Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
22/01/2024, 23:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pastebin.com/raw/WZkeXdWD/
Resource
win10-20231215-en
General
-
Target
https://pastebin.com/raw/WZkeXdWD/
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504385110433419" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 464 2324 chrome.exe 73 PID 2324 wrote to memory of 464 2324 chrome.exe 73 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4624 2324 chrome.exe 76 PID 2324 wrote to memory of 4736 2324 chrome.exe 75 PID 2324 wrote to memory of 4736 2324 chrome.exe 75 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77 PID 2324 wrote to memory of 2980 2324 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pastebin.com/raw/WZkeXdWD/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc69d69758,0x7ffc69d69768,0x7ffc69d697782⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:22⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 --field-trial-handle=1808,i,3874938775604656671,4772061191625042090,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD50673bc541340228f9b72eea61559e37d
SHA1a472d072662d18eab2c7ccef8c470301656addef
SHA256b97a82c53f7594193d21b0f5268607bb33890455ddc8234aa7d9cb0c9f8d6364
SHA51261ebfa03a793aacf856390ae2af0a80c9e508f235d47fdbfebd254a29804c8546f81fd692c4fc5e187227ee64767d74611f67c3b88bf0e76cd19dd3c348369a0
-
Filesize
1KB
MD55018b5086159c1f585c7843317d6d330
SHA11ce3cce01615b32fc7694fcd1dc5d73bbcf37cf0
SHA256c43efb057c6a04c94b9f42b8fdec2f56a3eb59b3e3ba32cd6201a920b3e7093c
SHA51295a7e9802981fdb15b8ec1b8c482e4a5a6136da8d6c8ca0a6df13ef2e6fc4e9ea56ffc972bb3621d4ade7a03595a3282ec01f044977e91902c06b7172472bdbc
-
Filesize
538B
MD59923cd77fd9fec25d0f2e57694a4d457
SHA1915d2c253294dca3b3f1098e42d48e1b87fc571e
SHA2561d89a4fe31818b3b4b08556d33ffd32f48110449f19e84ba72d865a36dd30f8a
SHA512c0defb2733661988fa7a99855665af1d99994f69abb99c14b3eae013cd665ca348d20085c77bc8e8b179255fc13648f22b38607fbf7dfb1a006a23b37a3495cb
-
Filesize
6KB
MD537e8f533a9da53be99ccea67123aa0c7
SHA1842d9c3ab2b635a150f1481b2139c5eda5e1d0b8
SHA2565fe3917aa5f8d6996e132a33797e57f12a63fa492b56371d8ab0fa59e56bfd38
SHA512b0223e38ef694691c89ebe6fbb1431e0f732eefc5b9e825f3216053d022768876f462cb67f0221b249f5acffbe42774301a3d65a6d4dba3d9f05359cad56de82
-
Filesize
5KB
MD593714d59b3b3885087d02d065fb07af4
SHA141acdbeb1137e38baeb753c575aae531559b02db
SHA256f5f7e93062f6364660e0c5745c8e81be4ecc56ce70da473c6782978782817635
SHA51292c86cca50874f303889f91350379a394736041ae8f7594f0c71cb4dbd8141773d3b7f267f0ffaecabb1cc70f4d3dd75a18f99ae70a4d995bc96f7dc8867ae7b
-
Filesize
5KB
MD5c0f57430bfc6312503448bbef63a8d28
SHA185e611a8f4f4f3aba0e5587ee605714324ab4427
SHA25607ec484e44eb847480d9f838240ff2797a68fd98dfc5b63c6270756cb54c6d33
SHA51246c7c0d28bb78459aaba36d060752c27aa84dfd896e068c0bdc648301ac2a47e5c7645e6701a0da1556524e426ff70c958a96f8ce20f426a41b5d852422db0e1
-
Filesize
6KB
MD55b1ca05b997d05c387f027bede183892
SHA1fab5677180f1615da3e6329e257903d613e31a32
SHA2568a39367c56820565deb0163bfe9dde3453728acad2b016248b330a45c0346bd1
SHA51217ba80f2eb7cf0e48868c512285671c60174fbe8a2442c387d8344d1ea706ddda21dc924b565978a61b7057843e30febb9d9fef3b92b52b12c101f5d4cddcc68
-
Filesize
115KB
MD5ffce48bd2140bb46cb21f790a77aa941
SHA1e2036651b63945f56b88af5d62f03dccf838ed2b
SHA256bd4f927265376496e70df63f59cb863b48abb44247f8c90a82915d1560fa57a6
SHA512cb4ac5c1b6ef8acb42d8aba5f3257bb3948b3fa7b89a32794526358573cc966ac5f5da1cf4c20a266e4863ab9f38f18b66cce1674da0309779587072aa79b7bb
-
Filesize
116KB
MD56a4ec6871d2491a3388dbaf6a3839132
SHA12025bc6e4f323f5a618fded110a7883490771253
SHA256604e55300b6d88017fcd0519fb5343603e6e31a50581f054d8d8e2f13e2542ec
SHA51210fb9bb3b18fe1ffe3d24a5d7618f493864c78b7437d7ff9d242c66cd88405f4d60fc37867960ec9296bb4d97e96382147bb90ae737dcbce0ec6819c3d0cea09
-
Filesize
115KB
MD558ebda78c938fa659722376f40bc1fd6
SHA1e14f10a2669a6fde6bd759a4e455019b51b302d1
SHA256dcc609277f8a571d6f1425293520202a7daeae0951135c8edba42195a938cd29
SHA512930b43ccba2bff3d502b9c9277f1f1100cac172b18f46f01e6ce2674dc3ad767d206ef9000600bf3f1befea55361697cebe1464131f083fce7280c47d2af5fa2
-
Filesize
133KB
MD58cfc979966d7b8526b526bbeb5d08482
SHA1a81809a35feae2f35734cb81a1498a94b36b6e98
SHA2561c861a17e30da2e19ff45990724a62bd43513a9159e0df1fcbd829fe8ea2cf09
SHA512ea01f5cbabfc88ad8e6447734b58c3b138c996be272d3f0ddbfeddc2d4b537e5d35b9a45b4571543a88c035ba4b318a816c8bd35fa1207d2421f9bb2060fbd07
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd