Endless Paradigm

Full Version: VSMX File Format
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3 4
kung ffffu Wrote: [ -> ]Thanks for your help but I am still unsucessful or perhaps I am decompiling wrong!
By the way, don't use the decompile function - it's highly experimental and probably will break.  You should only use the decode function.
And also, please explain what you mean by "unsuccessful" - what exactly happens?

kung ffffu Wrote: [ -> ]Here are the images showing what I did:
http://imgur.com/y1sxL
http://imgur.com/VdvbF
Please don't change the file signature like you did in the second image.  It's not an RCO file.

Hope that helps.
At home now.
Uhh, kung ffffu..., isn't the file you gave identical to this one?
I've already done a manual decompile for that...
Coul you tell me the details on how to decompile it using raf_script?

Also I have been testing others vsmx files which works but it gives after it says:
Reading VSMX...
Writing decoded output...
Warning Unknown ID 0x4a at line 140
Warning Unknown ID 0x4d at line 185
Warning Unknown ID 0x49 at line xxx

and many other warning of 0x4d and 0x49 but is always mostly 0x49 then when I get it decoded on the file some parts say unknownid and when I try to reencode it will look different of because of the id!

Right now What I am trying to achieve is to change the time input of the boot logo on the ps3 and that is why I saw on the file that you can add more files to i, making it look as if it were a gif file or more time of presentation!

If you can help thanks
kung ffffu Wrote: [ -> ]Coul you tell me the details on how to decompile it using raf_script?
You can't.  raf_script is a compiler, not a decompiler.
There isn't any (decent) decompiler in existence to my knowledge.  I manually decompiled the script before.

kung ffffu Wrote: [ -> ]Also I have been testing others vsmx files which works but it gives after it says:
Reading VSMX...
Writing decoded output...
Warning Unknown ID 0x4a at line 140
Warning Unknown ID 0x4d at line 185
Warning Unknown ID 0x49 at line xxx

and many other warning of 0x4d and 0x49 but is always mostly 0x49 then when I get it decoded on the file some parts say unknownid and when I try to reencode it will look different of because of the id!
From memory, they _should_ be the same.  That is, decode » encode (with no modifications) should give the same script, even with unknowns (not all cases, since some references may need to be considered).
How do you know it's different?
ZiNgA BuRgA Wrote: [ -> ]From memory, they _should_ be the same.  That is, decode » encode (with no modifications) should give the same script, even with unknowns (not all cases, since some references may need to be considered).
How do you know it's different?

Because after you have decoded them the unknown id get written on the file itself if you reencode and go take a look in your hex editor you will see the comparison between each vsmx, and you will see that the data changed, so it will not be the same anymore
Somewhat depends how the data is changed.
Even if it knows everything, things may still be changed by a simple decode » encode.  This is because the ordering of the string table may be varied by Rcomage's vsmxenc function.  It doesn't functionally change the script, but it won't be a byte-for-byte match.
ZiNgA BuRgA Wrote: [ -> ]If you're interested, here's a decompiled version of the script, which compiles with raf_script and gives very similar output:
mr ZINgA, may explain the method used to decompile?
*attacked file for example (heavy rain decode script)
I did it manually.  Rcomage does also have a VSMX decompile option (rcomage vsmxdec --decompile) but it's very buggy and usually doesn't work right.  However, it may be able to produce some semi-readable output.
I understand, I mean the js code that you are writ in this post: 17

Thanks!
As I said, I manually looked through the decoded output and figured out the underlying JS code.
I've somewhat explained how the format works in the first post of this thread - you can attempt to reverse engineer the JS code from there if you wish.
Pages: 1 2 3 4
Reference URL's