NCCH: Header: NCCH Signature (GOOD): B405B700E7E1DC70D8ACFE3FF9812669F86FDE3B3EB4B630080CFC7870E19F6F C2AB9CC3DADDED5408C52ED510FEA20AAAA73E581EC6255A93400D2DFB3441AB 3EDEE878ABB6E41A2E1B32162B5EFF48BAF9915C370FF70334229BC8BDE0308B 1493B2A4E43CA412CF42E2DE10E119954E156662082DA29C55DB92E1FDAAB6F6 99351C5E861D35C76C2537C3E11514814679775ADE1A80E609FBAD381949CB49 845B73F0539261393D913D387045F3EC79036F1DBF8E6786E56B914FD407C5B3 D6EDF47E2AA4BB7A20E2CE3E6385CE69861AFCD8DD8CF2D49E0762558E38D4E0 D39E29D3194758E835E097F0534DB2C3F52EC90D4A86B3D34F4151BBB9CDB169 Content size: 0x0003c800 Partition id: 0004013000002f03 Maker code: 00 Version: 2 Title seed check: 00000000 Program id: 0004013000002f03 Logo hash: 0000000000000000000000000000000000000000000000000000000000000000 Product code: 0127pseg-ciuser Exheader size: 00000400 Exheader hash (GOOD): A6A5A918424F56E1019B566F9EE76BAB3DB1314344B6FCE1F216F74A52795C63 Flags: 0200020100000000 > Mediaunit size: 0x200 > Crypto key: Secure (0) > Form type: Executable content without RomFS > Content type: Application > Content platform: CTR > No RomFS mount Plain region offset: 0x00000a00 Plain region size: 0x00000200 Logo offset: 0x00000000 Logo size: 0x00000000 ExeFS offset: 0x00000c00 ExeFS size: 0x0003bc00 ExeFS hash region size: 0x00000200 RomFS offset: 0x00000000 RomFS size: 0x00000000 RomFS hash region size: 0x00000000 ExeFS Hash (GOOD): 3C35F316BF9572C4A25922021011514D5C9C7A7898639593C2C9DACB67DEB3A1 RomFS Hash: 0000000000000000000000000000000000000000000000000000000000000000 Saving RomFS... Extended header: Signature (GOOD): 55A84B3210AD4E0D070B51910BD55DDB866DBC63EAA286A84403A7504C0E9469 1C861B01A145C1CBF35662E91047F21F284FBD105B40D9E10D4A7AFBC08A07A6 1149422038D6292C156E75EE8E9346737582079FD5FFD6E3BB72AAE8DDF63F4B 7652E3088850FE7489ABC01A6424D457B888E02E3503A3C93CDC03A7A8E90EE8 0441F12ADB4FE7F65AAADEC4CF2FD0EF03195DBBECF085CF7AC5A267450E6596 B0F8EEDEDCEF6463151E3DA160C257B44C9F1970D61EC47C4B63792FE9D6FC34 6D79E43FD22C4FAFE88EE655769816C3711A7C0507DDA375B3FBEF82D722EC8B FD5E0AF4A5615BF6000800E474EC374ED656858EBC7F28A9063293B740034E35 NCCH Hdr RSA Modulus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ame: ssl Flag: 01 [compressed] Remaster version: 0001 Code text address: 0x00100000 Code text size: 0x00044A98 Code text max pages: 0x00000045 (0x00045000) Code ro address: 0x00145000 Code ro size: 0x00007068 Code ro max pages: 0x00000008 (0x00008000) Code data address: 0x0014D000 Code data size: 0x00009050 Code data max pages: 0x0000000A (0x0000A000) Code bss size: 0x00003678 Code stack size: 0x00001000 Dependency: 0004013000002e03 Savedata size: 0x0 Jump id: 0004013000002f03 Program id: 0004013000002f03 (GOOD) Core version: 0x3 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 1 (GOOD) Affinity mask: 2 (GOOD) Main thread priority: 50 (GOOD) Ext savedata id: 0x0 System savedata id 1: 0x0 (GOOD) System savedata id 2: 0x0 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x1 (GOOD) > Category System Application Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: YES > Special memory: NO > Access Core 2: NO > Memory type: BASE Handle table size: 0x200 Allowed systemcalls: 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 0x10 0x11, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20, 0x21 0x22, 0x23, 0x24, 0x25, 0x27, 0x28, 0x29, 0x2A 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30, 0x31, 0x32 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A, 0x3B, 0x3C 0x3D, 0x47, 0x48, 0x4A, 0x4B, 0x4C, 0x4D, 0x4E 0x4F Allowed interrupts: none ARM9 Desc. version: 0x2 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: NO Service access: (GOOD) > soc:U > soc:P > ps:ps > fs:USER Reslimit category: 03 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x0003b8ac Section hash (GOOD): 7095C112CAD7A413926AC77F34D955F7C4BE204F739818FF5F531AFFA4943417 Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/2021-07-27_00-00-33-ctr/modules/safemode_modules/ssl/v1024/00000001_exefs/code.bin...