【まとめ】
- 別名
No | マルウェア名称 | 使用組織 |
---|---|---|
1 | WannaCry | US-CERT, SANS, 総務省, 警察庁 |
2 | Wanna Cry | Microsoft |
3 | WannaCrypt | JPCERT/CC |
4 | Wanna Cryptor | IPA |
5 | WanaCryptor | |
6 | WanaCrypt0r | |
7 | Wcry | Trendmicro |
- 利用する脆弱性
- MS17-010(※1): Microsoft Windows SMB サーバー用のセキュリティ更新プログラム (4013389)
CVE番号に関しては、諸説ある
No | CVE番号 | 発表組織 |
---|---|---|
1 | CVE-2017-0144 | Trendmicro, Paloalto |
2 | CVE-2017-0145 | JPCERT/CC, Microsoft |
※1: CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, CVE-2017-0148に相当
- 拡張子
- 暗号化時に「.WNCRY」という拡張子を元のファイル名に追加
abc.jpg ⇒ abc.jpg.WNCRY |
- 感染方法
手法 | 場所 | 確認 | 備考 |
メール | 国内 | × | |
海外 | ? | Dropboxからマルウェアをダウンロード(確証なし) | |
Web | 国内 | ? | 報告なし |
海外 | ? | 報告なし | |
Network | 〇 |
- 初期進入
- バックドア経由(Malwarebytes)
- ネットワーク感染活動
- 他のPCに感染するために、ダウンロードしたマルウェアをMicrosoft Security Center (2.0)というサービスとして実行する
- SMBサーバを検索
- CVE-2017-0144/0145の脆弱性をついて感染拡大
- 感染対策
No | 対策 |
1 | 脆弱性バッチの適用(MS17-010) |
2 | 上記が適用不可の場合は、SMB v1 の利用を停止 |
- 身代金
時期 | 身代金 |
初期 | 300ドル(=約3.4万円) |
3日以後 | 600ドル(=6.8万円) |
1週間以後 | ファイルを消去 |
-
- 支払いによってデータが回復した例なし
- 送金額
Bitcoinアドレス | 取引回数 | 受信額 | 残高 |
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn | 96 | 13.60232262 BTC | 13.60232262 BTC |
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw | 103 | 16.86888494 BTC | 16.86888494 BTC |
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 | 120 | 19.02389183 BTC | 19.02389183 BTC |
計 | 319 | 49.49509939 BTC | 49.49509939 BTC |
2017/05/23 19:00現在
出典: https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
- 脅迫メッセージ
出典: http://image.itmedia.co.jp/l/im/news/articles/1705/14/l_yu_cry1.jpg
- 暗号解読
- Windows XPで成功事例が報告される
- 感染国
- 150カ国、30万件以上
- 感染は5/12~5/13に一気に拡大か
国名 | 国名 | 国名 | 国名 |
英国 | ロシア | スペイン | 米国 |
オーストラリア | ベルギー | フランス | ドイツ |
イタリア | メキシコ | 日本 | 中国 |
ベトナム | トルコ | 台湾 | チリ |
- 感染組織(日本)
No | 組織名 |
1 | 病院 |
2 | 個人 |
3 | 日立製作所 |
4 | JR東日本(高崎支社)*1 |
5 | 川崎市上下水道局*2 |
6 | 東急電鉄 |
7 | 富士・富士宮市消防指令センター |
8 | 日立金属 |
- 感染組織(日立製作所)
- 日立製作所とJR東日本で感染を確認
- 日立 電子メールの管理などを行う社内のシステムに被害
- 日立 家電製品の受注や発注をするためのシステムにも障害が発生
- 感染組織(海外)
No | 国名 | 組織 |
1 | 英国 | 国民保健サービス(NHS) |
2 | スペイン | テレフォニカ(Telefonica) |
3 | 米国 | フェデックス(FedEx) |
4 | ロシア | 内務省 (1000台) |
5 | ロシア | メガフォン(MegaFon) |
6 | 中国 | 山東大学、南昌大学、大連海事大学、桂林航天工業学院などの大学が相次いで被害(中新網) |
7 | 中国 | 国営中国石油天然気集団公司(CNPC)電子決済サービスが使用不能 |
- 作成者
No | 容疑者 | 根拠 | 情報元 |
1 | 中国 | 中国語が流ちょうなのに、英語の方が片言 | 大紀元 |
中国語をGoogle翻訳で他言語に翻訳 | Flashpoint | ||
2 | ロシア | ロシアで被害が拡大 | |
3 | 北朝鮮 | コードがラザルスのコードに類似 | Symantec, Kaspersky |
- 亜種
No | 日 | マルウェア名 | 備考 |
1 | Uiwix | キルスイッチが省略 |
【感染デモ】
◆IPA ランサムウェア「WannaCry (WannaCryptor)」感染実演デモ(IPA, 2017/05/22)
https://youtu.be/kVhe_Jh_-_w
【注意喚起】
◆Identificado ataque de ransomware que afecta a sistemas Windows (CCN-CERT, 2017/05/12)
https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html
◆Alert (TA17-132A) Indicators Associated With WannaCry Ransomware (US-CERT, 2017/05/13)
https://www.us-cert.gov/ncas/alerts/TA17-132A
◆世界中で感染が拡大中のランサムウェアに悪用されているMicrosoft製品の脆弱性対策について (IPA, 2017/05/14)
http://www.ipa.go.jp/security/ciadr/vul/20170514-ransomware.html
◆ランサムウエア "WannaCrypt" に関する注意喚起 (JPCERT/CC, 2017/05/14)
https://www.jpcert.or.jp/at/2017/at170020.html
◆Multiple Ransomware Infections Reported (US-CERT, 2017/05/12)
https://www.us-cert.gov/ncas/current-activity/2017/05/12/Multiple-Ransomware-Infections-Reported
◆SANS ISC InfoSec Forums (SANS, 2017/05/12)
https://isc.sans.edu/forums/diary/Massive+wave+of+ransomware+ongoing/22412/
◆ランサムウェア「WannaCry」に注意、総務省が呼び掛け 「セキュリティパッチを最新版に」 (ITmedia, 2017/05/16 11:10)
世界各地で猛威をふるうランサムウェア「WannaCry」について、総務省が注意喚起
http://www.itmedia.co.jp/news/articles/1705/16/news074.html
【報告書】
◆大規模ランサムウエア感染に関する緊急調査レポートを公開 (NTT DATA, 2017/05/17)
http://www.nttdata.com/jp/ja/news/information/2017/2017051701.html
◆ランサムウェア「WannaCry」対策ガイド rev.1 (Lac, 2017/05/19)
https://www.lac.co.jp/lacwatch/report/20170519_001289.html
【感染経路】
◆ランサムウェア「WannaCry/Wcry」のワーム活動を解析:侵入/拡散手法に迫る (Trendmicro, 2017/05/18)
http://blog.trendmicro.co.jp/archives/14920
◆大規模サイバー攻撃 ネット接続だけでウイルス侵入か (NHK, 2017/05/18 18:00)
http://www3.nhk.or.jp/news/html/20170518/k10010986481000.html
【初期侵入経路】
◆「Wannacry」の初期侵入はバックドア経由--Malwarebytesが指摘 (ZDNet, 2017/05/22 13:01)
https://japan.zdnet.com/article/35101516/
◆「WannaCry」の拡散、電子メールが原因ではなかった セキュリティ企業が分析結果公表 (ITmedia, 2017/05/22 07:40)
http://www.itmedia.co.jp/enterprise/articles/1705/22/news057.html
【感染OS】
◆「WannaCry」感染の98%は「Windows 7」で「XP」はほぼゼロ (ITMedia, 2017/05/20 19:12)
http://www.itmedia.co.jp/news/articles/1705/20/news034.html
【セキュリティベンダー解析情報】
◆The worm that spreads WanaCrypt0r (MalwareBytes, 2017/5/12)
https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/
◆Cylance vs. WannaCry-WanaCrypt0r 2.0 (Cylance, 2017/05/12)
https://www.cylance.com/en_us/blog/cylance-vs-wannacry-wanacrypt0r-2-0.html
◆An Analysis of the WANNACRY Ransomware outbreak (McAfee, 2017/05/12)
https://securingtomorrow.mcafee.com/business/analysis-wannacry-ransomware-outbreak/
◆Avast reports on WanaCrypt0r 2.0 ransomware that infected NHS and Telefonica. (AVAST, 2017/05/12)
https://blog.avast.com/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today
◆Player 3 Has Entered the Game: Say Hello to 'WannaCry'(Cisco Talos, 2017/05/12)
http://blog.talosintelligence.com/2017/05/wannacry.html
◆WannaCry ransomware used in widespread attacks all over the world (SECURELIST, 2017/05/12 17:30)
https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/
◆Wanna Decryptor (WNCRY) Ransomware Explained (Rapid7, 2017/05/12)
https://community.rapid7.com/community/infosec/blog/2017/05/12/wanna-decryptor-wncry-ransomware-explained
◆WannaCrypt ransomware worm targets out-of-date systems (Microsoft, 2017/05/12)
https://blogs.technet.microsoft.com/mmpc/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/
◆How to Accidentally Stop a Global Cyber Attacks (MalwareTech, 2017/05/13)
https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html
◆WannaCry (Arbor, 2017/05/13)
https://www.arbornetworks.com/blog/asert/wannacry/
◆WCry/WanaCry Ransomware Technical Analysis (ENDGAME, 2017/05/14)
https://www.endgame.com/blog/wcrywanacry-ransomware-technical-analysis
◆トレンド、週末24時間に「WannaCrypt」を数百件検出 - 拡散に「Dropbox」も悪用 (Security NEXT, 2017/05/15)
http://www.security-next.com/081633
◆重要な更新情報: WannaCryランサムウェア (Fortinet, 2017/05/15)
http://www.fortinet.co.jp/security_blog/170515-wannacry-ransomware.html
◆ランサムウェアWannaCryに関するさらなる分析 (McAfee, 2017/05/16)
http://blogs.mcafee.jp/mcafeeblog/2017/05/wannacry-651e.html
◆ランサムウェア「WannaCry/Wcry」のワーム活動を解析:侵入/拡散手法に迫る (Trendmicro, 2017/05/18)
http://blog.trendmicro.co.jp/archives/14920
◆ランサムウェア「WannaCry」の現状をKasperskyが解説 (Internet Watch, 2017/05/18 16:23)
http://internet.watch.impress.co.jp/docs/news/1060364.html
◆「WannaCry 2.0」の内部構造を紐解く (MBSD, 2017/05/18)
http://www.mbsd.jp/blog/20170518.html
◆英Sophos、ガイダンスやタイムラインなどWannaCry分析資料 (マイナビニュース, 2017/05/24)
http://news.mynavi.jp/news/2017/05/24/106/
◆WannaCry: how the attack happened (Sophos, 2017/05/19)
https://news.sophos.com/en-us/2017/05/19/wannacry-how-the-attack-happened/
【インシデント(日本)】
◆大規模サイバー攻撃、日本国内で確認されず (日経新聞, 2017/05/13 10:01)
http://www.nikkei.com/article/DGXLASDG13H2F_T10C17A5MM0000/
◆日本でもサイバー攻撃確認 (共同通信, 2017/05/13)
https://this.kiji.is/236089284718870531
◆世界規模サイバー攻撃 日本でも2件の被害 (日テレ, 2017/05/15 01:40)
http://www.news24.jp/nnn/news890149198.html
◆トレンド、週末24時間に「WannaCrypt」を数百件検出 - 拡散に「Dropbox」も悪用 (Security NEXT, 2017/05/15)
http://www.security-next.com/081633
◆ランサムウェア被害、国内にも--日立製作所とJR東日本で感染を確認 (CNet, 2017/05/15 18:26)
https://japan.cnet.com/article/35101178/
◆茨城・日立の日立総合病院でメール不具合 (産経新聞, 2017/05/15 19:13)
http://www.sankei.com/affairs/news/170515/afr1705150026-n1.html
