Thank you for the advice, although the system was already updated to 6.x, so it might not be possible to recover anymore. I was thinking, because someone else happened to have the same exact NAND dump size, it might be fine to try flashing it back to the system with D9? I think we could get the Xorpads first before flashing, though.The NAND dump should be redone, in any case. This looks very fishy. And yes, the GW MSET ROP with D9s Launcher.dat should be the best option to go from there.
1. Download the latest .zip of Decrypt9: https://github.com/d0k3/Decrypt9WIP/releaseswhat do you suggest ?
how to make the transaction you need ?
2. Copy Decrypt9WIP.dat to the root of your 3DS SD card. Then, rename it to "Launcher.dat"
3. Using your Blue Card, use Gateway's GW_INSTALLER.nds to install the 6.x DS Profile ROP exploit onto your system.
4. The system should try to shut off. Go ahead and shut it off.
5. Reboot, run System Settings, select Other Settings, select Profile, then select DS Profile.
Let me know if that gets you into Decrypt9's menu!