Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 20:21

General

  • Target

    机甲小子2瑾哥辅助贺羊年豪华版1.1.exe

  • Size

    1.8MB

  • MD5

    ff8687656d64aaa3b2d436b51d6afc83

  • SHA1

    a9ecdb7e31cd7f21961f10dceca32331463f7b2e

  • SHA256

    399c1c27392d0ab84ea99f6e70e32a95a36fb50b7ea9c7de11654d782d8e9f5e

  • SHA512

    6cc36e23e1e67d74a36f467cf0d77bccac2687957bf8d9bed705adc36ac86bd02b005d76adc26432da7a543066a48a96babff0cd59527a576863c9a84286d9de

  • SSDEEP

    49152:64Q6x+gQSiYmGU+EqNw80Brm7MxlqZ+6Y+0u:2Z3GU8Nw8Yqk6y

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\机甲小子2瑾哥辅助贺羊年豪华版1.1.exe
    "C:\Users\Admin\AppData\Local\Temp\机甲小子2瑾哥辅助贺羊年豪华版1.1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.jingezm.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb962d0cc30df14d7e37843a49aba544

    SHA1

    30e5dd13c6ef56cddcf392ffcbe30f94c9713172

    SHA256

    ea33a7dfe5cdcc5d19bf3767b96a7111c465e706cb7698a472b12c0b91786cba

    SHA512

    a05d1f2bcf3e1b164c10e2a4d597f40e54c8300c2a6f37db6962e4cc48bdb9218701324ce500027d2fb245ba60403d28b0adbdaf9eb8f59c8beaeba9e9300917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8448e8364cf7ed9e962c183243ecaa21

    SHA1

    24ab8ddcf1ee541673af138d6d89e7c609716bb6

    SHA256

    5bc22dcf668d6236f5085a2d93019bff7193a5189fb9680254d91c4f9eb5355d

    SHA512

    5d4715da1f44b398d1b711a2c45067a66e6a50e8a3800cd4a9e3d3f4810b29dcef39a754292c45f24e295745d3fb399ce4bfa1d33ee5892d6b504662599760dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ede5803663fa56bdd2c145df71e7ad41

    SHA1

    c47261f7a9a8aa1c79d39d69214850c3ef2ea23c

    SHA256

    46da1aca46e2eeedfb742df895f8e51821883c72caaa8e8c785e6bac878c51b5

    SHA512

    e12c77cdf486ba629f183f55f01dcd2ad242168601d68de5dd61fb53f3e858884c801b3cd8c130f30232e0b0cea68e14cd54661f2c84f5eb0345593e30140644

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcb54b41dd58fb53d9e9d7d3b281c5e1

    SHA1

    98a3fb84a22a19d8bf84faeec4b865369bf25783

    SHA256

    bd0d53c35327c82344be99be4629ce3d26d2496914d68bc5e869576e8bee667f

    SHA512

    99c6f831f236d804c416c985e028825bc590024604e48e99583fb63302569c47cd6c5f9e20fd280ed95a94e99c7511cb92ace73c11e1ce13d6ae8b130f1f7361

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89bbef87ed5ecba70ec6a79149e0cb4b

    SHA1

    1523dc3834ee9afd6964990cf3744527328cda52

    SHA256

    d9ee0f3fcf84a63362fd656139818a6503801f03a7349e8adaa8fac03a9a3761

    SHA512

    c9ffc2e33ae4f1638765fd6162e491844ca18178500aac2c4a8edd52df4a45e7eba99d57dba291dc7ce6a2b6d174a1b2a29a3e1f1817d3c7cc5e92b155a20176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2dd31470c79690d1fb4e9285dfb46349

    SHA1

    ed0330c03dc5bdc8bcd89a71d64c94656db3bb2f

    SHA256

    7c215ae908d6e8bfaaa09ed0042dc199a8cd929f55eb74859ccffd92081df8f5

    SHA512

    3bd7de85369dd0c46be8ec797f12b899c5482a60800cb27ec9625f5b252521bf0d1baf9f50253bd771c112aa68b4c02ebfd1775d925a3f6fc30ad159573cd4de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0890fe22dccc8e0ce5159a9aff138c94

    SHA1

    5a2d9c90b992b787accdfbd30545f0ffe75ffbce

    SHA256

    515ba88ec7a34446a3a9b9f47bdcface4e9cec4fc49531d115cd2ac58ba00449

    SHA512

    b4d7d79be5a8a545807a35f98eac2d52d7773c31c3df818f351fcd912d8dfb8016309e0559382b52975e5afa983881ea2985ed6707334d468c9927b49e73e463

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba108e2f985cffa06c74818e18f65c00

    SHA1

    97bc8832181a79d83f4f692162c071f6a5913df2

    SHA256

    52bc94322fecae0be6278a0dcfee4e567e2c788a59e902e13c7bfa21021b9929

    SHA512

    335775d0b3b7db51ec85ebe816cc7f02813c00053e9a93e13c9576deceb797c6f5723f17a22843aaba8605025d4bf2cf4791f355a6278c3aa38d02c08edc9fc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82bd56a8f79ac0073e548e950fdf6fa8

    SHA1

    0ebfb3dadacf52b49ed8dc4892f1893ebb29fc13

    SHA256

    52301378e2848ffbc88673a82f385b6605a6d961a95590bf94c169e86f7ee956

    SHA512

    d8245f583dbfcca7107ed9ce5b584f3c50d6e6b4405e86786e66339ee86217415e015d09e7633493d47092da256d6cb8c600ac1aa0a9ce9d4fcf6aa04ca28f4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c511d25ab1a6bb0feb37db1ee8847cc8

    SHA1

    7a297d8cc232c778fe2f96f7d3330c22263cf13f

    SHA256

    9700df68e382fe137387caa70795fa0acadfa5c5c53531e283976243e51c9ba3

    SHA512

    22a1e8581b47d33208d3352d9cb8d5f599312d113496d62eec43b7460ca8a65da122a7b3c681e9372bd78e8947a7c1fb9af2b0ef0cb6fa065a678b1b89f89e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98d9da0453ab4fd5108ea9aaa73e841e

    SHA1

    35e301a9cfcb987be650398d73aa63890cf368e2

    SHA256

    57207baa1a5d0489e2233d04c1785219fab4628671f7f1fae54d66159fdd8128

    SHA512

    1b54284ddb1429bdb1d7a10418c805e7336a49a46a29ba93d1dffcded03d3eec52780def0c0b0a8f45e2a110316226075cb3605bf460fb8a63b68579651caf00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46e123a10e01cd00e196724d3b48b518

    SHA1

    aff7131bdcc5528c063bef90632f278aa8c3107e

    SHA256

    7b4be2ebd3a2efcafae8c74ac1ab10313e3e5d6bdc18eac3e4d68698d8b3d17a

    SHA512

    5437998ed8495314b141814129d5a489d226cee23b2018dbe044b7e671bef4da81817e4340af5aa9a0cceefeb6ddfb4f3cef68f8171d1ee610c240e2d81eefad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d840f1a0dba5407500907b8f1fccdaf

    SHA1

    0f7fd8f8e0d1eb6217b2bd583bd2770647813d22

    SHA256

    250871fcedd5b3c5aaf7a981369ce76718df1f22a797a3026123df3ff91fd7ce

    SHA512

    72f139eff85f31285b6559dda63ffe33f8a64991be741962d83cf36ac37217b41d527b75c3b87b87a0b5eb4d6a73c758be6b7c921f2750c892c0dcf1ae49f2af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39d46e823516e761a3edeed74d973192

    SHA1

    90ff6945854708e4ac6660b83223a8899d4a3284

    SHA256

    63d43672cab7f6e3b383e60b6f6ea9c92a80b5653192bcde8b0b29cfe37e080c

    SHA512

    f938ff3df61edfe245e3b3d16f8e5a5830dda5366909c8c94e0d552d33165fbb8b80d28ebedcbca3e7ac5ca87a5d26c528045e0df3026372c0c6913221e31608

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a48fc9141a78a14411510eb382877726

    SHA1

    f2ee6bb210c52e26ee055c82edea1dd398a10b21

    SHA256

    fb7cfa772fd18d61f00e2e22d8cae79b48358a6483392b7699c002a903381297

    SHA512

    8047e782931b369c7d3147f13852a4d64edeeb80440621376784b466cbb850600d14c0122413a62d418cb637c79ada556dd6bed0cb2b1762043d294ca038231b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bf5709bb25fa62283b7bc98cffb166a

    SHA1

    62208b5b43c97ae688bd74bc5bdf923fb725845a

    SHA256

    5673a53af4b4336b149c240dc93246a8e0cf1e3d925f0828af422448ba080265

    SHA512

    3ee31e616d9407749b5bba14f1b31a86c76bc33058fba640b38ff029f89e3c8385105aa53bab5e27baa4d83ae49ab2d255bf17bee7b1597b358af176f18c61d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f45c04cda0a85b4ade305b4844f0995c

    SHA1

    df1d70a328761d155c2b4e006e5f7e587192ce5b

    SHA256

    585cb3b6f7aebf37aac49c7f24ccbcc364330c24f771d18ab4d6ce71f0931df2

    SHA512

    6b267eaed10367615af10f168fa1c76938c1c3d74b3fb219bace7c94c7297311342c45b3d56006ee0842b3e507341b1bb43bd2286277acaa0d0908e269057686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64a6f77350f9b2e39a3e4d4a51a64a80

    SHA1

    abe995dabcf6de6bbe7c7affeb52545a4f48cec3

    SHA256

    8ce4d49fdc8206f870421487985ced185ba077f777824a35112956f655dd9af1

    SHA512

    21c91c5c4bd7ba3b5b6256aecb7751fda5194e623922f925cfe1966cb3ad69025b30e4b46ea423d3d7cd240cb8d5ff842c0c8a07f248df63607db25eb5df6c34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b38f78335d40f894cbbb2c81fa58e81

    SHA1

    3472805dd5cdbd0c48f70f7d37d02bf6f863ac09

    SHA256

    4b57ee971f07b49e9860a0c79629689b23e0e5028e9797a47f19b8d382055b46

    SHA512

    804d3118450a7da5e1dadab4345a42d26c037ced2e93cb01747b9ab69d4d87399763c9b288211dbf371c50373e51b52106d6ce188f3e5e53c9763d44e382ad8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11ef0b40a3e14871e7aed44a4776b3ba

    SHA1

    b759519adb264fab66e2f9a5530c006ab1dcbe36

    SHA256

    565f263d3e7f5bd410206d5d51583139dcd0d0eaf20475461335d6c1bb3f1a87

    SHA512

    1940cd374a049f6394c665ae8271a0360040fd287c65d46d0f3cba8d51306cc0d0625765a21a4dbf41d912c7eea8575badc6f5cbb71e84eb0760b648efa2ad5f

  • C:\Users\Admin\AppData\Local\Temp\Cab125A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar139A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2692-57-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-68-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-43-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-41-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-39-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-37-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-35-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-33-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-31-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-29-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-27-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-23-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-21-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-19-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-17-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-60-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-61-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-62-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-63-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-64-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-65-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-66-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-67-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-45-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-69-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-71-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-49-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-51-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-53-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-55-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-0-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-59-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/2692-16-0x0000000000400000-0x00000000008BF000-memory.dmp

    Filesize

    4.7MB

  • memory/2692-2-0x00000000043D0000-0x00000000043D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-3-0x00000000043F0000-0x00000000043F1000-memory.dmp

    Filesize

    4KB

  • memory/2692-4-0x0000000004500000-0x0000000004501000-memory.dmp

    Filesize

    4KB

  • memory/2692-5-0x00000000044D0000-0x00000000044D1000-memory.dmp

    Filesize

    4KB

  • memory/2692-6-0x0000000004430000-0x0000000004431000-memory.dmp

    Filesize

    4KB

  • memory/2692-7-0x00000000044A0000-0x00000000044A1000-memory.dmp

    Filesize

    4KB

  • memory/2692-8-0x0000000004420000-0x0000000004422000-memory.dmp

    Filesize

    8KB

  • memory/2692-9-0x0000000004480000-0x0000000004481000-memory.dmp

    Filesize

    4KB

  • memory/2692-10-0x0000000004400000-0x0000000004401000-memory.dmp

    Filesize

    4KB

  • memory/2692-11-0x0000000004450000-0x0000000004451000-memory.dmp

    Filesize

    4KB

  • memory/2692-12-0x0000000004410000-0x0000000004411000-memory.dmp

    Filesize

    4KB

  • memory/2692-13-0x00000000043E0000-0x00000000043E1000-memory.dmp

    Filesize

    4KB

  • memory/2692-14-0x0000000004510000-0x0000000004511000-memory.dmp

    Filesize

    4KB

  • memory/2692-15-0x0000000000401000-0x000000000048D000-memory.dmp

    Filesize

    560KB

  • memory/2692-1-0x0000000077BF0000-0x0000000077BF2000-memory.dmp

    Filesize

    8KB