I've attached an example .ovl file and a .aux file below. I have no knowledge on reverse engineering file formats. So I'm sorry if I'm not the best at learning things. However i will try to do the best that I can. I was able to gather a bit of information on the web. However no one has archived this yet.
'The OVL and OVS files are compressed with zlib. OVL files make up parts of a virtual serialized filesystem, and are partially compressed. OVS files are completely compressed and contains most of the bulk data. Can't give you more info than that at the moment as I'm at work and I've not looked at them for a while.'
Here is the top of the .aux file in hex workshop.
Quick Update: I was able to extract some of the files and get the proper name. However, I'm not able too play them. They're corupt.
I used this quickbms script.
http://forum.xentax.com/viewtopic.php?f ... 664#p74664
Here is the top of the .aux file in hex workshop.
Here is the .ovl file.
OVL FILE DOWNLOAD: https://mega.co.nz/#!Cx5nHLTa!JgTCENPHM ... orLIdPibqs
AUX FILE DOWNLOAD: https://mega.co.nz/#!60YAkQ5Q!6M_aexZSx ... KM7t26BaUs