Messages in m2_reversing

[2018-11-28 15:20:52] jcase : @jcase has joined the channel
[2018-11-28 15:21:07] jcase : @xela75 @brd_gsm @jezzab
[2018-11-28 15:21:10] brd_gsm : @brd_gsm has joined the channel
[2018-11-28 15:21:10] xela75 : @xela75 has joined the channel
[2018-11-28 15:21:11] jezzab : @jezzab has joined the channel
[2018-11-28 15:21:24] jcase : @jezzab
[2018-11-28 15:21:31] jcase : @brd_gsm
[2018-11-28 15:21:34] jcase : ome one stupid slack
[2018-11-28 15:21:36] jcase : invite them
[2018-11-28 15:21:37] jcase : ok
[2018-11-28 15:21:41] jcase : there Xela
[2018-11-28 15:21:50] jcase : thats grand total of everyone i know even taking an intereest in reversing the m2
[2018-11-28 15:25:55] xela75 : hi ! Thank you for inviting me
[2018-11-28 15:30:04] xela75 : 2
[2018-11-28 15:33:37] xela75 : I got a MP2 and open it
[2018-11-28 15:34:32] xela75 : See that there is an LC1860 proc. Does datasheet available somewhere ?
[2018-11-28 16:52:36] brd_gsm : Yay, thnx for the invite :)
[2018-11-28 16:53:05] brd_gsm : Not that we could find Xela, but worth trying to find it with google
[2018-11-28 16:53:14] brd_gsm : It probably requires an NDA
[2018-11-28 16:53:32] brd_gsm : Some mobile phones use it too though
[2018-11-28 16:53:42] brd_gsm : Xiaomi for example
[2018-11-28 16:54:02] xela75 : yep redmi 2A
[2018-11-28 16:54:21] xela75 : find out pinout
[2018-11-28 16:55:20] brd_gsm : Yup, though most of it can be figured out but requires destroying a board for reversing the routes, plus a logic analyzer to spot the signals before that
[2018-11-28 16:56:09] brd_gsm : Anyway, DJI trends to leave friendly markings on the pcb silkscreen, so most signals are easy to find :)
[2018-11-28 16:57:00] xela75 : yes there are 1 emmc and 1 emcp connected to the proc
[2018-11-28 16:58:17] brd_gsm : Did you already have any findings or did you just get started?
[2018-11-28 17:00:41] xela75 : In fact, I've already dumped both memories
[2018-11-28 17:32:40] jcase : I've been after a LC1860 datasheet for ages
[2018-11-28 17:32:43] jcase : good luck
[2018-11-28 17:38:26] jcase : @xela75 one is connected to the allwinnter, one to the lc
[2018-11-28 17:38:32] jcase : not both connected to the LC
[2018-11-28 19:36:51] brd_gsm : So you got a physical dump of emmc?
[2018-11-28 19:37:24] brd_gsm : Would you be willing to share the dumps?
[2018-11-29 08:57:19] xela75 : @jcase allwinnter ? I don't locate this one on PCB...
[2018-11-29 08:57:52] xela75 : What purpose is it used for ?
[2018-11-29 08:58:18] xela75 : @brd_gsm Yes I do
[2018-11-29 09:00:00] xela75 : @brd_gsm About sharing, I dont know...Don't you already have this kind of dump ?
[2018-11-29 09:15:29] xela75 : @jcase dumb i am..allwinner is H3 :upside_down_face:
[2018-11-29 11:17:35] brd_gsm : I do not have a physical dump of the emmc, and it would help with reversing, but if you dont want to share it no worries
[2018-11-29 14:46:13] xela75 : You're not an OG member ?
[2018-11-29 14:46:38] jcase : og members dont have the dump
[2018-11-29 14:47:17] jcase : as far as im aware, the four ppl in this chat are the only ones focusing on m2 in any regards
[2018-11-29 14:47:53] jcase : i cant current share proceeds of my research due to a work conflict
[2018-11-29 14:48:31] jcase : i believe coptersafe has a dump as well, didnt invite him here because he hasnt responded to me at all
[2018-11-29 14:49:55] xela75 : ok but NLD are OGs ?
