Nor Dump Corrupto

Hola.
Pues estaba haciendole el downgrade a una consola compatible y extraje dos dumps y crei que estaban correctos, procedi a meterle el patch de musketeer y flashee y todo bien, pero BUUUMM, los dumps estaban mal extraidos (Como pude ser taaaan torpe!!!!)
Entonces como bien saben, la consola se brickeo T_T

Esto me sale con el BwE NOR Validator (Este programa lo descubri despues de que cague la consola)

Filename: BackUp1.bin

MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21

=======================================================================

First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔

Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return

Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔

asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔

eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔

cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔

cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔

trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔

trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔

trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔

trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔

ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔

ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔

cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔

Structure/Corruption Check - ✔

Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔

EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔

EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔

EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔

EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔

EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔

IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔

CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔

CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔

CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔

CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔

CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔

CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return

TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

ROS0/1 Versions:
431.000 ✔
400.000 ✔

ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔

default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D

eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3


ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0

default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B

eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315


MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88

TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔

CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔

VTRM 0:
Header - ✔
Structure - ✔

VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔

VTRM 1:
Header - ✔
Structure - ✔

VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return

Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔

Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔

Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return

Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔

Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return

Min Version:
3.50 ✔

File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔

Bulk AuthID Check:
Total number of .self IDs: 73 ✔

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔

16 bit Corrupt Sequence Check:
Nothing Found! ✔

8 bit Corrupt Sequence Check:
Nothing Found! ✔

Repetition Check:
Nothing Found! ✔

00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔


Time to calculate: 55.337975 seconds.


Ayuda por favor.
Aqui les dejo el enlace de los dos DUMPs para ver si alguien me puede ayudar:

Los compruebas manualmente y parecen que estan perfectos.
Pero los comparas con el hxd y tienen un monton de diferencias entre los 2 asi que fail consola briqueada sin quererlo.
Si hubieras leido esto antes , como para echarse a llorar y encima actualizado a dia de hoy.

hilo_cuidado-con-el-e3-flasher-no-es-oro-todo-lo-que-reluce-consejos-a-tener-en-cuenta_1780654
SagatGS escribió:Hola.
Pues estaba haciendole el downgrade a una consola compatible y extraje dos dumps y crei que estaban correctos, procedi a meterle el patch de musketeer y flashee y todo bien, pero BUUUMM, los dumps estaban mal extraidos (Como pude ser taaaan torpe!!!!)
Entonces como bien saben, la consola se brickeo T_T

Esto me sale con el BwE NOR Validator (Este programa lo descubri despues de que cague la consola)

Filename: BackUp1.bin

MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21

=======================================================================

First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔

Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return

Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔

asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔

eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔

cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔

cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔

trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔

trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔

trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔

trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔

ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔

ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔

cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔

Structure/Corruption Check - ✔

Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔

EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔

EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔

EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔

EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔

EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔

IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔

CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔

CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔

CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔

CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔

CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔

CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return

TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

ROS0/1 Versions:
431.000 ✔
400.000 ✔

ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔

default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D

eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3


ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0

default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B

eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315


MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88

TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔

CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔

VTRM 0:
Header - ✔
Structure - ✔

VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔

VTRM 1:
Header - ✔
Structure - ✔

VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return

Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔

Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔

Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return

Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔

Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return

Min Version:
3.50 ✔

File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔

Bulk AuthID Check:
Total number of .self IDs: 73 ✔

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔

16 bit Corrupt Sequence Check:
Nothing Found! ✔

8 bit Corrupt Sequence Check:
Nothing Found! ✔

Repetition Check:
Nothing Found! ✔

00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔


Time to calculate: 55.337975 seconds.


Ayuda por favor.
Aqui les dejo el enlace de los dos DUMPs para ver si alguien me puede ayudar:



Hola,
te los compruebo y comento
salu2
SagatGS escribió:Hola.
Pues estaba haciendole el downgrade a una consola compatible y extraje dos dumps y crei que estaban correctos, procedi a meterle el patch de musketeer y flashee y todo bien, pero BUUUMM, los dumps estaban mal extraidos (Como pude ser taaaan torpe!!!!)
Entonces como bien saben, la consola se brickeo T_T

Esto me sale con el BwE NOR Validator (Este programa lo descubri despues de que cague la consola)

