Hi all,
I wanted to share my progress on cracking open KIU's .zrc files.
After a lot of research, I found out that .zrc files are simply .arc (darc) files that have been compressed with the LZ11 algorithm.
Here's a comparison of two files found in KIU's romfs: 0.arc and a0.zrc.
Notice how both files have the magic word 'darc' in them, but the .zrc's instance of the 'darc' text is offsetted.
This offset is caused by the LZ11 compression's magic word, which is highligted in red. The number 11 (note: thats 0x11 in hex, so converted to decimal it would be 17) marks that this file has been compressed with LZ11.
You can use github user magical's nlzss python script to uncompress the .zrc file and yield a valid darc (.arc) file.
Then you can use github user yellows8's darctool program to extract the contents of the uncompressed .arc!
I hope this discovery helps someone!
I wanted to share my progress on cracking open KIU's .zrc files.
After a lot of research, I found out that .zrc files are simply .arc (darc) files that have been compressed with the LZ11 algorithm.
Here's a comparison of two files found in KIU's romfs: 0.arc and a0.zrc.
Notice how both files have the magic word 'darc' in them, but the .zrc's instance of the 'darc' text is offsetted.
This offset is caused by the LZ11 compression's magic word, which is highligted in red. The number 11 (note: thats 0x11 in hex, so converted to decimal it would be 17) marks that this file has been compressed with LZ11.
You can use github user magical's nlzss python script to uncompress the .zrc file and yield a valid darc (.arc) file.
Then you can use github user yellows8's darctool program to extract the contents of the uncompressed .arc!
I hope this discovery helps someone!
Last edited by kanuki,