not the guy who posted. Did some REing (used the Reloaded exe to bypass Securom's anti-debug) and
Code:
bp 0x571390 "ds esp+4;g"
in WinDBG spits out filename combined with the archive name. Was quicker for poking around than hooking a printf into that code.
When poking around with Ghidra and using a plugin for C++ parsing (they thankfully left RTTI data around) the entrance is in ArkLoader class. THats where that WinDBG breakpoint breaks and prints the value and immediately resumes.
Poking around the functions atm since the algorithm has to be near the function that handles file