NCCH: Header: NCCH Signature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ontent size: 0x0003dc00 Partition id: 0004013000002f02 Maker code: 00 Version: 2 Title seed check: 00000000 Program id: 0004013000002f02 Logo hash: 0000000000000000000000000000000000000000000000000000000000000000 Product code: 0929pseg-ciuser Exheader size: 00000400 Exheader hash (GOOD): 8A12780E5B468D44C01AAE45CBC12EE055A9C9E7C9A21A8BE2D3E10BF82CA478 Flags: 0200020100000000 > Mediaunit size: 0x200 > Crypto key: Secure (0) > Form type: Executable content without RomFS > Content type: Application > Content platform: CTR > No RomFS mount Plain region offset: 0x00000a00 Plain region size: 0x00000200 Logo offset: 0x00000000 Logo size: 0x00000000 ExeFS offset: 0x00000c00 ExeFS size: 0x0003d000 ExeFS hash region size: 0x00000200 RomFS offset: 0x00000000 RomFS size: 0x00000000 RomFS hash region size: 0x00000000 ExeFS Hash (GOOD): F654D7977B11BDCA2D7AB7FDB599C28AA28662CBDD11396C469E95973507F2CB RomFS Hash: 0000000000000000000000000000000000000000000000000000000000000000 Saving RomFS... Extended header: Signature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dr RSA Modulus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ame: ssl Flag: 01 [compressed] Remaster version: 0009 Code text address: 0x00100000 Code text size: 0x00045CA8 Code text max pages: 0x00000046 (0x00046000) Code ro address: 0x00146000 Code ro size: 0x00006E50 Code ro max pages: 0x00000007 (0x00007000) Code data address: 0x0014D000 Code data size: 0x00009668 Code data max pages: 0x0000000A (0x0000A000) Code bss size: 0x00009E1C Code stack size: 0x00001000 Dependency: 0004013000002e02 Savedata size: 0x0 Jump id: 0004013000002f02 Program id: 0004013000002f02 (FAIL) Core version: 0x2 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 1 (GOOD) Affinity mask: 2 (GOOD) Main thread priority: 58 (GOOD) Ext savedata id: 0x0 System savedata id 1: 0x0 (GOOD) System savedata id 2: 0x0 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x1 (GOOD) > Category System Application Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: YES > Special memory: NO > Access Core 2: NO > Memory type: BASE Handle table size: 0x200 Allowed systemcalls: 0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B 0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30 0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A 0x3B, 0x3C, 0x3D, 0x47, 0x48, 0x4A, 0x4B, 0x4C 0x4D, 0x4E, 0x4F Allowed interrupts: none ARM9 Desc. version: 0x2 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: NO Service access: (GOOD) > soc:U > ps:ps > fs:USER Reslimit category: 03 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x0003ccd8 Section hash (GOOD): 73A77A8A25B6CDA07A5650BD53E4E11B85FD8F36CC31FDC45C18EF533371AEFA Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/2020-11-17_00-00-33-ctr/modules/ssl/v9217/00000013_exefs/code.bin...