Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
0a900f5f8fc5747c5e5f07fe8fc3cc09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a900f5f8fc5747c5e5f07fe8fc3cc09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a900f5f8fc5747c5e5f07fe8fc3cc09_JaffaCakes118.html
-
Size
53KB
-
MD5
0a900f5f8fc5747c5e5f07fe8fc3cc09
-
SHA1
afd1ff97786e696f1e2acaa8aad9bb9bb0872bb0
-
SHA256
a47cddabf6ddc6e48d930f108c6286a568fcc780df3aab76ab05bbb93660ac2d
-
SHA512
4bb6dbd0ccd5de9ba781e5bfb725ae07b330aebacd46a328d8285f75f6117faf3f228b0be7111a9670e21d027aa313951e22f94ed778ecea457ce201e01d8d40
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYu63Nj+q5VyvR0w2AzTICbb/oj/t9M/dNwIUTDmD2:CkgUiIakTqGivi+PyUCrunlYu63Nj+q9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F76F3C1-80B6-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000086cf639b952168d18a525892d1c5bddd2e29aae4dc7a10439dc68029502a9aa6000000000e800000000200002000000090850a5f0456c4625e615f6f77cc09455aadf244fe481c5341ade6426fbd6d2220000000c68e806618dbbb19e6c646f29e3558c696a2b63ca09324f3bd50d6842b53646e40000000a1e577510b71d26aa8f8ab59b1df6818df0ba70add731512e5559be2cc6b5a5f0a47164e5be160d0aa0cae701b485ad541adc5ddc7817451d63cd83b49cbff61 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434032545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802a415ac314db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a900f5f8fc5747c5e5f07fe8fc3cc09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c649506bcd1341577c102f5a735d4e7
SHA1cd5b8dd3c15fe83d6f941a0f3f10fb80c267c080
SHA256b05dd45c29c1d1898edac4bb574602cecdc558ab10bff8cbafb38a222c3331fa
SHA512280a07138c2a891b0dd803dd61153c7710401af990820435693f30b1ac262f32f3a76fbf5f9c444b9c4f43750e3d2b68899e42f021f639d66987b35cc1af83b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593dd19952cb3589b56bd64c30aef35e6
SHA139396d8baaa36decaadfffa31fa41b0c3c8b0b52
SHA256a37ac4af80a5dc70a09abfaab3a3a99f7dcb6c54c7dec88cd17594ae94d7483a
SHA512a0f2aca3fbe343ad47233ae22fde5831e5ce5cb3ecf27070ac74ec582e195d291c28636295dde38a1a01a4a3ac27fee8e2d92ac3a256965b40d2e12fad5191d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bded8cbea832359255581e7153894b48
SHA1dfeeb79c322409030a09859712e6cd585528ed6c
SHA2565c1b53a669459a956c67e940695f36f5e5a0ab2ec6bf20502a8e46664644e58f
SHA512ab3d6ee512b2fdc3e04ade7211a330807377ceae8705cc73fffb91ab8baa63e28d74c3f562cd3284cb355df29a50e1fcf3e935997c0be1961600540a9c4107db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f2454a88c43ddc3aa337222d269ab6
SHA13c93dd91229eee604af8c85d92efb30f84ad90ba
SHA2565d6a6a20e658bffdfd7188798ff83383f6c5aa1529c7e5d7aa8368c474a9823b
SHA5121532df4beb838799605fa30396c4267942e12839b3c8eabab7ca179feb77944d4a6e5692e2eb4bee457996112ce9daebf56ebef2ff7fb0fb6b39fb0860ce8001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e6023cddd7106c4e311499110ed74e
SHA1738b09afa2907adc18ee30217efe4dccf475bbbb
SHA2564569b8c56c7f2314a1202ae80e6a97d71301374f0bfa2c7fde1f8694490d2c4a
SHA5129fd6c23a6b359779de5e80164e1505ea7c5043e415448ab5e0d31a771b81a2b6c299c2837580aef31a150e977fc62fa250e6d0b7ba49294988283a15769db0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744c41c8800521645f91727f0d49f234
SHA19513122a9129a510cf1da98ece795356436b3f1f
SHA2564af50c739e5783596ad75ed89038a4f07ee839699fe1ee31ca0b82fd23019cdf
SHA5121ceb598a5f2004e75cb8aab3eaa7c92b6adade6f6a0500fccc081276872939e49dcc3adbcf67df7d3a892a797b4f313b0e039d88c573d28147116c2fd785db10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef8c5f9ba980362b229879ef61d8f67
SHA1d791f4eaa227c8f4109a6863e5693d6343a64c2a
SHA2564d522071c9576501778d502304ff0f4605e46d13e2b5c7049e343498197d9691
SHA512d8a628585b2c049ae154aa3c876d901624850352925beed1188840e4fc573cbc114dae23329b807a4255564894789faecc27aef8ca77f847d364767a224857d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6dfd80a6ce61af695024b6b492ebbc
SHA164b6399a4fb0d20a4642a143ffbbef3d97709789
SHA256447041a8d942b16d5fc5cf4d139645c21c61b61cc673d149b6d9bfdd5a434566
SHA512a563b751581329a0bd1619688d62784db82cc35b0cc4712cac79ec7fc60947d99e7afd26f46987f9b5f4bebaa41ed5a59202d09a5f01df08119f9df5ed8d1a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4fd25addd85b19c087c101ac9f1d9e
SHA12208119144f530c03240ef8ac9f10146845ecda8
SHA256d8588dd8a721b7b3d393a2e72eefadcb4b5d0c6f5db7ba650c896398dd382e5d
SHA5129af68053e6457daf21eb2b6ba6530912f4c0f44061885a21e6cf584ef6cad8493d2a5bc2f446af3431572049906ffc5f16816952278959eadd2964cc139483fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f5c6930bc4ca921a6ce8ba991e1462
SHA1945007c3539d2de0f03f4440f3f3327fb0fcb7e0
SHA25659b50d8143a9f90256600d07e41492e45fbe491fc7d12e16a62781b6de2fa054
SHA5123b5a07ceb7ab91f67d2b304147281ea8ef95fc21bda4c5ca67d4aecd9be7d6e4ce3b375755380bca7042da0d73f4eb3f3e31868939c7c4d9411feed63c54f696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843ddd282928028ee4c340c511499903
SHA1c672cab01389d71d23e31e798fb5398ee515f014
SHA256e28c62b5ec6557f54b2caee299d0fc6a46de314376eb9dd299503d5ec0c0b21b
SHA5121001584b3cedd9d60d677fa674681d2aa60b90462c1835eeec14e019bef8d59de2ad9c1990aac0bfc46b9c1d23dbcead1a440cee142e8db272ea1b7cd93b86a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad56dfb4a9a3f38edfabb499ccdafe3
SHA1d7d7d779a46aff70887b208dbf2f7bb0a8e4c2fb
SHA2564808fc33b6ed237cf4696bef2f931745eef1ffec222c45cbd4bb97908f856159
SHA512beb7fc854862157b55277d17ad7c163993a24836e3b8a8a68a705ab9a17dd2520718cf23ec9d10d6162573b6cb87c7db125fba5a6fdf0fce82eeb9827df8759d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566feff771acf6cd02c5c36b8c0678be1
SHA1eb0666f1c5230b670cade9f777b1eeb60e6bc503
SHA256a9374fa10aea308385ff09dc5b168436cd8395a77752564cf9ab730951831507
SHA512a6a8ba48896370f9811abf814b98076e804ced3c4998224184525c7234f9cd1191772eff075714bbadcacdd6949fbd2c5a676b1b24d2975d8510a611aee68a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9f96cfb219c4ee8c7cded091db6b0b
SHA13b2381d0ee800c87ce443b72eb3e284a3707eb6f
SHA256e020f0eb424b934edf3abb54e17e799b7faca0587593c9310c20c4acad8eb9bb
SHA512ab719c8dc342246f18c5c5a520606a7b33abf87551727b8bc9ad52944f7e2e4f684277de5a53e82210a1c84174b914488a9e7833c0759f992100f6204c26ebf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c81705f634a1bb896a57b4683b159ff
SHA147060234df3e8b20517ed606444a53820fd796c2
SHA256aec6749e2a4eee29339fc911e0d4e3e5cc0c3aad145f9c211817471e9d990ddc
SHA5124502016b63ef5d74bd77b5e4a3422be0f90d37da21debae504d3ca33b2af42bbfe28eef1225ca30074b4a9ee519e8337893b3fa9eefb3c7ca8d0933808e5c6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc511b1b0f261d424baee47741ab24fd
SHA1f3e302744960f6096e814461e64d9adf14b59431
SHA2561a556456cf27913abf24448aa75a865ebde4c06a73a4dce0590954813e88a3fd
SHA5124f2a98e03178859cee70d1c8116cf45809f59b8e3f2b81b2fa86ee3f78070a217d553cb58bb15fbfc3ec937fc089659531d75e65af863724c1aeef15d911cb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e231b46b0f19c4b107022721bdf44b
SHA15a9bd78f50f3e3f1ec3bf9c502780a1cfe1b1e43
SHA2562d16aba6966556e5ecd9f889abed2a0a6c1756ecd29fa842d3fe8e1c1e21bb1d
SHA51256a5afb0236087ac155fd69c27193631a2588e9406abfae4b3fb7bdcb15864579d9dd80335150b18289438e95e5a9f9ef930d47adbf48f6db17d45a6c6eaf04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e452a6848a45f798015fa8e18dfe4a3
SHA1f1272a122ad08ce85b436f7f1cb47725a95619cd
SHA256eef8e4f31b143b6a446a280ff0409781d66e0ba4c4fb9d2c06d1c538de6c95de
SHA512ba1c069e234fb38c33e0ac67550925e6070bfad59fcecd37da607208876f54900c972cacb75fd894f4a5bf3194044b23a04f6e502017a759fdae1a50bc30b869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841d455deb8b921d87193a67349771cf
SHA165459f64cfbf274c033c4fd803d9afb80879dc52
SHA256e58afaabf57bd2d53f5d687886ceea2c836e58e5c0649b7467919b81609b3d0f
SHA512c64d14158d1522b4fbb98d2ceb95ee3866fee4141d34a1d4348164e0975c5b17cbe4355efdac0ab18f60c4ac2ae4f268a6be99328200208bd183cedbf31d081c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b