http://indetectables.net/viewtopic.php?f=7&t=55796 It basically simulates that you are running a VM so the some/most malware won't try to infect your machine
Yeah, the image and therein impression(s) of even the slightest trace of professionalism could sure use some work... https://github.com/LordNoteworthy/al-khaser (derived from the link in post #3). ~ Image Removed As Per Policy - However, Image is Found On the Above Link ~
Thank you @clubhouse1 but it's a link for the script. I have already the script, I would like the exe files !
Sadly, if you compile the script, you get an executable without interface and options. I'm searching the executables derived from the script. You can see a screenshot of them on this page: http://indetectables.net/viewtopic.php?f=7&t=55796
Well the executable's are in the following link 32 and 64 bit flavours...I don't know the hash files to check their authenticity... http://www dot zonavirus.com/noticias/2016/antifooling-simula-que-una-maquina-es-virtual-para-que-algunos-malware-no-se-ejecuten.asp
Well, I put this, through Google Translate: hXXp://www.hackplayers.com/2016/12/antifooling-simular-que-tu-maquina-es-virtual.html And, it will come up with this, in English: hXXps://translate.google.com.au/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.hackplayers.com%2F2016%2F12%2Fantifooling-simular-que-tu-maquina-es-virtual.html&edit-text= Make of it, what you will.
Google translation of my last link.... https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http://www.zonavirus.com/noticias/2016/antifooling-simula-que-una-maquina-es-virtual-para-que-algunos-malware-no-se-ejecuten.asp&edit-text= Hackplayers translation....(web) https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http://www.zonavirus.com/noticias/2016/antifooling-simula-que-una-maquina-es-virtual-para-que-algunos-malware-no-se-ejecuten.asp&edit-text= This is what it appears to do using the vmware option https://s27.postimg.org/fsdr2r5xf/Capture.png