This is a collection of anti kaspersky emualtor bugs, most of them are fixed on 2013 version
Depending on how you implement these codes, your program may be MORE detectable because of used API (you know how to hide APIs)
the 3 first sploits found by COB, the 4th is based on grzonu api replace (SuspendThread with ResumeThread)
codes by COB
1 - VirtualAlloc sploit (fixed on 2013 version)
if emualted, ECX register keep the same value after VirtualAlloc, in normal execution it changes
* note : works also against bitdefender, not tested with last one
Code :
or
2 - GetSystemTime sploit (fixed on 2013 version)
Tested on XP and 7, after calling GetSystemTime ecx has the value of the milliseconds, it's not the case if emulated
Code :
3 - zFlag after exception (fixed on 2013 version)
Code :
4 - Api replace (still working)
Idea based on grzonu API replace sploit (SuspendThread with ResumeThread), in this code I replace the ZwTerminateProcess code with "leave;leave;ret"
* Notes : The ExitProcess api doesn't save ESI,EDI and EBX values so you have to do It
Code :