› Foros › PlayStation 3 › Modchips y Softmods
DarkMasterIII escribió:Hola
Hace poco adquirí 2 consolas PS3 SLIM una con CFW 3.55 y la otra con OFW 4.31
La que estaba en 4.31 le intente hacer downgrade pero tuve un inconveniente se me apago la consola y tuve un brick como en el video - http://www.youtube.com/watch?v=kuOqNakGmxI
(Tengo respaldo de la NOR) seguí el tutorial de UNBRICK PS3 del siguiente link - hilo_tutorial-unbrick-ps3-con-e3-flasher-backup-dump-nor_1829926
Todo bien la consola no se apagaba pude hacer todos los procesos hasta el paso 24 donde inserte el dongle pero la consola no reconoce ningún puerto USB (no se si esto es normal) tengo el PS3BREAK 1.2 configurado en downgrade (dice de 3.50 a 3.41) no se si es por eso o el Dongle no es compatible, la imagen es la siguiente - http://www.r4carteds.com/images/ps3-break-1.2_01.jpg
La otra que esta en CFW 3.55 la pase a 3.55 OFW y también sufrio un Brick (solo se prende y se apaga completamente sin dejar bombillos prendidos)
No tengo respaldo de la NOR
Bien como esta en 3.55 como recupero la NOR? en esa no tengo ni la menor idea ya que me indican en todos los tutoriales que la tengo que tener, otros usuarios me dicen que se puede recuperar ¿pero como? se los agradecería
Conesta ultima desde el brick no he intentado nada ya que tengo soldado el E3 Flasher a la OFW (la primera)
Desde ya muchas gracias.
LUCKYMAS escribió:de donde eres?
WXPMotion escribió:Hola Darkmaster. El problema que tienes en la primera consola es porque tiene la flash borrada o corrupta por eso te hace eso. Por eso tienes que comprobar que la imagen que extrajiste de ella este correcta (con flowrebuilder puedes comprobarla) si la has extraido mal, amigo mío, siento comunicarte que tienes un pisapapeles, por eso se insiste tanto en sacar varias copias.
Por otra parte la que estaba en 3.55 que se te haya producido un brick que te haga lo mismo es raro si has dejado que instale todo desde el recovery perfectamente no tenía porque haberte exo eso. En todo caso intenta entrar en recovery de nuevo haber si te deja y reinstala directamente el cf 4.30 de rogero o el 4.31 de miralatijera que va de muerte.
Si no te deja hacer nada te toca con suerte extraer la nand que no este corrupta y parchearla y si todo va bien downgradearla con el jig (que tambíen te recocomendaría el jig e3 card después de haber probado varios jig psp, jig casero... el e3 es el que mejor va) y ya seguir los pasos.
Mucha suerte y no te preocupes que alguna sale seguro.
SaludosDarkMasterIII escribió:Hola
Hace poco adquirí 2 consolas PS3 SLIM una con CFW 3.55 y la otra con OFW 4.31
La que estaba en 4.31 le intente hacer downgrade pero tuve un inconveniente se me apago la consola y tuve un brick como en el video - http://www.youtube.com/watch?v=kuOqNakGmxI
(Tengo respaldo de la NOR) seguí el tutorial de UNBRICK PS3 del siguiente link - hilo_tutorial-unbrick-ps3-con-e3-flasher-backup-dump-nor_1829926
Todo bien la consola no se apagaba pude hacer todos los procesos hasta el paso 24 donde inserte el dongle pero la consola no reconoce ningún puerto USB (no se si esto es normal) tengo el PS3BREAK 1.2 configurado en downgrade (dice de 3.50 a 3.41) no se si es por eso o el Dongle no es compatible, la imagen es la siguiente - http://www.r4carteds.com/images/ps3-break-1.2_01.jpg
La otra que esta en CFW 3.55 la pase a 3.55 OFW y también sufrio un Brick (solo se prende y se apaga completamente sin dejar bombillos prendidos)
No tengo respaldo de la NOR
Bien como esta en 3.55 como recupero la NOR? en esa no tengo ni la menor idea ya que me indican en todos los tutoriales que la tengo que tener, otros usuarios me dicen que se puede recuperar ¿pero como? se los agradecería
Conesta ultima desde el brick no he intentado nada ya que tengo soldado el E3 Flasher a la OFW (la primera)
Desde ya muchas gracias.
Psmaniaco escribió:Para poder recuperarlas tienes que tener los datos vitales de cada consola, cada una lleva los suyos propios y no son intercambiables, habria que revisar los dumps para ver si se pueden arreglar.
Un saludo.
DarkMasterIII escribió:Psmaniaco escribió:Para poder recuperarlas tienes que tener los datos vitales de cada consola, cada una lleva los suyos propios y no son intercambiables, habria que revisar los dumps para ver si se pueden arreglar.
Un saludo.
Hola, te he enviado datos de la consola original brickeada, aun no toco la que esta en 3.55 para no meter la pata
Cualquier cosa que se me informe pasaría a la 3.55 aunque esta es importante
varicela escribió:DarkMasterIII escribió:Psmaniaco escribió:Para poder recuperarlas tienes que tener los datos vitales de cada consola, cada una lleva los suyos propios y no son intercambiables, habria que revisar los dumps para ver si se pueden arreglar.
Un saludo.
Hola, te he enviado datos de la consola original brickeada, aun no toco la que esta en 3.55 para no meter la pata
Cualquier cosa que se me informe pasaría a la 3.55 aunque esta es importante
Referente a la que tenias en CFW 3.55, pienso que esa consola habia estado downgradeada anteriormente y estaba con un cfw nocheck y no tenia las Toogle QA activas, y al actualizar a OFW 3.55 se brickeo.
De ser asi,(si es slim) tienes que comprar un teensy++v2, progskeet 1.1 o E3 flasher para poder hacerla andar.
