Users browsing this thread: 1 Guest(s)
|| KOF 98 UM OL Compressed .png Files ||
#1
Sad 
Hello again, I would like to know how you can extract the contents of a .png file, it seems that is compressed with something, attached a few files. I hope you can help me.


.zip   054.zip (Size: 106.94 KB / Downloads: 114)
Reply
Thanked by:
#2
https://mega.nz/#!bgYW2ILa!gCfdY8GfcR9NP...inixyDpOCU

Use this QuickBMS script, and you should get working PNG files (likewise with the ones Deathbringer posted in your previous topic). These images use a simple XOR for the first 16 bytes, by the looks of it, and literally has the key necessary to unscramble the header right at the beginning ("PLAYCRAB00000000"). Excellent obfuscation there.

[Image: oJas1Dt.png]

Only problem is these PNGs are paletted with transparency (just like with the Pocket All-Star stuff that's on tSR already), so you might need to find a program that can import those properly.
Reply
Thanked by:
#3
Thank you!!! You saved me!
Reply
Thanked by:
#4
Another question how would it be for the "jpg" files? since there are also some with the same format. I try replacing in the bms that you passed me the png by jpg but it did not work for me. I attach some .jpg


.zip   jpg.zip (Size: 801.6 KB / Downloads: 90)
Reply
Thanked by:
#5
Seems like those work just fine with the script, too:
[Image: 9R59JUN.jpg]
Reply
Thanked by:
#6
Oh! Yes, work it, but when I use the script in this files especially didn't work. When I open in hex editor the first line is different. I upload the files.  

http://www.mediafire.com/file/qibz1osamu...a.rar/file
Reply
Thanked by:
#7
(09-26-2018, 04:37 PM)kusanagiruiz Wrote: Oh! Yes, work it, but when I use the script in this files especially didn't work. When I open in hex editor the first line is different. I upload the files.  

http://www.mediafire.com/file/qibz1osamu...a.rar/file
Uh... Judging by the filenames, it looks like you ran the script on them twice. Make sure to only use it on files that don't have "_deXOR" at the end.
Reply
Thanked by:
#8
Yes, it works, the script does not support many files, and I was doing 1000 in 1000, thank you very much, you can close post.
Reply
Thanked by:
#9
(09-23-2018, 02:39 AM)Random Talking Bush Wrote: https://mega.nz/#!bgYW2ILa!gCfdY8GfcR9NP...inixyDpOCU

Use this QuickBMS script, and you should get working PNG files (likewise with the ones Deathbringer posted in your previous topic). These images use a simple XOR for the first 16 bytes, by the looks of it, and literally has the key necessary to unscramble the header right at the beginning ("PLAYCRAB00000000"). Excellent obfuscation there.

[Image: oJas1Dt.png]

Only problem is these PNGs are paletted with transparency (just like with the Pocket All-Star stuff that's on tSR already), so you might need to find a program that can import those properly.
Can this be viewed from a phone? Or do you need a computer. I'm using APK editor to see the assets, Res, etc...folders but I don't see the png files. Thanks.
Reply
Thanked by:


Forum Jump: