Technical Information
- %TEMP%\a736.tmp
- from <Full path to file> to <PATH_SAMPLE>.docx
- 'co##############e-chains.prod.autograph.services.mozaws.net':443
- DNS ASK co##############e-chains.prod.autograph.services.mozaws.net
- '%TEMP%\a736.tmp' --ping<Full path to file> 2DF338FFD4FD8D82363130E0BE64CA3C1E21D8D117C5D51EF31ECE2614D844D954AC0C46750EBB9D8B962A23A043A76F1DE2F637510E41DA9E0E5C6EA2221045
- '%ProgramFiles%\microsoft office\office14\winword.exe' /n "<PATH_SAMPLE>.docx"
- '%TEMP%\a736.tmp' --ping<Full path to file> 2DF338FFD4FD8D82363130E0BE64CA3C1E21D8D117C5D51EF31ECE2614D844D954AC0C46750EBB9D8B962A23A043A76F1DE2F637510E41DA9E0E5C6EA2221045' (with hidden window)