Solved

EBlaster Removal

Posted on 2009-03-29
10
1,225 Views
Last Modified: 2013-12-06
I have a client whose divorced husband installed EBlaster (in stealth mode) on her PC before he moved out. She wants it removed. Seems hard to believe a decent Antivirus program, such as Avast or Malwarebytes, would not detect such snoopware.

What is the best way to remove EBlaster? Is there standard AV software that will detect and remove it?
0
Comment
Question by:HammettG
  • 3
  • 2
  • 2
  • +3
10 Comments
 
LVL 8

Expert Comment

by:skywalker39
Comment Utility
Hi HammettG,

Here are some that you can try.

      1. AVG Anti-Virus Free Edition
      2. SUPERAntiSpyware Free Edition
      3. PC Tools Spyware Doctor with AntiVirus

Here's the links:
http://free.avg.com/
http://www.superantispyware.com/
http://www.pctools.com/spyware-doctor-antivirus/

Here is instructions on how to remove it also:
http://www.spywareremove.com/removeeBlaster.html

Hope this helps.
0
 
LVL 23

Accepted Solution

by:
phototropic earned 500 total points
Comment Utility
Bleeping Computer has a downloadable reg. file to remove this app.:

http://www.bleepingcomputer.com/forums/topic3255.html

Good luck!!!


0
 
LVL 27

Expert Comment

by:David-Howard
Comment Utility
Just another two cents here. But I would recommend (in addition to your anti-virus suite) downloading malwareybtes. This is a very good antimalware utility to have on your system.
It's free.
www.malwarebytes.org
0
 
LVL 16

Expert Comment

by:warturtle
Comment Utility
My first suggestion is to install a firewall first of all (my favorite is ZoneAlarm, although a bit heavy on resources but really effective!) and then add/remove the Eblaster program from the PC from Control Panel. Even if it comes back, you can still control its internet access via ZoneAlarm firewall. And then concentrate on its removal with the suggestions from other experts.

We can disable it and then remove it, that is another option I think.
0
 
LVL 16

Expert Comment

by:warturtle
Comment Utility
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 34

Expert Comment

by:Michael-Best
Comment Utility
Got CONLICKER Worm?
If YOU cant go here:
http://onecare.live.com/site/en-US/center/cleanup.htm
And run scans
you Got Worm:Win32/Conficker.B
Microsoft is offering $250,000 to a (Worm:Win32/Conficker.B) FIX
Hope its ME
0
 
LVL 34

Expert Comment

by:Michael-Best
Comment Utility
0
 
LVL 34

Expert Comment

by:Michael-Best
Comment Utility
Sorry, i posted to wrong place.
0
 

Author Closing Comment

by:HammettG
Comment Utility
Thanks phototropic. This was the only solution that directly mentioned a working solution. The AV software I tried would not unvail EBlaster, because the husband had installed it on the PC - so the thought here is "since the PC user installed and configured the software it must be considered to be the users choice, and not malware". The software hides so well, that the only way to remove it is to use this reg file.
0
 
LVL 23

Expert Comment

by:phototropic
Comment Utility
Glad I was able to help...

0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
The purpose of this Article is to provide information for a newly released variant of malware – with the assumption that many EE Members will have need of the information. According to “Computerworld”, well over one million web sites have been co…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now