Jump to content
  • 0

DEX converted slim brick recovery


General Plot
 Share

Question

Just wondering if it's possible to recover a bricked console that's been converted to DEX. I'm not sure what the original owner did to get it bricked, and he doesn't have backups of the original 3.55 norbin files he made when converting it. I've only ever done recoveries using backups of original dumps, but since they're not available, I'm wondering if this is possible without having access to them. The console's in good shape, it's a CECH-25xx, so definitely worth trying to save. I've tried enabling factory service mode (which does seem to work, as the light on my xplain turns green, but the console doesn't turn itself off afterward). Then put the usual lv2diag.self file, along with the standard Rogero patched 3.55, which failed very shortly into installing. Then tried it with the RSOD recovery update and same result. Same error code on both, which was shown in the updater log as

UpdatePackage() failure
manufacturing updating FAILURE(0x8002f157)
Total Elapsed time = 14427 msec


This is the entire updater log file

Spoiler

manufacturing updating start
PackageName = /dev_usb000/PS3UPDAT.PUP
settle polling interval success
vflash is enabled...
creating system regions...
create storage region: (region id = 1)
create storage region: (region id = 2)
format partition: (region_id = 2, CELL_FS_UTILITY:HDD0, CELL_FS_UFS)
create storage region: (region id = 3)
format partition: (region_id = 3, CELL_FS_UTILITY:HDD1, CELL_FS_FAT)
creating system regions done.
boot from nor flash...
creating nor flash regions...
create storage region: (region id = 2)
create storage region: (region id = 3)
creating flash regions...
create storage region: (region id = 1)
create storage region: (region id = 2)
format partition: (region_id = 2, CELL_FS_IOS:BUILTIN_FLSH1, CELL_FS_FAT)
create storage region: (region id = 3)
format partition: (region_id = 3, CELL_FS_IOS:BUILTIN_FLSH2, CELL_FS_FAT)
create storage region: (region id = 4)
format partition: (region_id = 4, CELL_FS_IOS:BUILTIN_FLSH3, CELL_FS_FAT)
create storage region: (region id = 5)
create storage region: (region id = 6)
Initializing
taking a while...
start Updating Proccess
Initialize elapsed time = 84 msec
check UPL
UpMng.UpdatePackage() failure
manufacturing updating FAILURE(0x8002f157)
Total Elapsed time = 14427 msec

 

 

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

Recommended Posts

  • 2

 

https://mega.nz/#!DwETiIAZ!buJam5eJVLo3k_X8o5jxkoTPiWahkJ81jZEAT5beGec

flash above dump back, make sure in fsm mode and then use lv2diag with the dex pup I uploaded and linked to.

 

if the above doesn't install the pup(which it should) and fails at check UPL again, then try this dump, which I have patched with the dex checkoff patches. https://mega.nz/#!O0tGSbZI!-hF43VgP_gPZ7EnqzgFlknERb2SNZ98qivTMzDWN3TI

 

 

 

 

Edited by ps3dev
  • Upvote 1
Link to comment
Share on other sites

  • 0

maybe this is usefull, if it works ey...

 

Debrick DEX back to DEX

 

http://www.psdevwiki.com/ps3/Talk:Cex2Dex#DEX2CEX_safe_way_.2F_debricking

Link to comment
Share on other sites

  • 0
  • Super Admin

Since it is a DEX convert, and you can enter FSM, try installing the 3.55 DEX OFW pup. Rogero is for retail and the install could be failing. I am just taking guesses. I didn't mess around with the DEX conversion much

 

http://www.ps3devwiki.com/ps3/3.55-downgrader_DEX

  • Upvote 1

Don't start shit, there won't be shit

Link to comment
Share on other sites

  • 0

Or get rebugs-Rex coreOS to use as the patch file and it should let you get into recovery menu so you can install a dex cfw

Sent from my hand using Tapatalk and magic

Link to comment
Share on other sites

  • 0

if its not turning itself off using the dongle its not enabling the fsm. it wont be any use trying further in software. if it did work and you tried installing a dex ofw you will enter panic mode, the console will sound a multitoned alarm and shutdown, youre going to need to dump the flash with a hardware flasher and then convert the dump to something usable. you could always do It in hex, but I believe that some have their own handy tools to help them do this quickly or you simply use norpatcher or bwe to patch the dump to allow fsm and then use fsm dongle with lv2diag to flash whatever firmware it should have, if you use latest rebug rex although its technically an upgrade it should install over dex eid idps.

 

- of course you wont have eid root key, so options are limited..

Edited by ps3dev
Link to comment
Share on other sites

  • 0

Well first of all, did it brick during or after the DEX-conversion? And it would be nice to know what the owner did before it bricked.

 

And no, you can not install REX over a fully converted DEX console................ Thats what D-REX is for...

  • Upvote 1

872daeaf9d5ccbb7d98bb4fef4246f6e9da5ddcf

Link to comment
Share on other sites

  • 0

I see now its failing on checking UPL. its simply a case of youre using the wrong pup. you need one with ros hash check disabled, you also much be using an old psgroove payload that doesn't shutdown the ps3 on enabling fsm.

Edited by ps3dev
Link to comment
Share on other sites

  • 0

I'm uploading a dex pup that should have checks disable for you to use with lv2diag.

 

here

 

https://mega.nz/#!L8EhxRgI!VguzlGPTBw9BRYvj1j0gDEH1v7R2Ipdqsz-fbuQonEo

Edited by ps3dev
Link to comment
Share on other sites

  • 0
  • Super Moderator

I don't know if this helps but one time I went to DEX then bricked it going back to normal. 

 

It it the thing where you power it on, the light turns green for a little bit and maybe beeps? 

 

When that happened to me I think I used the  lv2diag.self  you were mentioning with 3.55 OFW in the UPDATE folder or something then was able to to boot into that by the skin of my teeth.

Don't be a jerk be cool! Join Switch Club today!

Link to comment
Share on other sites

  • 0
3 hours ago, PurpleTops said:

maybe this is usefull, if it works ey...

 

Debrick DEX back to DEX

 

http://www.psdevwiki.com/ps3/Talk:Cex2Dex#DEX2CEX_safe_way_.2F_debricking

 

That method mentions needing the eid rootkey, which I don't have.

 

3 hours ago, BobbyBlunt said:

Since it is a DEX convert, and you can enter FSM, try installing the 3.55 DEX OFW pup. Rogero is for retail and the install could be failing. I am just taking guesses. I didn't mess around with the DEX conversion much

 

http://www.ps3devwiki.com/ps3/3.55-downgrader_DEX

 

Same here. I never was big on DEX, so I don't really know the ins and outs of conversions.

 

3 hours ago, baileyscream said:

Or get rebugs-Rex coreOS to use as the patch file and it should let you get into recovery menu so you can install a dex cfw

Sent from my hand using Tapatalk and magic

 

Don't suppose you'd know where I could find this?

 

3 hours ago, ps3dev said:

if its not turning itself off using the dongle its not enabling the fsm. it wont be any use trying further in software. if it did work and you tried installing a dex ofw you will enter panic mode, the console will sound a multitoned alarm and shutdown, youre going to need to dump the flash with a hardware flasher and then convert the dump to something usable. you could always do It in hex, but I believe that some have their own handy tools to help them do this quickly or you simply use norpatcher or bwe to patch the dump to allow fsm and then use fsm dongle with lv2diag to flash whatever firmware it should have, if you use latest rebug rex although its technically an upgrade it should install over dex eid idps.

