List of file names, HASH SHA-256 codes containing WannaCry malware
Wannacry has a very strong ability to spread, once infected, it is very difficult to recover data. Therefore, the Vietnam Computer Emergency Response Center (VNCERT) has taken measures to remove Wannacry from computers and provide internet users in Vietnam with a list of WannaCry malware treatment file names, HASH codes. SHA-256 contains WannaCry malicious code to promptly isolate these files to avoid infection.
List of file names, HASH SHA-256 codes containing WannaCry malware
1. List of file names to cure WannaCry
Regularly check the files and data contained in your system and hard drive. If you find any file listed in the list of WannaCry malicious file names below, delete it immediately.
first | @WanaDecryptor@.exe |
2 | b.wnry |
3 | c.wnry |
4 | s.wnry |
5 | t.wnry |
6 | u.wnry |
7 | tasksdl.exe |
8 | taskse.exe |
9 | Files with extension '.wnry' |
ten | Files with extension '.WNCRY' |
In addition to the above files, you also need to pay attention to files with the extension (extension) containing .wnry or .wncry
2. SHA-256 HASH code contains WannaCry . malware
After downloading any file, please scan the HASH SHA-256 code and then compare it with the list of HASH SHA-256 codes containing the WannaCry malware below to check if the file contains the ransomware. this money or not. You can also apply this method to existing files on the system.
Step 1: Download and install HashMyFile here: Download HashMyFile
Step 2: Perform a file or folder scan by selecting File -> Add Files or Add Folder .
Step 3: After the scan is complete, you will receive the HASH codes that the tool provides, but you only need to pay attention to the SHA-256 code and compare it with the SHA-256 HASH codes containing the WannaCry malware below. Click here to find out if your file contains this ransomware virus, if it matches any of the SHA-256 codes below, your file contains WannaCry.
List of HASH SHA-256 codes containing WannaCry ransomware
first | ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa |
2 | c365ddaa345cfcaff3d629505572a484cff5221933d68e4a52130b8bb7badaf9 |
3 | 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa |
4 | 0a73291ab5607aef7db23863cf8e72f55bcb3c273bb47f00edf011515aeb5894 |
5 | 428f22a9afd2797ede7c0583d34a052c32693cbb55f567a60298587b6e675c6f |
6 | 5c1f4f69c45cff9725d9969f9ffcf79d07bd0f624e06cfa5bcbacd2211046ed6 |
7 | 62d828ee000e44f670ba322644c2351fe31af5b88a98f2b2ce27e423dcf1d1b1 |
8 | 72af12d8139a80f317e851a60027fdf208871ed334c12637f49d819ab4b033dd |
9 | 85ce324b8f78021ecfc9b811c748f19b82e61bb093ff64f2eab457f9ef19b186 |
ten | a1d9cd6f189beff28a0a49b10f8fe4510128471f004b3e4283ddc7f78594906b |
11 | a93ee7ea13238bd038bcbec635f39619db566145498fe6e0ea60e6e76d614bd3 |
twelfth | b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c |
13 | eb47cd6a937221411bb8daf35900a9897fb234160087089a064066a65f42bcd4 |
14 | 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c |
15 | 2c2d8bc91564050cf073745f1b117f4ffdd6470e87166abdfcd10ecdff040a2e |
16 | 7a828afd2abf153d840938090d498072b7e507c7021e4cdd8c6baf727cafc545 |
17 | a897345b68191fd36f8cefb52e6a77acb2367432abb648b9ae0a9d708406de5b |
18 | fb0b6044347e972e21b6c376e37e1115dab494a2c6b9fb28b92b1e45b45d0ebc |
19 | 9588f2ef06b7e1c8509f32d8eddfa18041a9cc15b1c90d6da484a39f8dcdf967 |
20 | b43b234012b8233b3df6adb7c0a3b2b13cc2354dd6de27e092873bf58af2693c |
21 | 4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982 |
22 | 09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa |
Above is a list of WannaCry malware file names, SHA-256 HASH code containing WannaCry malicious code for you to prevent infection with ransomware, WannaCry ransomware on your computer, thereby ensuring your computer as well as other systems. another computer system is connected. Besides the ways to check for WannaCry malware above, you should also refer to other ways to handle WannaCry, especially follow the way WannaCry handles from the National Information Security Administration to protect your computer. from the malicious code that is considered the most dangerous today.
Bên cạnh danh sách tên file chữa mã độc WannaCry, Người dùng Windows 10 vừa đón nhận 1 tin vui khi đã có thêm 1 cách để phòng tránh virus WannaCry trên thiết bị của mình, tham khảo cách phòng tránh virus Wanna Cry trên win 10 bằng việc tạo điểm phục hồi hệ thống trên Windows 10 để biết cách thực hiện.
https://thuthuat.taimienphi.vn/danh-sach-ten-file-ma-hash-sha-256-chua-da-doc-wannacry-23804n.aspx
Hiện nay có thêm 1 công cụ nữa giúp người dùng quét và phát hiện virus trên máy tính của mình, đó là công cụ Winja VirusTotal Uploader, để biết cách sử dụng Winja VirusTotal Uploader như thế nào, mời các bạn theo dõi bài viết sử dụng Winja VirusTotal Uploader để biết thêm thông tin.
You should read it
- All about WannaCry, Ransomware has been confusing for the past few days
- Hash Table data structure
- Download the free WannaCry malware checker now
- 2 effective and free ways to check WannaCry
- Dissection attacks Pass the Hash
- Warning with 4 dangerous variants of WannaCry malware
- WannaCry is not dead yet, it just attacked Honda and Australia's traffic camera system
- The more dangerous WannaCry version 2.0 has appeared
May be interested
- The 'deadly' flaw when managing passwords onlinein order to avoid having to remember long passwords and be considered safe, many people use online password management software, to be able to generate the most diverse passwords for each of their accounts.
- Critical RCE vulnerability affects 29 DrayTek router modelsresearchers from security firm trellix have discovered an unauthenticated remote code execution (rce) vulnerability affecting 29 models of draytek routers.
- 7 best proxy sites to try for safer browsingproxy sites are often used by people who want to access blocked sites but don't want to spend money to buy a separate vpn connection.
- 7-zip adds an extremely important security feature on Windowsfinally 7-zip also adds support for the long-requested windows mark-of-the-web security feature.
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worsea new windows search vulnerability can be exploited to automatically open a search window containing remotely hosted malicious executable files just by launching a word document.
- Detected a serious zero-day vulnerability in Microsoft Office, click the document file and it will stickthe newly discovered vulnerability is called follina and currently there is no official patch from microsoft.