Analysis

  • max time kernel
    4294182s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    08-03-2022 13:11

General

  • Target

    tmp.exe

  • Size

    868KB

  • MD5

    f9af0046085177c4ae153bd1eacde3e8

  • SHA1

    4f6fe60cd9bb7644cb30003799aa97e8e3947b0c

  • SHA256

    857fc01da428dccc15e996c5e737eda4148df3676c987a4416c5bb0768ce982d

  • SHA512

    f2f828a8a99d54d6757a51060e1665b2146afccf5b5fa529db691ce761b49c8a170b19a692ed7b32c550eee5b5697fdb67f85c5db260047506f7368c81a1fcee

Malware Config

Extracted

Family

oski

C2

pretorian.ug

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

  • ModiLoader First Stage 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 34 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
      "C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        "C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /pid 1956 & erase C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe & RD /S /Q C:\\ProgramData\\548465755261280\\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /pid 1956
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1612
    • C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe
      "C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe
        "C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:1748
        • C:\Users\Admin\AppData\Local\Temp\pm.exe
          "C:\Users\Admin\AppData\Local\Temp\pm.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbABlAGEAcwBlAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\system32\ipconfig.exe
              "C:\Windows\system32\ipconfig.exe" /release
              6⤵
              • Gathers network information
              PID:1108
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgA1AA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1076
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc aQBwAGMAbwBuAGYAaQBnACAALwByAGUAbgBlAHcA
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2028
            • C:\Windows\system32\ipconfig.exe
              "C:\Windows\system32\ipconfig.exe" /renew
              6⤵
              • Gathers network information
              PID:1456
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAuADUA
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Mijezedarcutnmc.vbs"
            5⤵
              PID:1436
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath 'C:\','C:\Users\Admin\AppData\Roaming\winda.exe'
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:584
            • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
              C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1456
          • C:\Users\Admin\AppData\Local\Temp\cc.exe
            "C:\Users\Admin\AppData\Local\Temp\cc.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:1584
            • C:\Users\Admin\AppData\Local\Temp\cc.exe
              C:\Users\Admin\AppData\Local\Temp\cc.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1648
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 116
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1952
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "dfgasdme.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1572
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
          PID:1932
      • C:\Windows\SysWOW64\timeout.exe
        C:\Windows\system32\timeout.exe 3
        1⤵
        • Delays execution with timeout.exe
        PID:836

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Install Root Certificate

      1
      T1130

      Credential Access

      Credentials in Files

      5
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      5
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • C:\Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • C:\Users\Admin\AppData\Local\Temp\Mijezedarcutnmc.vbs
        MD5

        5538f172ee41acfa7e101ec4ac13bf67

        SHA1

        d250a0b0ecc2de3869f24461a889301e5e10d711

        SHA256

        d1dcd271aaa9def8bfb39d134b2b625db8f2cc3788e111d29066c4208ca754f7

        SHA512

        9091c13212df6c56b9189c6f9d7ea144357b08c639361a87d95c9917d93e92a53790b6147a1b3ee4cf9504bc28443f498c78a46f38f2bbdd87f324aa404da5c0

      • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
        MD5

        843969865a92a4e82c26a2fa75ca4026

        SHA1

        c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

        SHA256

        3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

        SHA512

        b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

      • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
        MD5

        843969865a92a4e82c26a2fa75ca4026

        SHA1

        c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

        SHA256

        3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

        SHA512

        b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

      • C:\Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • C:\Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • C:\Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • C:\Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • C:\Users\Admin\AppData\Local\Temp\pm.exe
        MD5

        27e6d5f08acbcc787e860da1229929c6

        SHA1

        426120de8b17120c60013734e6553c1dd50129c2

        SHA256

        05bd6e05fa5cba8cf94a0cfd567351cd15e2d873e9e6ae3a951175e21deddaf4

        SHA512

        56e93ffcef18302e24035d3b10a4fe0d6feaf73614616f910245da2937cdcb23fd0dd4e31278b94ca3db7581c8af3ef3722e6b566f74ca0d41e4f98b4e7e1326

      • C:\Users\Admin\AppData\Local\Temp\pm.exe
        MD5

        27e6d5f08acbcc787e860da1229929c6

        SHA1

        426120de8b17120c60013734e6553c1dd50129c2

        SHA256

        05bd6e05fa5cba8cf94a0cfd567351cd15e2d873e9e6ae3a951175e21deddaf4

        SHA512

        56e93ffcef18302e24035d3b10a4fe0d6feaf73614616f910245da2937cdcb23fd0dd4e31278b94ca3db7581c8af3ef3722e6b566f74ca0d41e4f98b4e7e1326

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        MD5

        5b52e912180c15f62ded6cf2c0b3a801

        SHA1

        69820634d5bfbf1c1030ad640edf89d21a7cc7f6

        SHA256

        157449504ac76d9f21676bfd1186b8c8da29714cc06acf0d588030ccfe00b9a0

        SHA512

        fa7d5476b3d07b26d9835e5d38b4f756db71062ea85478a3dd859611681460a6455faed5ff0eb860e561bbe1297b049a86fff4c8c257667e2981bc007769b798

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        MD5

        5b52e912180c15f62ded6cf2c0b3a801

        SHA1

        69820634d5bfbf1c1030ad640edf89d21a7cc7f6

        SHA256

        157449504ac76d9f21676bfd1186b8c8da29714cc06acf0d588030ccfe00b9a0

        SHA512

        fa7d5476b3d07b26d9835e5d38b4f756db71062ea85478a3dd859611681460a6455faed5ff0eb860e561bbe1297b049a86fff4c8c257667e2981bc007769b798

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        MD5

        5b52e912180c15f62ded6cf2c0b3a801

        SHA1

        69820634d5bfbf1c1030ad640edf89d21a7cc7f6

        SHA256

        157449504ac76d9f21676bfd1186b8c8da29714cc06acf0d588030ccfe00b9a0

        SHA512

        fa7d5476b3d07b26d9835e5d38b4f756db71062ea85478a3dd859611681460a6455faed5ff0eb860e561bbe1297b049a86fff4c8c257667e2981bc007769b798

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        MD5

        5b52e912180c15f62ded6cf2c0b3a801

        SHA1

        69820634d5bfbf1c1030ad640edf89d21a7cc7f6

        SHA256

        157449504ac76d9f21676bfd1186b8c8da29714cc06acf0d588030ccfe00b9a0

        SHA512

        fa7d5476b3d07b26d9835e5d38b4f756db71062ea85478a3dd859611681460a6455faed5ff0eb860e561bbe1297b049a86fff4c8c257667e2981bc007769b798

      • \??\PIPE\srvsvc
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \ProgramData\mozglue.dll
        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\nss3.dll
        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\sqlite3.dll
        MD5

        e477a96c8f2b18d6b5c27bde49c990bf

        SHA1

        e980c9bf41330d1e5bd04556db4646a0210f7409

        SHA256

        16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

        SHA512

        335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-convert-l1-1-0.dll
        MD5

        72e28c902cd947f9a3425b19ac5a64bd

        SHA1

        9b97f7a43d43cb0f1b87fc75fef7d9eeea11e6f7

        SHA256

        3cc1377d495260c380e8d225e5ee889cbb2ed22e79862d4278cfa898e58e44d1

        SHA512

        58ab6fedce2f8ee0970894273886cb20b10d92979b21cda97ae0c41d0676cc0cd90691c58b223bce5f338e0718d1716e6ce59a106901fe9706f85c3acf7855ff

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-environment-l1-1-0.dll
        MD5

        ac290dad7cb4ca2d93516580452eda1c

        SHA1

        fa949453557d0049d723f9615e4f390010520eda

        SHA256

        c0d75d1887c32a1b1006b3cffc29df84a0d73c435cdcb404b6964be176a61382

        SHA512

        b5e2b9f5a9dd8a482169c7fc05f018ad8fe6ae27cb6540e67679272698bfca24b2ca5a377fa61897f328b3deac10237cafbd73bc965bf9055765923aba9478f8

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-filesystem-l1-1-0.dll
        MD5

        aec2268601470050e62cb8066dd41a59

        SHA1

        363ed259905442c4e3b89901bfd8a43b96bf25e4

        SHA256

        7633774effe7c0add6752ffe90104d633fc8262c87871d096c2fc07c20018ed2

        SHA512

        0c14d160bfa3ac52c35ff2f2813b85f8212c5f3afbcfe71a60ccc2b9e61e51736f0bf37ca1f9975b28968790ea62ed5924fae4654182f67114bd20d8466c4b8f

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-heap-l1-1-0.dll
        MD5

        93d3da06bf894f4fa21007bee06b5e7d

        SHA1

        1e47230a7ebcfaf643087a1929a385e0d554ad15

        SHA256

        f5cf623ba14b017af4aec6c15eee446c647ab6d2a5dee9d6975adc69994a113d

        SHA512

        72bd6d46a464de74a8dac4c346c52d068116910587b1c7b97978df888925216958ce77be1ae049c3dccf5bf3fffb21bc41a0ac329622bc9bbc190df63abb25c6

