3. It installs hook procedures into a hook chain to monitor the system for any keyboard and mouse messages. The keyboard and mouse hook procedures process the messages and pass the hook information to the next hook procedure in the current hook chain. This permits the PWSteal.Trojan.D to intercept any key strokes and any text on the screen.
4. The Trojan drops the intercepted information into a temporary file and sends it out to the virus author's anonymous email address.
A good thing you caught it, bad that NAV did not catch it while running in the background, and that you needed to scan you disc fir it. Are you using up to date antivirus software and definitions? You might want to give AVG a try. It is free!
Ep, glad to see you come back and tidy up...did want to ask a one day favor, I want to enhance my resume , was hoping you could make me administrator for a day, if so, take me right off since I won't be here to do anything, and don't know the slightest about the board, but it would be nice putting "served administrator osnn", if can do, THANKS