Filename: BackUp1.bin

MD5: 0F15C1D6C6A256CEAE582196D7041BF4
File Size: 16777216
Validator Version: 1.21

=======================================================================

First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔

Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return

Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔

asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔

eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔

cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔

cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔

trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔

trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔

trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔

trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔

ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔

ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔

cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔

Structure/Corruption Check - ✔

Asecure_Loader/Metldr:
File Length - 0E92 ✔
Encrypted Binary Size - E960 ✔
Decrypted Binary Size - 0E92 ✔
File Name - metldr ✔
Calculated Metldr Size - E960 ✔
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Metldr Version - Metldr Old (3.50+ Enforced) ✔
Metldr Old - Downgradeable ✔
Blank Filled Block - ✔

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744 ✔
Mean: 233.375 ✔
Std Dev: 15.096292234045 ✔

EID:
Count - 06 ✔
Length - 1DD0 ✔
Entry Table ✔

EID0:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Static + Count - 0012000B (11) ✔

EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔

EID3:
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00000001 ✔
Unknown Static - 000100D0 ✔

EID5:
IDPS - 000000010084000B102EACFA4E42C440 ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Unknown Static - 00120730 ✔

IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔

CISD:
Count - 03 ✔
Length - 0270 ✔
Entry Table ✔

CISD0:
MAC Address - FC0FE629E9EC ✔
Unknown Static - ✔

CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0002 ✔
ECID - 01C524028D08870E110CF54200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N3100659A ✔
Unknown ID - 011301130142 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 000000000336CB15 ✔
Unknown Data - ✔
Availiable Area - ✔

CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔

CCSD:
Count - 01 ✔
Length - 0800 ✔
Filler - ✔
File Table - ✔

CCSD0:
Structure - ✔
Unreferenced Area - ✔
Return

TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔

ROS0/1 Versions:
431.000 ✔
400.000 ✔

ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS0 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: 0249A9BCC68324076C2DF6B90ED357B8 ✔

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 15CED1CD4EDE0B93E6462AA7906D4B26 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: B27D3597EC55097658774D74F279771C ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: 847C8504BED50A3E7972366B5C61206A ✔

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: B5B239F497312162F8FE76B8950DB102 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 1C0B77FDAA68712BE07903C45094BD84 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: CED13CD98D03A9169160B4987F9DE870 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 8AEFC1E5BC809F457DD2367B74FBCD72 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 47CA0CDA845E68E939A16E341B59C014 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: 6B44D91221FBBDBB26AE422869ED4CBC ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: 69F29A65C675F81590CBEAC9191225AF ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
MD5: 91DC8C1EF2D1DAA213401673188AEEE7 ✔

default.spp ✔
AuthID: N/A ✔
MD5: 1F342C5D9C197CD72FCB3FA020ED6E14 ✔

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- F1AE1F7A9B4FEF060225C9AE7ACA9D5D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- AAF098D27F4F3096E46DD23CF55BF61E

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: E06846301D65CD2E9C1829CFD2EAF47E ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 8ACED3BA601210BF7D72B2E95546484D

eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 86DAC5BEADFDAEE2E45D5DB76C876B0E

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 8143327C154811555A995E3C8A0DAFC3


ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔

ROS1 400.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔

sdk_version ✔
AuthID: N/A ✔
MD5: E67A4D209BBDEE902E8E7A3F48931B71 ✔

spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5A9A11173D091195C19FD2C18EA5ED72

spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: EF9C94719C4D6734603C6CDA456C15F0 ✔

spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 3864FD2937E166D9C5506F231049FC58 ✔

sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- EE3384C456F7B89B89A7E6AA013D9FB5

aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: 1473ACF31EF71B111F8563218E08D2B3 ✔

spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: F53B9FBA1C4663C2D65715705B7E3A98 ✔

mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 3744B53626C0B7DAC84E0331F1FC9211 ✔

me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: B0F0DAAF7ACC37031A640E70E40DBAB2 ✔

sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 6307E959CCC862298033A28E96DFCD27 ✔

sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: A89FDB4DABBCF2E3CBFA0585EDDCE370 ✔

me_iso_for_ps2emu.self ✔
AuthID: 1070000058000001 ✔
MD5: E59A8048346506C8C94165704BF086E1 ✔

sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 90EC733AD5232185CB1FBB05A3C8E9B0

default.spp ✔
AuthID: N/A ✔
[DANGER]- DAEDB814EAB142C661CEA30DFE1B6A23

lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 2079B202B3D15896AE971C33957DF72D

lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 3F1B703BFD0950EB69284A2875CE7DB2

lv0.2 ✔
AuthID: 1FF0000001000001 ✔
MD5: 0FF7584F806A4D89780E3C489713489A ✔

lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 90FC86A62ADCE7D449CA185E3DE0C31B

eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- B152759DFB336F5148B166C61B899590

emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- CFC988324B9104F11F91707A2F0F613B

hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- 373877752CEC7E2A407FB9BEE3DD1315


