common.js now loads the following url in an iframe:
hxxp://222.122.138.92/index.htm
which serves an MDAC exploit, downloading:
hxxp://222.122.138.92/UU.exe (md5sum 965583b539fb59b643c7bdd83e269a7e)
after execution, it downloads:
hxxp://www.microsoftmg.com/xxc/ddr.rar (md5sum 648feff7d9cea5e331251dce9cdffc24)
hxxp://www.mgmicrosoft.com/xmfx/help1.rar (md5sum 522707b9255de5d662e2349576f5214b)
hxxp://www.mgmicrosoft.com/xmfx/help.rar (md5sum 648feff7d9cea5e331251dce9cdffc24)
(ddr.rar == help.rar)