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-locale-l1-1-0.dll
        MD5

        a2f2258c32e3ba9abf9e9e38ef7da8c9

        SHA1

        116846ca871114b7c54148ab2d968f364da6142f

        SHA256

        565a2eec5449eeeed68b430f2e9b92507f979174f9c9a71d0c36d58b96051c33

        SHA512

        e98cbc8d958e604effa614a3964b3d66b6fc646bdca9aa679ea5e4eb92ec0497b91485a40742f3471f4ff10de83122331699edc56a50f06ae86f21fad70953fe

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-math-l1-1-0.dll
        MD5

        8b0ba750e7b15300482ce6c961a932f0

        SHA1

        71a2f5d76d23e48cef8f258eaad63e586cfc0e19

        SHA256

        bece7bab83a5d0ec5c35f0841cbbf413e01ac878550fbdb34816ed55185dcfed

        SHA512

        fb646cdcdb462a347ed843312418f037f3212b2481f3897a16c22446824149ee96eb4a4b47a903ca27b1f4d7a352605d4930df73092c380e3d4d77ce4e972c5a

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-multibyte-l1-1-0.dll
        MD5

        35fc66bd813d0f126883e695664e7b83

        SHA1

        2fd63c18cc5dc4defc7ea82f421050e668f68548

        SHA256

        66abf3a1147751c95689f5bc6a259e55281ec3d06d3332dd0ba464effa716735

        SHA512

        65f8397de5c48d3df8ad79baf46c1d3a0761f727e918ae63612ea37d96adf16cc76d70d454a599f37f9ba9b4e2e38ebc845df4c74fc1e1131720fd0dcb881431

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-runtime-l1-1-0.dll
        MD5

        41a348f9bedc8681fb30fa78e45edb24

        SHA1

        66e76c0574a549f293323dd6f863a8a5b54f3f9b

        SHA256

        c9bbc07a033bab6a828ecc30648b501121586f6f53346b1cd0649d7b648ea60b

        SHA512

        8c2cb53ccf9719de87ee65ed2e1947e266ec7e8343246def6429c6df0dc514079f5171acd1aa637276256c607f1063144494b992d4635b01e09ddea6f5eef204

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-stdio-l1-1-0.dll
        MD5

        fefb98394cb9ef4368da798deab00e21

        SHA1

        316d86926b558c9f3f6133739c1a8477b9e60740

        SHA256

        b1e702b840aebe2e9244cd41512d158a43e6e9516cd2015a84eb962fa3ff0df7

        SHA512

        57476fe9b546e4cafb1ef4fd1cbd757385ba2d445d1785987afb46298acbe4b05266a0c4325868bc4245c2f41e7e2553585bfb5c70910e687f57dac6a8e911e8

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-string-l1-1-0.dll
        MD5

        404604cd100a1e60dfdaf6ecf5ba14c0

        SHA1

        58469835ab4b916927b3cabf54aee4f380ff6748

        SHA256

        73cc56f20268bfb329ccd891822e2e70dd70fe21fc7101deb3fa30c34a08450c

        SHA512

        da024ccb50d4a2a5355b7712ba896df850cee57aa4ada33aad0bae6960bcd1e5e3cee9488371ab6e19a2073508fbb3f0b257382713a31bc0947a4bf1f7a20be4

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-time-l1-1-0.dll
        MD5

        849f2c3ebf1fcba33d16153692d5810f

        SHA1

        1f8eda52d31512ebfdd546be60990b95c8e28bfb

        SHA256

        69885fd581641b4a680846f93c2dd21e5dd8e3ba37409783bc5b3160a919cb5d

        SHA512

        44dc4200a653363c9a1cb2bdd3da5f371f7d1fb644d1ce2ff5fe57d939b35130ac8ae27a3f07b82b3428233f07f974628027b0e6b6f70f7b2a8d259be95222f5

      • \Users\Admin\AppData\Local\Temp\0448F6F8\api-ms-win-crt-utility-l1-1-0.dll
        MD5

        b52a0ca52c9c207874639b62b6082242

        SHA1

        6fb845d6a82102ff74bd35f42a2844d8c450413b

        SHA256

        a1d1d6b0cb0a8421d7c0d1297c4c389c95514493cd0a386b49dc517ac1b9a2b0

        SHA512

        18834d89376d703bd461edf7738eb723ad8d54cb92acc9b6f10cbb55d63db22c2a0f2f3067fe2cc6feb775db397030606608ff791a46bf048016a1333028d0a4

      • \Users\Admin\AppData\Local\Temp\0448F6F8\mozglue.dll
        MD5

        9e682f1eb98a9d41468fc3e50f907635

        SHA1

        85e0ceca36f657ddf6547aa0744f0855a27527ee

        SHA256

        830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d

        SHA512

        230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed

      • \Users\Admin\AppData\Local\Temp\0448F6F8\msvcp140.dll
        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • \Users\Admin\AppData\Local\Temp\0448F6F8\nss3.dll
        MD5

        556ea09421a0f74d31c4c0a89a70dc23

        SHA1

        f739ba9b548ee64b13eb434a3130406d23f836e3

        SHA256

        f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb

        SHA512

        2481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2

      • \Users\Admin\AppData\Local\Temp\0448F6F8\vcruntime140.dll
        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • \Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • \Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • \Users\Admin\AppData\Local\Temp\Dbvsdfe.exe
        MD5

        3466dbd3779c31dc2fccfe73e6d6a44e

        SHA1

        9e3b082853d4b3b1dd1a0e4877ee4763a02c3171

        SHA256

        58dedea111e322e46e115f2344c5685224004c0ebac9ab1cfba88c3105e4e5d4

        SHA512

        4f75e9095685f6bf3a570cd437cf9251b586ab95c7b3135750efa611d347bd4b816ba1525e08fd7776dadb03d62dbc01b9f6c8d0ba5b59d0ad2b5bf2052b67b3

      • \Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
        MD5

        843969865a92a4e82c26a2fa75ca4026

        SHA1

        c1046b49bc93cb3b37cebe1388d0b72bb66ab2e7

        SHA256

        3bd221cdc9867ee90ba3633f2266f298b4cb4fac98c70a0f208ce4afb6748637

        SHA512

        b9b30b9a69b5c7d536fe5d3c7d4615b2d9eec8410d20727c1ad17ba36c2876cb9ddbfe77353101fd80d92653724a176cd7f20c85cfaf69c6b74e95cf7de7440a

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\cc.exe
        MD5

        0c6a0c6c6ae6ca92b8dbbf7802c13381

        SHA1

        fe6a5b7eaa8076a6304a23444456ccb4e8662ff7

        SHA256

        92cee18d0c9e246f28b38a8d35442d44f8cc8eab883b5e3e0c3a09ae96de846c

        SHA512

        809baf2fbb989144ba047ed3b02534a77bbcd4fc8dc09d614df7fe980811ae7eef2eaf60c6a0be9b09c3512a55be1a286904a26607eb330c8caf28a5ecf4d148

      • \Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • \Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • \Users\Admin\AppData\Local\Temp\dfgasdme.exe
        MD5

        bead6aca8d274c82140361874ca95b59

        SHA1

        33d6cade432ebc63043170e1a8b049f51b093e59

        SHA256

        5820149ad3c898bdc7b9cf0ff98648f32192c9c5da5914aa1ae1cbe8a915c388

        SHA512

        293c616ca82744b34bd2ee389314de7b0fd05cc2e7d02aac08da7c11c1c201f9c026bcc66ee51d5bd0f9ee6d20660a50a9db19ca217479366ceb68d7d159eda8

      • \Users\Admin\AppData\Local\Temp\pm.exe
        MD5

        27e6d5f08acbcc787e860da1229929c6

        SHA1

        426120de8b17120c60013734e6553c1dd50129c2

        SHA256

        05bd6e05fa5cba8cf94a0cfd567351cd15e2d873e9e6ae3a951175e21deddaf4

        SHA512

        56e93ffcef18302e24035d3b10a4fe0d6feaf73614616f910245da2937cdcb23fd0dd4e31278b94ca3db7581c8af3ef3722e6b566f74ca0d41e4f98b4e7e1326

      • memory/560-151-0x000000001AED0000-0x000000001AF84000-memory.dmp
        Filesize

        720KB

      • memory/560-111-0x0000000000A50000-0x0000000000B9A000-memory.dmp
        Filesize

        1.3MB

      • memory/560-174-0x000007FEF5AE0000-0x000007FEF64CC000-memory.dmp
        Filesize

        9.9MB

      • memory/584-156-0x000007FEECF60000-0x000007FEEDABD000-memory.dmp
        Filesize

        11.4MB

      • memory/584-157-0x000000001B790000-0x000000001BA8F000-memory.dmp
        Filesize

        3.0MB

      • memory/584-161-0x000007FEEE9A0000-0x000007FEEF33D000-memory.dmp
        Filesize

