29e80fcaec6a9ae72635fdad68a5b27b9f61078b80b9bdc9798285cbc3fc4c25b3f3fd459222847ec6dec6f464014d04298331b011b1ba4
-
Filesize
54KB
MD52bcbcecb98d7dcbd9312219e8443b51f
SHA192c9690d9b8ea786655f284585e9edd863fb1a85
SHA25657212d8edd66accd77b47ec01c908b834e11e099c1c1d4ef3df452a1819ce068
SHA512940ed089631a99b3977fb1724dc5b5447e81e9890f58bcdc41a7b459f54c2579df127682901b1cd510fd06ca842a78dd94c7ce1effe4849ff4e5e64167d0d2a3
-
Filesize
20KB
MD5f62f6284cafe7fdc85fb236fb38c87a7
SHA164923d7dea207c895709f3be87dcc0c2875d4753
SHA25621ffb8fe34f90cbebc943d7a61d5f8a403bf70dcb051c6843a711bb4c2be25be
SHA5124580abd30f47616a4bb5270bc9307cccc9d3b32287f9622686649be774714bfa250233e3d7384b483baa04f6a32da5fc67192d0e15d6cac44f1642dd8623d448
-
Filesize
22KB
MD5b537509e1d75088eb3b9c06bc1ee09a1
SHA191b0955eb8274213e9f140a5344448245a9c96aa
SHA2564ccc4fcd82169e0d1e45b2286a336513c46da365a822a3df955ecb124e372a2e
SHA512ccf34f7d7517a49dbd77a86384d51241f7ce26574c2da3d522258b22f3488c5e3809b739e958c3047386af1bb78e9a40424603bebaf61f440049c27268f94244
-
Filesize
77KB
MD579fdbdba6d59e93c90181a844968f5db
SHA1d9bc515c662461c4bfe400c13cea22955ec27f04
SHA2566af62b0cc687c57275844d5be4eaba07f277c3ba1c68ee5438d5964362ac6710
SHA512bd0216fc629935cb05740b12c9af3e587009f48cb35c8af4bcd2c11dc7d9d1c063233b0c26e9c54fadee596815736b2e050501cab9354b8ac1b2252b18551d72
-
Filesize
157KB
MD5325194451c0940507da75c1367f6c460
SHA15398e350f1ff19f53c7a65ca664dea09f4a08bc2
SHA2560d5841194878720ebd5e7eec3fff21eb5d946c20502a9b749bc97c3c58646970
SHA5122f2102aae8c57fe4f17c5ef9e48022e50471fe829870279bf4edbcd18e082ba0d94cd57fc1efa30f0fb9dc1e3e181c4c832a1ccaf4ead317be4507fff9bca5a3
-
Filesize
32KB
MD5e5108b200e5aa558de19b505e81798c3
SHA1a30b5e40e31240110776e8ba91e4ee9bb7a54e62
SHA256cc5cc306cce12586cc2e61528a568d90e6a2271ea80c3abab792f458da2b862c
SHA51264ef950441688c39316ebc7f0abdd4c7643b1248fe32068a0889558b61074d3c8907e58e228d0b45cbb42645114f86f6f05cf2f16ca61d2d56eccf668cda5656
-
Filesize
68KB
MD5adf65c9449b3fe26ddad55c0ebe2f2ba
SHA1bc7ba1770b829794c564e2f96a71105312fb6a49
SHA256ef667d746bc7f15a97fe83202db1e0b78c769cc3314ed6f111f0040c80552faa
SHA5126683b0653f750b2da57820665fc7cb2568914b2fe8570a7821dda37f6e2af5d88c064501daa55096d011ae32e346eeb95a387ed43c1620e9336fb2ac60183bdb
-
Filesize
25KB
MD5b477ba3ad57ced093643261d9338e408
SHA109ac0a5cf2f6d7313a28491ac2f87f9378a67e14
SHA2563cd5bca76124fbff1627f1899d31c8c74982add78bc8b95abe2f8907dfec1835
SHA512559807250b68b82d7a256b19f5753f8f8035d8ee4977346b82358da3a11d1f2eaebfb0f2ee7e1d11b4a12b3abdefba336078f9f53d740219a9ab39e29f09006a