Saludos
Psmaniaco escribió:DarkMasterIII, los dumps que me has pasado el 1 esta KO del todo, en el 2 y el 2 te falta el bootloader, faltando eso la consola es irrecuperable por el momento .
Un saludo.
DarkMasterIII escribió:Psmaniaco escribió:DarkMasterIII, los dumps que me has pasado el 1 esta KO del todo, en el 2 y el 2 te falta el bootloader, faltando eso la consola es irrecuperable por el momento .
Un saludo.
Hola,
Gracias por la ayuda, al saber que por ahora es un Brick irrecuperable en la PS3, bueno por lo menos así no me parto mas la cabeza aunque veré que se hace con ella y lo peor es que seguí "el tutorial Oficial del E3 Flasher" donde se sobrescribe la dump para "comprobar que arranca" , bien ahora vamos con la 3.55 , en esa si que no quiero meter la pata ya que seria el colmo y por eso preguntare.
Con el E3 Flasher pego el punto NOR Tristate (para evitar que la consola se apague), hay como saco la NOR? que combinación pongo?
Recuerden que esta ultima se mantiene en OFW 3.55 cuando tuvo el brick (se apaga completamente) que FW es aconsejable que le ponga?
Gracias.
dolby1989 escribió:te a pasado lo mismo que a mi me falla el bootloader y ai tengo la consola de posabasos (eso si un posavasos muy bonito xd) lo siento amigo un saludo
LUCKYMAS escribió:dolby1989 escribió:te a pasado lo mismo que a mi me falla el bootloader y ai tengo la consola de posabasos (eso si un posavasos muy bonito xd) lo siento amigo un saludo
tu problema fue que los chek te lo daban poe bueno pero el bootloader era demasudo corto 130kb por que leyo dos yyyy al final por algun fallo y por no seguir un tuto fiable y sacar mas dump , cosa que no has sido el primero ni el ultimo , pxmanuaco se cargo otra al borrar por error. Son cosax que pueden pasar en dongrader, acidentes inesperados o ignorancia en otros casos.
DarkMasterIII escribió:Psmaniaco escribió:DarkMasterIII, los dumps que me has pasado el 1 esta KO del todo, en el 2 y el 2 te falta el bootloader, faltando eso la consola es irrecuperable por el momento .
Un saludo.
Hola,
Gracias por la ayuda, al saber que por ahora es un Brick irrecuperable en la PS3, bueno por lo menos así no me parto mas la cabeza aunque veré que se hace con ella y lo peor es que seguí "el tutorial Oficial del E3 Flasher" donde se sobrescribe la dump para "comprobar que arranca" , bien ahora vamos con la 3.55 , en esa si que no quiero meter la pata ya que seria el colmo y por eso preguntare.
Con el E3 Flasher pego el punto NOR Tristate (para evitar que la consola se apague), hay como saco la NOR? que combinación pongo?
Recuerden que esta ultima se mantiene en OFW 3.55 cuando tuvo el brick (se apaga completamente) que FW es aconsejable que le ponga?
Gracias.
LUCKYMAS escribió:dolby1989 escribió:te a pasado lo mismo que a mi me falla el bootloader y ai tengo la consola de posabasos (eso si un posavasos muy bonito xd) lo siento amigo un saludo
tu problema fue que los chek te lo daban poe bueno pero el bootloader era demasudo corto 130kb por que leyo dos yyyy al final por algun fallo y por no seguir un tuto fiable y sacar mas dump , cosa que no has sido el primero ni el ultimo , pxmanuaco se cargo otra al borrar por error. Son cosax que pueden pasar en dongrader, acidentes inesperados o ignorancia en otros casos.
Giru escribió:yo tengo un problema parecido con una FAt. Saque 4 copias de la NOR, las 4 exactas entre si, comprobados lso dumps con ps3 nor dum checker, flowrebuild y hasta en hexadecimal, siendo todas exactamente iguales. Parchee el fichero a grabar en la nor correctamente, pero el problema es que la ps3 enciende, pero no reconoce el dongle. mi bootloader ocupa 187kb, y empiezan las 2 lineas igual:
...«ƒï¹vÄÞÑ52|Ów
...«WÌCfÍ..«NoÜž
y en hexadecimal:
00 00 2E AB 83 EF B9 76 C4 DE D1 35 32 7C D3 77
00 00 2E AB 57 CC 43 66 CD 0D 13 AB 4E 6F DC 9E
por 00 00 2 como dice el tuto. el resto de datos estan todos correctos, pero no reconoce el dongle para entrar en factory mode. El dongle que uso es el AVR Key este compatible con el psgrade dentro. Este dongle me ha funcionado siempre excepto en esta consola. Por donde pueden ir los tiros? Si necesitais mi dump, hos paso el enalce para descargarlo.
Tal vez con otro dongle??no tengo otro, solamente podria probar lo de la psp...
Gracias
Giru escribió:lo siento si te molesto el caso el mio, pero al ver que era un caso similar escribi aqui. Ahora mismo abro otro post
un saludo
Giru escribió:lo siento si te molesto el caso el mio, pero al ver que era un caso similar escribi aqui. Ahora mismo abro otro post
un saludo
fox_el_negro escribió:tambien tengo dos slim brikeadas!
pemse habrir un hilo personal! pero no le veo el caso! aprobechando la junta d expertos!
subo mis dumps en cuanto pueda! (esto me paso por confiado!)
fox_el_negro escribió:tambien tengo dos slim brikeadas!
pemse habrir un hilo personal! pero no le veo el caso! aprobechando la junta d expertos!
subo mis dumps en cuanto pueda! (esto me paso por confiado!)
