Technical Information
- %TEMP%\c14b.tmp
- from <Full path to file> to <PATH_SAMPLE>.docx
- 'co##############e-chains.prod.autograph.services.mozaws.net':443
- DNS ASK co##############e-chains.prod.autograph.services.mozaws.net
- '%TEMP%\c14b.tmp' --ping<Full path to file> A6EEE9BBA966C2F3024EE8E6E7CAEE975D7739C966A122AE6B3D4B72FBCA0799D3A660AAF23011A2CB7471898FEB0AF8BA4CB262D67DD99D3B0F024C264E4672
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.docx"
- '%TEMP%\c14b.tmp' --ping<Full path to file> A6EEE9BBA966C2F3024EE8E6E7CAEE975D7739C966A122AE6B3D4B72FBCA0799D3A660AAF23011A2CB7471898FEB0AF8BA4CB262D67DD99D3B0F024C264E4672' (with hidden window)