 

- of course you wont have eid root key, so options are limited..

 

The fact that it does attempt to install from the USB drive after triggering FSM tells me it must be in that mode (otherwise it wouldn't be triggered by the lv2diag.self file in the first place). I've had other consoles (though very rarely) that were FSM enabled even though they didn't turn off. It's not common, but I've seen it happen before.

 

2 hours ago, Lucif3r said:

Well first of all, did it brick during or after the DEX-conversion? And it would be nice to know what the owner did before it bricked.

 

And no, you can not install REX over a fully converted DEX console................ Thats what D-REX is for...

 

The details are sketchy as to exactly what was done, but my understanding is that the DEX conversion was complete and something done later on caused the brick.

 

49 minutes ago, ps3dev said:

I see now its failing on checking UPL. its simply a case of youre using the wrong pup. you need one with ros hash check disabled, you also much be using an old psgroove payload that doesn't shutdown the ps3 on enabling fsm.

 

I've used the same psgroove payload for a few years now, and 99.9% of the time, the consoles do power off when triggered, but I've had rare occasions where that didn't happen. The power light does flash, it just doesn't turn off.

 

21 minutes ago, ps3dev said:

I'm uploading a dex pup that should have checks disable for you to use with lv2diag.

 

I'll look for it. Thanks.

 

8 minutes ago, thezander said:

I don't know if this helps but one time I went to DEX then bricked it going back to normal. 

 

It it the thing where you power it on, the light turns green for a little bit and maybe beeps? 

 

When that happened to me I think I used the  lv2diag.self  you were mentioning with 3.55 OFW in the UPDATE folder or something then was able to to boot into that by the skin of my teeth.

 

It's weird to be honest. If just doing a normal boot, it powers on, a couple seconds of the hard drive light flickering and USB works. It never does any beeping and will just continue to run, though with no display. The only way to turn it off is to pull the plug, as the power and eject buttons don't do anything while it's on.

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0
1 minute ago, General Plot said:

It's weird to be honest. If just doing a normal boot, it powers on, a couple seconds of the hard drive light flickering and USB works. It never does any beeping and will just continue to run, though with no display. The only way to turn it off is to pull the plug, as the power and eject buttons don't do anything while it's on.

 

 

I assume the controller is not syncing either?

  • Upvote 1

872daeaf9d5ccbb7d98bb4fef4246f6e9da5ddcf

Link to comment
Share on other sites

  • 0
1 minute ago, Lucif3r said:

 

 

I assume the controller is not syncing either?

 

Indeed. The USB has power, but not able to sync. It's as if GameOS has completely halted during the IPL phase.

  • Upvote 1

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0

Well first of all, did it brick during or after the DEX-conversion? And it would be nice to know what the owner did before it bricked.

 

And no, you can not install REX over a fully converted DEX console................ Thats what D-REX is for...

Whoops I didn't mean Rex

I was typing rebug d-Rex but my phones stupid auto correct changed it to rebugs-rex

Sent from my hand using Tapatalk and magic

Link to comment
Share on other sites

  • 0

Hm... Have you tried a different HDD/no HDD? GameOS is stored on the HDD if I remember correctly, so without an HDD/different HDD it should whine about either no HDD connected or that system cant start correctly.

 

Maybe you should dump the flash as well and check it out, might be easier to pinpoint the issue then.

872daeaf9d5ccbb7d98bb4fef4246f6e9da5ddcf

Link to comment
Share on other sites

  • 0

Yeah, I've tried with a different hard drive, no go. The issue is definitely within the flash. I'll make a dump of it and have a look.

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0

Thanks, though looking at the dump, it seems the original owner was messing around with trying to patch the console ID. As the one he has in here is most likely banned (which is why he would have tried patching it), I won't bother blocking them. There are four dangers and 28 warnings (the warnings are the typical ROS0 ones you see when validating newer flashes, so those aren't anything to be concerned with). Here's the full validation result, where it's easy to see the corruption in IDPS under IDPS info. This dump would need to be edited to resolve this, though I have no way of knowing how to do this.

 

Spoiler

ymeg1tx.png
 

  • Home
  • First Region
  • Second Region
  • Lv0
  • Other
  • Contact


Filename: bkpps3_swapped.bin

MD5: 112F6920CEBB01B3DB8555ACCC6EBBB2
File Size: 16777216
Validator Version: 1.31

=======================================================================

First Region Header:
Unknown Blank -
Magic Header - 0FACE0FF - DEADBEEF
Region Count - 00
Unknown - 00
Blank Filled Block -

Flash Format:
Format/Version - IFI '120'
Filled Block -
 


Flash-Region Table:
Count - 11
Length - EFFC00

asecure_loader
Size: 02E800
Location: 000400 (0x800)

eEID
Size: 010000
Location: 02EC00 (0x2F000)

cISD
Size: 000800
Location: 03EC00 (0x3F000)

cCSD
Size: 000800
Location: 03F400 (0x3F800)

trvk_prg0
Size: 020000
Location: 03FC00 (0x40000)

trvk_prg1
Size: 020000
Location: 05FC00 (0x60000)

trvk_pkg0
Size: 020000
Location: 07FC00 (0x80000)

trvk_pkg1
Size: 020000
Location: 09FC00 (0xA0000)

ros0
Size: 700000
Location: 0BFC00 (0xC0000)

ros1
Size: 700000
Location: 7BFC00 (0x7C0000)

cvtrm
Size: 040000
Location: EBFC00 (0xEC0000)

Structure/Corruption Check -

Asecure_Loader/Metldr:
File Length - 0E92
Encrypted Binary Size - E960
Decrypted Binary Size - 0E92
File Name - metldr
Calculated Metldr Size - E960
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced)
PerConsole Nonce - 7725E13A02C621E234A4CA93
Metldr Version - Metldr Old (3.50+ Enforced)
Metldr Old - Downgradeable
Blank Filled Block -

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found!

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744
Mean: 233.375
Std Dev: 15.185390295655
Entropy: 7.99694406460042 Bits

Encrypted Individual Data:
Entries - 06
eEID Package Length - 1DD0
Blank Filler -

EID Entry Table:
EID0
Entry Point - 0070
Length - 0860
EID Number - 0

EID1
Entry Point - 08D0
Length - 02A0
EID Number - 1

EID2
Entry Point - 0B70
Length - 0730
EID Number - 2

EID3
Entry Point - 12A0
Length - 0100
EID Number - 3

EID4
Entry Point - 13A0
Length - 0030
EID Number - 4

EID5
Entry Point - 13D0
Length - 0A00
EID Number - 5

EID0:
IDPS - [DANGER] - **********
PerConsole Nonce - 7725E13A02C621E234A4CA93
Static + Count - 0012000B (11)
EID Data Entropy: 7.91596034022735 Bits

EID1:
EID Data Entropy: 7.66250772632846 Bits

EID2:
P-Block Size - 0080
S-Block Size - 0690
Padding
EID Data Entropy: 7.88186717060983 Bits

EID3:
Content Availiability - 00000001
Indicating/Build ID - 66C498ED
CKP_Management_ID - 00000000031F589D
PerConsole Nonce - 7725E13A02C621E234A4CA93
Unknown Static - 000100D0
EID Data Entropy: 7.00242741079064 Bits

