https://github.com/blaukovitch/denuvo_profiler
DENUVO v1-v2 Virtual Machine profiling tool and Electronic Arts Origin decoder
https://github.com/blaukovitch/denuvo_profiler
crack denuvo ea electronic origin secrets securom virtual-machine
Last synced: 6 months ago
JSON representation
DENUVO v1-v2 Virtual Machine profiling tool and Electronic Arts Origin decoder
- Host: GitHub
- URL: https://github.com/blaukovitch/denuvo_profiler
- Owner: Blaukovitch
- License: unlicense
- Created: 2024-04-08T16:55:55.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-04-09T19:43:15.000Z (over 1 year ago)
- Last Synced: 2025-04-15T15:05:30.388Z (6 months ago)
- Topics: crack, denuvo, ea, electronic, origin, secrets, securom, virtual-machine
- Language: C++
- Homepage: https://cracklab.team/index.php?threads/876/
- Size: 3.74 MB
- Stars: 23
- Watchers: 2
- Forks: 7
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# DENUVO_Profiler
This is part of the original source code of **DENUVO_Profiler**, written by 386 Team in 2014-2017 to investigate the first versions of DENUVO (eq VMProtect 2-3), when there were no lifters and other modern devirtualisation tools.
**DENUVO_Profiler** is a subsequent development of the **SecuROM_Profiler** utility - the simplest tool for visualising the operation of a virtual machine and effectively controlling the data it uses in the byte-code tape (p-code).
**DENUVO_Profiler** also hunts for Electronic Arts (Origin) licence containers on the current user's machine and can extract their contents, with including the GameToken.
## Opportunities "inspire"
* Detection number of VMProtect contexts;
* Detection type of VM "islands" (HANDLES);
* Hook of VM HANDLES (Profiling);
* Show you DENUVO HWID (actual for eraly versions, modern version have a two new components);
* Decode Electronic Arts origin license (XML);
** Decode DENUVO GameToken;
## DENUVO GameToken
GameToken is Secret X-Table, which contains mathematical dependencies between you current hardware and encrypted HWID data in this table.

## Folders description
*PRIMARY:*
* `\ENGINE\` - "DENUVO_Inspire" main engine;
* `\ThirdParty\Origin\` - Electronic Arts Origin (Origin CORE dissaembly info);*Secondary:*
* `\BEA\` - BEA engine source;
* `\BeaEngine\` - BEA engine dlls & lib;
* `\XED\` - XED dissasembly;
* `\CRYPTO\` - simple implementation of AES/MD5;## Versioning
* DENUVO v1-2
* VMProtect 2.6.x and hingher
* VMProtect 3.0.x (early)## SONY DADC AG SecuROM_Profiler
## See also
**DENUVO LEAK content**
https://github.com/Blaukovitch/DENUVO-LEAK/## Tiberium reversing
All materials published as part of **Tiberium reversing** - full stack of articles (xakep.ru), cracking videos (YOUTUBE) and C/C++/ASM coding tools.
(C) *2011-2024*