Sample details: ada98bae597ee0c4d22909db95364caf --

Hashes
MD5: ada98bae597ee0c4d22909db95364caf
SHA1: edb37e47eb2d3d00107983c026f99d2c1e3edec9
SHA256: 8644ad2f7d09459ed2baf4b0edd66184eb1cae39bb2a40b3dae221dcefb4fe37
SSDEEP: 3072:Vg3/JD0+D9QqFj+shpWg3rA6o7m5FXJCFvKX1VThc+IvGq2LVcYjs4BYJ9rk6sLV:Vg3uk+mNfLMKTmL+dLV3Y4BUXx
Details
File Type: PE32+
Added: 2019-09-02 15:29:04
Yara Hits
YRP/IsPE64 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/HasOverlay | YRP/HasRichSignature | YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/ThreadControl__Context | YRP/anti_dbg | YRP/inject_thread | YRP/create_service | YRP/network_http | YRP/network_dns | YRP/escalate_priv | YRP/win_registry | YRP/win_token | YRP/win_files_operation | YRP/Prime_Constants_long | YRP/RijnDael_AES | YRP/BASE64_table | YRP/Str_Win32_Winsock2_Library | YRP/Str_Win32_Wininet_Library | YRP/Str_Win32_Internet_API | YRP/Str_Win32_Http_API | YRP/Win32OPCHavex | YRP/SANS_ICS_Cybersecurity_Challenge_400_Havex_Memdump | FlorianRoth/WiltedTulip_ReflectiveLoader |
Strings
		MZARUH
!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.reloc
t$ WATAUAVAWH
 A_A^A]A\_
WAVAWH
 A_A^_
x ATAVAWH
0A_A^A\
@SUVWAVAWH
XA_A^_^][
WATAUAVAWH
 A_A^A]A\_
WATAUAVAWH
|$(!D$ 
A_A^A]A\_
\$ UVWATAUAVAWH
A_A^A]A\_^]
x UATAUAVAWH
A_A^A]A\]
N,+~(I
WATAUAVAWH
 A_A^A]A\_
WATAUAVAWH
A_A^A]A\_
WATAUAVAWH
0A_A^A]A\_
SUVWATAUAVAWH
HA_A^A]A\_^][
H SUVWH
` UAVAWH
@A_A^]
UATAUAVAWH
A_A^A]A\]
UVWATAUAVAWH
 A_A^A]A\_^]
|$ UATAUAVAWH
A_A^A]A\]
t$ UWAVH
<+t*<-t)
t$ WATAUAVAWH
u"9D$XH
 A_A^A]A\_
WAVAWH
 A_A^_
UAVAWH
9|$ t8L
UVWATAUAVAWH
A_A^A]A\_^]
9|$ t4L
WATAUAVAWH
 A_A^A]A\_
WAVAWH
 A_A^_
H SVWH
` UAVAWH
u 9D$8t
UAVAWH
UVWATAUAVAWH
A_A^A]A\_^]
WATAUAVAWH
A_A^A]A\_
UAVAWH
UVWATAUAVAW
A_A^A]A\_^]
@USVWATAUAVAWH
L$0u%H
A_A^A]A\_^[]
@USVWATAUAVAWH
T$8u%H
A_A^A]A\_^[]
` UAVAWH
UVWATAUAVAWH
A_A^A]A\_^]
` UAVAWH
WATAUAVAWH
A_A^A]A\_
UAVAWH
D9t$P~
UAVAWH
@A_A^]
WAVAWH
 A_A^_
WATAUAVAWH
A_A^A]A\_
@SUVWATAUAVAWH
A_A^A]A\_^][
UATAUAVAWH
A_A^A]A\]
f;D$ w
f;D$"w
t$ WAVAWH
 A_A^_
WAVAWH
0A_A^_
@USVWATAUAVAWH
A_A^A]A\_^[]
WAVAWH
 A_A^_
WAVAWH
~8H!|$(H
@A_A^_
UVWAVAWH
A_A^_^]
UVWAVAWH
A_A^_^]
UVWATAUAVAWH
A_A^A]A\_^]
USVWATAUAVAWH
t$0D!l$(D
A_A^A]A\_^[]
t$ WATAUAVAWH
A_A^A]A\_
t$ UWAVH
\$ UVWATAUAVAWH
A_A^A]A\_^]
WATAUAVAWH
A_A^A]A\_
` UAVAWH
t$ UWAVH
L$8H!t$ L
@SUVWATAUAVAW
|$`L9-
A_A^A]A\_^][
UATAUAVAWH
A_A^A]A\]
l$ VWAVH
@USVWH
;T$(}#C
x Hct$(E3
WATAUAVAWH
A_A^A]A\_
\$ UVWAVAWH
A_A^_^]
p WAVAWH
WATAUAVAWH
A_A^A]A\_
UAVAWH
UATAUAVAWH
t=H;{`u7
A_A^A]A\]
WAVAWH
D$89D$@t
WAVAWH
@A_A^_
l$ VWAWH
system32L
\$ UVWH
\$ UVWAVAWH
A_A^_^]
t$ UWATAVAWH
A_A^A\_]
x ATAVAWH
fD9c8u
fD9{8u
 A_A^A\
uEf9o8u$H
b9\$0vX;
\$ UVWH
\$ UVWH
UVWATAVH
A^A\_^]
H !X H!X
UVWATAUAVAWH
`A_A^A]A\_^]
WAVAWH
 A_A^_
\$ UVWATAUAVAWH
A_A^A]A\_^]
l$ VWAVH
x UATAWH
\$ UVWH
@USVWATAUAVAWH
A_A^A]A\_^[]
|$ UAVAWH
uQHc}0I
\$ UVWAVAWH
A_A^_^]
x ATAVAWH
 A_A^A\
SUVWATAUAVAWH
z HcG<L
$t)IcE<A
L+E0D9
hA_A^A]A\_^][
UVWATAUAVAWH
pA_A^A]A\_^]
x ATAVAWH
A_A^A\
UVWAVAWH
A_A^_^]
WAVAWH
 A_A^_
WATAUAVAWH
A_A^A]A\_
@USVWAVH
A^_^[]
@SUVWAVH
@A^_^][
HcL$ H
HcL$ H
HcL$ H
D$0HcD$$H
L$ USVWH
fffffff
UAVAWH
WATAUAVAWH
@A_A^A]A\_
|$ AVH
WATAUAVAWH
 A_A^A]A\_
L$ UVWATAUAVAWH
 A_A^A]A\_^]
t$ WATAUAVAW
A_A^A]A\_
A:8uiI
t"A88t
UVWATAUAVAWH
D$DD9T$\
|$h+t$D+
A_A^A]A\_^]
t$ WAVAWH
Genuua
ineIuY
nteluQ3
UVWATAUAVAWH
D$DD9T$\
|$h+t$D+
A_A^A]A\_^]
WAVAWH
 A_A^_
VWATAVAWH
A_A^A\_^
LcA<E3
ATAVAWH
 A_A^A\
WAVAWH
 A_A^_
VWATAVAWH
0A_A^A\_^
WATAUAVAWH
A_A^A]A\_
l$ VWATAVAWH
T$&@8t$&t9@8r
A81t@@8r
A_A^A\_^
AUAVAWH
0A_A^A]
VWAUAVAWH
0A_A^A]_^
VWATAVAWH
 A_A^A\_^
\$ UVWATAUAVAWH
!|$HHc
|$HD9l$X
HcD$LH;
HcD$LH;
H!|$ L
A_A^A]A\_^]
WATAUAVAWH
 A_A^A]A\_
USVWATAUAVAWH
8UXt#D
XA_A^A]A\_^[]
t$ WATAUAVAW
A_A^A]A\_
VWATAVAWH
 A_A^A\_^
VWATAVAWH
 A_A^A\_^
` AUAVAWH
t$8Hc0I
\$0D9=j{
A_A^A]
Hct$@H
sYHcL$HH
x ATAVAWH
< tD<	t@
 A_A^A\
H3E H3E
@USVWATAUAVAWH
A_A^A]A\_^[]
@SUVWATAVAWH
PA_A^A\_^][
@UATAUAVAWH
!t$(H!t$ I
A_A^A]A\]
@UATAUAVAWH
A_A^A]A\]
` AUAVAWH
0A_A^A]
D$(A9h
@8l$8t
r"fD;A
@8l$8t
D82u&H
D8t$Ht
UAVAWH
fD9|T@
C\f9DL@t
USVWATAUAVAWH
t]+uoA;6rUA
A_A^A]A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
x AUAVAWH
 A_A^A]
UVWATAVH
0A^A\_^]
UVWATAUAVAWH
t8L9%+
0A_A^A]A\_^]
D9d$xttH
UVWATAUAVAWH
L$purL
0A_A^A]A\_^]
D9t$xtpH
@8t$8t
@8l$Ht
fD93tSH
CfD93u
@USVWATAUAVAWH
eHA_A^A]A\_^[]
HcD$hH
cdn.%x%x.%s
www6.%x%x.%s
%s.1%x.%x%x.%s
%s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x%08x.%x%x.%s
%s.1%08x%08x%08x.%x%x.%s
%s.1%08x%08x.%x%x.%s
%s.1%08x.%x%x.%s
api.%x%x.%s
unknown
%s as %s\%s: %d
127.0.0.1
%s on %s: %d
Started service %s on %s
IsWow64Process
kernel32
D	0	%02d/%02d/%02d %02d:%02d:%02d	%s
F	%I64d	%02d/%02d/%02d %02d:%02d:%02d	%s
