Zezal uses the masks shown below to search for files on the victim machine: * .exe And unloads the following processes from the memory: * C:\KLADStatTemp\216519
| Attributes | Values |
|---|---|
| rdf:type | |
| rdfs:label |
|
| rdfs:comment |
|
| dcterms:subject | |
| dbkwik:malware/pro...iPageUsesTemplate | |
| Platform |
|
| Name |
|
| Type |
|
| filetype |
|
| AKA |
|
| abstract |
|