http://www.mediafire.com/?gztd40bwjf35vvc
http://www.mediafire.com/?w461201q72x049i
Home
Betterway ElectronicsPS3 Dev WikiFirst Region
GenericPer ConsolePer FirmwareSecond Region
GenericLv0
Per ConsoleOther
OtherContact
BwE#ps3downgrade
Filename: slim51170113_swapped.bin
MD5: 8AAE2A47973C5CBD652753AFF26CBF22
File Size: 16777216
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI (0x1, 0x2, 0x0) ✔
Filled Block - ✔
Return
Flash Region:
Count - 11 ✔
Length - EFFC00 ✔
Entry Table ✔
Asecure_Loader/Metldr:
File Length - 0E8E ✔
Encrypted Binary Size - E920 ✔
Decrypted Binary Size - 0E8E ✔
File Name - metldr ✔
Calculated Metldr Size - E920 ✔
Rev Key - 99873BC715F280809C302225 (CECH20xx/CECH21xx/CECH25xx (DYN-001/SUR-001/JSD/JTP-001)) ✔
PerConsole Nonce - EF0EC524B3774E3F251FABEE ✔
Metldr Version - Metldr Old (Downgradeable) ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59680 ✔
Mean: 233.125 ✔
Std Dev: 101.149316921695 - [WARNING]
EID:
Count - [DANGER] - 00
Length - [DANGER] - 0000
[DANGER]000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
EID0:
IDPS - [DANGER] - 00000000000000000000000000000000
PerConsole Nonce - 000000000000000000000000 ✔
Static + Count - [DANGER] - 00000000
EID2:
P-Block Size - [DANGER] - 0000
S-Block Size - [DANGER] - 0000
Padding ✔
EID3:
PerConsole Nonce - EF0EC524B3774E3F251FABEE ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - [DANGER] - 000000010084000B140C2FA018D5DDBE
PerConsole Nonce - EF0EC524B3774E3F251FABEE ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - [DANGER] - 00
Model - [DANGER] - 00
IDPS - [DANGER] - � /��ݾ
CISD:
Count - [DANGER] - FF
Length - [DANGER] - FFFF
[DANGER]FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
CISD0:
MAC Address - FFFFFFFFFFFF ✔
Unknown Static - ✔
CISD1:
IDLog Header - [DANGER] - FFFFFFFF
Unknown Static -[DANGER] - FFFF
Area Start -[DANGER] - FFFF
Unknown Static -[DANGER] - FFFF
Unknown Static - ✔
ECID - [DANGER] ��������������������������������
Board ID - [DANGER] ��������
Kiban ID - [DANGER] ������������
Unknown ID - [DANGER] FFFFFFFFFFFF
CKP2 Data -[DANGER] - FFFF
Unknown Static - ✔
Unknown Semi Static ID - ✔
CKP Management ID - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - FFFF ✔
WLAN Filler -[DANGER] - FFFFFFFFFFFFFFFFFFFFFFFFFFFF
Unreferenced Area - ✔
CCSD:
Count - [DANGER] - FF
Length - [DANGER] - FFFF
Filler -[DANGER] - FFFFFFFFFFFFFFFF
File Table -[DANGER] - FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space -[WARNING] - Too long to display!
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space -[WARNING] - Too long to display!
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space -[WARNING] - Too long to display!
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space -[WARNING] - Too long to display!
ROS0/1 Versions:
420.000 ✔
420.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
[WARNING]- A877AD063613DD3C8E3731198F53B3EC
sdk_version ✔
AuthID: N/A ✔
MD5: 6061903C18588CC21378E51EEB2486E3 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[WARNING]- B2E8073FD096CCAC457BF3751CD01EC6
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
[WARNING]- 77F53A060D4A41FC6EEBEEA64E23FE18
spu_utoken_processor.self ✔
[DANGER] - A64877A1D1E8D131
[WARNING]- 2D77DABC56FAA22C5D93A69AF9FBD23A
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[WARNING]- 06BFD34F22689BAA164BDD4AE701903E
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
[WARNING]- FAAEFC5B32634BA0CF87D09AE479340C
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
[WARNING]- A36F92FA39D615D2423A51EDBDC78685
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
[WARNING]- DAA71A2B87020E6D05DA50B387C8C88C
me_iso_spu_module.self ✔
[DANGER] - 00007C0000000040
[WARNING]- 5D47BEFA4C25990A8AD74570E4A4AA30
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
[WARNING]- 53451D5C02D6E16063D998F5C78EBDDB
sb_iso_spu_module.self ✔
[DANGER] - 363D40CD7EC06CE4
[WARNING]- B02C3743A1341E02B939F2D4AF688622
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
[WARNING]- D2B7BEDCC1172753472D5DEE1A5EC7E0
sv_iso_for_ps2emu.self ✔
[DANGER] - 990CE04AA3B36F73
[WARNING]- D2DD8B272F32868F62108EFE190D8EF0
default.spp ✔
AuthID: N/A ✔
[WARNING]- 90C60BC4780251FF4EA51E87B1370750
lv1.self ✔
[DANGER] - 311B850DDE691ACD
[WARNING]- D291C12D5AEF72D86FEB5CA7944A8F88
lv0 ✔
AuthID: 1FF0000001000001 ✔
