Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe
-
Size
256KB
-
MD5
3130aa2bc7403ed4a22058f3d59c0449
-
SHA1
512e039128ba14e86d64625f0a7992fa73040464
-
SHA256
7a5de4280cca58469ac04308dbc5ed75e59251de0de525121a0348f944b0369d
-
SHA512
033b8f2d567c12ca9c60e30b08b223814097009936dc2d5b5a26e4cbc95ee38999feac0e8d46ec7da9b488152181581e798b2a416c3960630866c77703e45645
-
SSDEEP
768:RWSVqPR2pQ87mEpnqFCm3d1mfK5J8jE2V4DrRJ8gM7YLDlrxOzUKczUKhzUKCzUd:RWScMpSExqfjC707J7e7N775vejP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ysfoan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 ysfoan.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /w" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /N" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /f" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /X" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /m" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /I" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /d" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /K" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /L" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /A" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /q" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /k" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /Y" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /O" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /y" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /s" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /h" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /i" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /C" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /H" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /r" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /G" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /e" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /T" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /Z" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /n" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /a" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /u" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /F" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /J" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /o" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /p" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /B" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /U" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /c" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /W" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /Q" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /V" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /P" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /R" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /g" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /E" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /M" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /b" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /j" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /v" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /S" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /t" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /D" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /z" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /l" ysfoan.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysfoan = "C:\\Users\\Admin\\ysfoan.exe /x" ysfoan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe 2140 ysfoan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3964 3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe 2140 ysfoan.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2140 3964 3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe 84 PID 3964 wrote to memory of 2140 3964 3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe 84 PID 3964 wrote to memory of 2140 3964 3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe 84 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80 PID 2140 wrote to memory of 3964 2140 ysfoan.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3130aa2bc7403ed4a22058f3d59c0449_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\ysfoan.exe"C:\Users\Admin\ysfoan.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD53ec148922b446b8abdb5fb2245e63521
SHA17d54957426c51673b71ecd05358a6624c6ce2999
SHA25645b8b0a682c631ff7bd8a9400b09b786918fb6740788472764aa7329ada16f91
SHA5121712d1711ffd6689ef6b7f41d795451dc48005882db0ef65f6d37fc49cadcea071ba0681ff9031081f53b478a043a6ede744f963aa4a11d5097ceebe3985a1be