Just did all that two seconds ago...Here is the results.
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 12/13/2007 at 10:52 PM
Application Version : 3.9.1008
Core Rules Database Version : 3361
Trace Rules Database Version: 1360
Scan type : Complete Scan
Total Scan Time : 00:45:23
Memory items scanned : 368
Memory threats detected : 2
Registry items scanned : 6948
Registry threats detected : 71
File items scanned : 41090
File threats detected : 35
Adware.Vundo-Variant/Small
C:\WINDOWS\SYSTEM32\TUVSQNM.DLL
C:\WINDOWS\SYSTEM32\TUVSQNM.DLL
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\tuvsqnm
C:\PROGRAM FILES\TREND MICRO\HIJACKTHIS\BACKUPS\BACKUP-20071213-215729-120.DLL
Trojan.WinFixer
C:\WINDOWS\SYSTEM32\VTURO.DLL
C:\WINDOWS\SYSTEM32\VTURO.DLL
HKLM\Software\Classes\CLSID\{E668B37E-ED99-43CA-91BB-B5007CAA6B21}
HKCR\CLSID\{E668B37E-ED99-43CA-91BB-B5007CAA6B21}
HKCR\CLSID\{E668B37E-ED99-43CA-91BB-B5007CAA6B21}\InprocServer32
HKCR\CLSID\{E668B37E-ED99-43CA-91BB-B5007CAA6B21}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E668B37E-ED99-43CA-91BB-B5007CAA6B21}
Adware.Vundo Variant
HKLM\Software\Classes\CLSID\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}
HKCR\CLSID\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}
HKCR\CLSID\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}\InprocServer32
HKCR\CLSID\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}
HKCR\CLSID\{2AE4005E-689F-4FB9-8C3D-D2B8B58AC072}
Unclassified.Oreans32
HKLM\System\ControlSet001\Services\oreans32
C:\WINDOWS\SYSTEM32\DRIVERS\OREANS32.SYS
HKLM\System\ControlSet002\Services\oreans32
HKLM\System\CurrentControlSet\Services\oreans32
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Capabilities
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\LogConf
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control#ActiveService
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Type
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Start
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#NextInstance
Adware.Tracking Cookie
C:\Documents and Settings\Michael\Cookies\michael@f3.thezirius[2].txt
C:\Documents and Settings\Michael\Cookies\michael@thezirius[1].txt
C:\Documents and Settings\Michael\Cookies\michael@f5.thezirius[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.zanox[1].txt
C:\Documents and Settings\Michael\Cookies\michael@f6.thezirius[1].txt
C:\Documents and Settings\Michael\Cookies\michael@f7.thezirius[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.monster[2].txt
C:\Documents and Settings\Michael\Cookies\michael@hornymatches[2].txt
C:\Documents and Settings\Michael\Cookies\michael@mediaservices.myspace[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adopt.euroclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@precisionclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@partner2profit[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.pointroll[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ultraxxxpasswords[2].txt
C:\Documents and Settings\Michael\Cookies\michael@5.go.globaladsales[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.adbrite[2].txt
C:\Documents and Settings\Michael\Cookies\michael@advertising[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.teen-flicks[1].txt
C:\Documents and Settings\Michael\Cookies\michael@exact-find[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adopt.specificclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.exact-find[1].txt
C:\Documents and Settings\Michael\Cookies\michael@atdmt[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@footballfanatics.112.2o7[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@nextag[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@overture[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@server.iad.liveperson[1].txt
Trojan.Security Toolbar
C:\Documents and Settings\Michael\Favorites\Antivirus Test Online.url
Adware.ClickSpring/Yazzle
HKCR\YAZZLEACTIVEX.YazzleActiveXCtrl.1
HKCR\YAZZLEACTIVEX.YazzleActiveXCtrl.1\CLSID
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/YazzleActiveX.ocx
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/YazzleActiveX.ocx#.Owner
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/YazzleActiveX.ocx#{74CD40EA-EF77-4BAD-808A-B5982DA73F20}
Adware.E404 Helper/Hij
HKCR\E404.e404mgr.1
HKCR\E404.e404mgr.1\CLSID
Rootkit.RunTime2/CTLW32
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ctl_w32.sys
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\ctl_w32.sys
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000#Capabilities
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CTL_W32\0000\Control
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32#Type
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32#Start
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32#DependOnGroup
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32\Enum
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Services\ctl_w32\Enum#INITSTARTFAILED
Rootkit.SMTPDrv-Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{EA083575-C8BC-499D-A2BE-274576AA87D3}\RP24\A0000329.SYS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{EA083575-C8BC-499D-A2BE-274576AA87D3}\RP52\A0000430.SYS
Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MNNMP.INI
Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\STU.DLL