EID4:
128bit Key - B980BF799E6E689E4DBF9A154981A944
128bit Key - DEC50071386F4EA3A3D2936049F6EF45
CMAC-OMAC1 - C128A1CC1FAF5E5E7637AA948A95517B
EID Data Entropy: 5.37662916738783 Bits

EID5:
IDPS - [DANGER] - **********
PerConsole Nonce - 7725E13A02C621E234A4CA93
Unknown Static - 00120730
EID Data Entropy: 7.92278655521922 Bits

EID Unreferenced Area:
Filled -

IDPS Info:
Target ID - 82 (Debug / DEX)
Model - 0B (CECH25xx (JTP-001 or JSD-001))
IDPS - [DANGER] - ���i�� ���i��

Console Individual System Data:
Entries - 03
cISD Package Length - 0270
Blank Filler -

cISD Entry Table:
cISD0
Entry Point - 0040
Length - 0020
cISD Number - 0

cISD1
Entry Point - 0060
Length - 0200
cISD Number - 1

cISD2
Entry Point - 0260
Length - 0010
cISD Number - 2

CISD0:
MAC Address - FC0FE6384F90
Unknown Static -

CISD1:
IDLog Header - 7F49444C (�IDL)
Unknown Static -0002
Area Start - 0100
Unknown Static - 7F49
Unknown Static - 0002
ECID - 01CD06150310671815133E4200000000
Board ID - 27457820
Kiban ID - 3J5N2300347D
Unknown ID - 011301130142
CKP2 Data - 0001
Unknown Static Block -
Unknown Semi Static ID - 0002001100020012
CKP Management ID - 00000000031F589D
Unknown Data -
Availiable Area -

CISD2:
WLAN Channel - 1FFF
WLAN Filler -
Unreferenced Area -

CISD Unreferenced Area:
Filled -

Common System Data:
Entries - 01
CCSD Package Length - 0800
Blank Filler -

CCSD Entry Table:
CCSD0
Entry Point - 0020
Length - 0030
CCSD Number - 0

CCSD0:
Structure -

CCSD Unreferenced Area:
Unreferenced Area -
 


TRVK_PRG0:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PRG1:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PKG0:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

TRVK_PKG1:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

ROS0/1 Versions:
465.000
355.000

ROS0:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 19
Length of Flash Region 2 - 6FFFE0

ROS0 465.000 File Table; AuthID & MD5:
creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

sdk_version
AuthID: N/A
[DANGER]- 7039D06C8A38FB0D41AA53CFDDC78FB5

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
[DANGER]- E27C4CD44B6296FD022FE31B24A7CA1D

spu_token_processor.self
AuthID: 1070000023000001
[DANGER]- 8B483D6F4ECC740A511A4910EB3E0176

spu_utoken_processor.self
AuthID: 107000004C000001
[DANGER]- B5ECD290565616ECF7014C4053B03764

sc_iso.self
AuthID: 1070000020000001
[DANGER]- 51B9DDA64ACC139567AF2A8DEC9EF4D1

aim_spu_module.self
AuthID: 1070000025000001
[DANGER]- 3977EDF6D1DDB752D48529DE4460DB95

spp_verifier.self
AuthID: 1070000021000001
[DANGER]- 259E70FB463F34676BD081D9EAEB7917

mc_iso_spu_module.self
AuthID: 1070000037000001
[DANGER]- 71BE0846B52D3608C20C2936FBA04C09

me_iso_spu_module.self
AuthID: 1070000043000001
[DANGER]- A5C93ECA43B6AE36D6CFBA0ACF6E2C9A

sv_iso_spu_module.self
AuthID: 1070000024000001
[DANGER]- 3FFEE08E79D5DB46EBE723A4F17D9C9E

sb_iso_spu_module.self
AuthID: 107000001F000001
[DANGER]- CE2410256E7CB04D05E959C4FA049253

me_iso_for_ps2emu.self
AuthID: 1070000058000001
[DANGER]- BE103CAA9EC0BF4256CAB69CFAA4644C

sv_iso_for_ps2emu.self
AuthID: 1070000059000001
[DANGER]- 7FF9E809BEDDF6D771C1859C6DAC5A1A

default.spp
AuthID: N/A
[DANGER]- 9B8E666E9B1A19B59322835FE3ACDC18

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 3CCB0FF57B25F12CCDF5CDDA55DA088B

lv0
AuthID: 1FF0000001000001
[DANGER]- 4DDA271C31B7B0056F5179069502318B

lv0.2
AuthID: 1FF0000001000001
[DANGER]- B9B8F0CFD654A15A6FAC032040DC873B

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- F6E73109CDC1E9CAB730E0DD0C51DB17

eurus_fw.bin
AuthID: N/A
[DANGER]- 0C0F475D6AB8017B3CEC1B9B887DD486

emer_init.self
AuthID: 10700003FC000001
[DANGER]- 03C98BC0102E3A13E7F1BA29959A88A0

hdd_copy.self
AuthID: 1070000501000001
[DANGER]- 23CE63F1859D5847F5BBBFB7B84CF248


ROS1:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 18
Length of Flash Region 2 - 6FFFE0

ROS1 355.000 File Table; AuthID & MD5:
creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

sdk_version
AuthID: N/A
MD5: 3DA12E2CB472EB8193309B663D7C913A

lv1ldr
AuthID: 1FF0000008000001
MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F

lv2ldr
AuthID: 1FF0000009000001
MD5: A597AA3D8101674856EEF83AC1D0EF28

isoldr
AuthID: 1FF000000A000001
MD5: 811329ECDB677181B9FC5CC3564D9047

appldr
AuthID: 1FF000000C000001
MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
MD5: B76B7244B19032A9518787D9EC827F3C

spu_token_processor.self
AuthID: 1070000023000001
MD5: 22ABABCFC027F892AD2CF4E1C9FD925C

spu_utoken_processor.self
AuthID: 107000004C000001
MD5: 0E5A2E8A68FE09481D728C227DC5A165

sc_iso.self
AuthID: 1070000020000001
MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7

aim_spu_module.self
AuthID: 1070000025000001
MD5: CA9BBC99C645173E1F98AA66C47A4500

spp_verifier.self
AuthID: 1070000021000001
MD5: 90D1C8A45F6FEE52219E1B14FF8C9765

mc_iso_spu_module.self
AuthID: 1070000037000001
MD5: 5FFB33A6CECB99081E54A0E36E3C61AF

me_iso_spu_module.self
AuthID: 1070000043000001
MD5: 3B15C14770D654FEF9987E2517616D89

sv_iso_spu_module.self
AuthID: 1070000024000001
MD5: 368F2D290C00F3CB3C5A5C8CFE584534

sb_iso_spu_module.self
AuthID: 107000001F000001
MD5: B39E13FBD6B07F65616A0355EF5CB262

default.spp
AuthID: N/A
[DANGER]- D61DF33091CCCF613883E93055F32398

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 75F41136FF54F6E78BB66CEB09688347

lv0
AuthID: 1FF0000001000001
MD5: FF6753184D15F45508C5330A6144A4D9

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- AB171D95D0A644B4FEE5CC2523F9CA50

eurus_fw.bin
AuthID: N/A
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A

emer_init.self
AuthID: 10700003FC000001
MD5: 9D670B662BE696C8460449B7EFDD803E


MD5 Validation:
ROS0: [DANGER] - E04C1648AC23CC7F45A97DF04AF43AFB - Patch & Recheck
ROS1: 3.55_DEX - 102E229DF047C1693ABFBFF5707BE84C
TRVK_PRG0: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PRG1: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PKG0: [WARNING] - 08BC2E5D75F69390AC5D666C5BD868FF - Patch & Recheck
TRVK_PKG1: [WARNING] - 08BC2E5D75F69390AC5D666C5BD868FF - Patch & Recheck


