Enter the passphrase to be encrypted.
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with MD2:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with MD4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with MD5:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SHA1:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SHA224:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SHA256:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SHA384:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SHA512:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with RIPEMD128:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with RIPEMD160:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with RIPEMD256:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with RIPEMD320:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with WHIRLPOOL:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER128,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER160,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER192,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER128,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER160,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with TIGER192,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SNEFRU:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with SNEFRU256:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with GOST:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with GOST-CRYPTO:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with ADLER32:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with CRC32:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with CRC32B:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with FNV132:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with FNV1A32:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with FNV164:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with FNV1A64:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with JOAAT:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL128,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL160,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL192,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL224,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL256,3:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL128,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL160,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL192,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL224,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL256,4:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL128,5:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL160,5:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL192,5:
Encrypting decrypt the UFD2 hash passworN94eSmGVFVYop3MaJBntGBSSciRhCXzUpT5nefo1QQzPNVcp56iJyU+1idjIZ9crhWqNXFkl+KxYIA0ey5bza/DO74bWZxYrPStmA4+LM+o0vM82OvPvwbKnP9axH+JdFC/rKnu/LAD5Xv4flAt8RR/DGCs/k6pvOuFCC1i/uM+5zP0YakXXpeJPxLjC3oveVcMcjyHTmu+76Y6nXyA9cmnb1ZKSJCOY/q with HAVAL224,5: