I was thinking... what you say is like the process i describe, after injecting fbi on the temporary 4gb sdcard. You would simply come from a previosly created emunand.



For keeping all your titles, states, and appearance, i think you should do the following:



* Check inside the "Nintendo 3DS" folder of both your 1st and Jap SD card, you will see two long-named folder inside each SD. One of them, has the same long name on both SDs. That name is obviously the ID of your sysNAND, that is the same in both cards. I guess you can discard that one on your Jap one, as you won't have anything important installed on sysNAND SD database apart from your exploit, that you have for sure, also in your 1st SD. The folder with the other id on your Jap card holds the database of your Jap emunand, so you should copy that one to the "Nintendo 3DS" folder of your main SD, where you should finally have 3 different long-named folders.



* Backup your Jap emunand (you can do it with 3DS MultiNand creator simply selecting emunand 1).



* Restore that emunand as emunand 2 on 3DS MultiNand creator.



And that's all i think!

Click to expand...