More actions
Template:Infobox-3DS-Homebrews
Here's simple program I made for easy 'SecureInfo_A' extraction/injection I want to share. With it you don't need to worry about cutting/XORing whole FAT16 partition every time, just select untouched encrypted 'NAND.BIN' along with corresponding 'nand.fat16.xorpad' and in few seconds job is done. �SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and 'Format System Memory' in System Settings. �Region Changing Steps: 1) Downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu �2) Download and install following system CIAs using 3DNUS for desired region:
Spoiler: 4.5.0-10J
0004001000020000 v3074 0004001000020100 v2051 0004001000020200 v2051 0004001000020300 v1024 0004001000020400 v2048 0004001000020500 v3072 0004001000020700 v1026 0004001000020800 v4096 0004001000020900 v6146 0004001000020a00 v2050 0004001000020b00 v1034 0004001000020d00 v1028 0004001000020e00 v1026 0004001000020f00 v1024 0004001000023000 v2048 0004001b00010702 v0 0004003000008202 v6146 0004003000008402 v1036 0004003000008602 v3072 0004003000008702 v2049 0004003000008802 v2050 0004003000008d02 v4099 0004003000008e02 v3075 000400300000c002 v2053 000400300000c003 v0 000400300000c102 v1026 000400300000c302 v1024 000400300000c402 v3 000400300000c502 v3074 000400300000c602 v2050 000400300000cd02 v1026 0004009b00010402 v3072 0004009b00010602 v2 0004009b00011902 v0 0004009b00012202 v4096 0004009b00013202 v0 0004009b00015202 v0 000400db00010302 v4096 000400db00010502 v6144 000400db00016202 v160 000400db00017202 v4176 0004013800000003 v5632 0004013800000102 v6704 0004800f484e4841 v8192
Spoiler: 4.5.0-10E
0004001000022000 v3075 0004001000022100 v2051 0004001000022200 v2054 0004001000022300 v2050 0004001000022400 v2048 0004001000022500 v3072 0004001000022700 v1026 0004001000022800 v4096 0004001000022900 v6146 0004001000022a00 v2050 0004001000022b00 v1034 0004001000022d00 v1028 0004001000022e00 v1026 0004001000022f00 v1024 0004001000025000 v2048 0004001b00010702 v0 0004003000009802 v6146 0004003000009902 v1036 0004003000009b02 v3072 0004003000009c02 v2049 0004003000009d02 v2050 0004003000009f02 v4099 000400300000a002 v3075 000400300000c502 v3074 000400300000cd02 v1026 000400300000d002 v2053 000400300000d003 v0 000400300000d102 v1026 000400300000d302 v1024 000400300000d402 v3 000400300000d602 v2050 0004009b00010402 v3072 0004009b00010602 v2 0004009b00011202 v0 0004009b00011302 v0 0004009b00011502 v0 0004009b00011702 v0 0004009b00011802 v0 0004009b00011b02 v0 0004009b00011c02 v0 0004009b00011d02 v0 0004009b00012102 v4096 0004009b00013102 v2049 0004009b00015102 v1024 000400db00010302 v4096 000400db00010502 v6144 000400db00016102 v160 000400db00017102 v4176 0004013800000002 v7712 0004013800000003 v5632 0004013800000102 v6704 0004800f484e4841 v8192
Spoiler: 4.5.0-10U
Nothing here yet, may add later.
3) Extract your emuNAND from SD card, inject into emuNAND target region 'SecureInfo_A' from donor system, insert emuNAND back to SD �4) Load emuNAND and perform 'Format System Memory/本体��期化' in System Settings