Unpacked + Devirtualized NexonGuard/BlackCipher Modules

02/04/2013 20:30 HellSpider#1
Hi.

I thought that the community might find the readable and fixed code of NexonGuard/BlackCipher useful. :)

So what has been done?

+ BlackCipher.exe (BlackCipher.aes) - Unpacked Themida and devirtualized all virtualized code blocks and deobfuscated almost all codereplaced blocks of code.
+ BlackCall.dll (BlackCall.aes) - Devirtualized all CodeVirtualizer code blocks.
+ BlackXchg.dll (BlackXchg.aes) - Devirtualized all CodeVirtualizer code blocks.
+ BlackGate.dll (BlackGate.aes) - Devirtualized all CodeVirtualizer code blocks.
+ NexonGuard.dll (NexonGuard.aes) - Devirtualized all CodeVirtualizer code blocks.
+ eTracer.exe (eTracer.aes) - Unpacked UPX shell

What can I do with these? Is this a bypass?

The files are almost like the original ones on the inside, meaning you can efficiently analyze the inner workings of these files with a disassembler or debugger (IDA, OllyDbg...).
These files are not a bypass.

Lolwut, I can just dump the modules myself, what differs in these?

If you dump the modules your imports are broken, the virtualized and codereplaced code is not restored, meaning that you can't make heads or tails of the interesting code when analyzing your dumps.

Why did you post these files here, and not in the anticheat area?

I think these files are only used in CombatArms thus this section is very relevant.

The filename extensions were all ".aes", how did you decrypt them?

The filename extensions are only to fool beginners, the real extensions are EXE/DLL, just a simple renaming needed.


[Only registered and activated users can see links. Click Here To Register...]

Scans for the paranoid people:

[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
02/09/2013 15:42 Lawliet#2
approved
02/09/2013 18:40 Waller66#3
nice works thanks man :)
02/09/2013 19:04 StuffyxHD#4
Works <3
02/10/2013 16:59 salemanks#5
German Pls ;D
02/11/2013 23:10 Astr0nautx3#6
Pls tell me in german what that programm make >.<
02/11/2013 23:27 xxfabbelxx#7
Quote:
Originally Posted by salemanks View Post
German Pls ;D
Quote:
Originally Posted by Astr0nautx3 View Post
Pls tell me in german what that programm make >.<
Wenn ihr kein Englisch sprechen könnt, ist dieses Release von keiner Relevanz für euch.
02/14/2013 15:12 Astr0nautx3#8
Quote:
Originally Posted by xxfabbelxx View Post
Wenn ihr kein Englisch sprechen könnt, ist dieses Release von keiner Relevanz für euch.
Ja mch würde aber trdz. interessieren was es macht :)
02/14/2013 19:00 proxlive#9
very nice bro thanks
03/19/2013 09:46 barsol20000#10
how to install ?

Quote:
Originally Posted by HellSpider View Post
Hi.

I thought that the community might find the readable and fixed code of NexonGuard/BlackCipher useful. :)

So what has been done?

+ BlackCipher.exe (BlackCipher.aes) - Unpacked Themida and devirtualized all virtualized code blocks and deobfuscated almost all codereplaced blocks of code.
+ BlackCall.dll (BlackCall.aes) - Devirtualized all CodeVirtualizer code blocks.
+ BlackXchg.dll (BlackXchg.aes) - Devirtualized all CodeVirtualizer code blocks.
+ BlackGate.dll (BlackGate.aes) - Devirtualized all CodeVirtualizer code blocks.
+ NexonGuard.dll (NexonGuard.aes) - Devirtualized all CodeVirtualizer code blocks.
+ eTracer.exe (eTracer.aes) - Unpacked UPX shell

What can I do with these? Is this a bypass?

The files are almost like the original ones on the inside, meaning you can efficiently analyze the inner workings of these files with a disassembler or debugger (IDA, OllyDbg...).
These files are not a bypass.

Lolwut, I can just dump the modules myself, what differs in these?

If you dump the modules your imports are broken, the virtualized and codereplaced code is not restored, meaning that you can't make heads or tails of the interesting code when analyzing your dumps.

Why did you post these files here, and not in the anticheat area?

I think these files are only used in CombatArms thus this section is very relevant.

The filename extensions were all ".aes", how did you decrypt them?

The filename extensions are only to fool beginners, the real extensions are EXE/DLL, just a simple renaming needed.


[Only registered and activated users can see links. Click Here To Register...]

Scans for the paranoid people:

[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
how to install ??
03/23/2013 15:27 Kira Mikami#11
Nice !