Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe
-
Size
4.2MB
-
MD5
4506d4833a0c9173318806c603f14a3c
-
SHA1
aa4ad783dfe3cc6b0b9612814ed9418253203c50
-
SHA256
c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074
-
SHA512
10d6f3bd0fcf0e3ebe156794731bef010dd0f997ed080718e58a213c5c3f6a8b0dcb4ebfb55f10bf66ae2435cbe4494757d296010ecc4969cbb8d8fc3e621a04
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 512 winchk32.exe 1080 winchk32.exe 1916 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 3520 rutserv.exe 1876 Explorer.EXE 4960 rutserv.exe 4872 rfusclient.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 512 set thread context of 1080 512 winchk32.exe 70 PID 1916 set thread context of 2112 1916 winchk32.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 1080 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 1876 Explorer.EXE 1876 Explorer.EXE 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe 3520 rutserv.exe 3520 rutserv.exe 2244 winchk64.exe 2244 winchk64.exe 3520 rutserv.exe 3520 rutserv.exe 2112 winchk32.exe 2112 winchk32.exe 2244 winchk64.exe 2244 winchk64.exe 2112 winchk32.exe 2112 winchk32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1876 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1080 winchk32.exe Token: SeDebugPrivilege 2112 winchk32.exe Token: SeDebugPrivilege 2244 winchk64.exe Token: SeDebugPrivilege 3520 rutserv.exe Token: SeTakeOwnershipPrivilege 4960 rutserv.exe Token: SeTcbPrivilege 4960 rutserv.exe Token: SeTcbPrivilege 4960 rutserv.exe Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3820 AcroRd32.exe 3520 rutserv.exe 3820 AcroRd32.exe 4960 rutserv.exe 3820 AcroRd32.exe 3820 AcroRd32.exe 3820 AcroRd32.exe 3820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 512 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 68 PID 3604 wrote to memory of 512 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 68 PID 3604 wrote to memory of 512 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 68 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 512 wrote to memory of 1080 512 winchk32.exe 70 PID 1080 wrote to memory of 1268 1080 winchk32.exe 71 PID 1080 wrote to memory of 1268 1080 winchk32.exe 71 PID 1080 wrote to memory of 1268 1080 winchk32.exe 71 PID 1268 wrote to memory of 1480 1268 cmd.exe 73 PID 1268 wrote to memory of 1480 1268 cmd.exe 73 PID 1268 wrote to memory of 1480 1268 cmd.exe 73 PID 1080 wrote to memory of 1696 1080 winchk32.exe 74 PID 1080 wrote to memory of 1696 1080 winchk32.exe 74 PID 1080 wrote to memory of 1696 1080 winchk32.exe 74 PID 1696 wrote to memory of 1916 1696 cmd.exe 76 PID 1696 wrote to memory of 1916 1696 cmd.exe 76 PID 1696 wrote to memory of 1916 1696 cmd.exe 76 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 1916 wrote to memory of 2112 1916 winchk32.exe 77 PID 2112 wrote to memory of 2380 2112 winchk32.exe 81 PID 2112 wrote to memory of 2380 2112 winchk32.exe 81 PID 2112 wrote to memory of 2380 2112 winchk32.exe 81 PID 2112 wrote to memory of 2412 2112 winchk32.exe 78 PID 2112 wrote to memory of 2412 2112 winchk32.exe 78 PID 2112 wrote to memory of 2412 2112 winchk32.exe 78 PID 2112 wrote to memory of 1876 2112 winchk32.exe 12 PID 2380 wrote to memory of 2244 2380 cmd.exe 82 PID 2380 wrote to memory of 2244 2380 cmd.exe 82 PID 3604 wrote to memory of 3820 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 83 PID 3604 wrote to memory of 3820 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 83 PID 3604 wrote to memory of 3820 3604 c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe 83 PID 2412 wrote to memory of 3520 2412 cmd.exe 84 PID 2412 wrote to memory of 3520 2412 cmd.exe 84 PID 2412 wrote to memory of 3520 2412 cmd.exe 84 PID 2244 wrote to memory of 1876 2244 winchk64.exe 12 PID 4960 wrote to memory of 4872 4960 rutserv.exe 87 PID 4960 wrote to memory of 4872 4960 rutserv.exe 87 PID 4960 wrote to memory of 4872 4960 rutserv.exe 87 PID 3820 wrote to memory of 4560 3820 AcroRd32.exe 88 PID 3820 wrote to memory of 4560 3820 AcroRd32.exe 88 PID 3820 wrote to memory of 4560 3820 AcroRd32.exe 88 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90 PID 4560 wrote to memory of 1472 4560 RdrCEF.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe"C:\Users\Admin\AppData\Local\Temp\c583941fbe12187c3cad31de199365f0461f57f0f56dfe07b241926a83bee074.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe" /inst /xwait3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe" /inst /xwait4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.execmd.exe /C xcopy /Y /E /Q * C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\5⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\xcopy.exexcopy /Y /E /Q * C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\6⤵
- Enumerates system info in registry
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe8⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3520 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe -second10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rfusclient.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rfusclient.exe /tray /user11⤵
- Executes dropped EXE
PID:4872
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exe /inj8⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exe /inj9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ZPDG.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=486317686DADAFA18059C6366A1B18CB --mojo-platform-channel-handle=1664 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=629DD42EC5F1F73F7ACA754AE7751052 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=629DD42EC5F1F73F7ACA754AE7751052 --renderer-client-id=2 --mojo-platform-channel-handle=1688 --allow-no-sandbox-job /prefetch:15⤵PID:1556
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E829DCE081B7CA1102057DAAD725DD9 --mojo-platform-channel-handle=2248 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=65516165D3D8E112BBBB30C52A1E17D4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=65516165D3D8E112BBBB30C52A1E17D4 --renderer-client-id=5 --mojo-platform-channel-handle=1664 --allow-no-sandbox-job /prefetch:15⤵PID:2740
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=45AB247F5BF5E5D5709A72929BEB8EDF --mojo-platform-channel-handle=2272 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1176
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA4D41692985871D4532239C916B1123 --mojo-platform-channel-handle=2632 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3208
-
-
-
-