# Pastebin SfsLwHWS OLD METHOD - MAY NOT WORK Prep Work 0. Backup SysNAND and EmuNAND with unmodified decrypt9, then backup SD card 1. Create EmuNAND Partition on SD card 2. Using unmodified decrypt9, dump the SysNAND then flash it to EmuNAND 3. Format EmuNAND with tinyformat (to unlink nands and prevent brick!), then downgrade to 2.1 4. Use unmodified decrypt9, dump broken emunand 5. Use unmodified decrypt9, dump the 0x05 xorpad 6. Use modified decrypt9, dump the 0x04 xorpad 7. On PC, use 3DSFat16Tool to dump CTR NAND from EmuNAND.bin with 0x05 xorpad 8. Use 3DSFat16Tool to inject CTR NAND into EmuNAND.bin with 0x04 xorpad 9. Replace the first 0x200 bytes of EmuNAND.bin with the NCSD header (first 0x200 bytes) from an o3DS 10. Flash the EmuNAND. bin to SysNAND 11. Hope it boots --- It didn't (brick, reason ~~unknown~~. Reason now known, latest version of 3DSFat16Tool incompatible with method, probably caused by auto detection of new or old 3ds) 12a. Possible memdump: http://dukesrg.no-ip.org/3ds/rop/?memdump.dat&OTP.bin&9A8:00200110&9AD:00210110 - Research needed! http://imgur.com/GAadHYP 12b. Gateway launcher from http://dukesrg.no-ip.org/3ds/ - possible CN install? 13. Create a blank file on the SD card named OTP.bin, then use CN and the payload (load.bin and code.bin on SD card root) to dump the OTP (0x10012000 to 0x10012100) with the QR code 14. COPY TO ALL THE BACKUPS 15. Upgrade to 9.2 using Smash Bros Cart 16. Use CN to get HB launcher 17. Run SysUpdater to install 9.2 and fix network services (Probably Unnecessary) 18. Use unmodified decrypt9 to restore original SysNAND, EmuNAND, then SD card files [WIP, probably won't work] https://mega.nz/#!2RUyFJ4b!4j1P9Obt8utwZhMwMon3iwlIMXlHw0SRAfVrto8y3Ro https://mega.nz/#!SNEl3boQ!y4pSniu50498hDxeArsU-r8DkrL6NrUiiqEgz3MfHH4 1.0 QR code : https://i.imgur.com/7Q35Tuy.png 1.1 QR code : http://i.imgur.com/XfdtO8f.png 2.1 QR code : http://i.imgur.com/HLteE39.png https://mega.nz/#!8sdTiSSZ!BRY6MCCSsYV3gml3r2yKZIzeWgIW7-g_R5rrqqEFxyA