Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2025 03:00

General

  • Target

    ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe

  • Size

    481KB

  • MD5

    41496241ae1ad7c561d749f7d479caff

  • SHA1

    e2935d471b03f8efc40460d29e2c07ee5a26f8de

  • SHA256

    ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8

  • SHA512

    50f27e89d4167087e60a251189766cabd71e81b52713d99687cf8aa70ceb220c450a175bc1559bd4e981fcb1fe3c4ee59ced8c0501abf5f234f336e318563fe7

  • SSDEEP

    12288:79PgP3HAMwIGjY4vce6lnBthn5HSRVMf139F5woxr+IwtHwBtFhCsvZD54j+P32:p43HfwIGYMcn5PJrZa+

Malware Config

Extracted

Family

remcos

Botnet

chesguyce

C2

195.133.78.18:7346

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    fyhstga-ONSWMZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 8 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe
    "C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Program Files\Google\Chrome\Application\Chrome.exe
      --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff963edcc40,0x7ff963edcc4c,0x7ff963edcc58
        3⤵
          PID:3488
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1632,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1628 /prefetch:2
          3⤵
            PID:1600
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:3
            3⤵
              PID:3712
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:8
              3⤵
                PID:4848
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:1472
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4028
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4576,i,869160549744774328,15586966434727408192,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3980
            • C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe
              C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe /stext "C:\Users\Admin\AppData\Local\Temp\mgkbazjwsvguun"
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5016
            • C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe
              C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe /stext "C:\Users\Admin\AppData\Local\Temp\paxtbsuygeyheboqc"
              2⤵
              • Accesses Microsoft Outlook accounts
              • System Location Discovery: System Language Discovery
              PID:3112
            • C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe
              C:\Users\Admin\AppData\Local\Temp\ad4a934328e699a5065c7c55ab3399d74134b5e97401175948b5296faf98d2a8.exe /stext "C:\Users\Admin\AppData\Local\Temp\zudmccnscmqmhhculisr"
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1580
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
              2⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Modifies registry class
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              PID:1636
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff9559246f8,0x7ff955924708,0x7ff955924718
                3⤵
                  PID:3384
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
                  3⤵
                    PID:2636
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
                    3⤵
                      PID:1392
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:8
                      3⤵
                        PID:2904
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:2500
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:3912
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:452
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2220,16298204539622347018,12188676394932468620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:4000
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:5056
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:896
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:264

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          42bea837cdb0ebb1b0621ba40cd9fe2a

                          SHA1

                          7c6f29d75989569f66f965a4449afa767f88d3dc

                          SHA256

                          7f6b1a56cb40fe326377c2dada843d71aeeb51e5036369be881d5280e34ff2ed

                          SHA512

                          8a61528bae8276cfde699a2f7fc75db79fe062020a5472f42281ddcdf5db126b6e7a3b19a714a872fd34adb5eacfe0778bc57fbe917533d6bb0e92a0ad49ab91

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          82801ca22b7ffaccd4088005a75e5c62

                          SHA1

                          6cc768b8d7c4bd94564b1ae1b13cdb7078d92d27

                          SHA256

                          6a4dfef7b4bea2c51849cd16830cb02323352940e22e6290297c2052db39a129

                          SHA512

                          f7b849919ffd119cb5f74057571c3fabe76ac81863afee8f597070adf0c3a6c74a36c060887eb18fa74a845c5acc2756cb95792306f71b899617ef0a1b1c0e11

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          9dcffe7969fd6fb5c661490a9c96e9ee

                          SHA1

                          60c2993deb5db0138ac1ffd7ecd9ba958205ac27

                          SHA256

                          ce0b669d42460ac53aa0a5e3a23c23122744b1c2de900fa572f368e46423262a

                          SHA512

                          60ab869fa4419a6384383d8e085a731768642dc8122e5300eca59eb69569e7e9b924e4727150ff6d70e8bce167c4a0c82266eb9da13c02258d204d831691ab87

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                          Filesize

                          20B

                          MD5

                          9e4e94633b73f4a7680240a0ffd6cd2c

                          SHA1

                          e68e02453ce22736169a56fdb59043d33668368f

                          SHA256

                          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                          SHA512

                          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          bcc282947112572009c3a23acfd8cb27

