Here is what happened to me. Since my file names were different than yours, you will need to adjust the names to solve your problem.
First, this was the same ATLEvents problem you have had. When I ran Spybot, it found the ATLEvents adware and removed the registry entries. However, the active program always put the entries back as soon as I removed them. I found some adware items in the HKEYLM\software\microsoft\windows\currentversion\runonce and run areas of the registry. When I deleted them (so they would not start on the next boot), the active program reinserted them immediately. You are probably experiencing the same problems.
In my case, the program "*oledvd" was the culprit and I knew it. In your case, it appears to be "apinet.exe". I could not tell where the program was located (although it is very evident where it is in your situation), so I ran Taskinfo 2003 (found at http://www.iarsn.com/taskinfo.html as a mostly full featured "try before you buy program"). Simply highlighting the task allowed me to see where it was located and even what process started it.
I then attempted to delete the file in Windows Explorer (it was a hidden system file), but it would not go away because it was being used. I then right clicked the task in TaskInfo and told it to kill the task. It died and came right back again. This time, TaskInfo said that it was started by Regedit, which I was using at the time. Somehow, the adware hooked itself into the system and had the registry editor start it. I truly wanted to know how this happened, but didn't want to spend the time figuring it out. I shut down Regedit and killed the task with Taskinfo again. The program died and came back to life again. This time Taskinfo revealed that IT started the adware program. This was starting to get old.
The computer I was fixing had Windows XP Pro on it, so I found the file, Right clicked and went to Properties. I selected Security. Under the Advanced button, I told it to not inherit the properties from it's parents. I then turned off all access to all users in all ways to the file. That way, no matter what program under any user tried to start it again, it would be denied access. If you are running Windows XP Home edition, you will need to use the command line utility CACLS to change the security properties of "apinet.exe" to none for everyone (Start, Run, CMD [enter] and then type "CACLS /?" to see how to use it).
I went back to TaskInfo again and killed the task one final time. This time, it stayed dead. I went into Regedit and deleted the startup items in Run and Runonce and noted that they stayed deleted this time (you have to hit F5 in Regedit to refresh the screen after deleting the items to see for sure). I ran Spybot and it found the ATLEvents again and deleted them as before. I ran Spybot again and it did NOT find the ATLEvents registry entries. Success!
Finally, I changed permissions on the pesky adware program to full for Administrator (that is who I was logged onto) and deleted it.
Now, the site administrator at Geekstogo.com suggested that you use Killbox to kill the file and it may do the same thing that I just described. If it does not, I suggest my way. It is very effective, you have full control over every step, and you can see exactly what is going on.
As a final suggestion to anyone reading this because they have a problem LIKE this that they need help to stop, you may find that adware registry entries are being set but you do not know what program is doing it. In this case, consider using Systernals Regmon ( http://www.sysintern...e/regmon.shtml) to monitor the registry. It can monitor all changes to the registry and tells what program is accessing the registry to make those changes. Start Regmon and begin capturing the registry changes. Run Spybot to kill the adware registry entries. Make a note of those entries and let Spybot kill them. Then go to Regmon and stop the capturing. You will have a huge capture log at that point. Use the filter to show only the registry entry you are looking for. Then you will see that Spybot and one other program accessed it. That other program is your culprit. Proceed with the previously mentioned steps to kill it.
I regularly clean systems of adware as a part of my profession and this was the hardest adware I have ever had to remove. So, Lew, don't give up and don't feel bad about this. This one is really tough to kill and not even Adaware or Spybot have gotten a bead on all of it yet.
BTW, did Symantec have any luck at getting rid of it?