◆川崎市やJRでサイバー攻撃被害 (NHK, 2017/05/15 20:38)
http://www3.nhk.or.jp/shutoken-news/20170515/3424951.html
◆国内600カ所・2000端末感染か 日立ではシステム障害 (産経新聞, 2017/05/15 21:18)
http://www.sankei.com/affairs/news/170515/afr1705150028-n1.html
◆サイバー被害の日立 受注・発注システムにも障害 (NHK, 2017/05/16 00:55)
http://www3.nhk.or.jp/news/html/20170516/k10010983001000.html
◆サイバー攻撃 日本での被害 21件確認 (NHK, 2017/05/18 13:41)
http://www3.nhk.or.jp/news/html/20170518/k10010986101000.html?utm_int=detail_contents_news-related-auto_001
【感染規模(海外)】
◆世界各国で大規模サイバー攻撃 病院や大手企業が被害 (AFP BB NEWS, 2017/05/13 07:15)
http://www.afpbb.com/articles/-/3128068?page=2
◆74カ国で大規模サイバー攻撃=4万5000件、日本も被害か (時事通信, 2017/05/13 07:57)
http://www.jiji.com/jc/article?k=2017051300263&g=soc
◆世界100カ国でサイバー攻撃 5万件超 英国病院で大規模被害、日本も (産経新聞, 2017/05/13 08:06)
http://www.sankei.com/world/news/170513/wor1705130013-n1.html
◆複数の英病院にランサムウエア攻撃、被害は世界に (CNN, 2017/05/13 10:15)
https://www.cnn.co.jp/tech/35101103.html
◆世界99カ国で大規模サイバー攻撃、ルノーは生産停止 (ITmedia, 2017/05/15 10:29)
http://www.itmedia.co.jp/business/articles/1705/15/news062.html
◆大規模サイバー攻撃、99カ国で被害 身代金要求型 (日経新聞, 2017/05/13 12:55)
http://www.nikkei.com/article/DGXLASGN12H1Y_S7A510C1000000/
◆イギリス各地で国営の病院にサイバー攻撃 (NHK, 2017/05/13 19:20)
http://www3.nhk.or.jp/news/html/20170513/k10010980041000.html
◆サイバー攻撃の被害、150カ国で20万件 週明けさらに拡大の恐れ (CNN, 2017/05/15 12:44)
https://www.cnn.co.jp/tech/35101152.html?tag=top;topStories
◆身代金ウイルス「WannaCry」、国内で1900台の感染確認 (ベトジョー ベトナムニュース, 2017/05/19 15:28)
http://www.viet-jo.com/news/social/170519043025.html
◆「サイバーセキュリティ最悪の日になり得た」WannaCryが悪用する脆弱性情報の流出 (Internet Watch, 2017/05/19 15:19)
感染台数は17日時点で、少なくとも33万8765台に
http://internet.watch.impress.co.jp/docs/news/1060589.html
【インシデント(海外)】
◆仏自動車大手ルノーも世界的なサイバー攻撃の被害に (AFP BB NEWS, 2017/05/13 19:33)
http://www.afpbb.com/articles/-/3128127
◆大規模サイバー攻撃、日系企業にも被害 日産英国工場 (日経新聞, 2017/05/13 22:44)
http://www.nikkei.com/article/DGXLASDZ13HCU_T10C17A5MM8000/
◆Wanna Cry ransomware cyber attack: 104 countries hit, India among worst affected, US NSA attracts criticism (indiatoday, 2017/05/14)
◆世界大規模サイバー攻撃、中国でも被害が広がる (大紀元, 2017/05/14 17:00)
http://www.epochtimes.jp/2017/05/27359.html
◆世界99カ国で大規模サイバー攻撃、ルノーは生産停止 (ITmedia, 2017/05/15 10:29)
http://www.itmedia.co.jp/business/articles/1705/15/news062.html
◆英医療機関、ランサムウェアの被害拡大を懸念 (BBC, 2017/05/15 18:00)
http://www.bbc.com/japanese/39918853
◆スペインでランサムウェア「WannaCry」の大規模拡散が発生 (ASCII.jp, 2017/05/15 19:20)
http://ascii.jp/elem/000/001/483/1483148/
【暗号解読】
◆WannaCryに感染したWindows XP、支払いせずとも復号に成功 (マイナビニュース, 2017/05/20)
http://news.mynavi.jp/news/2017/05/20/110/
【身代金】
◆サイバー攻撃「金銭支払いでデータ回復例なし」 (読売新聞, 2017/05/17 06:36)
http://www.yomiuri.co.jp/world/20170517-OYT1T50000.html?from=ytop_main7
【BITCOIN】
◆BitCoinの身代金送金状況
https://misentropic.com/wannacry_graph.html
【作成者】
◆WannaCryランサムウェアから北朝鮮ハッカーのコード見つかる。断定は時期尚早も、背景には国家的な関与? (engadget, 2017/05/16)
http://japanese.engadget.com/2017/05/16/wannacry/
◆ロシア大統領、サイバー攻撃への関与否定 (ロイター, 2017/05/15)
http://jp.reuters.com/article/cyber-attacks-putin-idJPKCN18B1BX
◆サイバー被害なお拡大か-背後にロシア語ハッカーとの見方も (Bloomberg, 2017/05/15 06:41)
https://www.bloomberg.co.jp/news/articles/2017-05-14/OPYN4R6JTSE801
◆世界大規模サイバー攻撃、中国でも被害が広がる (大紀元, 2017/05/14 17:00)
http://www.epochtimes.jp/2017/05/27359.html
◆大規模サイバー攻撃、専門家を悩ませる「奇妙な謎」 (ITmedia, 2017/05/18 11:30)
わずか数時間で100カ国以上に拡散した身代金要求型ウイルス「WannaCry」だが……
http://www.itmedia.co.jp/business/articles/1705/18/news080.html
◆大規模サイバー攻撃、北朝鮮との関連を調査=セキュリティー会社 (ITmedia, 2017/05/16 12:40)
http://www.itmedia.co.jp/business/articles/1705/16/news093.html
◆世界的サイバー攻撃、北朝鮮が関与を否定 (AFP BB NEWS, 2017/05/20)
http://www.afpbb.com/articles/-/3128883?cx_part=topstory
◆「WannaCry」脅迫文は中国語ネイティブが執筆か--言語分析で新たな手がかり (ZDNet, 2017/05/26 11:00)
https://japan.zdnet.com/article/35101786/
◆世間を騒がせた「WannaCry」作成者の国籍が明らかに!? (Sputnik, 2017/05/30 00:30)
https://jp.sputniknews.com/science/201705303688937/
【亜種(Uiwix)】
◆ランサムウェア「WannaCry」、キルスイッチをなくした亜種「Uiwix」が登場 (ZDNet, 2017/05/16 10:02)
https://japan.zdnet.com/article/35101198/
◆ランサムウェア「WannaCry」、キルスイッチを回避した亜種登場で"いたちごっこ" (マイナビニュース, 2017/05/16)
http://news.mynavi.jp/news/2017/05/16/107/
◆Security Alert: Uiwix Ransomware Spotted in the Wild, Could Add to WannaCry Damage [Updated] (Heimdal, 2017/05/14)
https://heimdalsecurity.com/blog/security-alert-uiwix-ransomware/
【ニュース】
◆What is 'WanaCrypt0r 2.0' ransomware and why is it attacking the NHS? (theguardian, 2017/05/12)
https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
◆大規模サイバー攻撃 米開発の技術盗まれ悪用か (NHK, 2017/05/14 06:03)
http://www3.nhk.or.jp/news/html/20170514/k10010980751000.html
◆身代金要求型の大規模サイバー攻撃、事態収束も警戒なお必要と専門家 (Bloomberg, 2017/05/13 15:02)
https://www.bloomberg.co.jp/news/articles/2017-05-13/OPVJIP6JTSE801
◆ランサムウェア攻撃 匿名の研究者が拡大を「偶然」阻止 (CNN, 2017/05/14 12:31)
https://www.cnn.co.jp/tech/35101114.html
◆G7声明 サイバー攻撃の脅威増し対応強化必要 (NHK, 2017/05/13 20:15)
http://www3.nhk.or.jp/news/html/20170513/k10010980481000.html?utm_int=detail_contents_news-related-auto_002
◆世界パニックのランサムウェア「WannaCry」被害&対処まとめ(日本語脅迫文は誤訳でおかしなことに) (Gizmodo, 2017/05/15 11:03)
http://www.gizmodo.jp/2017/05/wanacrypt0r-20-attack.html
◆誰が何のために?--マルウェア「Wannacry」で残る3つの謎 (ZDNet, 2017/05/19 17:59)
https://japan.zdnet.com/article/35101453/
【対策情報】
◆ランサムウェア WannaCrypt 攻撃に関するお客様ガイダンス (Microsoft, 2017/05/14)
https://blogs.technet.microsoft.com/jpsecurity/2017/05/14/ransomware-wannacrypt-customer-guidance/
◆Customer Guidance for WannaCrypt attacks (Microsoft, 2017/05/14)
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
【検知情報】
◆UPDATED: Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks (paloalto, 2017/05/13)
http://researchcenter.paloaltonetworks.com/2017/05/palo-alto-networks-protections-wanacrypt0r-attacks/
◆「WannaCrypt」も関連する「EternalBlue」による脆弱性狙ったアクセス、4月下旬より増加 (Security NEXT, 2017/05/15)
http://www.security-next.com/081673
【バッチ提供情報】
◆世界規模のランサムウェア攻撃でMicrosoftが異例の「Windows XP」パッチ公開 (ITmedia, 2017/05/14 06:32)
5月12日に世界規模で発生した「WannaCry」攻撃を受け、Microsoftが同日、既にサポート対象外になっている「Windows XP」や「Windows 8」向けのパッチも公開した
http://www.itmedia.co.jp/news/articles/1705/14/news016.html
◆サポート切れウィンドウズにも、無料修正ソフト (読売新聞, 2017/05/14 19:28)
http://www.yomiuri.co.jp/economy/20170514-OYT1T50096.html
◆WannaCry対策、MSがWindows XPやServer 2003にも異例のパッチ提供 (ASCII.jp, 2017/05/14)
http://ascii.jp/elem/000/001/482/1482839/
【脆弱性情報】
◆大規模な暗号化型ランサムウェア「WannaCry/Wcry」の攻撃、世界各国で影響 (Trendmicro, 2017/05/13)
http://blog.trendmicro.co.jp/archives/tag/ms17-010
◆CVE-2017-0144 (Mitre)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0144
【攻撃ツール】
◆MS17-010 SMBv1 SrvOs2FeaToNt OOB Remote Code Execution (Packet Storm, 2017/05/10)
https://packetstormsecurity.com/files/142464/MS17-010-SMBv1-SrvOs2FeaToNt-OOB-Remote-Code-Execution.html
◆攻撃ツール「Eternalblue」を悪用した攻撃と考えられるアクセスの観測について (警察庁, 2017/05/15)
http://www.npa.go.jp/cyberpolice/important/2017/201705151.html
◆misterch0c/shadowbroker (GIT-HUB)
https://github.com/misterch0c/shadowbroker
【ブログ】
◆世界各地で発生したランサムウェア WannaCry 2.0 の感染事案についてまとめてみた (piyolog, 2017/05/13)
http://d.hatena.ne.jp/Kango/20170513/1494700355
【関連情報】
◆WannaCry (まとめ) (TT Malware Log, 2017/05/12)
⇒ http://malware-log.hatenablog.com/entry/WannaCry
■攻撃ツール「Eternalblue」を悪用した攻撃と考えられるアクセスの観測について
■Uiwix
【検体情報】
■Sha256
- 4b76e54de0243274f97430b26624c44694fbde3289ed81a160e0754ab9f56f32
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- b47e281bfbeeb0758f8c625bed5c5a0d27ee8e0065ceeadd76b0010d226206f0
- 16493ecc4c4bc5746acbe96bd8af001f733114070d694db76ea7b5a0de7ad0ab
- 57c12d8573d2f3883a8a0ba14e3eec02ac1c61dee6b675b6c0d16e221c3777f4
- 190d9c3e071a38cb26211bfffeb6c4bb88bd74c6bf99db9bb1f084c6a7e1df4e
- 78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- a3900daf137c81ca37a4bf10e9857526d3978be085be265393f98cb075795740