-
Filesize
20KB
MD58253e6aa94ad492b3c761f7c7c48e9a7
SHA1a3161bccf1ae9748748cb377bde6871d2b13a5bf
SHA25612ad8bc051f6b974274e69f684799ebf5529cc8a4a023c0c1e00df4bbd7b8cc7
SHA512b6fc9c8b5476c82d9645a414b7aa7dffd24370dfe9fbed200ed3b6f185c75da20cfc9a26d20b6859453dc27282ea200fbca541705862ad8b8288e10d6e677eaf
-
Filesize
21KB
MD537ede62c89b6c24cacbd0781ef668216
SHA11add07ef0c6967374a19ad93b7ee3be66bb454eb
SHA256cc9c5a8c2e9a2f468b9bbd6621d1068a9cf3871d5be3dfe473083f462a175611
SHA5129811298969bfcc20705f4f190439ffb40b07ca008404e6a8f355a94071b561efc11cb59dc522c9411f0baf32dfedd1cfc1b830f588dc21ea31b90f66187cd3cb
-
Filesize
1.2MB
MD5c6990937bfa26f6bb5b347efc9fd0790
SHA119e5ef4fb45e45d8f28cb768adaf181400c9c106
SHA25676b7865393e7e99bdb5eb2820fc473c515c28cd549a456380f1e3b1202069fd5
SHA51288573e610c9d6dc5b985626fc2667943b72f0fb0de1d55b03c67a552434730d2b97bee8d13dd485a84415bbb08926d004ce4461be2673cf0d7c584407b5acf8f
-
Filesize
20KB
MD5873ca75083c25b12727bbfd6c2716b43
SHA15b105d41cc406f6dc68b6fcbaafc73326f58ec9f
SHA25624a5f5b9de6fe6b34e3267d8877ea8546205199730daaed49ca39cb502cbada5
SHA512a0cde85d48041e4aa25a552478a90270f9773c5784a8469cf6dc3e7ee8c755c0e047dfb719e05b5231003442403144f96c139d8086178da2684ed67bfeb25862
-
Filesize
28KB
MD54e55b52477726be027525a57b6362703
SHA1c7aed6b0c5b601445e5384731f41ee524ad067cc
SHA256b6c27b90abaa048152f33f72f08e31906c84b363e8b4be6be77792fc0c6d0c7c
SHA512694875134c8f592fddc00b985be674d61d9bfe163e79c12a214d4adccabe251e0c1b2c8afd099416d1c8a586f42f9e1ca2b7e47251c623f6bdae4ec612270c9d
-
Filesize
24KB
MD54311bf198fb518e51b204901483b1a2b
SHA10f8ed3adb5c63cce7bd39a07d31d3c73f5247c31
SHA256a30ebacc746252471a9e7d930f755323c09ce3c34c7225dcab57daeb6edd2ca2
SHA5123c958f861b044ed07f48a0b818ec143a5226dc83a848fa112aa30c98db09776f022388872e2fdb874fa9767f9a125e9c38f2ceeaca760c0ca8fe6b8070c01081
-
Filesize
19KB
MD51246532b0eae441e8dc60ef79bc9ac87
SHA1e5657a264310e711f3ddf995613c3fa93b9e2bc9
SHA256e4bb6c128d409faf928fbaa206aaa6e32e4899194b97ad4d76d1db6c9925d61c
SHA512ad2b3fe150c1b9d62891892411e3c41f9ed835bac15c7ac54e12cd2e715ce7ef1a29bd1a27ba018a8340e4282c3605a9372e186b89319c95594ad162128193fc
-
Filesize
38KB
MD5950663ff668fcb8cae1e68de79d424b4
SHA173d540838c875513c10d716001431fea870e0342
SHA256a9acfd9f4c37171955f7c34fb3026ab06cc40018d745173dd2ad3b71f5818f30
SHA51239ac150f35aa63db1d15e985cc8657eed696b85386c87c642ee05a440bfd2ae7bc57c1cf862c4463db8d358d62afbcc56a48bec6a3e60eacef253f6618ebd811
-
Filesize
24KB
MD5fd0524d39ba0417f61c53496c8fd38bc
SHA13f4a1d7e3d277c0c246b4bde91a6dd171d9c810a
SHA25629b2d092b0247150c2b86debd40d47d015f3fa2e4aaa8931458aeab6d654f009
SHA5120a54f27b9fbb4177c9bfc12c6d8064d868ddea78d3a40b84ae9055f5ba485033efc84327af37acb79b7569a180fc6b4054f44273a119a1ba0f98a28990e8228a
-
Filesize
19KB
MD5d301c3e8288663da1e8af53873ca6557
SHA13330e52551e25b679c38f8ca21dee5d4333e950a
SHA256f714dd59167c4b0dd5b2145fb61d04c2b3e14ed955c0f8da5f88b42ede60ebaa
SHA512569a0e078e59c53dbfc6ba7b01910a47f0fe567fb8a2c38ae8e4c7bbd7aea39123eca677da8bbe99ec14df47b8320c49b026a23a686886cee196474059c96e51
-
Filesize
169KB
MD5fd963d8dd0e77eab224da8dc710a9db6
SHA1fb31fd5175b426f581e157e5affdf9b6247d2771
SHA256029c81d7790147c29e55953a0b704e50209b8d119f49f4073c72320e7dc179a6
SHA512a19f55bc050292a7a20b721dbe5a41fba6ac6b774c2e0a7534f8356f74331353b286645a81d3412101d8b2a4ea6cfb7e92eb00306b6eae920c7b429dbb744811
-
Filesize
23KB
MD5555db6430a9332df09a02d9d8ec164b0
SHA1d7ffc529c5060a75ebb9369d6f6d5bc9436d56e8
SHA256df275097365b69aeac32ad23671e83c465cbf6d2bbf711cb399972d35cd6da39
SHA512ded46e5037266d781918701bf67be48826b24a30366970a491c3f0c467a22ff9e709f83921b0bfe7559123848deed9472411d4198f37b5449a5185a1ca08404f
-
Filesize
36KB
MD5b4c32ac7150cae06d27343188e217b3c
SHA16e9b76bf5bf897448a758e14a86108f9a7e8a219
SHA256bfc05647f667a757f692b25d8e17dc50afa3af9343c3a9c6088cc1aa6fd382ba
SHA512f71dec9eb3320d39d0d4663e6780d50d97e2148052efc51f39c70ec24dd515d6688c6bc1def0796666a53993eaa474be600716800c8b526d04d01aea5012bcbf
-
Filesize
22KB
MD52febbccdafccfc9a4c39c61a34910fb8
SHA14d3acd9e21afa203a824b309e7e2c18238ddc39e
SHA25664fff9db0db8de53525e008ed65fa434eae6dc20583082e99000e134d3ee4f88
SHA51233d7b287519be4869e1cca71eb564c889578db9c7c562d0eb831e09d2dde687e80ceef8561a256254c2af27bfee425a9b861c5c1c8b2676c1fe0251ecf5c7549
-
Filesize
21KB
MD52d1a57bc79b1f8af4765ecc59a4a9226
SHA1a475826fd096e0bb103aba5f97d47a8a9dcb9055
SHA256ea766e82ff4e8b5b2da6ad85b404c158026d1ccd14e4195c9a16e565a2b40ccb
SHA512bdc26ab0c48dd1c7ffd166aea663be8fbd47629f0ffe51e37c4d7ca379356c36327f65fa02d1c07eebb4c31dcc19aff3b707af301f52a2dc54c8748dca15c60d
-
Filesize
20KB
MD536bf9bed2e5d38093268f88830b40e92
SHA1a51233bcaddca4739f43d621e5bd7ef58bce7460
SHA25625586bd91bb8ce6e3069867213275b0c03ac1f20b329b1fce2fe5591907d7d16
SHA51229b25bdf4b5e5c9d3c1bae4d230a53cd778a6abce803ba525511f466c604fd8ee812cb68250734b36ad31ca1a6a5f2c3d98daec3ec54a9343a672f2c5f627bde
-
Filesize
32KB
MD526cba48dce96198f914ba5e3c0dc83f8