[WARNING]- 8CEB980D072FB20378B6C7FA7E651D10
lv0.2 ✔
[DANGER] - D8C5AEFD43F8A332
[WARNING]- 2893E6F64AA7C845615479759E841E29
lv2_kernel.self ✔
[DANGER] - 962FAF92BABD24F0
[WARNING]- 01B50CAA9D1A383F3FA4A7ACD02357D1
eurus_fw.bin ✔
AuthID: N/A ✔
[WARNING]- CE2DF394B4FE646325302B4EA709A3B2
emer_init.self ✔
[DANGER] - 0000000000000000
[WARNING]- 534E956FB4589C2BDD1087957336E1D2
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[WARNING]- 3F46B3B1BE510C352ED3F0C68EFB4E03
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: C07093BEF106EE5CD1C118421964B2D9 ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
[WARNING]- A2636E57F05D42F1D4A10B4C3D78A4E4
sdk_version ✔
AuthID: N/A ✔
MD5: A01B32CD2B1E29FA0351FBE1BC1B986F ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[WARNING]- ABE7743D6D7F6F0889CB02D9D17EBC8D
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
[WARNING]- 0283CDE8C51F384622318C586AAB14A3
spu_utoken_processor.self ✔
[DANGER] - AC35FE07490C199E
[WARNING]- A97785D47C0907DB87E45B479C3AC676
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[WARNING]- E546DE52562E36B5A924393F34025541
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
[WARNING]- 78DA9F7D332BE64AC618897F297410D2
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
[WARNING]- DA93ED1C7D2DF16CCFD51CE0BE3DBCCF
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
[WARNING]- 1400547D807FF863935A8AD8B25D240C
me_iso_spu_module.self ✔
[DANGER] - 00007C0000000040
[WARNING]- 44E15B7EF41D9D2B2CD9E8C60AEFAF95
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
[WARNING]- 5B089CD563A9097CDA7B12FD8FF362CB
sb_iso_spu_module.self ✔
[DANGER] - 69AD4D936C39A1E4
[WARNING]- 89419D1F3151AADA93C18F6E7EBE6FC7
me_iso_for_ps2emu.self ✔
[DANGER] - E259CBEE756A52B0
[WARNING]- F023091AD24CD6FC9DE3E7CC0D370C70
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[WARNING]- 009C29AC0E05DB8EFCAA6CEEC5B6F45F
default.spp ✔
AuthID: N/A ✔
[WARNING]- B8868B342F9665A8701ABC854A218081
lv1.self ✔
[DANGER] - 8F8EFD6DFEB34B20
[WARNING]- 8EDA247408D840128B5EDA3CA7B660FC
lv0 ✔
[DANGER] - EA6FF026CEA7E848
[WARNING]- 078FF091DFAC5554D3EE2CEBA96F71AE
lv0.2 ✔
[DANGER] - DB2543689A3C871B
[WARNING]- 63FD20CB5DA96597B7D402ADA919A90C
lv2_kernel.self ✔
[DANGER] - 6ED34C47DB23A559
[WARNING]- A2A5F70384C5433337702DCB83478FD5
eurus_fw.bin ✔
AuthID: N/A ✔
[WARNING]- 68F11BFD94296622824F51C8D674CC9A
emer_init.self ✔
[DANGER] - 0000000000000000
[WARNING]- F259AC477594DD31FE4819364257E511
hdd_copy.self ✔
[DANGER] - BAD0D4BF92636D2B
[WARNING]- B183BB5EEED5C5AB5E59D0D0590439EC
manu_info_spu_module.self ✔
[DANGER] - 3CCE3A815CDABC41
[WARNING]- 628F9DB20267D3E32730A37EA5325D37
MD5 Validation:
ROS0: [DANGER] - 229CDB6F2D973813335BAD6B5C7769A8
ROS1: [DANGER] - B0F1627D4FC11CD4C1FA5F2B9EAC9936
TRVK_PRG0: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319 ✔
TRVK_PRG1: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PKG0: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
TRVK_PKG1: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
CVTRM:
Header - 53434549 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000003000002 - mgvideo.self ✔
1070000003000002 - mgvideo.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000003000002 - mgvideo.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000003000002 - mgvideo.self ✔
1070000003000002 - mgvideo.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000003000002 - mgvideo.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Filled Block -[WARNING] - Too long to display!
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - TOSHIBAMK1665GSXH ✔
HD Serial - 805NB84Y ✔
Unused Area -[WARNING] - Too long to display!
Hash 1 - ✔
Unused Area -[WARNING] - Too long to display!
Hash 2 - ✔
Unused Area -[WARNING] - Too long to display!
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area -[WARNING] - Too long to display!
Hash 1 - ✔
Unused Area -[WARNING] - Too long to display!
Hash 2 - ✔
Unused Area -[WARNING] - Too long to display!
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area -[WARNING] - Too long to display!
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F4B ✔
Decrypted Binary Size - 2F4B ✔
Calculated Bootldr Size - 2F4F0 ✔
Rev Key - CB9E152428B44FD2F93FBC43 (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - EF0EC524B3774E3F251FABEE ✔
Filled Area[WARNING] - Too long to display!
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193776 ✔
Mean: 756.9375 ✔
Std Dev: 40.4800120127084 - [WARNING]
Return
[DANGER]
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
PerConsole Nonce Match:
[DANGER] - EF0EC524B3774E3F251FABEE 000000000000000000000000 EF0EC524B3774E3F251FABEE EF0EC524B3774E3F251FABEE EF0EC524B3774E3F251FABEE
Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
[000000000FACE0FF00000000DEADBEEF] found at offset: 0x20 - [DANGER]
[49464900000000010000000200000000] found at offset: 0x400 - [DANGER]
[000000010000000B0000000000EFFC00] found at offset: 0x800 - [DANGER]
[0000000000000400000000000002E800] found at offset: 0x820 - [DANGER]
[617365637572655F6C6F616465720000] found at offset: 0x840 - [DANGER]
[000000000002EC000000000000010000] found at offset: 0x880 - [DANGER]
[65454944000000000000000000000000] found at offset: 0x8A0 - [DANGER]
[000000000003EC000000000000000800] found at offset: 0x8E0 - [DANGER]
[63495344000000000000000000000000] found at offset: 0x900 - [DANGER]
[000000000003F4000000000000000800] found at offset: 0x940 - [DANGER]
[63435344000000000000000000000000] found at offset: 0x960 - [DANGER]
[000000000003FC000000000000020000] found at offset: 0x9A0 - [DANGER]
[7472766B5F7072673000000000000000] found at offset: 0x9C0 - [DANGER]
[000000000005FC000000000000020000] found at offset: 0xA00 - [DANGER]
[7472766B5F7072673100000000000000] found at offset: 0xA20 - [DANGER]
[000000000007FC000000000000020000] found at offset: 0xA60 - [DANGER]
[7472766B5F706B673000000000000000] found at offset: 0xA80 - [DANGER]
[000000000009FC000000000000020000] found at offset: 0xAC0 - [DANGER]
[7472766B5F706B673100000000000000] found at offset: 0xAE0 - [DANGER]
[00000000000BFC000000000000700000] found at offset: 0xB20 - [DANGER]
[726F7330000000000000000000000000] found at offset: 0xB40 - [DANGER]
[00000000007BFC000000000000700000] found at offset: 0xB80 - [DANGER]
[726F7331000000000000000000000000] found at offset: 0xBA0 - [DANGER]
[0000000000EBFC000000000000040000] found at offset: 0xBE0 - [DANGER]
[637674726D0000000000000000000000] found at offset: 0xC00 - [DANGER]
[0000000100000001000000000002E800] found at offset: 0x1000 - [DANGER]
[6D65746C647200000000000000000000] found at offset: 0x1040 - [DANGER]
[000000000FACE0FF00000000DEADBEEF] found at offset: 0x10020 - [DANGER]
[49464900000000010000000200000000] found at offset: 0x10400 - [DANGER]
[000000010000000B0000000000EFFC00] found at offset: 0x10800 - [DANGER]
[0000000000000400000000000002E800] found at offset: 0x10820 - [DANGER]
[617365637572655F6C6F616465720000] found at offset: 0x10840 - [DANGER]
[000000000002EC000000000000010000] found at offset: 0x10880 - [DANGER]
[65454944000000000000000000000000] found at offset: 0x108A0 - [DANGER]
[000000000003EC000000000000000800] found at offset: 0x108E0 - [DANGER]
[63495344000000000000000000000000] found at offset: 0x10900 - [DANGER]
[000000000003F4000000000000000800] found at offset: 0x10940 - [DANGER]
[63435344000000000000000000000000] found at offset: 0x10960 - [DANGER]
[000000000003FC000000000000020000] found at offset: 0x109A0 - [DANGER]
[7472766B5F7072673000000000000000] found at offset: 0x109C0 - [DANGER]
[000000000005FC000000000000020000] found at offset: 0x10A00 - [DANGER]
[7472766B5F7072673100000000000000] found at offset: 0x10A20 - [DANGER]
[000000000007FC000000000000020000] found at offset: 0x10A60 - [DANGER]
[7472766B5F706B673000000000000000] found at offset: 0x10A80 - [DANGER]
[000000000009FC000000000000020000] found at offset: 0x10AC0 - [DANGER]
[7472766B5F706B673100000000000000] found at offset: 0x10AE0 - [DANGER]
[00000000000BFC000000000000700000] found at offset: 0x10B20 - [DANGER]
[726F7330000000000000000000000000] found at offset: 0x10B40 - [DANGER]
[00000000007BFC000000000000700000] found at offset: 0x10B80 - [DANGER]
[726F7331000000000000000000000000] found at offset: 0x10BA0 - [DANGER]
[0000000000EBFC000000000000040000] found at offset: 0x10BE0 - [DANGER]
[637674726D0000000000000000000000] found at offset: 0x10C00 - [DANGER]
[0000000100000001000000000002E800] found at offset: 0x11000 - [DANGER]
[6D65746C647200000000000000000000] found at offset: 0x11040 - [DANGER]
[000000000FACE0FF00000000DEADFACE] found at offset: 0x1E00020 - [DANGER]
[000000000FACE0FF00000000DEADFACE] found at offset: 0x1E10020 - [DANGER]
Bulk AuthID Check:
Total number of .self IDs: 100 ✔
00 / FF / Other Statistics:
19.26% ✔
10.05%[DANGER]
0.27% ✔
Home
Betterway ElectronicsPS3 Dev WikiFirst Region
GenericPer ConsolePer FirmwareSecond Region
GenericLv0
Per ConsoleOther
OtherContact
BwE#ps3downgrade
Filename: slim104070113_swapped.bin
MD5: 460CC400FAFF050739F2E1DCEFD3A40E
File Size: 16777216
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI (0x1, 0x2, 0x0) ✔
Filled Block - ✔
Return
Flash Region:
Count - 11 ✔
Length - EFFC00 ✔
Entry Table ✔
Asecure_Loader/Metldr:
File Length - 0E8E ✔
Encrypted Binary Size - E920 ✔
Decrypted Binary Size - 0E8E ✔
File Name - metldr ✔
Calculated Metldr Size - E920 ✔
Rev Key - 99873BC715F280809C302225 (CECH20xx/CECH21xx/CECH25xx (DYN-001/SUR-001/JSD/JTP-001)) ✔
PerConsole Nonce - E75F21D7632154FED3CB5740 ✔
Metldr Version - Metldr Old (Downgradeable) ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59680 ✔
Mean: 233.125 ✔
Std Dev: 15.7290788531505 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 0000000100840009F400CA7451495700 ✔
PerConsole Nonce - E75F21D7632154FED3CB5740 ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - E75F21D7632154FED3CB5740 ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 0000000100840009F400CA7451495700 ✔
PerConsole Nonce - E75F21D7632154FED3CB5740 ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 09 (CECH20xx (DYN-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - A8E3EE0CDF18 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static - ✔
Area Start - ✔
Unknown Static - ✔
Unknown Static - ✔
ECID - 01C52400D118B70E0711544200000000 ✔
Board ID - 27453354 ✔
Kiban ID - 401349907574 ✔
Unknown ID - 009900990118 ✔
CKP2 Data - ✔
Unknown Static - ✔
Unknown Semi Static ID - ✔
CKP Management ID - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
411.000 ✔
