Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Virtual Box rdtsc #73

Closed
Tribiune opened this issue Jan 21, 2022 · 4 comments
Closed

Virtual Box rdtsc #73

Tribiune opened this issue Jan 21, 2022 · 4 comments

Comments

@Tribiune
Copy link

Hello and sorry for posting here. I am using Virtual box and i am trying to make Windows 10 as stealthier as possible. Solved all pafish detections except the two rdtsc ones. I would be thankful if anyone can help with these.

Checking the difference between CPU timestamp counters (rdtsc)
Checking the difference between CPU timestamp counters (rdtsc) forcing VM exit

@a0rtega
Copy link
Owner

a0rtega commented Jan 22, 2022

We have a few issues discussing this, see #68 and #63. There are also many sources on the internet on the subject.

I don't have a solution to fix those. The only reliable way I found in the past to avoid these detections was using QEMU in full system emulation mode (not virtualization).

@Tribiune
Copy link
Author

Thanks a lot for your response and sharing your knowledge!

@alu1al
Copy link

alu1al commented May 31, 2024

@Tribiune please how did you passed all the mouse detections?

@Tribiune
Copy link
Author

I used windows 10 machine inside an Ubuntu Cuckoo Sandbox, and Cuckoo has a human interaction module that you can turn on and off that moves that mouse by itself. Also as far as i remember you can move the mouse when pafish runs and bypass it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants