Did you know? elitepvpers has its own image host, epvpimg.com.
[Release] Unpacked XignCode Files
This is a discussion on [Release] Unpacked XignCode Files within the Dekaron Exploits, Hacks, Bots, Tools & Macros forum part of the Dekaron category; Hi.
I've unpacked the XignCode anti-cheat files in order to understand better how the anti-cheat works. These files wont work ...
I've unpacked the XignCode anti-cheat files in order to understand better how the anti-cheat works. These files wont work in runtime (because of the security certificate and stripped VirtualMachines), so you can't substitute the original files with these .
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
The file x3.dll was protected by Themida (one of the newest versions), and it had a part of its code virtualized. As I am not able to devirtualize Themida VMs I have stripped it from the file.
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) .
Loading of x3.xem:
Spoiler:
Dekaron.exe loads x3.xem into its process space with LoadLibraryW. Then the address of the first import (and only) of x3.xem is retrieved with GetProcAddress. If that fails, an error code will be set, code = 0xE0190401.
If the address of the export got retrieved successfully it will be called at 0x004024B8. Note that before the call a constant gets pushed onto the stack (PUSH 1). The call will return an address in the stack location pointed by ECX.
Because the constant 1 got pushed before the call, the JNZ at 0x69122477 does not jump. Unfortunately the execution continues inside Themida's VM, so tracing it will be of no use (we can't understand what really happens).
Remember the CALL EAX in picture 2? I let that call execute and returned to the code after that call. Now I have stepped to the second CALL instruction. It calls a value located in the stack (ESP+0xC), as you see it's the address returned by the previous call. This is an address in x3.xem image too.
Unfortunately, most of this procedure is virtualized too .
XignCode packet structure:
Spoiler:
Code:
BYTE bTotalPackets <- The amount of packets to be expected in one "thunk"
BYTE bPacketIndex <- The index of the packet
WORD wDataLen <- Hex number representing the amount of data in bytes
BUF? xData <- Data (size wDataLen)
To clarify, if the bTotalPackets byte is 7 ie, the first packet will have the bPacketIndex 0 next 1 next 2 and so forth until 6, {0,1,2,3,4,5,6} = 7 packets.
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) .
No you CANNOT hack with that...
Read what is written, don't just cry all day "omg i want hacks"