How to convert to text the Chrome cache gzipped data? - google-chrome

I was overwrite my CSS file, but the original is in my mobile's Chrome cache. I found the file in cache, but if I opened the link in the cache list I see something like this:
HTTP/1.1 200 OK
Date: Sat, 25 Jul 2015 16:58:50 GMT
Server: Apache
Vary: Host,Accept-Encoding
Last-Modified: Fri, 17 Jul 2015 10:51:25 GMT
ETag: "14ff-51b0ff82ba5ad-gzip"
Accept-Ranges: bytes
Content-Encoding: gzip
Content-Length: 1483
Content-Type: text/css
00000000: 48 01 00 00 03 08 04 00 87 ec 5a 51 4c 7a 2e 00 H.........ZQLz..
00000010: 18 97 5c 51 4c 7a 2e 00 04 01 00 00 48 54 54 50 ..\QLz......HTTP
00000020: 2f 31 2e 31 20 32 30 30 20 4f 4b 00 44 61 74 65 /1.1 200 OK.Date
00000030: 3a 20 53 61 74 2c 20 32 35 20 4a 75 6c 20 32 30 : Sat, 25 Jul 20
00000040: 31 35 20 31 36 3a 35 38 3a 35 30 20 47 4d 54 00 15 16:58:50 GMT.
How can I convert this back to a CSS text file?

Related

Unknown compression method

Can someone explain me, what is that compression method used?
I tried to reverse engeneer old application. It using tcp connection and send messages using json.
All data was the plain json, but that data is json value "pb_rsp" was binary and i cant uncompress that.
120113837000265, Xanthus, EliteDog, flag30, 574949063200274 - thats a plain data. Around them some unknown separators.
I think thats encoded json, but cant detect method, help please
�
9181129d4be64c36ad42401c8227226f��
"Z
120113837000265Xanthus *8
84860c8bfafb48b1b6ef8b595fcf6246EEDEliteDog"flag30�(��0#H����0P�����0X�����0`j�
574949063200274Z
120113837000265Xanthus *8
84860c8bfafb48b1b6ef8b595fcf6246EEDEliteDog"flag30� �����0(�����02�(0#ZJ
107107ddR
or hex
1A D5 02 0A 0F 35 37 35 30 33 30 39 37 36 39 30 30 32 37 34 10 3F 1A 58 0A 0F 31 36 37 38 34 37 30 37 35 30 30 30 32 37 34 12 05 41 6B 61 72 64 20 09 2A 38 0A 20 38 34 38 36 30 63 38 62 66 61 66 62 34 38 62 31 62 36 65 66 38 62 35 39 35 66 63 66 36 32 34 36 12 03 45 45 44 1A 08 45 6C 69 74 65 44 6F 67 22 05 66 6C 61 67 33 30 EB A7 12 2A 39 0A 1C 77 6F 72 6C 64 52 6F 62 6F 74 2D 31 36 37 31 34 37 32 38 35 30 31 34 38 2D 33 33 39 12 0A 41 6E 6F 6E 79 6D 6F 75 73 31 1A 0D 70 69 63 5F 31 32 5F 5A 68 75 6A 75 65 38 97 91 A4 EF D2 30 40 CF C5 C4 EF D2 30 48 01 50 9B E1 1C 5A 27 08 98 11 28 01 30 0E 40 50 4A 0C 0A 06 31 30 37 30 30 38 10 5A 18 5A 4A 0C 0A 06 31 30 37 30 30 39 10 0A 18 0A 52 00 5A 19 08 E0 12 28 02 30 0E 40 50 4A 0C 0A 06 31 30 37 30 30 38 10 64 18 64 52 00 5A 19 08 EB 12 28 05 30 0E 40 64 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 5A 19 08 E1 12 28 04 30 0E 40 64 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 5A 19 08 99 11 28 03 30 0E 40 64 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 60 AA F9 0F 1A C7 02 0A 0F 35 37 35 30 33 31 30 32 38 30 30 30 32 37 34 10 3F 1A 58 0A 0F 31 36 37 38 34 37 30 37 35 30 30 30 32 37 34 12 05 41 6B 61 72 64 20 09 2A 38 0A 20 38 34 38 36 30 63 38 62 66 61 66 62 34 38 62 31 62 36 65 66 38 62 35 39 35 66 