421.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 55D6329A236ED0688F265B743B36A574 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: AAB4E36F96CBC38F467916DA90CBEF50 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 22A2421B0480C8B84035CD033ED5CE5C ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 8CF2D3540A23145D62BD769EDB77BEDF ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: E574ECD6A390C897109DCA694E60ACC1 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 94FF8362CF30C910FA24DBF673B9F54B ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 74888B1B3BE6167446DD8889F9578E88 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: AC08B9D1C0E149DB8FF1F431F0FD0ADF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: EABC2FCCB6A55379899F15840186BC40 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 0BC9354572D05D51486F22F9A3D978D0 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A42AAB01A041244E942E2FE41ECB8AC1 ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 953FF19CCAE42F8F968A254E0AAB121D ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 699117B7ED1316E224962315699E0548 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 5D97E236CA63742334FE5F4C27310E30 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: A523B2F347A8ED163762272F0BE36679 ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: B8B1B877A986829250F4AEB8FA659EB9 ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 9F2AF0C15E675C0B050A54A40B098C7A ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: 80C625E852153E01515E520C127C9BFB ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 93131FEDB860BB54C797D6DDAA03A234 ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: C85AABA6D749F06DD8185438618F06E1 ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: 4770E1703B1E89E4E6E50D45AB7DEDB7 ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: DFA57876B24FC22271BEB5AC8937E924 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 1CDADCDFD160D79DBDDBAC1CAECD12BD ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: A8A53E6D1D7CC28078F99C1F519C5137 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: F2A59E52DD948322D2639B6F03B91A9D ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: DECF5B1F722DE5C53A34C4158CBE0899 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: D60A539456242BF009CCDD3ED6F21336 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 580F02EB1B82B87AE9665F0516BB0CAB ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 01E4E6278BC28848B1BAEEC701D55283 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 70D3B68E0C728207406D480E4A3656FC ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 557EAFDF7E797EA7171DEA9641374E5D ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: EC8CDA8E16FB208D76AC299660E4135E ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: B08D78746B93476FB5AD90D38EC930B3 ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 40C7028BB76300E8BE1A467E7E491C3F ✔
default.spp ✔
AuthID: N/A ✔
MD5: 6F44BF83B6137567002D22FEB059499B ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: D9F7A57ED93E336BFCC6B3C10D1018DA ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: 4DDEB486E7F07AF0558947760B9928EB ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E96DDFBE233480C63EEC6A92E9FD2ED5 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: 78AEC0F582573C5F75C5972CB473AD87 ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: E84D7FA526F13DDC259A860B021CE64F ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: A3232FF40D3CB50488C90911DB286D8A ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: 2DBADC4A2DCEAC35F69A8E445491734D ✔
MD5 Validation:
ROS0: 4.11 - F57AF374CC32D73068C98BD9FF0886D9 ✔
ROS1: 4.21 - 9A01E6AC0F70D4AE33ACAE0C6B17C66B ✔
TRVK_PRG0: 3.30 - E4B49673D8DFCFB8D1004D65F25E9A95 ✔
TRVK_PRG1: 3.30 - E4B49673D8DFCFB8D1004D65F25E9A95 ✔
TRVK_PKG0: UNKNOWN - 891E968BDF18E3667037FA0D54C3A9F8 ✔
TRVK_PKG1: UNKNOWN - 891E968BDF18E3667037FA0D54C3A9F8 ✔
CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000003000002 - mgvideo.self ✔
1070000003000002 - mgvideo.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000003000002 - mgvideo.self ✔
1070000003000002 - mgvideo.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - TOSHIBAMK1655GSXH ✔
HD Serial - 2047SCH5 ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F3B ✔
Decrypted Binary Size - 2F3B ✔
Calculated Bootldr Size - 2F3F0 ✔
Rev Key - 7780B134B6DF258A1ABBAB4D (CECH20xx (DYN-001)) ✔
PerConsole Nonce - E75F21D7632154FED3CB5740 ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193520 ✔
Mean: 755.9375 ✔
Std Dev: 27.7072228142488 ✔
Return
Min Version:
2.70 ✔
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
Bulk AuthID Check:
Total number of .self IDs: 78 ✔
00 / FF / Other Statistics:
20.07% ✔
10.44% ✔
0.27% ✔
http://www.4shared.com/zip/raqjnjuG/dump_ps3_A.html
descarado escribió:Hola,
mi primer post en el foro de paso me presento,
mi nombre es Alejandro, soy de Montevideo Uruguay,
soy tecnico de celulares hace mas de 5 años me dedico a esto tanto hardware como software,
ya alguien si tiene problemas y necesita ayuda puede contactarme que con gusto dare mi apoyo,
bueno les comento ya con experiencia en software y la importancia de las backup..
me trajo un amigo su ps3 y decidi comprar el e3 y darle..
desatendi el paso de checkear el dump de una ps3 slim cech2501 OFW 4.31
con E3 creo tres backup que al chequear despues con nor chequer daban datos no validos..
siguiendo los pasos del video oficial de la E3 no recuerdo la primera vez del fallo pero fue siguiendo el video si fue al subirle el e3_downgrade..
ahora le he soldado el Nor Ti pero no hay caso y como veo que no hay otra que dump valido, he visto que se pueden fusionar los datos validos, el FlowRme da error al extraer, segui el tuto para revivir de el brick de aqui usandolos archivos pero no sube el e3_downgrade da error 11001000
podria alguien decirme si los dump son recuperables o si hay forma alguna dump generica para intentar levantar este muerto ..
desde ya mil graciashttp://www.4shared.com/zip/raqjnjuG/dump_ps3_A.html
BR
varicela escribió:Sintiendolo mucho esta consola ya no tiene solucion
Los dumps son iguales pero corruptos, no se pueden sacar los datos vitales.
