I've unpacked the XignCode anti-cheat files in order to understand better how the anti-cheat works. These files wont work in runtime (because of the security certificate and stripped VirtualMachines), so you can't substitute the original files with these .
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
The file x3.dll was protected by Themida (one of the newest versions), and it had a part of its code virtualized. As I am not able to devirtualize Themida VMs I have stripped it from the file.
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) .
Dekaron.exe loads x3.xem into its process space with LoadLibraryW. Then the address of the first import (and only) of x3.xem is retrieved with GetProcAddress. If that fails, an error code will be set, code = 0xE0190401.
If the address of the export got retrieved successfully it will be called at 0x004024B8. Note that before the call a constant gets pushed onto the stack (PUSH 1). The call will return an address in the stack location pointed by ECX.
Because the constant 1 got pushed before the call, the JNZ at 0x69122477 does not jump. Unfortunately the execution continues inside Themida's VM, so tracing it will be of no use (we can't understand what really happens).
Remember the CALL EAX in picture 2? I let that call execute and returned to the code after that call. Now I have stepped to the second CALL instruction. It calls a value located in the stack (ESP+0xC), as you see it's the address returned by the previous call. This is an address in x3.xem image too.
Unfortunately, most of this procedure is virtualized too .
BYTE bTotalPackets <- The amount of packets to be expected in one "thunk"
BYTE bPacketIndex <- The index of the packet
WORD wDataLen <- Hex number representing the amount of data in bytes
BUF? xData <- Data (size wDataLen)
To clarify, if the bTotalPackets byte is 7 ie, the first packet will have the bPacketIndex 0 next 1 next 2 and so forth until 6, {0,1,2,3,4,5,6} = 7 packets.
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) .
No you CANNOT hack with that...
Read what is written, don't just cry all day "omg i want hacks"
[Release] Unpacked NINEDRAGONS.exe [v.122] 06/05/2022 - 9Dragons - 46 Replies Hi. This is my first release in the 9Dragons section. I was asked to unpack the NINEDRAGONS.exe for the latest patch (patchversion 122).
I've removed the modified yoda's Crypter and the ASProtect 2.xx from the executable.
You need to put the executable in the same location in which the original NINEDRAGONS.exe is (the root folder).
Have fun :)...
Archive password - remove spaces
[Release] Unpacked dekaron.exe [4.6.23] 06/26/2010 - Dekaron Exploits, Hacks, Bots, Tools & Macros - 79 Replies Once again, here's the most recent unpacked dekaron.exe
Idk if the previous ones still work but I'll post this anyway :).
Update!!
I added a minilauncher/launcher bypassed unpacked dekaron.exe too so you don't need to run GGKiller or anything. You can just double-click on the dekaron.exe and you're done :).
I didn't see any effore in posting a virus scan, if someone is interested to do that, feel free...
[Release] Unpacked dekaron.exe [45.0.11][EU 07/19/2009 - Dekaron Exploits, Hacks, Bots, Tools & Macros - 22 Replies Hi.
So here is the unpacked (+modified) dekaron.exe for Dekaron EU patch 45.0.11 .
For people who hate launcher.exe and GameGuard I suggest you to download the "modified_dekaron_45.0.11.rar" because I removed launcher and GameGuard from it.
If someone wants to post a virus scan, feel free, I don't think that's needed.
Have fun :)...
Should i Release my unpacked 4.6.24? 06/23/2009 - Dekaron Exploits, Hacks, Bots, Tools & Macros - 8 Replies i was just gonna release it with a vip hack >.>
[Release] Unpacked 4.5.8 Dekaron.exe 12/07/2008 - Dekaron Exploits, Hacks, Bots, Tools & Macros - 14 Replies Here you go i thought someone would find it handy :)
For anyone that's getting the binkw32.dll error please make sure to place the unpacked.exe in the bin folder then run it in Olly