All steps must be run one at a time. This will not be a short process, it may have been removed if you had taken the time to find the delete key in Ewido. They would have been deleted automatically. If you don't have time then I can't help.
What "them" did you delete? The thing is Adam, deleting items one at a time will take forever. This is why we recommend these scans and various programs. You think the scans take a long time...searching out manually each and every file one of these things will leave on the hard drive will take MORE than a long time. And while you are doing your searching and deleting some of these baddies can be reproducing someplace else on the hard driveand deleted them
Here is why, if you really want to clean up the computer, you should follow the instructions given...
These are just six of the multiple entries in your Ewido scan that you ran but didn't have time to find the delete option;
Downloader.IstBar>>>manual removal instructions 1 and 1/2 pages of files which must be removed.
Downloader.Small>>>creates it's own registry entry and will download it's own executables and store them in a minimum of six locations on the computer...this is just the original file. It DID show in two locations on the scan.
Downloader.Zlob.amy>>>often silently downloads and installs rogue security programs such as SpywareQuake, SpyFalcon and WinAntivirusPro, but may install other malware as well. Some variants of Trojan-Downloader.Zlob.Media-Codec have backdoor functionality, giving a remote attacker the ability to control and use the infected machine for malicious purposes.
Safety Bar -> Adware.Generic>>>hijacks the user's browser an installs a toolbar without permission. It makes false claims about the user's computer being infected with malware and recommends that the user purchase a number of fake security products in order to fix their problem. It is responsible for downloading trial versions of these fake security products which in turn hound the user to purchase their product.
WinRAR\patch.exe>>>Violates Physical Memory Protection allowing it to take control of yout PC. Could use your PC to send mass mail using SMTP protocols. Has a keylogger that can spy on and log keystrokes without your knowldege or permission. Modifies Internet Browser Settings. Creates multiple copies of the Trojan infection on your PC. Creates registry run keys to ensure it is restarted every time you boot your PC. Installs other malicious programs. Examines which processes are running on your PC allowing it to explore vulnerabilities in Windows and your antivirus and anti-spyware products. Modifies the Hosts File which could stop your antivirus or anti-spyware protection or put your personal information at risk. Connects with 3rd party computer systems and forwards data via the internet. Hijacks other processes.
Zedo>>>Zedo cookies store information about a PC user’s interaction with a specific website.
Your choice Adam, if you want help we are here, if you want to do this manually then good luck.


Reply With Quote