Hi, I am running Windows Vista and have been infected with Bloodhound.Exploit.196 as well I believe. My Symantec constantly brings up that it has found and quarantined files. I have followed the steps of running ATF cleaner and also completed a scan with SUPERAntiSpyware.
Here is the log from SUPER as asked for in a previous post.
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 03/10/2009 at 06:49 AM
Application Version : 4.25.1014
Core Rules Database Version : 3790
Trace Rules Database Version: 1746
Scan type : Complete Scan
Total Scan Time : 00:25:15
Memory items scanned : 371
Memory threats detected : 0
Registry items scanned : 8675
Registry threats detected : 0
File items scanned : 26454
File threats detected : 63
Adware.Tracking Cookie
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\david@ad.yieldmanager[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\david@content.yieldmanager[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\david@content.yieldmanager.edgesuite[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\david@atdmt[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\david@doubleclick[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ad.yieldmanager[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ar.atwola[4].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@at.atwola[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ar.atwola[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@at.atwola[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ar.atwola[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ad.yieldmanager[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@tacoda[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@trafficmp[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@trafficmp[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@tacoda[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@edge.ru4[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@dynamic.media.adrevolver[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@adopt.specificclick[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@revsci[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@revsci[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@statse.webtrendslive[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@statcounter[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@ads.pointroll[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@adrevolver[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@atdmt[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@edge.ru4[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@realmedia[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@atdmt[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@realmedia[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@fastclick[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@imrworldwide[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@fastclick[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@atwola[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@atwola[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@apmebf[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@www.googleadservices[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@specificclick[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@mediaplex[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@specificclick[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@www.internationalsexguide[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@msnbc.112.2o7[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@advertising[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@247realmedia[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@adopt.euroclick[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@casalemedia[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@adopt.euroclick[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@zedo[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@msnportal.112.2o7[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@serving-sys[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@insightexpressai[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@bs.serving-sys[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@adlegend[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@bluestreak[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@questionmarket[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@interclick[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@media6degrees[3].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@media.adrevolver[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@doubleclick[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@media6degrees[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@doubleclick[2].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@advertising[1].txt
C:\Users\David\AppData\Roaming\Microsoft\Windows\Cookies\Low\david@questionmarket[2].txt
Thanks for the help in advance!