PSDev 1 Posted July 31, 2012 In this tutorial I will be running threw every tool and feature in PS3Tool GUI Edition latest version. The only tutorial was done in v1 which is very outdated and old. So lets jump right in. (I will not be going to SPU tool, or any oher formed tool that's not on main screen (That's another tutorial)).PS3 PUP Unpacker: Make sure the PUP is named "PS3UPDAT.PUP" Click the drop down menu in PUP Tools Click "PUP unpacker" Now click do it and your down, you will recieve a output like below: sections: 9hdr size: 00000000_00000290data size: 00000000_0c031127header hmac: ???unpacking version.txt (00000000_00000005 bytes; hmac: ???)...unpacking license.txt (00000000_0004a59a bytes; hmac: ???)...unpacking update_flags.txt (00000000_00000005 bytes; hmac: ???)...unpacking ps3swu.self (00000000_005675c0 bytes; hmac: ???)...unpacking vsh.tar (00000000_00002800 bytes; hmac: ???)...unpacking dots.txt (00000000_00000003 bytes; hmac: ???)...unpacking update_files.tar (00000000_0b501800 bytes; hmac: ???)... Dev_flash tool: Name the PUP "PS3UPDAT.PUP" Click the drop down menu in PUP Tools Click Dev_flash unpacker, and hit Do It. You will get out put like below opening file PS3UPDAT.PUPFirmware version version : 4.20extracting dev_flash/data/font/SCE-PS3-YG-R-KOR.TTFextracting dev_flash/data/font/SCE-PS3-NR-L-JPN.TTFextracting dev_flash/data/font/SCE-PS3-DH-R-CGB.TTFextracting dev_flash/data/font/SCE-PS3-NR-R-JPN.TTFextracting dev_flash/data/font/SCE-PS3-MT-B-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-CP-R-KANA.TTFextracting dev_flash/data/font/SCE-PS3-NR-B-JPN.TTFextracting dev_flash/data/font/SCE-PS3-YG-L-KOR.TTFextracting dev_flash/data/font/SCE-PS3-RD-R-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-MT-BI-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-MT-I-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-NR-R-EXT.TTFextracting dev_flash/data/font/SCE-PS3-SR-R-JPN.TTFextracting dev_flash/data/font/SCE-PS3-SR-R-EXT.TTFextracting dev_flash/data/font/SCE-PS3-RD-B-LATIN2.TTFextracting dev_flash/data/font/SCE-PS3-RD-L-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-VR-R-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-SR-R-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-RD-B-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-RD-R-LATIN2.TTFextracting dev_flash/data/font/SCE-PS3-VR-R-LATIN2.TTFextracting dev_flash/data/font/SCE-PS3-YG-B-KOR.TTFextracting dev_flash/data/font/SCE-PS3-SR-R-LATIN2.TTFextracting dev_flash/data/font/SCE-PS3-MT-R-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-RD-BI-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-RD-L-LATIN2.TTFextracting dev_flash/data/font/SCE-PS3-RD-I-LATIN.TTFextracting dev_flash/data/font/SCE-PS3-RD-LI-LATIN.TTFextracting dev_flash/vsh/etc/version.txtNote, It will be a lot longer, that's just a example readself tool: Just place one of the following, lv0, lv1ldr, lv2ldr, appldr, isoldr or EBOOT.BIN in root of program folder Click drop down menu Click the one you want to use and click Do it, you will get the following output: SELF header elf #1 offset: 00000000_00000090 header len: 00000000_00000500 meta offset: 00000000_000001e0 phdr offset: 00000000_00000040 shdr offset: 00000000_000e6c70 file size: 00000000_000e6a80 auth id: 1ff00000_01000001 (Unknown) vendor id: ff000000 info offset: 00000000_00000070 sinfo offset: 00000000_00000140 version offset: 00000000_00000180 control info: 00000000_00000190 (00000000_00000070 bytes) app version: 4.32.0 SDK type: Retail (Type 0) app type: level 0Control info control flags: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 file digest: ae 8f b2 11 30 04 95 27 1f ec 74 69 cc 2a c7 cb 9e 76 d7 58Section header offset size compressed unk1 unk2 encrypted 00000000_00010500 00000000_00000c70 [NO ] 00000000 00000000 [YES] 00000000_00020500 00000000_000c67c0 [NO ] 00000000 00000000 [YES]Encrypted Metadata unable to decrypt metadataELF header type: Executable file machine: PowerPC64 version: 1 phdr offset: 00000000_00000040 shdr offset: 00000000_000e6800 entry: 00000000_00000c60 flags: 00000000 header size: 00000040 program header size: 00000038 program headers: 2 section header size: 00000040 section headers: 10 section header string table index: 9Program headers type offset vaddr paddr memsize filesize PPU SPE RSX align LOAD 00000000_00010000 00000000_00000000 00000000_00000000 00000000_00000c70 00000000_00000c70 rwx --- --- 00000000_00010000 LOAD 00000000_00020000 00000000_08000000 00000000_08000000 00000000_000cb6d0 00000000_000c67c0 rwx --- --- 00000000_00010000Section headers [Nr] Name Type Addr ES Flg Lk Inf Al Off Size [00] <no-name> NULL 00000000_00000000 00 00 000 00 00000000_00000000 00000000_00000000 [01] <no-name> PROGBITS 00000000_00000000 00 wae 00 000 08 00000000_00010000 00000000_00000c70 [02] <no-name> PROGBITS 00000000_08000000 00 wa 00 000 04 00000000_00020000 00000000_0001758c [03] <no-name> PROGBITS 00000000_08017590 00 a 00 000 16 00000000_00037590 00000000_0002c760 [04] <no-name> PROGBITS 00000000_08043cf0 00 ae 00 000 16 00000000_00063cf0 00000000_0007d768 [05] <no-name> PROGBITS 00000000_080c1460 00 ae 00 000 08 00000000_000e1460 00000000_00004278 [06] <no-name> PROGBITS 00000000_080c56d8 00 ae 00 000 08 00000000_000e56d8 00000000_00000080 [07] <no-name> PROGBITS 00000000_080c5760 00 ae 00 000 08 00000000_000e5760 00000000_00001060 [08] <no-name> NOBITS 00000000_080c6800 00 ae 00 000 128 00000000_000e67c0 00000000_00004ed0 [09] <no-name> STRTAB 00000000_00000000 00 00 000 01 00000000_000e67c0 00000000_0000003dNote, Diffrent for other files selected Core_os tool: Make sure the Core_os is named original. Click Drop down menu Then click decrypt and do it. You will be outputed with a file called decrypted_core_os_package then click extract you will be presented with a extracted core_os Then you can encrypt it and you will be presented with a encrypted core_os Output below for decrypted log: Metadata Key: D7 1D 9A 12 BB E6 D9 87 8F 72 AB 59 F1 ED D4 44Metadata IV: 7E 05 A9 79 FF 64 DC FC 46 87 02 5B 69 82 AE E2Metadata Size: 544 bytesData Start: 0x00000300Data Size: 5778777 bytes (5.51 MB)PKG Key: F8 72 19 EC FE 95 EF 1F 51 22 3D 04 A3 E2 37 5EPKG IV: F7 1E 03 B6 9D 5D 74 D7 7B 03 F6 14 00 00 00 00PKG Size: 7340000 bytes (7.00 MB) Fix Tar tool: After modifying the tar file you need to fix it for it to be correct, so have it named "Update_files.tar" Click drop down menu Click the following options on the screen that apply to the tar you want to fix and click do it, you will get a output similar like below: Fixing file : BDIT_FIRMWARE_PACKAGE.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_301R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_302R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_303R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_304R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_306R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_308R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_310R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_312R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BDPT_FIRMWARE_PACKAGE_314R.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : BLUETOOTH_FIRMWARE.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : CORE_OS_PACKAGE.