CVTRM 0:
Header - SCEI
Filler -
Filled Space -

VTRM 0:
Header - VTRM
SHA1 Hash - A6A88DDE8D0D79296BC2C3BBA3976ABDB98990F7
Padding - 000000E0
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 8
Reserved Entries -

VTRM 0 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 0400000002000005
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 0410000002000005
Used Table Entry 4 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0420000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0430000002000005
Used Table Entry 7 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 8 -
Reserved Table Entry 8 - 0440000002000005
Used Table Entry 8 - 10700005FF000001 - vsh.self
Self Data Validation -

VTRM 0 Continued:
Filled Area -
Encrypted Sequence - C73B8FBE48744B4F9A52EEDA50485AC11126BF34

CVTRM 1:
Header -
Filler -
Filled Space -

VTRM 1:
Header - VTRM
SHA1 Hash - A6A88DDE8D0D79296BC2C3BBA3976ABDB98990F7
Padding - 000000E0
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 8
Reserved Entries -

VTRM 1 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 0400000002000005
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 0410000002000005
Used Table Entry 4 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0420000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0430000002000005
Used Table Entry 7 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 8 -
Reserved Table Entry 8 - 0440000002000005
Used Table Entry 8 - 10700005FF000001 - vsh.self
Self Data Validation -

VTRM 1 Continued:
Filled Area -
Encrypted Sequence - C73B8FBE48744B4F9A52EEDA50485AC11126BF34
 


Second Region Header:
Unknown Blank -
Magic Header 2 - 0FACE0FF - DEADFACE
Region Count - 03
Unknown - 02
Blank Filled Block -

Second Region Unknown Block 0:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -

Second Region Unknown Block 1:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -
Blank Filled Block 2 -
Filled Block -

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA
SHA1 Header -
Unused Area -
HD Model - HitachiHTS545016B9SA00101008PBPB0
HD Serial - 8ECFPKVT
Unused Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 - Not Found
Unused Area -
Filled Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 - Not Found
Unused Area -
Filled Area -
 


Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53
Decrypted Binary Size - 2F53
Calculated Bootldr Size - 2F570
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001))
PerConsole Nonce - 7725E13A02C621E234A4CA93
Filled Area

Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found!

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904
Mean: 757.4375
Std Dev: 26.0919189653448
Entropy: 7.99914649779442 Bits
 


Min Version:
3.50

File Digest Key:
Total number of keys: 39
Key: 627CB1808AB938E32C8C091708726A579E2586E4

Bulk AuthID Check:
Total number of .self IDs: 73

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr

16 bit Corrupt Sequence Check:
Nothing Found!

8 bit Corrupt Sequence Check:
Nothing Found!

Repetition Check:
Nothing Found!

00 / FF / Other Statistics:
23.74%
10.43%
0.25%


Time to calculate: 34.727972 seconds.

 

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0
  • Super Moderator

Aren't dumps the kind of thing you can mess around with kakarotos tool? Or am I way off.

Don't be a jerk be cool! Join Switch Club today!

Link to comment
Share on other sites

  • 0

I'm not sure. Alot of times, tools that can manipulate the flash will require the eid rootkey, which I don't have. And since the console isn't running, I have no way of generating it.

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0
53 minutes ago, General Plot said:

Thanks, though looking at the dump, it seems the original owner was messing around with trying to patch the console ID. As the one he has in here is most likely banned (which is why he would have tried patching it), I won't bother blocking them. There are four dangers and 28 warnings (the warnings are the typical ROS0 ones you see when validating newer flashes, so those aren't anything to be concerned with). Here's the full validation result, where it's easy to see the corruption in IDPS under IDPS info. This dump would need to be edited to resolve this, though I have no way of knowing how to do this.

 

  Reveal hidden contents

ymeg1tx.png
 

  • Home
  • First Region
  • Second Region
  • Lv0
  • Other
  • Contact


Filename: bkpps3_swapped.bin

MD5: 112F6920CEBB01B3DB8555ACCC6EBBB2
File Size: 16777216
Validator Version: 1.31

=======================================================================

First Region Header:
Unknown Blank -
Magic Header - 0FACE0FF - DEADBEEF
Region Count - 00
Unknown - 00
Blank Filled Block -

Flash Format:
Format/Version - IFI '120'
Filled Block -
 


Flash-Region Table:
Count - 11
Length - EFFC00

asecure_loader
Size: 02E800
Location: 000400 (0x800)

eEID
Size: 010000
Location: 02EC00 (0x2F000)

cISD
Size: 000800
Location: 03EC00 (0x3F000)

cCSD
Size: 000800
Location: 03F400 (0x3F800)

trvk_prg0
Size: 020000
Location: 03FC00 (0x40000)

trvk_prg1
Size: 020000
Location: 05FC00 (0x60000)

trvk_pkg0
Size: 020000
Location: 07FC00 (0x80000)

trvk_pkg1
Size: 020000
Location: 09FC00 (0xA0000)

ros0
Size: 700000
Location: 0BFC00 (0xC0000)

ros1
Size: 700000
Location: 7BFC00 (0x7C0000)

cvtrm
Size: 040000
Location: EBFC00 (0xEC0000)

Structure/Corruption Check -

Asecure_Loader/Metldr:
File Length - 0E92
Encrypted Binary Size - E960
Decrypted Binary Size - 0E92
File Name - metldr
Calculated Metldr Size - E960
Rev Key - C3266E4BBB282E76B7677095 (CECH25xx (JSD/JTP-001) Metldr 3.50+ Enforced)
PerConsole Nonce - 7725E13A02C621E234A4CA93
Metldr Version - Metldr Old (3.50+ Enforced)
Metldr Old - Downgradeable
Blank Filled Block -

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found!

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59744
Mean: 233.375
Std Dev: 15.185390295655
Entropy: 7.99694406460042 Bits

Encrypted Individual Data:
Entries - 06
eEID Package Length - 1DD0
Blank Filler -

EID Entry Table:
EID0
Entry Point - 0070
Length - 0860
EID Number - 0

EID1
Entry Point - 08D0
Length - 02A0
EID Number - 1

EID2
Entry Point - 0B70
Length - 0730
EID Number - 2

EID3
Entry Point - 12A0
Length - 0100
EID Number - 3

EID4
Entry Point - 13A0
Length - 0030
EID Number - 4

EID5
Entry Point - 13D0
Length - 0A00
EID Number - 5

EID0:
IDPS - [DANGER] - 000000010082000B1000CFF56907E4F7
PerConsole Nonce - 7725E13A02C621E234A4CA93
Static + Count - 0012000B (11)
EID Data Entropy: 7.91596034022735 Bits

EID1:
EID Data Entropy: 7.66250772632846 Bits

EID2:
P-Block Size - 0080
S-Block Size - 0690
Padding
EID Data Entropy: 7.88186717060983 Bits

EID3:
Content Availiability - 00000001
Indicating/Build ID - 66C498ED
CKP_Management_ID - 00000000031F589D
PerConsole Nonce - 7725E13A02C621E234A4CA93
Unknown Static - 000100D0
EID Data Entropy: 7.00242741079064 Bits