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- 11d0f63c06263f50b972287b4bbd1abe0089bc993f73d75768b6b41e3d6f6d49
- 201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- fc626fe1e0f4d77b34851a8c60cdd11172472da3b9325bfe288ac8342f6c710a
- dff26a9a44baa3ce109b8df41ae0a301d9e4a28ad7bd7721bbb7ccd137bfd696
- b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
- 940dec2039c7fca4a08d08601971836916c6ad5193be07a88506ba58e06d4b4d
- b66db13d17ae8bcaf586180e3dcd1e2e0a084b6bc987ac829bbff18c3be7f8b4
- 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
- 2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41d
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- eeb9cd6a1c4b3949b2ff3134a77d6736b35977f951b9c7c911483b5caeb1c1fb
- 3f3a9dde96ec4107f67b0559b4e95f5f1bca1ec6cb204bfe5fea0230845e8301
- 9fb39f162c1e1eb55fbf38e670d5e329d84542d3dfcdc341a99f5d07c4b50977
- 043e0d0d8b8cda56851f5b853f244f677bd1fd50f869075ef7ba1110771f70c2
(以上は Trendmicroの情報: http://blog.trendmicro.co.jp/archives/14873)
- 043e0d0d8b8cda56851f5b853f244f677bd1fd50f869075ef7ba1110771f70c2
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- 11d0f63c06263f50b972287b4bbd1abe0089bc993f73d75768b6b41e3d6f6d49
- 16493ecc4c4bc5746acbe96bd8af001f733114070d694db76ea7b5a0de7ad0ab
- 190d9c3e071a38cb26211bfffeb6c4bb88bd74c6bf99db9bb1f084c6a7e1df4e
- 201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9
- 2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41d
- 3f3a9dde96ec4107f67b0559b4e95f5f1bca1ec6cb204bfe5fea0230845e8301
- 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
- 4b76e54de0243274f97430b26624c44694fbde3289ed81a160e0754ab9f56f32
- 57c12d8573d2f3883a8a0ba14e3eec02ac1c61dee6b675b6c0d16e221c3777f4
- 78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
- 940dec2039c7fca4a08d08601971836916c6ad5193be07a88506ba58e06d4b4d
- 9fb39f162c1e1eb55fbf38e670d5e329d84542d3dfcdc341a99f5d07c4b50977
- a3900daf137c81ca37a4bf10e9857526d3978be085be265393f98cb075795740
- b47e281bfbeeb0758f8c625bed5c5a0d27ee8e0065ceeadd76b0010d226206f0
- b66db13d17ae8bcaf586180e3dcd1e2e0a084b6bc987ac829bbff18c3be7f8b4
- b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- dff26a9a44baa3ce109b8df41ae0a301d9e4a28ad7bd7721bbb7ccd137bfd696
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- eeb9cd6a1c4b3949b2ff3134a77d6736b35977f951b9c7c911483b5caeb1c1fb
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- fc626fe1e0f4d77b34851a8c60cdd11172472da3b9325bfe288ac8342f6c710a
(以上は Trendmicroの情報: https://blog.trendmicro.com/trendlabs-security-intelligence/massive-wannacrywcry-ransomware-attack-hits-various-countries/)
- dff26a9a44baa3ce109b8df41ae0a301d9e4a28ad7bd7721bbb7ccd137bfd696
- 201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
- aae9536875784fe6e55357900519f97fee0a56d6780860779a36f06765243d56
- 21ed253b796f63b9e95b4e426a82303dfac5bf8062bfe669995bde2208b360fd
- 2372862afaa8e8720bc46f93cb27a9b12646a7cbc952cc732b8f5df7aebb2450
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
- 4b76e54de0243274f97430b26624c44694fbde3289ed81a160e0754ab9f56f32
- 9cc32c94ce7dc6e48f86704625b6cdc0fda0d2cd7ad769e4d0bb1776903e5a13
- 78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
- be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
- 5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9
- 76a3666ce9119295104bb69ee7af3f2845d23f40ba48ace7987f79b06312bbdf
- fc626fe1e0f4d77b34851a8c60cdd11172472da3b9325bfe288ac8342f6c710a
- eeb9cd6a1c4b3949b2ff3134a77d6736b35977f951b9c7c911483b5caeb1c1fb
- 043e0d0d8b8cda56851f5b853f244f677bd1fd50f869075ef7ba1110771f70c2
- 57c12d8573d2f3883a8a0ba14e3eec02ac1c61dee6b675b6c0d16e221c3777f4
- ca29de1dc8817868c93e54b09f557fe14e40083c0955294df5bd91f52ba469c8
- f7c7b5e4b051ea5bd0017803f40af13bed224c4b0fd60b890b6784df5bd63494
- 3e6de9e2baacf930949647c399818e7a2caea2626df6a468407854aaa515eed9
- 9b60c622546dc45cca64df935b71c26dcf4886d6fa811944dbc4e23db9335640
- 5ad4efd90dcde01d26cc6f32f7ce3ce0b4d4951d4b94a19aa097341aff2acaec
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- 12d67c587e114d8dde56324741a8f04fb50cc3160653769b8015bc5aec64d20b
- 85ce324b8f78021ecfc9b811c748f19b82e61bb093ff64f2eab457f9ef19b186
- 3f3a9dde96ec4107f67b0559b4e95f5f1bca1ec6cb204bfe5fea0230845e8301
(以上は McAfeeの情報: https://securingtomorrow.mcafee.com/business/analysis-wannacry-ransomware-outbreak/)
- 7E369022DA51937781B3EFE6C57F824F05CF43CBD66B4A24367A19488D2939E4
- 9B60C622546DC45CCA64DF935B71C26DCF4886D6FA811944DBC4E23DB9335640
- 4A468603FDCB7A2EB5770705898CF9EF37AADE532A7964642ECD705A74794B79
- 09A46B3E1BE080745A6D8D88D6B5BD351B1C7586AE0DC94D0C238EE36421CAFA
- 4186675CB6706F9D51167FB0F14CD3F8FCFB0065093F62B10A15F7D9A6C8D982
- 5AD4EFD90DCDE01D26CC6F32F7CE3CE0B4D4951D4B94A19AA097341AFF2ACAEC
- 00FDB4C1C49AEF198F37B8061EB585B8F9A4D5E6C62251441831FE2F6A0A25B7
- B9C5D4339809E0AD9A00D4D3DD26FDF44A32819A54ABF846BB9B560D81391C25
- 2584E1521065E45EC3C17767C065429038FC6291C091097EA8B22C8A502C41DD
- 2CA2D550E603D74DEDDA03156023135B38DA3630CB014E3D00B1263358C5F00D
- ED01EBFBC9EB5BBEA545AF4D01BF5F1071661840480439C6E5BABE8E080E41AA
- C365DDAA345CFCAFF3D629505572A484CFF5221933D68E4A52130B8BB7BADAF9
- 201F42080E1C989774D05D5B127A8CD4B4781F1956B78DF7C01112436C89B2C9
- CA29DE1DC8817868C93E54B09F557FE14E40083C0955294DF5BD91F52BA469C8
- 7108D6793A003695EE8107401CFB17AF305FA82FF6C16B7A5DB45F15E5C9E12D
- 7C465EA7BCCCF4F94147ADD808F24629644BE11C0BA4823F16E8C19E0090F0FF
- 24D004A104D4D54034DBCFFC2A4B19A11F39008A575AA614EA04703480B1022C
- 4B76E54DE0243274F97430B26624C44694FBDE3289ED81A160E0754AB9F56F32
- F8812F1DEB8001F3B7672B6FC85640ECB123BC2304B563728E6235CCBE782D85
- DFF26A9A44BAA3CE109B8DF41AE0A301D9E4A28AD7BD7721BBB7CCD137BFD696
- AEE20F9188A5C3954623583C6B0E6623EC90D5CD3FDEC4E1001646E27664002C
- 2372862AFAA8E8720BC46F93CB27A9B12646A7CBC952CC732B8F5DF7AEBB2450
- 43D1EF55C9D33472A5532DE5BBE814FEFA5205297653201C30FDC91B8F21A0ED
- 49FA2E0131340DA29C564D25779C0CAFB550DA549FAE65880A6B22D45EA2067F
- 616E60F031B6E7C4F99C216D120E8B38763B3FAFD9AC4387ED0533B15DF23420
- 49FA2E0131340DA29C564D25779C0CAFB550DA549FAE65880A6B22D45EA2067F
- 616E60F031B6E7C4F99C216D120E8B38763B3FAFD9AC4387ED0533B15DF23420
- 24D004A104D4D54034DBCFFC2A4B19A11F39008A575AA614EA04703480B1022C
- 043E0D0D8B8CDA56851F5B853F244F677BD1FD50F869075EF7BA1110771F70C2
- 5D26835BE2CF4F08F2BEEFF301C06D05035D0A9EC3AFACC71DFF22813595C0B9
- 76A3666CE9119295104BB69EE7AF3F2845D23F40BA48ACE7987F79B06312BBDF
- BE22645C61949AD6A077373A7D6CD85E3FAE44315632F161ADC4C99D5A8E6844
- F7C7B5E4B051EA5BD0017803F40AF13BED224C4B0FD60B890B6784DF5BD63494
- FC626FE1E0F4D77B34851A8C60CDD11172472DA3B9325BFE288AC8342F6C710A
- 09A46B3E1BE080745A6D8D88D6B5BD351B1C7586AE0DC94D0C238EE36421CAFA
- AEE20F9188A5C3954623583C6B0E6623EC90D5CD3FDEC4E1001646E27664002C
- C365DDAA345CFCAFF3D629505572A484CFF5221933D68E4A52130B8BB7BADAF9
(以上は US-CERTの情報: https://www.us-cert.gov/sites/default/files/ALERT_TA17-132A.xlsx)
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- 2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41dd
- 2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
- 4A468603FDCB7A2EB5770705898CF9EF37AADE532A7964642ECD705A74794B79
- B9C5D4339809E0AD9A00D4D3DD26FDF44A32819A54ABF846BB9B560D81391C25
- d8a9879a99ac7b12e63e6bcae7f965fbf1b63d892a8649ab1d6b08ce711f7127
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- 0a73291ab5607aef7db23863cf8e72f55bcb3c273bb47f00edf011515aeb5894
- 428f22a9afd2797ede7c0583d34a052c32693cbb55f567a60298587b6e675c6f
- 5c1f4f69c45cff9725d9969f9ffcf79d07bd0f624e06cfa5bcbacd2211046ed6
- 62d828ee000e44f670ba322644c2351fe31af5b88a98f2b2ce27e423dcf1d1b1
