NCCH: Header: NCCH Signature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ontent size: 0x0001e000 Partition id: 0004013000002602 Maker code: 00 Version: 2 Title seed check: 00000000 Program id: 0004013000002602 Logo hash: 0000000000000000000000000000000000000000000000000000000000000000 Product code: 1021pseg-ciuser Exheader size: 00000400 Exheader hash (GOOD): A0AB01F900C5F736878FAB4376AEE089FD7D569C6E7B1D8AE3775E4F5AF49B9E Flags: 0200020100000000 > Mediaunit size: 0x200 > Crypto key: Secure (0) > Form type: Executable content without RomFS > Content type: Application > Content platform: CTR > No RomFS mount Plain region offset: 0x00000a00 Plain region size: 0x00000200 Logo offset: 0x00000000 Logo size: 0x00000000 ExeFS offset: 0x00000c00 ExeFS size: 0x0001d400 ExeFS hash region size: 0x00000200 RomFS offset: 0x00000000 RomFS size: 0x00000000 RomFS hash region size: 0x00000000 ExeFS Hash (GOOD): 4508CDF6425BF06B0C4B8778943B17B8EE7110615F2FB1A99627477F767C0C26 RomFS Hash: 0000000000000000000000000000000000000000000000000000000000000000 Saving RomFS... Extended header: Signature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dr RSA Modulus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ame: cecd Flag: 01 [compressed] Remaster version: 000B Code text address: 0x00100000 Code text size: 0x00021E9C Code text max pages: 0x00000022 (0x00022000) Code ro address: 0x00122000 Code ro size: 0x0000145C Code ro max pages: 0x00000002 (0x00002000) Code data address: 0x00124000 Code data size: 0x0000135C Code data max pages: 0x00000002 (0x00002000) Code bss size: 0x000094E8 Code stack size: 0x00004000 Dependency: 0004013000001702 Dependency: 0004013000003202 Dependency: 0004013000002d02 Dependency: 0004013000002202 Savedata size: 0x0 Jump id: 0004013000002602 Program id: 0004013000002602 (FAIL) Core version: 0x2 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 1 (GOOD) Affinity mask: 2 (GOOD) Main thread priority: 60 (GOOD) Ext savedata id: 0x0 System savedata id 1: 0x10026 (GOOD) System savedata id 2: 0x0 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x1 (GOOD) > Category System Application Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: YES > Special memory: NO > Access Core 2: NO > Memory type: BASE Handle table size: 0x200 Allowed systemcalls: 0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B 0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30 0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A 0x3B, 0x3C, 0x3D, 0x47, 0x48, 0x4A, 0x4B, 0x4C 0x4D, 0x4E, 0x4F Allowed interrupts: none ARM9 Desc. version: 0x2 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: NO Service access: (GOOD) > nwm::CEC > fs:USER > ptm:s > ps:ps > cfg:s > frd:u Reslimit category: 03 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x0001d08c Section hash (GOOD): 384754768EDC60C81CB6E1FCD0B79B2C6E525956608C3A2B18A282F5F394E7BA Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/11-04-19_07-05-11-ktr/modules/cecd/v11264/00000015_exefs/code.bin...