If you want to use NTR CFW's LayeredFS plugin with a game that has had it's code updated; like Super Smash Brothers, you will need to extract the exefs from the update. I will explain how this is done. Required Tools: Python Decrypt9 WIP ctrtool LayeredFS NTR CFW DevkitARM SD card reader FunkCIA2 Step 1: Find game TID Goto 3dsdb and search for the name of your game and copy the titleid of it somewhere, for example the TID of the US version of "Super Smash Brothers" is "00040000000EDF00". Step 2: Dump ticket.db Now we need to dump the tickets from your 3DS, so launch Decrypt9 WIP. Select "EmuNAND" or "SysNAND" options, depending on where the update is installed. The proceed to "File Dump" and select "ticket.db". Then press A, this might take a few moments to complete. When it is done power off your 3DS and copy "Decrypt9/ticket.db" to where you put FunkyCIA2. Step 3: Download the update Using the TID we found before, in this case "00040000000EDF00"; we need to change it slightly to get the update from FunkyCIA2. To figure out what the TID of the update is we need to replace the first eight digets of the TID to "0004000E", so Smash would be "0004000E000EDF00". Now open a terminal in the directory of FunkyCIA2 and execute "python FunkyCIA2.py ticket.db -title <TITLE ID>", for smash this would be "python FunkyCIA2.py ticket.db -title 0004000E000EDF00". Since the updates can be large this might take a while. Step 4: Decrypt the update Now that we have the update downloaded, we need to decrypt it. You need to copy the cia to your SD card, so copy the CIA from the CIA folder that FunkyCIA2 creates to "D9Game/". Then launch Decrypt9 again. Select "game Decryptor Options", then "CIA Decryptor (deep)". Again, this might take a while to complete. Now shutdown your 3DS. Step 5: Extract exefs Now copy the cia to a working directory on your computer. Then open a shell in the work dir and execute "ctrtool --content=content <TID>.cia", for Smash this would be "ctrtool --content=content 0004000e000edf00.cia". Then execute "ctrtool --exefs=exefs.bin <content>", where content is the larger content file, again for Smash this would be "ctrtool --exefs=exefs.bin content.0000.00000012". Step 6: Create plugin Replace the CTRTool that it has with the one you downloaded. Copy exefs.bin to "workdir" in the layeredFS directory, and open a shell. Execute "ctrtool --decompresscode -t exefs --exefsdir=workdir/exefs workdir/exefs.bin", then execute "python locate.py workdir/exefs/code.bin" and enter the path you want. If you want a sub-directory just separate the directory names with a forward-slash "/". Then press enter to disable language emulation. Execute "cd plugin", then set your PATH to include DevkitARM. On Windows this would be "set PATH=%PATH%;<devkit arm>", on my computer it is "set PATH=%PATH%;D:\devkitPro\devkitARM\bin". Now execute "python build.py", there should be a file called "layeredfs.plg" in the plugin directory. Step 7: Install plugin Create a directory in the root of your SD card called "plugin", and in there create a directory with the TID of your application, for Smash this is "00040000000EDF00". Copy layeredfs.plg into the directory with the TID. I recommend creating a text document in the plugin directory that lists the TIDs of the applications that you have plugins for. Step 8: Profit Please note: It is legal to share the layeredFS plugins, since they just use the code to find a few pointers in the exefs; this means that they do not use anything that is in the CIA.