ok here's the logs since my laptop accepted my gflash drive without crashing this time
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 12/26/2009 at 03:51 AM
Application Version : 4.32.1000
Core Rules Database Version : 4402
Trace Rules Database Version: 1978
Scan type : Complete Scan
Total Scan Time : 01:24:42
Memory items scanned : 518
Memory threats detected : 0
Registry items scanned : 4602
Registry threats detected : 8
File items scanned : 33296
File threats detected : 5
Adware.Vundo/Variant
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D5BF4552-94F1-42BD-F434-3604812C807D}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D5BF4552-94F1-42BD-F434-3604812C807D}
Rogue.Component/Trace
HKLM\Software\Microsoft\70642062
HKLM\Software\Microsoft\70642062#70648de2
HKLM\Software\Microsoft\70642062#7064e407
HKLM\Software\Microsoft\70642062#70642062
HKLM\Software\Microsoft\70642062#Version
Trojan.Fake-Alert/Trace
HKU\S-1-5-21-776561741-1563985344-839522115-1003\SOFTWARE\Microsoft\fias4013
Trojan.Agent/Gen
C:\DOCUMENTS AND SETTINGS\MARK\START MENU\PROGRAMS\STARTUP\SISZYD32.EXE
C:\WINDOWS\Prefetch\SISZYD32.EXE-02EC40F1.pf
Rootkit.TDSServ-Trace
C:\WINDOWS\SYSTEM32\TDSSMTYE.DAT
Trojan.Agent/Gen-ImageDocFake
E:\DOCUMENTS AND SETTINGS\MARK\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8GCHHHH2\MAIN_IMG3[1].PNG
E:\FOUND.000\DIR0068.CHK\MEDIA\YOHOHO\ICONS\CHANGE_ALERT.PNG
Malwarebytes' Anti-Malware 1.42
Database version: 3431
Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5730.13
26/12/2009 08:52:05
mbam-log-2009-12-26 (08-52-05).txt
Scan type: Full Scan (C:\|E:\|)
Objects scanned: 561957
Time elapsed: 2 hour(s), 2 minute(s), 3 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
C:\Documents and Settings\Mark\Local Settings\Temp\sig9E.tmp (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\kpgmh.sys (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\Temp\sig10.tmp (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Mark\Application Data\avdrn.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\fvgqad.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Mark\Application Data\fvgqad.dat (Malware.Trace) -> Quarantined and deleted successfully.
As you can see it said it would delete it on reboot but avast found it still on the computer as soon as it reloaded itself :'(