Here is the sas log
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 11/11/2010 at 04:39 PM
Application Version : 4.45.1000
Core Rules Database Version : 5847
Trace Rules Database Version: 3659
Scan type : Quick Scan
Total Scan Time : 00:10:45
Memory items scanned : 625
Memory threats detected : 0
Registry items scanned : 1752
Registry threats detected : 2
File items scanned : 8878
File threats detected : 90
Malware.Trace
HKU\S-1-5-21-1740846622-1781890777-1232828436-1030\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer#idstrf [ 1-1CB81E6468A9366 ]
HKU\S-1-5-21-1740846622-1781890777-1232828436-1030\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER#NOFOLDEROPTIONS
Trojan.Agent/Gen-Exploit
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WSTB\64BX86.EXE
Adware.Tracking Cookie
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\PHSJ88JW ]
C:\Documents and Settings\NetworkService\Cookies\system@yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pointroll[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@xml.trafficengine[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adecn[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@lucidmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bizzclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@interclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@apmebf[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ru4[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bcserving[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bcserving[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@burstbeacon[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@technoratimedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adcloudmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adbrite[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserver.adtechus[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@burstnet[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@enhance[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@xtreme-advertising[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@eyewonder[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@steelhousemedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaplex[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@casalemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bs.serving-sys[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pubmatic[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@legolas-media[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@realmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@fastclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@zedo[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.undertone[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.burstbeacon[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@a1.interclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@tribalfusion[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.burstnet[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@serving-sys[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@questionmarket[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn1.trafficmp[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficmp[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.candystand[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn.jemamedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@amex-insights[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickthrough.kanoodle[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@imrworldwide[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@collective-media[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[1].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@media.adrevolver[1].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@doubleclick[1].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@adrevolver[1].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@adopt.specificclick[1].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@atdmt[2].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@fastclick[2].txt
C:\Documents and Settings\rrackley\Cookies\rrackley@tribalfusion[1].txt
adsatt.espn.go.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
bannerfarm.ace.advertising.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
cdn1.eyewonder.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
cdn4.specificclick.net [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
core.insightexpressai.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
googleads.g.doubleclick.net [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
imagec05.247realmedia.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
interclick.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
m1.2mdn.net [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
macromedia.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
media.underarmour.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
media1.break.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
objects.tremormedia.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
s0.2mdn.net [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
secure-us.imrworldwide.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
spe.atdmt.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
speed.pointroll.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
static.2mdn.net [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
www.espnmediazone.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
zedo.com [ C:\Documents and Settings\rrackley.ESEC\Application Data\Macromedia\Flash Player\#SharedObjects\RM8XHKGH ]
Trojan.Agent/Gen-AVP
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\AVP.EXE
Trojan.Dropper/Gen-NV
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\AVP32.EXE
Trojan.Agent/Gen-Fuffan
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\DNE49.TMP.EXE
Trojan.Agent/Gen-Backdoor[FakeAlert]
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\LOGIN.EXE
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\WIN.EXE
Trojan.Agent/Gen-Dropper
C:\DOCUMENTS AND SETTINGS\RRACKLEY.ESEC\LOCAL SETTINGS\TEMP\USER.EXE