Overview
overview
4Static
static
4iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.exe
windows7-x64
1iU�...��.exe
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.exe
windows7-x64
1iU�...��.exe
windows10-2004-x64
1iU�...��.dll
windows7-x64
1iU�...��.dll
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1iU�...��.pdf
windows7-x64
1iU�...��.pdf
windows10-2004-x64
1iU�...��.url
windows7-x64
1iU�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
65s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2022 10:13
Behavioral task
behavioral1
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.pdf
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
iUjs]pƹuΫ X-Mouse Button Control K��.url
Resource
win10v2004-20220901-en
General
-
Target
iUjs]pƹuΫ X-Mouse Button Control K��.pdf
-
Size
1.4MB
-
MD5
b11272d89acf12962f34b73f5733cb50
-
SHA1
6e1b927f236c6554675481705139e24edc666a66
-
SHA256
2df3b24b2d3aa29d1ac2b4df8180ce9fc119b6d84328d9f2a47f60dfe1ebb64c
-
SHA512
f70ea16064c86b7e25799044126a7992484c16b8126643b229fe3f0df275294660e8458d6462f781cab54ddf50723f88613c1014c3e31844ab34525e6aca35a9
-
SSDEEP
24576:afuFjjzwZs4O71KcbiurjfvMgR9t1D7WS0HIEsEKkhSU0mv+rXhhp3c:5KivZ6WnvtV71CsEKk4U0BhhJc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3108 wrote to memory of 5016 3108 AcroRd32.exe RdrCEF.exe PID 3108 wrote to memory of 5016 3108 AcroRd32.exe RdrCEF.exe PID 3108 wrote to memory of 5016 3108 AcroRd32.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 1628 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe PID 5016 wrote to memory of 4912 5016 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\iUjs]pƹuΫ X-Mouse Button Control K��.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AEB711AA46308E8899B24C69EDD930AF --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1628
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=74E6D473AE89212A077B3C512B0125BB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=74E6D473AE89212A077B3C512B0125BB --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:4912
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E9C154E30117235A8F0DD0BA4BE1716A --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3256
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0CD528FEA68D20126FBCF90BC1E1E2D7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0CD528FEA68D20126FBCF90BC1E1E2D7 --renderer-client-id=5 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵PID:4344
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DF1ABE1182C56F35143AF47E32A25040 --mojo-platform-channel-handle=1960 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F8D66DE25380A2CFE9BA7AC692722A17 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4576
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040