Resubmissions

16-02-2023 06:41

230216-hf1y7agc57 8

16-02-2023 06:36

230216-hdeyyaga2y 8

Analysis

  • max time kernel
    279s
  • max time network
    282s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2023 06:41

General

  • Target

    7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe

  • Size

    6.7MB

  • MD5

    ae242bd1226aaa270e2e167c252c4555

  • SHA1

    850aed65c3efce9090b4b6552075af3bc57e0659

  • SHA256

    7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78

  • SHA512

    1c2ae75fe6017957323251d3d8004e41e1f81e3c3c5dba23aecf3902d47e922b731b2ca7232e04d228b7c402140352c75ca77e88afb9de76688cf7b40abd0fa6

  • SSDEEP

    98304:is5DZoRvVmqkGpsV7Owx7FYhX4vs/6uur+GZIB6TPgV6Vf4YiYcHR4cLJpB/EO:v+RvV9kGMxF8Es/6uCdZXF0N6AJrL

Malware Config

Signatures

  • Downloads MZ/PE file
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 12 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe
    "C:\Users\Admin\AppData\Local\Temp\7aac382736121f38e6b045703ba1f8f95352d5a9c3ec4a85dee13e885a152d78.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files (x86)\Ludashi\Utils\LdsHelper.exe
      "C:\Program Files (x86)\Ludashi\Utils\LdsHelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2448
    • C:\Program Files (x86)\Ludashi\ComputerZTray.exe
      "C:\Program Files (x86)\Ludashi\ComputerZTray.exe" /NoFloat /disable_panel /disable_temp_alarm /HideBand
      2⤵
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Program Files (x86)\Ludashi\computercenter.exe
        "C:\Program Files (x86)\Ludashi\computercenter.exe" "C:\Program Files (x86)\Ludashi\ComputerZTray.exe" /NoFloat /disable_panel /disable_temp_alarm /HideBand
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
      • C:\Program Files (x86)\Ludashi\ComputerZService.exe
        "C:\Program Files (x86)\Ludashi\ComputerZService.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Program Files (x86)\Ludashi\Utils\dll_service.exe
          "C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="DirectXVersionProcess" --wnd=66118
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:4556
        • C:\Program Files (x86)\Ludashi\Utils\dll_service.exe
          "C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="OpenCLTestProcess" --wnd=66118
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5028
        • C:\Program Files (x86)\Ludashi\Utils\dll_service.exe
          "C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="NvidiaMonitorSizeOfProcess" --wnd=66118
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4260
        • C:\Program Files (x86)\Ludashi\Utils\dll_service.exe
          "C:\Program Files (x86)\Ludashi\Utils\dll_service.exe" --dll="ComputerZ_HardwareDll.dll" --entry="WMITestProcess" --wnd=66118
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          PID:1316
        • C:\Program Files (x86)\Ludashi\ComputerZService_x64.exe
          "C:\Program Files (x86)\Ludashi\ComputerZService_x64.exe" --dll="HardwareEx_x64.dll" --entry="HardwareExProcess" --wnd=66118 --server --firstrun
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:980
        • C:\Program Files (x86)\Ludashi\Hardware\hdw_disk_scan.exe
          --ppid=2332
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious behavior: EnumeratesProcesses
          PID:1928
      • C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe
        "C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\web_host.exe
          "C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\web_host.exe" --url=C8Vn3GZkw6+pIVm+v79vE4XPL7VySuizNWtVjhXZreuYxQIFULIz19ljJByyjN8/4G0FntVQYvYDDy/eBha0chbzsjinkW/wW2R9XMIK2MfgkwYON3Bi3PdOyNYdb65MMNzfCERlowU= --wnd_title=AVD/yKOT9gy5+u+mgvNUS9pfK+CejpN9GXlcKSG3ey3mIkg5++HZOQ== --main= --icon_path=C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Themes\UI\icon\web_host.ico
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe
            "C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --parent_wnd=20290 --tab_rect="0,0,0,0" --tab_ids="AD910BD1-C9EC-408d-BF4D-AA1C3424F00B" --cmd="" --disable-gpu --disable-gpu-compositing --enable_high_dpi --class_name="common_pop" --url="about:blank" --tab_group_ids="C9869BD2-7912-41ab-90DE-31D08A9DFD7D" --web_view_id=256 --disable-pinch --disable-web-security --disable-alt-f4
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4780
            • C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe
              "C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --type=renderer --disable-gpu-compositing --disable-pinch --no-sandbox --lang=en-US --lang=zh-CN --log-file=disable.log --log-severity=disable --disable-extensions --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=24.0.0.221 --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="4780.0.425419036\956490744" /prefetch:1
              6⤵
              • Executes dropped EXE
              PID:1152
            • C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe
              "C:\Users\Admin\AppData\Local\Temp\{2CEDDB53-32D1-4845-8EB9-F7E9C8885455}\Utils\cef\CefView.exe" --type=utility --channel="4780.1.569955849\434510704" --lang=en-US --no-sandbox --no-sandbox --lang=zh-CN --log-file=disable.log --log-severity=disable /prefetch:8
              6⤵
              • Executes dropped EXE
              PID:1360
      • C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe
        "C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        PID:4844
      • C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe
        "C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        PID:1772
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3060
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s HpSvc
      1⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:4860
    • C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe
      "C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe" --from=deskshortcut
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\web_host.exe
        "C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\web_host.exe" --url=C8Vn3GZkw6+pIVm+v79vE4XPL7VySuizNWtVjhXZreu9fwtRIn8A6Ty3Y6BCzXTWRo7Hn/j8ugZYxPxnCZppVIJB4C6GdPKdW2R9XMIK2MfgkwYON3Bi3PdOyNYdb65MMNzfCERlowU= --wnd_title=AVD/yKOT9gy5+u+mgvNUS9pfK+CejpN9GXlcKSG3ey3mIkg5++HZOQ== --main=--from=deskshortcut --icon_path=C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Themes\UI\icon\web_host.ico
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe
          "C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe" --parent_wnd=1026a --tab_rect="0,0,0,0" --tab_ids="86AF3F28-616E-4b80-B46F-B0A85919B8F2" --cmd="" --disable-gpu --disable-gpu-compositing --enable_high_dpi --class_name="common_pop" --url="about:blank" --tab_group_ids="5979D318-14A9-4ad8-9F12-9F356B211356" --web_view_id=256 --disable-pinch --disable-web-security --disable-alt-f4
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4456
          • C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe
            "C:\Users\Admin\AppData\Local\Temp\{2D2EAF59-87D7-4C47-9593-9F7311850E05}\Utils\cef\CefView.exe" --type=renderer --disable-gpu-compositing --disable-pinch --no-sandbox --lang=en-US --lang=zh-CN --log-file=disable.log --log-severity=disable --disable-extensions --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=24.0.0.221 --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="4456.0.1460396616\762700980" /prefetch:1
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3444

