Need help with VmwareHardenedLoader?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

564 Stars 225 Forks MIT License 80 Commits 19 Opened issues


Vmware Hardened VM detection mitigation loader (anti anti-vm)

Services available


Need anything else?

Contributors list


Vmware Hardened VM detection mitigation loader

For now, only Windows (vista~win10) x64 guests are supported.

It get vmware guest undetected by VMProtect 3.2, Safengine and Themida (anti-vm feature).

What it does

the VmLoader driver patches SystemFirmwareTable at runtime, it removes all detectable signatures like "VMware" "Virtual" "VMWARE".


Visual Studio 2015 / 2017 and Windows Driver Kit 10 are required.

Open VmLoader.sln with Visual Studio 2015 / 2017

Build VmLoader as x64/Release. (No x86 support for now)

Remember to test-sign "bin/vmloader.sys" if you want to load it in test-sign mode.



Do not install vmtools, it will ruin everything!

use TeamViewer / AnyDesk / mstsc / VNC viewer instead!

1st Step: Add following settings into .vmx

hypervisor.cpuid.v0 = "FALSE"
board-id.reflectHost = "TRUE"
hw.model.reflectHost = "TRUE"
serialNumber.reflectHost = "TRUE"
smbios.reflectHost = "TRUE"
SMBIOS.noOEMStrings = "TRUE" = "TRUE" = "TRUE" = "TRUE" = "TRUE"
monitor_control.disable_directexec = "TRUE"
monitor_control.disable_chksimd = "TRUE"
monitor_control.disable_ntreloc = "TRUE"
monitor_control.disable_selfmod = "TRUE"
monitor_control.disable_reloc = "TRUE"
monitor_control.disable_btinout = "TRUE"
monitor_control.disable_btmemspace = "TRUE"
monitor_control.disable_btpriv = "TRUE"
monitor_control.disable_btseg = "TRUE"
monitor_control.restrict_backdoor = "TRUE"

If you have a SCSI virtual disk at scsi0 slot (first slot) as your system drive, remember add

scsi0:0.productID = "Whatever you want"
scsi0:0.vendorID = "Whatever you want"

I use

scsi0:0.productID = "Tencent SSD"
scsi0:0.vendorID = "Tencent"

2nd Step: Modify MAC address

Modify guest's MAC address to whatever except below:

    TCHAR *szMac[][2] = {
        { _T("\x00\x05\x69"), _T("00:05:69") }, // VMWare, Inc.
        { _T("\x00\x0C\x29"), _T("00:0c:29") }, // VMWare, Inc.
        { _T("\x00\x1C\x14"), _T("00:1C:14") }, // VMWare, Inc.
        { _T("\x00\x50\x56"), _T("00:50:56") }, // VMWare, Inc.


You could add

ethernet0.address = "Some random mac address"

into vmx file instead of modifying MAC address in vmware GUI

I use

ethernet0.address = "00:11:56:20:D2:E8"

3rd Step: Run install.bat in vm guest as Administrator Priviledge

If an error occurs when start service, use DbgView to capture kernel debug output. you can post an issue with DbgView output information and with your ntoskrnl.exe attached.

If no error occurs, then everything works fine.


Vmware guest win8.1 x64 with VMProtect 3.2 packed program (anti-vm option enabled)

before sigs after


This software is released under the MIT License, see LICENSE.

Some util procedures are from is used to disasm ntoskrnl code.


vmware virtual graphic card information could be detected by querying DXGI interface, which could be modified by editing graphic driver files.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.