SHA10d547124d916aa41e51d0ca85082e5e0a6007bcc
SHA25634f4ecb2d743cff06a37b727cf6e73dac1d3221999b284148ed2001ca6ee82da
SHA5126b95d31c0eeb0ffa086d74475ef1d78c5c1425b0ffbc210384dd889cfc47b282af3e2af650776117b9689091370f08434f0a2951e4fa5a00fdad8d3a212ca5f7
-
Filesize
151KB
MD58b1b51e9f998c82fcd0393969a5a6044
SHA1f88c4e4189bf1e8118e5ede0373f35c13ac227ce
SHA2561f9a5da89c6cf3c1eef58f35f2877206969b82fa72a09ddcd429ead07a4aaad9
SHA512808a77579e8e83b05a1738d9ba18d14234bc09ded54c15a6427a702ce33c76ee88d28be660e76147917f8ee8dbedebff6741d9d5ac5f973681b014060f559134
-
Filesize
20KB
MD51340d761239ab6fae8a2e40f9ff01b26
SHA1bbd1084034d428b33726be608e1619bc4688becf
SHA2564729ee5c631951a4cecbd74ffa4628239feff8ed6b45d5b5e82ce72a2379e5f7
SHA51259039964e6f11cb5b5ced9d4fd7539afc46dc8365a9acc2f3edc686d73e400561c099c8af1fc369b32363b974c20d4bdd1368cf86e313cf618f77c75fd9cafb6
-
Filesize
130KB
MD56f2a15aa1fa9a2924fd1851b36fd165c
SHA1eced07f1ddff841f11273420d3fcecaf32350e92
SHA2564375967cd1e2a0a7f2c0b105955755f1b0518c64e8d9a13e13f9bb25c40e67ef
SHA512a69d752c9b0aba801c7dc6631625d6e672dcdd31a37ab62c1df1acd0a0aded0817ce23baa004b437a6d011fefbe4a044c5abfd5eaa82531e4959247c3a55a3fa
-
Filesize
112KB
MD5c20a16632f1b42ffdac953b0029b425f
SHA13436cb3f4f34b53ffac87d299af813eeb5b69c5b
SHA256d2d3f38b0eeccf0845a2ef99de71a1d3ea2cc69bae4e331c5d68e445fa1544f3
SHA512152aa5d92a79400db602b8617f639717ab4b5890412fff9a2f36aa87b62ee44f9916b5ccc9d009335d84e042057cdffea388466c81d028fe19213bdead2147d6
-
Filesize
19KB
MD5bfa5491be49ede3fa7539a1a206a1aed
SHA16aaff50e3ed699407bf4646a63a51ef03d86e7ee
SHA2564530d3d03acb0f3e031f173d75c873552be4920cd6f83d5750e42f2ec3ddf56b
SHA512488bb43817ef7b35afd2d366daa98f74bb71e9207ff165b81e4cd673ec6d5c64fb6f484534c088b4c71c8d3b5a68aedaaa84e721705a2a3837659a9dcba19a91
-
C:\Users\Admin\Desktop\DREDGE v1.0.3\DREDGE_Data\Managed\UnityEngine.RuntimeInitializeOnLoadManagerInitializerModule.dll
Filesize19KB
MD56063de1e2159b955cacfe72bfdaa7fc4
SHA1c686e60a42b40745b506b435b82e5453d542ed8c
SHA2562d0172e3e2a1042a9d03911b179de276fbf5b07cbcf14386af4c560ba78cb946
SHA512d120edf91d098b58bcbc91c595f31d1c0a2e60221911f79f1f6c799a00bd502399ac932229c0c49b32e5b96929af78e2034465b2c2fd59bde87e71d51c081dba
-
Filesize
20KB
MD506968751e4a8e8e71233c2dcbdb10560
SHA1a833c0c86b63f7f706c81ebf2c2a0c818e64079a
SHA2564f778c726baa0bee75976caf7f1224691fd64f04d5378b6a40b3a69d5bccc93b
SHA512718dcf0eb2935574fed259692552c9b82209c0d8de0c76a97afa1ca471fa04c95ee03b71cc2a75d3f5cc992ea8f6cf3ea67dfca066c986d2cdfd349792168599