63 66 36 32 34 36 12 03 45 45 44 1A 08 45 6C 69 74 65 44 6F 67 22 05 66 6C 61 67 33 30 EB A7 12 2A 39 0A 1C 77 6F 72 6C 64 52 6F 62 6F 74 2D 31 36 37 31 34 37 32 38 35 30 31 34 38 2D 33 33 39 12 0A 41 6E 6F 6E 79 6D 6F 75 73 31 1A 0D 70 69 63 5F 31 32 5F 5A 68 75 6A 75 65 38 A1 A6 A4 EF D2 30 40 D9 DA C4 EF D2 30 48 01 50 9B E1 1C 5A 19 08 B4 10 28 01 30 0E 40 46 4A 0C 0A 06 31 30 37 30 30 38 10 64 18 64 52 00 5A 19 08 BF 10 28 02 30 0D 40 5F 4A 0C 0A 06 31 30 37 30 30 38 10 64 18 64 52 00 5A 19 08 B5 10 28 05 30 0E 40 5F 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 5A 19 08 BE 10 28 04 30 0E 40 5F 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 5A 19 08 C1 10 28 03 30 0E 40 5F 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 60 AA F9 0F 1A C7 02 0A 0F 35 37 35 30 33 31 31 35 34 37 30 30 32 37 34 10 3F 1A 58 0A 0F 31 36 37 38 34 37 30 37 35 30 30 30 32 37 34 12 05 41 6B 61 72 64 20 09 2A 38 0A 20 38 34 38 36 30 63 38 62 66 61 66 62 34 38 62 31 62 36 65 66 38 62 35 39 35 66 63 66 36 32 34 36 12 03 45 45 44 1A 08 45 6C 69 74 65 44 6F 67 22 05 66 6C 61 67 33 30 EB A7 12 2A 39 0A 1C 77 6F 72 6C 64 52 6F 62 6F 74 2D 31 36 37 31 34 37 32 38 35 30 31 34 38 2D 33 33 39 12 0A 41 6E 6F 6E 79 6D 6F 75 73 31 1A 0D 70 69 63 5F 31 32 5F 5A 68 75 6A 75 65 38 E3 B6 A4 EF D2 30 40 9B EB C4 EF D2 30 48 01 50 9B E1 1C 5A 19 08 FD 11 28 03 30 0E 40 46 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 5A 19 08 FC 11 28 01 30 0E 40 46 4A 0C 0A 06 31 30 37 30 30 38 10 64 18 64 52 00 5A 19 08 86 12 28 04 30 0D 40 5A 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 5A 19 08 FE 11 28 05 30 0E 40 46 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 5A 19 08 81 12 28 02 30 0E 40 46 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 60 AA F9 0F 1A D5 02 0A 0F 35 37 35 30 33 31 32 30 34 34 30 30 32 37 34 10 3F 1A 58 0A 0F 31 36 37 38 34 37 30 37 35 30 30 30 32 37 34 12 05 41 6B 61 72 64 20 09 2A 38 0A 20 38 34 38 36 30 63 38 62 66 61 66 62 34 38 62 31 62 36 65 66 38 62 35 39 35 66 63 66 36 32 34 36 12 03 45 45 44 1A 08 45 6C 69 74 65 44 6F 67 22 05 66 6C 61 67 33 30 EB A7 12 2A 39 0A 1C 77 6F 72 6C 64 52 6F 62 6F 74 2D 31 36 37 31 34 37 32 38 35 30 31 34 38 2D 33 33 39 12 0A 41 6E 6F 6E 79 6D 6F 75 73 31 1A 0D 70 69 63 5F 31 32 5F 5A 68 75 6A 75 65 38 86 C6 A4 EF D2 30 40 BE FA C4 EF D2 30 48 01 50 9B E1 1C 5A 27 08 A2 11 28 01 30 0E 40 3C 4A 0C 0A 06 31 30 37 30 30 38 10 63 18 63 4A 0C 0A 06 31 30 37 30 30 39 10 01 18 01 52 00 5A 19 08 E4 12 28 02 30 0E 40 41 4A 0C 0A 06 31 30 37 30 30 38 10 64 18 64 52 00 5A 19 08 E2 12 28 05 30 0E 40 46 4A 0C 0A 06 31 30 37 32 30 38 10 64 18 64 52 00 5A 19 08 E5 12 28 04 30 0E 40 46 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 5A 19 08 EC 12 28 03 30 0E 40 55 4A 0C 0A 06 31 30 37 31 30 38 10 64 18 64 52 00 60 AA F9 0F
or base64
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
Thanks
Thats not a gzip or zip

When getting a hexadecimal dump in VS, what do those periods mean?

