To close the vulnerability window it is a good idea to additionally scan with an on-demand anti malware solution, like MBAM, SAS, or regularly do a scan with Windows Defender or a BitDefender Quick Scan from inside the browser. One resident AV solution often is not enough to catch them all, but to improve detection of Sality variants send these to avast.
It is also a good policy to check what executables and processes run on your computer. Then check these against e.g. runscanner
see: http://www.runscanner.net/lib/iehv.exe.html or
here: http://www.threatexpert.com/files/iehv.exe.html
or Agics hash scan or newer FTR scan: http://www.computer-support.nl/Applications/FTR1_Index.php
- and establish if they are unwanted. I give an example. Someone stuck a USB password stealer into your machine and now iehv.exe is running on your computer, this is a legit nirsoft file, and nothing wrong if you installed it yourself, or it came with a program you willfully installed, so it also goes under the radar of the av program, and is not flagged as an eventual PUP (unwanted proggie), see:
iehv http://www.virustotal.com/file-scan/report.html?id=8aa4f14099eba2551811a5e58a4a8a2676d0d06fba6518b789dea34de2e8fe0a-1296913618
so you have to establish yourself if the executable or process running on your comp is unwanted or not. So av and additional malware scanning, all OK, but the user also has some responsibility for what runs on his machine, and if in doubt about a process etc. they can always come and post in these forums,
polonus