                          SHA1

                          2426a0659b33070ede5c2b978e6be085d3bee7ec

                          SHA256

                          526618f88a0f07abb38bef257d44e18e90f0a5936912614ad316a2e81c13f606

                          SHA512

                          71f12b1ece59550a89578f4ab48434f28cd46e4c800f2adf9b109c08dcd416f1d25fc9542cf62e8182d6963fe81559214612c025f88f2b32947d94052ce0dd5f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index

                          Filesize

                          24B

                          MD5

                          54cb446f628b2ea4a5bce5769910512e

                          SHA1

                          c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                          SHA256

                          fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                          SHA512

                          8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          9cc6c7dae3e75100a3b7c788d6dad0de

                          SHA1

                          0efe94681c04885a56eaa6b427d423b85da8ad15

                          SHA256

                          a38ac30ca3fdc6d3935406e3949f8aff57dd50a7fb3dbca562199f146ddebec8

                          SHA512

                          0b0644a967c254061daa08d81c11481a641f1bf79053a7d019a6003d35b420ce92e23862057340315d6ebc69eea7fc94d50c4f3fa1c04a2ec496413bc29c036f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extension State\LOG

                          Filesize

                          261B

                          MD5

                          3759c8c67cab0a34ed9fb87858ab202b

                          SHA1

                          fb62d16ee75329723211ce4c1d0226761f7b1376

                          SHA256

                          b371e2f23f7a7b068eac7edbef518a18d1201aac1e11d0c13e35a6a08fcf0385

                          SHA512

                          a9d526c9018b3cb99edad83e6b3c6913a3b09f38f64e57339ec067ba4a799f525816c6469248ffcd945b8afba6630be33d3123e9c2e33a6d91fe11f4070bb863

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                          Filesize

                          20KB

                          MD5

                          b40e1be3d7543b6678720c3aeaf3dec3

                          SHA1

                          7758593d371b07423ba7cb84f99ebe3416624f56

                          SHA256

                          2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                          SHA512

                          fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                          Filesize

                          256KB

                          MD5

                          6b7cb615c94f2e02ad8901218af7ca9e

                          SHA1

                          ea279f7ebdc77a460057b56033ad20aa12a0ae85

                          SHA256

                          71b36a066906c6e6ba6e05efe1a8657f997b02513fc57672b13b444b1dfaa5ed

                          SHA512

                          ec2cbc14b56b6d90d70d87ed09f948bbe0cda4a4713d4c93bb531df0aa316ed91d05d6d681ae2d0d288804550798286e3a38473d17cb4552c3b194856f51b18c

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                          Filesize

                          192KB

                          MD5

                          d30bfa66491904286f1907f46212dd72

                          SHA1

                          9f56e96a6da2294512897ea2ea76953a70012564

                          SHA256

                          25bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907

                          SHA512

                          44115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                          Filesize

                          277B

                          MD5

                          2b4ad1d78c6a123e99e97b8bb9aeb001

                          SHA1

                          18b98f859799b8ae172741319b1dbe535a3e8fb4

                          SHA256

                          4fcd571190e0f7a497e95ef1c7859d7845246dd44f44541b85d91e8474487c13

                          SHA512

                          b1fec662e2a75d217e44153f6ca352fed576861036b69df8e296f83308dfa8d45c464e4164990f26606c5d7518a48ed7f07e9e7fd9af85b362ad2fb2e4733716

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                          Filesize

                          40KB

                          MD5

                          a182561a527f929489bf4b8f74f65cd7

                          SHA1

                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                          SHA256

                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                          SHA512

                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Microsoft Edge.lnk

                          Filesize

                          1KB

                          MD5

                          21729b623049471a9d31438304358488

                          SHA1

                          c6700e7f3d0f275b92ac2cb6d174b7fdd2c08449

                          SHA256

                          755a874fae65b5e5383a0f3f28e6879761c4fd3cc097cc4a1681fdce599faacb

                          SHA512

                          198ce62408e6a768fdb5cb3333277be2e522a13c1dd13cafc6c2e7483265f66816e90baeab3d9d80d3483b17892a43aa40137e73bad0c9924cdd52bd6dd0d56c

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                          Filesize

                          20KB

                          MD5

                          27e7080081c7277a77705cee2e1dd423

                          SHA1

                          2cf338ca0f2dbf88bc8c807809c84039fe856f44

                          SHA256

                          2be44bb697fbd141db7f530cea0f7085615cf83b42ad406303247f44f5e163f9

                          SHA512

                          f843133d194f4f47c78ed2ff76a86f89071662160d738a419aac52ba42443b46bd21fcbcb85a10e11a26c25c2b863be38e64cea0642f34c18f7a028079c89920

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          1KB

                          MD5

                          75ccd15392c32f5789d56473fcf12106

                          SHA1

                          590e8f29c5d1a2ae786e9caf8b2a7df8b182cd83

                          SHA256

                          a5941cbeead39a0ddb8238c464666c8b6b92ec3e2969d9d573e523150426ad48

                          SHA512

                          ca0d9fb42c3238cc1c8029594d44458ad6dc9b9f12fb40a4085390b2dab81081af651d665678658e7511f281304b4e149e3d7bb82b507d2025497c9019a461bb

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          a33c5417d654aeec800481464c64e454

                          SHA1

                          8f3a175ba766f75f2eb8ed2a6792a742329dda7c

                          SHA256

                          d0ea973aab131643454fe609ee568db1a8a9f874954bfb83f1999496b70f71a9

                          SHA512

                          eeac3d7a25ec94c57ee2f7493a6aacb6974c7f7f3f8441eab0429cf3525ce9a09b3d106f7520fb06da9daad04e9b06c317dd453cfa659b493fe66d746cadb39a

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          d9da18553748a7dc5c566464b0548336

                          SHA1

                          d822818c3e1fc35aeae1f4e7a9bf09d54b419d61

                          SHA256

                          202353c8bec7eae0ffa43fd9f6b1c0f3d88080c5d60b462641df6bc9970a180a

                          SHA512

                          c492d453f0a8dfd54010a26117e8320d4a05bc0a6197fe3439759b6f35c9de6db4052b5efb59b8ac3110ea1434f401274095083ced15f1313b2cd83659993414

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          8e666197f26d403b7473ec273b4ae165

                          SHA1

                          e824ab02c45390db969bc93bd1a45963396e1c36

                          SHA256

                          94d77e580b2c08409a527e2305bccae0402731d130618038bd0c149b195a3d09

                          SHA512

                          4a3da340044a0705939f656fb64b668a8d1a0b26792b54a9e7c5ca335a364e5539197ddc1868981112620cf89d1bbcf0b42d908cb88736a2214fe178e2ee2fc0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                          Filesize

                          241B

                          MD5

                          9082ba76dad3cf4f527b8bb631ef4bb2

                          SHA1

                          4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                          SHA256

                          bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                          SHA512

                          621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                          Filesize

                          277B

                          MD5

                          8737d7546b2f02a75df4be116f38e66b

                          SHA1

                          7cd20f2e8b741332fb08a154ca1094fc61f49a2a

                          SHA256

                          93288a06794ad2dfdaafe2b19e38ed567c011e5eb02ec9cf93e95ffa68f99533

                          SHA512

                          cdbb04f31fbe357e33c3f4db38b4dcb5288b75b804825b94878e418c0874f5d09866e196f2854d4e5807a5a011bbaead2341d5b0937e240881e5c876cf5bfb88

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\000003.log

                          Filesize

                          80B

                          MD5

                          69449520fd9c139c534e2970342c6bd8

                          SHA1

                          230fe369a09def748f8cc23ad70fd19ed8d1b885

                          SHA256

                          3f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277

                          SHA512

                          ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\LOG

                          Filesize

                          265B

                          MD5

                          739b9bc61cdd96d42e8bd5359f8cee86

                          SHA1

                          5f395f0a37b8e6b715460b476ec9f87ac6fc304c

                          SHA256

                          898829337db6b934eaa4b348bd8f724204bc8357706df3867b92da15816c98e6

                          SHA512

                          7878b313712024b8cf0d81cbcd01ee01b99e42d2504ffa595c262d6e7aee69f8de6a704d0511d151cdeafbfd394f9a003942fe199290866494f20fbb69a5be24

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                          Filesize

                          40B

                          MD5

                          148079685e25097536785f4536af014b

                          SHA1

                          c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                          SHA256

                          f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                          SHA512

                          c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                          Filesize

                          291B

                          MD5

                          6df3d333f1b1f719286c5ee01f9024dd

                          SHA1

                          0d685c3c015df230ea99050f45b22ff65c656f51

                          SHA256

                          6110ef2051eefa064f3f212c3da860affcf5ebee3024c84a930626397ec96080

                          SHA512

                          0a89b843249b8d7b23896b6bcd53871d7d6425c95892bde37555db2e212e94d4be213d88fd933fcc117c5a77be23aaaf25682e981cecdf6aacba64a3ee004f78

