Overview
overview
3Static
static
3A09 (1).pdf
windows7_x64
1A09 (1).pdf
windows10-2004_x64
1BANK ID 1~2-.jpg
windows7_x64
1BANK ID 1~2-.jpg
windows10-2004_x64
3BANK ID-.jpg
windows7_x64
1BANK ID-.jpg
windows10-2004_x64
3BRS.pdf
windows7_x64
1BRS.pdf
windows10-2004_x64
1DOC.pdf
windows7_x64
1DOC.pdf
windows10-2004_x64
1E id (1).pdf
windows7_x64
1E id (1).pdf
windows10-2004_x64
1IAP-.jpg
windows7_x64
3IAP-.jpg
windows10-2004_x64
3PAN B-.jpg
windows7_x64
1PAN B-.jpg
windows10-2004_x64
3PAN-.jpg
windows7_x64
3PAN-.jpg
windows10-2004_x64
3UID 1-.jpg
windows7_x64
1UID 1-.jpg
windows10-2004_x64
3UID-.jpg
windows7_x64
3UID-.jpg
windows10-2004_x64
3bankaccount.pdf
windows7_x64
1bankaccount.pdf
windows10-2004_x64
1download.jpg
windows7_x64
3download.jpg
windows10-2004_x64
3fw8imy.pdf
windows7_x64
1fw8imy.pdf
windows10-2004_x64
1id -f.jpg
windows7_x64
1id -f.jpg
windows10-2004_x64
3id-b.jpg
windows7_x64
3id-b.jpg
windows10-2004_x64
3Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
22-03-2022 07:30
Behavioral task
behavioral1
Sample
A09 (1).pdf
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
A09 (1).pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
BANK ID 1~2-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
BANK ID 1~2-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
BANK ID-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
BANK ID-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
BRS.pdf
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
BRS.pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
DOC.pdf
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
DOC.pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
E id (1).pdf
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
E id (1).pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
IAP-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral14
Sample
IAP-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
PAN B-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
PAN B-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
PAN-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
PAN-.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral19
Sample
UID 1-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
UID 1-.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
UID-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral22
Sample
UID-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
bankaccount.pdf
Resource
win7-20220310-en
Behavioral task
behavioral24
Sample
bankaccount.pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
download.jpg
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
download.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral27
Sample
fw8imy.pdf
Resource
win7-20220310-en
Behavioral task
behavioral28
Sample
fw8imy.pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
id -f.jpg
Resource
win7-20220311-en
Behavioral task
behavioral30
Sample
id -f.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral31
Sample
id-b.jpg
Resource
win7-20220311-en
Behavioral task
behavioral32
Sample
id-b.jpg
Resource
win10v2004-20220310-en
General
-
Target
A09 (1).pdf
-
Size
505KB
-
MD5
1f4a5c96a4407be44fd8cc2c404d5009
-
SHA1
0d4dd50c093c8bdb89a17319e4de7cd0bb18de9c
-
SHA256
e14cfdb7143e4c3f8aa7eeb39227bf35beee88735202e3e6e62b69bbbb5878b9
-
SHA512
8550d417aa20209a0ece09c15c7c124b1425c0d170ef7008779aa1f18fcfb88bc2126d49e444d369198326fca6a3ab203599ecf5024da04e192be22df4151877
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 892 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 892 AcroRd32.exe 892 AcroRd32.exe 892 AcroRd32.exe 892 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 892 wrote to memory of 4764 892 AcroRd32.exe RdrCEF.exe PID 892 wrote to memory of 4764 892 AcroRd32.exe RdrCEF.exe PID 892 wrote to memory of 4764 892 AcroRd32.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1696 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe PID 4764 wrote to memory of 1464 4764 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\A09 (1).pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BA65690DAE43B0CB9206FCBBE8922FF3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BA65690DAE43B0CB9206FCBBE8922FF3 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:1696
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=03B7C1FE80D093BC488CEA5EF201C1DE --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1464
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B9C16C4D9473531B655ADAD1EA43BBB5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B9C16C4D9473531B655ADAD1EA43BBB5 --renderer-client-id=4 --mojo-platform-channel-handle=2168 --allow-no-sandbox-job /prefetch:13⤵PID:2816
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61A96BF39D70DB107F1BB2B431336536 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4848
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F77F37BF5B257140EF70F6B745165BE5 --mojo-platform-channel-handle=2768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4232
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5D9564D5FD68D735A04FE7ECCB164170 --mojo-platform-channel-handle=2116 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1096