NCCH: Header: NCCH Signature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ontent size: 0x00226000 Partition id: 0004001000020000 Maker code: 01 Version: 2 Title seed check: 00000000 Program id: 0004001000020000 Logo hash (GOOD): 2A98C49D919E254E15DC213CAB47A800ED63B248DCD43119E8FB82D9E62AE51C Product code: CTR-N-HASJ Exheader size: 00000400 Exheader hash (GOOD): DF70E27CD504B6CA8D7713CE888A8A6809A81637E6DF30DAD35B0AAA614897CB Flags: 0000030101000000 > Mediaunit size: 0x200 > Crypto key: Secure (1) > Form type: Executable content > Content type: Application > Content platform: CTR Plain region offset: 0x00002a00 Plain region size: 0x00000200 Logo offset: 0x00000a00 Logo size: 0x00002000 ExeFS offset: 0x00002c00 ExeFS size: 0x0012a800 ExeFS hash region size: 0x00000200 RomFS offset: 0x0012e000 RomFS size: 0x000f8000 RomFS hash region size: 0x00000200 ExeFS Hash (GOOD): 37B26B5B134160EE01EDFEFCAA3714B57EF3921E254BEDF63E4313F6A4B29413 RomFS Hash (GOOD): 156E77146951473AFD073B85FE8A006C6AC65FA2ED3C8F7952CD6DCA0C2249DF Saving RomFS... Extended header: Signature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dr RSA Modulus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ame: mset Flag: 01 [compressed] Remaster version: 000C Code text address: 0x00100000 Code text size: 0x001696E8 Code text max pages: 0x0000016A (0x0016A000) Code ro address: 0x0026A000 Code ro size: 0x000284F0 Code ro max pages: 0x00000029 (0x00029000) Code data address: 0x00293000 Code data size: 0x00017C00 Code data max pages: 0x00000018 (0x00018000) Code bss size: 0x004EB0A0 Code stack size: 0x00004000 Dependency: 0004013000001702 Dependency: 0004013000001b02 Dependency: 0004013000001e02 Dependency: 0004013000001f02 Dependency: 0004013000002102 Dependency: 0004013000002202 Dependency: 0004013000002302 Savedata size: 0x0 Jump id: 0004001000020000 Program id: 0004001000020000 (GOOD) Core version: 0x2 System mode: 64MB (GOOD) System mode (New3DS): 64MB (GOOD) CPU Speed (New3DS): 268MHz (GOOD) Enable L2 Cache: NO (GOOD) Ideal processor: 0 (GOOD) Affinity mask: 1 (GOOD) Main thread priority: 48 (GOOD) Ext savedata id: 0x200 System savedata id 1: 0x20082 (GOOD) System savedata id 2: 0x20200 (GOOD) OtherUserSaveDataId1: 0x0 OtherUserSaveDataId2: 0x0 OtherUserSaveDataId3: 0x0 Accessible Savedata Ids: Other Variation Saves: Inaccessible Access info: 0x1081 (GOOD) > Category System Application > Direct SDMC > Category System Settings Mapping static address: 0x1FF50000 (RW) Mapping static address: 0x1FF58000 (RW) Mapping static address: 0x1FF70000 (RW) Mapping static address: 0x1FF78000 (RW) Mapping static address: 0x1F000000 (RO) Mapping static address: 0x1F600000 (RO) Kernel flags: > Allow debug: NO > Force debug: NO > Allow non-alphanum: NO > Shared page writing: NO > Privilege priority: NO > Allow main() args: NO > Shared device mem: NO > Runnable on sleep: NO > Special memory: NO > Access Core 2: NO > Memory type: APPLICATION Handle table size: 0x200 Kernel release version: 2.50 Allowed systemcalls: 0x01, 0x02, 0x03, 0x06, 0x08, 0x09, 0x0A, 0x0B 0x0C, 0x0F, 0x11, 0x13, 0x14, 0x15, 0x16, 0x17 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x27, 0x28 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30 0x31, 0x32, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A 0x3B, 0x3C, 0x3D Allowed interrupts: none ARM9 Desc. version: 0x3 Mount NAND fs: NO Mount NAND RO write fs: NO Mount NAND TWL fs: NO Mount NAND W fs: NO Mount CARD SPI fs: NO Use SDIF3: NO Create seed: NO Use CARD SPI: NO SD Application: NO Use Direct SDMC: YES Service access: (GOOD) > fs:USER > gsp::Gpu > ndm:u > APT:A > ac:i > act:a > am:sys > boss:P > cam:s > cecd:s > cfg:nor > dsp::DSP > frd:a > gsp::Lcd > http:C > mic:u > news:s > nim:u > ns:s > nwm::EXT > nwm::INF > nwm::SOC > ptm:gets > ptm:sysm > soc:P > soc:U > ssl:C > y2r:u > qtm:s > cfg:i > hid:SPVR Reslimit category: 00 ExeFS: Section name: .code Section offset: 0x00000200 Section size: 0x000fdf24 Section hash (GOOD): 0C8956B981CFD425AAE78E6A56BCC6C71C4BB997DF017D4FFF0F7AB624283388 Section name: banner Section offset: 0x000fe200 Section size: 0x00028db0 Section hash (GOOD): 9F711C76DCB63B36EDE3E374A16E1B52CDFD04D936547A1ADD1360700D111B41 Section name: icon Section offset: 0x00127000 Section size: 0x000036c0 Section hash (GOOD): 2AD4EEC17131A1EF4C46BB83CC5955DD0BC30634852B581BA49D2F799472FDA3 Decompressing section .code to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/2023-05-23_00-00-41-ktr/mset/JPN/v12289/0000004f_exefs/code.bin... Saving section banner to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/2023-05-23_00-00-41-ktr/mset/JPN/v12289/0000004f_exefs/banner.bin... Saving section icon to /home/yellows8/ninupdates/sysupdatedl/autodl_sysupdates/2023-05-23_00-00-41-ktr/mset/JPN/v12289/0000004f_exefs/icon.bin... IVFC: Header: IVFC Id: 00010000 Level 0 (GOOD): Data offset: 0x00223000 Data size: 0x00001000 Hash offset: 0x0012e060 Hash block size: 0x00001000 Level 1 (GOOD): Data offset: 0x00224000 Data size: 0x00002000 Hash offset: 0x00223000 Hash block size: 0x00001000 Level 2 (GOOD): Data offset: 0x0012f000 Data size: 0x000f4000 Hash offset: 0x00224000 Hash block size: 0x00001000 RomFS: Header size: 0x00000028 Section 0 offset: 0x0012F028 Section 0 size: 0x0000001C Section 1 offset: 0x0012F044 Section 1 size: 0x000000D0 Section 2 offset: 0x0012F114 Section 2 size: 0x0000005C Section 3 offset: 0x0012F170 Section 3 size: 0x0000052C Data offset: 0x0012F6A0