Hi.
I've unpacked the XignCode anti-cheat files in order to understand better how the anti-cheat works. These files wont work in runtime (because of the security certificate and stripped VirtualMachines), so you can't substitute the original files with these :).
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
List of files:
The file x3.dll was protected by Themida (one of the newest versions), and it had a part of its code virtualized. As I am not able to devirtualize Themida VMs I have stripped it from the file.
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) :).
Loading of x3.xem:
XignCode packet structure:
XignCode kernel-mode hooks:
-Update Log-
~13.11.2010~
+ Initial release (XIGNCODE 3.1)
~19.01.2011~
+ Detailed file information
+ Basic packet structure
Archive password (without spaces):
I've unpacked the XignCode anti-cheat files in order to understand better how the anti-cheat works. These files wont work in runtime (because of the security certificate and stripped VirtualMachines), so you can't substitute the original files with these :).
Note! This is not a XignCode bypass! These files are just for analyzing purposes!
List of files:
Code:
splash.xem --> splash.bmp --> XIGNCODE Splash Bitmap tray.xem --> tray.ico --> XIGNCODE Tray Icon x3.xem --> x3.dll --> XIGNCODE System xm.exe --> xm.exe --> XIGNCODE Message Printer xmag.xem --> xmag.xem --> XIGNCODE File Archive xsg.xem --> xsg.dll --> XIGNCODE System Guard xxd.xem --> xxd.dll --> XIGNCODE WatchDog Process
The file x3.dll was protected by Themida (one of the newest versions), and it had a part of its code virtualized. As I am not able to devirtualize Themida VMs I have stripped it from the file.
This thread is supposed to be a research thread of XignCode. If you have made some research you can post it in this thread and I will add it to the main post (with your approval of course) :).
Loading of x3.xem:
XignCode packet structure:
XignCode kernel-mode hooks:
-Update Log-
~13.11.2010~
+ Initial release (XIGNCODE 3.1)
~19.01.2011~
+ Detailed file information
+ Basic packet structure
Archive password (without spaces):
Code:
w w w . e l i t e p v p e r s . d e