› Foros › PlayStation 3 › Modchips y Softmods
Filename: BackUp1.bin
MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
431.000 ✔
400.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0
default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B
eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315
MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88
TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return
Min Version:
3.50 ✔
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 73 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔
Time to calculate: 55.337975 seconds.
SagatGS escribió:Hola.
Pues estaba haciendole el downgrade a una consola compatible y extraje dos dumps y crei que estaban correctos, procedi a meterle el patch de musketeer y flashee y todo bien, pero BUUUMM, los dumps estaban mal extraidos (Como pude ser taaaan torpe!!!!)
Entonces como bien saben, la consola se brickeo T_T
Esto me sale con el BwE NOR Validator (Este programa lo descubri despues de que cague la consola)Filename: BackUp1.bin
MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
431.000 ✔
400.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0
default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B
eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315
MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88
TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return
Min Version:
3.50 ✔
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 73 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔
Time to calculate: 55.337975 seconds.
Ayuda por favor.
Aqui les dejo el enlace de los dos DUMPs para ver si alguien me puede ayudar:
SagatGS escribió:Hola.
Pues estaba haciendole el downgrade a una consola compatible y extraje dos dumps y crei que estaban correctos, procedi a meterle el patch de musketeer y flashee y todo bien, pero BUUUMM, los dumps estaban mal extraidos (Como pude ser taaaan torpe!!!!)
Entonces como bien saben, la consola se brickeo T_T
Esto me sale con el BwE NOR Validator (Este programa lo descubri despues de que cague la consola)Filename: BackUp1.bin
MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔
EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔
EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔
EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔
CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔
CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔
CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
431.000 ✔
400.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔
default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔
me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0
default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B
eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315
MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88
TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔
VTRM 0:
Header - ✔
Structure - ✔
VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔
VTRM 1:
Header - ✔
Structure - ✔
VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔
VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return
Min Version:
3.50 ✔
File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 73 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔
Time to calculate: 55.337975 seconds.
Ayuda por favor.
Aqui les dejo el enlace de los dos DUMPs para ver si alguien me puede ayudar:
checho escribió:Los dumps por lo pronto NO son iguales osea que MAL asunto.
Y los he comprobado los dos y estan MAL...el metrod si está y varias cosa como el bootloader,pero nada mas,sorry creo te has quedado sin PS3
auque se podria probar con nand donada,por probar...
salu2
LUCKYMAS escribió:si esta brickeada al pulsar power se apagaria pitando , si se wueca el led verde sin nada mas dala por perdida.
LUCKYMAS escribió:no eso no, tu a darle power si se queda el piloto verde sin nada , sin pulsa para apagarla dala por perdida.
k_shake escribió:sé que esto no tiene nada que ver conmigo , pero una pregunta, donde está el error en el dump.
esque yo verificando manualmente segun el tuto de LUCKYMAS lo veo igual. Claro que no teniendo los dumps iguales no la flasharia, pero si eran iguales la cagaba.
Gracias
LUCKYMAS escribió:k_shake escribió:sé que esto no tiene nada que ver conmigo , pero una pregunta, donde está el error en el dump.
esque yo verificando manualmente segun el tuto de LUCKYMAS lo veo igual. Claro que no teniendo los dumps iguales no la flasharia, pero si eran iguales la cagaba.
Gracias
te has leido el tuto desde ayer lo dice bien claro la actualización que hice ayer. Es el método que seguimos unos cuantos y funciona 100% si te desesperas y quieres ir rápido ni lo leas.