Overview
overview
8Static
static
Final Test...L.xlsx
windows7-x64
1Final Test...L.xlsx
windows10-2004-x64
1Final Tests/PDF.pdf
windows7-x64
1Final Tests/PDF.pdf
windows10-2004-x64
1Final Test...T.pptx
windows7-x64
1Final Test...T.pptx
windows10-2004-x64
1Final Tests/WORD.docx
windows7-x64
4Final Tests/WORD.docx
windows10-2004-x64
1Windows_Re...ox.exe
windows7-x64
1Windows_Re...ox.exe
windows10-2004-x64
6Windows_Re...xe.xml
windows7-x64
1Windows_Re...xe.xml
windows10-2004-x64
1files/7zG.exe
windows7-x64
1files/7zG.exe
windows10-2004-x64
1files/7za.exe
windows7-x64
1files/7za.exe
windows10-2004-x64
1files/ATPad/ATPad.exe
windows7-x64
3files/ATPad/ATPad.exe
windows10-2004-x64
3files/CheckDisk.exe
windows7-x64
4files/CheckDisk.exe
windows10-2004-x64
7files/DISM...FC.exe
windows7-x64
8files/DISM...FC.exe
windows10-2004-x64
1files/repa...rk.cmd
windows7-x64
files/repa...rk.cmd
windows10-2004-x64
1files/smartctl-nc.exe
windows7-x64
1files/smartctl-nc.exe
windows10-2004-x64
1updater.exe
windows7-x64
3updater.exe
windows10-2004-x64
6Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Final Tests/EXCEL.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Final Tests/EXCEL.xlsx
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Final Tests/PDF.pdf
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Final Tests/PDF.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Final Tests/POWERPOINT.pptx
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Final Tests/POWERPOINT.pptx
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Final Tests/WORD.docx
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Final Tests/WORD.docx
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Windows_Repair_Toolbox.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Windows_Repair_Toolbox.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Windows_Repair_Toolbox.exe.xml
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Windows_Repair_Toolbox.exe.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
files/7zG.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
files/7zG.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
files/7za.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
files/7za.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
files/ATPad/ATPad.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
files/ATPad/ATPad.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
files/CheckDisk.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
files/CheckDisk.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
files/DISM_And_SFC.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
files/DISM_And_SFC.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
files/repair_network.cmd
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
files/repair_network.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
files/smartctl-nc.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
files/smartctl-nc.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
updater.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
updater.exe
Resource
win10v2004-20221111-en
General
-
Target
Final Tests/PDF.pdf
-
Size
2KB
-
MD5
f1e3f944814f0789ea6bea1950ef9aa8
-
SHA1
ffcb40d54184e93acade7840c639b92356354c34
-
SHA256
68e8814fb04da1cfdc02cf88e89a68ebc6c98c23894c5cacd98d5aa5e52b3145
-
SHA512
864e1ec57f4ef15288d1e71e69fd22b52be921d653eb698002a6585c036523514fb982850cff5251594af721b333ed5858eb74b51de60671fe1fbef857df3c33
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4764 2180 AcroRd32.exe 81 PID 2180 wrote to memory of 4764 2180 AcroRd32.exe 81 PID 2180 wrote to memory of 4764 2180 AcroRd32.exe 81 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4008 4764 RdrCEF.exe 84 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85 PID 4764 wrote to memory of 4840 4764 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Final Tests\PDF.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=335F905A0395986929E04D0E75F4FC5B --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4008
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1FC8B37B267AC2E1EE0340D0867F90AE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1FC8B37B267AC2E1EE0340D0867F90AE --renderer-client-id=2 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job /prefetch:13⤵PID:4840
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=586CF132982ACAF5F445A50C721F13FE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=586CF132982ACAF5F445A50C721F13FE --renderer-client-id=4 --mojo-platform-channel-handle=2164 --allow-no-sandbox-job /prefetch:13⤵PID:204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=315EAC1E476B76F88CDC3CBBC46E8030 --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ACDF3E077DFAF6222C23FCCC6C19FCA5 --mojo-platform-channel-handle=1904 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7F7FA217BDFC5844A3334ECC30A80BAD --mojo-platform-channel-handle=1904 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4852
-
-