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : MULTI_CARD_FIRMWARE.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01000006.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01010303.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01020302.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01030302.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01040402.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01050002.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_01050101.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : SYS_CON_FIRMWARE_S1_00010002083E0832.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : UPL.xml.pkgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : RL_FOR_PACKAGE.imgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : RL_FOR_PROGRAM.imgOwner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash3_024.tar.aa.2012_06_15_074020Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_000.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_001.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_002.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_003.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_004.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_005.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_006.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_007.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_008.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_009.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_010.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_011.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_012.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_013.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_014.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_015.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_016.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_017.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_018.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_019.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_020.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_021.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_022.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274)Fixing file : dev_flash_023.tar.aa.2012_06_15_073845Owner/group: pup_tool(0001752):psnes(0001274) SCE Info Tool: Have one of the following file in root folder, lv0, ld1ldr, lv2ldr, appldr, isoldr or eboot.bin Click the option that applys Click do it and you will get output similar like below: Magic 0x53434500 [OK]Version 0x00000002Key Revision [Revision 0]Header Type [sELF]Metadata Offset 0x000001E0Header Length 0x0000000000000500Data Length 0x00000000000E6A80 [*] SELF Header:Header Type 0x0000000000000003App Info Offset 0x0000000000000070ELF Offset 0x0000000000000090PH Offset 0x00000000000000D0SH Offset 0x00000000000E6D00Section Info Offset 0x0000000000000140SCE Version Offset 0x0000000000000180Control Info Offset 0x0000000000000190Control Info Size 0x0000000000000070 [*] Application Info:Auth-ID [lv0]Vendor-ID [hv]SELF-Type [lv0]Version 04.20 [*] SCE Version:Header Type 0x00000001Present [FALSE]Size 0x00000010unknown_3 0x00000000 [*] Control InfoType FlagsSize 0x00000030Next [TRUE]Flags 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [*] Control InfoType DigestSize 0x00000040Next [FALSE]Digest 1 62 7C B1 80 8A B9 38 E3 2C 8C 09 17 08 72 6A 57 9E 25 86 E4Digest 2 AE 8F B2 11 30 04 95 27 1F EC 74 69 CC 2A C7 CB 9E 76 D7 58 [*] Section Infos:Idx Offset Size Compressed unk0 unk1 Encrypted000 00010500 00000C70 [NO ] 00000000 00000000 [YES]001 00020500 000C67C0 [NO ] 00000000 00000000 [YES] [*] ELF64 Header:Type [EXEC]Machine [PPC64]Version 0x00000001Entry 0x0000000000000C60Program Headers Offset 0x0000000000000040Section Headers Offset 0x00000000000E6800Flags 0x00000000Program Headers Count 0002Section Headers Count 0010SH String Index 0009 [*] ELF64 Program Headers:Idx Type Offset VAddr PAddr FileSize MemSize PPU SPU RSX Align000 LOAD 00010000 00000000 00000000 00000C70 00000C70 XWR --- --- 00010000001 LOAD 00020000 08000000 08000000 000C67C0 000CB6D0 XWR --- --- 00010000 [*] ELF64 Section Headers:Idx Name Type Flags Address Offset Size ES Align LK000 0000 NULL --- 00000000 00000000 00000000 0000 00000000 000001 000B PROGBITS WAE 00000000 00010000 00000C70 0000 00000008 000002 0013 PROGBITS -AE 08000000 00020000 0001758C 0000 00000004 000003 0019 PROGBITS -A- 08017590 00037590 0002C760 0000 00000010 000004 0021 PROGBITS WA- 08043CF0 00063CF0 0007D768 0000 00000010 000005 0027 PROGBITS WA- 080C1460 000E1460 00004278 0000 00000008 000006 002C PROGBITS WA- 080C56D8 000E56D8 00000080 0000 00000008 000007 0033 PROGBITS WA- 080C5760 000E5760 00001060 0000 00000008 000008 0038 NOBITS WA- 080C6800 000E67C0 00004ED0 0000 00000080 000009 0001 STRTAB --- 00000000 000E67C0 0000003D 0000 00000001 000 SFO reader Tool: Name the file PARAM.SFO Click drop dow menu and click sfo reader click do it and you will be presented with similar output like below: ****************| HEADER |****************FILE_VERSION: 0x101N°_PARAMETERS: 7****************| PARAMETERS |****************APP_VER: 01.16CATEGORY: GDPARENTAL_LEVEL: 0x09PS3_SYSTEM_VER: 03.7200TITLE: Modern Warfare® 3TITLE_ID: BLUS30838VE9: 01.00 RCO Tool: Have the original name of one of the rco that are optioned in the drop down menu Make sure that specific rco file is in your root of your folder click it then click do it, you will have a dumped rco in RCO folder along with following output: RCO header info: Endian = big (PS3) VersionID = 0x120 Compression = 0x1 UMDFlag = 0 MainTree Offset = 0xa4 TextTree Offset = 0xe8c ImageTree Offset = 0xcc ObjectTree Offset = 0x1064c TextData Offset = 0x9e4c [length = 0xd714] NameData Offset = 0x16d6c [length = 0x1a14] EventData Offset = 0x18780 [length = 0x27c] ImageData Offset = 0x17560 [length = 0x2f100] Header compression: compressed = 0x9d99 bytes, uncompressed = 0x18958 bytesTextData Compression info: LangID = 0x6, compressed = 0xbf1 bytes, uncompressed = 0x2ef8 bytes LangID = 0x1, compressed = 0xab1 bytes, uncompressed = 0x2a80 bytes LangID = 0x2, compressed = 0xc4a bytes, uncompressed = 0x30f8 bytes LangID = 0x4, compressed = 0xc08 bytes, uncompressed = 0x2fd0 bytes LangID = 0x5, compressed = 0xbc5 bytes, uncompressed = 0x2fb0 bytes LangID = 0x0, compressed = 0x9c5 bytes, uncompressed = 0x18e8 bytes LangID = 0x9, compressed = 0x9bb bytes, uncompressed = 0x18d0 bytes LangID = 0x7, compressed = 0xc13 bytes, uncompressed = 0x2f48 bytes LangID = 0x8, compressed = 0xcd5 bytes, uncompressed = 0x2f34 bytes LangID = 0x3, compressed = 0xbbe bytes, uncompressed = 0x2ea8 bytes LangID = 0xb, compressed = 0x8f1 bytes, uncompressed = 0x135c bytes LangID = 0xa, compressed = 0x957 bytes, uncompressed = 0x1428 bytes LangID = 0xe, compressed = 0xb80 bytes, uncompressed = 0x2bc0 bytes LangID = 0xc, compressed = 0xb8b bytes, uncompressed = 0x2b94 bytes LangID = 0xf, compressed = 0xb2e bytes, uncompressed = 0x2b20 bytes LangID = 0xd, compressed = 0xb5d bytes, uncompressed = 0x2ac0 bytes LangID = 0x10, compressed = 0xc92 bytes, uncompressed = 0x2eb0 bytes LangID = 0x11, compressed = 0xbbe bytes, uncompressed = 0x2e70 bytes LangID = 0x12, compressed = 0xab1 bytes, uncompressed = 0x2a80 bytesDumping resource 'tex_aa_plane'...Dumping