        9.6MB

      • memory/584-162-0x0000000002324000-0x0000000002327000-memory.dmp
        Filesize

        12KB

      • memory/584-163-0x000000000232B000-0x000000000234A000-memory.dmp
        Filesize

        124KB

      • memory/1076-135-0x0000000002784000-0x0000000002787000-memory.dmp
        Filesize

        12KB

      • memory/1076-134-0x000007FEEF790000-0x000007FEF012D000-memory.dmp
        Filesize

        9.6MB

      • memory/1076-121-0x000007FEEE7E0000-0x000007FEEF33D000-memory.dmp
        Filesize

        11.4MB

      • memory/1076-136-0x000000000278B000-0x00000000027AA000-memory.dmp
        Filesize

        124KB

      • memory/1124-78-0x0000000000240000-0x0000000000246000-memory.dmp
        Filesize

        24KB

      • memory/1456-173-0x000000001B380000-0x000000001B406000-memory.dmp
        Filesize

        536KB

      • memory/1456-164-0x0000000140000000-0x000000014006E000-memory.dmp
        Filesize

        440KB

      • memory/1456-176-0x0000000000910000-0x000000000091C000-memory.dmp
        Filesize

        48KB

      • memory/1456-175-0x00000000020D0000-0x0000000002120000-memory.dmp
        Filesize

        320KB

      • memory/1456-159-0x0000000140000000-0x000000014006E000-memory.dmp
        Filesize

        440KB

      • memory/1456-168-0x0000000140000000-0x000000014006E000-memory.dmp
        Filesize

        440KB

      • memory/1456-166-0x0000000140000000-0x000000014006E000-memory.dmp
        Filesize

        440KB

      • memory/1456-177-0x0000000002480000-0x00000000024D4000-memory.dmp
        Filesize

        336KB

      • memory/1456-178-0x000000001AC50000-0x000000001AC9C000-memory.dmp
        Filesize

        304KB

      • memory/1528-146-0x000007FEEE7E0000-0x000007FEEF33D000-memory.dmp
        Filesize

        11.4MB

      • memory/1528-149-0x0000000002864000-0x0000000002867000-memory.dmp
        Filesize

        12KB

      • memory/1528-150-0x000000000286B000-0x000000000288A000-memory.dmp
        Filesize

        124KB

      • memory/1528-148-0x000007FEEF790000-0x000007FEF012D000-memory.dmp
        Filesize

        9.6MB

      • memory/1528-147-0x000000001B7D0000-0x000000001BACF000-memory.dmp
        Filesize

        3.0MB

      • memory/1584-110-0x0000000002EC0000-0x0000000002EDB000-memory.dmp
        Filesize

        108KB

      • memory/1616-118-0x000000000246B000-0x000000000248A000-memory.dmp
        Filesize

        124KB

      • memory/1616-116-0x000007FEF2E40000-0x000007FEF37DD000-memory.dmp
        Filesize

        9.6MB

      • memory/1616-117-0x0000000002464000-0x0000000002467000-memory.dmp
        Filesize

        12KB

      • memory/1616-114-0x000000001B740000-0x000000001BA3F000-memory.dmp
        Filesize

        3.0MB

      • memory/1616-113-0x000007FEED900000-0x000007FEEE45D000-memory.dmp
        Filesize

        11.4MB

      • memory/1616-112-0x000007FEFC201000-0x000007FEFC203000-memory.dmp
        Filesize

        8KB

      • memory/1644-66-0x0000000000230000-0x0000000000231000-memory.dmp
        Filesize

        4KB

      • memory/1644-67-0x00000000004E0000-0x000000000050A000-memory.dmp
        Filesize

        168KB

      • memory/1644-56-0x0000000076731000-0x0000000076733000-memory.dmp
        Filesize

        8KB

      • memory/1648-123-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1648-129-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1648-125-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1748-106-0x0000000000400000-0x0000000000420000-memory.dmp
        Filesize

        128KB

      • memory/1956-100-0x0000000000400000-0x0000000000434000-memory.dmp
        Filesize

        208KB

      • memory/2028-142-0x00000000028AB000-0x00000000028CA000-memory.dmp
        Filesize

        124KB

      • memory/2028-141-0x00000000028A4000-0x00000000028A7000-memory.dmp
        Filesize

        12KB

      • memory/2028-140-0x000007FEF2E40000-0x000007FEF37DD000-memory.dmp
        Filesize

        9.6MB

      • memory/2028-139-0x000007FEED900000-0x000007FEEE45D000-memory.dmp
        Filesize

        11.4MB