[2018-11-29 14:50:15] jcase : yes the ppl behind NLD Are OGs
[2018-11-29 14:50:19] jcase : maybe they have a dump, maybe not idk
[2018-11-29 14:50:27] jcase : ive not heard of any serious m2 movement
[2018-11-29 14:51:01] jcase : i mean until you mentioned that it had two flash chips, i didnt realize anyone know that
[2018-11-29 14:51:11] jcase : besides jezzab and me
[2018-11-29 14:51:18] jcase : i mean no one is putting any serious work into this
[2018-11-29 14:52:09] xela75 : ok but can you tell me the short story about Mavic Pro 1 ?
[2018-11-29 14:52:28] xela75 : Who has done the job ?
[2018-11-29 14:53:00] jcase : bunch of ppl
[2018-11-29 14:53:07] jcase : i rooted it a few times
[2018-11-29 14:53:14] jcase : jezzab did
[2018-11-29 14:53:20] jcase : jan, freaky, hostile
[2018-11-29 14:53:24] jcase : we all wrote explotis for it
[2018-11-29 14:54:11] xela75 : but they dont all belong to OGs
[2018-11-29 14:54:16] jcase : we all do
[2018-11-29 14:54:29] jcase : OGs is jsut a bullshit chat room
[2018-11-29 14:54:35] jcase : its not anything privledged
[2018-11-29 14:54:36] jcase : really
[2018-11-29 14:54:47] jcase : there are a few levels, and teh talk jsut decreases
[2018-11-29 14:55:48] xela75 : ok that's clearer
[2018-11-29 14:57:16] xela75 : I dont know Mavic air but is it similar to MP2 ?
[2018-11-29 14:57:24] jcase : to a point yes
[2018-11-29 14:57:33] jcase : the 0801 software is similar, not identical
[2018-11-29 14:58:20] xela75 : ok that's the reason no hack exist as far as now...
[2018-11-29 14:58:35] jcase : both have been hacked
[2018-11-29 14:59:27] jcase : <https://github.com/CunningLogic/UberSploits>
[2018-11-29 14:59:37] jcase : <https://github.com/CunningLogic/UberSploits/blob/master/src/resources/payload.bin>
[2018-11-29 14:59:46] jcase : a modified version of this payload works in the early airs
[2018-11-29 15:02:39] jcase : does not work on m2
[2018-11-29 15:04:36] xela75 : ok
[2018-11-29 15:06:01] xela75 : About MP2, do you get what purpose have each proc LC1860 and H3 ?
[2018-11-29 15:06:37] xela75 : specically lc1860 ?
[2018-11-29 15:07:21] jcase : assumption is the LC is for occusync
[2018-11-29 15:08:10] xela75 : ok thx
[2018-11-29 15:08:39] xela75 : got to focus on H3
[2018-11-29 16:46:03] xela75 : And what is your method to penetrate M2P ?
[2018-11-29 16:46:21] xela75 : I can imagine it's based on USB ?
[2018-11-29 17:00:42] brd_gsm : Landed home 2h ago, modded the remote :)
[2018-11-29 17:05:42] xela75 : what's the range with this ?
[2018-11-29 17:06:05] xela75 : look pretty well designed ! Good Job !
[2018-11-29 17:58:34] jcase : @xela75 im not a hwardware guy, i do exploit R&amp;D
[2018-11-30 08:57:41] xela75 : ok and do you have any dump ?
[2018-11-30 14:22:31] jcase : i do
[2018-11-30 14:36:38] xela75 : Some fws like bootloader are ciphered. Assumption is keys are in TZ. Do you agree ?
[2018-11-30 15:01:44] brd_gsm : I dont know the range, but i did go around 2km away today with no signal loss
[2018-11-30 15:02:14] brd_gsm : Keys are inside the LC HSM
[2018-11-30 15:02:46] brd_gsm : I could help reversing a physical emmc dump but unfortunately i do not have one, so i’m pretty useless until i get one
[2018-11-30 15:31:46] xela75 : 2km away CE Mode ?
[2018-11-30 16:56:38] brd_gsm : Yes
[2018-11-30 16:56:41] brd_gsm : In germany
[2018-12-01 15:35:07] evgeniychuiko : @evgeniychuiko has joined the channel
[2018-12-03 09:07:50] xela75 : @brd_gsm Great ! And you design the antenna by yourself ? is it in Thinkgiverse ?