For example:
%PDF-1.3..%.....
...1 0 obj..<<..
from
25 50 44 46 2D 31 2E 33 0D 0A 25 E2 E3 CF D3 0D
0A 0D 0A 31 20 30 20 6F 62 6A 0D 0A 3C 3C 0D 0A
Do they represent numbers that don't fit in ASCII?

Converting a hexdump back to a rar

I have a plaintext file that I wish to convert to something I can extract.
00000000 52 61 72 21 1a 07 01 00 f3 e1 82 eb 0b 01 05 07 |Rar!............|
00000010 00 06 01 01 80 80 80 00 3b fd 42 9f 51 02 03 31 |........;.B.Q..1|
00000020 a0 02 06 82 03 80 83 02 20 15 d4 6e 5b 46 b6 57 |........ ..n[F.W|
00000030 80 03 01 09 69 6e 73 74 72 2e 74 78 74 30 01 00 |....instr.txt0..|
00000040 03 0f 44 a5 ce af b3 09 b9 96 44 22 f4 99 ef 04 |..D.......D"....|
This is part of the file which made me believe it is a rar file. I tried using xxd with the -r option to no avail.
I tried the solution from here but it also didn't work.
Any ideas?
To solve my own question, and for future reference.
Use vim's visual block select to copy just the hex values into 'justhexvalues.txt'.
Then use xxd:
xxd -r -p justhexvalues.txt answer.rar
That was it.

MasterCard Generate AC

I tried to process payment with MasterCard / MIR.
I do read data from VISA successfully after send PDOL, but MS does not requires PDOL.
1st step in transaction:
Select 2PAY.SYS
[SEND] : 00 A4 04 00 0E 32 50 41 59 2E 53 59 53 2E 44 44 46 30 31 00
[READ] : 6F 23 84 0E 32 50 41 59 2E 53 59 53 2E 44 44 46 30 31 A5 11
BF 0C 0E 61 0C 4F 07 A0 00 00 00 04 10 10 87 01 01 90 00
2nd step:
[SEND] : 00 A4 04 00 07 A0 00 00 00 04 10 10 00
F
[READ] : 6F 44 84 07 A0 00 00 00 04 10 10 A5 39 50 0A 4D 41 53 54 45 52 43 41 52 44 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D 41 53 54 45 52 43 41 52 44 BF 0C 0F 9F 4D 02 0B 0A 9F 6E 07 06 43 00 00 30 30 00 90 00
Card does not requres PDOL
3rd step:
[SEND] : 80 A8 00 00 02 83 00 00
[READ] : 77 16 82 02 19 80 94 10 08 01 01 00 10 01 01 01 18 01 02 00 20 01 02 00 90 00
Recieved Application File Locator (AFL)
Step 4:
Read all available data.
[SEND] : 00 B2 01 0C 00
and other sectors
I red all sectors. But there are not tags requires for payment: 9F26 - Application Cryptogram, 9F37 - Unpredictable Number, 9F36 - Transatcion Counter.