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
sysnative
RtlCreateUserThread
ntdll.dll
process
%d	%d	%s
Kerberos
%d	%d	%d.%d	%s	%s	%s	%d	%d
?%s=%s
%s&%s=%s
%s%s: %s
%s	%d	%d
%s	%d	%d	%s	%s	%d
%-24s 
abcdefghijklmnop
3R|NI&
r5M{"b
%s (admin)
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: %d
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
,cccc||||wwww{{{{
kkkkoooo
gggg++++
YYYYGGGG
&&&&6666????
uuuu				
nnnnZZZZ
RRRR;;;;
[[[[jjjj
9999JJJJLLLLXXXX
CCCCMMMM3333
PPPP<<<<
~~~~====dddd]]]]
ssss````
""""****
2222::::
$$$$\\\\
7777mmmm
llllVVVV
eeeezzzz
xxxx%%%%....
pppp>>>>
ffffHHHH
aaaa5555WWWW
UUUU((((
BBBBhhhhAAAA
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
RRRR				jjjj
00006666
CCCCDDDD
TTTT{{{{
####====
ffff((((
vvvv[[[[
IIIImmmm
%%%%rrrr
]]]]eeee
llllppppHHHHPPPP
FFFFWWWW
kkkk::::
AAAAOOOOgggg
tttt""""
nnnnGGGG
VVVV>>>>KKKK
yyyy    
YYYY''''
____````QQQQ
;;;;MMMM
ccccUUUU!!!!
}}}}cc
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
pp|B>>q
aaj_55
UUPx((
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
,4$8'9-6:.6$1#?*XhHpSeA~NrZlE
Sbt\lH
QeFbF~TiKwZ
4$8,9-6'.6$:#?*1hHpXeA~SrZlN
SbE\lHtQeF
F~TbKwZi
$8,4-6'96$:.?*1#HpXhA~SeZlNrSbE
lHt\eF
Q~TbFwZiK
8,4$6'9-$:.6*1#?pXhH~SeAlNrZbE
SHt\lF
QeTbF~ZiKw
"3DUfw
"3DUfw
"3DUfw
CorExitProcess
(null)
`h````
xpxxxx
`h`hhh
xppwpp
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
CreateSemaphoreExW
SetThreadStackGuarantee
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
GetLogicalProcessorInformation
CreateSymbolicLinkW
SetDefaultDllDirectories
EnumSystemLocalesEx
CompareStringEx
GetDateFormatEx
GetLocaleInfoEx
GetTimeFormatEx
GetUserDefaultLocaleName
IsValidLocaleName
LCMapStringEx
GetCurrentPackageId
UNICODE
UTF-16LE
Stack around the variable '
' was corrupted.
The variable '
' is being used without being initialized.
The value of ESP was not properly saved across a function call.  This is usually a result of calling a function declared with one calling convention with a function pointer declared with a different calling convention.
A cast to a smaller data type has caused a loss of data.  If this was intentional, you should mask the source of the cast with the appropriate bitmask.  For example:  
	char c = (i & 0xFF);
Changing the code in this way will not affect the quality of the resulting optimized code.
