Bypasses VMProtect's VMWare & VMWare Tools detection trough user-mode API hooks. Works for versions prior to 3.6 since they didn't use direct syscalls before
- Add hypervisor.cpuid.v0 = "FALSE" in your .vmx file
- Inject the DLL at the same time the target process starts. I will attach an image below that shows the optimal settings for the Xenos injector.