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Ludashi\360Conf.dll

      Filesize

      287KB

      MD5

      4731241f01bab84b3b10f844d057dbb2

      SHA1

      fe6190df827ed844a4507ecf01fc7b1cca0cc9f4

      SHA256

      bb82423b24a3ab1b54bea0246e3478818aee2c625cf84b5128ef282915a8465d

      SHA512

      cf0f0ae5369e91030502e546367893e9ee134ee27d0278a638e7c80e3c7fa4a254175665e3d27d326d65266afe350d842536877d1d4b0aef43b9b2d6068fa9a9

    • C:\Program Files (x86)\Ludashi\360Conf.dll

      Filesize

      287KB

      MD5

      4731241f01bab84b3b10f844d057dbb2

      SHA1

      fe6190df827ed844a4507ecf01fc7b1cca0cc9f4

      SHA256

      bb82423b24a3ab1b54bea0246e3478818aee2c625cf84b5128ef282915a8465d

      SHA512

      cf0f0ae5369e91030502e546367893e9ee134ee27d0278a638e7c80e3c7fa4a254175665e3d27d326d65266afe350d842536877d1d4b0aef43b9b2d6068fa9a9

    • C:\Program Files (x86)\Ludashi\ComputerMonZ.dll

      Filesize

      3.6MB

      MD5

      c308758bd0d70abf40693f9e4d19a2a7

      SHA1

      b382bd754b2beffd87f5a86bdd939401e0203a8d

      SHA256

      6584de3cd40de9e0428eaff6f549a9c78eaf4fc45d28be24205007521f9628c4

      SHA512

      fae52d7e4417209bfbac80da4e69af2cc6d92b2976e03b53c9f36fc4bf253ecb7a46b62a2768a47a0c3706817d36a632f4f1fcd84c8d32cc93ab2af808af3e43

    • C:\Program Files (x86)\Ludashi\ComputerMonZ.dll

      Filesize

      3.6MB

      MD5

      c308758bd0d70abf40693f9e4d19a2a7

      SHA1

      b382bd754b2beffd87f5a86bdd939401e0203a8d

      SHA256

      6584de3cd40de9e0428eaff6f549a9c78eaf4fc45d28be24205007521f9628c4

      SHA512

      fae52d7e4417209bfbac80da4e69af2cc6d92b2976e03b53c9f36fc4bf253ecb7a46b62a2768a47a0c3706817d36a632f4f1fcd84c8d32cc93ab2af808af3e43

    • C:\Program Files (x86)\Ludashi\ComputerZ.set

      Filesize

      82B

      MD5

      5d8e4b8efee134d714495dfca82f8bad

      SHA1

      18669a21535a060d45b493a3e9d33d18edc5243c

      SHA256

      14f820c36e5eeadca86dc7b6d32070ba4890ca7719fd91f39bfdb2d8287c6eda

      SHA512

      a6d24a47e12b3ca890c1205289a166bef8c7d37e3ffa556c3763ac0de8482b5da29ca583be3dbd5893ab26419f379b2da20dba3f83cad2d8675873359844b65b

    • C:\Program Files (x86)\Ludashi\ComputerZ.set

      Filesize

      158B

      MD5

      4a7e2185dd9f92d9ef20a8dcfa846be8

      SHA1

      b43e39ef4ea7e94daeabeb23c810ebf76a1e011e

      SHA256

      33a690918078a2b0a6567952a58a97b13094b221820614907e35938e8e15f39d

      SHA512

      d70396e930f2f1fb7e25abbd58f0f08da5c3340da1bee0737630d22253320328be2b23a8e34facdea6609a7fd8c892562dd58a82aaa1fd810b1ec7117bec5b4b

    • C:\Program Files (x86)\Ludashi\ComputerZ.set

      Filesize

      158B

      MD5

      4a7e2185dd9f92d9ef20a8dcfa846be8

      SHA1

      b43e39ef4ea7e94daeabeb23c810ebf76a1e011e

      SHA256

      33a690918078a2b0a6567952a58a97b13094b221820614907e35938e8e15f39d

      SHA512

      d70396e930f2f1fb7e25abbd58f0f08da5c3340da1bee0737630d22253320328be2b23a8e34facdea6609a7fd8c892562dd58a82aaa1fd810b1ec7117bec5b4b