Stack memory was corrupted
A local variable was used before it was initialized
Stack memory around _alloca was corrupted
Unknown Runtime Check Error
Unknown Filename
Unknown Module Name
Run-Time Check Failure #%d - %s
Stack corrupted near unknown variable
Stack pointer corruption
Cast to smaller type causing loss of data
Stack memory corruption
Local variable used before initialization
Stack around _alloca corrupted
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
MessageBoxW
GetActiveWindow
GetLastActivePopup
GetUserObjectInformationW
GetProcessWindowStation
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
PDBOpenValidate5
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
CreateFile2
Microsoft Base Cryptographic Provider v1.0
?456789:;<=
 !"#$%&'()*+,-./0123
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
sha256
abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
LibTomMath
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz+/
GetCurrentProcessId
GetLocalTime
GetTickCount
GetACP
GetOEMCP
OpenProcess
GetLastError
WaitForSingleObject
WriteFile
FlushFileBuffers
GetFileTime
SetFileTime
CloseHandle
CreatePipe
DisconnectNamedPipe
CreateProcessA
GetStartupInfoA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetCurrentDirectoryW
CreateFileA
MultiByteToWideChar
GetProcAddress
GetCurrentProcess
GetCurrentThread
ReadFile
ConnectNamedPipe
GetModuleHandleA
CreateNamedPipeA
GetFullPathNameA
GetLogicalDrives
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExpandEnvironmentStringsA
GetFileAttributesA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileA
VirtualAlloc
VirtualProtect
VirtualAllocEx
VirtualProtectEx
HeapAlloc
HeapFree
GetProcessHeap
CreateThread
CreateRemoteThread
WriteProcessMemory
DuplicateHandle
LoadLibraryA
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
ProcessIdToSessionId
FreeLibrary
VirtualFree
SetLastError
GetThreadContext
SetThreadContext
Wow64GetThreadContext
Wow64SetThreadContext
ResumeThread
GetVersionExA
CreateToolhelp32Snapshot
SetNamedPipeHandleState
PeekNamedPipe
WaitNamedPipeA
LocalAlloc
LocalFree
GetComputerNameA
TerminateProcess
Process32First
Process32Next
ExitProcess
KERNEL32.dll
OpenProcessToken
CreateProcessAsUserA
CreateProcessWithLogonW
CreateProcessWithTokenW
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
QueryServiceStatus
StartServiceA
ImpersonateNamedPipeClient
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueA
ImpersonateLoggedOnUser
ControlService
OpenServiceA
QueryServiceStatusEx
GetUserNameA
RegCloseKey
RegOpenCurrentUser
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RevertToSelf
GetTokenInformation
AllocateAndInitializeSid
FreeSid
LookupAccountSidA
LogonUserA
DuplicateTokenEx
CheckTokenMembership
ADVAPI32.dll
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionA
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
WININET.dll
WS2_32.dll
DnsFree
DnsQuery_A
DNSAPI.dll
GetIfEntry
GetIpAddrTable
IPHLPAPI.DLL
LsaLookupAuthenticationPackage
LsaCallAuthenticationPackage
LsaConnectUntrusted
Secur32.dll
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
GetModuleHandleExW
AreFileApisANSI
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
GetStdHandle
GetModuleFileNameW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LoadLibraryExW
RtlUnwindEx
IsValidCodePage
GetCPInfo
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointer
SetFilePointerEx
GetFileType
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
RaiseException
LoadLibraryW
OutputDebugStringW
HeapSize
HeapReAlloc
CompareStringW
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
VirtualQuery
CreateFileW
SetEndOfFile
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
SetEnvironmentVariableA
SetEnvironmentVariableW
RunDllEntry
D$$[[aYZQ
6QQh8h
AQAPRQVH1
AXAX^YZAXAYAZH
ihihikikikihikx5ijikimiiNyimikimiyiiilihikiiioihikiiinijhiY
dhhhlij
eS9|V%
kjhihiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiaijhiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii`iji
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiciji)iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiibijhiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiieijhiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiidijhiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiitiji)L
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiwiji)L
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiifiji
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiivihikiiiyihikiiixihikiii{ihikiiiMihikijiLikimz
~iOihikiiiNihikiiii
rijndael
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