[2018-12-03 09:22:22] brd_gsm : Nope, its one i bought off amazon
[2018-12-03 09:22:28] brd_gsm : Its around $60
[2018-12-03 09:22:48] brd_gsm : Comes with tools to disassemble the rc and all cables needed for installation
[2018-12-03 09:23:07] brd_gsm : Took around 30 mins to install, being the first time i disassembled the rc
[2018-12-03 09:55:02] xela75 : ok and what's the maximum range that you potentially have ?
[2018-12-03 13:04:02] xela75 : 3
[2018-12-05 17:04:22] 503496897 : @503496897 has joined the channel
[2018-12-06 23:39:42] jcase : mavic 2 dump -&gt; <http://cdn.nolimitdronez.com/dumps/mavic2_dump.zip> I may have misnamed the directories, it might be reversed
[2018-12-07 09:01:07] xela75 : thx for the present !
[2018-12-07 10:45:39] brd_gsm : But Xela, you already have an eMMC dump, right? Can you check if its similar to the one jcase shared?
[2018-12-08 02:14:31] timopro : @timopro has joined the channel
[2018-12-09 10:01:32] evgeniychuiko : Dear Santa, any chances to have m2 RC dump as new year gift?)
[2018-12-09 10:13:22] zeroim : @zeroim has joined the channel
[2018-12-09 15:17:19] jcase : @evgeniychuiko probably
[2018-12-10 00:05:32] dronepilot : @rgf8aerial has joined the channel
[2018-12-10 13:50:15] xela75 :
[2018-12-10 13:51:21] xela75 : @evgeniychuiko that's Santa jcase's dump
[2018-12-10 13:51:26] xela75 : Rc dump
[2018-12-10 13:52:01] xela75 : @brd_gsm Yes I'm gonna check this
[2018-12-10 15:06:02] xela75 : @jcase What's the 0901 version in your AC dump ?
[2018-12-10 15:07:35] xela75 : @brd_gsm I have the same dump that jcase's 0801 dump
[2018-12-10 15:11:34] jcase : @xela75 im not sure, they were dumped at seperate times
[2018-12-10 15:12:02] jcase : i can look later maybe
[2018-12-10 15:12:04] jcase : probably not today
[2018-12-10 15:12:33] xela75 : except in bin dir
[2018-12-10 15:12:57] xela75 : I have some "toyboy" links instead of elf bin
[2018-12-10 16:51:16] jcase : your dump is from emmc
[2018-12-10 16:51:20] jcase : mine is from pulling on root
[2018-12-10 16:51:29] jcase : adb pull /system resolves the links
[2018-12-10 17:12:14] xela75 : ok and so you succeed in being root on the m2 ?
[2018-12-10 17:13:21] xela75 : you enabled adb (mode "not production") ?
[2018-12-10 20:44:11] jcase : my device is a production device, i bought it retail from [dji.com](http://dji.com)
[2018-12-11 09:04:24] xela75 : ok
[2018-12-11 09:05:52] xela75 : you can't say anymore...
[2018-12-11 13:45:58] jcase : whwat do you want me to say? im not sharing the method
[2018-12-11 13:46:03] jcase : because no one else shares
[2018-12-11 14:07:09] xela75 : ok no problem. Just congratz for that and now we know it's possible to get root
[2018-12-11 15:30:11] mgharrison : @mgharrison has joined the channel
[2018-12-13 08:41:26] d51 : @d51 has joined the channel
[2018-12-16 19:45:31] leantto : @leantto has joined the channel
[2018-12-17 13:31:20] mldma : @mldma has joined the channel
[2018-12-18 00:26:31] kurdi80 : @kurdi80 has joined the channel
[2018-12-21 04:42:42] ttdqj4wj3hgcy5zg85qi : @ttdqj4wj3hgcy5zg85qi has joined the channel
[2018-12-21 16:04:45] slack1208 : @slack1208 has joined the channel
[2018-12-21 16:22:06] jackmax : @pcp20160520 has joined the channel
[2018-12-24 16:48:36] anton : @anton has joined the channel
[2018-12-26 01:43:37] mrbracht : @mrbracht has joined the channel
[2018-12-26 20:46:03] fredmicrowave : @fredmicrowave has joined the channel
[2018-12-31 19:50:54] evgeniychuiko : Any published m2 chipsets pictures?
[2019-01-01 18:15:13] brd_gsm : Enjoy
[2019-01-01 19:16:03] evgeniychuiko : Its a joke?) How I can read something with that resolution?
[2019-01-01 19:17:13] evgeniychuiko : @brd_gsm If it yours, please make a zoomed picture of SDR chip (marked as ACP)
[2019-01-01 19:18:29] brd_gsm : Not a joke, you can read most of the chipsets. Yes, it is mine
[2019-01-01 19:18:42] brd_gsm : Might have a pic, sec
[2019-01-01 19:19:04] brd_gsm :
[2019-01-01 19:19:13] brd_gsm : This one is also not a joke
[2019-01-01 19:19:46] brd_gsm : Anyway, will try to make a better one of the acp or read the p/n
[2019-01-01 19:20:41] brd_gsm :
[2019-01-01 19:20:55] brd_gsm : It seems that slack compresses them, thats why it lost quality
[2019-01-01 19:21:02] brd_gsm : In my phone i can read all
[2019-01-01 19:21:13] brd_gsm : Is that what you needed?
[2019-01-01 19:21:30] evgeniychuiko : Yeah, now its ok, thank you very much!)
[2019-01-01 19:22:14] brd_gsm : Np, let me know if there is any other ic you want a pic of
[2019-01-01 19:22:20] brd_gsm : I only have the core board
[2020-10-05 14:05:22] jcase : cd /blackbox
[2020-10-05 14:05:23] jcase : rm
[2020-10-05 15:17:59] bin4ry : lol
[2020-10-10 15:32:50] david.haluska : done from my side
[2020-10-10 15:57:17] david.haluska : thanks once more time
[2020-10-10 16:09:13] bin4ry : you are welcome
[2020-10-20 10:32:32] eitan1195 : ?do any of you have the UFIE 16 byte key for decrypting the firmware
[2020-10-20 10:33:26] bin4ry : nope using the drone to decrypt
[2020-10-20 10:33:45] eitan1195 : root available?
[2020-10-20 10:34:30] bin4ry : on fw100
[2020-10-20 10:35:19] eitan1195 : i see.any chance you could send over the dji_verify binary?i'd like to fetch the key and publish it
[2020-10-20 10:36:07] bin4ry : m2 has tz implementation
[2020-10-20 10:36:50] eitan1195 : tz meaning?
[2020-10-20 10:37:19] bin4ry : trustzone
[2020-10-20 10:38:19] eitan1195 : how does this affect the key encrption?
[2020-10-20 10:38:52] eitan1195 : the dji_verify loads the key from the memory, if i reverse it and get the address in which the key lies, using busybox devmem to read it will give me the key to decrypt.
[2020-10-20 10:46:56] bin4ry : they moved on to dji_fw_verify
[2020-10-20 10:47:11] bin4ry : let me send you the files so that you can see yourself
[2020-10-20 10:47:44] eitan1195 : send me in private?
[2020-10-20 10:47:49] eitan1195 : so it works with teec?
[2020-10-20 10:48:03] bin4ry : yes it works with teec
[2020-10-20 10:48:11] bin4ry : got the files ?
[2020-10-20 10:48:31] eitan1195 : for all versions?i think that in newer versions they shifted back to verify :slightly_smiling_face:
[2020-10-20 10:48:37] eitan1195 : got it thanks
[2020-10-20 10:48:58] eitan1195 : and where is it stored using teec?they still do have to keep the key somewhere
[2020-10-20 10:48:59] bin4ry : nah afaik they never used verify again, even if they carry it inside the firmware it is non functional
[2020-10-20 10:50:15] eitan1195 : hmmm , might be but they do keep the key in memory at [dji_Verify.do](http://dji_Verify.do) you have it ?it should be in sbin
[2020-10-20 10:50:28] bin4ry : key in the optee
[2020-10-20 10:51:49] bin4ry : here is the old verify they still have in place
[2020-10-20 10:53:44] bin4ry : removing the uploads now
[2020-10-20 10:56:20] eitan1195 : thanks.this is from the uav or rc?
[2020-10-20 10:56:26] eitan1195 : cant seem to see UFIE, only other keys
[2020-10-20 10:56:37] bin4ry : this is from uav
[2020-10-20 10:57:19] eitan1195 : super strange.cant see the key.
[2020-10-20 10:57:35] eitan1195 : but if you take a newer version of mvp2 firmware for uav,how can you open it on the drone itself?
[2020-10-20 10:57:44] eitan1195 : using dji_fw_verify?
[2020-10-20 10:57:47] bin4ry : yes
[2020-10-20 10:58:07] bin4ry : just use dji_fw_verify which decrypts it
[2020-10-20 10:58:19] bin4ry : and put the own output file
[2020-10-20 10:58:31] eitan1195 : don't have the rc with that version :disappointed:
[2020-10-20 10:58:39] bin4ry : ac
[2020-10-20 10:58:44] eitan1195 : ac#
[2020-10-20 10:58:55] eitan1195 : that is why i want to find the key itself.
[2020-10-20 10:59:03] bin4ry : it is in the trustzone
[2020-10-20 10:59:09] bin4ry : exploit the trustzone extract the keybag
[2020-10-20 10:59:44] bin4ry : pm
[2020-10-20 11:00:09] bin4ry : sending you a file, not the key though, i don't have them
[2020-10-20 17:17:34] jcase : "fetch the key and publish it"
[2020-10-20 17:17:41] jcase : i'd very much prefer the key not get published
[2020-10-20 17:18:06] jcase : but yeah, its the TZ derives it from the cryptocell
[2020-12-23 10:39:13] meignanmaxime : Hi everyone, nice community ! I am trying to understand the communication protocol between the mavic 2 RC (or Smart Controller) and a mavic 2 enterprise uav. I found that someone dumped the firmware of mavic 2 UAV &amp; RC here <https://dji.retroroms.info/howto/mavic_2_firmware>, and I started to look at some libraries, but I really don't know : is what I find in this firmware also applicable on the Mavic 2 enterprise (regarding the communication protocol), or do I need to find a way to dump the firmware of my RC / UAV myself to continue my analysis? Also, if I understand correctly, there is currently no tool to decrypt mavic 2 ".fw.sig" firmwares files (IM*H format, version 2), because the format is still not completely known, nor the decryption keys, is that correct ? (I am new to the DJI ecosystem, I might have said something foolish :smile: , please enlighten me) Thanks in advance for your answers and pointers !
[2020-12-23 11:10:00] mefisto : > there is currently no tool to decrypt mavic 2 ".fw.sig" firmwares files (IM*H format, version 2), because the format is still not completely known, nor the decryption keys, is that correct ? That's correct. Or at least noone shared these things publicly.
[2020-12-23 11:11:37] mefisto : Figuring out the format changes isn't very hard, but there's no point working on that if we don't have keys.
[2020-12-23 13:58:56] meignanmaxime : Ok, thanks ! And the same keys are stored on every UAV / RC (of the same model), right ? Is there any public ressources / reverse-engineering docs that could point me in the right direction on where to find these keys, if I were to dismantle my RC or UAV and dump some memory chips ? :slightly_smiling_face: (or are those keys stored on secure element and hard to extract, which would explain why some decrypted firmware had been dumped, but keys were not extracted ?)
[2020-12-23 14:02:38] freaky123 : the keys are stored on a secure element
[2020-12-23 14:24:18] meignanmaxime : thanks for the info
[2020-12-23 14:38:29] mingtao : You mean atsha204a?
[2021-01-13 12:48:53] eitan1195 : do we know what can operate on the mavic 2's 801 port 50,000(related to the camera - cant seem to see it live only statically)
[2021-01-13 13:00:16] eitan1195 : cam_drone/service/transmit_server/ts_send_tcp.c
[2021-01-19 12:25:12] wilsondonakanty07 : To connect the Drone to Linux windows in Serial mode- Start Drone-hacks 1.12 &gt; Start the AC and connect it to the laptop via USB. To check the serial mode, used # nmap -p 21 192.168.42.3 # I still haven't been able to ftp the drone to view files.. seems like it's encrypted.. Someone with a better knowledge can let us know what to do.
[2021-01-19 12:53:21] kilrah : Files on the FTP have been encrypted since the beginning
[2021-05-14 14:15:14] wilsondonakanty07 : Seems like the DJI Firmware tools- scripts have been updated and working for the MM2. using the command: "_*python3 dji_imah_fwsig.py -vv -u -i xxx.sig*_" extracted the .sig file to .bin file. Need some !!help!! to go ahead with editing/reading the .bin file. Anyone working on the MM2 firmwares???
[2021-06-01 16:39:55] the.hope.ltd : Hello I have mavic 2 z wich is not linking to rc Update always ask for missing updating meduals The link led on ac stay red even after pushing Any idea for sulotion Or where is the rf board on core board of m2??
[2021-10-30 08:04:03] antoine : antoine joined the channel.
