| http://www.w3.org/ns/prov#value | - Then, after registering itself as a system service, the worm retrieves the user's account information, including password, and installs a keylogger on the local machine as KDLL.DLL, according to Activis, a managed security service with office in the U.K. and the U.S.The worm records the victim's keystrokes, IP address, date, time, and the application name, to an encrypted file.
|