Welcome Guest (Log In | Create Account)
New Member? Join for free.

Remove Antivirus8 or Antivirus 8 (Uninstall Guide)

By on September 23, 2010 @ 04:37 PM | Read 116,172 times.
  • Print this page

Antivirus8 or Antivirus 8 is a rogue anti-spyware program from the same family as Antivirus 7. This rogue is promoted through web sites that pretend to be online anti-malware scanners, but are instead advertisements that when finished state your computer is infected. This fake scanner will then prompt you to download and install Antivirus8 on to your computer in order to protect it. It should be noted that these fake online scanners are just an advertisement that have absolutely no way of knowing what is running on your computer. In fact they will show the same infection results to anyone who visits the page. Therefore, do not be concerned by what these online scanners show you.

 

Antivirus8 screen shot
Antivirus8 screen shot
For more screen shots of this infection click on the image above.
There are a total of 7 images you can view.

 

When Antivirus8 is installed it will be configured to start automatically when Windows starts. Once started it will perform a scan on your computer and when finished state that it is infected with a variety of malware. If you attempt to use the program to remove any of the malware it finds, though, it will state that you first need to purchase the program before it will remove anything. This is a complete scam as the scan results are all fake and many of the listed files are actually legitimate files that if removed could cause problems for your computer. Therefore, do not manually remove any of the items it displays in its scan results.

While Antivirus8 is running it will also display alerts and warnings that attempt to scare you into thinking your computer has a serious computer security problem. These alerts will state that personal information is being stolen, active malware has been found, or that you are using unlicensed software. The text of some of these alerts are:

This copy of AV is not genuine
Your may be a victim of software counterfeiting. This copy of Antivirus8 is not genuine and is not eligible to receive the full range of upgrades and product support from Microsoft.

Warning! Identity theft attampt detected!
Attacker IP: <random IP address>
Attack Target: Microsoft Corp. Keys
Description: Remote host tries to get access to your personal information.

Warning! New Virus Detected!
Threat Detected: Email-Worm.Zhelatin
Infected file: <random file name>
Description: Worm Email-Worm.Zhelatin.vy is virus-like malware with destructive code, and is able to mutate, replacing its own code by itself. This makes Email-Worm.Zhelatin.vy very dangerous, hard to find, and difficult to delete. Like most viruses, worm Email-Worm-Zhelatin.vy may spread to other computers by secretly emailing themselves to Internet users in your address book.

Antivirus 8 will also attempt to protect itself by not allowing you to run various programs that may assist in removing it. When you attempt to run these types of programs, Antivirus8 will terminate it and then state that the file is infected. The text of the infection alert is:

Warning! Active virus detected!
Threat detected: Keylogger.iSnake.PRO
Infected file: C:\Windows\System32\cmd.exe

Just like the fake scan results, all of the above security alerts are fake and only being shown to scare you into purchasing the program.

Without a doubt, Antivirus 8 was created for one reason; to scare you into thinking your computer has a security problem so that you will then purchase the program. It goes without saying that you should not purchase this program, and if you already have, please contact your credit card company to dispute the charge because the program is a scam and a computer infection. Finally, to remove Antivirus8 and any related malware, please you use the removal guide below.

 

Threat Classification:

 

Advanced information:

View Antivirus8 files.
View Antivirus8 Registry Information.

 

Tools Needed for this fix:

 

Symptoms that may be in a HijackThis Log:

O4 - HKCU\..\Run: [AV8] C:\Program Files\AV8\av8.exe

 

Guide Updates:

09/23/10 - Initial guide creation.

 


Automated Removal Instructions for Antivirus8 using Malwarebytes Anti-Malware:

 

  1. Print out these instructions as we may need to close every window that is open later in the fix.

  2. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.

  3. Now you should download Malwarebytes Anti-Malware, or MBAM, from the following location and save it to your desktop:

    Malwarebytes Anti-Malware Download Link (Download page will open in a new window)


  4. When the file has finished downloading, look on your desktop for mbam-setup.exe and right-click on it and select Rename. The title of the program will now have a blinking cursor where you can edit the name. Please change the name of the program to iexplore.exe.

  5. After you rename the mbam-setup.exe to iexplorer.exe, close all your programs and Windows on your computer, including this one.

  6. Now double-click on the file you renamed, which is now called iexplore.exe, and the installation of MBAM will start on your computer.

  7. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing and is at the last screen, make sure you uncheck both of the Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware check boxes. Then click on the Finish button. If Malwarebytes' prompts you to reboot, please do not do so.

  8. As this infection will not allow you run executables unless they have certain filenames, we need to rename the core MalwareBytes' Anti-Malware executable so that it can run. To do this open the C:\program files\Malwarebytes' Anti-Malware\ folder. To open this folder, click on the Start button and type in the search field:

    C:\program files\Malwarebytes Anti-Malware\

    Then press the enter button on your keyboard.

  9. The MalwareBytes' Anti-Malware folder should now be open and you should see numerous files within it. Look for a file named mbam.exe and right-click on i. When the menu appears select Rename and change the name of the file to iexplore.exe. Once the file has been renamed to iexplore.exe, double-click on it to start the program. MBAM will now start and you will be at the main program screen as shown below.


    Malwarebytes Anti-Malware Screen

  10. Before you can perform a scan, you must first update the program. To do this click on the Update tab, and that at the new screen click on the Check for Updates button. Malwarebytes' will now check for new updates and download and install them as necessary. When the update is completed, you will be prompted with a message stating either that you already have the latest updates or that they have been updated. Either way, you should now click on the OK button to continue.

  11. Now click on the Scanner tab and make sure the the Perform full scan option is selected. Then click on the Scan button to start scanning your computer for Antivirus8 related files.

  12. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.


    MalwareBytes Anti-Malware Scanning Screen

  13. When the scan is finished a message box will appear as shown in the image below.


    MalwareBytes Anti-Malware Scan Finished Screen

    You should click on the OK button to close the message box and continue with the Antivirus 8 removal process.

  14. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.

  15. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.


    MalwareBytes Scan Results


    You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  16. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.

  17. You can now exit the MBAM program. If you wish to use MalwareBytes' in the future, I suggest you now uninstall and reinstall it again so that all the files are using the correct names.

  18. As many rogues and other malware are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:

    How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

 

Your computer should now be free of the Antivirus 8 program. You may want to consider purchasing the PRO version of Malwarebytes Anti-Malware to protect against these types of threats in the future, as if you had the real-time protection component, that comes with the paid for version, activated it would not have allowed this infection to install.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

 


 

Associated Antivirus8 Files:

c:\Documents and Settings\All Users\Start Menu\AV8\
c:\Documents and Settings\All Users\Start Menu\AV8\Antivirus8.lnk
c:\Documents and Settings\All Users\Start Menu\AV8\Uninstall.lnk
C:\Program Files\AV8\
C:\Program Files\AV8\av8.exe
%UserProfile%\Desktop\Antivirus8.lnk

File Location Notes:

%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.

 

Associated Antivirus8 Windows Registry Information:

HKEY_CURRENT_USER\Software\A88246
HKEY_CURRENT_USER\Software\WinFD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "AV8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "WinNT-A8I 23.09.2010"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe "Debugger" = "C:\Program Files\AV8\av8.exe -d"

 


 

This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus, Trojan, Spyware, and Malware Removal Logs forum.

If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.


Advertise   |   About Us   |   User Agreement   |   Privacy Policy   |   Contact Us   |   Sitemap   |   Chat   |   Tutorials   |   Uninstall List
Tech Support Forums   |   The Computer Glossary   |   RSS Feeds   |   Startups   |   The File Database   |   Virus Removal Guides   |   Downloads


© 2003-2014 All Rights Reserved Bleeping Computer LLC.
Site Changelog