Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 06:29

General

  • Target

    5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe

  • Size

    10.6MB

  • MD5

    5f614b3d2a686b4995c38b91324d8fdb

  • SHA1

    72c298fb258d9e318aba64e900e91f3174cb2dbe

  • SHA256

    531313033fdb71c44c0791f56679e55c36f06fa6250f90f68ebaf42e7a2a044b

  • SHA512

    778c0d3ac4a7091cd09a5a9de4b3e41ea7c94c334af6219c85cf2f275feb3345adb42221193f6aac14e84fd1110ff52afb14cf24a7e7333bcbdf60fedb41681c

  • SSDEEP

    196608:NBHC8KwHrU6Ery5NXJZzkl3fP0puCSe3xb1WujMYJroJiPEgI2fPZdms:DC8K6rery5ZDzklPMpuCl50uXozCPZb

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Adds Run key to start application
      • Writes to the Master Boot Record (MBR)
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2548
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2088
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 11
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:264
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 5 -p 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1264
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 2#"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873" -p 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2212
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 5 -t 0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        PID:316
    • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
      "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --main-frame 0 --search-bar 2 --tray 1
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3004
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe" --breakpad="\\.\pipe\crashservice.1788.0.7162" --humming-dir="C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin" --main-frame="" --search-bar="" --service-exe="BaiduRenderClient.exe" --tray="" --xchannel="\\.\pipe\ipc.1788.0.7162" --xtype="service" /prefetch:1
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        PID:3032
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 3 -r 1788 -c 3 -m 7679401527536 --magic-number 7679401527536
        3⤵
        • Executes dropped EXE
        PID:2964
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 2 -r 1788 -c 4 -m 7679401527536 --magic-number 7679401527536
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        PID:2740
  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe
    C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    PID:2476

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\brp.exe

          Filesize

          905KB

          MD5

          f3482cb7643db3dfe3e78dd32514277c

          SHA1

          93c4f50c18128bc4a77b5d85826f3f29ce56f68a

          SHA256

          c8c300ab2b4bdebd6fdfe4e92b46be4977f851261677b5bd2500a10ce00771c7

          SHA512

          45c7a13b9781d87dd93b537d2589b53f13879ef7b78cb0c1a82622f256232cddb10cc93f43dfae96101d929b19676d538711c91731da37b0a122120acc8df16d

        • C:\Users\Admin\AppData\Local\Temp\mb_setup.log

          Filesize

          1KB

          MD5

          10f7df6d159ae3c7334f7d80ed890eb7

          SHA1

          cce3cd9c31a306a04bbbd4970fe49212985e8a6f

          SHA256

          c2ed7ab25c83b28d9a64911d58783b72bc2f2af6d372bd99fc4af3c7eb6bd4be

          SHA512

          b62c304b3c501c2e63423e9dc6f622d4d91f2ad17c2a5b7d1487c694779466fec134e11c7eebdb9512533692da7582d8d84924a08c99fc5214f21495f0bc3039

        • C:\Users\Admin\AppData\Local\Temp\mb_setup.log

          Filesize

          1KB

          MD5

          c24c3f8c95f5a3f8b8bf1a06fa91a469

          SHA1

          8758530843e7af229854c0efbaeff9cbf9ff11dd

          SHA256

          6ad57e079a1a8595b2e04b4a387fb66be31c156cab3b7bf3120185090e722d45

          SHA512

          e9a71f64a862bfc9e6e70fe3944d4da7f54efb7eed157684bc7a25442e0d179f6a528367aaa552814cd7edcdf2e3ed71e1315163b1693d1437a35ceb612862af

        • C:\Users\Admin\AppData\Roaming\Baidu\Baidu\pb\100.pb

          Filesize

          115B

          MD5

          0a046fc4ac62ca3278450db3c4d14330

          SHA1

          8d4cec6518773caab72c4ff79d138b62ea6c1337

          SHA256

          02fe395561c74e117eedd1ac5f9c5d9d2be407affde144421199623ac83da6b7

          SHA512

          0dd7829970f5406b5466017359eff58e70dd33f36092e9073ae68f2d4543cf2494dad39012705841286cbab6dcd9f84c603582e97dfaaea416e756741d419ba0

        • C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin\extends\LocalPluginInfo.xml

          Filesize

          2KB

          MD5

          6490060dad9933a77452e9485f773f3b

          SHA1

          b64330f4bf670385b2dcd03493ec8e34071b1815

          SHA256

          f4a28b882e04982c6de7eca8f63cf6329261b22cd2f5a136bc25097d5063dc64

          SHA512

          1e0d844db7bde7ab27af64b050fb6a4c31ac6732c349c5b9fa5f92241ba3fe2cadce5bff7f294fd4843c7e2bb368038dc3c47f29466413811830f4a045c7f9e1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\百度\百度.lnk

          Filesize

          1KB

          MD5

          3c6e884730e4da0aeb7a7f979bf5d8d0

          SHA1

          4f54504a3236d513bc05064d9032f4228acc65ab

          SHA256

          71acec8bb8582fd7c53f3eac9119b3fdf4798db3a7c9114a5dd8d055ac9a614d

          SHA512

          47a1b8742029ae2d60e5fb1c70ab73a53488fc211293d570710b25e11aabc80fcdbf6b0aeca0826c6f458cc724cfe7787469ad71028d4b973e124006f642716f

        • \Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe

          Filesize

          691KB

          MD5

          ba4c5f1d1bcfcb2ffd973415b7975399

          SHA1

          84859acf0e413a4feb037b2e51ba8aa42d6ceb7f

          SHA256

          8c31b32dfdb39274475ca2a061ad2280e91cd47425edeeb9a136909aa26c8df4

          SHA512

          e05549af52276b3c3bf1eee871c723d74da3d91350ce9c01da231101b61d8815cb4956e0f9a90c04dd08fc96a66eeb885ddf5819010f6f289e7df478c37ce11c

        • \Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\CommonWorker.dll

          Filesize

          54KB

          MD5

          d03ed968e344179761906e692764a23d

          SHA1

          9b060eb5db716eb91fb0a419a1179691c0c44593

          SHA256

          c9c6e7e2fb2197ab9fc47d4a6a7b88656aa22257ba8caf7fa0f5145434e1a3db

          SHA512

          6aa313d2d6c7200ef84686d48740df43348463566c5a39cffba77a545c000963e7d975617186ca079f68f3eb90079329b733efb46266dde4d9a7a2f9eead95c4

        • \Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\bdlog.dll

          Filesize

          37KB

          MD5

          56d1d9be11aec8560139c779f353155c

          SHA1

          b28a2b5b348fb49cd3222e6a804ab934d293bcf2

          SHA256

          cba98b57e8c9b5d9f34b68b2b9433187705c3ef65b11b0f20373ce5e05859c96

          SHA512

          33f65c8af6937cc680e95d3f638d6fd861ce4aedb3595c9cc16afdd072e63a36b9b6ee28aed033e5779679d2c73c943b81759abb96a6a31e5d823c9dbd27f247

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\BDMSkin.dll

          Filesize

          1.8MB

          MD5

          3f6dc271f034861cb4be850a816105e3

          SHA1

          d83f7a11d47d4668737ff64139870bad8a8722a0

          SHA256

          4f5d4dc959ccb0f201b2f2c761c74f6284ec90fe4d05e11813c63f584356205a

          SHA512

          2149b342a8bb8486faf3e7ffe43b6fe66bad4b93512ed668caccdf63399a48411b92b31c99a018c92e4590584d8c0111a483f8161ec179d5f92aba2e398fa76a

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\BaiduReport.dll

          Filesize

          355KB

          MD5

          33ac85604ff109e2a297c03fc1037bf1

          SHA1

          02be88a95fc04ec73c4ed33601f832e86d5f0bb3

          SHA256

          47c64647fe2ef3215e919295fd3627b25e85877a690d2ba940f4177cfef2678c

          SHA512

          80c3428e0bd0585f2c4076fc814b638aeab637b2a56b37febef08f75fad426b268fcc2409cc8d09738c23ffc7d56250683b157a5e452b4b43a2bf88d4f489826

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\Base.dll

          Filesize

          777KB

          MD5

          6fdcd6d9faf849ecd71d4fa329969780

          SHA1

          3480193f5e7a37bf8a01f728566b48d56850749b

          SHA256

          a31fbc3014712fca12637400897816c41f65627434bdde1f4c8c0c025f08bad2

          SHA512

          5a3ddbd1abda841bc06c210f612cfde3a48016991ea6a8dc5ee00574aee1904c70695226490986465c950bf09564bf56715d2c25fcee9931f33b82dcefc2c111

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\InstallHelper.dll

          Filesize

          242KB

          MD5

          f497a1c6f5f1faca1a05fbee72abc07a

          SHA1

          3af6939afd2cdfc3eb7e9f6ff4cf26d254f97923

          SHA256

          ec6a6f16902d84802d0a744a6537d7bebe40b4ad9c8bce4de012c3224c98030c

          SHA512

          3a523e91cf7e4bd3c83f4eb9a861f410fb2be7367514cb7cf9c47f9f6aa3bcf200640c53bd96acf11f2177938b27cad033f361d67eb6098cb40eb3538292d8ba

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\Protocol.dll

          Filesize

          355KB

          MD5

          a0ec723d41810478bb659a85e4e92f3d

          SHA1

          24cc9fc77abcafe0dd1c5a4e547a8b4efd63c85f

          SHA256

          dd57149bfa1348e482afddbbe79187527cbd358cdb3036fdf4e8b9f446d020cf

          SHA512

          ed98dff026eff8501a526dc36c5f68b63adc5a1704881015d6a9f7af53e5a3a47da6aad8d054b7f7cf0821f479a016f45ad20a1b201c263a09cf8265cd772c4d

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\Report.dll

          Filesize

          108KB

          MD5

          4ed3f52e01ac04d6b1fa05ff8a41c2fe

          SHA1

          9c363a2658db7deffe5358634320671ef6fc7664

          SHA256

          542440c178b553d4a1b01d83f05df6a1ba842571f4a9f90b06fdceab06336fe1

          SHA512

          8fcc515adc959c5b07b4c94400f6e39d75d9ba8a9556d7f4df8891a642b967f13b9f8302ff56bebac505a8a73a3bd4980e29406ccc918fb1dd3d7acc69f776ff

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\System.dll

          Filesize

          17KB

          MD5

          bdb492684b7a99ee0aa1d10c1f8bf702

          SHA1

          c7b8a53cf1481df2a4a7eb11aeb824ff8b3a4698

          SHA256

          4919ffc0acdada4f18469d7fc76abaec4584b99709bbd276c6e9a8043be76481

          SHA512

          479f996f7dfbad9fff8f4bf3493dcaaa680390919233fb875d08efc0e6b71a94db9eae510091496a4c99e09ed793aae87ef64bd80e55cbf94823848d2edc0d20

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\Utils.dll

          Filesize

          928KB

          MD5

          9ac5812dbee6e04f5d818dc5afb46480

          SHA1

          5232fb8d2ecb4cbbd52054741282cfb86fdd6e9d

          SHA256

          77ec589230c246ff136b9abe22691e978c30aff7c3e222be34195a671c8b3d8d

          SHA512

          970dd347a9d1a22dc02fba0ad1d8f7ac16c00dfca97045de5453ef8c7f64fac019d89aa2e1c69fb10ea3a29388a52c163da904d7b5abec95c18f0981a054c0e0

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\msvcp100.dll

          Filesize

          411KB

          MD5

          bc83108b18756547013ed443b8cdb31b

          SHA1

          79bcaad3714433e01c7f153b05b781f8d7cb318d

          SHA256

          b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

          SHA512

          6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

        • \Users\Admin\AppData\Local\Temp\nst82D.tmp\msvcr100.dll

          Filesize

          755KB

          MD5

          0e37fbfa79d349d672456923ec5fbbe3

          SHA1

          4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

          SHA256

          8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

          SHA512

          2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

        • memory/264-504-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/264-503-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/264-544-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/264-543-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/316-643-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/316-642-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/1184-590-0x0000000002580000-0x0000000002581000-memory.dmp

          Filesize

          4KB

        • memory/1264-576-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/1264-575-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/1476-520-0x0000000004C90000-0x0000000004C92000-memory.dmp

          Filesize

          8KB

        • memory/1476-58-0x0000000001F40000-0x0000000001F41000-memory.dmp

          Filesize

          4KB

        • memory/1788-579-0x0000000005550000-0x00000000055F6000-memory.dmp

          Filesize

          664KB

        • memory/1788-646-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/1788-581-0x0000000005090000-0x00000000050F4000-memory.dmp

          Filesize

          400KB

        • memory/1788-585-0x0000000003350000-0x0000000003364000-memory.dmp

          Filesize

          80KB

        • memory/1788-577-0x0000000003F30000-0x0000000003F79000-memory.dmp

          Filesize

          292KB

        • memory/1788-640-0x0000000003980000-0x0000000003993000-memory.dmp

          Filesize

          76KB

        • memory/1788-645-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/2088-552-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/2088-548-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/2212-549-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/2212-547-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/2476-648-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/2548-545-0x0000000077230000-0x0000000077277000-memory.dmp

          Filesize

          284KB

        • memory/2548-546-0x0000000076EA0000-0x0000000076ED5000-memory.dmp

          Filesize

          212KB

        • memory/3032-593-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/3032-617-0x0000000002A50000-0x0000000002AFB000-memory.dmp

          Filesize

          684KB

        • memory/3032-609-0x0000000000BF0000-0x0000000000C21000-memory.dmp

          Filesize

          196KB

        • memory/3032-607-0x0000000002CA0000-0x0000000002DF1000-memory.dmp

          Filesize

          1.3MB

        • memory/3032-605-0x0000000000190000-0x00000000001A4000-memory.dmp

          Filesize

          80KB

        • memory/3032-598-0x0000000000A60000-0x0000000000AC4000-memory.dmp

          Filesize

          400KB

        • memory/3032-594-0x0000000000200000-0x0000000000293000-memory.dmp

          Filesize

          588KB

        • memory/3032-596-0x00000000009B0000-0x0000000000A56000-memory.dmp

          Filesize

          664KB

        • memory/3032-591-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB