Antivirus8 or Antivirus 8 is a rogue anti-spyware
program from the same family as Antivirus
7. This rogue is promoted through web sites that pretend to be online anti-malware
scanners, but are instead advertisements that when finished state your computer
is infected. This fake scanner will then prompt you to download and install
Antivirus8 on to your computer in order to protect it. It should be noted that
these fake online scanners are just an advertisement that have absolutely no
way of knowing what is running on your computer. In fact they will show the
same infection results to anyone who visits the page. Therefore, do not be concerned
by what these online scanners show you.
Antivirus8 screen shot
For more screen shots of this infection click on the image above.
There are a total of 7 images you can view.
When Antivirus8 is installed it will be configured to start automatically when
Windows starts. Once started it will perform a scan on your computer and when
finished state that it is infected with a variety of malware. If you attempt
to use the program to remove any of the malware it finds, though, it will state
that you first need to purchase the program before it will remove anything.
This is a complete scam as the scan results are all fake and many of the listed
files are actually legitimate files that if removed could cause problems for
your computer. Therefore, do not manually remove any of the items it displays
in its scan results.
While Antivirus8 is running it will also display alerts and warnings that attempt
to scare you into thinking your computer has a serious computer security problem.
These alerts will state that personal information is being stolen, active malware
has been found, or that you are using unlicensed software. The text of some
of these alerts are:
This copy of AV is not genuine
Your may be a victim of software counterfeiting. This copy of Antivirus8 is
not genuine and is not eligible to receive the full range of upgrades and
product support from Microsoft.
Warning! Identity theft attampt detected!
Attacker IP: <random IP address>
Attack Target: Microsoft Corp. Keys
Description: Remote host tries to get access to your personal information.
Warning! New Virus Detected!
Threat Detected: Email-Worm.Zhelatin
Infected file: <random file name>
Description: Worm Email-Worm.Zhelatin.vy is virus-like malware with destructive
code, and is able to mutate, replacing its own code by itself. This makes
Email-Worm.Zhelatin.vy very dangerous, hard to find, and difficult to delete.
Like most viruses, worm Email-Worm-Zhelatin.vy may spread to other computers
by secretly emailing themselves to Internet users in your address book.
Antivirus 8 will also attempt to protect itself by not allowing you to run
various programs that may assist in removing it. When you attempt to run these
types of programs, Antivirus8 will terminate it and then state that the file
is infected. The text of the infection alert is:
Warning! Active virus detected!
Threat detected: Keylogger.iSnake.PRO
Infected file: C:\Windows\System32\cmd.exe
Just like the fake scan results, all of the above security alerts are fake
and only being shown to scare you into purchasing the program.
Without a doubt, Antivirus 8 was created for one reason; to scare you into
thinking your computer has a security problem so that you will then purchase
the program. It goes without saying that you should not purchase this program,
and if you already have, please contact your credit card company to dispute
the charge because the program is a scam and a computer infection. Finally,
to remove Antivirus8 and any related malware, please you use the removal guide
View Antivirus8 files.
View Antivirus8 Registry Information.
Tools Needed for this fix:
Symptoms that may be in a HijackThis Log:
O4 - HKCU\..\Run: [AV8] C:\Program Files\AV8\av8.exe
09/23/10 - Initial guide creation.
Automated Removal Instructions for Antivirus8 using Malwarebytes Anti-Malware:
- Print out these instructions as we may need to close every window that is
open later in the fix.
- It is possible that the infection you are trying to remove will not allow
you to download files on the infected computer. If this is the case, then
you will need to download the files requested in this guide on another computer
and then transfer them to the infected computer. You can transfer the files
via a CD/DVD, external drive, or USB flash drive.
- Now you should download Malwarebytes Anti-Malware, or MBAM, from the following
location and save it to your desktop:
Malwarebytes Anti-Malware Download Link
(Download page will open in a new window)
- When the file has finished downloading, look on your desktop for mbam-setup.exe
and right-click on it and select Rename. The title of the
program will now have a blinking cursor where you can edit the name. Please
change the name of the program to iexplore.exe.
- After you rename the mbam-setup.exe to iexplorer.exe, close all your programs
and Windows on your computer, including this one.
- Now double-click on the file you renamed, which is now called iexplore.exe,
and the installation of MBAM will start on your computer.
- When the installation begins, keep following the prompts in order to continue
with the installation process. Do not make any changes to default settings
and when the program has finished installing and is at the last screen, make
sure you uncheck both of the Update Malwarebytes Anti-Malware
and Launch Malwarebytes Anti-Malware check
boxes. Then click on the Finish button. If Malwarebytes'
prompts you to reboot, please do not do so.
- As this infection will not allow you run executables unless they have certain
filenames, we need to rename the core MalwareBytes' Anti-Malware executable
so that it can run. To do this open the C:\program files\Malwarebytes'
Anti-Malware\ folder. To open this folder, click on the Start
button and type in the search field:
C:\program files\Malwarebytes Anti-Malware\
Then press the enter button on your keyboard.
- The MalwareBytes' Anti-Malware folder should now be open and you should
see numerous files within it. Look for a file named mbam.exe
and right-click on i. When the menu appears select Rename and
change the name of the file to iexplore.exe. Once the file
has been renamed to iexplore.exe, double-click on it to start the program.
MBAM will now start and you will be at the main program screen as shown below.
Please click on the Scan Now button to start the scan. If there is an update available for Malwarebytes it will automatically download and install it before performing the scan.
- MBAM will now start scanning your computer for malware. This process can
take quite a while, so we suggest you do something else and periodically
check on the status of the scan to see when it is finished.
- When MBAM is finished scanning it will display a screen that displays any malware that it has detected. Please note that the infections found may be different
than what is shown in the image below due to the guide being updated for newer versions of MBAM.
You should now click on the Remove Selected button to remove
all the seleted malware. MBAM will now delete all of the files and registry
keys and add them to the programs quarantine. When removing the files, MBAM
may require a reboot in order to remove some of them. If it displays a message
stating that it needs to reboot, please allow it to do so. Once your computer
has rebooted, and you are logged in, please continue with the rest of the
- You can now exit the MBAM program. If you wish to use MalwareBytes' in the
future, I suggest you now uninstall and reinstall it again so that all the
files are using the correct names.
- As many rogues and other malware are installed through vulnerabilities found
in out-dated and insecure programs, it is strongly suggested that you use
Secunia PSI to scan for vulnerable programs on your computer. A tutorial on
how to use Secunia PSI to scan for vulnerable programs can be found here:
detect vulnerable and out-dated programs using Secunia Personal Software Inspector
Your computer should now be free of the
program. You may want to consider purchasing
the PRO version of Malwarebytes Anti-Malware to protect against these types
of threats in the future, as if you had the real-time protection component,
that comes with the paid for version, activated it would not have allowed this
infection to install.
If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help
View Associated Antivirus8 Files
c:\Documents and Settings\All Users\Start Menu\AV8\
c:\Documents and Settings\All Users\Start Menu\AV8\Antivirus8.lnk
c:\Documents and Settings\All Users\Start Menu\AV8\Uninstall.lnk
File Location Notes:
%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.
View Associated Antivirus8 Windows Registry Information
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "WinNT-A8I 23.09.2010"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe "Debugger" = "C:\Program Files\AV8\av8.exe -d"
This is a self-help guide. Use at your own risk.
BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus, Trojan, Spyware, and Malware Removal Logs forum.
If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.