resource 'tex_button'...Dumping resource 'tex_button_focus'...Dumping resource 'tex_button_shadow'...Dumping resource 'tex_arrow_anim'...Dumping resource 'item_tex_plain_folder'...Dumping resource 'tex_loading_icon'...Dumping resource 'tex_opt_obi'...Dumping resource 'tex_playing'...Dumping resource 'tex_playing_shadow'...Dumping resource 'game_tex_load'...Dumping resource 'game_tex_load_shadow'...Dumping resource 'tex_quit'...Dumping resource 'video_tex_load'...Dumping resource 'video_tex_load_shadow'...Dumping resource 'video_tex_lock'...Dumping resource 'video_tex_rental'...Dumping resource 'tex_psplus_icon'...Dumping resource 'bgdl_tex_preinstall'...Dumping resource 'bgdl_tex_timelimit'...Dumping resource 'tex_guit'...Dumping resource 'tex_video'...Dumping resource 'tex_video_shadow'...Dumping resource 'item_tex_disc_bd'...Dumping resource 'item_tex_disc_dvd'...Dumping resource 'item_tex_disc_icon'...Dumping resource 'item_tex_disc_bd_contents'...Dumping resource 'item_tex_ms_icon'...Dumping resource 'item_tex_sd_icon'...Dumping resource 'item_tex_cf_icon'...Dumping resource 'item_tex_psp_icon'...Dumping resource 'item_tex_psp_ms_icon'...Dumping resource 'item_tex_usb_connection'...Dumping resource 'item_tex_digital_camera'...Dumping resource 'item_tex_atrac_audio'...Dumping resource 'item_tex_walkman'...Dumping resource 'item_tex_ps_store'...Dumping resource 'item_tex_upload'...Dumping resource 'item_tex_dlna_scan'...Dumping resource 'item_tex_dlna_base'...Dumping resource 'item_tex_dlna_default'...Dumping resource 'tex_mpg4'...Dumping resource 'tex_avc'...Dumping resource 'tex_mpg2'...Dumping resource 'tex_mpg1'...Dumping resource 'tex_mjpg'...Dumping resource 'tex_wmv'...Dumping resource 'tex_divx'...Dumping resource 'tex_broken_icon'...Dumping resource 'tex_unknown_icon'...Dumping resource 'tex_bg_icon'...Dumping resource 'tex_lock_icon'...Dumping resource 'tex_sb_base'...Dumping resource 'tex_sb_base_s'...Dumping resource 'tex_sb_slider'...Dumping resource 'tex_album_icon'...Dumping resource 'video_tex_default'...Dumping resource 'video_tex_album_default'...Dumping Dutch text entries...Dumping English text entries...Dumping French text entries...Dumping German text entries...Dumping Italian text entries...Dumping Japanese text entries...Dumping Korean text entries...Dumping Portugese text entries...Dumping Russian text entries...Dumping Spanish text entries...Dumping ChineseSimpl text entries...Dumping ChineseTrad text entries...Dumping Danish text entries...Dumping Finnish text entries...Dumping Norwegian text entries...Dumping Swedish text entries...Dumping unknown0x10 text entries...Dumping unknown0x11 text entries...Dumping unknown0x12 text entries... C2D tool: Have the eid_root_key named this "eid_root_key.bin" name the Flash or your Nor, CEXFLASH Have openssl installed under C:/opensll Then click drop down menu click only option click do it and get output plus DEXFLASH like below: EID key : 48 bytes (eid_root_key.bin)Flash size : 16 MB (CEXFLASH.bin)Target ID : $85EID ROOT KEY: 64D20967DEACDA16ACADBE289B0EE2C25EE77331A5040C5DC9DF67B3FE574F6DEID ROOT IV : 6BD7C324D3B213A647DC31987345595EEID0 KEY : 9C1C4A93666EF67941F54679A7199D7553C8F0F50F3548C8966D6872FC8CD668EID0 IV : 2DC374E270F851EB0D524F89790F2563EID0 SEC KEY: 4C40F3E244EF2BF29A9D48BE26FEEEEBTarget ID : $85 (from decrypted EID0 section)CMAC HASH : F1053CC3818DD6CE2775F0273DFC212EWriting modified flash (DEXFLASH.bin)...Done! Bye, good luck using my tool, also to note after doing a operation it's recommended to close the program before doing anotherDOWNLOAD To latest version: Version 3.1 Quote Share this post Link to post Share on other sites