    • C:\Program Files (x86)\Ludashi\ComputerZ10.dll

      Filesize

      779KB

      MD5

      36306abfdc45a1cd4f0c21b7d7419ead

      SHA1

      db1ea3080716e20071b6c1f6fb8469bc4b8109ce

      SHA256

      9447277c3f36148d9af207331d101e8e21691b445fdf1073d11209c1c30a7057

      SHA512

      a33c30d2d073dc30580c42744b903666fcfd97b0263d5515a41b31d07d26b81c6d86a6ed7378218a9930e5099e76c99f8519841746b7c1338a7d487527717d0c

    • C:\Program Files (x86)\Ludashi\ComputerZ10.dll

      Filesize

      779KB

      MD5

      36306abfdc45a1cd4f0c21b7d7419ead

      SHA1

      db1ea3080716e20071b6c1f6fb8469bc4b8109ce

      SHA256

      9447277c3f36148d9af207331d101e8e21691b445fdf1073d11209c1c30a7057

      SHA512

      a33c30d2d073dc30580c42744b903666fcfd97b0263d5515a41b31d07d26b81c6d86a6ed7378218a9930e5099e76c99f8519841746b7c1338a7d487527717d0c

    • C:\Program Files (x86)\Ludashi\ComputerZTray.exe

      Filesize

      8.4MB

      MD5

      e9042e8c7b59b84fb6f57517798cae52

      SHA1

      30ab0ec13983a6bd9037d3ad0ba7dfa5750f650c

      SHA256

      151d5c2cdee63352a32010bba1b2fd34d39eb4fe4b8ad45d8acfb70715c63b20

      SHA512

      e9e2f0d43400a21e796c3769c8a91546e6ae121ebe04788d1fb6d724595e2b3493720d756e54b6e25b7db6c3fedec8836042d44715dc23f95af5e2509db1f4d1

    • C:\Program Files (x86)\Ludashi\ComputerZTray.exe

      Filesize

      8.4MB

      MD5

      e9042e8c7b59b84fb6f57517798cae52

      SHA1

      30ab0ec13983a6bd9037d3ad0ba7dfa5750f650c

      SHA256

      151d5c2cdee63352a32010bba1b2fd34d39eb4fe4b8ad45d8acfb70715c63b20

      SHA512

      e9e2f0d43400a21e796c3769c8a91546e6ae121ebe04788d1fb6d724595e2b3493720d756e54b6e25b7db6c3fedec8836042d44715dc23f95af5e2509db1f4d1

    • C:\Program Files (x86)\Ludashi\ComputerZ_CN.exe

      Filesize

      3.7MB

      MD5

      b833bcb9bfe16563c36be0c430b848b9

      SHA1

      a90866f92d6c8af51f58baf08a2982ada27233cb

      SHA256

      e50ded7fa0ba74eb10bccc03f9fdb022d9fb6bbc68bc4755f7324e5f2cc36ebc

      SHA512

      3c47f162c7503450d4c9ba1e499aa222e47211f96815db2f0d33659758cdcc27801271f33677142f8092cdbc80c7fd1910a29197846d61f073928afb40dc071b

    • C:\Program Files (x86)\Ludashi\ComputerZ_HardwareDll.dll

      Filesize

      11.7MB

      MD5

      af71a585a9e19d0dbbc121cac849f2b9

      SHA1

      531e5bd0d8b0cfbcfec8b381cadf1a7af5b9d7a5

      SHA256

      27a09cadc1b4737ffd8cfb989ba73385332e02cd1662771a449cb0454c3ca3a4

      SHA512

      f83b55f1df7e6c32510a596555bdf7c41a0fb28666a5df68a15143c2daaf526284dc14b6e1d178ec2ad22222c6968eac3128259aba50c617475ff3af2aab86c3

    • C:\Program Files (x86)\Ludashi\DataMgr.dll

      Filesize

      976KB

      MD5

      2ed7532cc0ffcc67f948c8d1469504c2

      SHA1

      3e84b817fd88786c680dbf5587b24035c0a2846c

      SHA256

      d069c6509ba8608ab15f301f57016ba7dcce42e35201a4c2c4e97167e0ce54b7

      SHA512

      7173c8bd56a2f6e103ad1fe684c5f0bb8aacaac07f705e7646057fe9c44f1b483650ec89d5c048cdb8b73b99f38147252ee863651e6de11582c275f61d274665

    • C:\Program Files (x86)\Ludashi\DataMgr.dll

      Filesize

      976KB

      MD5

      2ed7532cc0ffcc67f948c8d1469504c2

      SHA1

      3e84b817fd88786c680dbf5587b24035c0a2846c

      SHA256

      d069c6509ba8608ab15f301f57016ba7dcce42e35201a4c2c4e97167e0ce54b7

      SHA512

      7173c8bd56a2f6e103ad1fe684c5f0bb8aacaac07f705e7646057fe9c44f1b483650ec89d5c048cdb8b73b99f38147252ee863651e6de11582c275f61d274665

    • C:\Program Files (x86)\Ludashi\NetBridge.dll

      Filesize

      238KB

      MD5

      8786d469338c30e0ba9fedfc62bd5197

      SHA1

      5fb12028ceae9772f938e1b98b699f0e02e32718

      SHA256

      beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f

      SHA512

      5db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c

    • C:\Program Files (x86)\Ludashi\NetBridge.dll

      Filesize

      238KB

      MD5

      8786d469338c30e0ba9fedfc62bd5197

      SHA1

      5fb12028ceae9772f938e1b98b699f0e02e32718

      SHA256

      beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f

      SHA512

      5db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c

    • C:\Program Files (x86)\Ludashi\SiteUIHelper.dll

      Filesize

      291KB

      MD5

      7eca0dc1aeb511d25576ccdb10eb5dc9

      SHA1

      f58595dcc43d1609845914da67b2c118910460f6

      SHA256

      00687641802ea47ba4d269c71321341d07ffe11e9acd40d389a46302ed1cdd1e

      SHA512

      d6406b295037c3fbb5d6814917805aff8836c5eb50c3cc7cd827ef0725570a7b005af6c72faf374032a2463a01fc7115070c5d3fc047535aa0ab23ed4b64e28c

    • C:\Program Files (x86)\Ludashi\SiteUIHelper.dll

      Filesize

      291KB

      MD5

      7eca0dc1aeb511d25576ccdb10eb5dc9

      SHA1

      f58595dcc43d1609845914da67b2c118910460f6

      SHA256

      00687641802ea47ba4d269c71321341d07ffe11e9acd40d389a46302ed1cdd1e

      SHA512

      d6406b295037c3fbb5d6814917805aff8836c5eb50c3cc7cd827ef0725570a7b005af6c72faf374032a2463a01fc7115070c5d3fc047535aa0ab23ed4b64e28c

    • C:\Program Files (x86)\Ludashi\Utils\7z.dll

      Filesize

      1.1MB

      MD5

      2706693dda10c6cc79eed24c56d4e5ef

      SHA1

      4f34ef1bd49273a0d260b9dab15c73eb0ccb6383

      SHA256

      0edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3

      SHA512

      7e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c

    • C:\Program Files (x86)\Ludashi\Utils\7z.dll

      Filesize

      1.1MB

      MD5

      2706693dda10c6cc79eed24c56d4e5ef

      SHA1

      4f34ef1bd49273a0d260b9dab15c73eb0ccb6383

      SHA256

      0edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3

      SHA512

      7e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c

    • C:\Program Files (x86)\Ludashi\Utils\CefHelper.dll

      Filesize

      477KB

      MD5

      91d986307ab1e56f7f77710664cdb70d

      SHA1

      18fe10c7b1ec55632c03b9f06f9d881a022c970a

      SHA256

      d85bfd004e2ca8dbdfa72a4bdcb1510df76ed56d46ef5128500883c8c7f7c8fb

      SHA512

      480659e912ef3053a4542eb2e8eaa3a70df92569e9834d950d9d7ee07e8c9d740b59f1eaed90276454ab71211da41d2f3d945cc486539cba7be3a5c5c0a61e32

    • C:\Program Files (x86)\Ludashi\Utils\CefHelper.dll

      Filesize

      477KB

      MD5

      91d986307ab1e56f7f77710664cdb70d

      SHA1

      18fe10c7b1ec55632c03b9f06f9d881a022c970a

      SHA256

      d85bfd004e2ca8dbdfa72a4bdcb1510df76ed56d46ef5128500883c8c7f7c8fb

      SHA512

      480659e912ef3053a4542eb2e8eaa3a70df92569e9834d950d9d7ee07e8c9d740b59f1eaed90276454ab71211da41d2f3d945cc486539cba7be3a5c5c0a61e32

    • C:\Program Files (x86)\Ludashi\Utils\CefRes.dll

      Filesize

      24.2MB

      MD5

      009b2a92ea877e1c8b33b13cc17137d4

      SHA1

      fe41711307e7a596e5b30f0ac00d7b75a6002d04

      SHA256

      6af751a5f0b73c1ccb723afd0089ea7bcecf0e302afe03f10040fb9c11ce05c1

      SHA512

      6b68d45bd7707e4bfa3bf8ed0bb9f73205c5c002c634d9e6619a1e7996859d6cf6624037b8cb0c730a7965d8dd7566121401bf4726484814879cb6372684fc0f

    • C:\Program Files (x86)\Ludashi\Utils\CefRes.dll

      Filesize

      24.2MB

      MD5

      009b2a92ea877e1c8b33b13cc17137d4

      SHA1

      fe41711307e7a596e5b30f0ac00d7b75a6002d04

      SHA256

      6af751a5f0b73c1ccb723afd0089ea7bcecf0e302afe03f10040fb9c11ce05c1

      SHA512

      6b68d45bd7707e4bfa3bf8ed0bb9f73205c5c002c634d9e6619a1e7996859d6cf6624037b8cb0c730a7965d8dd7566121401bf4726484814879cb6372684fc0f

    • C:\Program Files (x86)\Ludashi\Utils\ComputerZ12.dll

      Filesize

      956KB

      MD5

      d4bedaf01cc67ad161cd454cff3ddb93

      SHA1

      36571a19ae58c8ae9d1505cc0b6b673be47b1756

      SHA256

      019380b69ab5410d923abc86487d636e28dc51fb03015ef15b7c5be7be13b4b3

      SHA512

      d121d8d2676f6426aa94ee31af93c60ce72b451c8d48cf1e98ce844fba997da859a2140e7d2f4fd2c34ca9f1fd1ace3b8a84c8befa74d035879a036b0671ea3c

    • C:\Program Files (x86)\Ludashi\Utils\ComputerZ12_x64.dll

      Filesize

      1.2MB

      MD5

      0e426bd24d7a8b9058622259a6da352b

      SHA1

      ab833eee8362f1f32537a436e1fb95b810010db4

      SHA256

      a876bee4db2c330ca4d6e959ba878c28a2032d2da4a03a1a4b5e1dae9c8612d5

      SHA512

      d7c90110f053158db57e1d1d6d9790dff03efda64b2186a0b0da26bde06d58a77d580cfc497ebe037cdf7da398292b7b1e35b377f52bd6f60f5699aca4f39200