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                          Filesize

                          46B

                          MD5

                          90881c9c26f29fca29815a08ba858544

                          SHA1

                          06fee974987b91d82c2839a4bb12991fa99e1bdd

                          SHA256

                          a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                          SHA512

                          15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                          Filesize

                          267B

                          MD5

                          aee0063a7595a796efcddee3c724cd76

                          SHA1

                          dbe9de5075da8a86c7e18ccad4941c923aadbd11

                          SHA256

                          18524e64084d69eaf6b18d9e07323de9252660c0d661f8b0799edcb2cb12396a

                          SHA512

                          ceb9bebe96ea9a572eb5d6911e639935404c55885bd36c7dcd16371d861361da21468c8dacce793f2802334466f5a5e4ec4f19f12c5a7da0346fa49f934d17fc

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                          Filesize

                          20KB

                          MD5

                          986962efd2be05909f2aaded39b753a6

                          SHA1

                          657924eda5b9473c70cc359d06b6ca731f6a1170

                          SHA256

                          d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                          SHA512

                          e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                          Filesize

                          128KB

                          MD5

                          c1d90333f58d3bb035718fe5e27ed71a

                          SHA1

                          ebfece537ba002474edf55cb68f85497f0d05931

                          SHA256

                          ee02a3c62130739253ef9cc68fd30fe9b9e4b3f86eef619c13dc0a352c5859d4

                          SHA512

                          0ad4d04e61dbd5d59804eb5f1a8225ef48d9c0249669b266d6de01cf60773501bf32f158dbbde34504247567285b3a547ce165dd2ac7b00231f9844d4853af62

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                          Filesize

                          114KB

                          MD5

                          4d8d1cd7da9a68d6565df94cac34376f

                          SHA1

                          cb4e1be8cf086ffd2eb2f7bccb397098fff294bb

                          SHA256

                          23e90f19f33767a934ea0baff88b460b52bfc7b5a128e1f74a0b681d7163438e

                          SHA512

                          97a18498751bcb8f2d78ff47a1a655a4586b39160bca030664714bf9671f4ec69e56f9e1463c9fd50b95d1ccbf9ae61964b3e098628be1d9a25b327a1185eb9b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\000003.log

                          Filesize

                          4KB

                          MD5

                          fe1277a14f1c15059bb2e3d373ad372a

                          SHA1

                          74ba38f66370b69fa598894f48f594c46f25f901

                          SHA256

                          4412c066293147982cfe2f64fcc0a2a3b6452d89ef36b6eb27bbc5acbfa25369

                          SHA512

                          c1214834e140325cc00fa009869125620e7304fe0d02012e4cc97b08d552d7216e5e2c835b53e2064d3baaa45be8e0d1efb4543447d95da22296617a617cbab6

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\LOG

                          Filesize

                          263B

                          MD5

                          247148f3757545dffd3964fb71258b76

                          SHA1

                          acd0ee5d47898b5e28f6ec9bf2e17500da3eb9ba

                          SHA256

                          85e06b0ed00662dbc8121584c6a3e0aad7b4fc09cc1b08ef02277c5192fe8c96

                          SHA512

                          bb34b372a5c2f082d8fe9c839717e8f79fa87e234a94db77b2122ea6d6aaf3cb133b32381a3347314e47dae9418ae35845bc707912589fa3c3bf546307a3238e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\000003.log

                          Filesize

                          682B

                          MD5

                          7ab458a4fa07c7e06ca5173b18ed6bb0

                          SHA1

                          a4f88c744774e3fbd13506591f773497cb9e1c16

                          SHA256

                          49639c5043b7cf02b4f56c0817c27b53617b19aad4af9fa096d3a6e3d4f99df6

                          SHA512

                          a295a4a04357027825b8a15fd726e442b0899ea93e321a2f139580452e9e99d8f77e0f969a63e11ba309fa33aa09c08c695e0db9d5b413670384cbe425df970b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\LOG

                          Filesize

                          281B

                          MD5

                          5720786e5a6611d7b3af918a45e8e933

                          SHA1

                          93a6b6ff1f38341e8efbcbe47e183da2d84d5cb2

                          SHA256

                          9cd2fca11bb5054e78e5ac1238179a67e9188c8ed02ea605c385bca84bcd5b32

                          SHA512

                          19e85a5f2e39ba466f0c138c1eb3af5a76e07c625c147dc617842e6f66280c2409887c98cf94caac0bb6268742b12211388d446f4c537afa739b35cf0d6a82d2

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                          Filesize

                          8KB

                          MD5

                          cf89d16bb9107c631daabf0c0ee58efb

                          SHA1

                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                          SHA256

                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                          SHA512

                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                          Filesize

                          264KB

                          MD5

                          d0d388f3865d0523e451d6ba0be34cc4

                          SHA1

                          8571c6a52aacc2747c048e3419e5657b74612995

                          SHA256

                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                          SHA512

                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                          Filesize

                          8KB

                          MD5

                          0962291d6d367570bee5454721c17e11

                          SHA1

                          59d10a893ef321a706a9255176761366115bedcb

                          SHA256

                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                          SHA512

                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                          Filesize

                          8KB

                          MD5

                          41876349cb12d6db992f1309f22df3f0

                          SHA1

                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                          SHA256

                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                          SHA512

                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                          Filesize

                          11B

                          MD5

                          838a7b32aefb618130392bc7d006aa2e

                          SHA1

                          5159e0f18c9e68f0e75e2239875aa994847b8290

                          SHA256

                          ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                          SHA512

                          9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          116KB

                          MD5

                          bca6e5152939da783a6cf1218ded2eaa

                          SHA1

                          e7b8962475c73a43383746d8c4a1fbb89dedd255

                          SHA256

                          59f2094eed200c49811e724a98eeaa5a7e7958dc341470259631e8894589079f

                          SHA512

                          a8cdcad8cf7b6e1481e2b4b9d4c2b2b20906025f16525d8fb94474bc0736883381e499e6da9ca880fd7d04da090e3dbedbab84c6e20c7b6781446ddf83519bfc

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          8KB

                          MD5

                          dbe8f9d08f2b81a4e0cf66b5bc187de7

                          SHA1

                          942545d1e8578d4f839ad3413c9ad0d601aa7523

                          SHA256

                          c6c7ea232a8c95e87dc0ca4a8457d878df8ecac9071f1b5f71f879366ca7bcbf

                          SHA512

                          ea0198e2622558f1fb32792cae0aa6bc465aee9f503801c33085720d23cc2fdaf14de1468ed56f594ee07ad63b56cfb7c89893c55d4fbcbb7273e8e428839262

                        • C:\Users\Admin\AppData\Local\Temp\mgkbazjwsvguun

                          Filesize

                          4KB

                          MD5

                          17eece3240d08aa4811cf1007cfe2585

                          SHA1

                          6c10329f61455d1c96e041b6f89ee6260af3bd0f

                          SHA256

                          7cc0db44c7b23e4894fe11f0d8d84b2a82ad667eb1e3504192f3ba729f9a7903

                          SHA512

                          a7de8d6322410ec89f76c70a7159645e8913774f38b84aafeeeb9f90dc3b9aa74a0a280d0bb6674790c04a8ff2d059327f02ebfda6c4486778d53b7fc6da6370

                        • memory/1580-28-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1580-31-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1580-30-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1580-34-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1580-35-0x0000000000430000-0x00000000004F9000-memory.dmp

                          Filesize

                          804KB

                        • memory/1580-39-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/3112-33-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/3112-17-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/3112-27-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/3112-22-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/3456-175-0x0000000000400000-0x000000000047F000-memory.dmp

                          Filesize

                          508KB

                        • memory/3456-115-0x0000000002290000-0x00000000022A9000-memory.dmp

                          Filesize

                          100KB

                        • memory/3456-3-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/3456-4-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/3456-150-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/3456-116-0x0000000002290000-0x00000000022A9000-memory.dmp

                          Filesize

                          100KB

                        • memory/3456-118-0x0000000000400000-0x000000000047F000-memory.dmp

                          Filesize

                          508KB

                        • memory/3456-5-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/3456-112-0x0000000002290000-0x00000000022A9000-memory.dmp

                          Filesize

                          100KB

                        • memory/3456-6-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/3456-0-0x0000000010000000-0x0000000010034000-memory.dmp

                          Filesize

                          208KB

                        • memory/5016-23-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/5016-16-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/5016-20-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/5016-71-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/5016-21-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB