I would like to request a bms script for extracting Nosgoth game assets.
Nosgoth (http://www.nosgoth.com/) was a multiplayer game by Psyonix and Square-Enix
This game was developed using Unreal engine 3. Unfortunately, the game got canceled last year.
Since the game was cancelled I have been working on a fan game based on Nosgoth.
It would be great if I could have access to the 3D models, animations, and audio of the game, to use them as reference for the new fan game.
I extracted a few 3D models from the game using ninjaripper before the game was cancelled, but when the game got cancelled I couldn't use ninjaripper anymore because the game launcher just wont open the game anymore. I extracted mostly characters from the game, but I need models and textures from the maps to use them as example for a new fan game.
The game files are in *.upk format, but it's a different type of upk format, since Umodel is not able to extract them: http://www.gildor.org/smf/index.php?topic=2217.0
You can still find the game for download on Steam.
Here is an example of Nosgoth's upk file: https://www.mediafire.com/?5flbm1iv1kem5gv
And another example is here, with the game executable: http://i-zed.net/u/Nosgoth.rar
It would be great if anyone can help making the script for decrypting/extracting Nosgoth assets, specially 3D models of buildings and character animations.
Thanks!
Nosgoth *.upk files
-
- Posts: 7
- Joined: Tue Jan 17, 2017 8:44 pm
Re: Nosgoth *.upk files
I was trying to follow some tutorials on how to create my own quickBMS script to extract these upk files from Nosgoth, but I got stuck right at the beginning when I used an hex viewer to try to discover the upk content format and just a bunch of invalid characters showed up at the begining of the file, like !#$^%
Any news on this topic?
Any news on this topic?
-
- Posts: 7
- Joined: Tue Jan 17, 2017 8:44 pm
Re: Nosgoth *.upk files
Here is my progress so far, using offzip I was able to identify the offset list of the upk file:
- open input file: BCMPGame\CookedPCConsole\Armor_WingedVampire_Evolved_ARC_SF.upk
- zip data to check: 32 bytes
- zip windowBits: 15
- seek offset: 0x00000000 (0)
+------------+-----+----------------------------+----------------------+
| hex_offset | ... | zip -> unzip size / offset | spaces before | info |
+------------+-----+----------------------------+----------------------+
0x000083bd ................................... 70287 -> 131072 / 0x0001964c _ 33725 8:7:28:0:1:83ad4fc9
0x0001964c ....................................... 79200 -> 131072 / 0x0002cbac _ 0 8:7:28:0:1:66ce1810
0x0002cbac ................................................. 98531 -> 131072 / 0x00044c8f _ 0 8:7:28:0:1:e9e00e88
0x00044c8f .......................................... 84969 -> 131072 / 0x00059878 _ 0 8:7:28:0:1:ef23bd32
0x00059878 ....................................... 78747 -> 131072 / 0x0006cc13 _ 0 8:7:28:0:1:5b34f679
0x0006cc13 .......................................... 84782 -> 131072 / 0x00081741 _ 0 8:7:28:0:1:40eae8a9
0x00081741 ........................................... 87222 -> 131072 / 0x00096bf7 _ 0 8:7:28:0:1:d46b8313
0x00096bf7 .......................................... 84087 -> 131072 / 0x000ab46e _ 0 8:7:28:0:1:ba6f14eb
0x000ab46e .......................................... 85910 -> 131072 / 0x000c0404 _ 0 8:7:28:0:1:71652430
0x000c0404 ....................... 46191 -> 131072 / 0x000cb873 _ 0 8:7:28:0:1:a9d5b48f
0x000cb873 ..................... 42558 -> 131072 / 0x000d5eb1 _ 0 8:7:28:0:1:ad68a930
0x000d5eb1 ........................... 55018 -> 131072 / 0x000e359b _ 0 8:7:28:0:1:c7b4e996
0x000e359b ................... 36923 -> 131072 / 0x000ec5d6 _ 0 8:7:28:0:1:70a8177d
0x000ec5d6 ............................ 56573 -> 131072 / 0x000fa2d3 _ 0 8:7:28:0:1:bbb6f36b
0x000fa2d3 ...................................... 76870 -> 131072 / 0x0010cf19 _ 0 8:7:28:0:1:c18621a7
0x0010cf19 ....... 12833 -> 18982 / 0x0011013a _ 0 8:7:28:0:1:a045c22c
After that I tried to perform the extraction of that file using offzip but a bunch of dat files, a txt file, and an xxx file was created, and now I have no idea what to do with those files other then checking them in the hex editor (I did that but didn't find any clue).
