› Foros › PlayStation 3 › Modchips y Softmods
Filename: bkpps3_swapped.bin
MD5: 7BB5D21D5203CD5E016787D24DFD1323
File Size: 16777216
Validator Version: 1.11
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash Region:
Count - 11 ✔
Length - EFFC00 ✔
Entry Table ✔
Structure - ✔
Asecure_Loader/Metldr:
File Length - 0E85 ✔
Encrypted Binary Size - E890 ✔
Decrypted Binary Size - 0E85 ✔
File Name - metldr ✔
Calculated Metldr Size - E890 ✔
Rev Key - BC78B8F02879A81184A0DA74 (CECHL/CECH20xx (VER-001/DYN-001)) ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Metldr Version - Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59536 ✔
Mean: 232.5625 ✔
Std Dev: 14.5762363683726 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 00000001008500xxxxxxxxxxxxxxxxxxxx ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 000000xxxxxxxxxxxxxxxxxxxxxxxxxxx ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 85 (Retail / Kiosk Europe / CEX CEL) ✔
Model - 09 (CECH20xx (DYN-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - 00248DA5EF43 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static - ✔
Area Start - ✔
Unknown Static - ✔
Unknown Static - ✔
ECID - 01C524001E0E270E0F0A834200000000 ✔
Board ID - 27453023 ✔
Kiban ID - 3HG13899450A ✔
Unknown ID - 008700870114 ✔
CKP2 Data - ✔
Unknown Static - ✔
Unknown Semi Static ID - ✔
CKP Management ID - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 1FFF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02C0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - C0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02C0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - C0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
431.000 ✔
366.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 748259D883F273BA0E7A076F7A7D932A ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: D787A4498C0798C4B55A688B9843BACB ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: B2DD13286198A6375F2878FC9B9E304F ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: E33DCAA639B4DDCDB2E310787E9E53BD ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: F825F0DDAB99E1D574F50C9A95F61B60 ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 17 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 366.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: E005C64998DC504139FC6B6BCB2A60BE ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: A6C8A9D22A85C64D543B786E276B4136 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: B9B603BEB19CFFC1653F2CB4E3DBE039 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3FFA720657A37ADE5CF8E05C5AE051EC ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 998435EA75F039525F05DAE61562D672 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 6EE5C59843E1A687CAB2408327943AFB ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 38EA95055DA2FEFE757392F5FE8C687A ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: B59A05EBCAF1F59F7EBEA7EB409294EF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8611FFCC6812ECFF458A3ACD9678CB4A ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 71B865A86463F181F39DFA18EA22AB51 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: CA63C12DC5525987FD2F9F07D6018BF1 ✔
default.spp ✔
AuthID: N/A ✔
MD5: F1823613691EBC53FB9C1F8AA89AC9FC ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 39768155CE81EAD2E8A72FE2D4732A7E ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: 154E3493CA5CC4D0DD3B587B9748551C ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 98F43409D1CD91F32C24164F9FD70B93 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: 68D59DE436701B2A9B04158116387CE5 ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 0749135D85D0F5B67E107D9BEC4F513F ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: 0CFB5D65CB4A30440175AD6F8AD98A5F ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: EF46BBCD6A8405305BEC3AE0A7FCB410 ✔
prog.srvk ✔
AuthID: N/A ✔
MD5: C6E142FFF29F5DACDBBF56779C0F32C7 ✔
MD5 Validation:
ROS0: 4.31 - 5888F186C7B1B5198F221806201CE7AC ✔
ROS1: 3.66 - 974CDEA2E646758EF40D659957F6E93B ✔
TRVK_PRG0: UNKNOWN - 1AEC9911A867D4525A1A9BC2D9BE7C31 ✔
TRVK_PRG1: [DANGER] - F9C866858178BEAFB136ACFD59E57A45
TRVK_PKG0: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔
TRVK_PKG1: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔
CVTRM:
Header - 53434549 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - TOSHIBAMK1255GSXH ✔
HD Serial - 89COC5MU ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F13 ✔
Decrypted Binary Size - 2F13 ✔
Calculated Bootldr Size - 2F170 ✔
Rev Key - FA46EC86570FCAAA064E8A86 (CECH20xx (DYN-001)) ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 192880 ✔
Mean: 753.4375 ✔
Std Dev: 28.166660865529 ✔
Return
Min Version:
2.70 ✔
File Digest Key:
Total number of keys: 36 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 58 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
20.32% ✔
10.45% ✔
0.27% ✔
donsergio escribió:Buenas tardes, os dejo otro dump, ésta vez de otra consola, a ver si sabreis decirme si el dump es válido, sólo da un error en un MD5
Edito: He sacado varios dumps, limpiando el conector, etc y da siempre éste error.
Concretamente aquí:
"MD5 Validation:
ROS0: 4.31 - 5888F186C7B1B5198F221806201CE7AC ✔
ROS1: 3.66 - 974CDEA2E646758EF40D659957F6E93B ✔
TRVK_PRG0: UNKNOWN - 1AEC9911A867D4525A1A9BC2D9BE7C31 ✔
TRVK_PRG1: [DANGER] - F9C866858178BEAFB136ACFD59E57A45
TRVK_PKG0: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔
TRVK_PKG1: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔"
Agradecería vuestra ayuda.
Un saludo!!Filename: bkpps3_swapped.bin
MD5: 7BB5D21D5203CD5E016787D24DFD1323
File Size: 16777216
Validator Version: 1.11
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash Region:
Count - 11 ✔
Length - EFFC00 ✔
Entry Table ✔
Structure - ✔
Asecure_Loader/Metldr:
File Length - 0E85 ✔
Encrypted Binary Size - E890 ✔
Decrypted Binary Size - 0E85 ✔
File Name - metldr ✔
Calculated Metldr Size - E890 ✔
Rev Key - BC78B8F02879A81184A0DA74 (CECHL/CECH20xx (VER-001/DYN-001)) ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Metldr Version - Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59536 ✔
Mean: 232.5625 ✔
Std Dev: 14.5762363683726 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 00000001008500xxxxxxxxxxxxxxxxxxxx ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 000000xxxxxxxxxxxxxxxxxxxxxxxxxxx ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 85 (Retail / Kiosk Europe / CEX CEL) ✔
Model - 09 (CECH20xx (DYN-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - 00248DA5EF43 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static - ✔
Area Start - ✔
Unknown Static - ✔
Unknown Static - ✔
ECID - 01C524001E0E270E0F0A834200000000 ✔
Board ID - 27453023 ✔
Kiban ID - 3HG13899450A ✔
Unknown ID - 008700870114 ✔
CKP2 Data - ✔
Unknown Static - ✔
Unknown Semi Static ID - ✔
CKP Management ID - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 1FFF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02C0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - C0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02C0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - C0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
431.000 ✔
366.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 748259D883F273BA0E7A076F7A7D932A ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: D787A4498C0798C4B55A688B9843BACB ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: B2DD13286198A6375F2878FC9B9E304F ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: E33DCAA639B4DDCDB2E310787E9E53BD ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: F825F0DDAB99E1D574F50C9A95F61B60 ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 17 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 366.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: E005C64998DC504139FC6B6BCB2A60BE ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: A6C8A9D22A85C64D543B786E276B4136 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: B9B603BEB19CFFC1653F2CB4E3DBE039 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3FFA720657A37ADE5CF8E05C5AE051EC ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 998435EA75F039525F05DAE61562D672 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 6EE5C59843E1A687CAB2408327943AFB ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 38EA95055DA2FEFE757392F5FE8C687A ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: B59A05EBCAF1F59F7EBEA7EB409294EF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8611FFCC6812ECFF458A3ACD9678CB4A ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 71B865A86463F181F39DFA18EA22AB51 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: CA63C12DC5525987FD2F9F07D6018BF1 ✔
default.spp ✔
AuthID: N/A ✔
MD5: F1823613691EBC53FB9C1F8AA89AC9FC ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 39768155CE81EAD2E8A72FE2D4732A7E ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: 154E3493CA5CC4D0DD3B587B9748551C ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 98F43409D1CD91F32C24164F9FD70B93 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: 68D59DE436701B2A9B04158116387CE5 ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 0749135D85D0F5B67E107D9BEC4F513F ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: 0CFB5D65CB4A30440175AD6F8AD98A5F ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: EF46BBCD6A8405305BEC3AE0A7FCB410 ✔
prog.srvk ✔
AuthID: N/A ✔
MD5: C6E142FFF29F5DACDBBF56779C0F32C7 ✔
MD5 Validation:
ROS0: 4.31 - 5888F186C7B1B5198F221806201CE7AC ✔
ROS1: 3.66 - 974CDEA2E646758EF40D659957F6E93B ✔
TRVK_PRG0: UNKNOWN - 1AEC9911A867D4525A1A9BC2D9BE7C31 ✔
TRVK_PRG1: [DANGER] - F9C866858178BEAFB136ACFD59E57A45
TRVK_PKG0: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔
TRVK_PKG1: UNKNOWN - 4B1ADFF1B137EB2BCE88D3DC48881043 ✔
CVTRM:
Header - 53434549 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - TOSHIBAMK1255GSXH ✔
HD Serial - 89COC5MU ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F13 ✔
Decrypted Binary Size - 2F13 ✔
Calculated Bootldr Size - 2F170 ✔
Rev Key - FA46EC86570FCAAA064E8A86 (CECH20xx (DYN-001)) ✔
PerConsole Nonce - 14F97219D05C8CDAC3CAEB57 ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 192880 ✔
Mean: 753.4375 ✔
Std Dev: 28.166660865529 ✔
Return
Min Version:
2.70 ✔
File Digest Key:
Total number of keys: 36 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 58 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
20.32% ✔
10.45% ✔
0.27% ✔