i think i have the previously up sysnand image , but about the movable.sed i dont know where it save in the sd card?
The
movable.sed is a file that comes from the 3DS internal memory. It is not created on the SD card except when it's copied or dumped by either backing up the SysNAND *.bin image,
essential.exefs, or that individual file.
In GodMode9, this file is found at:
- [1:] SYSNAND CTRNAND/private/movable.sed
Only the
movable.sed with the correct 16 bytes
KeyY can decrypt whichever
Nintendo 3DS folder that *.sed was tied to.
if i find it can you provide em with faqs on how to do it ?
I'm reluctant to go into details helping with decrypting and backing up the
Nintendo 3DS folder. This type of data recovery is one of hardest 3DS issues to tackle per an individual case because of how many unknown factors there are and all the hoops one has to go through to get back stuff.
Even if you find the n3DSXL's
movable.sed, that doesn't guarantee it contains the intact
KeyY that matches set to the
Nintendo 3DS folder's 32-char
<ID0> subfolder.
You can run into the trouble that the
KeyY in the
movable.sed does not contain the
exact 16 bytes key. A (mostly) intact key can be corrected by brute forcing with the gm9 script,
CTRTransfer (Type D9) - Fix movable.sed KeyY.
Matters can be made worse if your n3DSXL was involved in a System Transfer where it received its
Nintendo 3DS folder from another 3DS/2DS; this makes it neigh impossible to find the correct key. * Last ditch effort would be recreating the
KeyY from scratch by finding someone who added your n3DSXL to their Friend's List, have that person (who has CFW) dump your Friend Code info that has the 1st half of the
KeyY using
seedstarter, and then bruteforce the 2nd half with
https://bruteforcemovable.com/.
Read up the ninfs thread in how to use that program. You'll need to install that with the accompanying
boot9.bin dumped from a 3DS, mount the NAND image, wait for the program to finish loading it, extract the
movable.sed from either the
essential.exefs or
ctrnand_full.img, (attempt) mounting the
Nintendo 3DS folder with said
movable.sed, copy the decrypted contents, backup the saves with 3ds-save-tool, and then search the TMD files of that decrypted copy in GodMode9 to rebuild into CIAs.