- open input file: BCMPGame\CookedPCConsole\Armor_WingedVampire_Evolved_ARC_SF.upk
- zip data to check: 32 bytes
- zip windowBits: 15
- seek offset: 0x00000000 (0)
+------------+-----+----------------------------+----------------------+
| hex_offset | ... | zip -> unzip size / offset | spaces before | info |
+------------+-----+----------------------------+----------------------+
0x000083bd ................................... 70287 -> 131072 / 0x0001964c _ 33725 8:7:28:0:1:83ad4fc9
0x0001964c ....................................... 79200 -> 131072 / 0x0002cbac _ 0 8:7:28:0:1:66ce1810
0x0002cbac ................................................. 98531 -> 131072 / 0x00044c8f _ 0 8:7:28:0:1:e9e00e88
0x00044c8f .......................................... 84969 -> 131072 / 0x00059878 _ 0 8:7:28:0:1:ef23bd32
0x00059878 ....................................... 78747 -> 131072 / 0x0006cc13 _ 0 8:7:28:0:1:5b34f679
0x0006cc13 .......................................... 84782 -> 131072 / 0x00081741 _ 0 8:7:28:0:1:40eae8a9
0x00081741 ........................................... 87222 -> 131072 / 0x00096bf7 _ 0 8:7:28:0:1:d46b8313
0x00096bf7 .......................................... 84087 -> 131072 / 0x000ab46e _ 0 8:7:28:0:1:ba6f14eb
0x000ab46e .......................................... 85910 -> 131072 / 0x000c0404 _ 0 8:7:28:0:1:71652430
0x000c0404 ....................... 46191 -> 131072 / 0x000cb873 _ 0 8:7:28:0:1:a9d5b48f
0x000cb873 ..................... 42558 -> 131072 / 0x000d5eb1 _ 0 8:7:28:0:1:ad68a930
0x000d5eb1 ........................... 55018 -> 131072 / 0x000e359b _ 0 8:7:28:0:1:c7b4e996
0x000e359b ................... 36923 -> 131072 / 0x000ec5d6 _ 0 8:7:28:0:1:70a8177d
0x000ec5d6 ............................ 56573 -> 131072 / 0x000fa2d3 _ 0 8:7:28:0:1:bbb6f36b
0x000fa2d3 ...................................... 76870 -> 131072 / 0x0010cf19 _ 0 8:7:28:0:1:c18621a7
0x0010cf19 ....... 12833 -> 18982 / 0x0011013a _ 0 8:7:28:0:1:a045c22c
After that I tried to perform the extraction of that file using offzip but a bunch of dat files, a txt file, and an xxx file was created, and now I have no idea what to do with those files other then checking them in the hex editor (I did that but didn't find any clue).
-
- Posts: 7
- Joined: Tue Jan 17, 2017 8:44 pm
Re: Nosgoth *.upk files
I was able to decrypt the upk files and extract them using umodel/ueviewer. But the animations (psa extracted) are all wrong, the left side of the model gets distorted for some reason.
Here is one of the decrypted upk files that I opened in Gildor's program and looked all distorted.
Here is one of the decrypted upk files that I opened in Gildor's program and looked all distorted.
-
- Posts: 36
- Joined: Sat May 14, 2016 8:03 pm
Re: Nosgoth *.upk files
rdlady wrote:I was able to decrypt the upk files and extract them using umodel/ueviewer. But the animations (psa extracted) are all wrong, the left side of the model gets distorted for some reason.
Here is one of the decrypted upk files that I opened in Gildor's program and looked all distorted.
I'm also interested in this game.
Can you tell me how exactly was this file decrypted?
-
- Posts: 36
- Joined: Sat May 14, 2016 8:03 pm
Re: Nosgoth *.upk files
Delutto wrote:Use UModel.
I would, but the point of this thread is that the packages are encrypted or whatever, so I cannot use UModel.
It will always throw errors at me, no matter the settings.
-
- Posts: 561
- Joined: Tue Oct 13, 2015 1:26 pm
Re: Nosgoth *.upk files
lolwatt wrote:Delutto wrote:Use UModel.
I would, but the point of this thread is that the packages are encrypted or whatever, so I cannot use UModel.
It will always throw errors at me, no matter the settings.
Ask for for help on Gildor's forum.
-
- Posts: 36
- Joined: Sat May 14, 2016 8:03 pm
Re: Nosgoth *.upk files
Yeah, I know what was discussed there. There is nothing to ask.
My question was targeted to rdlady or someone who knows how the files were decrypted...
My question was targeted to rdlady or someone who knows how the files were decrypted...