Bump?
I've poked around a bit, and discovered (through GNU Strings) that string "/info.json" (yep, with forward slash) is compiled into Game.exe. Later, when running the game through x32dbg I've also found that there is "enc" string (every encrypted file in the game directory begins with it) is also there, in the compiled code.
That means there are several options, either
- this encryption algorithm is built into cocos2d
- this encryption algorithm is built into Pixel Game Maker MV
- this encryption algorithm was coded manually by the game's developer for this game only
I have little knowledge and experience in reverse engineering native applications, and also I'm pretty lazy. So I've stopped around here for now.
Still, I've found a way to enjoy new content in 0.70 without sacrificing full understanding of what is going on: I've used OCR (pirated ABBYY Screenshot Reader version 9.x.x) and Google Translate. This scheme is surprisingly effective, just choose "Simplified Chinese" as language to recognize and Screenshot Reader works almost flawlessly (sometimes it recognizes comma as digit five ('5') or chinese dot as letter O ('o').
Of course, it is still tedious to run OCR after every VN frame, but it seems to be the best solution that we have for now.