I'd start by running another scanner on those files to see if you get a verification of a threat.

Microsquish has a nice lightweight scanner...

http://www.microsoft.com/security/scanner/en-us/

For myself, I run Microsoft Security Essentials as my main first line of defense.