Es una lastima pero es asi
descarado escribió:varicela escribió:Sintiendolo mucho esta consola ya no tiene solucion
Los dumps son iguales pero corruptos, no se pueden sacar los datos vitales.
Es una lastima pero es asi
bueno te agradezco por tu tiempo,
necesitaba que lo confirmara alguien ya experimentado para terminar de convencerme
mi primer intento RIP ya nunca pasare por alto chequear un dump..
gracias
BR
firewire70a escribió:Hola, me gustaria si me pudieran ayudar tengo este dump nor de un slim, aver si se puede recuperar. gracias
http://www.putlocker.com/file/8437D4CB28581DCD
firewire70a escribió:no da video
firewire70a escribió:he conseguido la nor original, y la he pasado por BwE_NOR_Validator: y todo parece correcto, tb dejo un enlace con la nor original:
http://www.putlocker.com/file/130795131DF2697F
Home First Region Second Region Lv0 Other Contact
Filename: bkpps3_swapped.bin
MD5: 9446B26037941AAED74DF3C60920397D
File Size: 16777216
Validator Version: 1.31
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E8E ✔
Encrypted Binary Size - E920 ✔
Decrypted Binary Size - 0E8E ✔
File Name - metldr ✔
Calculated Metldr Size - E920 ✔
Rev Key - 99873BC715F280809C302225 (CECH20xx/CECH21xx/CECH25xx (DYN-001/SUR-001/JSD/JTP-001)) ✔
PerConsole Nonce - 5867E6D734793E803B031689 ✔
Metldr Version - Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59680 ✔
Mean: 233.125 ✔
Std Dev: 14.7472829002897 ✔
Entropy: 7.99711733716905 Bits ✔
Encrypted Individual Data:
Entries - 06 ✔
eEID Package Length - 1DD0 ✔
Blank Filler - ✔
EID Entry Table:
EID0
Entry Point - 0070 ✔
Length - 0860 ✔
EID Number - 0 ✔
EID1
Entry Point - 08D0 ✔
Length - 02A0 ✔
EID Number - 1 ✔
EID2
Entry Point - 0B70 ✔
Length - 0730 ✔
EID Number - 2 ✔
EID3
Entry Point - 12A0 ✔
Length - 0100 ✔
EID Number - 3 ✔
EID4
Entry Point - 13A0 ✔
Length - 0030 ✔
EID Number - 4 ✔
EID5
Entry Point - 13D0 ✔
Length - 0A00 ✔
EID Number - 5 ✔
EID0:
IDPS - 000000010087000AF4001EB4AE899EFD ✔
PerConsole Nonce - 5867E6D734793E803B031689 ✔
Static + Count - 0012000B (11) ✔
EID Data Entropy: 7.9140776788106 Bits ✔
EID1:
EID Data Entropy: 7.67307393764681 Bits ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID Data Entropy: 7.88119289262728 Bits ✔
EID3:
Content Availiability - 00000001 ✔
Indicating/Build ID - 1997CA34 ✔
CKP_Management_ID - 0000000003643C64 ✔
PerConsole Nonce - 5867E6D734793E803B031689 ✔
Unknown Static - 000100D0 ✔
EID Data Entropy: 7.15539465412319 Bits ✔
EID4:
128bit Key - 3CD8C0F61E5657462AA372F5B1903893 ✔
128bit Key - F8CD064337CB4C7DA642AA4EA1EED239 ✔
CMAC-OMAC1 - C98E12555865C190DCFA617E4DA00587 ✔
EID Data Entropy: 5.5432958340545 Bits ✔
EID5:
IDPS - 000000010087000AF4001EB4AE899EFD ✔
PerConsole Nonce - 5867E6D734793E803B031689 ✔
Unknown Static - 00120730 ✔
EID Data Entropy: 7.94128344594321 Bits ✔
EID Unreferenced Area:
Filled - ✔
IDPS Info:
Target ID - 87 (Retail / Kiosk UK / CEX CEK) ✔
Model - 0A (CECH21xx (SUR-001)) ✔
IDPS - EID0 & EID5 ✔
Console Individual System Data:
Entries - 03 ✔
cISD Package Length - 0270 ✔
Blank Filler - ✔
cISD Entry Table:
cISD0
Entry Point - 0040 ✔
Length - 0020 ✔
cISD Number - 0 ✔
cISD1
Entry Point - 0060 ✔
Length - 0200 ✔
cISD Number - 1 ✔
cISD2
Entry Point - 0260 ✔
Length - 0010 ✔
cISD Number - 2 ✔
CISD0:
MAC Address - FC0FE6AC1FE1 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0003 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0FFF ✔
ECID - 01CA04C8020047180F0ED04200000000 ✔
Board ID - 27455870 ✔
Kiban ID - 401513656787 ✔
Unknown ID - 011101110138 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001200020012 ✔
CKP Management ID - 0000000003643C64 ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 1FFF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CISD Unreferenced Area:
Filled - ✔
Common System Data:
Entries - 01 ✔
CCSD Package Length - 0800 ✔
Blank Filler - ✔
CCSD Entry Table:
CCSD0
Entry Point - 0020 ✔
Length - 0030 ✔
CCSD Number - 0 ✔
CCSD0:
Structure - ✔
CCSD Unreferenced Area:
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
430.000 ✔
431.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 430.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 5658FE830DD262D5692FE7F3DC3D723A ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 797B68E5694EB2072CC944D6F072A961 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 05F02ECA781C7462870E4A80A13E6A76 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 20054C84A4BF7E1237FDAF645101EF74 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 5A6AFCCA39BED9E979B2EADD46D516E1 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 667FC8DB8E5519CACBF8F9F2AF2E0B08 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: FC0D132FAEE4585963887860C33807F1 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 2CB801DBF76FD3C83DFE01D6FF99E824 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 0E6248204D381BE2C21B0630AA7A432D ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: B95D9A045A89DC1CBCA94FD3BB6E91F1 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 13E53D2EC13F91B3C5B0ACFD076C5391 ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: C79E5C952D4BF8208668788AB85A019F ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 8073E364721EBEC9AF8082C9A12FF796 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 5CBF8D6FA103C32E8EA94E841D908A13 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: ABA5830829EBD635E664AFC1516D060A ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: 21F4C35B7EB584CD3F36AE04E6A4854C ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 6557DF35F9A5446C4340815F45C67CC7 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: DE15FF24BA24A4D00554B8EA874A1882 ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 3E9606F2312708E179BC9FABD4824746 ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: 26B786C982FF62686E0F5D0BEBE4BA85 ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 748259D883F273BA0E7A076F7A7D932A ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: D787A4498C0798C4B55A688B9843BACB ✔
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: B2DD13286198A6375F2878FC9B9E304F ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: E33DCAA639B4DDCDB2E310787E9E53BD ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: F825F0DDAB99E1D574F50C9A95F61B60 ✔
MD5 Validation:
ROS0: 4.30 - C7398C79576A90888DE0887DB9B5FA46 ✔
ROS1: 4.31 - 5888F186C7B1B5198F221806201CE7AC ✔
TRVK_PRG0: UNKNOWN/3.50 - 727554A737024D7C5222B86FE6AFE614 ✔
TRVK_PRG1: UNKNOWN/3.50 - 727554A737024D7C5222B86FE6AFE614 ✔
TRVK_PKG0: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
TRVK_PKG1: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
CVTRM 0:
Header - SCEI ✔
Filler - ✔
Filled Space - ✔
VTRM 0:
Header - VTRM ✔
SHA1 Hash - EA5FC276897C7FD4B7E405B31B331C72D4C10016 ✔
Padding - FFFFFD70 ✔
X & Y Tables Reserved Entries - 521 ✔
Protected Files Table Reserved Entries - 1042 ✔
Protected Files Table Used Entries - 6 ✔
Reserved Entries - ✔
VTRM 0 Table Entries:
Table Entry 1 - ✔
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔
Self Data Validation - ✔
Table Entry 2 - ✔
Reserved Table Entry 2 - 0020000002000005 ✔
Used Table Entry 2 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 3 - ✔
Reserved Table Entry 3 - 0010000002000005 ✔
Used Table Entry 3 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 4 - ✔
Reserved Table Entry 4 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 4 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 5 - ✔
Reserved Table Entry 5 - 0400000002000005 ✔
Used Table Entry 5 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
Table Entry 6 - ✔
Reserved Table Entry 6 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 6 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
VTRM 0 Continued:
Filled Area - ✔
Encrypted Sequence - BB2FDA4DCC0F8899937F4904F22B65DCB5153D72 ✔
CVTRM 1:
Header - ✔
Filler - ✔
Filled Space - ✔
VTRM 1:
Header - VTRM ✔
SHA1 Hash - EA5FC276897C7FD4B7E405B31B331C72D4C10016 ✔
Padding - FFFFFD70 ✔
X & Y Tables Reserved Entries - 521 ✔
Protected Files Table Reserved Entries - 1042 ✔
Protected Files Table Used Entries - 6 ✔
Reserved Entries - ✔
VTRM 1 Table Entries:
Table Entry 1 - ✔
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔
Self Data Validation - ✔
Table Entry 2 - ✔
Reserved Table Entry 2 - 0020000002000005 ✔
Used Table Entry 2 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 3 - ✔
Reserved Table Entry 3 - 0010000002000005 ✔
Used Table Entry 3 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 4 - ✔
Reserved Table Entry 4 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 4 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
Table Entry 5 - ✔
Reserved Table Entry 5 - 0400000002000005 ✔
Used Table Entry 5 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
Table Entry 6 - ✔
Reserved Table Entry 6 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 6 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
VTRM 1 Continued:
Filled Area - ✔
Encrypted Sequence - BB2FDA4DCC0F8899937F4904F22B65DCB5153D72 ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545025B9SA00091225PBG23 ✔
HD Serial - 81SDXXKD ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F4B ✔
Decrypted Binary Size - 2F4B ✔
Calculated Bootldr Size - 2F4F0 ✔
Rev Key - CB9E152428B44FD2F93FBC43 (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - 5867E6D734793E803B031689 ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193776 ✔
Mean: 756.9375 ✔
Std Dev: 26.602152352844 ✔
Entropy: 7.99911256032654 Bits ✔
Return
Min Version:
3.20 ✔
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 72 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
18.24% [WARNING] - Patch & Recheck (Risky below 18.24)
10.45% ✔
0.27% ✔
Time to calculate: 48.499 seconds.
Return
firewire70a escribió:y como sabes que es el cISD que esta mal?
firewire70a escribió:muchas gracias por todo una pregunta: recuperar la nor con nor donada ni de coña no? y para que no me vuelva a ocurrir como hago, como se que el dump es perfecto?
Psmaniaco escribió:Pues como te ha explicado LUCKYMAS si has jodido esos datos dala por perdida, solo habria un medio para resucitarla y es coger el Cell, Syscon y NOR de otra consola para ponerlos en esa placa, a lo que es lo mismo joder una consola para arreglar esa no te compensa.
Un saludo.
LoboNemesis escribió:Psmaniaco escribió:Pues como te ha explicado LUCKYMAS si has jodido esos datos dala por perdida, solo habria un medio para resucitarla y es coger el Cell, Syscon y NOR de otra consola para ponerlos en esa placa, a lo que es lo mismo joder una consola para arreglar esa no te compensa.
Un saludo.
Pero si tienes otra con el RSX jodido, si que se puede hacer eso, no?