Well that was rather humbling. 155 threats, many of which were trojans....YIKES!!!
Here is the SUPERAntiSpyware log:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 08/02/2007 at 08:17 PM
Application Version : 3.9.1008
Core Rules Database Version : 3277
Trace Rules Database Version: 1288
Scan type : Complete Scan
Total Scan Time : 03:58:01
Memory items scanned : 458
Memory threats detected : 0
Registry items scanned : 5166
Registry threats detected : 1
File items scanned : 46453
File threats detected : 155
Adware.Tracking Cookie
C:\WINNT\Profiles\Ken\Cookies\ken@atdmt[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@atwola[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@doubleclick[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@ads.web.aol[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@zedo[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@mediaplex[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@html[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@revsci[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@questionmarket[1].txt
C:\WINNT\Profiles\Ken\Cookies\ken@advertising[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@2o7[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@2o7[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ads.adworldnetwork[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ads.as4x.tmcs.ticketmaster[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ads.as4x.tmcs[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ads.businessweek[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ads.specificpop[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@adserving.autotrader[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@atdmt[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@cpvfeed[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@edge.ru4[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@ordertracking[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@pointroll[2].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@questionmarket[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@stats.klsoft[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@tracking[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@trafficmp[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@www.macromedia[1].txt
C:\WINNT\Profiles\Administrator\Cookies\administrator@www.qksrv[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@2o7[2].txt
C:\WINNT\Profiles\Ken\Cookies\ken@ads.web.aol[1].txt
C:\WINNT\system32\config\systemprofile\Cookies\system@67.15.239[1].txt
C:\WINNT\system32\config\systemprofile\Cookies\system@67.15.239[2].txt
C:\WINNT\system32\config\systemprofile\Cookies\system@67.15.239[3].txt
C:\WINNT\system32\config\systemprofile\Cookies\system@67.15.239[4].txt
C:\WINNT\system32\config\systemprofile\Cookies\system@67.15.239[5].txt
Adware.HotBar/SpamBlockerUtility (Low Risk)
C:\WINNT\Downloaded Program Files\SpamBlockerUtility.inf
Trojan.WinBo32/Enhance
HKU\S-1-5-21-1333796941-572090573-1985484534-1003\Software\System\sysuid
Adware.MyWay
C:\Program Files\MyWay
Adware.ClickSpring/Outer Info Network
C:\WINNT\Profiles\Ken\Start Menu\Programs\Outerinfo\Terms.lnk
C:\WINNT\Profiles\Ken\Start Menu\Programs\Outerinfo\Uninstall.lnk
C:\WINNT\Profiles\Ken\Start Menu\Programs\Outerinfo
Adware.k8l
C:\PROGRAM FILES\WINDOWS NT\RTENEFS.HTML
Unclassified.Unknown Origin
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\TOSHIBA\MESOWIFYM4.DLL.VIR
C:\QOOBOX\QUARANTINE\C\PROGRAM FILES\TOSHIBA\MESOWIFYM83122.DLL.VIR
Trojan.Downloader-Gen/BasicMath
C:\QOOBOX\QUARANTINE\C\WINNT\DLS0523PMW.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078957.EXE
Adware.ClickSpring
C:\QooBox\Quarantine\C\WINNT\system32\CURITY~1\EXPLOR~1.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076626.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078950.EXE
Trojan.Downloader-DRVSAM
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\DRVJAX.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\DRVSAG.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\DRVSUN.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\DRVTOP.DLL.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076608.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1068\A0079180.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1068\A0079182.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1068\A0079184.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1068\A0079185.DLL
Trojan.Unknown Origin
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\G1\KMHP83122.EXE.VIR
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\WNSINTISV32.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077788.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078940.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078951.EXE
C:\WINNT\PROFILES\ADMINISTRATOR\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\H7NF66X8\XC60[1].EXE
C:\WINNT\PROFILES\ADMINISTRATOR\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\XRVVW3QR\XC42[1].EXE
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\GX8EH84D\XC60[1].EXE
Adware.SysMon
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\G11\Z553.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078954.EXE
Adware.Vundo/Traff-2
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\LSLTFYVD.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078970.EXE
Adware.Vundo Variant
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\NNNMLII.DLL.VIR
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\OPNONML.DLL.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077843.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078965.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078967.DLL
Adware.Mirar/NetNucleus