- 72af12d8139a80f317e851a60027fdf208871ed334c12637f49d819ab4b033dd
- 85ce324b8f78021ecfc9b811c748f19b82e61bb093ff64f2eab457f9ef19b186
- a1d9cd6f189beff28a0a49b10f8fe4510128471f004b3e4283ddc7f78594906b
- a93ee7ea13238bd038bcbec635f39619db566145498fe6e0ea60e6e76d614bd3
- b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c
- eb47cd6a937221411bb8daf35900a9897fb234160087089a064066a65f42bcd4
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- 2c2d8bc91564050cf073745f1b117f4ffdd6470e87166abdfcd10ecdff040a2e
- 7a828afd2abf153d840938090d498072b7e507c7021e4cdd8c6baf727cafc545
- a897345b68191fd36f8cefb52e6a77acb2367432abb648b9ae0a9d708406de5b
- fb0b6044347e972e21b6c376e37e1115dab494a2c6b9fb28b92b1e45b45d0ebc
- 9588f2ef06b7e1c8509f32d8eddfa18041a9cc15b1c90d6da484a39f8dcdf967
- b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c
- 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
(以上は Talos(CISCO)の情報: http://blog.talosintelligence.com/2017/05/wannacry.html)
- 01b628fa60560c0cb4a332818cb380a65d0616d19976c084e0c3eaa433288b88
- 03363f9f6938f430a58f3f417829aa3e98875703eb4c2ae12feccc07fff6ba47
- 03b04cc3f9d64cf981be6aeb3ce0cf6a8694ecfc7425ac99bf03cd40e9550218
- 065e46dbdf5251bf334f6a383fbaef19be8da04d2b5692f1aba6f9b533b40974
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- 0a73291ab5607aef7db23863cf8e72f55bcb3c273bb47f00edf011515aeb5894
- 0caa1566e439c01d88c953382b26f9d2f7f279594ebe986c06e7781a71cf9d74
- 0db91ff8822f1623fe36d712b5f56d339dc21008f1ecc617a5de2f522039c5b3
- 0fc245e8a1134e31b7687fb7501faa05628813c87b9561ee26f2092cb76e5a36
- 11011a590796f6c52b046262f2f60694310fa71441363d9116ada7248e58509a
- 11d0f63c06263f50b972287b4bbd1abe0089bc993f73d75768b6b41e3d6f6d49
- 1214e010178a1bdab5ce0ee9fe1bd2ef425f1a315798afa1390a98f8e3857898
- 14f124f2dff97ca2d0fa8c53f1225c5307b50b43b4a401d2a708b0c1c12584dc
- 16493ecc4c4bc5746acbe96bd8af001f733114070d694db76ea7b5a0de7ad0ab
- 1b974d46cde9f6e837ec369120dd2727eb774ca58fa8d552b9baeb2c41fc0cdc
- 1be07198c324c9732d4e2676945ec021eeacd78775aea2100f49ca0483d3f901
- 1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830
- 1d55e742356c5318e59ff68111f0b6468fc75daad48d3cf9c277d8123b5baac3
- 1f14937ccb88737f786a247fc91ea99338f8f99a42852d8fbc3fdce4d7b5ce75
- 2134dd25d73096e4c0c88fd2496c1774b8f4d3a9d576b9060318d78cf31feb69
- 22ccdf145e5792a22ad6349aba37d960db77af7e0b6cae826d228b8246705092
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- 2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41dd
- 2802fc1434fe2f8f02ce074c67a32bb3b13b5ecc598c0f026c965fc3be3e8ce1
- 290f06eb156695165317a4b7f9668be7ae18cf8322e4fc2aeeb0af3dd6bc0801
- 295c33e0b7c7be8081a5930d0cf5454af3b0b801da6126e4402365ece539c4da
- 29611b3b709c2faab693d1d6cb2d104f48f4ef0dfee9d3e0d82e61673902934d
- 2a5f6043855a9bd09c9d765c438a33efd0fbca3c9199a68e73103eb3685a722c
- 2bc87f1bbfdb23fe503ef89bcbf6908ffd7218433e0fbfa51282c0dc51dece01
- 2bf05a1e4cba313e400d48e9a40e1b4bb1cdee9dd5b539b5a1d5420d74cc6a0f
- 2c53cb08978c62cebcb561cbc7edf59592544c13cf60cc0ef317f94a9f48e1a2
- 2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
- 2cea9032615df2e36a25bdc95542c2865a009589c8bd8bc612d903a268be37b9
- 31c2024d0df684a968115e4c3fc5703ef0ea2de1b69ece581589e86ba084568a
- 3351c7e77d06b512cedb8fbbf91c197bff95479a346de858699726b0fe6fb3f5
- 3463ea99389ef4836cfe0565539ee80c4c3a8159930c408f86147a59632d593a
- 3857448d484e1257dc9f19e940b3422c5c8ddac3ff759fa568087c6c5b4303f4
- 38b56d0106ffd672e19bdafb0b379177f6148bdd7ac6746b2c902986dbacc753
- 38c6efb48b32a3f22cc4c307e9043d59aedb0e008300663f83803819e5f260b3
- 39e4284f74ba4f057048acef80e7dbace207b77f8f1d9bc11c89804c9775a6f0
- 3ad802bf86dd42aac0721302d15ffedba36c36591f7a7cdec50cc2f9941049d4
- 3bdb6c85d9b8d3024f47112c18bbb8e653f7624893e27af8e0e226acc92cc634
- 3dcbb0c3ede91f8f2e9efb0680fe0d479ff9b9cd94906a86dec415f760c163e1
- 3f3a9dde96ec4107f67b0559b4e95f5f1bca1ec6cb204bfe5fea0230845e8301
- 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
- 470dfc18e05c01ebd66fb8b320ff7e6e76d8017feb530fb23b981982c737b490
- 498b8b889bb1f02a377a6a8f0e39f9db4e70cccad820c6e5bc5652e989ae6204
- 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
- 4ac6310fbd64135ae28cfbd2a06b0370aabe7b7c11ad7213532236b53a554330
- 4c69f22dfd92b54fbc27f27948af15958adfbc607d68d6ed0faca394c424ccee
- 4e452d88eadd0ca11539d18bbf7a0ef243dc06c6df230f5dbb7310dc00ec62e3
- 4e5e41e90191707c18c4db385871ebc6c143663968e68994e65fd238025bcf33
- 5366d1a9a5c277e382ad745e01909effa777731e448354389ab706e17a8a7577
- 55454390f7be33ab5c11b5e0683800dd9a892ce136f1962b0989526fff5592d5
- 55640108459b93e85c66c1f099b5e3df145da8700b0573fc7619b921d2cde4a8
- 55e1f8362676a8f79c3af8d1605f330d58443d0509888703f37edfb77a5aec28
- 565c4e1f84996c1cbf1dec1aa301bcda0cdcb1df3a7c531cb574a0d35b17d706
- 593bbcc8f34047da9960b8456094c0eaf69caaf16f1626b813484207df8bd8af
- 59f30cc60faefacd60327e0562a6fd885d6d7f343658ea7843e56cf8725b8443
- 5a7c7f50d61c3c3de0ce6970f8b244186bf34bef7ed193eb33005f3d66fe2545
- 5ad4efd90dcde01d26cc6f32f7ce3ce0b4d4951d4b94a19aa097341aff2acaec
- 5b4322ec672fdfeb292941057125d00afcf1a904e31f9ec0fb9e650177dba500
- 5cdd80ec5d4797ed6e5039d84ea3a9d4aa9171c6aeed34a0d717d6b0782db013
- 5d8123db7094540954061ab1fbc56eedcd9e01110b62d0f54206e3e75a39776a
- 5dee2ac983640d656f9c0ef2878ee34cda5e82a52d3703f84278ac372877346d
- 5e4e5966d893c1ba3ff427c893d6ddd635a117878de265787ee96abfe3e728f4
- 5f2b33deee53390913fd5fb3979685a3db2a7a1ee872d47efc4f8f7d9438341f
- 623c84b1bbf30ffaa8e8b28587b3c072b817a8b64cbaac698663178662dfc81c
- 62d828ee000e44f670ba322644c2351fe31af5b88a98f2b2ce27e423dcf1d1b1
- 63c8a30963265353532d80a41cae5d54b31e5c2d6b2a92551d6f6dcadd0dedeb
- 67db4c0c444758bd5debbb3aad18e3cfcd3f04d51e9eae8c633c0a6174e8d27c
- 6843b32928fa10365c31a71bf7786f5576e731cc395576b23af71ea26fdba75f
- 687c33436156410b764e80f8d12ae745f178f0ce685931af3d6aff207b185c06
- 6a1da955b2eb6be429b2e3b4b515436f5f76fd62802d4e2aa79dc63770d80be0
- 6bf1839a7e72a92a2bb18fbedf1873e4892b00ea4b122e48ae80fac5048db1a7
- 6fba72ddd939c8e22efb4ec1a42d72299cb061524600acd7104bea421eabceba
- 71deace25a88a120229b93e133ad54726044cb888a2858a441bf6913cad6d668
- 7a515968c18102f5fa2d66573e94dc0d18745d9c5abd5781d80bec9b47960295
- 7bb9ea2c0f53fa96883c54fa4b107764a6319f6026e4574c9feec2cb7d9e7d21
- 7c465ea7bcccf4f94147add808f24629644be11c0ba4823f16e8c19e0090f0ff
- 7e369022da51937781b3efe6c57f824f05cf43cbd66b4a24367a19488d2939e4
- 7edc4f216f4002a76e6c20616fea74c649b31da01fd65a73fd52bdcd929b3f48
- 7fbd1fa40986a359951dd20f31a10f1a3753b46cc06e575030b9353474ac3667
- 8215640b3572bc67478365f42913b247a18702df4155492f4feed59860cfd56a
- 8631e5020027543c2353560b6a604b3df1892210bded678d6337d84c9d16a4e8
- 86ba25d63cd96e826073339c26993b0fdec6613283dd05fbe4481c0c0b278d10
- 88be9ee3ce0f85086aec1f2f8409247e8ab4a2a7c8a07af851f8df9814adeee5
- 8c6c481e18b96eb4bcae87cdd3aa104757cb1a19740bc145d73d653c34274c81
- 9174c0772a5f871e58c385c01eea1ed4b706675bf9bd6aa1667b9d3c40acb6fc
- 91d7433fc106172b8de564dbacd8489806a652223d5b93ea51593027e13ef087
- 940dec2039c7fca4a08d08601971836916c6ad5193be07a88506ba58e06d4b4d
- 942bd43d9e3fbce9b110964b3b4af284b62da86b278b8145d97c455ee10a355c
- 95f3238c90a0fc265800569a7638c14feac44d735e590f4e7ef137d49b2f6d14
- 99a8ab5be4bc755989479049267a2cfeda3b54af08fc0ea3037578e94cf470e4
- 99ef8c1bb5b4060958e6db5b092ddd167e307a7cf34d366afabdb5ceb1a9035d
- 9b60c622546dc45cca64df935b71c26dcf4886d6fa811944dbc4e23db9335640
- 9df44327ad68c835e9f79355744bf868a8df6cdb54852a2ac5d7f03f4f485a1c
- 9fb39f162c1e1eb55fbf38e670d5e329d84542d3dfcdc341a99f5d07c4b50977
- 9fc129c37c545ec23b3c59e3319d31509cb9ecdd2eeed90ff8a1a99a39bfcd1c
