This is a Unity (2021.3.9f1) game that has reached EOS (End of Service).
The APK contains UI assets, which can be extracted using standard Unity tools. However, the cache files are different, and some require additional processing.
What I Have Achieved So Far:
Extracted Audio and Video Files
These files have AFS2 and CRID headers.
I found a decryption key inside the APK: "0048B2AB558A01B6".
Using CRID-usm-Decrypter and HCA key generation tools, I successfully extracted these assets.
The Problem:
The final implemented files before service shutdown confirm that the necessary assets exist.
All content up to the EOS update is present in the extracted audio and video files, confirming that the cache holds the game’s full assets.
However, 3D models and textures are missing, and the remaining files have no identifiable file extensions.
Two distinct binary patterns (see images) appear frequently in these unidentified files, leading me to believe they contain graphics data.
I suspect that these files contain the graphic data, but their format is unknown.
I also tried using AI to perform decryption with the extracted key, but this has not yielded any results either.
What I Am Currently Doing:
I lack experience in disassembly or reverse engineering.
I am using AI-assisted analysis to examine Il2CppDumper output and searching for clues via Ghidra, but progress has been slow.
I have attached the cache files, APK, and DummyDlls. or alternatively, I will provide a sample of the cache with only the relevant files.
If anyone is familiar with where to start or knows any effective tools or methods to analyze these files, I would greatly appreciate your guidance.