Zezal uses the masks shown below to search for files on the victim machine: * .exe And unloads the following processes from the memory: * C:\KLADStatTemp\216519
Attributes | Values |
---|---|
rdf:type | |
rdfs:label |
|
rdfs:comment |
|
dcterms:subject | |
dbkwik:malware/pro...iPageUsesTemplate | |
Platform |
|
Name |
|
Type |
|
filetype |
|
AKA |
|
abstract |
|