CCT = compressed / compiled
CST = source
CXT = encrypted, compressed and compiled.
You must be registered to see links
You decompress it, most "dcr decompilers" only reverse the image data, they don't "get rid of" the code, they just don't know how to deserialize it to code. If you deserialize (or decompile if you will) the bytecode you can get a pretty damn close representation of the original source that's almost haunting enough. There's been numerous people who've gotten work done on it before including Matthew Parlane and others. There's more "secrets" on my discord if anyone's interested. I'll be taking everything I can find and putting it all under one of my domains when I get the chance.
You can do the same to a Director .exe it just packs it all in the EXE / DMG. Then the embedded interpreter decompresses / interprets the internal contents at runtime from itself.