diff --git a/06-DCC/Blender/导出PSK_PSA脚本 & 部分UModel AES Key.md b/06-DCC/Blender/导出PSK_PSA脚本 & 部分UModel AES Key.md index 435370e..81d7a7b 100644 --- a/06-DCC/Blender/导出PSK_PSA脚本 & 部分UModel AES Key.md +++ b/06-DCC/Blender/导出PSK_PSA脚本 & 部分UModel AES Key.md @@ -785,9 +785,15 @@ D:\OtherTools\GameAssets\umodel_win32_1590\umodel_64.exe -path=D:\Games\DRAGON.B - C0000A_DMG_受到伤害 - C0000A_EVE 事件 - C01 过场动画 - - + - 吃饭动画 + - Cmn_Eat_don_cdm + - /AT/Content/Art/DEMO/cmn/eat/don/cdm/C001Aaa0/010/Cmn_Eat_don_cdm_C001Aaa0_010_Fod054p1.uasset +Cp1001 +MDL/Fod +C:\Users\loujiajie\Desktop\DRAGON_BALL_Z_KAKAROT\Art\DEMO\cmn\eat\don\cdm\C001Aaa0\010 +C:\Users\loujiajie\Desktop\DRAGON_BALL_Z_KAKAROT\Art\MDL\Cpl\Cpl001\Model # Pak反汇编&UModel - 虚幻4(ue4)引擎加密pak解包教程(初学者向x64源码逆向) - 看雪的文章 - 知乎 https://zhuanlan.zhihu.com/p/96480632