    • C:\Program Files (x86)\Ludashi\Utils\ComputerZ8.dll

      Filesize

      241KB

      MD5

      08d4addb59ec78303aeeb2b08030defb

      SHA1

      ea058e83945ef8e20712ff1c7659d528362d1b46

      SHA256

      c27454a2e8b56665a9282fd774b8568da3aad3a00b1ff673c5115a28acdb5f25

      SHA512

      ef792cda42ebca4ea3c6547b0c7f4d1aa603cb71922db154b96b22deef6ba22d1a5cb23849cf168281aaf7c956fbd46976e929ae15f3295491724c363e567b6c

    • C:\Program Files (x86)\Ludashi\Utils\ComputerZ8_x64.dll

      Filesize

      288KB

      MD5

      5a0f33714bf8ae637fb6800473819af7

      SHA1

      b788684a669362765f472083fc316f7d36c0eeaf

      SHA256

      f2e0d6fa5d7590bfc694ffe222e503dc7171ce585bde4feec3f165899caf09a1

      SHA512

      71113af332c7e78a8cf9a1a7221d4c10c8b6db6f61f739b3ed3755d50e130dbe26e6a73e2c370be5fb9c89ea3f711f5027a19e8df32920407fe8fb67a5236dae

    • C:\Program Files (x86)\Ludashi\Utils\LDSBasic.dll

      Filesize

      1.7MB

      MD5

      2d3d1b3fd61d0230161b1c43e367df45

      SHA1

      a1090c691dd54b9bc2509c0e81d00cfeb6c2db32

      SHA256

      fb3b48b2980ac6cbecd7c579a58e0358dcfe03ea2d66c839e965627c4612a619

      SHA512

      217f7f1f41c26e0ac9910d10f0ff2d538acc0156595244f33d4bce018a8097d1911d5a668e3a6d889e5147b27a40b7cd6904e2d8e1d49dd53eb184468fdb1764

    • C:\Program Files (x86)\Ludashi\Utils\LdsHelper.exe

      Filesize

      871KB

      MD5

      789ff3ad5461728f393f86ffc0351fc6

      SHA1

      c5d994ac9dfe8440ddc9fd4c8cebe9776cf13356

      SHA256

      ae9ea86fcc401d29e5b92e2cb6e6b6fe0cfbee7408f781b2e217a509a533cc94

      SHA512

      c7500c88125b278de8e17a602d96d26b703aabbbd3624913afa0e56d313ec0a8abc0080794061de8e5f4688bf45c0aa136019509420437222e8452e5da8c62c1

    • C:\Program Files (x86)\Ludashi\Utils\LdsVolumeCtrl.dll

      Filesize

      104KB

      MD5

      e3de14a4c2e1ea9c73d6e865a0fab837

      SHA1

      489f2b30c5e6c2af516e69ccad1f96d34411e66c

      SHA256

      23785aa5bae50bf822f3b2306fda41743b5937d770a8d9f391fae8f50497e20b

      SHA512

      941d8ec98afa5acd4b6a9d52c126e86c1e1f3460660171f70631124a422ec24b7f3c9ceca17eca01142b398a71cda045e136ffd420c01eba8cc4c883ef0cb0ef

    • C:\Program Files (x86)\Ludashi\Utils\Ldshelper.exe

      Filesize

      871KB

      MD5

      789ff3ad5461728f393f86ffc0351fc6

      SHA1

      c5d994ac9dfe8440ddc9fd4c8cebe9776cf13356

      SHA256

      ae9ea86fcc401d29e5b92e2cb6e6b6fe0cfbee7408f781b2e217a509a533cc94

      SHA512

      c7500c88125b278de8e17a602d96d26b703aabbbd3624913afa0e56d313ec0a8abc0080794061de8e5f4688bf45c0aa136019509420437222e8452e5da8c62c1

    • C:\Program Files (x86)\Ludashi\Utils\LuDaShiHelper.dll

      Filesize

      164KB

      MD5

      48484aa35450ac9595af42af04dd7f4e

      SHA1

      734653c55ba2a66e893b3884e9fe31d57851051c

      SHA256

      04b4b37315904097e7d12d72400dd43c3f1afa39147f974299e506a152a75542

      SHA512

      cafcb978b36c0ad7aa4255f207dcd7b69c32217c959f03c4a63dd6f67d4f9a7e1fd008787f2ba38deabeefb5e4b58c1a7e274baf327005ad35e33b0f00758a3c

    • C:\Program Files (x86)\Ludashi\Utils\NavAd.dll

      Filesize

      281KB

      MD5

      b235e69a3ae8f02e68bb94190bd238f9

      SHA1

      7747450aa888f6a59258c574a2a5a0cef5a06d54

      SHA256

      c4a019be64262055113cbc0be66d57eb56d750fd0cf57af623d589c94d3dc1c1

      SHA512

      9cb74d447accfed346292370de31cef6b1c53a29b7d9a4b147dc50840941cee6ee65147ca8dc71c7cf4491e88fee1c6f0a86183c65f2bf22ab8cb38a4eef489a

    • C:\Program Files (x86)\Ludashi\Utils\NavLauncher.dll

      Filesize

      111KB

      MD5

      81c7432015c24ed91800f759dc2bfabc

      SHA1

      d94828fd9dca99f840701437a1c041f647c58dfc

      SHA256

      b3b6820713c5c8e6354eb8a48f83d18ab7253b2dbec38d2b6e49a550fb18edea

      SHA512

      950067663e276aee30a912602c8ba7a00bc18d8e9cb3417da51be068a44e6e54eb31d6f8ec92e68ec84275926abd75517ec0c289ddb804d952fc0bce3c795ca4

