ZenHAX

Free Game Research Forum | Official QuickBMS support | twitter @zenhax | SSL HTTPS://zenhax.com
It is currently Sun Jan 24, 2021 11:17 am

All times are UTC




Post new topic  Reply to topic  [ 7 posts ] 
Author Message
 Post subject: Ogre Tale - no extension
PostPosted: Fri Aug 21, 2020 2:08 pm 

Joined: Wed Sep 23, 2015 4:47 pm
Posts: 39
I'd like to get the sprites of this 2D action game, provided, once extracted, that they're easily readable~

Here a few cutted samples. Thanks


Top
   
PostPosted: Fri Oct 09, 2020 11:32 pm 
Site Admin
User avatar

Joined: Wed Jul 30, 2014 9:32 pm
Posts: 11886
I supposed the files are obfuscated because the data isn't readable, but there are visible patterns.


Top
   
PostPosted: Sat Oct 10, 2020 1:29 am 

Joined: Sat Aug 09, 2014 2:34 pm
Posts: 1132
Simple code for decrypt header

Code:
void Orge_Decrypt(BYTE* pBuffer, DWORD dwSize)
{
  BYTE bXorByte = 0xA9;
  for (int i = 0; i < dwSize; bXorByte += 6, i++)
  {
     pBuffer[i] ^= bXorByte;
  }
}


Code:
struct OrgeHeader
{
   DWORD dwSize;
   DWORD dwFiles; // ????
};

OrgeHeader TOrgeHeader;
fread(&TOrgeHeader, sizeof(TOrgeHeader), 1, fi);

TOrgeHeader.dwSize = ~TOrgeHeader.dwSize;
TOrgeHeader.dwFiles ^= 0x12876623;

BYTE *pBuffer = new BYTE[TOrgeHeader.dwSize];
memset(pBuffer, 0, TOrgeHeader.dwSize);
fread(pBuffer, TOrgeHeader.dwSize, 1, fi);

Orge_Decrypt(pBuffer, TOrgeHeader.dwSize);


Content decryption > https://pastebin.com/6pCPz52c


Top
   
PostPosted: Sun Oct 11, 2020 9:23 am 
Site Admin
User avatar

Joined: Wed Jul 30, 2014 9:32 pm
Posts: 11886
Work-in-progress script based on your info:
Code:
get SIZE long
math SIZE ^ -1
get FILES long
math FILES ^ 0x12876623
savepos OFFSET
encryption "incremental xor" 0xa9 6
log MEMORY_FILE OFFSET SIZE
for i = 0 < FILES
    get DUMMY long MEMORY_FILE
next i


Top
   
PostPosted: Sun Oct 11, 2020 10:25 am 

Joined: Sat Aug 09, 2014 2:34 pm
Posts: 1132
Game does not start for me, so I can't look how the content is decrypted :(


Top
   
PostPosted: Fri Jan 01, 2021 3:04 am 

Joined: Fri Aug 31, 2018 4:50 am
Posts: 7
Googling "0x12876623" brought me here. Wow. As far as I can tell, Mages uses the same encoded containers in this game as it does in all current Phantom Breaker games (and hopefully the next one coming soon).

https://github.com/Lucina/ThirdPlaygrou ... tomBreaker

I have a working extractor (and working conversion for Phantom Breaker palette / RLE images), it should work for this as well.


Top
   
PostPosted: Sat Jan 02, 2021 2:41 pm 

Joined: Wed Sep 23, 2015 4:47 pm
Posts: 39
*facepalm* i didn't notice the previous answers, sorry guys.
And thanks corruptturret for your solution :)


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic  [ 7 posts ] 

All times are UTC


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Powered by phpBB® Forum Software © phpBB Limited