-----------------------------------------------------------------

[*] Emulating binary name: htdbm
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract (1/2)
[*] Using CPU config: 
[*] Emulating binary: /usr/bin/htdbm

[*] Change permissions +x to /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/./usr/bin/htdbm.
[*] Emulating binary ./usr/bin/htdbm with parameter NONE
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -v
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -V
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -h
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter -help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter --help
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter --version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped
[*] Emulating binary ./usr/bin/htdbm with parameter version
qemu: uncaught target signal 4 (Illegal instruction) - core dumped

-----------------------------------------------------------------


-----------------------------------------------------------------

[*] Emulating binary name: htdbm
[*] Emulator used: qemu-mipsel-static
[*] Using root directory: /logs/s115_usermode_emulator/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr (2/2)
[*] Using CPU config: 24KEc
[*] Emulating binary: /bin/htdbm

[*] Emulating binary ./bin/htdbm with parameter NONE and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -v and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -V and cpu configuration 24KEc
htdbm: illegal option -- V
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -h and cpu configuration 24KEc
htdbm: illegal option -- h
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter -help and cpu configuration 24KEc
htdbm: illegal option -- h
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter --help and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter --version and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.
[*] Emulating binary ./bin/htdbm with parameter version and cpu configuration 24KEc
htdbm -- program for manipulating DBM password databases.

Usage: htdbm   [-cimBdpstvx] [-C cost] [-TDBTYPE] database username
                -b[cmBdptsv] [-C cost] [-TDBTYPE] database username password
                -n[imBdpst]  [-C cost] username
                -nb[mBdpst]  [-C cost] username password
                -v[imBdps]   [-C cost] [-TDBTYPE] database username
                -vb[mBdps]   [-C cost] [-TDBTYPE] database username password
                -x                     [-TDBTYPE] database username
                -l                     [-TDBTYPE] database
Options:
   -c   Create a new database.
   -n   Don't update database; display results on stdout.
   -b   Use the password from the command line rather than prompting for it.
   -i   Read password from stdin without verification (for script usage).
   -m   Force MD5 encryption of the password (default).
   -B   Force BCRYPT encryption of the password (very secure).
   -C   Set the computing time used for the bcrypt algorithm
        (higher is more secure but slower, default: 5, valid: 4 to 31).
   -d   Force CRYPT encryption of the password (8 chars max, insecure).
   -s   Force SHA encryption of the password (insecure).
   -p   Do not encrypt the password (plaintext, insecure).
   -T   DBM Type (SDBM|GDBM|DB|default).
   -l   Display usernames from database on stdout.
   -v   Verify the username/password.
   -x   Remove the username record from database.
   -t   The last param is username comment.
The SHA algorithm does not use a salt and is less secure than the MD5 algorithm.

-----------------------------------------------------------------