Index: examples/raiseChild.py
--- examples/raiseChild.py.orig
+++ examples/raiseChild.py
@@ -1252,18 +1252,18 @@ if __name__ == '__main__':
     if len(sys.argv)==1:
         parser.print_help()
         print("\nExamples: ")
-        print("\tpython raiseChild.py childDomain.net/adminuser\n")
+        print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n")
         print("\tthe password will be asked, or\n")
-        print("\tpython raiseChild.py childDomain.net/adminuser:mypwd\n")
+        print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n")
         print("\tor if you just have the hashes\n")
-        print("\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
+        print("\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
 
         print("\tThis will perform the attack and then psexec against target-exec as Enterprise Admin")
-        print("\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
+        print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
         print("\tThis will perform the attack and then psexec against target-exec as User with RID 1101")
-        print("\tpython raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
+        print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
         print("\tThis will save the final goldenTicket generated in the ccache target file")
-        print("\tpython raiseChild.py -w ccache childDomain.net/adminuser\n")
+        print("\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n")
         sys.exit(1)
  
     options = parser.parse_args()