- a02748c3078a897cff8c4c66292662712d62e39b580465251bca6851ab6931a3
- a1d23db1f1e3cc2c4aa02f33fec96346d9d5d5039ffc2ed4a3c65c34b79c5d93
- a2726df3632eba623ebb76c373ec44ba733af9483326bab4cc6a6efc67f5d566
- a74783bb813b2e053013a8ac9afdc89d250c2c086bbe9f793bec6b64bb95c9f4
- aa62afcbec704531ce9707f5b076f611abd365844c3e0a4a81f8c06739d6bb52
- aa98d85b6a5a50c91899824a6f6fac52d9580e91e1d6390610d520f66d1ce49f
- ac7f0fb9a7bb68640612567153a157e91d457095eadfd2a76d27a7f65c53ba82
- ae0ab8cb25dbf55cf19a5d928eba38be34b105b492295dc5b710b774447d8711
- b3c39aeb14425f137b5bd0fd7654f1d6a45c0e8518ef7e209ad63d8dc6d0bac7
- b47e281bfbeeb0758f8c625bed5c5a0d27ee8e0065ceeadd76b0010d226206f0
- b4d607fae7d9745f9ced081a92a2dcf96f2d0c72389a66e20059e021f0b58618
- b55d23b9df8ffe5678234a2ebc473afb3024015c2a79dfef33a1824d08396139
- b66db13d17ae8bcaf586180e3dcd1e2e0a084b6bc987ac829bbff18c3be7f8b4
- b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
- bc8136b40b4164afcbcb4e14f6fd54ca02275ff75b674eb6fd0a8f436f9b1181
- bd7824d2d96aca1f4260c92e6888c93ef6a64bd8f98d5a0ef0bbe217f0a3b9fa
- bf40d69a938e922c073632937b565015b262139884ffe138d4d9358295203b65
- bf446589a7208b81b436a0c0fe7e54c6e2994a80b07097bfef6091af3a4fe710
- c1f929afa37253d28074e8fdaf62f0e3447ca3ed9b51203f676c1244b5b86955
- c354a9a0bbb975c15e884916dce251807aae788e68725b512a95f7b580828c64
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- c38eea1588b8bffe4e19a8af09bfe17281e6e6afc7e2fbbecef3af96df9a347a
- c8c2131e1d22bff3ef6342254a43d658a3c5fc8081c4ffb7d9b0ced78b7892f1
- cce675d3970408c16a6e4fd559aaac69c30a296cc55445835594a958fe5d831c
- d8a9879a99ac7b12e63e6bcae7f965fbf1b63d892a8649ab1d6b08ce711f7127
- de1fb3f687161900f15243c0912a40bacf4df938a718c75a73f80ffc3bf3a2d3
- de7928607516e9a53e981ce98ac6349846cc7c30b787990be23531715dff1cb6
- df039caf180d9c7befc8c4b47885231721005c02344824153c65e694bf17d7b8
- e0ec1ad116d44030ad9ef5b51f18ff6160a227a46ffcf64693335c7fb946fad6
- e14f1a655d54254d06d51cd23a2fa57b6ffdf371cf6b828ee483b1b1d6d21079
- e2d1e34c79295e1163481b3683633d031cab9e086b9ae2ac5e30b08def1b0b47
- e5c117233e22d08a547c278ae7027815e22c196a083679126ab9646c781acb6c
- e5df2d114c5f69c219923fed56c8aa7ee912020ba7589e88f2729285c1f5788a
- e7a39735ee8777473c7405a70f470a0e00d6266d3126d3af59660e6a78dab2cf
- e8450dd6f908b23c9cbd6011fe3d940b24c0420a208d6924e2d920f92c894a96
- e9d1d718f760ce40f8c1d36f99abba247d8b4bcb12d6960b5e60997c896cda19
- ea1d5bfe0f011bb515b77728235401ffb698feefd0d07d232b18fe9927083c47
- eb3193a1ba0b223a852db4822456ef58c27fe51db8bc1478169b8b27a25b7d27
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- ee52964b832e1a44b92a4f0e6cde2e876d70131640856b120c0379ff8cc431aa
- ef01bcc893dd06ef87c408dd5746fed32b104a9b62dc33657cc1dfa2033e1e8f
- f0ae40aaec29c4fb88f81b62854c7fe21d16b528c1e2bb30b87ceb71f39e0ce2
- f0eb62d9726857df9ccb8dc63187b6965d5af28b9ad1dbd34891b72bf3fd4e38
- f4918e6e0dd52a8636d1dce97426c2fda9ec0ff6b3cf898f36789b9b15ab5f01
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- ff42f05929a4c386996cf6fd6286c20f2724196f2f06c6943a47eab87a83cb17
- ff8c6a2bd919496ae639347611681259c60a21762f3411da230998e443aa90cf
- ff8fcdc4cae2c9ed5207e53bb5bf1d97eef8147977d2bddfe8f55be91410f32c
(以上は AV-TESTの情報: https://www.facebook.com/avtestorg/photos/a.539657639420362.1073741831.104433409609456/1520621611323955/)
- 00fdb4c1c49aef198f37b8061eb585b8f9a4d5e6c62251441831fe2f6a0a25b7
- 01b628fa60560c0cb4a332818cb380a65d0616d19976c084e0c3eaa433288b88
- 03363f9f6938f430a58f3f417829aa3e98875703eb4c2ae12feccc07fff6ba47
- 03b04cc3f9d64cf981be6aeb3ce0cf6a8694ecfc7425ac99bf03cd40e9550218
- 043e0d0d8b8cda56851f5b853f244f677bd1fd50f869075ef7ba1110771f70c2
- 065e46dbdf5251bf334f6a383fbaef19be8da04d2b5692f1aba6f9b533b40974
- 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
- 0a73291ab5607aef7db23863cf8e72f55bcb3c273bb47f00edf011515aeb5894
- 0caa1566e439c01d88c953382b26f9d2f7f279594ebe986c06e7781a71cf9d74
- 0db91ff8822f1623fe36d712b5f56d339dc21008f1ecc617a5de2f522039c5b3
- 0fc245e8a1134e31b7687fb7501faa05628813c87b9561ee26f2092cb76e5a36
- 11011a590796f6c52b046262f2f60694310fa71441363d9116ada7248e58509a
- 11d0f63c06263f50b972287b4bbd1abe0089bc993f73d75768b6b41e3d6f6d49
- 1214e010178a1bdab5ce0ee9fe1bd2ef425f1a315798afa1390a98f8e3857898
- 12d67c587e114d8dde56324741a8f04fb50cc3160653769b8015bc5aec64d20b
- 14f124f2dff97ca2d0fa8c53f1225c5307b50b43b4a401d2a708b0c1c12584dc
- 16493ecc4c4bc5746acbe96bd8af001f733114070d694db76ea7b5a0de7ad0ab
- 190d9c3e071a38cb26211bfffeb6c4bb88bd74c6bf99db9bb1f084c6a7e1df4e
- 1b974d46cde9f6e837ec369120dd2727eb774ca58fa8d552b9baeb2c41fc0cdc
- 1be07198c324c9732d4e2676945ec021eeacd78775aea2100f49ca0483d3f901
- 1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830
- 1d55e742356c5318e59ff68111f0b6468fc75daad48d3cf9c277d8123b5baac3
- 1f14937ccb88737f786a247fc91ea99338f8f99a42852d8fbc3fdce4d7b5ce75
- 201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9
- 2134dd25d73096e4c0c88fd2496c1774b8f4d3a9d576b9060318d78cf31feb69
- 21ed253b796f63b9e95b4e426a82303dfac5bf8062bfe669995bde2208b360fd
- 22ccdf145e5792a22ad6349aba37d960db77af7e0b6cae826d228b8246705092
- 2372862afaa8e8720bc46f93cb27a9b12646a7cbc952cc732b8f5df7aebb2450
- 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
- 2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41dd
- 2802fc1434fe2f8f02ce074c67a32bb3b13b5ecc598c0f026c965fc3be3e8ce1
- 290f06eb156695165317a4b7f9668be7ae18cf8322e4fc2aeeb0af3dd6bc0801
- 295c33e0b7c7be8081a5930d0cf5454af3b0b801da6126e4402365ece539c4da
- 29611b3b709c2faab693d1d6cb2d104f48f4ef0dfee9d3e0d82e61673902934d
- 2a5f6043855a9bd09c9d765c438a33efd0fbca3c9199a68e73103eb3685a722c
- 2bc87f1bbfdb23fe503ef89bcbf6908ffd7218433e0fbfa51282c0dc51dece01
- 2bf05a1e4cba313e400d48e9a40e1b4bb1cdee9dd5b539b5a1d5420d74cc6a0f
- 2c2d8bc91564050cf073745f1b117f4ffdd6470e87166abdfcd10ecdff040a2e
- 2c53cb08978c62cebcb561cbc7edf59592544c13cf60cc0ef317f94a9f48e1a2
- 2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
- 2cea9032615df2e36a25bdc95542c2865a009589c8bd8bc612d903a268be37b9
- 31c2024d0df684a968115e4c3fc5703ef0ea2de1b69ece581589e86ba084568a
- 3351c7e77d06b512cedb8fbbf91c197bff95479a346de858699726b0fe6fb3f5
- 3463ea99389ef4836cfe0565539ee80c4c3a8159930c408f86147a59632d593a
- 3857448d484e1257dc9f19e940b3422c5c8ddac3ff759fa568087c6c5b4303f4
- 38b56d0106ffd672e19bdafb0b379177f6148bdd7ac6746b2c902986dbacc753
- 38c6efb48b32a3f22cc4c307e9043d59aedb0e008300663f83803819e5f260b3
- 39e4284f74ba4f057048acef80e7dbace207b77f8f1d9bc11c89804c9775a6f0
- 3ad802bf86dd42aac0721302d15ffedba36c36591f7a7cdec50cc2f9941049d4
- 3bdb6c85d9b8d3024f47112c18bbb8e653f7624893e27af8e0e226acc92cc634
- 3dcbb0c3ede91f8f2e9efb0680fe0d479ff9b9cd94906a86dec415f760c163e1
- 3e6de9e2baacf930949647c399818e7a2caea2626df6a468407854aaa515eed9
- 3f3a9dde96ec4107f67b0559b4e95f5f1bca1ec6cb204bfe5fea0230845e8301
- 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982
- 428f22a9afd2797ede7c0583d34a052c32693cbb55f567a60298587b6e675c6f
- 43d1ef55c9d33472a5532de5bbe814fefa5205297653201c30fdc91b8f21a0ed
- 470dfc18e05c01ebd66fb8b320ff7e6e76d8017feb530fb23b981982c737b490
- 498b8b889bb1f02a377a6a8f0e39f9db4e70cccad820c6e5bc5652e989ae6204
- 49fa2e0131340da29c564d25779c0cafb550da549fae65880a6b22d45ea2067f
- 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
- 4ac6310fbd64135ae28cfbd2a06b0370aabe7b7c11ad7213532236b53a554330
- 4b76e54de0243274f97430b26624c44694fbde3289ed81a160e0754ab9f56f32
- 4c69f22dfd92b54fbc27f27948af15958adfbc607d68d6ed0faca394c424ccee
- 4e452d88eadd0ca11539d18bbf7a0ef243dc06c6df230f5dbb7310dc00ec62e3
- 4e5e41e90191707c18c4db385871ebc6c143663968e68994e65fd238025bcf33