EID4:
128bit Key - B980BF799E6E689E4DBF9A154981A944
128bit Key - DEC50071386F4EA3A3D2936049F6EF45
CMAC-OMAC1 - C128A1CC1FAF5E5E7637AA948A95517B
EID Data Entropy: 5.37662916738783 Bits

EID5:
IDPS - [DANGER] - 000000010087000B1000CFF56907E4F7
PerConsole Nonce - 7725E13A02C621E234A4CA93
Unknown Static - 00120730
EID Data Entropy: 7.92278655521922 Bits

EID Unreferenced Area:
Filled -

IDPS Info:
Target ID - 82 (Debug / DEX)
Model - 0B (CECH25xx (JTP-001 or JSD-001))
IDPS - [DANGER] - ���i�� ���i��

Console Individual System Data:
Entries - 03
cISD Package Length - 0270
Blank Filler -

cISD Entry Table:
cISD0
Entry Point - 0040
Length - 0020
cISD Number - 0

cISD1
Entry Point - 0060
Length - 0200
cISD Number - 1

cISD2
Entry Point - 0260
Length - 0010
cISD Number - 2

CISD0:
MAC Address - FC0FE6384F90
Unknown Static -

CISD1:
IDLog Header - 7F49444C (�IDL)
Unknown Static -0002
Area Start - 0100
Unknown Static - 7F49
Unknown Static - 0002
ECID - 01CD06150310671815133E4200000000
Board ID - 27457820
Kiban ID - 3J5N2300347D
Unknown ID - 011301130142
CKP2 Data - 0001
Unknown Static Block -
Unknown Semi Static ID - 0002001100020012
CKP Management ID - 00000000031F589D
Unknown Data -
Availiable Area -

CISD2:
WLAN Channel - 1FFF
WLAN Filler -
Unreferenced Area -

CISD Unreferenced Area:
Filled -

Common System Data:
Entries - 01
CCSD Package Length - 0800
Blank Filler -

CCSD Entry Table:
CCSD0
Entry Point - 0020
Length - 0030
CCSD Number - 0

CCSD0:
Structure -

CCSD Unreferenced Area:
Unreferenced Area -
 


TRVK_PRG0:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PRG1:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PKG0:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

TRVK_PKG1:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

ROS0/1 Versions:
465.000
355.000

ROS0:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 19
Length of Flash Region 2 - 6FFFE0

ROS0 465.000 File Table; AuthID & MD5:
creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

sdk_version
AuthID: N/A
[DANGER]- 7039D06C8A38FB0D41AA53CFDDC78FB5

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
[DANGER]- E27C4CD44B6296FD022FE31B24A7CA1D

spu_token_processor.self
AuthID: 1070000023000001
[DANGER]- 8B483D6F4ECC740A511A4910EB3E0176

spu_utoken_processor.self
AuthID: 107000004C000001
[DANGER]- B5ECD290565616ECF7014C4053B03764

sc_iso.self
AuthID: 1070000020000001
[DANGER]- 51B9DDA64ACC139567AF2A8DEC9EF4D1

aim_spu_module.self
AuthID: 1070000025000001
[DANGER]- 3977EDF6D1DDB752D48529DE4460DB95

spp_verifier.self
AuthID: 1070000021000001
[DANGER]- 259E70FB463F34676BD081D9EAEB7917

mc_iso_spu_module.self
AuthID: 1070000037000001
[DANGER]- 71BE0846B52D3608C20C2936FBA04C09

me_iso_spu_module.self
AuthID: 1070000043000001
[DANGER]- A5C93ECA43B6AE36D6CFBA0ACF6E2C9A

sv_iso_spu_module.self
AuthID: 1070000024000001
[DANGER]- 3FFEE08E79D5DB46EBE723A4F17D9C9E

sb_iso_spu_module.self
AuthID: 107000001F000001
[DANGER]- CE2410256E7CB04D05E959C4FA049253

me_iso_for_ps2emu.self
AuthID: 1070000058000001
[DANGER]- BE103CAA9EC0BF4256CAB69CFAA4644C

sv_iso_for_ps2emu.self
AuthID: 1070000059000001
[DANGER]- 7FF9E809BEDDF6D771C1859C6DAC5A1A

default.spp
AuthID: N/A
[DANGER]- 9B8E666E9B1A19B59322835FE3ACDC18

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 3CCB0FF57B25F12CCDF5CDDA55DA088B

lv0
AuthID: 1FF0000001000001
[DANGER]- 4DDA271C31B7B0056F5179069502318B

lv0.2
AuthID: 1FF0000001000001
[DANGER]- B9B8F0CFD654A15A6FAC032040DC873B

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- F6E73109CDC1E9CAB730E0DD0C51DB17

eurus_fw.bin
AuthID: N/A
[DANGER]- 0C0F475D6AB8017B3CEC1B9B887DD486

emer_init.self
AuthID: 10700003FC000001
[DANGER]- 03C98BC0102E3A13E7F1BA29959A88A0

hdd_copy.self
AuthID: 1070000501000001
[DANGER]- 23CE63F1859D5847F5BBBFB7B84CF248


ROS1:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 18
Length of Flash Region 2 - 6FFFE0

ROS1 355.000 File Table; AuthID & MD5:
creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

sdk_version
AuthID: N/A
MD5: 3DA12E2CB472EB8193309B663D7C913A

lv1ldr
AuthID: 1FF0000008000001
MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F

lv2ldr
AuthID: 1FF0000009000001
MD5: A597AA3D8101674856EEF83AC1D0EF28

isoldr
AuthID: 1FF000000A000001
MD5: 811329ECDB677181B9FC5CC3564D9047

appldr
AuthID: 1FF000000C000001
MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
MD5: B76B7244B19032A9518787D9EC827F3C

spu_token_processor.self
AuthID: 1070000023000001
MD5: 22ABABCFC027F892AD2CF4E1C9FD925C

spu_utoken_processor.self
AuthID: 107000004C000001
MD5: 0E5A2E8A68FE09481D728C227DC5A165

sc_iso.self
AuthID: 1070000020000001
MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7

aim_spu_module.self
AuthID: 1070000025000001
MD5: CA9BBC99C645173E1F98AA66C47A4500

spp_verifier.self
AuthID: 1070000021000001
MD5: 90D1C8A45F6FEE52219E1B14FF8C9765

mc_iso_spu_module.self
AuthID: 1070000037000001
MD5: 5FFB33A6CECB99081E54A0E36E3C61AF

me_iso_spu_module.self
AuthID: 1070000043000001
MD5: 3B15C14770D654FEF9987E2517616D89

sv_iso_spu_module.self
AuthID: 1070000024000001
MD5: 368F2D290C00F3CB3C5A5C8CFE584534

sb_iso_spu_module.self
AuthID: 107000001F000001
MD5: B39E13FBD6B07F65616A0355EF5CB262

default.spp
AuthID: N/A
[DANGER]- D61DF33091CCCF613883E93055F32398

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 75F41136FF54F6E78BB66CEB09688347

lv0
AuthID: 1FF0000001000001
MD5: FF6753184D15F45508C5330A6144A4D9

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- AB171D95D0A644B4FEE5CC2523F9CA50

eurus_fw.bin
AuthID: N/A
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A

emer_init.self
AuthID: 10700003FC000001
MD5: 9D670B662BE696C8460449B7EFDD803E


MD5 Validation:
ROS0: [DANGER] - E04C1648AC23CC7F45A97DF04AF43AFB - Patch & Recheck
ROS1: 3.55_DEX - 102E229DF047C1693ABFBFF5707BE84C
TRVK_PRG0: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PRG1: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PKG0: [WARNING] - 08BC2E5D75F69390AC5D666C5BD868FF - Patch & Recheck
TRVK_PKG1: [WARNING] - 08BC2E5D75F69390AC5D666C5BD868FF - Patch & Recheck


CVTRM 0:
Header - SCEI
Filler -
Filled Space -

VTRM 0:
Header - VTRM
SHA1 Hash - A6A88DDE8D0D79296BC2C3BBA3976ABDB98990F7
Padding - 000000E0
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 8
Reserved Entries -

VTRM 0 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 0400000002000005
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 0410000002000005
Used Table Entry 4 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0420000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0430000002000005
Used Table Entry 7 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 8 -
Reserved Table Entry 8 - 0440000002000005
Used Table Entry 8 - 10700005FF000001 - vsh.self
Self Data Validation -

VTRM 0 Continued:
Filled Area -
Encrypted Sequence - C73B8FBE48744B4F9A52EEDA50485AC11126BF34

CVTRM 1:
Header -
Filler -
Filled Space -

VTRM 1:
Header - VTRM
SHA1 Hash - A6A88DDE8D0D79296BC2C3BBA3976ABDB98990F7
Padding - 000000E0
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 8
Reserved Entries -

VTRM 1 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 0400000002000005
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 0410000002000005
Used Table Entry 4 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0420000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0430000002000005
Used Table Entry 7 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 8 -
Reserved Table Entry 8 - 0440000002000005
Used Table Entry 8 - 10700005FF000001 - vsh.self
Self Data Validation -

VTRM 1 Continued:
Filled Area -
Encrypted Sequence - C73B8FBE48744B4F9A52EEDA50485AC11126BF34
 


Second Region Header:
Unknown Blank -
Magic Header 2 - 0FACE0FF - DEADFACE
Region Count - 03
Unknown - 02
Blank Filled Block -

Second Region Unknown Block 0:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -

Second Region Unknown Block 1:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -
Blank Filled Block 2 -
Filled Block -

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA
SHA1 Header -
Unused Area -
HD Model - HitachiHTS545016B9SA00101008PBPB0
HD Serial - 8ECFPKVT
Unused Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 - Not Found
Unused Area -
Filled Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 - Not Found
Unused Area -
Filled Area -
 


Lv0ldr/Bootldr:
Encrypted Binary Size - 2F53
Decrypted Binary Size - 2F53
Calculated Bootldr Size - 2F570
Rev Key - 53E6A0BBB0AFA20067D0B39A (CECH25xx (JSD/JTP-001))
PerConsole Nonce - 7725E13A02C621E234A4CA93
Filled Area

Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found!

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193904
Mean: 757.4375
Std Dev: 26.0919189653448
Entropy: 7.99914649779442 Bits
 


Min Version:
3.50

File Digest Key:
Total number of keys: 39
Key: 627CB1808AB938E32C8C091708726A579E2586E4

Bulk AuthID Check:
Total number of .self IDs: 73

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr

16 bit Corrupt Sequence Check:
Nothing Found!

8 bit Corrupt Sequence Check:
Nothing Found!

Repetition Check:
Nothing Found!

00 / FF / Other Statistics:
23.74%
10.43%
0.25%


Time to calculate: 34.727972 seconds.

 

The warning of corruption of IDPS when you use BWE tool is normal if you change the Target ID only on EID0 and not on EID5,

maybe the owner has only changed the target id without changing the encrypted part of EID0 to do the conversion
you can try to make CEX the ps3 changing the target id of EID0 and applying patches to downgrade at 3:55 by FSM

Edited by DebugBrain
Link to comment
Share on other sites

  • 0

Your target is dex

The ros1 is 3.55dex

The ros0 is 4.65 and I have checked all my collection of CEX and dex cfw's coreOS and the ros0 md5 does not match any I have so its either a corrupt install or a brick dex cfw that I do not have

I can upload you rebug d-Rex 4.65 ros to use in dumpstatistics to patch your dump and see if you can then get it into recovery menu then you can install the dex downgrader you have been given a link to. then you can get back on 3.55dex as rebug won't install in recovery

Sent from my hand using Tapatalk and magic

  • Upvote 2
Link to comment
Share on other sites

  • 0

here is a dump of my dex console with bwe nor 1.31 for you to compare, notice the same warnings.

 

Spoiler

 

Filename: 20151214-195348-FLASH-NOR-FW4.75.BIN

MD5: 4A97A0C9F99DF1F69AB07ABAE8E3D6D1
File Size: 16777216
Validator Version: 1.31

=======================================================================


First Region Header:
Unknown Blank -
Magic Header - 0FACE0FF - DEADBEEF
Region Count - 00
Unknown - 00
Blank Filled Block -

Flash Format:
Format/Version - IFI '120'
Filled Block -
 


Flash-Region Table:
Count - 11
Length - EFFC00

asecure_loader
Size: 02E800
Location: 000400 (0x800)

eEID
Size: 010000
Location: 02EC00 (0x2F000)

cISD
Size: 000800
Location: 03EC00 (0x3F000)

cCSD
Size: 000800
Location: 03F400 (0x3F800)

trvk_prg0
Size: 020000
Location: 03FC00 (0x40000)

trvk_prg1
Size: 020000
Location: 05FC00 (0x60000)

trvk_pkg0
Size: 020000
Location: 07FC00 (0x80000)

trvk_pkg1
Size: 020000
Location: 09FC00 (0xA0000)

ros0
Size: 700000
Location: 0BFC00 (0xC0000)

ros1
Size: 700000
Location: 7BFC00 (0x7C0000)

cvtrm
Size: 040000
Location: EBFC00 (0xEC0000)

Structure/Corruption Check -

Asecure_Loader/Metldr:
File Length - 0EA2
Encrypted Binary Size - EA60
Decrypted Binary Size - 0EA2
File Name - metldr
Calculated Metldr Size - EA60
Rev Key - 53E7EA237889AE20322A9708 (CECHH/CECHJ/CECHK (DIA-001/DIA-002))
PerConsole Nonce - 4A1B8159803A
Metldr Version - Metldr Old - Downgradeable
Blank Filled Block -

Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found!

Asecure_Loader/Metldr Encrypted Statistics:
Sum: 60000
Mean: 234.375
Std Dev: 15.5671851952099
Entropy: 7.99682705569299 Bits

Encrypted Individual Data:
Entries - 06
eEID Package Length - 1DD0
Blank Filler -

EID Entry Table:
EID0
Entry Point - 0070
Length - 0860
EID Number - 0

EID1
Entry Point - 08D0
Length - 02A0
EID Number - 1

EID2
Entry Point - 0B70
Length - 0730
EID Number - 2

EID3
Entry Point - 12A0
Length - 0100
EID Number - 3

EID4
Entry Point - 13A0
Length - 0030
EID Number - 4

EID5
Entry Point - 13D0
Length - 0A00
EID Number - 5

EID0:
IDPS - [DANGER] - 0000000100820006100
PerConsole Nonce - 4A1B8159803A
Static + Count - 0012000B (11)
EID Data Entropy: 7.90090427989122 Bits

EID1:
EID Data Entropy: 7.70051635708193 Bits

EID2:
P-Block Size - 0080
S-Block Size - 0690
Padding
EID Data Entropy: 7.88666037906814 Bits

EID3:
Content Availiability - 00000001
Indicating/Build ID - 06A7852E
CKP_Management_ID - 00000000010AB982
PerConsole Nonce - 4A1B8159803
Unknown Static - 000100D0
EID Data Entropy: 7.08452723010119 Bits

EID4:
128bit Key - F8363757E01ED1A9ECFDEA2D6FA
128bit Key - 513B73BBDC3E2E8731FD09D56EB
CMAC-OMAC1 - 9EEA2F0EDEA05422045DF17BE
EID Data Entropy: 5.45996250072116 Bits

EID5:
IDPS - [DANGER] - 0000000100870006100
PerConsole Nonce - 4A1B8159803A35529
Unknown Static - 00120730
EID Data Entropy: 7.93495829386266 Bits

EID Unreferenced Area:
Filled -

IDPS Info:
Target ID - 82 (Debug / DEX)
Model - 06 (CECHHxx or CECHMxx (DIA-001))
IDPS - [DANGER] - vJJ0 vJJ0

Console Individual System Data:
Entries - 03
cISD Package Length - 0270
Blank Filler -

cISD Entry Table:
cISD0
Entry Point - 0040
Length - 0020
cISD Number - 0

cISD1
Entry Point - 0060
Length - 0200
cISD Number - 1

cISD2
Entry Point - 0260
Length - 0010
cISD Number - 2

CISD0:
MAC Address - 001D0DC3CDB3
Unknown Static -

CISD1:
IDLog Header - 7F49444C (IDL)
Unknown Static -0002
Area Start - 0100
Unknown Static - 7F49
Unknown Static - 0002
ECID - 01C518509D0DC24000000000
Board ID - 27434470
Kiban ID - 3LD11250863B
Unknown ID - 005600560086
CKP2 Data - 0001
Unknown Static Block -
Unknown Semi Static ID - 0002001100020012
CKP Management ID - 00000000010AB982
Unknown Data -
Availiable Area -

CISD2:
WLAN Channel - 1FFF
WLAN Filler -
Unreferenced Area -

CISD Unreferenced Area:
Filled -

Common System Data:
Entries - 01
CCSD Package Length - 0800
Blank Filler -

CCSD Entry Table:
CCSD0
Entry Point - 0020
Length - 0030
CCSD Number - 0

CCSD0:
Structure -

CCSD Unreferenced Area:
Unreferenced Area -
 


TRVK_PRG0:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PRG1:
Filler -
Data Size - 02E0
Header - SCE
Unknown -
Meta Size - E0
Unknown 2 -
Unknown 3 -
Empty Space -
Filled Space -

TRVK_PKG0:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

TRVK_PKG1:
Filler -
Data Size - 0240
Header - SCE
Unknown -
Meta Size - 40
Unknown 2 -
Unknown 3 -
Empty Space -[WARNING] - Too long to display!
Filled Space -

ROS0/1 Versions:
475.000
475.000

ROS0:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 1A
Length of Flash Region 2 - 6FFFE0

ROS0 475.000 File Table; AuthID & MD5:
aim_spu_module.self
AuthID: 1070000025000001
[DANGER]- 37045B80088D8F2E190CF571364C22B5

creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

default.spp
AuthID: N/A
[DANGER]- 339CD7626B1EAB9D65A04ED0DDFADDA9

emer_init.self
AuthID: 10700003FC000001
[DANGER]- 1D79246CB6D97AE05E6E3ADD1F5CBDB0

eurus_fw.bin
AuthID: N/A
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A

hdd_copy.self
AuthID: 1070000501000001
[DANGER]- 9352B21535E3616FC2028D821B39389F

lv0
AuthID: 1FF0000001000001
[DANGER]- DFE47D478712A9B79B9A79A4D0CA5E81

lv0.2
AuthID: 1FF0000001000001
[DANGER]- 8A5AEC61AC583C708C6A4EEF879152E7

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 2C9DDAF8E7EEFDFEE61ABDFCC0E873F6

[WARNING] -
AuthID: 1050000003000001
[DANGER]- EFC5E69A923A3A86E68F09EEE8552D1B

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- 5ED3D3C1A1D2721FED7029FAAA7FF77B

manu_info_spu_module.self
AuthID: 1070000055000001
[DANGER]- B06957D85E542AA4262DD6408721FD70

mc_iso_spu_module.self
AuthID: 1070000037000001
[DANGER]- 5409C431BA8F21ABC24E3459E7A211F3

me_iso_for_ps2emu.self
AuthID: 1070000058000001
[DANGER]- 18941A02ADE3B24681AA9D44BFD10E01

me_iso_spu_module.self
AuthID: 1070000043000001
[DANGER]- 8364DF122BD9B615B1CE5D14D82D9156

pkg.srvk
AuthID: N/A
[DANGER]- 96E611AAE416996C8C7AD0388B54F56D

prog.srvk
AuthID: N/A
[DANGER]- 8994CC33ED1B7BEC1032672F114DB966

sb_iso_spu_module.self
AuthID: 107000001F000001
[DANGER]- EE17E0A552DBF67C97C56D4BE216E57F

sc_iso.self
AuthID: 1070000020000001
[DANGER]- 11FA3FC76ABBDD12AEE83A5B0047BCC7

sdk_version
AuthID: N/A
[DANGER]- 7C9355D71BABF1E3D7FE3D91D4545779

spp_verifier.self
AuthID: 1070000021000001
[DANGER]- A310185110CCA902C4CDCF9AF0C579BE

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
[DANGER]- CA44CA65DF88BDEB3420021246D985D6


ROS1:
Header Filler -
Length of Flash Region - 6FFFE0
Unknown Static -
Entry Count - 1A
Length of Flash Region 2 - 6FFFE0

ROS1 475.000 File Table; AuthID & MD5:
aim_spu_module.self
AuthID: 1070000025000001
[DANGER]- 37045B80088D8F2E190CF571364C22B5

creserved_0
AuthID: N/A
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B

default.spp
AuthID: N/A
[DANGER]- 339CD7626B1EAB9D65A04ED0DDFADDA9

emer_init.self
AuthID: 10700003FC000001
[DANGER]- 1D79246CB6D97AE05E6E3ADD1F5CBDB0

eurus_fw.bin
AuthID: N/A
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A

hdd_copy.self
AuthID: 1070000501000001
[DANGER]- 9352B21535E3616FC2028D821B39389F

lv0
AuthID: 1FF0000001000001
[DANGER]- DFE47D478712A9B79B9A79A4D0CA5E81

lv0.2
AuthID: 1FF0000001000001
[DANGER]- 8A5AEC61AC583C708C6A4EEF879152E7

lv1.self
AuthID: 1FF0000002000001
[DANGER]- 2C9DDAF8E7EEFDFEE61ABDFCC0E873F6

lv2_kernel.self
AuthID: 1050000003000001
[DANGER]- 5ED3D3C1A1D2721FED7029FAAA7FF77B

