ERA Remover (ESET Rogue Applications Remover)

Status
Not open for further replies.

enaph

Level 28
Thread author
Verified
Honorary Member
Top Poster
Well-known
Jun 14, 2011
1,787
About ESET Rogue Application Remover:

ESET Rogue Application Remover is intended for detecting and removing rogue applications as well as reverting changes made by the rogue applications to the registry. By design, ERAR focuses mostly on rogue applications that affect the operating system in a negative way and that are difficult to remove by our products. In no way should it be considered a substitute for running a scan with ESET products or the ESET Online Scanner.

ERAR must be run with elevated administrator rights either in normal or safe mode. Internet connection is recommended not only for better detection efficiency and accuracy but also for automatic submission of detected files to ESET's viruslab when approved by the user. ERAR supports restoration of quarantined objects using the /r switch. For a complete list of supported options, run it with the /? switch.

fMjxG.png


ChEap.png


Both 32-bit and 64-bit versions are available for download.

32-bit:
Code:
http://download.eset.com/special/ERARemover_x86.exe
64-bit:
Code:
http://download.eset.com/special/ERARemover_x64.exe
 

pcjunklist

Level 1
Dec 28, 2011
523
Do you know if this allows you to choose what to remove or if it just removes everything it deems as a rogue program?
 

enaph

Level 28
Thread author
Verified
Honorary Member
Top Poster
Well-known
Jun 14, 2011
1,787
I really have no idea. But I will let you know asap.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top