-
Filesize
31KB
MD543c16687a50c52e9db15c0fbe88ecfbc
SHA15d8316ef989e0ef5cb7bb5736a71628614db9293
SHA256226a351a31fd57fbb8eb706b3b07889df762b9a7e12e343350608b620b349c82
SHA512eef8f1761f77215cbe519dbf2bfa1735ab219b5027f6221fb5406a5ebd8a508d925e7d0083aa7f452c598c80c0a84237f4e079f44cc662f760d2fdacc93ba0f4
-
Filesize
20KB
MD5e59f13ea495d6d8589a8748eda50da60
SHA191e89913f081f31d4815220f0e79b108443f807c
SHA25648f7b8e3dc0922ee9553883f6832c11824b9eee8baa5d7273e452ce2668f1444
SHA51248a2be4fb5d6079b2bfc03aa2729a81afac5b8e7240a0def9510fb67c3344123e08fee86e2c07ef12e587c055234458398de8118f2d769d83dddd050ee79fd2b
-
Filesize
24KB
MD5ac04d41c5491532141a828cb698246f1
SHA15110718ed119fc447c03c6b500d5aaa47611a880
SHA256b8bd2c3ddc3b146dd682e148f0ce3055fa785e6b52257fbcccc8943f1d3ac7f5
SHA5121034e6ff2e44a91ec7a063729fc8526824769831a2c937d150f35f98691549d3262a7b01f51597c1601ac150be2704d6a5a92898c396eba871985ca027f41dc3
-
Filesize
20KB
MD50a84a1cf73e277d021a71fb4dfe73139
SHA1cc3ad6a91478f81b1abb1f6e8db9598ce91e736c
SHA256a8bd24e57f054a88c68af7d46c3644c71b3ccf5a8a87680623597c5fce34a6be
SHA51260b309295f0c7c25f18f1588168342561d38fe45a5417c504b8cdd4717734df8a4033431a8db81401f14efe4ad0347bee4c414f1456680a1bb30a484f1933ce0
-
Filesize
24KB
MD56f4e1b89e4e2d5113a608bf822486a8e
SHA1001c33f5a411063953de82011d7b9e12cb99eddc
SHA25619203c558daa3ccd5602b228c8723b4ffde51f19df261cef3fce459f3d9ee8a8
SHA5121e30702b5f7f44d52d27cfa716c4a1e7fb438290be4c0cdfb7114fc08068463e6932df3062f32c39a0ad755c47cf864223cb8a5da77118069af757589ab293d0
-
Filesize
33KB
MD5d8df7c19536b1bfb219349c7c07b3061
SHA156ada536e39b8fb8740a648142ebad865f95bfad
SHA256193f6a424c85636917f47e08880647b6db52285215e1acfb81fbacc121e7b017
SHA512972388cf8ae550da4a3b8f08012ac40023a62c1512017d4713cd4d2853a841559dd6344afe46bfac51a0dba80b81d26c96b1f50af069f0f95d4b1a92e4033e37
-
Filesize
25KB
MD50b64114939de65eea965846d3c781b3f
SHA1ee765a017c6d0df486dccfb21284c10db62c143d
SHA256711d7b3f0d5ef61c1d02821814313d0761dc67814c0dac52d24f723a8323f0aa
SHA51246e8c77647f534d459e1491cb2408b63d057cb4d6a3b33fb5d64e89b5d9cf45b240df5c1b86f4860e71292a04d2122220e56b0b0f9c68fed4443848e086420c4
-
Filesize
96KB
MD59b3531a5bbd430d1012562668a61d978
SHA13de48424d9dcac755eb8e27c0b7dd3add4abb046
SHA256b3632ea26f80761bef1df6bcb2e682ac11db5ee1ff68ad9122a075e8760256e0
SHA512e3eb5967811d6232ae22f47b467e4a22bfb5973b98f28a75e4e42ed372edc8e0fc446aa1d2ea9415f861a7effb11edd5cc874ace64b38a77007d2ac044976d41
-
Filesize
20KB
MD51bb58a3e4c1310c65e5ba0aae1a682c0
SHA1b16d4fa576d275323a2e041400f6a2e1f90d0906
SHA2569244074e282a89b47aea2eef20c5625f2c82b7ed3f4736bb52699520ef6144f3
SHA5122b657ed09054ad64887ed7c64622cd1aa126e5c5d2079377b6a6fe7151964a1a6d24838bcb89efce18b4f3d5bbeb2d09752ef79e923e45985425a68aab73ce34
-
Filesize
49KB
MD5be0bf1f6dfce61e3d34cf8920520cd49
SHA181e89bc12238987a08d35536fb956f923fcc0444
SHA256bfed7adfd750f04779176a5e9ea523a2c8ea3341f820bdb44ead430c28606836
SHA51223938c27000a493b7a3f89f2b5da31ac9a7857e5cf85d73566f6982bdde92127551991d271b7ccdb805c32407af9648cafa32471be2f0029d12407a8d57a0f64
-
Filesize
189KB
MD534e3657bed07f61988cc5d2db7444d8e
SHA1b4d5a6d50cd143832f360f8d142ea92d69f57616
SHA256bd0d2d6fe1abc8d64643aef9f6464aea61a30d7ce798538ff49e272d56ce2fba
SHA512703c1b2ef66d55b8e355881eb36001703a17180a0613d03ad1ca3260d74b197e265d4edcd8636eddc2a358a73a60de4463f87cec92d3de8d66e5cc43af47ca42
-
Filesize
37KB
MD56cfbf893596f4ec86d939738fdb5bd26
SHA1c03ff61ad6877025b76d1246d48dcac6ba60ff80
SHA25652037f0fe443e437c3ecc7c2daebd373b787fa2fe1ee11f7e8871242842a1446
SHA512dd30c2c58046d22e69a74bbb764c722b98d0dabbcd12cb198910cf9e2b88b70c68af492833ae6139c09f0b0e43d3046b51fd310b40dc0fe8084cada2050434eb
-
Filesize
41KB
MD5e676572afb305a1824f8c6ead85b2181
SHA19b0a721a295fd073618272bde11a445c21387c19
SHA256566d97a15fd87d33eb277a86ca6a966f983d8349c79ef7f0882be27d5f18b89c
SHA5129f60492d862ab47c3ad1a19b41c9943371462d59abbb076d86528d72edeb762186279e593f3c470f9700707908dbc577e4ad0716fc31a24735e7d57ffc524e09
-
Filesize
1.1MB
MD587abc0fd9818c2c243958ac3346487b5
SHA130f3e7d0abdaed1850de8867458b1c55bda44834
SHA256e83f24ed08c49c0e4f645424612c8733f6c7168fbf7fb74901168e300f256c4b
SHA512e55dbe8ea28eeae6be9ca1c6c3ae8083e00383ee13ab6d5f2a85eb052f9f719bd45cbc0e12cbce21744910cf451f2178e2bff8e7225dd839950a177a47376e65
-
Filesize
57KB
MD52e082ea98c7d0fd04bd8d0ade1347970
SHA18843046e24ce3fff981000029f548243b17843dc
SHA2565cf0858220421f68740b2b974a5390a3079bee315bf053011a8f46785ce90c79
SHA512a05f84b184e86be235df22f8ca91d175bc081d59ea446e308734c04967e884978d774cd47bbb2cf51383c940872dc576c6301cbd07614e6117954822adc5cbbe
-
Filesize
35KB
MD5dd4965ee5456754be01b35decf7d9e22
SHA15cc367d14f1218f552390e0373c68edc4d9c4560
SHA2563dc41bc508bb38599254406407e331060fb2fd0bf2d4a15f8206a5b4e46bfd20
SHA5129beddb340968fe510c3f565967356548674ee38285417d4e9fd19f6f493f3383d5c531beca0b74e9e1402d7421dfe3f6860cb6079173ceb5c1f3e3ec7957237c
-
Filesize
108KB
MD57a49bf82e3135e7613e13e1aff392a20
SHA13b49de7a5b04a42a25240945391082fb71c302d0
SHA25684dca789b5619402661e9a1e734c3e242fb567b36dbb7e1fc8cbea9e66223837
SHA5129567be2ccbab9b2456cbbb14781cdcde890389e1f67e9f51611cd2d35eab0ec551c6ff34b7f2099a4f001090631f6ea1e7c3b062d04db1c915817e4d3a4fee5d
-
Filesize
4.4MB
MD5b3701d0080197975e9e20f6556357398
SHA1d882effb51e74cb4b293d1fdc34ca55351effa67
SHA256bda87775337f96d9c48ceda2a0ea4274cbb46db971cbef261f9c5822f3ae2833
SHA51207ed3bf12b13c8b52b1838bd0c5930c9fcfe2703b106a75bf9df9edcc047ea7e5fa2aa61f26aafea3ebf2e1f0a85ef1d187903b0819f59bfbe6dc781107229a7
-
Filesize
4.6MB
MD581dc95b4cd2025b3763d12e16573fff4
SHA1885038e0ac4ebd5318aca09c6d5fa14165762012
SHA256fbe40cef10b60da04f384839af187ed9685f6dfe2fddd586340ccf6e0d3b9448
SHA51242f8b12df006b72d0436ade43f61cfeff926ba9dfad70519999c433dd2a39e911f83e509299a1dfa61dc0498f8a214239367412b7d32ebfd5591c5040b8b68b3
-
Filesize
4KB
MD5c689c1bc3daf46955ec832aa21508c9c
SHA1d733f7397d8228d1e71eb1ab6817e63d3cdd9a89
SHA25620073c8287fa7d2a951b4fc3f6a540823042f6da96e4ef327f91546a10733689
SHA51251b29182bd14044572598826f2c945f78bbcf357999e60259e21fa5cddf624891a75f81426c45d6eeb426d353f69b6fd4080d668fa49e179bba6fa54f14c85d3
-
Filesize
4KB
MD519c19f328e50461df988148ca2d154e7
SHA14cffe08ff5004c7e284ed72acf99a2b499714f4d
SHA25676b3f5bd49dc1105002948b73d10a433b6ca21dc360b0f389de2c1404d0ae278
SHA5128e3e7fa6d30a1b491a4defc9edcd6345ae45e677498230467934059786116a9ef41f5f2c5c0d06a40cb2510382b6bafe34a52b6b0f85d78b9bf13cf18132121a
-
Filesize
23B
MD5c1374142e959acddbb91a58a13fe2ab6
SHA1324f87b5972c2056fea78bb74a707975ce3186df
SHA2563265710689195e21af0da7a6f2e7d67a62cf862eea9bba90ef9344e819e72c1d
SHA51275e8f2ea88312459a1805a942daeb2a832b10b00e38f29b772574e49ccdf6abe579d018cb10afb1d29e9de3bcef40460a914512b92b4d42a74df6bd0ec9d0827
-
Filesize
120B
MD52fbbe1f53c50e52f2209992ab8825359
SHA17488d6620b6dbd8434c51d77e9c5a557c7c4f270
SHA256a5715a6a0d5edfa2668310736fbe86d36700b41b022e6d3dd5db37e6fcbb59d5
SHA512f4c3af3c4edab9a4da0594bee74738281c88703a81f724694a866e8d476f14ef3d289e48b29525bc55eebd2bde1c1822ac3bcd9ccd7453284ca2959eb10f3f04
-
Filesize
273KB
MD5b8820deb506f6346754c85f25539c7cf
SHA1679f0634d4f474e236787e8d88e9838c74b20621
SHA2569aefe14438c8f8a4e2572855c57a4face8adea23ab2b3641965554db97847f16
SHA512caf6663810648e860f8344b17c4d2e24bc9ca8ccfa849423b8f366604d93d2b6c5bdab700c5075506ba4eab7b3b7a912e6f6393592ba08cf254f6bd60c1f9629
-
Filesize
5.6MB
MD531d1f1ba93550b5ddd5d674ca6747ee4
SHA12d99ca68640ee901b077f6e7d29839cfb2f04533
SHA25621bcacf3e452af0b0085973ab889011ef0f8164eeb4bb8193e935bb4bee24746
SHA51234f2aa81650d78a12806ce3ec94e84ec98159fed283c40082eab64db9d94728bc4ff997276f1e5abf448c71d080c89c169f4ce6cb5caf99b67a1ce667cee1642
-
Filesize
2KB
MD5ba17ade8a8e3ee221377534c8136f617
SHA18e17e2aec423a8e6fb43e8cbe6215040217bb8a3
SHA256ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8
SHA512c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297
-
Filesize
18KB
MD5d081581e16b06480a5aaef8cdfb305ab
SHA1771648fadc7ed9a422b4bc26e38d854d066742d7
SHA256e38bb8cc68fe5b4edecdfd288d094b9e8ced7629039b2a347682aba0d8bd7492
SHA5126312269cfd726a991e574b1da0c3b8a2978b248118c1610d4e8791e83f3aa6d42bdd1f4f81850eaa94c026d51e73c515971a58580cd9dfbbcadf9ba0584749c4
-
Filesize
3KB
MD5ced30438c7663df1f57af23bba624460
SHA1e02a718d8e6efb74bd8bbf70a1d6bc644055f39f
SHA256107b0d888b6169bb0e51205e967d88fa82899cc6f66bde54ef9b70169dc43b1d
SHA512925d2b0c356d86a2a193de997daef501359445df226a386994716867f891255316165e3bfa4c9546a508f29c0b579dd78218a1d96cf4e891e76c74394838920c
-
Filesize
951KB
MD549177106f1a136a2c17f7fea3fb085dd
SHA1f687db8175d1f104380572d8746e7f7ba8b5b58a
SHA256f73e5f73721d14fc54d8ab2270e2d2e1621c69dd01b6ef0402b417e4a7cd5876
SHA512520fbecb2b5fd902a6b9c30ac69118724de1bbf16274a9a6c416ae50d62276ab4102e582503f5e9da0609d4cd3ad0a64446822ca495724b5620c6f7817e885d9
-
Filesize
951KB
MD549177106f1a136a2c17f7fea3fb085dd
SHA1f687db8175d1f104380572d8746e7f7ba8b5b58a
SHA256f73e5f73721d14fc54d8ab2270e2d2e1621c69dd01b6ef0402b417e4a7cd5876
SHA512520fbecb2b5fd902a6b9c30ac69118724de1bbf16274a9a6c416ae50d62276ab4102e582503f5e9da0609d4cd3ad0a64446822ca495724b5620c6f7817e885d9
-
Filesize
21.4MB
MD527ef09d32df99e02f9f90aa8f644c1d5
SHA1b8e8eb0bc33a6a7254dc6e76082d4fac551833d7
SHA25618a8dad54628b9fdf998085d0d003951f5a4794fb82b35d1db1840f92022faef
SHA512b0e9ffad8e26b258fdcb98ca4aeb17d8a1b7aa5f6b6d70c0e1f8f2b4e68336dfec24680a9bbc33f0bfbdf8ed92941a8e2c0034b296e99d56d3094e2e8e22b104
-
Filesize
5.6MB
MD531d1f1ba93550b5ddd5d674ca6747ee4
SHA12d99ca68640ee901b077f6e7d29839cfb2f04533
SHA25621bcacf3e452af0b0085973ab889011ef0f8164eeb4bb8193e935bb4bee24746
SHA51234f2aa81650d78a12806ce3ec94e84ec98159fed283c40082eab64db9d94728bc4ff997276f1e5abf448c71d080c89c169f4ce6cb5caf99b67a1ce667cee1642
-
Filesize
21.4MB
MD527ef09d32df99e02f9f90aa8f644c1d5
SHA1b8e8eb0bc33a6a7254dc6e76082d4fac551833d7
SHA25618a8dad54628b9fdf998085d0d003951f5a4794fb82b35d1db1840f92022faef
SHA512b0e9ffad8e26b258fdcb98ca4aeb17d8a1b7aa5f6b6d70c0e1f8f2b4e68336dfec24680a9bbc33f0bfbdf8ed92941a8e2c0034b296e99d56d3094e2e8e22b104