    • C:\Program Files (x86)\Ludashi\Utils\NavLauncher64.dll

      Filesize

      392KB

      MD5

      fdc2298ccfff6d6b43c2d0f7779ef9dd

      SHA1

      8bb48b41cf55f9baf177eee720ad7cf3fe3ebce0

      SHA256

      97e71f6b65f749b070d47d22bf0c5776d79180e19cd4bbbb5a9a33da037ef5c3

      SHA512

      0024dd6e63e6de0d7b585ea0f03eb6bd4dd30104a70861eb2b09bbe7d577a4f25a6941f0dd2513b51a73b979a174d92afc81507085e2d784dfc7b81e7414c8a7

    • C:\Program Files (x86)\Ludashi\Utils\PCStoreSetup_officialwebsite.dll

      Filesize

      10.3MB

      MD5

      214063c2e8eb56472421ffcf066fcc5e

      SHA1

      0802b450986e2c954fa13018e3fda122a57b7c47

      SHA256

      ed93f5fc7d3bc958b15f4f57a149abd16cf58c985dbac75d592cc41c3acf7345

      SHA512

      7e5f8b00a00b4130db7bb69d863001d24b38c510d1294487878bc224c673dc280c1962e477048720caa81d6cd237a37c4b947c8490dd4822de43b1b1a96b8ff5

    • C:\Program Files (x86)\Ludashi\Utils\PageMgr.dll

      Filesize

      425KB

      MD5

      019559fa067a3d9393d6ef37eed4719c

      SHA1

      35fbd0221ac8bad7a14f8d7fa86750d89fd595bb

      SHA256

      eff4f5d5632a3ffdc06ee91b80f429df3a85d3b4c73916a2a08fac433230bdbd

      SHA512

      48b6fc945d356ca57e0c72249f39d1fd1adbec6276050c0cce247d725a3a1162a3c61c0badcbd0180f16abd705969f1ad7ab2f9de331b1e3521bd0c959b96eba

    • C:\Program Files (x86)\Ludashi\Utils\Pop.dll

      Filesize

      779KB

      MD5

      f6deffeb114254e0bcece46eb8951a5b

      SHA1

      b1ba2d37c6fb3776e525ae0de522e6939715f36b

      SHA256

      7d2d9b02acbee9a0afe04d6e7f9d3f4336ca9e31cfa0ad73c8bfc031fb0058e0

      SHA512

      9e2f830e08bf8aaac84c7b757a7bbc5b763141710015ae41dc075effb375fd7915700be05d78a9661be8d3543ae02029f02d15e1c21f98988e16800d607427da

    • C:\Program Files (x86)\Ludashi\Utils\PopEx.dll

      Filesize

      554KB

      MD5

      c6494b04750e6757252e88cf5c061530

      SHA1

      e8e0becd8e5daa11529e5d5c3ae3051db6b0ebdd

      SHA256

      2d7fcf14674527f524f3ec19d090b9c8367cfc7db6533b4e88c6a769836c5597

      SHA512

      fc45d135239d3273813fb22ba59620b2bf1ce973cab9f7b8a59d47d4347fc7a5f8c3ef97a51c2e859f2f081d8e9e90b7e79ef41371835efb02ea379a2d19952a

    • C:\Program Files (x86)\Ludashi\Utils\ProductInfo.dat

      Filesize

      87KB

      MD5

      c4e602bd780397e61daab7394ae39b28

      SHA1

      81abf2e28c681d99999a7c046e0629d03031f898

      SHA256

      e10a0a93fa88bcae6618fcb71051cf3c893bc19409ad6fb9578c2bd8a8fb77f4

      SHA512

      01e9247813038f4a66f4dc1642542984a95e2ee8d0d1580a52ad7cf5c51e5d8e2fb904a3438955d9600a9f22a51d88cea1f663df309153959beb2099c4efa1fe

    • C:\Program Files (x86)\Ludashi\Utils\WebDataMgr.dll

      Filesize

      677KB

      MD5

      c7053f00f6267d5a5e9cc09df392a651

      SHA1

      b324e8f786faa6f80f3a6f0fb6523eb270e8af7f

      SHA256

      ddb9a485fef65a3a92ef94f9169a1ad3996d92d450ac947052eef91be1f0dd79

      SHA512

      cb78b7c913e8222210037a2cd903781fd99f23bc4433e23de50f4ddc0b8631b94bf730e23729130e0866cccf4272e49160f49d8c87fb7f9a3bed43a9128f899a

    • C:\Program Files (x86)\Ludashi\Utils\WebView.dll

      Filesize

      1.9MB

      MD5

      e68618982c94bc388d59de8cae81ea5a

      SHA1

      6f472bec25b114292221c87b24aa883f2eb64448

      SHA256

      3cb47fd6f2e653382c93006dd47eb9d2aca6b47e80c05992a5355cb9843c97ee

      SHA512

      91c56505ca14d2d621407d5dc0e33c4c10416d4061bd30a5a3d8e9f56f34d02b0a588cbb92d39590249c069e3aceb34bbf826d2539750c4f3fc7343e3d4d5c65

    • C:\Program Files (x86)\Ludashi\Utils\Websocket.dll

      Filesize

      1.8MB

      MD5

      1c659410366b145d81cdbf3c92878faf

      SHA1

      e87c7811afc4b2fc7c08750a03027381c4cb609e

      SHA256

      8238b12809fa9540566b373e97e3947a8543d27def5a6cdca428d8516256dffb

      SHA512

      c82fe7e7943cb9c6d2f5e9f5904ae41096182d2ae777460721f563781305cff9296d470fb118fb4e30ea29f55e67f230de41e604dc418c8fbecd206353487ebb

    • C:\Program Files (x86)\Ludashi\Utils\arctrl.dll

      Filesize

      551KB

      MD5

      5d5ff285798b4fb701632f92a598142d

      SHA1

      709d2346fd44ae3171afc065589f0db547b49eaf

      SHA256

      d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5

      SHA512

      456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942

    • C:\Program Files (x86)\Ludashi\Utils\arctrl.dll

      Filesize

      551KB

      MD5

      5d5ff285798b4fb701632f92a598142d

      SHA1

      709d2346fd44ae3171afc065589f0db547b49eaf

      SHA256

      d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5

      SHA512

      456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942

    • C:\Program Files (x86)\Ludashi\Utils\arctrl.dll

      Filesize

      551KB

      MD5

      5d5ff285798b4fb701632f92a598142d

      SHA1

      709d2346fd44ae3171afc065589f0db547b49eaf

      SHA256

      d9dec9914a31e6396349186659c6ffb351cfb0766a8b5f9108fbaa41c92462d5

      SHA512

      456a41902614f7c838c1cf68a96f551fad428629ac8f0738091f4b9ce73b3862f63ff95d6856f93ddff64578d05998aa0927c29fd03d94b15fe78b121692b942

    • C:\Program Files (x86)\Ludashi\Utils\instcore.dll

      Filesize

      411KB

      MD5

      47b2c31bc568b8692b607bef27f4fa1d

      SHA1

      00e542b7fca1ee66030adaf40c8bbfaade17dd87

      SHA256

      36200786c7e9c0b66636b0be13b8d15ceeb21ea797b59b4bd118ac21e3417207

      SHA512

      bcd09ff477433baf937da073157f1800e0a03a95f792d7b62cb4f0d52b5d6446698192186dcbaf090d9a0627a5c1711d2b1f9d8589495e91268900bde8ea7f19

    • C:\Program Files (x86)\Ludashi\Utils\js_basic.dll

      Filesize

      1.1MB

      MD5

      6cf181e7db1b5d7776ddf5044c6188a9

      SHA1

      4da3f1865575d3eee8d420ac61015b7b9ef3c4d5

      SHA256

      4f66bf85f00110ca3ee21d1e038b25c97c13e2f91cd514217ad59fca23ac5c02

      SHA512

      d2ca52fa7362d7cb830807981b03efd4c78e9bfee2917b16b6b87b9f17393dbf2f938acc68f1f0aef7f55f7d6bf7113c4c06bd4aa1be1d2d196ab86ee050a294

    • C:\Program Files (x86)\Ludashi\Utils\netul.dll

      Filesize

      1.9MB

      MD5

      7c450e5f5ce44c5acb8f3b27f5f1dded

      SHA1

      095c36b0db24a11389d901540e8b76c7aea518b0

      SHA256

      480c4c286a55562468d29da6771d38020d81c0af9d3883be10fd4a2f3b50d0ec

      SHA512

      c70a53d23d70cf93f3f9f40fbcb3cb7d49378185aa0c97683439900f5f2dae0cb7f6e279c856d56299dc993ffca786cd8e52239f2f2806096073f21bb00b63a4

    • C:\Program Files (x86)\Ludashi\Utils\product_helper.dll

      Filesize

      727KB

      MD5

      75654073797ec30585cb0d0531f741a3

      SHA1

      8d6ea13c4f767191a286fd012b20443772d4341d

      SHA256

      db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7

      SHA512

      ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d

    • C:\Program Files (x86)\Ludashi\Utils\product_helper.dll

      Filesize

      727KB

      MD5

      75654073797ec30585cb0d0531f741a3

      SHA1

      8d6ea13c4f767191a286fd012b20443772d4341d

      SHA256

      db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7

      SHA512

      ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d

    • C:\Program Files (x86)\Ludashi\Utils\product_helper.dll

      Filesize

      727KB

      MD5

      75654073797ec30585cb0d0531f741a3

      SHA1

      8d6ea13c4f767191a286fd012b20443772d4341d

      SHA256

      db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7

      SHA512

      ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d

    • C:\Program Files (x86)\Ludashi\Utils\product_helper.dll

      Filesize

      727KB

      MD5

      75654073797ec30585cb0d0531f741a3

      SHA1

      8d6ea13c4f767191a286fd012b20443772d4341d

      SHA256

      db382ea923e2ec3da7f004b932faa7854ac723efd3a4d01d87f96d4bb5f145d7

      SHA512

      ea13fb5c67344540398ee4467c66301681f1bf452bdc7a739d8eb611b98c89cf845e424283f0862e2bcf8650a7f803bf884e6e54f971b2bdd1ccd2a9e2cc103d

    • C:\Program Files (x86)\Ludashi\Utils\product_helper_x64.dll

      Filesize

      839KB

      MD5

      551e02af61cd1324f18ad0951f87eba7

      SHA1

      8a33d2332f345bb29b7409b7173f590473cc1f2a

      SHA256

      affe4376e85fb36d30c31ee3cecb5dbd82e97d87d1fd04aff2b35789055189f3

      SHA512

      e686f1883ebc1ea02a086e916ea315b4404c931e7b854bb31cf38d87a3ad51f840bd6ea0d0fed4489d33e6e9396f345285a76f3f235f94ad2bb3b1ef115e7268

    • C:\Program Files (x86)\Ludashi\game\GameTray.dll

      Filesize

      457KB

      MD5

      39bbb7af971f719b5b2aea41defff699

      SHA1

      37483ba9fb0bba070a11a7e81bbcbb02b624edad

      SHA256

      16ff1a3abe13bb4f406ebcb1badcd90d29bc1244cae587b8b560c13e4b6b9af8

      SHA512

      2f2db044bfe42f6c3acc3acb3959db8a739b0057b43b1a920c6c5b899c96368333e799f4106531a457a383d32d892599c53bc7efc6e1856d2263bd1f0f617de8

    • C:\Program Files (x86)\Ludashi\game\gametray.dll

      Filesize

      457KB

      MD5

      39bbb7af971f719b5b2aea41defff699

      SHA1

      37483ba9fb0bba070a11a7e81bbcbb02b624edad

      SHA256

      16ff1a3abe13bb4f406ebcb1badcd90d29bc1244cae587b8b560c13e4b6b9af8

      SHA512

      2f2db044bfe42f6c3acc3acb3959db8a739b0057b43b1a920c6c5b899c96368333e799f4106531a457a383d32d892599c53bc7efc6e1856d2263bd1f0f617de8

    • C:\Program Files (x86)\Ludashi\sites.dll

      Filesize

      1.4MB

      MD5

      bcad5c8aeb6756c24e1c3d2d62a3e6a9

      SHA1

      4082d5561dcb55f81d2751ae98ab01f113361885

      SHA256

      4bf0a6d8c9ddbd671ceefe0e58d39e942bcf631cd7aa43604fbd1aaa41a5f814

      SHA512

      2998794ae6693b0330990ce7fdfdea0cd37b05a7142d293805c2067237349387eab0cf60fc32e6840de74979b8048e6557a76a5472865a9178dcd97e5a8d1862

    • C:\Program Files (x86)\Ludashi\sites.dll

      Filesize

      1.4MB

      MD5

      bcad5c8aeb6756c24e1c3d2d62a3e6a9

      SHA1

      4082d5561dcb55f81d2751ae98ab01f113361885

      SHA256

      4bf0a6d8c9ddbd671ceefe0e58d39e942bcf631cd7aa43604fbd1aaa41a5f814

      SHA512

      2998794ae6693b0330990ce7fdfdea0cd37b05a7142d293805c2067237349387eab0cf60fc32e6840de74979b8048e6557a76a5472865a9178dcd97e5a8d1862

    • C:\Program Files (x86)\Ludashi\themes\default\default_theme.ui

      Filesize

      90KB

      MD5

      cdf53b97941b9140fdb70420cf8b0d09

      SHA1

      c72caf3a88984b8ee78fd94a2a72e0c6105da1b0

      SHA256

      602dae8b624b29498c5c13d58f65a3697b82e238bf7870c9f5c93eda3cc7ec8a

      SHA512

      012231f4e7a0940e983f50c2aa4635734e72c7d760c21d51b31330db2e15b4ef4e2f4f2cf84320be65a1aeb9fe31c5844c10277d3df929a9ab3a35daf8a1d5ba

    • C:\Users\Admin\AppData\Local\Temp\{1DB39962-9255-4537-A84B-D21E8C0FE011}.tmp\NetBridge.dll

      Filesize

      238KB

      MD5

      8786d469338c30e0ba9fedfc62bd5197

      SHA1

      5fb12028ceae9772f938e1b98b699f0e02e32718

      SHA256

      beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f

      SHA512

      5db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c

    • C:\Users\Admin\AppData\Local\Temp\{EB876709-60B5-4f2d-8DA3-307EE7DB1476}.tmp\7z.dll

      Filesize

      1.1MB

      MD5

      2706693dda10c6cc79eed24c56d4e5ef

      SHA1

      4f34ef1bd49273a0d260b9dab15c73eb0ccb6383

      SHA256

      0edad8a1af22d5b97c1f324791c86243a6ecce7b5a9d2f30415af99aba9129c3

      SHA512

      7e7f7ae894528587ba33b6e10999549bb9a2ec2748b5662fa1b8806e5f4ce33af47507b3ef2954f2747a76b5b7c775c1cd671061f577c5016d1f8ba165bbe21c

    • C:\Users\Admin\AppData\Roaming\ludashi\setup.dll

      Filesize

      74.3MB

      MD5

      dbdeda5c627771ca871dfc1bfc830843

      SHA1

      016a0fc4b0b8a80c9ddb7d59997851139b225238

      SHA256

      3d01828c32f3fbd23aecbd4e5213eaff3b62256ee947ba9fd8f04294e14ca47e

      SHA512

      7713fc4166004bade360d3c764d663b07316dfec6d71b2ca336af0e959da8f51bc8e04389b2fde732fd24a4cd6e5b60c0e54fd6cad9681ca6402c6d41c78c02b

    • memory/2332-214-0x0000000077A70000-0x0000000077A80000-memory.dmp

      Filesize

      64KB

    • memory/2448-177-0x0000000077A70000-0x0000000077A80000-memory.dmp

      Filesize

      64KB

    • memory/3540-186-0x0000000000B90000-0x0000000001C4B000-memory.dmp

      Filesize

      16.7MB

    • memory/3540-220-0x0000000000B90000-0x0000000001C4B000-memory.dmp

      Filesize

      16.7MB

    • memory/4644-136-0x0000000077A70000-0x0000000077A80000-memory.dmp

      Filesize

      64KB

    • memory/4644-133-0x00000000006C0000-0x000000000123A000-memory.dmp

      Filesize

      11.5MB

    • memory/4644-191-0x00000000006C0000-0x000000000123A000-memory.dmp

      Filesize

      11.5MB

    • memory/4644-137-0x0000000077A70000-0x0000000077A80000-memory.dmp

      Filesize

      64KB

    • memory/4644-138-0x00000000006C0000-0x000000000123A000-memory.dmp

      Filesize

      11.5MB