3DS NAND SecureInfo Tool

From GameBrew
Revision as of 07:13, 19 September 2021 by HydeWing (talk | contribs)

Template:Infobox-3DS-Homebrews

Here's simple program I made for easy 'SecureInfo_A' extraction/injection I want to share. With it you don't need to worry about cutting/XORing whole FAT16 partition every time, just select untouched encrypted 'NAND.BIN' along with corresponding 'nand.fat16.xorpad' and in few seconds job is done.

SecureInfo used for system region changing (JP/US/EU etc). Basically, you install few system CIA files for your target region (3DNUS/UpdateCDN), extract and inject new SecureInfo_A to emuNAND from target region donor, write emuNAND back and 'Format System Memory' in System Settings.

Region Changing Steps:

  1. Downgrade to 4.x FW and prepare 4.x emuNAND with DevMenu/BigBlueMenu
  2. Download and install following system CIAs using 3DNUS for desired region:

4.5.0-10J

  • 0004001000020000 v3074
  • 0004001000020100 v2051
  • 0004001000020200 v2051
  • 0004001000020300 v1024
  • 0004001000020400 v2048
  • 0004001000020500 v3072
  • 0004001000020700 v1026
  • 0004001000020800 v4096
  • 0004001000020900 v6146
  • 0004001000020a00 v2050
  • 0004001000020b00 v1034
  • 0004001000020d00 v1028
  • 0004001000020e00 v1026
  • 0004001000020f00 v1024
  • 0004001000023000 v2048
  • 0004001b00010702 v0
  • 0004003000008202 v6146
  • 0004003000008402 v1036
  • 0004003000008602 v3072
  • 0004003000008702 v2049
  • 0004003000008802 v2050
  • 0004003000008d02 v4099
  • 0004003000008e02 v3075
  • 000400300000c002 v2053
  • 000400300000c003 v0
  • 000400300000c102 v1026
  • 000400300000c302 v1024
  • 000400300000c402 v3
  • 000400300000c502 v3074
  • 000400300000c602 v2050
  • 000400300000cd02 v1026
  • 0004009b00010402 v3072
  • 0004009b00010602 v2
  • 0004009b00011902 v0
  • 0004009b00012202 v4096
  • 0004009b00013202 v0
  • 0004009b00015202 v0
  • 000400db00010302 v4096
  • 000400db00010502 v6144
  • 000400db00016202 v160
  • 000400db00017202 v4176
  • 0004013800000003 v5632
  • 0004013800000102 v6704
  • 0004800f484e4841 v8192

4.5.0-10E

  • 0004001000022000 v3075
  • 0004001000022100 v2051
  • 0004001000022200 v2054
  • 0004001000022300 v2050
  • 0004001000022400 v2048
  • 0004001000022500 v3072
  • 0004001000022700 v1026
  • 0004001000022800 v4096
  • 0004001000022900 v6146
  • 0004001000022a00 v2050
  • 0004001000022b00 v1034
  • 0004001000022d00 v1028
  • 0004001000022e00 v1026
  • 0004001000022f00 v1024
  • 0004001000025000 v2048
  • 0004001b00010702 v0
  • 0004003000009802 v6146
  • 0004003000009902 v1036
  • 0004003000009b02 v3072
  • 0004003000009c02 v2049
  • 0004003000009d02 v2050
  • 0004003000009f02 v4099
  • 000400300000a002 v3075
  • 000400300000c502 v3074
  • 000400300000cd02 v1026
  • 000400300000d002 v2053
  • 000400300000d003 v0
  • 000400300000d102 v1026
  • 000400300000d302 v1024
  • 000400300000d402 v3
  • 000400300000d602 v2050
  • 0004009b00010402 v3072
  • 0004009b00010602 v2
  • 0004009b00011202 v0
  • 0004009b00011302 v0
  • 0004009b00011502 v0
  • 0004009b00011702 v0
  • 0004009b00011802 v0
  • 0004009b00011b02 v0
  • 0004009b00011c02 v0
  • 0004009b00011d02 v0
  • 0004009b00012102 v4096
  • 0004009b00013102 v2049
  • 0004009b00015102 v1024
  • 000400db00010302 v4096
  • 000400db00010502 v6144
  • 000400db00016102 v160
  • 000400db00017102 v4176
  • 0004013800000002 v7712
  • 0004013800000003 v5632
  • 0004013800000102 v6704
  • 0004800f484e4841 v8192

4.5.0-10U

  • Nothing here yet, may add later.
  1. 3Extract your emuNAND from SD card, inject into emuNAND target region 'SecureInfo_A' from donor system, insert emuNAND back to SD
  2. Load emuNAND and perform 'Format System Memory/本体の初期化' in System Settings

Advertising: