More actions
No edit summary |
m (Text replacement - "image = https://dlhb.gamebrew.org/3dshomebrew/" to "image = ") |
||
Line 1: | Line 1: | ||
{{Infobox-3DS-Homebrews | {{Infobox-3DS-Homebrews | ||
| title = 3DS NAND SecureInfo Tool | | title = 3DS NAND SecureInfo Tool | ||
| image = | | image = 3DSNANDSecureInfoTool.jpg|250px | ||
| type = PC Utilities | | type = PC Utilities | ||
| version=v15 | | version=v15 |
Revision as of 00:34, 20 October 2021
Template:Infobox-3DS-Homebrews
Here's simple program I made for easy 'SecureInfo_A' extraction/injection I want to share. With it you don't need to worry about cutting/XORing whole FAT16 partition every time, just select untouched encrypted 'NAND.BIN' along with corresponding 'nand.fat16.xorpad' and in few seconds job is done.
SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and 'Format System Memory' in System Settings.
Region Changing Steps:
- Downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu
- Download and install following system CIAs using 3DNUS for desired region:
4.5.0-10J
- 0004001000020000 v3074
- 0004001000020100 v2051
- 0004001000020200 v2051
- 0004001000020300 v1024
- 0004001000020400 v2048
- 0004001000020500 v3072
- 0004001000020700 v1026
- 0004001000020800 v4096
- 0004001000020900 v6146
- 0004001000020a00 v2050
- 0004001000020b00 v1034
- 0004001000020d00 v1028
- 0004001000020e00 v1026
- 0004001000020f00 v1024
- 0004001000023000 v2048
- 0004001b00010702 v0
- 0004003000008202 v6146
- 0004003000008402 v1036
- 0004003000008602 v3072
- 0004003000008702 v2049
- 0004003000008802 v2050
- 0004003000008d02 v4099
- 0004003000008e02 v3075
- 000400300000c002 v2053
- 000400300000c003 v0
- 000400300000c102 v1026
- 000400300000c302 v1024
- 000400300000c402 v3
- 000400300000c502 v3074
- 000400300000c602 v2050
- 000400300000cd02 v1026
- 0004009b00010402 v3072
- 0004009b00010602 v2
- 0004009b00011902 v0
- 0004009b00012202 v4096
- 0004009b00013202 v0
- 0004009b00015202 v0
- 000400db00010302 v4096
- 000400db00010502 v6144
- 000400db00016202 v160
- 000400db00017202 v4176
- 0004013800000003 v5632
- 0004013800000102 v6704
- 0004800f484e4841 v8192
4.5.0-10E
- 0004001000022000 v3075
- 0004001000022100 v2051
- 0004001000022200 v2054
- 0004001000022300 v2050
- 0004001000022400 v2048
- 0004001000022500 v3072
- 0004001000022700 v1026
- 0004001000022800 v4096
- 0004001000022900 v6146
- 0004001000022a00 v2050
- 0004001000022b00 v1034
- 0004001000022d00 v1028
- 0004001000022e00 v1026
- 0004001000022f00 v1024
- 0004001000025000 v2048
- 0004001b00010702 v0
- 0004003000009802 v6146
- 0004003000009902 v1036
- 0004003000009b02 v3072
- 0004003000009c02 v2049
- 0004003000009d02 v2050
- 0004003000009f02 v4099
- 000400300000a002 v3075
- 000400300000c502 v3074
- 000400300000cd02 v1026
- 000400300000d002 v2053
- 000400300000d003 v0
- 000400300000d102 v1026
- 000400300000d302 v1024
- 000400300000d402 v3
- 000400300000d602 v2050
- 0004009b00010402 v3072
- 0004009b00010602 v2
- 0004009b00011202 v0
- 0004009b00011302 v0
- 0004009b00011502 v0
- 0004009b00011702 v0
- 0004009b00011802 v0
- 0004009b00011b02 v0
- 0004009b00011c02 v0
- 0004009b00011d02 v0
- 0004009b00012102 v4096
- 0004009b00013102 v2049
- 0004009b00015102 v1024
- 000400db00010302 v4096
- 000400db00010502 v6144
- 000400db00016102 v160
- 000400db00017102 v4176
- 0004013800000002 v7712
- 0004013800000003 v5632
- 0004013800000102 v6704
- 0004800f484e4841 v8192
4.5.0-10U
- Nothing here yet, may add later.
- 3Extract your emuNAND from SD card, inject into emuNAND target region 'SecureInfo_A' from donor system, insert emuNAND back to SD
- Load emuNAND and perform 'Format System Memory/本体の初期化' in System Settings