MD5 Validation:
ROS0: [DANGER] - AE39BF3919CFAA4C3D3A9B7406DB4228
ROS1: [DANGER] - BF1F3D7731FB58B1D1512DCB090D7F88

TRVK_PRG0: 3.50 - C67C0E8750BE22D781C5168FE631145F ✔
TRVK_PRG1: UNKNOWN/3.50 - 3D29E92B10030900E2DB8968956611E8 ✔
TRVK_PKG0: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔
TRVK_PKG1: UNKNOWN/3.50 - 9E8E3D2941E450BC3EF31DC70118063D ✔

CVTRM:
Header - 00000000 ✔
Filler - ✔
Structure - ✔

VTRM 0:
Header - ✔
Structure - ✔

VTRM 0 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 0 File Table Footers - ✔
Encrypted Sequence - ✔
Unknown Footer - ✔
Unknown Filler - ✔

VTRM 1:
Header - ✔
Structure - ✔

VTRM 1 Auth IDs:
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000039000001 - bdp_bdmv.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
10700005FF000001 - vsh.self ✔
10700005FF000001 - vsh.self ✔
1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
1070000002000002 - mcore.self ✔

VTRM 1 File Table Footers - ✔
Encrypted Sequence 2 - ✔
Unknown Footer - ✔
Return

Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔

Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔

Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - HitachiHTS545016B9SA00101005PBPB0 ✔
HD Serial - 8ECFKGY6 ✔
Unused Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔

Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return

Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53 ✔
Decrypted Binary Size - 2F53 ✔
Calculated Bootldr Size - 2F570 ✔
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - DE509550BAB6193044F4F4EF ✔
Filled Area ✔

Lv0ldr/Bootldr Corrupt Sequence Check:
Corruption found at offset: 0xFE3FA1 - [WARNING]

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904 ✔
Mean: 757.4375 ✔
Std Dev: 27.3502338951177 ✔
Return

Min Version:
3.50 ✔

File Digest Key:
Total number of keys: 38 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔

Bulk AuthID Check:
Total number of .self IDs: 73 ✔

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔

16 bit Corrupt Sequence Check:
Nothing Found! ✔

8 bit Corrupt Sequence Check:
Nothing Found! ✔

Repetition Check:
Nothing Found! ✔

00 / FF / Other Statistics:
19.40% ✔
10.44% ✔
0.27% ✔


Time to calculate: 55.337975 seconds.


Ayuda por favor.
Aqui les dejo el enlace de los dos DUMPs para ver si alguien me puede ayudar:


que te hace la consola? puedes poner un video para ver sobre todo la parte del la luz del hdd
Use el teensy, no el e3.
Y la consola no hace nada con el led del hdd, obviamente esta brickeada.
Los dumps por lo pronto NO son iguales osea que MAL asunto.
Y los he comprobado los dos y estan MAL...el metrod si está y varias cosa como el bootloader,pero nada mas,sorry creo te has quedado sin PS3
auque se podria probar con nand donada,por probar...
salu2
checho escribió:Los dumps por lo pronto NO son iguales osea que MAL asunto.
Y los he comprobado los dos y estan MAL...el metrod si está y varias cosa como el bootloader,pero nada mas,sorry creo te has quedado sin PS3
auque se podria probar con nand donada,por probar...
salu2


Pero donada serviria de algo teniendo en cuenta que poseo esa nand a medias? Y si es asi, podrias donarme una??
si esta brickeada al pulsar power se apagaria pitando , si se wueca el led verde sin nada mas dala por perdida.
hasta donde yo se no podes ocupar el dump de otra consola por ende ese ps3 es R.I.P ...
LUCKYMAS escribió:si esta brickeada al pulsar power se apagaria pitando , si se wueca el led verde sin nada mas dala por perdida.


