matchung Wrote:it seems that:
000376EC Mute Y
000376FC Hold Y
Awesome matchung! It seems that the bytes before them control the shadows :P
0x376E8 - Mute shadow Y
0x376F8 - Hold shadow Y
Thanks a lot matchung for posting :D
any way to decrypt the vshmain.prx comes from oe? it has with ~PSP header.. or only DA knows the key?
Double postZiNgA BuRgA Wrote:matchung Wrote:it seems that:
000376EC Mute Y
000376FC Hold Y
Awesome matchung! It seems that the bytes before them control the shadows :P
0x376E8 - Mute shadow Y
0x376F8 - Hold shadow Y
Thanks a lot matchung for posting :D
:P
search the rco text in vshmain, the offset value should be found underneath..
[/QUOTE]
matchung Wrote:any way to decrypt the vshmain.prx comes from oe? it has with ~PSP header.. or only DA knows the key?
the vshmain.prx of OE is just the normal sigchecked encrypted vshmain.prx. DA is patching it in the memory
bstronga Wrote:matchung Wrote:any way to decrypt the vshmain.prx comes from oe? it has with ~PSP header.. or only DA knows the key?
the vshmain.prx of OE is just the normal sigchecked encrypted vshmain.prx. DA is patching it in the memory
;P i tried the prxdecrypter to decrypt the vsnmain, but failed.
can anyone post there vshmain
matchung Wrote::P
search the rco text in vshmain, the offset value should be found underneath..
Huh? I found the text, what offset though?
matchung Wrote:i tried the prxdecrypter to decrypt the vsnmain, but failed.
:S Most people use PSAR Dumper to do all of the stuff - try that I guess.
(o Y o) Wrote:can anyone post there vshmain
Check a few posts on the first page :P
http://endlessparadigm.com/forum/attachment.php?aid=23
matchung Wrote:ZiNgA BuRgA Wrote:Huh? I found the text, what offset though?[quote=ZiNgA BuRgA]
something like this:
Oh, lol, not used to HexWorkshop's 2 byte grouping :P.
For your information, they aren't "offsets". But anyways, yeah, I was fiddling around with that section, which is how I obtained those values (you did the same :P)
Another interesting (not really actually) section starts at 0x34010 - corrupting this area seems to screw up the UMD and disables sleep mode :O
bstronga Wrote:hmm looked a little in the other prx's
they also seem to contain position information however couldn't find the vertical position too. :O
didn't looked too close though. :P
edit:
by the way when using a decrypted vshmain.prx
Quote:open up pspbtcnf.txt in flash0:/kn and and write
_under_
and change the last line
Code:
$%%/vsh/module/vshmain.prx
|
to
it seems cannot loaded this way in 330... =,=
^^:S I don't think the positions are the same in 3.30 either, or 3.10 for that matter, so I guess this is really dead until someone discovers a more general format of vshmain.prx, rather than places to hex