C:\QOOBOX\QUARANTINE\C\WINNT\SYSTEM32\WINNB58.DLL.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078956.DLL
Trojan.Downloader-LDCore
C:\QOOBOX\QUARANTINE\C\WINNT\TFJJP0578.EXE.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1068\A0079186.EXE
C:\WINNT\PROFILES\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\N07NOGTO\USER9[1].EXE
Adware.RAC
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1063\A0076518.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076641.EXE
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\RSKUD5FP\83122[1].EXE
Adware.ZenoSearch
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1063\A0076528.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076640.EXE
Adware.Search2Find
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1063\A0076567.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1063\A0076568.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1063\A0076569.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076598.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076600.LNK
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076602.LNK
C:\WINNT\PROFILES\KEN\DESKTOP\FIND SPYWARE REMOVER.LNK
C:\WINNT\PROFILES\KEN\DESKTOP\FREE ONLINE DATING.LNK
C:\WINNT\PROFILES\KEN\DESKTOP\GO TO CASINO.LNK
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\DESKTOP\FIND SPYWARE REMOVER.LNK
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\DESKTOP\FREE ONLINE DATING.LNK
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\DESKTOP\GO TO CASINO.LNK
Adware.ClickSpring/Resident
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076590.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076597.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076623.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076625.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077785.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1065\A0078845.DLL
C:\WINNT\PROFILES\KEN\DESKTOP\HELPME\BACKUPS\BACKUP-20070731-135806-264.DLL
Trojan.Downloader-Gen/TStamp
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076596.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076624.EXE
Trojan.Downloader-NoName
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076605.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077733.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1065\A0077878.EXE
Trojan.Downloader-Gen/AVP
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0076609.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077736.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1064\A0077752.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1065\A0077881.EXE
C:\WINNT\PROFILES\ADMINISTRATOR\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\XRVVW3QR\XC23[1].EXE
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\GX8EH84D\XC23[1].EXE
Trojan.IERedirector
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1065\A0078847.DLL
C:\WINNT\PROFILES\KEN\DESKTOP\HELPME\BACKUPS\BACKUP-20070731-135806-917.DLL
Trojan.WinAntiSpyware/WinAntiVirus 2006
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1065\A0078871.EXE
Trojan.ZQuest
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078944.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078945.DLL
Trojan.Downloader-Gen/HitItQuitIt
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078960.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078963.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078964.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078966.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078968.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078969.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D419C586-76D8-4AB7-AF30-353920A9411A}\RP1066\A0078982.DLL
Adware.ClickSpring/Yazzle
C:\WINNT\PREFETCH\YAZZLE1162OINADMIN.EXE-04B49B8B.PF
Trojan.Downloader-Gen/Mandingo
C:\WINNT\PROFILES\ADMINISTRATOR\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\H7NF66X8\XC29[1].EXE
Trojan.TagASaurus
C:\WINNT\PROFILES\LOCALSERVICE\DESKTOP\SEARCHUS.EXE
C:\WINNT\SYSTEM32\CONFIG\SYSTEMPROFILE\DESKTOP\SEARCHUS.EXE
Trace.Known Threat Sources
C:\WINNT\Profiles\Administrator\Local Settings\Temporary Internet Files\Content.IE5\5M464CKY\anti4[1].exe
C:\WINNT\Profiles\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6RP4XMIO\antzom[1].exe
C:\WINNT\Profiles\Administrator\Local Settings\Temporary Internet Files\Content.IE5\5M464CKY\x5s34[1].exe
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\RSKUD5FP\nf404[4].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\GX8EH84D\nf404[4].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\RSKUD5FP\nf404[5].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\nf404[1].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\GX8EH84D\nf404[3].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\nf404[4].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\nf404[3].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\CATWGRHX.htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\nf404[6].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\GX8EH84D\nf404[1].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\nf404[5].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\GX8EH84D\nf404[2].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\nf404[4].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\nf404[3].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\nf404[2].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\nf404[1].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\RSKUD5FP\nf404[6].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\anti4[1].exe
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OCGFLFG7\nf404[2].htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q0A2UVEF\CAXS6XDF.htm
C:\WINNT\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\RSKUD5FP\nf404[7].htm