To get this tags I could make command Generate AC with CDOL, but how to generate CDOL?
Card says about CDOL1 and CDOL2. And CDOL1 requires tags that card generate itself.
Card answers, contains CDOL1 and CDOL2:
70 81 A0 57 13 55 45 46 77 77 25 42 79 D2 01 12 01 58 11 10 00 00 79 0F 5A 08 55 45 46 77 77 25 42 79 5F 24 03 20 11 30 5F 25 03 17 11 01 5F 28 02 06 43 5F 34 01 01 8C 21 9F 02 06 9F 03 06 9F 1A 02 95 05 5F 2A 02 9A 03 9C 01 9F 37 04 9F 35 01 9F 45 02 9F 4C 08 9F 34 03 8D 0C 91 0A 8A 02 95 05 9F 37 04 9F 4C 08 8E 0E 00 00 00 00 00 00 00 00 42 03 1E 03 1F 03 9F 07 02 3D 00 9F 08 02 00 02 9F 0D 05 B4 50 84 00 00 9F 0E 05 00 00 00 00 00 9F 0F 05 B4 70 84 80 00 9F 42 02 06 43 9F 4A 01 82 90 00
How generate offline limit transaction using paypass? How to do Generate AC?
Thank you!
CDOL1 and CDOL2 splits like below. Tag and its lengths. You are supposed to provide the data alone in the same order and size as you would for PDOL. In the below case, apart from two towards the bottom, rest all are available in the terminal ready to use.
CDOL1
9F02 06 //transaction amount
9F03 06 //other amount, cashback
9F1A 02 //termial country
95 05 //TVR terminal has arrived after terminal risk management
5F2A 02 //currency code
9A 03 //Transaction date
9C 01 //transaction type
9F37 04 //unpredictable number
9F35 01 //terminal type
9F45 02 //data Authentication code from Transaction Related Data ODA
9F4C 08 //icc dynamic number from Transaction Related Data ODA
9F34 03 //cvm results
CDOL2
91 0A //issuer authentication data
8A 02 //ARC
95 05 //TVR
9F37 04 //unpredictable number
9F4C 08 //icc dynamic number
9F26 and 9F36 will be returned by the card in response to your GEN AC.
9F37 is generated by the terminal.

How to convert BLOB object to PL Json

i am using below code to load image file from server to BLOB Object
but after convert it to clob and put it into json it reformatted.
how can i fix this
FUNCTION get_person_image(v_file_name varchar2) RETURN json AS
tmp_blob blob default EMPTY_BLOB();
tmp_bfile bfile := null;
dest_offset integer := 1;
src_offset integer := 1;
v_ret_json json := json();
BEGIN
tmp_bfile := BFILENAME('PICTURES', v_file_name);
DBMS_LOB.OPEN(tmp_bfile, DBMS_LOB.FILE_READONLY);
DBMS_LOB.CREATETEMPORARY(tmp_blob, TRUE);
DBMS_LOB.LOADBLOBFROMFILE(tmp_blob,
tmp_bfile,
DBMS_LOB.LOBMAXSIZE,
dest_offset,
src_offset);
DBMS_LOB.CLOSE(tmp_bfile);
v_ret_json.put('name', v_file_name);
v_ret_json.put('image', blob_to_clob(tmp_blob));
RETURN v_ret_json;
END get_person_image;
FUNCTION blob_to_clob(blob_in IN BLOB) RETURN CLOB AS
v_clob CLOB;
v_varchar VARCHAR2(32767);
v_start PLS_INTEGER := 1;
v_buffer PLS_INTEGER := 32767;
begin
