Here's the log of one of the programs you told me about mate.
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 12/21/2007 at 02:15 AM
Application Version : 3.9.1008
Core Rules Database Version : 3365
Trace Rules Database Version: 1364
Scan type : Complete Scan
Total Scan Time : 00:25:11
Memory items scanned : 305
Memory threats detected : 1
Registry items scanned : 4639
Registry threats detected : 2
File items scanned : 28708
File threats detected : 39
Trojan.Downloader-Gen/Svchost-Fake
C:\WINDOWS\FONTS\SVCHOST.EXE
C:\WINDOWS\FONTS\SVCHOST.EXE
[Host Process] C:\WINDOWS\FONTS\SVCHOST.EXE
Adware.Tracking Cookie
C:\Documents and Settings\Kyote\Cookies\kyote@mediaplex[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@atdmt[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@questionmarket[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@ads.addynamix[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@advertising[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@specificclick[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@zedo[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@bluestreak[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@ad.yieldmanager[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@trafficmp[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@apmebf[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@fastclick[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@realmedia[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@2o7[1].txt
C:\Documents and Settings\Kyote\Cookies\kyote@collective-media[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@ads.pointroll[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@adopt.euroclick[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@doubleclick[2].txt
C:\Documents and Settings\Kyote\Cookies\kyote@adopt.specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.pointroll[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnportal.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@toplist[1].txt
Adware.Web Buying
HKU\S-1-5-21-3717343459-168131164-1001816311-1002\Software\WebBuying
Trojan.Downloader-SVCHost/Fake
C:\WINDOWS\FONTS\CRACK.EXE
Trojan.Downloader-Gen/TaLDrv
C:\WINDOWS\SYSTEM32\BBC5\GSTDRVR8.EXE
C:\WINDOWS\SYSWOW64\BBC5\GSTDRVR8.EXE
Adware.Vundo-Variant/Small
C:\WINDOWS\SYSTEM32\BYXVSRO.DLL
C:\WINDOWS\SYSTEM32\EFCAYVT.DLL
C:\WINDOWS\SYSTEM32\JKKIIJK.DLL
C:\WINDOWS\SYSTEM32\LJJKHED.DLL
C:\WINDOWS\SYSWOW64\BYXVSRO.DLL
C:\WINDOWS\SYSWOW64\CBXUSPO.DLL
C:\WINDOWS\SYSWOW64\EFCAYVT.DLL
C:\WINDOWS\SYSWOW64\JKKIIJK.DLL
C:\WINDOWS\SYSWOW64\LJJKHED.DLL
Adware.Vundo Variant
C:\WINDOWS\SYSTEM32\CBXUSPO.DLL