Hi Ylap and ReVaN,
That is just the nasty bit of these types of malware. It can be traced only until it starts to run on the machine, then it cannot be traced. So for certain kind of malware, and now spyware too is coming in with these aspects, a way of preventing installs of these types of malware is very important. What is the best AV protector in this case, it is you guessed it right the man behind the keyboard, Mr Ylap and Mr ReVaN in this case. When on a system a type of malware, like a backdoor, a trojan horse or a worm installs FUNCTIONALITY, we have a compromitation of the system. This can lead to compromitation of all sort of files, e.g. the AV files), which can be manipulated, also sensitive information of the user(s). WE THEREFORE CAN NO LONGER TRUST THIS SYSTEM and it lays or could lay now open to remote control.
To undo this situation, only a fresh install or in the case of Ylap's troubles a RESTORE TO AN UN COMPROMISED STATE (if you knew when that was) can be necessary.
Then we have to do the following:
1. Drop your rights, use normal user rights.
2. Activate Win XP2 and install a good Firewall.
3. Update system.
4. Even if you use an alternate browser, configure IE securely.
5. Configure your Mailclient safely, use a safe mail client.
6. Change all your passwords.
7. Make an image of the system partition.
8. Analyze your surf & download habits.
9. Use a layered security solution, system monitor,
anti-malware solutions, anti-script solution, anti-virus
solution.
10. Use your brain at all times before you click.
There is a difference of opinion about when a system has become compromised, I say take no chances,
greets,
polonus