DBMS_LOB.CREATETEMPORARY(v_clob, TRUE);
FOR i IN 1 .. CEIL(DBMS_LOB.GETLENGTH(blob_in) / v_buffer) LOOP
v_varchar := UTL_RAW.CAST_TO_VARCHAR2(DBMS_LOB.SUBSTR(blob_in,
v_buffer,
v_start));
DBMS_LOB.WRITEAPPEND(v_clob, LENGTH(v_varchar), v_varchar);
v_start := v_start + v_buffer;
END LOOP;
RETURN v_clob;
END blob_to_clob;
Once the get_person_image read image file the CLOB Contains data like below HEX:
00 01 00 00 FF DB 00 84 00 09 06 07 13 13 12 15
13 12 13 15 16 15 15 18 1D 17 17 16 18 17 17 16
18 18 17 18 1A 18 18 17 18 17 18 18 1D 28 20 1A
1A 25 1B 18 17 22 31 21 25 29 2B 2E 2E 2E 17 20
33 38 33 2C 37 28 2D 2E 2B 01 0A 0A 0A 0E 0D 0E
1B 10 10 1B 2D 25 20 25 2D 2D 2D 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2F 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 2D 2D FF C0 00 11 08 01
0F 00 BA 03 01 22 00 02 11 01 03 11 01 FF C4 00
1C 00 00 01 05 01 01 01 00 00 00 00 00 00 00 00
00 00 05 00 03 04 06 07 02 01 08 FF C4 00 43 10
00 01 02 03 05 05 06 03 07 02 05 02 07 00 00 00
01 02 11 00 03 21 04 05 12 31 41 06 51 61 71 91
22 32 81 A1 B1 F0 13 C1 D1 14 23 42 52 62 82 E1
07 72 15 92 A2 B2 F1 33 C2 16 24 43 63 74 B3 F3
FF C4 00 18 01 00 03 01 01 00 00 00 00 00 00 00
00 00 00 00 00 00 01 02 03 04 FF C4 00 21 11 01
01 00 03 01 01 01 01 01 00 03 01 00 00 00 00 00
01 02 11 21 31 41 03 12 22 42 51 81 32 FF DA 00
0C 03 01 00 02 11 03 11 00 3F 00 DB A3 89 B3 00
04 9A 01 1E A9 4D 19 8E DF 6D 62 D4 A3 67 B3 BD
28 A5 0D FB 9F D7 FE 61 5B A3 93 69 3B 5F B7 69
41 32 E4 76 D4 EC 5B 2E 35 1E 9C 6B BA 33 F9 B6
D5 AD 41 53 89 5A F4 4E 89 F9 0F 7C E2 39 93 84
BB E2 51 A5 32 F3 88 76 89 85 CA 52 5B F3 1E 3A
87 FA C4 5B B6 D2 69 2E D7 7B 2A A1 FA 51 23 A6
71 09 53 54 4E A4 EF 67 3E 03 21 E3 0A 4A 10 1A
98 BA 81 EB E6 63 A5 CF 03 26 E6 3D E5 EF 93 93
45 6E CC AA C4 09 FB C5 37 E9 15 5F 5C 93 E0 22
44 A4 24 1F BB 96 90 77 9E D2 FC E2 32 2D 6F 90
61 F9 8D 49 E5 BA 1C 33 30 A5 CD 3A 97 30 C9 39
04 20 E2 99 32 BB 80 0F D6 24 D9 2F 79 45 60 09
20 F1 38 49 26 9A AA 83 C6 2B 33 A6 13 5C 87 31
EB 1D D8 E8 71 00 4B 74 FE 7C 61 06 AB 79 4A 49
97 2F EE A5 8C 75 0A 49 ED 00 CC A0 A3 91 0C 68
74 2D 1D DD 56 F9 72 08 29 99 50 18 B1 A1 6A 54
0A 13 C7 D2 33 4B 55 F4 65 E6 5D 67 47 A2 79 EF
3E F9 C0 5D ED 31 59 13 E8 3A 6B 07 A3 91 F4 75
DB 7B 95 80 42 82 81 19 1A 1C B4 3A C1 8B 35 A9
2B 1D 93 96 63 50 63 06 D9 CB DE 6C 89 92 E6 29
01 68 52 80 51 72 0A 08 EC F6 AA 03 38 53 BB D2
B5 70 0D D6 6D F2 A9 33 5E 59 55 49 39 12 4A 58
66 06 7A D2 1E F4 5F CE DA 58 8F 60 3D C5 7F 4A
B4 20 29 2A 0F AB 1D 60 BB C5 22 CD 3D 85 0A 14
04 50 A1 42 80 14 28 50 A0 05 0A 14 28 02 AF B6
D7 DF D9 E4 16 3D B5 F6 53 F3 57 24 FA B4 63 CA
99 53 9B E6 B5 1F 24 8E 3E F9 17 DB 5B EC CF
.....
and when i open as text in PLSQL it is something like this :
���JFIF
after v_ret_json.put('image', blob_to_clob(tmp_blob)); it reformatted as :
Hex View :
7B 0D 0A 20 20 22 6E 61 6D 65 22 20 3A 20 22 34
31 32 2E 70 6E 67 22 2C 0D 0A 20 20 22 69 6D 61
67 65 22 20 3A 20 22 5C 75 46 46 46 44 5C 75 46
46 46 44 5C 75 46 46 46 44 4A 46 49 46 5C 75 30
30 30 30 5C 75 30 30 30 31 5C 75 30 30 30 31 5C
75 30 30 30 30 5C 75 30 30 30 30 5C 75 30 30 30
31 5C 75 30 30 30 30 5C 75 30 30 30 31 5C 75 30
30 30 30 5C 75 30 30 30 30 5C 75 46 46 46 44 5C
75 46 46 46 44 5C 75 46 46 46 44 5C 75 30 30 30
30 5C 74 5C 75 30 30 30 36 5C 75 30 30 30 37 5C
75 30 30 31 33 5C 75 30 30 31 33 5C 75 30 30 31
32 5C 75 30 30 31 35 5C 75 30 30 31 33 5C 75 30
30 31 32 5C 75 30 30 31 33 5C 75 30 30 31 35 5C
75 30 30 31 36 5C 75 30 30 31 35 5C 75 30 30 31
35 5C 75 30 30 31 38 5C 75 30 30 31 44 5C 75 30
30 31 37 5C 75 30 30 31 37 5C 75 30 30 31 36 5C
75 30 30 31 38 5C 75 30 30 31 37 5C 75 30 30 31
37 5C 75 30 30 31 36 5C 75 30 30 31 38 5C 75 30
30 31 38 5C 75 30 30 31 37 5C 75 30 30 31 38 5C
75 30 30 31 41 5C 75 30 30 31 38 5C 75 30 30 31
38 5C 75 30 30 31 37 5C 75 30 30 31 38 5C 75 30
30 31 37 5C 75 30 30 31 38 5C 75 30 30 31 38 5C
75 30 30 31 44 28 20 5C 75 30 30 31 41 5C 75 30
30 31 41 25 5C 75 30 30 31 42 5C 75 30 30 31 38
5C 75 30 30 31 37 5C 22 31 21 25 29 2B 2E 2E 2E
5C 75 30 30 31 37 20 33 38 33 2C 37 28 2D 2E 2B
5C 75 30 30 30 31 5C 6E 5C 6E 5C 6E 5C 75 30 30
30 45 5C 72 5C 75 30 30 30 45 5C 75 30 30 31 42
5C 75 30 30 31 30 5C 75 30 30 31 30 5C 75 30 30
31 42 2D 25 20 25 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 2F 2D 2D 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D 2D
2D 2D 2D 2D 2D 2D 2D 2D 5C 75 46 46 46 44 5C 75
46 46 46 44 5C 75 30 30 30 30 5C 75 30 30 31 31
5C 62 5C 75 30 30 30 31 5C 75 30 30 30 46 5C 75
30 30 30 30 5C 75 46 46 46 44 5C 75 30 30 30 33
5C 75 30 30 30 31 5C 22 5C 75 30 30 30 30 5C 75
30 30 30 32 5C 75 30 30 31 31 5C 75 30 30 30 31
5C 75 30 30 30 33 5C 75 30 30 31 31 5C 75 30 30
30 31 5C 75 46 46 46 44 5C 75 46 46 46 44 5C 75
30 30 31 43 5C 75 30 30 30 30 5C 75 30 30 30 30
5C 75 30 30 30 31 5C 75 30 30 30 35 5C 75 30 30
30 31 5C 75 30 30 30 31 5C 75 30 30 30 31 5C 75
30 30 30 30 5C 75 30 30 30 30 5C 75 30 30 30 30
5C 75 30 30 30 30 5C 75 30 30 30 30 5C 75 30 30
30 30 5C 75 30 30 30 30 5C 75 30 30 30 30 5C 75
30 30 30 30 5C 75 30 30 30 30 5C 75 30 30 30 35
5C 75 30 30 30 30 5C 75 30 30 30 33 5C 75 30 30
Text View :
"name" : "412.png",
"image" : "\uFFFD\uFFFD\uFFFDJFIF\u0000\u0001\u0001\u0000\u0000\u0001\u0000\u0001\u0000\u0000\uFFFD\uFFFD\uFFFD\u0000\t\u0006\u0007\u0013\u0013\u0012\u0015\u0013\u0012\u0013\u0015\u0016\u0015\u0015\u0018\u001D\u0017\u0017\u0016\u0018\u0017\u0017\u0016\u0018\u0018\u0017\u0018\u001A\u0018\u0018\u0017\u0018\u0017\u0018\u0018\u001D( \u001A\u001A%\u001B\u0018\u0017\"1!%)+...\u0017 383,7(-.+\u0001\n\n\n\u000E\r\u000E\u001B\u0010\u0010\u001B-% %------------------/-------------------------------\uFFFD\uFFFD\u0000\u0011\b\u0001\u000F\u0000\uFFFD\u0003\u0001\"\u0000\u0002\u0011\u0001\u0003\u0011\u0001\uFFFD\uFFFD\u001C\u0000\u0000\u0001\u0005\u0001\u0001\u0001\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0005\u0000\u0003\u0004\u0006\u0007\u0002\u0001\b\uFFFD\uFFFDC\u0010\u0000\u0001\u0002\u0003\u0005\u0005\u0006\u0003\u0007\u0002\u0005\u0002\u0007\u0000\u0000\u0000\u0001\u0002\u0011\u0000\u0003!\u0004\u0005\u00121A\u0006Qaq\uFFFD\"2\uFFFD\uFFFD\uFFFD\uFFFD\u0014#BRb\uFFFD\uFFFD\u0015\uFFFD\uFFFD\uFFFD\uFFFD$Cct\uFFFD\uFFFD\u0018\u0001\u0000\u0003\u0001\u0001\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0001\u0002\u0003\u0004\uFFFD\uFFFD!\u0011\u0001\u0001\u0000\u0003\u0001\u0001\u0001\u0001\u0001\u0000\u0003\u0001\u0000\u0000\u0000\u0000\u0000\u0001\u0002\u0011!1A\u0003\u0012\"BQ\uFFFD2\uFFFD\uFFFD\f\u0003\u0001\u0000\u0002\u0011\u0003\u0011\u0000?\u0000\u06E3\uFFFD\uFFFD\u0000\u0004\uFFFD\u0001\u001E\uFFFDM\u0019\uFFFD\uFFFDb\u0523g\uFFFD\uFFFD(\uFFFD\r\uFFFD\uFFFD\uFFFDa[\uFFFD\uFFFDi;_\uFFFDiA2\uFFFD\uFFFD5\u001E\uFFFDk\uFFFD3\uFFFD\uFFFD\u056DAS\uFFFDZ\uFFFD\u000F|\uFFFD\uFFFD\uFFFD\uFFFD2\uFFFD\uFFFD\uFFFD[\uFFFD\uFFFD\uFFFD\uFFFD\uFFFD.\uFFFD*\uFFFD\uFFFDQ#\uFFFDq\tSTN\uFFFD\uFFFD\u0003!\uFFFD\u0010\u001A\uFFFD\uFFFD\uFFFD\uFFFD\uFFFD\uFFFD&\uFFFD\uF4D3En\u032A