- 5366d1a9a5c277e382ad745e01909effa777731e448354389ab706e17a8a7577
- 55454390f7be33ab5c11b5e0683800dd9a892ce136f1962b0989526fff5592d5
- 55640108459b93e85c66c1f099b5e3df145da8700b0573fc7619b921d2cde4a8
- 55e1f8362676a8f79c3af8d1605f330d58443d0509888703f37edfb77a5aec28
- 565c4e1f84996c1cbf1dec1aa301bcda0cdcb1df3a7c531cb574a0d35b17d706
- 57c12d8573d2f3883a8a0ba14e3eec02ac1c61dee6b675b6c0d16e221c3777f4
- 593bbcc8f34047da9960b8456094c0eaf69caaf16f1626b813484207df8bd8af
- 59f30cc60faefacd60327e0562a6fd885d6d7f343658ea7843e56cf8725b8443
- 5a7c7f50d61c3c3de0ce6970f8b244186bf34bef7ed193eb33005f3d66fe2545
- 5ad4efd90dcde01d26cc6f32f7ce3ce0b4d4951d4b94a19aa097341aff2acaec
- 5b4322ec672fdfeb292941057125d00afcf1a904e31f9ec0fb9e650177dba500
- 5c1f4f69c45cff9725d9969f9ffcf79d07bd0f624e06cfa5bcbacd2211046ed6
- 5cdd80ec5d4797ed6e5039d84ea3a9d4aa9171c6aeed34a0d717d6b0782db013
- 5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9
- 5d8123db7094540954061ab1fbc56eedcd9e01110b62d0f54206e3e75a39776a
- 5dee2ac983640d656f9c0ef2878ee34cda5e82a52d3703f84278ac372877346d
- 5e4e5966d893c1ba3ff427c893d6ddd635a117878de265787ee96abfe3e728f4
- 5f2b33deee53390913fd5fb3979685a3db2a7a1ee872d47efc4f8f7d9438341f
- 616e60f031b6e7c4f99c216d120e8b38763b3fafd9ac4387ed0533b15df23420
- 623c84b1bbf30ffaa8e8b28587b3c072b817a8b64cbaac698663178662dfc81c
- 62d828ee000e44f670ba322644c2351fe31af5b88a98f2b2ce27e423dcf1d1b1
- 63c8a30963265353532d80a41cae5d54b31e5c2d6b2a92551d6f6dcadd0dedeb
- 67db4c0c444758bd5debbb3aad18e3cfcd3f04d51e9eae8c633c0a6174e8d27c
- 6843b32928fa10365c31a71bf7786f5576e731cc395576b23af71ea26fdba75f
- 687c33436156410b764e80f8d12ae745f178f0ce685931af3d6aff207b185c06
- 6a1da955b2eb6be429b2e3b4b515436f5f76fd62802d4e2aa79dc63770d80be0
- 6bf1839a7e72a92a2bb18fbedf1873e4892b00ea4b122e48ae80fac5048db1a7
- 6fba72ddd939c8e22efb4ec1a42d72299cb061524600acd7104bea421eabceba
- 7108d6793a003695ee8107401cfb17af305fa82ff6c16b7a5db45f15e5c9e12d
- 71deace25a88a120229b93e133ad54726044cb888a2858a441bf6913cad6d668
- 72af12d8139a80f317e851a60027fdf208871ed334c12637f49d819ab4b033dd
- 76a3666ce9119295104bb69ee7af3f2845d23f40ba48ace7987f79b06312bbdf
- 78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
- 7a515968c18102f5fa2d66573e94dc0d18745d9c5abd5781d80bec9b47960295
- 7a828afd2abf153d840938090d498072b7e507c7021e4cdd8c6baf727cafc545
- 7bb9ea2c0f53fa96883c54fa4b107764a6319f6026e4574c9feec2cb7d9e7d21
- 7c465ea7bcccf4f94147add808f24629644be11c0ba4823f16e8c19e0090f0ff
- 7e369022da51937781b3efe6c57f824f05cf43cbd66b4a24367a19488d2939e4
- 7edc4f216f4002a76e6c20616fea74c649b31da01fd65a73fd52bdcd929b3f48
- 7fbd1fa40986a359951dd20f31a10f1a3753b46cc06e575030b9353474ac3667
- 8215640b3572bc67478365f42913b247a18702df4155492f4feed59860cfd56a
- 85ce324b8f78021ecfc9b811c748f19b82e61bb093ff64f2eab457f9ef19b186
- 8631e5020027543c2353560b6a604b3df1892210bded678d6337d84c9d16a4e8
- 86ba25d63cd96e826073339c26993b0fdec6613283dd05fbe4481c0c0b278d10
- 88be9ee3ce0f85086aec1f2f8409247e8ab4a2a7c8a07af851f8df9814adeee5
- 8c6c481e18b96eb4bcae87cdd3aa104757cb1a19740bc145d73d653c34274c81
- 9174c0772a5f871e58c385c01eea1ed4b706675bf9bd6aa1667b9d3c40acb6fc
- 91d7433fc106172b8de564dbacd8489806a652223d5b93ea51593027e13ef087
- 940dec2039c7fca4a08d08601971836916c6ad5193be07a88506ba58e06d4b4d
- 942bd43d9e3fbce9b110964b3b4af284b62da86b278b8145d97c455ee10a355c
- 9588f2ef06b7e1c8509f32d8eddfa18041a9cc15b1c90d6da484a39f8dcdf967
- 95f3238c90a0fc265800569a7638c14feac44d735e590f4e7ef137d49b2f6d14
- 99a8ab5be4bc755989479049267a2cfeda3b54af08fc0ea3037578e94cf470e4
- 99ef8c1bb5b4060958e6db5b092ddd167e307a7cf34d366afabdb5ceb1a9035d
- 9b60c622546dc45cca64df935b71c26dcf4886d6fa811944dbc4e23db9335640
- 9cc32c94ce7dc6e48f86704625b6cdc0fda0d2cd7ad769e4d0bb1776903e5a13
- 9df44327ad68c835e9f79355744bf868a8df6cdb54852a2ac5d7f03f4f485a1c
- 9fb39f162c1e1eb55fbf38e670d5e329d84542d3dfcdc341a99f5d07c4b50977
- 9fc129c37c545ec23b3c59e3319d31509cb9ecdd2eeed90ff8a1a99a39bfcd1c
- a02748c3078a897cff8c4c66292662712d62e39b580465251bca6851ab6931a3
- a1d23db1f1e3cc2c4aa02f33fec96346d9d5d5039ffc2ed4a3c65c34b79c5d93
- a1d9cd6f189beff28a0a49b10f8fe4510128471f004b3e4283ddc7f78594906b
- a2726df3632eba623ebb76c373ec44ba733af9483326bab4cc6a6efc67f5d566
- a3900daf137c81ca37a4bf10e9857526d3978be085be265393f98cb075795740
- a74783bb813b2e053013a8ac9afdc89d250c2c086bbe9f793bec6b64bb95c9f4
- a897345b68191fd36f8cefb52e6a77acb2367432abb648b9ae0a9d708406de5b
- a93ee7ea13238bd038bcbec635f39619db566145498fe6e0ea60e6e76d614bd3
- aa62afcbec704531ce9707f5b076f611abd365844c3e0a4a81f8c06739d6bb52
- aa98d85b6a5a50c91899824a6f6fac52d9580e91e1d6390610d520f66d1ce49f
- aae9536875784fe6e55357900519f97fee0a56d6780860779a36f06765243d56
- ac7f0fb9a7bb68640612567153a157e91d457095eadfd2a76d27a7f65c53ba82
- ae0ab8cb25dbf55cf19a5d928eba38be34b105b492295dc5b710b774447d8711
- aee20f9188a5c3954623583c6b0e6623ec90d5cd3fdec4e1001646e27664002c
- b3c39aeb14425f137b5bd0fd7654f1d6a45c0e8518ef7e209ad63d8dc6d0bac7
- b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c
- b47e281bfbeeb0758f8c625bed5c5a0d27ee8e0065ceeadd76b0010d226206f0
- b4d607fae7d9745f9ced081a92a2dcf96f2d0c72389a66e20059e021f0b58618
- b55d23b9df8ffe5678234a2ebc473afb3024015c2a79dfef33a1824d08396139
- b66db13d17ae8bcaf586180e3dcd1e2e0a084b6bc987ac829bbff18c3be7f8b4
- b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
- bc8136b40b4164afcbcb4e14f6fd54ca02275ff75b674eb6fd0a8f436f9b1181
- bd7824d2d96aca1f4260c92e6888c93ef6a64bd8f98d5a0ef0bbe217f0a3b9fa
- be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
- bf40d69a938e922c073632937b565015b262139884ffe138d4d9358295203b65
- bf446589a7208b81b436a0c0fe7e54c6e2994a80b07097bfef6091af3a4fe710
- c1f929afa37253d28074e8fdaf62f0e3447ca3ed9b51203f676c1244b5b86955
- c354a9a0bbb975c15e884916dce251807aae788e68725b512a95f7b580828c64
- c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9
- c38eea1588b8bffe4e19a8af09bfe17281e6e6afc7e2fbbecef3af96df9a347a
- c8c2131e1d22bff3ef6342254a43d658a3c5fc8081c4ffb7d9b0ced78b7892f1
- ca29de1dc8817868c93e54b09f557fe14e40083c0955294df5bd91f52ba469c8
- cce675d3970408c16a6e4fd559aaac69c30a296cc55445835594a958fe5d831c
- d8a9879a99ac7b12e63e6bcae7f965fbf1b63d892a8649ab1d6b08ce711f7127
- de1fb3f687161900f15243c0912a40bacf4df938a718c75a73f80ffc3bf3a2d3
- de7928607516e9a53e981ce98ac6349846cc7c30b787990be23531715dff1cb6
- df039caf180d9c7befc8c4b47885231721005c02344824153c65e694bf17d7b8
- dff26a9a44baa3ce109b8df41ae0a301d9e4a28ad7bd7721bbb7ccd137bfd696
- e0ec1ad116d44030ad9ef5b51f18ff6160a227a46ffcf64693335c7fb946fad6
- e14f1a655d54254d06d51cd23a2fa57b6ffdf371cf6b828ee483b1b1d6d21079
- e2d1e34c79295e1163481b3683633d031cab9e086b9ae2ac5e30b08def1b0b47
- e5c117233e22d08a547c278ae7027815e22c196a083679126ab9646c781acb6c
- e5df2d114c5f69c219923fed56c8aa7ee912020ba7589e88f2729285c1f5788a
- e7a39735ee8777473c7405a70f470a0e00d6266d3126d3af59660e6a78dab2cf
- e8450dd6f908b23c9cbd6011fe3d940b24c0420a208d6924e2d920f92c894a96
- e9d1d718f760ce40f8c1d36f99abba247d8b4bcb12d6960b5e60997c896cda19
- ea1d5bfe0f011bb515b77728235401ffb698feefd0d07d232b18fe9927083c47
- eb3193a1ba0b223a852db4822456ef58c27fe51db8bc1478169b8b27a25b7d27
- eb47cd6a937221411bb8daf35900a9897fb234160087089a064066a65f42bcd4
- ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
- ee52964b832e1a44b92a4f0e6cde2e876d70131640856b120c0379ff8cc431aa
- eeb9cd6a1c4b3949b2ff3134a77d6736b35977f951b9c7c911483b5caeb1c1fb
- ef01bcc893dd06ef87c408dd5746fed32b104a9b62dc33657cc1dfa2033e1e8f
- f0ae40aaec29c4fb88f81b62854c7fe21d16b528c1e2bb30b87ceb71f39e0ce2
- f0eb62d9726857df9ccb8dc63187b6965d5af28b9ad1dbd34891b72bf3fd4e38