[WARNING] -
AuthID: 1050000003000001
[DANGER]- EFC5E69A923A3A86E68F09EEE8552D1B

manu_info_spu_module.self
AuthID: 1070000055000001
[DANGER]- B06957D85E542AA4262DD6408721FD70

mc_iso_spu_module.self
AuthID: 1070000037000001
[DANGER]- 5409C431BA8F21ABC24E3459E7A211F3

me_iso_for_ps2emu.self
AuthID: 1070000058000001
[DANGER]- 18941A02ADE3B24681AA9D44BFD10E01

me_iso_spu_module.self
AuthID: 1070000043000001
[DANGER]- 8364DF122BD9B615B1CE5D14D82D9156

pkg.srvk
AuthID: N/A
[DANGER]- 96E611AAE416996C8C7AD0388B54F56D

prog.srvk
AuthID: N/A
[DANGER]- 8994CC33ED1B7BEC1032672F114DB966

sb_iso_spu_module.self
AuthID: 107000001F000001
[DANGER]- EE17E0A552DBF67C97C56D4BE216E57F

sc_iso.self
AuthID: 1070000020000001
[DANGER]- 11FA3FC76ABBDD12AEE83A5B0047BCC7

sdk_version
AuthID: N/A
[DANGER]- 7C9355D71BABF1E3D7FE3D91D4545779

spp_verifier.self
AuthID: 1070000021000001
[DANGER]- A310185110CCA902C4CDCF9AF0C579BE

spu_pkg_rvk_verifier.self
AuthID: 1070000022000001
[DANGER]- CA44CA65DF88BDEB3420021246D985D6


MD5 Validation:
ROS0: [DANGER] - 572FCA7949DE00B5DC021FA89C1C6A44 - Patch & Recheck
ROS1: [DANGER] - 08425F9D893F370D2051DB48FF08313A - Patch & Recheck

TRVK_PRG0: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PRG1: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319
TRVK_PKG0: [WARNING] - 08BC2E5D75F69390AC5D666C5BD868FF - Patch & Recheck
TRVK_PKG1: UNKNOWN/4.xx - 91584CDE005CDBCBD06C1BFEA1790188

CVTRM 0:
Header - SCEI
Filler -
Filled Space -

VTRM 0:
Header - VTRM
SHA1 Hash - EE118D74A297F6B6581D2C573D7BC8F38DD39F3C
Padding - C000B790
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 7
Reserved Entries -

VTRM 0 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 0400000002000005
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 4 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000003000002 - mgvideo.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0410000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0010000002000005
Used Table Entry 7 - 1070000002000002 - mcore.self
Self Data Validation -

VTRM 0 Continued:
Filled Area -
Encrypted Sequence - 987B850ACB9D1034E2A81B726CAFA82C6823A9FA

CVTRM 1:
Header -
Filler -
Filled Space -

VTRM 1:
Header - VTRM
SHA1 Hash - EE118D74A297F6B6581D2C573D7BC8F38DD39F3C
Padding - C000B790
X & Y Tables Reserved Entries - 521
Protected Files Table Reserved Entries - 1042
Protected Files Table Used Entries - 7
Reserved Entries -

VTRM 1 Table Entries:
Table Entry 1 -
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self
Self Data Validation -

Table Entry 2 -
Reserved Table Entry 2 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 2 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 3 -
Reserved Table Entry 3 - 0400000002000005
Used Table Entry 3 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 4 -
Reserved Table Entry 4 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 4 - 1070000002000002 - mcore.self
Self Data Validation -

Table Entry 5 -
Reserved Table Entry 5 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR
Used Table Entry 5 - 1070000003000002 - mgvideo.self
Self Data Validation -

Table Entry 6 -
Reserved Table Entry 6 - 0410000002000005
Used Table Entry 6 - 10700005FF000001 - vsh.self
Self Data Validation -

Table Entry 7 -
Reserved Table Entry 7 - 0010000002000005
Used Table Entry 7 - 1070000002000002 - mcore.self
Self Data Validation -

VTRM 1 Continued:
Filled Area -
Encrypted Sequence - 987B850ACB9D1034E2A81B726CAFA82C6823A9FA
 


Second Region Header:
Unknown Blank -
Magic Header 2 - 0FACE0FF - DEADFACE
Region Count - 03
Unknown - 02
Blank Filled Block -

Second Region Unknown Block 0:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -

Second Region Unknown Block 1:
Sector Start -
Count -
Auth ID - 1070000001000001 (SCE_CELLOS_PME)
Unknown -
Auth ID -1070000002000001 (PS3_LPAR)
Unknown -
Blank Filled Block -
Blank Filled Block 2 -
Filled Block -

CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA
SHA1 Header -
Unused Area -
HD Model - HitachiHTS545025B9SA00091215PBG23
HD Serial - 81SDN945
Unused Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 -
Unused Area -
Filled Area -

Hash 1 -
Unused Area -
Hash 2 -
Unused Area -
OCRL0200 -
Unused Area -
Filled Area -
 


Lv0ldr/Bootldr:
Encrypted Binary Size - 2EE3
Decrypted Binary Size - 2EE3
Calculated Bootldr Size - 2EE70
Rev Key - ED4C79D65D602876FFADA6FD (CECHH (DIA-002))
PerConsole Nonce - 4A1B8159803A35
Filled Area

Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found!

Lv0ldr/Bootldr Encrypted Statistics:
Sum: 192112
Mean: 750.4375
Std Dev: 26.8428250171617
Entropy: 7.99907946813574 Bits
 


Min Version:
1.97

File Digest Key:
Total number of keys: 40
Key: 627CB1808AB938E32C8C091708726A579E2586E4

Bulk AuthID Check:
Total number of .self IDs: 72

PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr

16 bit Corrupt Sequence Check:
Nothing Found!

8 bit Corrupt Sequence Check:
Nothing Found!

Repetition Check:
Nothing Found!

00 / FF / Other Statistics:
4.54% [WARNING] - Patch & Recheck (Risky below 18.24)
10.51% [DANGER]
0.33%

 

 

Did you try the lv2diag with the pup I uploaded?

tbh the symptoms sound like it could be failed RSX and all this firmware stuff is a red herring.

Edited by ps3dev
Link to comment
Share on other sites

  • 0
  • Developer

Of course idps is invalid when you convert retail to dex.. I can build rebug 3.55.4 drex with bdrevoke removed and also core os patches on nor dump if you needed. I fixed many dex bricks like this luckily your perconsole area is all valid except for idps that's converted (which is fine)

Sent from my iPhone using Tapatalk

Link to comment
Share on other sites

  • 0
3 hours ago, ps3dev said:

here is a dump of my dex console with bwe nor 1.31 for you to compare, notice the same warnings.

 

  Reveal hidden contents
 

Did you try the lv2diag with the pup I uploaded?

tbh the symptoms sound like it could be failed RSX and all this firmware stuff is a red herring.

 

I tried it just now. Still fails updating with the same error I was getting before. The original owner swears the console was fine until they installed a patch, and on reboot, it was like this. The fact it's a 2500 makes me believe more that the issue is most likely software related. Here's my flash, if anyone that is knowledgeable can have a look and if possible fix this, I'd appreciate it. I'm very unfamiliar with DEX and conversions, so I don't want to make this console my guinea pig. :P

 

http://www.ps3downgrade.co.uk/Misc/Dumps/Dump.rar

 

ayusignew.jpgGeneralplot.png

Intel Core i7 920 @ 3.4 Ghz | 6 GB DDR3 RAM in Triple Channel | GeForce GTX 285

2.5 TB Hard Drive Space | Windows 7 Ultimate x64

Official betatester of PCSX2

Link to comment
Share on other sites

  • 0

if it is a bad patch then reinstalling the FW (best OFW so you have a Dex convert ---> installing OFW Dex) twice and to resetting syscon hashes with it, should fix it. (if im not wrong)

 

EDIT:
But then there are may special dex lv2diag's needed ?

Edited by cfwprophet

rsz_2cfwprophet_banner_3.jpg

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...