Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf0f3fd2d484c9ca81919a02b6eb95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf0f3fd2d484c9ca81919a02b6eb95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf0f3fd2d484c9ca81919a02b6eb95_JaffaCakes118.html
-
Size
158KB
-
MD5
eabf0f3fd2d484c9ca81919a02b6eb95
-
SHA1
89e07f2cf94b1d8aee184d2adb8aff0fd5db540e
-
SHA256
21602e660293806017ea81bbe679dafa68e469209c8302f9f39123270e0d34cb
-
SHA512
88f264bc58fadba5e084b428e6fa650e8e9500f108dbd9538b6e83892533bae964e3da28b096b8d4c66bb59fa1defe1d51bedf2ff3a351ae7de52e95eb0ad88f
-
SSDEEP
3072:SCKsrtXAVjoZZai0BY5UHtl48URueXqXldu6shlHhWX+mS0zyfkMY+BES09JXAnZ:SC5rtXAVjoZZai0BY5UHtl48URueXqXu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9010bd045c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBA35231-764E-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000eec750322c1642c203320493b4c4a507eee7f793abd6e55f05b8f2393ad58b8000000000e80000000020000200000007d60c1a6651dd9e090fe20d75cdaeaf2260759c55e7b40352de9e157e1e8258220000000ffc3bc687c2b1ed05b524e03d9b19e31fc46d9348b52757f6ca433a7ec4f74db40000000a3423398940002fce2d507df02720084db69314a30338287e332cdf1ff1e3f0a729cd8e11cd67f2a90c8f6fad22783ea969fb30ec725b0f8278295624f96cef3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2156 2560 iexplore.exe 30 PID 2560 wrote to memory of 2156 2560 iexplore.exe 30 PID 2560 wrote to memory of 2156 2560 iexplore.exe 30 PID 2560 wrote to memory of 2156 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabf0f3fd2d484c9ca81919a02b6eb95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c34d653e5040efb796d2d05f2c413e
SHA1199fa2fc49d30f6741020c1cb1a767ad56c4ef8a
SHA256d926fb98c19ed6b91cfb5fb369b14ceff712b27893c3c537699836190646cd26
SHA512a0367ab347166ec834c3b2328781b0f63ef754073202ddd174ad2703e73ed3a693976b4e55c59aeb3b3b33e834f080bc85c416b1cae2bfc464d02b38c8696daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e0cc4e17e12e07e7d98c5860822e1e
SHA11904f402baa7eb81fc2f945dfc910c52fa43f251
SHA25698720d935fa18291011ac584c10a4da720b33db94dd83ad9d3e160ca8291264f
SHA5123f53efb388dee93af9f574f11351171b29153d2dd0614cde52e38b04db0d7b7fb3bed7cd93b544514086001ee5da8707248dea33fa986885626348a51fa9715b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7f0e045a0a31b308f69a730d280c3c
SHA183495ca17292cc57c87c79c7eb326261dbbaa7cf
SHA25641edb2baf19373b91ae66312036172c80e09e78951b2a6e240445605b35f2a7d
SHA5120db18349269461be135c294bf0ab2db5662d3644232918eed59a12d1176e44377251f9fcdb29b2871c5514e01a25522458d3a2266dc8dbeabb587f7925c7476c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f03f04ce53c16333be5d2056e9de827
SHA19b8d4e1ae54583d9d4364fe916688897655d1621
SHA256e57a44cb09e4542fed2805440c910b65759fbead5598092dc4343de3f929f5ce
SHA512c73e60b41048812b89625151a56a4ceb7be9eb3d91fe908b4972c28b7180b6b06ea6e8ef4bcac4fb650a17ab0464da1d98a2eb0331cecb9e86b85ad55c09ce13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5760025068589d8c11f486e64b75067
SHA151d317d670a66ed817ecde6bcff2653de18628e0
SHA256360f8b891435a76d5b2f50baf9496e1b254250ff70cf21c64381414b019c982d
SHA512cd80f318b9464c869ba924dd5d99b69ab716e1ff9c3075682a51988a7ad261e3ea0d25de1661e3671e2ca57510b12a53f7eb6077f8f6ee4dd8fb9eccdbf176ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb2a1d0ed25f9c0ce45add4f3e3d0cb
SHA1343eb2db859cf7cec2ff113582728c2a571fd9b3
SHA256f8b1693ff10b4e846ea21b92c6a53813ec1291eee98e2fd08d1565b45483bd48
SHA512ca6804479f04d5629f1a26b6c1fb4ba527ed707cb3a1153eceb81649370d11c3dc333aeaac2ab593cec5d2238a9abd7577ccb4c68a87b8285a87850a88ab55b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55838526b9177f8df9a4ca3a3af71cf21
SHA170f880e81d1c8cf9d07befff1e415264c7e11638
SHA25620baad7ef806ca6846a83329bbb05f9460fa13d33ca5aad4b8c718b78df4a386
SHA51209fbe8c781fde53010df59bcaa4e74438929a47a111925a369a2370f3acbac045045b085d543e11adb933a47b6dbbf5a4b666529da4e409415224b4879856d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcaed454abcf107f0492711e65eeed48
SHA12c2c0df70ad19be5281b96170151d9767d232f30
SHA2564763f36dddcadcb65899827a7612ec8f1150caf8223e377739f08f39c898f096
SHA5121662af6ef333245c6928544e427c268a5bda4ffa5d97deb94d7069c8f7ee27d885b8e377144e392abd4a80dd6dcdeae985bdbfc9c9466b75a7debd12d64b5eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbf54c3093b1d0b0a5fed822d09d268
SHA1a758149d293f2c708959c29c28f45dbbe28c4b51
SHA256fe96223f054267e9715f9b801f885c500efa7f38dcb46bc3f1015c3f259cf88f
SHA5120247009c7a6dc1dd0a8b106a83a0b7098c4f8100cef85a998cd562cbe1b68ccd2a3fcaf91f2c45ab4fc8437a824495d8b3d9870cec8a86f70e039b1f9154eb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdebf9dc915d6c6dcd2e0cd8b1d12dc8
SHA1c3b046a2beb793c51391ee468235b52e3930bfa6
SHA256e734f9b7f43bb3585cb3825f178ae52fef6a8b0ef44afee70edccac22400d759
SHA5122dcf7c28cc14f3f82e722e47db15e3492e3f3b67486fe7e07e3ac45c0666e17dd4ac2bf54d857c5de4ed37f82149c6eacb712d522489b4c67839b4c9c544f2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af9189369ac408251838db5e1cc0183
SHA1a90403c32e55684528c87eeee1ca1e172174c0b2
SHA25609a90989954acc842a392f51704c9fdcb816e69cc3eb5befead5f21cca7227d9
SHA5123e47b8e96e151392cf32fa7c5177beecf02c080de528a1b99f6563b258fbc63ef64a3c514cbc83a1c06063c5916f94c2b8442f9e2aeb409962d7ce7272591fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7346add6f9513f23d61a79668ade579
SHA1d8f3cb1b364f0fef9c3f2bf2fb078292fe2ce30c
SHA256f4d46d89d6d172ea5cb8266fbbfc7f35a90574e7ef0cd87af998bc57fe9a56a0
SHA5121f64c61fea48da0e575e538d559797462e53c9d10aa37b57943cdccc72397ce7c072cfb18df56a3905f16903a8e20d50f6be32c79710b41f47297b9fd27d0eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ce4f6f8afd4974e2b974cce058d5c3
SHA1b3519e332bde079e26627a4b8a12c9c821cc6073
SHA2566c0728af194046254d6aba74886fd68a90e89b1fb102fa8e12ab328780532437
SHA51251ec171a013c0e5b585f710b369a7173b472562ef6ae47fbd4f1bfa12ce49481b664cdb6e59c0d4d9490c742a67c3a13b6322264c6de86303f0b376f57dde3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85cb71ac7b95024356236eb0179dd32
SHA14998c7bb0ed97f3311026a2cb6ef65634a741dbd
SHA256adf78b1d972838e96a56b3489fe35f1d9d07c3b76cc53aa2c893148e4413a58e
SHA51223612713c86559cefea8a52ad7cd8e2f574883224ca6a2dec8b025e5107d97fe4cb5f2f93a15cdf0fa591c2adbf2146f6422518900f562b35ac293cfe37cfc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e71b79d250c36d5b25075df20f22139
SHA165d81f6962d5649a6222b3b1932fa43e223d09ba
SHA25606e4e6a026b81f355b10aec10049aa1c97afef17cf16af0d19f80a04d2695e5f
SHA5120b3b2ce47119829ca810c420b765afa5d7758d6393aa366d84a8ae35ad27661bd805cbfad3107e00d5b97d86d16296814aa81f5687fbcc77088d6c3762fd1a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5169f00d04c5aeb0350c0069924ac8758
SHA17c788481d93752d8a30ca71595e9af85785c05d4
SHA256728ab11b75a673a7c57b433dab2831cfb5f6522a04ca81874cc3f956c636e076
SHA512a77260a9e17ae2a73cf03cf14293dc00b96e080612566622727cf6615ba39eea27c2cf671268e16fc0bf8aaa4320e159963ff86af40e440912ed17e8a8affedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574907c56d37622e3f11a5e889fd8da21
SHA187e7ed64615530b2e892142381be2cf3389957fa
SHA256a9ee8ec561938e6bf529ee09d28f23e847eeec97565ebe61e4eabef92d893922
SHA5126466a9cfc88ae05dd77c0a8be41271a0d160ac1439cf731c1d0b3d059ea787bbef38167009243362d6284153b919b74b82d5af83c71e3886f4ae88b5f71a5e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d05260fc0685778d8c26efbae40835
SHA183f324d7210617afd5c03608f75cf6b1b9d17d89
SHA2562e1319b31a2afd6dd85e4cbab4a1bbc2d01accaf5d5d8210ead737026c122d8c
SHA51277d19843048155b3e2718efecc202e8ddab63046ae8878b1f1be150ecf38517231c997fc0ba6da6916d62610d4314bc51c1434f7fc3f237f9517befb1c12573c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4b44648da556b65bcf39423a7da0b8
SHA10b69e213c326b29b78676ad1d4c1cb3071be4bda
SHA256c8dd47cf4a7b983a2145a0cb4575c21033fcc2101d85539f20193584456b3107
SHA512cd4adeb759127b52e5f2d078ab07c2180f065e7017fa94d473edf81a777e454e1b702d479c81e2563e5d6998a72c76a51d40b3081fca051c1e68292898745a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae77fe7acb20f7c216ebafded78fd61
SHA133df576a03672d340ebc3cc339156006d2c1cc0d
SHA256cf1c5676f2e07d01ca23a38e7af24bfb6b09bd7004438576041dc476d4daf9b6
SHA5123c580097ef00b270a9aab5a10df7074c99edeb8669edd56a5519c9af8c3b84c0ac327499e39c9d75e0005aa89cc7d5cff5818a004268bb27c29bde826a706827
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b