NCCH: Header: NCCH Signature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ontent size: 0x0001ec00 Partition id: 0004013000003802 Maker code: 00 Version: 2 Title seed check: 00000000 Program id: 0004013000003802 Logo hash: 0000000000000000000000000000000000000000000000000000000000000000 Product code: 0215builder Exheader size: 00000400 Exheader hash (GOOD): 932B16DE8FA616BE03E9FE8912D04B5916C296E4711A42AC0F67FB9778FC9464 Flags: 0200020100000000 > Mediaunit size: 0x200 > Crypto key: Secure (0) > Form type: Executable content without RomFS > Content type: Application > Content platform: CTR > No RomFS mount Plain region offset: 0x00000a00 Plain region size: 0x00000200 Logo offset: 0x00000000 Logo size: 0x00000000 ExeFS offset: 0x00000c00 ExeFS size: 0x0001e000 ExeFS hash region size: 0x00000200 RomFS offset: 0x00000000 RomFS size: 0x00000000 RomFS hash region size: 0x00000000 ExeFS Hash (GOOD): 13F7D874DAFE5875E1E20B47D607DF3DD9E803C864FB266A90C6519F96F6BE2E RomFS Hash: 0000000000000000000000000000000000000000000000000000000000000000 Saving RomFS... Extended header: Signature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dr RSA Modulus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ame: act Flag: 01 [compressed] Remaster version: 0009 Code text address: 0x00100000 Code text size: 0x00025A50 Code text max pages: 0x00000026 (0x00026000) Code ro address: 0x00126000 Code ro size: 0x00001E0C Code ro max pages: 0x00000002 (0x00002000) Code data address: 0x00128000 Code data size: 0x000006B8 Code data max pages: 0x00000001 (0x00001000) Code bss size: 0x000183F0 Code stack size: 0x00016000 Dependency: 0004013000001502 Dependency: 0004013000001702 Dependency: 0004013000003202 Dependency: 0004013000002902 Dependency: 0004013000002202 Savedata size: 0x0 Jump id: 0004013000003802 Program id: 0004013000003802 (FAIL) Core version: 0x2 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 1 (GOOD) Affinity mask: 2 (GOOD) Main thread priority: 60 (GOOD) Ext savedata id: 0x0 System savedata id 1: 0x10038 (GOOD) System savedata id 2: 0x0 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x1 (GOOD) > Category System Application Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: YES > Special memory: NO > Access Core 2: NO > Memory type: BASE Handle table size: 0x0 Allowed systemcalls: 0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B 0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30 0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A 0x3B, 0x3C, 0x3D, 0x47, 0x48, 0x4A, 0x4B, 0x4C 0x4D, 0x4E, 0x4F Allowed interrupts: none ARM9 Desc. version: 0x2 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: NO Service access: (GOOD) > am:net > cfg:s > fs:USER > http:C > ptm:s > frd:u Reslimit category: 03 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x0001dd3c Section hash (GOOD): 1A00BDC28B4C384E07C0846766E602E304117016354C624EA5972879243E1F0B Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/07-10-17_08-00-24-ctr/modules/act/v9216/00000017_exefs/code.bin...