[2021-10-30 12:08:28] sparkyws : sparkyws joined the channel.
[2021-10-30 12:13:50] jj : madmaqx joined the channel.
[2021-10-31 00:22:24] will : will joined the channel.
[2021-11-08 15:16:07] j4ck : j4ck joined the channel.
[2021-11-10 03:17:32] flyinghacker : flyinghacker joined the channel.
[2021-11-12 10:42:29] cs2000 : cs2000 joined the channel.
[2021-11-12 10:42:34] cs2000 : dji-rev-bot added to the channel by cs2000.
[2021-11-12 10:42:35] cs2000 : @cs2000 left the channel.
[2021-11-12 22:51:04] yoawedojboompeaill : yoawedojboompeaill joined the channel.
[2021-11-14 00:34:26] jackxorjack : jackxorjack joined the channel.
[2021-11-16 15:50:49] alex1234 : alex1234 joined the channel.
[2021-11-16 15:56:10] alex1234 : @alex1234 left the channel.
[2021-11-17 15:26:04] newlc : newlc joined the channel.
[2021-11-30 21:17:07] tobi : tobi joined the channel.
[2021-12-02 22:06:02] markus83 : markus83 joined the channel.
[2021-12-06 23:25:41] aol : aol joined the channel.
[2021-12-17 14:40:49] zorglub34 : zorglub34 joined the channel.
[2021-12-29 19:05:39] mavic2reverser : mavic2reverser joined the channel.
[2021-12-29 19:13:47] mavic2reverser : hey all! long time lurker, first time poster. I've been reversing the Mavic 2 on and off for the past 6 months or so in pursuit of root access (just as a hobby) and have not had any luck so far :( However, I did find a cool way to delete all logs (flight, navigation, perception, etc.). I keep finding vulnerabilities in their software but usually something stupid gets in my way from making it exploitable (selinux, jailing ftp uploads to /blackbox/upgrade, etc.) if anyone with more experience can pm me and nudge me in the right direction for a m2 root I'd be very appreciative! also, happy to share back my findings to the community
[2022-01-05 18:09:58] jcase : @mavic2reverser start looking at entry points to teh device
[2022-01-05 18:10:10] jcase : there are a TON of vulnerabilities in teh m2 that you can target
[2022-01-05 18:10:51] jcase : but generally either start at the beginning (entry point) or work back from your goal (eg if you want to target some capability in tz)
[2022-01-06 20:47:32] mavic2reverser : @jcase thanks for the input! so far I'm targeting the ability to enable adb just to mess around and learn. My entry points so far have been the sys_event* functions in dji_sys which is ripe with system() and popen() calls! I think I need to get more creative on shell command injection techniques because I haven't found anything too obvious yet
[2022-01-06 20:49:49] mavic2reverser : is there, very broadly, an entry point I should focus maybe more of my attention over others? not looking for a hand out or an answer as I want to learn. definitely helps motivating me knowing that a vulnerability does exist!
[2022-01-06 20:55:00] jcase : most of the command injection bugs are long dead
[2022-01-06 20:56:22] jcase : honestly, im not going to point you in any direction other than what i said above. Frankly, i dont want my bugs to die and if i pointed you to a place to look, it would probably cost me a bug
[2022-01-06 21:15:17] mavic2reverser : I'm right there with you man! hold onto those for dear life haha
[2022-01-06 21:15:57] mavic2reverser : I'll start expanding to other classes of bugs beyond shell command injection then
[2022-01-06 21:16:17] mavic2reverser : thanks anyways!
[2022-01-18 00:49:57] il1oo0 : il1oo0 joined the channel.
[2022-02-09 18:41:45] bepeta8783 : bepeta8783 joined the channel.
[2022-03-08 07:52:34] enigma2 : enigma2 joined the channel.
[2022-03-09 12:43:28] gh : gh joined the channel.
[2022-03-21 09:27:44] ggonzalez : ggonzalez joined the channel.
[2022-03-21 22:08:53] galbb12 : galbb12 joined the channel.
[2022-03-25 23:18:42] velhojow : velhojow joined the channel.
[2022-03-28 06:59:22] w0h : @w0h left the channel.
[2022-03-30 11:18:47] windoze : windoze joined the channel.
[2022-04-06 17:42:06] uskve : uskve joined the channel.
[2022-04-06 17:42:19] uskve : @uskve left the channel.