- f4918e6e0dd52a8636d1dce97426c2fda9ec0ff6b3cf898f36789b9b15ab5f01
- f7c7b5e4b051ea5bd0017803f40af13bed224c4b0fd60b890b6784df5bd63494
- f8812f1deb8001f3b7672b6fc85640ecb123bc2304b563728e6235ccbe782d85
- fb0b6044347e972e21b6c376e37e1115dab494a2c6b9fb28b92b1e45b45d0ebc
- fc626fe1e0f4d77b34851a8c60cdd11172472da3b9325bfe288ac8342f6c710a
- ff42f05929a4c386996cf6fd6286c20f2724196f2f06c6943a47eab87a83cb17
- ff8c6a2bd919496ae639347611681259c60a21762f3411da230998e443aa90cf
- ff8fcdc4cae2c9ed5207e53bb5bf1d97eef8147977d2bddfe8f55be91410f32c
(以上は、各種情報元から集めたものの統合版です)
■MD5
- 4fef5e34143e646dbf9907c4374276f5
- 5bef35496fcbdbe841c82f4d1ab8b7c2
- 775a0631fb8229b2aa3d7621427085ad
- 7bf2b57f2a205768755c07f238fb32cc
- 7f7ccaa16fb15eb1c7399d422f8363e8
- 8495400f199ac77853c53b5a3f278f3e
- 84c82835a5d21bbcf75a61706d8ab549
- 86721e64ffbd69aa6944b9672bcabb6d
- 8dd63adb68ef053e044a5a2f46e0d2cd
- b0ad5902366f860f85b892867e5b1e87
- d6114ba5f10ad67a4131ab72531f02da
- db349b97c37d22f5ea1d1841e3c89eb4
- e372d07207b4da75b3434584cd9f3450
- f529f4556a5126bba499c26d67892240
(以上は Kasperskyの情報: https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/)
【通信先情報】
- 197.231.221.221:9001
- 128.31.0.39:9191
- 149.202.160.69:9001
- 46.101.166.19:9090
- 91.121.65.179:9001
- 2.3.69.209:9001
- 146.0.32.144:9001
- 50.7.161.218:9001
- 217.79.179.177:9001
- 213.61.66.116:9003
- 212.47.232.237:9001
- 81.30.158.223:9001
- 79.172.193.32:443
- 38.229.72.16:443
(以上は McAfeeの情報: https://securingtomorrow.mcafee.com/business/analysis-wannacry-ransomware-outbreak/)
- iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com (sinkholed)
- Rphjmrpwmfv6v2e[.]onion
- Gx7ekbenv2riucmf[.]onion
- 57g7spgrzlojinas[.]onion
- xxlvbrloxvriy2c5[.]onion
- 76jdd2ir2embyv47[.]onion
- cwwnhwhlz52maqm7[.]onion
(以上は McAfeeの情報: https://securingtomorrow.mcafee.com/business/analysis-wannacry-ransomware-outbreak/)
【通信先情報】
・@Please_Read_Me@.txt
・@WanaDecryptor@.exe
・@WanaDecryptor@.exe.lnk
・Please Read Me!.txt (Older variant)
・C:\WINDOWS\tasksche.exe
・C:\WINDOWS\qeriuwjhrf
・131181494299235.bat
・176641494574290.bat
・217201494590800.bat
・[0-9]{15}.bat #regex
・!WannaDecryptor!.exe.lnk
・00000000.pky
・00000000.eky
・00000000.res
・C:\WINDOWS\system32\taskdl.exe
(以上は McAfeeの情報: https://securingtomorrow.mcafee.com/business/analysis-wannacry-ransomware-outbreak/)
【暗号化対象の拡張子】
マルウェアを逆アセンブルすると、以下のデータをみることができます。暗号化の対象とする拡張子のリストだと推測されます。
.data:0040F128 dd offset a_doc ; ".doc"
.data:0040F12C dd offset a_docx ; ".docx"
.data:0040F130 dd offset a_docb ; ".docb"
.data:0040F134 dd offset a_docm ; ".docm"
.data:0040F138 dd offset a_dot ; ".dot"
.data:0040F13C dd offset a_dotm ; ".dotm"
.data:0040F140 dd offset a_dotx ; ".dotx"
.data:0040F144 dd offset a_xls ; ".xls"
.data:0040F148 dd offset a_xlsx ; ".xlsx"
.data:0040F14C dd offset a_xlsm ; ".xlsm"
.data:0040F150 dd offset a_xlsb ; ".xlsb"
.data:0040F154 dd offset a_xlw ; ".xlw"
.data:0040F158 dd offset a_xlt ; ".xlt"
.data:0040F15C dd offset a_xlm ; ".xlm"
.data:0040F160 dd offset a_xlc ; ".xlc"
.data:0040F164 dd offset a_xltx ; ".xltx"
.data:0040F168 dd offset a_xltm ; ".xltm"
.data:0040F16C dd offset a_ppt ; ".ppt"
.data:0040F170 dd offset a_pptx ; ".pptx"
.data:0040F174 dd offset a_pptm ; ".pptm"
.data:0040F178 dd offset a_pot ; ".pot"
.data:0040F17C dd offset a_pps ; ".pps"
.data:0040F180 dd offset a_ppsm ; ".ppsm"
.data:0040F184 dd offset a_ppsx ; ".ppsx"
.data:0040F188 dd offset a_ppam ; ".ppam"
.data:0040F18C dd offset a_potx ; ".potx"
.data:0040F190 dd offset a_potm ; ".potm"
.data:0040F194 dd offset a_pst ; ".pst"
.data:0040F198 dd offset a_ost ; ".ost"
.data:0040F19C dd offset a_msg ; ".msg"
.data:0040F1A0 dd offset a_eml ; ".eml"
.data:0040F1A4 dd offset a_edb ; ".edb"
.data:0040F1A8 dd offset a_vsd ; ".vsd"
.data:0040F1AC dd offset a_vsdx ; ".vsdx"
.data:0040F1B0 dd offset a_txt ; ".txt"
.data:0040F1B4 dd offset a_csv ; ".csv"
.data:0040F1B8 dd offset a_rtf ; ".rtf"
.data:0040F1BC dd offset a_123 ; ".123"
.data:0040F1C0 dd offset a_wks ; ".wks"
.data:0040F1C4 dd offset a_wk1 ; ".wk1"
.data:0040F1C8 dd offset a_pdf ; ".pdf"
.data:0040F1CC dd offset a_dwg ; ".dwg"
.data:0040F1D0 dd offset a_onetoc2 ; ".onetoc2"
.data:0040F1D4 dd offset a_snt ; ".snt"
.data:0040F1D8 dd offset a_hwp ; ".hwp"
.data:0040F1DC dd offset a_602 ; ".602"
.data:0040F1E0 dd offset a_sxi ; ".sxi"
.data:0040F1E4 dd offset a_sti ; ".sti"
.data:0040F1E8 dd offset a_sldx ; ".sldx"
.data:0040F1EC dd offset a_sldm ; ".sldm"
.data:0040F1F0 dd offset a_sldm ; ".sldm"
.data:0040F1F4 dd offset a_vdi ; ".vdi"
.data:0040F1F8 dd offset a_vmdk ; ".vmdk"
.data:0040F1FC dd offset a_vmx ; ".vmx"
.data:0040F200 dd offset a_gpg ; ".gpg"
.data:0040F204 dd offset a_aes ; ".aes"
.data:0040F208 dd offset a_arc ; ".ARC"
.data:0040F20C dd offset a_paq ; ".PAQ"
.data:0040F210 dd offset a_bz2 ; ".bz2"
.data:0040F214 dd offset a_tbk ; ".tbk"
.data:0040F218 dd offset a_bak ; ".bak"
.data:0040F21C dd offset a_tar ; ".tar"
.data:0040F220 dd offset a_tgz ; ".tgz"
.data:0040F224 dd offset a_gz ; ".gz"
.data:0040F228 dd offset a_7z ; ".7z"
.data:0040F22C dd offset a_rar ; ".rar"
.data:0040F230 dd offset a_zip ; ".zip"
.data:0040F234 dd offset a_backup ; ".backup"
.data:0040F238 dd offset a_iso ; ".iso"
.data:0040F23C dd offset a_vcd ; ".vcd"
.data:0040F240 dd offset a_jpeg ; ".jpeg"
.data:0040F244 dd offset a_jpg ; ".jpg"
.data:0040F248 dd offset a_bmp ; ".bmp"
.data:0040F24C dd offset a_png ; ".png"
.data:0040F250 dd offset a_gif ; ".gif"
.data:0040F254 dd offset a_raw ; ".raw"
.data:0040F258 dd offset a_cgm ; ".cgm"
.data:0040F25C dd offset a_tif ; ".tif"
.data:0040F260 dd offset a_tiff ; ".tiff"
.data:0040F264 dd offset a_nef ; ".nef"
.data:0040F268 dd offset a_psd ; ".psd"
.data:0040F26C dd offset a_ai ; ".ai"
.data:0040F270 dd offset a_svg ; ".svg"
.data:0040F274 dd offset a_djvu ; ".djvu"
.data:0040F278 dd offset a_m4u ; ".m4u"
.data:0040F27C dd offset a_m3u ; ".m3u"
.data:0040F280 dd offset a_mid ; ".mid"
.data:0040F284 dd offset a_wma ; ".wma"
.data:0040F288 dd offset a_flv ; ".flv"
.data:0040F28C dd offset a_3g2 ; ".3g2"
.data:0040F290 dd offset a_mkv ; ".mkv"
.data:0040F294 dd offset a_3gp ; ".3gp"
.data:0040F298 dd offset a_mp4 ; ".mp4"
.data:0040F29C dd offset a_mov ; ".mov"
.data:0040F2A0 dd offset a_avi ; ".avi"
.data:0040F2A4 dd offset a_asf ; ".asf"
.data:0040F2A8 dd offset a_mpeg ; ".mpeg"
.data:0040F2AC dd offset a_vob ; ".vob"
.data:0040F2B0 dd offset a_mpg ; ".mpg"
.data:0040F2B4 dd offset a_wmv ; ".wmv"
.data:0040F2B8 dd offset a_fla ; ".fla"
.data:0040F2BC dd offset a_swf ; ".swf"
.data:0040F2C0 dd offset a_wav ; ".wav"
.data:0040F2C4 dd offset a_mp3 ; ".mp3"
.data:0040F2C8 dd offset a_sh ; ".sh"
.data:0040F2CC dd offset a_class ; ".class"
.data:0040F2D0 dd offset a_jar ; ".jar"
.data:0040F2D4 dd offset a_java ; ".java"
.data:0040F2D8 dd offset a_rb ; ".rb"
.data:0040F2DC dd offset a_asp ; ".asp"
.data:0040F2E0 dd offset a_php ; ".php"
.data:0040F2E4 dd offset a_jsp ; ".jsp"
.data:0040F2E8 dd offset a_brd ; ".brd"
.data:0040F2EC dd offset a_sch ; ".sch"
.data:0040F2F0 dd offset a_dch ; ".dch"
.data:0040F2F4 dd offset a_dip ; ".dip"
.data:0040F2F8 dd offset a_pl ; ".pl"
.data:0040F2FC dd offset a_vb ; ".vb"
.data:0040F300 dd offset a_vbs ; ".vbs"
.data:0040F304 dd offset a_ps1 ; ".ps1"
.data:0040F308 dd offset a_bat ; ".bat"
.data:0040F30C dd offset a_cmd ; ".cmd"
.data:0040F310 dd offset a_js ; ".js"
.data:0040F314 dd offset a_asm ; ".asm"
.data:0040F318 dd offset a_h ; ".h"
.data:0040F31C dd offset a_pas ; ".pas"
.data:0040F320 dd offset a_cpp ; ".cpp"
.data:0040F324 dd offset a_c ; ".c"
.data:0040F328 dd offset a_cs ; ".cs"
.data:0040F32C dd offset a_suo ; ".suo"
.data:0040F330 dd offset a_sln ; ".sln"
.data:0040F334 dd offset a_ldf ; ".ldf"
.data:0040F338 dd offset a_mdf ; ".mdf"
.data:0040F33C dd offset a_ibd ; ".ibd"
.data:0040F340 dd offset a_myi ; ".myi"
.data:0040F344 dd offset a_myd ; ".myd"
.data:0040F348 dd offset a_frm ; ".frm"
.data:0040F34C dd offset a_odb ; ".odb"
.data:0040F350 dd offset a_dbf ; ".dbf"
.data:0040F354 dd offset a_db ; ".db"
.data:0040F358 dd offset a_mdb ; ".mdb"
.data:0040F35C dd offset a_accdb ; ".accdb"
.data:0040F360 dd offset a_sql ; ".sql"
.data:0040F364 dd offset a_sqlitedb ; ".sqlitedb"
.data:0040F368 dd offset a_sqlite3 ; ".sqlite3"
.data:0040F36C dd offset a_asc ; ".asc"
.data:0040F370 dd offset a_lay6 ; ".lay6"
.data:0040F374 dd offset a_lay ; ".lay"
.data:0040F378 dd offset a_mml ; ".mml"
.data:0040F37C dd offset a_sxm ; ".sxm"
.data:0040F380 dd offset a_otg ; ".otg"
.data:0040F384 dd offset a_odg ; ".odg"
.data:0040F388 dd offset a_uop ; ".uop"
.data:0040F38C dd offset a_std ; ".std"
.data:0040F390 dd offset a_sxd ; ".sxd"
.data:0040F394 dd offset a_otp ; ".otp"
.data:0040F398 dd offset a_odp ; ".odp"
.data:0040F39C dd offset a_wb2 ; ".wb2"
.data:0040F3A0 dd offset a_slk ; ".slk"
.data:0040F3A4 dd offset a_dif ; ".dif"
.data:0040F3A8 dd offset a_stc ; ".stc"
.data:0040F3AC dd offset a_sxc ; ".sxc"
.data:0040F3B0 dd offset a_ots ; ".ots"
.data:0040F3B4 dd offset a_ods ; ".ods"
.data:0040F3B8 dd offset a_3dm ; ".3dm"
.data:0040F3BC dd offset a_max ; ".max"
.data:0040F3C0 dd offset a_3ds ; ".3ds"
.data:0040F3C4 dd offset a_uot ; ".uot"
.data:0040F3C8 dd offset a_stw ; ".stw"
.data:0040F3CC dd offset a_sxw ; ".sxw"
.data:0040F3D0 dd offset a_ott ; ".ott"
.data:0040F3D4 dd offset a_odt ; ".odt"
.data:0040F3D8 dd offset a_pem ; ".pem"
.data:0040F3DC dd offset a_p12 ; ".p12"
.data:0040F3E0 dd offset a_csr ; ".csr"
.data:0040F3E4 dd offset a_crt ; ".crt"
.data:0040F3E8 dd offset a_key ; ".key"
.data:0040F3EC dd offset a_pfx ; ".pfx"
.data:0040F3F0 dd offset a_der ; ".der"
.123, .3dm, .3ds, .3g2, .3gp, .602, .7z, .accdb, .aes,
.ai, .ARC, .asc, .asf, .asm, .asp, .avi, .backup, .bak,
.bat, .bmp, .brd, .bz2, .c, .cgm, .class, .cmd, .cpp,
.crt, .cs, .csr, .csv, .db, .dbf, .dch, .der, .dif,
.dip, .djvu, .doc, .docb, .docm, .docx, .dot, .dotm,
.dotx, .dwg, .edb, .eml, .fla, .flv, .frm, .gif, .gpg,
.gz, .h, .hwp, .ibd, .iso, .jar, .java, .jpeg, .jpg,
.js, .jsp, .key, .lay, .lay6, .ldf, .m3u, .m4u, .max,
.mdb, .mdf, .mid, .mkv, .mml, .mov, .mp3, .mp4, .mpeg,
.mpg, .msg, .myd, .myi, .nef, .odb, .odg, .odp, .ods,
.odt, .onetoc2, .ost, .otg, .otp, .ots, .ott, .p12,
.PAQ, .pas, .pdf, .pem, .pfx, .php, .pl, .png, .pot,
.potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm,
.pptx, .ps1, .psd, .pst, .rar, .raw, .rb, .rtf, .sch,
.sh, .sldm, .sldm, .sldx, .slk, .sln, .snt, .sql,
.sqlite3, .sqlitedb, .stc, .std, .sti, .stw, .suo, .svg,
.swf, .sxc, .sxd, .sxi, .sxm, .sxw, .tar, .tbk, .tgz,
.tif, .tiff, .txt, .uop, .uot, .vb, .vbs, .vcd, .vdi,
.vmdk, .vmx, .vob, .vsd, .vsdx, .wav, .wb2, .wk1, .wks,
.wma, .wmv, .xlc, .xlm, .xls, .xlsb, .xlsm, .xlsx,
.xlt, .xltm, .xltx, .xlw, .zip
【KillSwitch】
- www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
- www[.]iuqssfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
- www[.]ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
- www[.]ayylmaotjhsstasdfasdfasdfasdfasdfasdfasdf[.]com
- www[.]lazarusse[.]suiche[.]sdfjhgosurijfaqwqwqrgwea[.]com
【マルウェア情報】
(1)
Sha256 | 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa |
MD5 | 509c41ec97bb81b0567b059aa2f50fe8 |
SHA1 | 87420a2791d18dad3f18be436045280a4cc16fc4 |
ssdeep | 98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB |
authentihash | 7ef3251b88dd600bdef60a87c33090ca13003c9e62b9aa32ae6fe8cafe91e17f |
imphash | 68f013d7437aa653a8a98a05807afeb1 |
File size | 3514368 bytes |
File type | Win32 EXE |
ファイル名 | diskpart.exe, tasksche.exe |
参考情報 | https://www.virustotal.com/ja/file/09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa/analysis/ |
参考情報 | https://www.hybrid-analysis.com/sample/09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa?environmentId=100 |
Bitcoin | 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn |
Bitcoin | 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw |
Bitcoin | 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 |
(2)
Sha256 | ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa |
MD5 | 84c82835a5d21bbcf75a61706d8ab549 |
SHA1 | 5ff465afaabcbf0150d1a3ab2c2e74f3a4426467 |
ssdeep | 98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB |
authentihash | |
imphash | |
File size | 3514368 bytes |
File type | PE32 executable (GUI) Intel 80386, for MS Windows |
ファイル名 | diskpart.exe, tasksche.exe |
参考情報 | https://malwr.com/analysis/YjFhOGYzNGVkMzAyNDI2M2E2MmY5ZWQ1MGU1NzQ5MWY/ |
参考情報 | https://www.malwareviz.com/static/html/MalwareViz_84c82835a5d21bbcf75a61706d8ab549.html |
(3)
Sha256 | 5ad4efd90dcde01d26cc6f32f7ce3ce0b4d4951d4b94a19aa097341aff2acaec |
MD5 | 638f9235d038a0a001d5ea7f5c5dc4ae |
SHA1 | af7db69cbaa6ab3e4730af8763ae4bf7b7c0c9b2 |
ssdeep | 98304:wDqPoBhz1aRxcSUDk36SAEdhvf/z5rzpX:wDqPe1Cxcxk3ZAET/z5/pX |
authentihash | 44df19a79bce7dad2119db79ae7134fd0cf028301ee64f2ff92931cfc291b058 |
imphash | 9ecee117164e0b870a53dd187cdd7174 |
File size | 3723264 bytes |
File type | Win32 EXE |
ファイル名 | |
参考情報 | https://www.virustotal.com/ja/file/5ad4efd90dcde01d26cc6f32f7ce3ce0b4d4951d4b94a19aa097341aff2acaec/analysis/ |
キルスイッチ | hxxp://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com |
Bitcoin | 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn |
Bitcoin | 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw |
Bitcoin | 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 |
(4)
Sha256 | 32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf |
MD5 | d5dcd28612f4d6ffca0cfeaefd606bcf |
SHA1 | cf60fa60d2f461dddfdfcebf16368e6b539cd9ba |
ssdeep | 98304:whqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3R:whqPe1Cxcxk3ZAEUadzR8yc4gB |
authentihash | 823880cd8257473227356cfa7c786e11eb3c43b6cd2de3ae5a517c92ebe9f83f |
imphash | 9ecee117164e0b870a53dd187cdd7174 |
File size | 3723264 bytes |
File type | Win32 EXE |
ファイル名 | mssecsvc.exe |
参考情報 | https://www.virustotal.com/ja/file/32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf/analysis/ |
キルスイッチ | hxxp://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com |
Bitcoin | 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn |
Bitcoin | 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw |
Bitcoin | 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 |
(5)
Sha256 | b9318a66fa7f50f2f3ecaca02a96268ad2c63db7554ea3acbde43bf517328d06 |
MD5 | 4287e15af6191f5cab1c92ff7be8dcc3 |
SHA1 | cd79b536868efb8b2edd2db4e4100f0bd2f69e28 |
ssdeep | 98304:w2NPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3R:w2NPe1Cxcxk3ZAEUadzR8yc4gB |
authentihash | 7083d352d03afef74a6cbe5f55c07cd7f7d21352949d0c9409793bad11faca2a |
imphash | 9ecee117164e0b870a53dd187cdd7174 |
File size | 3723264 bytes |
File type | Win32 EXE |
ファイル名 | mssecsvc.exe |
参考情報 | https://www.virustotal.com/ja/file/b9318a66fa7f50f2f3ecaca02a96268ad2c63db7554ea3acbde43bf517328d06/analysis/ |
検体 | https://www.hybrid-analysis.com/sample/b9318a66fa7f50f2f3ecaca02a96268ad2c63db7554ea3acbde43bf517328d06?environmentId=100 |
キルスイッチ | hxxp://www.ayylmaoTJHSSTasdfasdfasdfasdfasdfasdfasdf.com |
Bitcoin | 15nzzRpAsbgd1mmoqQRtiXxN49f4LcmTh4 |
Bitcoin | 18ucAGbkgCkU61F6yPMD19dZRUBBHyDGRV |
Bitcoin | 1M9sgF4zhpusQA82rtTbrcZGKD5oBrSW5t |
※: キルスイッチは hxxp -> http と要変換