I'd start by running another scanner on those files to see if you get a verification of a threat.
Microsquish has a nice lightweight scanner...
http://www.microsoft.com/security/scanner/en-us/For myself, I run
Microsoft Security Essentials as my main first line of defense.