NCCH: Header: NCCH Signature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ontent size: 0x00039800 Partition id: 0004013000003402 Maker code: 00 Version: 2 Title seed check: 00000000 Program id: 0004013000003402 Logo hash: 0000000000000000000000000000000000000000000000000000000000000000 Product code: 0517pseg-ciuser Exheader size: 00000400 Exheader hash (GOOD): A3EEBCDC0788D7923AA84EEEF0DBE98238CB6F8BE85DDF7FE8BCBABEFEB05472 Flags: 0200020100000000 > Mediaunit size: 0x200 > Crypto key: Secure (0) > Form type: Executable content without RomFS > Content type: Application > Content platform: CTR > No RomFS mount Plain region offset: 0x00000a00 Plain region size: 0x00000200 Logo offset: 0x00000000 Logo size: 0x00000000 ExeFS offset: 0x00000c00 ExeFS size: 0x00038c00 ExeFS hash region size: 0x00000200 RomFS offset: 0x00000000 RomFS size: 0x00000000 RomFS hash region size: 0x00000000 ExeFS Hash (GOOD): 728216293F4993D4AF8D2E3DBB7A69AF41E251795976BC0D97712E426D8DA236 RomFS Hash: 0000000000000000000000000000000000000000000000000000000000000000 Saving RomFS... Extended header: Signature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dr RSA Modulus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ame: boss Flag: 01 [compressed] Remaster version: 000E Code text address: 0x00100000 Code text size: 0x00043FBC Code text max pages: 0x00000044 (0x00044000) Code ro address: 0x00144000 Code ro size: 0x00004A7C Code ro max pages: 0x00000005 (0x00005000) Code data address: 0x00149000 Code data size: 0x000027D4 Code data max pages: 0x00000003 (0x00003000) Code bss size: 0x00026D64 Code stack size: 0x00002000 Dependency: 0004013000002402 Dependency: 0004013000001702 Dependency: 0004013000003202 Dependency: 0004013000002902 Dependency: 0004013000003102 Dependency: 0004013000002202 Savedata size: 0x0 Jump id: 0004013000003402 Program id: 0004013000003402 (FAIL) Core version: 0x2 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 1 (GOOD) Affinity mask: 2 (GOOD) Main thread priority: 62 (GOOD) Ext savedata id: 0x0 System savedata id 1: 0x10034 (GOOD) System savedata id 2: 0x0 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x41 (GOOD) > Category System Application > BOSS Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: YES > Special memory: NO > Access Core 2: NO > Memory type: BASE Handle table size: 0x32 Allowed systemcalls: 0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B 0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30 0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A 0x3B, 0x3C, 0x3D, 0x47, 0x48, 0x4A, 0x4B, 0x4C 0x4D, 0x4E, 0x4F Allowed interrupts: none ARM9 Desc. version: 0x2 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: NO Service access: (GOOD) > http:C > ac:u > ptm:s > ptm:play > cfg:s > fs:USER > ps:ps > frd:u > cecd:s Reslimit category: 03 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x00038930 Section hash (GOOD): 1EF49F5AC811C5886C48B91027A1C274E0028979519BD7FF3AB533C35CF42935 Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/05-27-19_08-00-37-ctr/modules/boss/v14337/00000027_exefs/code.bin...