Advertisement
Guest User

Untitled

a guest
Apr 12th, 2016
113
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.15 KB | None | 0 0
  1. Initializing SD card... success
  2. 0x03 KeyX & KeyY: already set up
  3. 0x05 KeyY: already set up
  4. 0x25 KeyX: already set up
  5. 0x18 KeyX: already set up
  6. 0x1B KeyX: not found
  7. Finalizing Initialization...
  8.  
  9. Initialization: partially failed
  10.  
  11. Using EmuNAND @ 3B0000/000000
  12. Searching title "Health&Safety (N3DS)"...
  13. Method 1: Search in title.db...
  14. Found title 0004001020022300
  15. TMD0 found at 1DB40000, size 2916b
  16. APP0 found at 1DB50000, size 1016kB
  17. APP1 found at 1DC50000, size 1884kB
  18. Use arrow keys and <A> to choose a name
  19. hs.app
  20. Dumping & decrypting APP0...
  21. Creating hs.app ...
  22. Code / Crypto: CTR-N-HACP / 7x
  23. Decrypt ExHdr/ExeFS/RomFS (2kB/780kB/0MB)
  24. Verify ExHdr/ExeFS/RomFS: OK/OK/OK
  25. Health&Safety Dump: succeeded!
  26.  
  27. Press B to return, START to reboot.
  28.  
  29. Unmounting SD card...
  30.  
  31. You selected "Health&Safety Inject".
  32. This feature writes to the EmuNAND.
  33. Doing this is potentially dangerous!
  34.  
  35. If you wish to proceed, enter:
  36. <Left>, <Right>, <Down>, <Up>, <A>
  37.  
  38. (B to return, START to reboot)
  39.  
  40. Using EmuNAND @ 3B0000/000000
  41. Searching title "Health&Safety (N3DS)"...
  42. Method 1: Search in title.db...
  43. Found title 0004001020022300
  44. TMD0 found at 1DB40000, size 2916b
  45. APP0 found at 1DB50000, size 1016kB
  46. APP1 found at 1DC50000, size 1884kB
  47. Use arrow keys and <A> to choose a file
  48. FBI_inject_with_banner.app
  49. Opening FBI_inject_with_banner.app ...
  50. Creating hs.enc ...
  51. Code / Crypto: CTR-N-HACP / 7x
  52. Encrypt ExHdr/ExeFS/RomFS (2kB/780kB/0MB)
  53. Injecting H&S app...
  54. Opening hs.enc ...
  55. Fixing TMD...
  56. Health&Safety Inject: succeeded!
  57.  
  58. Press B to return, START to reboot.
  59. Initializing SD card... success
  60. 0x03 KeyX & KeyY: automatically set up
  61. 0x05 KeyY: loaded, verified, set up
  62. 0x25 KeyX: loaded, verified, set up
  63. 0x18 KeyX: already set up
  64. 0x1B KeyX: loaded, verified, set up
  65. Finalizing Initialization...
  66.  
  67. Initialization: success!
  68. Initializing SD card... success
  69. 0x03 KeyX & KeyY: automatically set up
  70. 0x05 KeyY: loaded, verified, set up
  71. 0x25 KeyX: loaded, verified, set up
  72. 0x18 KeyX: already set up
  73. 0x1B KeyX: loaded, verified, set up
  74. Finalizing Initialization...
  75.  
  76. Initialization: success!
  77.  
  78. NAND type / size: N3DS / 1888MB
  79. Serial / region: QEF10029537 / EUR
  80. NAND CID: C16430A1180030454732303000011100
  81. TWL customer ID: 8B26130102000000
  82. SysNAND SD path <id0> / <id1>:
  83. 1EBFEFA9A649E37258418E85D92E3C22
  84. 134E0101478070E3534C363400035344
  85.  
  86. Running from arm9loaderhax: yes
  87. Keys set: 0x05Y 0x25X 0x18X 0x1BX
  88.  
  89. SD size hidden / total: 1891MB / 60906MB
  90. SD FAT free / total: 52390MB / 59006MB
  91. SD CID: 01014E13E370804734364C5344530300
  92. Installed EmuNAND: GW EmuNAND
  93.  
  94. System Info: succeeded!
  95.  
  96. Press B to return, START to reboot.
  97.  
  98. NAND type / size: N3DS / 1888MB
  99. Serial / region: QEF10029537 / EUR
  100. NAND CID: C16430A1180030454732303000011100
  101. TWL customer ID: 8B26130102000000
  102. SysNAND SD path <id0> / <id1>:
  103. 1EBFEFA9A649E37258418E85D92E3C22
  104. 134E0101478070E3534C363400035344
  105.  
  106. Running from arm9loaderhax: yes
  107. Keys set: 0x05Y 0x25X 0x18X 0x1BX
  108.  
  109. SD size hidden / total: 1891MB / 60906MB
  110. SD FAT free / total: 52390MB / 59006MB
  111. SD CID: 01014E13E370804734364C5344530300
  112. Installed EmuNAND: GW EmuNAND
  113.  
  114. System Info: succeeded!
  115.  
  116. Press B to return, START to reboot.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement