Analysis
-
max time kernel
168s -
max time network
174s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:24
Static task
static1
Behavioral task
behavioral1
Sample
36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe
-
Size
4.2MB
-
MD5
946142c3d34b736bbc890fa64ae09efe
-
SHA1
421f52733d334be32c899670426c06cb72d92cde
-
SHA256
36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216
-
SHA512
e9088eea723f732ba1a19ee1d81b09b0c5e3442a6c8cd2f537c86060548acb936bdcfa4c14ecde34a223bd72ed3776c887691af2afa781950a26181b13906d54
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 2904 winchk32.exe 1020 winchk32.exe 1700 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 2704 rutserv.exe 1876 Explorer.EXE 4820 rutserv.exe 4992 rfusclient.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe File opened for modification C:\Windows\SysWOW64\rutserv.pdb rutserv.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2904 set thread context of 1020 2904 winchk32.exe 70 PID 1700 set thread context of 1852 1700 winchk32.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1020 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe 1876 Explorer.EXE 1876 Explorer.EXE 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 2676 winchk64.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 1852 winchk32.exe 2676 winchk64.exe 2676 winchk64.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe 2676 winchk64.exe 2676 winchk64.exe 1852 winchk32.exe 1852 winchk32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1876 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1020 winchk32.exe Token: SeDebugPrivilege 1852 winchk32.exe Token: SeDebugPrivilege 2676 winchk64.exe Token: SeDebugPrivilege 2704 rutserv.exe Token: SeTakeOwnershipPrivilege 4820 rutserv.exe Token: SeTcbPrivilege 4820 rutserv.exe Token: SeTcbPrivilege 4820 rutserv.exe Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE Token: SeShutdownPrivilege 1876 Explorer.EXE Token: SeCreatePagefilePrivilege 1876 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2704 rutserv.exe 4820 rutserv.exe 2700 AcroRd32.exe 2700 AcroRd32.exe 2700 AcroRd32.exe 2700 AcroRd32.exe 2700 AcroRd32.exe 2700 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 2904 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 68 PID 3620 wrote to memory of 2904 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 68 PID 3620 wrote to memory of 2904 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 68 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 2904 wrote to memory of 1020 2904 winchk32.exe 70 PID 1020 wrote to memory of 1080 1020 winchk32.exe 71 PID 1020 wrote to memory of 1080 1020 winchk32.exe 71 PID 1020 wrote to memory of 1080 1020 winchk32.exe 71 PID 1080 wrote to memory of 1316 1080 cmd.exe 73 PID 1080 wrote to memory of 1316 1080 cmd.exe 73 PID 1080 wrote to memory of 1316 1080 cmd.exe 73 PID 1020 wrote to memory of 1564 1020 winchk32.exe 74 PID 1020 wrote to memory of 1564 1020 winchk32.exe 74 PID 1020 wrote to memory of 1564 1020 winchk32.exe 74 PID 1564 wrote to memory of 1700 1564 cmd.exe 76 PID 1564 wrote to memory of 1700 1564 cmd.exe 76 PID 1564 wrote to memory of 1700 1564 cmd.exe 76 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1700 wrote to memory of 1852 1700 winchk32.exe 77 PID 1852 wrote to memory of 2084 1852 winchk32.exe 78 PID 1852 wrote to memory of 2084 1852 winchk32.exe 78 PID 1852 wrote to memory of 2084 1852 winchk32.exe 78 PID 1852 wrote to memory of 2104 1852 winchk32.exe 79 PID 1852 wrote to memory of 2104 1852 winchk32.exe 79 PID 1852 wrote to memory of 2104 1852 winchk32.exe 79 PID 1852 wrote to memory of 1876 1852 winchk32.exe 23 PID 2084 wrote to memory of 2676 2084 cmd.exe 82 PID 2084 wrote to memory of 2676 2084 cmd.exe 82 PID 3620 wrote to memory of 2700 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 84 PID 3620 wrote to memory of 2700 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 84 PID 3620 wrote to memory of 2700 3620 36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe 84 PID 2104 wrote to memory of 2704 2104 cmd.exe 83 PID 2104 wrote to memory of 2704 2104 cmd.exe 83 PID 2104 wrote to memory of 2704 2104 cmd.exe 83 PID 2676 wrote to memory of 1876 2676 winchk64.exe 23 PID 4820 wrote to memory of 4992 4820 rutserv.exe 87 PID 4820 wrote to memory of 4992 4820 rutserv.exe 87 PID 4820 wrote to memory of 4992 4820 rutserv.exe 87 PID 2700 wrote to memory of 4572 2700 AcroRd32.exe 88 PID 2700 wrote to memory of 4572 2700 AcroRd32.exe 88 PID 2700 wrote to memory of 4572 2700 AcroRd32.exe 88 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90 PID 4572 wrote to memory of 1188 4572 RdrCEF.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe"C:\Users\Admin\AppData\Local\Temp\36329712a21bc2a49d1e13920b3f7b647793f046e67a3c62aa7474ce61be0216.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe" /inst /xwait3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\winchk32.exe" /inst /xwait4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd.exe /C xcopy /Y /E /Q * C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\5⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\xcopy.exexcopy /Y /E /Q * C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\6⤵
- Enumerates system info in registry
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk32.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exe /inj8⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\winchk64.exe /inj9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe8⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rutserv.exe -second10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rfusclient.exeC:\Users\Admin\AppData\Roaming\29D451CF-3548-4486-8465-A23029B8F6FA\101\rfusclient.exe /tray /user11⤵
- Executes dropped EXE
PID:4992
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ZPDG.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B3F2844079C7FAE4EECD390F7821DE86 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B3F2844079C7FAE4EECD390F7821DE86 --renderer-client-id=2 --mojo-platform-channel-handle=1664 --allow-no-sandbox-job /prefetch:15⤵PID:1188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7C3275B1538474F3BD383ED07054BE1E --mojo-platform-channel-handle=1784 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1160
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7ABA37C526B087F92C4B31481C02F50E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7ABA37C526B087F92C4B31481C02F50E --renderer-client-id=4 --mojo-platform-channel-handle=2120 --allow-no-sandbox-job /prefetch:15⤵PID:1220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=50D6F1EA42C4FCDC3CA54C50E8A847A8 --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2108
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D683AF045EEA4E30E5BD4684F0A5F9AB --mojo-platform-channel-handle=2012 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2952
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F98C00A902CDE3A54AABAE4977FC988E --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:828
-
-
-
-