[2022-04-11 14:05:44] eseven : eseven joined the channel.
[2022-05-22 09:46:03] jack117wb : jack117wb joined the channel.
[2022-05-23 20:48:25] jjbyrnes29 : jjbyrnes29 joined the channel.
[2022-07-01 08:09:14] n1ptune : n1ptune joined the channel.
[2022-07-19 03:55:09] enk2022 : enk2022 joined the channel.
[2022-08-03 02:03:22] tissy : tissy joined the channel.
[2022-09-01 15:29:44] anesta : anesta joined the channel.
[2022-09-13 13:01:18] nmikus : nmikus joined the channel.
[2022-09-26 01:24:02] jackmax : jackmax joined the channel.
[2022-11-10 03:51:48] areoc : areoc joined the channel.
[2022-11-12 06:22:06] pingspike : pingspike joined the channel.
[2022-12-24 20:03:28] gaijin : gaijin joined the channel.
[2023-01-30 09:31:03] sebo212212 : sebo212212 joined the channel.
[2023-02-09 09:53:24] urca87 : urca87 joined the channel.
[2023-03-02 00:10:13] ibndias : ibndias joined the channel.
[2023-03-23 18:07:53] dronez4u : dronez4u joined the channel.
[2023-03-24 17:45:10] efimato_re : efimato_re joined the channel.
[2023-03-30 15:09:07] priegor : priegor joined the channel.
[2023-04-19 13:35:58] dji1278 : dji1278 joined the channel.
[2023-05-27 05:24:12] drmsucks : drmsucks joined the channel.
[2023-05-27 05:24:24] drmsucks : @drmsucks left the channel.
[2023-06-11 01:13:29] milenovic : milenovic joined the channel.
[2023-06-19 23:44:08] martymcfly : martymcfly joined the channel.
[2023-07-04 20:35:34] harryemery92 : harryemery92 joined the channel.
[2023-07-04 20:36:53] harryemery92 : @harryemery92 left the channel.
[2023-07-24 02:56:21] dji-rev.concierge132 : dji-rev.concierge132 joined the channel.
[2023-07-24 02:56:54] dji-rev.concierge132 : @dji-rev.concierge132 left the channel.
[2023-07-27 22:48:28] hito_no_yume : hito_no_yume joined the channel.
[2023-08-01 13:50:23] crashing_bird : crashing_bird joined the channel.
[2023-09-13 10:14:49] molda : molda joined the channel.
[2023-09-19 15:58:44] leperdu : leperdu joined the channel.
[2023-10-12 06:45:55] mr.twich : mr.twich joined the channel.
[2023-10-15 20:50:28] dumldore_newbi : dumldore_newbi joined the channel.
[2023-10-24 17:35:38] caseygibson : caseygibson joined the channel.
[2023-10-27 19:05:25] mgracio : mgracio joined the channel.
[2024-01-18 01:08:24] enk2022 : @enk2022 left the channel.
[2024-01-18 15:43:59] basilius : basilius joined the channel.
[2024-01-26 07:59:35] es2311 : es2311 joined the channel.
[2024-02-06 19:59:08] ryantkasher : ryantkasher joined the channel.
[2024-02-10 03:22:18] accountfrompl : accountfrompl joined the channel.
[2024-02-11 07:17:47] otter : otter joined the channel.
[2024-02-12 20:45:06] lining-preps.0u : lining-preps.0u joined the channel.
[2024-05-07 12:46:27] sarange : sarange joined the channel.
[2024-05-10 08:21:04] dreamtree : dreamtree joined the channel.
[2024-06-03 07:35:41] mymail : mymail joined the channel.
[2024-06-26 23:41:41] johnibhramin : johnibhramin joined the channel.
[2024-06-26 23:41:56] johnibhramin : @johnibhramin left the channel.
[2024-07-01 17:29:54] mrsmith : mrsmith joined the channel.
[2024-07-26 15:53:28] ogini_ayotanom : ogini_ayotanom joined the channel.
[2024-08-14 12:48:26] symza : symza joined the channel.
[2024-08-21 20:18:00] alt.nq-5711k93 : alt.nq-5711k93 joined the channel.
[2024-09-09 14:41:41] ar2rgo : ar2rgo joined the channel.
[2024-09-30 02:23:17] djihacker : djihacker joined the channel.
[2024-10-21 01:53:34] supermario7331 : supermario7331 joined the channel.