Mira, si presiono el boton verde como por 10 segundos si se apaga y da el pitido.
no eso no, tu a darle power si se queda el piloto verde sin nada , sin pulsa para apagarla dala por perdida.
LUCKYMAS escribió:no eso no, tu a darle power si se queda el piloto verde sin nada , sin pulsa para apagarla dala por perdida.


En la noche pongo un video para que lo veas.
Buenas amigos les escribo para solicitar ayuda por el siguiente problema:

Tengo un PS3 modelo 2501A con FW base 3.56 al cual intente realizar la instalación de CFW 4.30 E3 siguiendo el método publicado en el hilo hilo_patch-three-musketeers-nand-y-nor-sin-downgrade-flasher-necesario_1826936

Saqué el dump de mi NOR y lo revisé manualmente con el HxD y tambien con las herramientas E3NorDumpChecker y NorInspector 0.0.1 y todos los resultados fueron correctos por lo cual procedí a aplicar el "Byte reverse and extract a NOR dump file", parchear con el PS3_NOR_Patcher_v1-by_Chuyo31 le volvi a aplicar el Byte reverse para dejarlo ilegible y procedi a cargarlo con el E3 flasher.

Al intentar prender la consola se apagaba a los 3 segundos asi que solde el punto nortristate y pude manterla encendida. Procedi a cargar mi respaldo original de la nor pero me arroja el codigo 01000110 y ya no se que hacer. He desmontado el clip 4 veces y nada. He vuelto a verificar mi dump y todo correcto.

¿Que estaré haciendo mal? Ayuda porfavor! Gracias de antemano!

Aqui el link de mi dump original para ver si tiene algo malo que a mi se me escapa

http://www.mediafire.com/?ofwvk50w81n8yh4
eso no es brikc eso es que te las has cargado para piezas te vale , lo siento. lo unico que te quedaria es desoldar el nortrisate y encender a ver que hace.
Te la has cepillado. Es triste, pero si no leemos pasan cosas de estas...

NO AL CLIP DE MIERDA DEL E3 FLAHSER. SOLDAR CABLES POR FAVOR. eN LAS SLIM ES UN PROCESO QUE SIMPLEMENTE LLEVA TIEMPO, NO ES TAN COMPLICADO. SOLDAR LOS CABLES NO ES PERDER EL TIEMPO, ES LAVARSE EL CULO ANTES DE DAR LA CARA!!!
sé que esto no tiene nada que ver conmigo , pero una pregunta, donde está el error en el dump.

esque yo verificando manualmente segun el tuto de LUCKYMAS lo veo igual. Claro que no teniendo los dumps iguales no la flasharia, pero si eran iguales la cagaba.

Gracias
Yo uso el teensy, lo k pasa es que no comprobe bien este dump.
Y cual es el tristate? Tengo otra consola arruinada con otro problema, podria usar ese.
Como lo identifico y como lo cambio???
k_shake escribió:sé que esto no tiene nada que ver conmigo , pero una pregunta, donde está el error en el dump.

esque yo verificando manualmente segun el tuto de LUCKYMAS lo veo igual. Claro que no teniendo los dumps iguales no la flasharia, pero si eran iguales la cagaba.

Gracias

te has leido el tuto desde ayer lo dice bien claro la actualización que hice ayer. Es el método que seguimos unos cuantos y funciona 100% si te desesperas y quieres ir rápido ni lo leas.
LUCKYMAS escribió:
k_shake escribió:sé que esto no tiene nada que ver conmigo , pero una pregunta, donde está el error en el dump.

esque yo verificando manualmente segun el tuto de LUCKYMAS lo veo igual. Claro que no teniendo los dumps iguales no la flasharia, pero si eran iguales la cagaba.

Gracias

te has leido el tuto desde ayer lo dice bien claro la actualización que hice ayer. Es el método que seguimos unos cuantos y funciona 100% si te desesperas y quieres ir rápido ni lo leas.


Gracias por todo LUCKYMAS, no lo habia visto, ya me lo he leido pues no yengo prisa ninguna , deprissa y bien no hay quien!
yo tengo este error md5 validation ros0 danger

ya lo reinstale 2 veces, saque mas de 15 dumps y son todos iguales pero dan el mismo error
20 respuestas