saramibreak / DiscImageCreator

This is the disc (CD, GD, DVD, HD-DVD, BD, GC/Wii, XBOX, XBOX 360) and disk (Floppy, MO, USB etc) image creation tool

Home Page:http://forum.redump.org/topic/10483/discimagecreator/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Mismatch in SecuROM sectors between DIC and Redumper.

maxz opened this issue · comments

Version
20240601T190719

Describe the bug
The track hashes match, but DIC and Redumper output different SecuROM sectors.

DiscImageCreator (ZEUS_subIntention.txt):

MSF: 00:01:74 Q-Data: 412100 00:40:01 00 00:03:74 2ef1
MSF: 01:08:50 Q-Data: 410101 21:06:50 00 05:08:50 0a8f
MSF: 01:21:00 Q-Data: 410101 11:19:00 00 09:21:00 26b1
MSF: 01:31:16 Q-Data: 410101 03:29:16 00 41:31:16 b166
MSF: 01:33:02 Q-Data: 410101 21:31:02 00 05:33:02 1f2b
MSF: 02:19:24 Q-Data: 410101 06:17:24 00 22:19:24 4ea8
MSF: 02:47:28 Q-Data: 410101 02:45:2a 00 02:47:68 d26b
MSF: 02:51:15 Q-Data: 410101 02:49:1d 00 02:51:05 ba37
MSF: 02:56:51 Q-Data: 410101 02:14:51 00 02:54:51 e749
MSF: 03:36:58 Q-Data: 410101 03:14:58 00 03:32:58 057f
MSF: 03:58:14 Q-Data: 410101 03:56:10 00 03:58:34 ea09

Redumper (ZEUS.log):

SecuROM [ZEUS.bin]:
  scheme: unknown
MSF: 41:19:35 Q-Data: 410101 41:17:34 00 41:19:34 9951
MSF: 41:19:36 Q-Data: 410101 41:17:34 00 41:19:34 9951

I don't know which one is more correct.

Command
./DiscImageCreator.out cd /dev/sr0 ZEUS.bin 40 /q /c2 100 1 /d8 /ns

Disc title
Herrscher des Olymp: Zeus (BestSeller Series)

Disc ringcode
Sonopress 50455848/S0026154 01, IFPI LB 46 (Mastering SID).

URL
eBay

Log files
ZEUS (DiscImageCreator).zip
ZEUS (Redumper).zip

Do you have windows pc? If yes, try to dump using same command and option by the windows version. If no, please search for the following byte sequence using binary editor or IsoBuster.

49 53 63 28

These 4 bytes indicates this file is "InstallShield Cabinet". DATA1.CAB has it, but I can't uncompress this file alone.

I don't have a Windows install, but if nothing else works then I might be able to dump the disc in a Windows VM, although at that point the host OS might somehow interfere.

grep: ./DATA1.CAB: binary file matches
grep: ./DEMOS/Pharao/_sys1.cab: binary file matches
grep: ./DEMOS/Pharao/_user1.cab: binary file matches
grep: ./DEMOS/Pharao/data1.cab: binary file matches
grep: ./_SYS1.CAB: binary file matches
grep: ./_USER1.CAB: binary file matches

These are the files with the pattern. So just the CAP files, of which probably only the ones in the root directory are relevant here.

Using unshield I was able to extract DATA1.CAB just by itself.
Would using unshield solve your problem?
If not, then what else do you require from me to continue debugging?

`SYS1.CAB` and `_USER1.CAB` seem like generic files to me. But their content differs from the Pharao demo files.
23f0395b61628f5b3698714708a5e876  DATA1.CAB
b29ebf3acc5956976b4bfc2fe9a08efa  _SYS1.CAB
b86c35678dc9462f9408a4e45d09113e  _USER1.CAB
f243222661eb930434d633e897b06d39  DEMOS/Pharao/data1.cab
cf31d5b3a38d037a28f1ada7396de627  DEMOS/Pharao/_sys1.cab
1e7003bea4ce8b9ab18839b834612ff5  DEMOS/Pharao/_user1.cab
So maybe those would help you?

Thanks. I confirmed ZEUS_subIntention.txt is correct.