Remove Antivirus8 or Antivirus 8 (Uninstall Guide)

  • September 23, 2010

Antivirus8 or Antivirus 8 is a rogue anti-spyware program from the same family as Antivirus 7. This rogue is promoted through web sites that pretend to be online anti-malware scanners, but are instead advertisements that when finished state your computer is infected. This fake scanner will then prompt you to download and install Antivirus8 on to your computer in order to protect it. It should be noted that these fake online scanners are just an advertisement that have absolutely no way of knowing what is running on your computer. In fact they will show the same infection results to anyone who visits the page. Therefore, do not be concerned by what these online scanners show you.

  • Antivirus8 screen shot
  • Scanning Screen
  • Scan Summary
  • Alert stating that this is not a genuine Microsoft application
  • Fake virus detected alert
  • Virus detected alert
  • Identity theft alert

When Antivirus8 is installed it will be configured to start automatically when Windows starts. Once started it will perform a scan on your computer and when finished state that it is infected with a variety of malware. If you attempt to use the program to remove any of the malware it finds, though, it will state that you first need to purchase the program before it will remove anything. This is a complete scam as the scan results are all fake and many of the listed files are actually legitimate files that if removed could cause problems for your computer. Therefore, do not manually remove any of the items it displays in its scan results.

While Antivirus8 is running it will also display alerts and warnings that attempt to scare you into thinking your computer has a serious computer security problem. These alerts will state that personal information is being stolen, active malware has been found, or that you are using unlicensed software. The text of some of these alerts are:

This copy of AV is not genuine
Your may be a victim of software counterfeiting. This copy of Antivirus8 is not genuine and is not eligible to receive the full range of upgrades and product support from Microsoft.

Warning! Identity theft attampt detected!
Attacker IP: <random IP address>
Attack Target: Microsoft Corp. Keys
Description: Remote host tries to get access to your personal information.

Warning! New Virus Detected!
Threat Detected: Email-Worm.Zhelatin
Infected file: <random file name>
Description: Worm Email-Worm.Zhelatin.vy is virus-like malware with destructive code, and is able to mutate, replacing its own code by itself. This makes Email-Worm.Zhelatin.vy very dangerous, hard to find, and difficult to delete. Like most viruses, worm Email-Worm-Zhelatin.vy may spread to other computers by secretly emailing themselves to Internet users in your address book.

Antivirus 8 will also attempt to protect itself by not allowing you to run various programs that may assist in removing it. When you attempt to run these types of programs, Antivirus8 will terminate it and then state that the file is infected. The text of the infection alert is:

Warning! Active virus detected!
Threat detected: Keylogger.iSnake.PRO
Infected file: C:\Windows\System32\cmd.exe

Just like the fake scan results, all of the above security alerts are fake and only being shown to scare you into purchasing the program.

Without a doubt, Antivirus 8 was created for one reason; to scare you into thinking your computer has a security problem so that you will then purchase the program. It goes without saying that you should not purchase this program, and if you already have, please contact your credit card company to dispute the charge because the program is a scam and a computer infection. Finally, to remove Antivirus8 and any related malware, please you use the removal guide below.

Self Help Guide

This guide contains advanced information, but has been written in such a way so that anyone can follow it. Please ensure your data is backed up before proceeding.

If you are uncomfortable making changes to your computer or following these steps, do not worry! Instead you can get free one-on-one help by asking in the forums.
  1. Print out these instructions as we may need to close every window that is open later in the fix.

  2. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.

  3. Now you should download Malwarebytes Anti-Malware, or MBAM, from the following location and save it to your desktop:

    Malwarebytes Anti-Malware Download Link (Download page will open in a new window)

  4. When the file has finished downloading, look on your desktop for mb3-setup-1878.1878- and right-click on it and select Rename. The title of the program will now have a blinking cursor where you can edit the name. Please change the name of the program to iexplore.exe.

  5. After you rename the mb3-setup-1878.1878- to iexplorer.exe, close all your programs and Windows on your computer, including this one.

  6. Now double-click on the file you renamed, which is now called iexplore.exe, and the installation of MBAM will start on your computer.

  7. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing and is at the last screen, make sure you uncheck both of the Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware check boxes. Then click on the Finish button. If Malwarebytes' prompts you to reboot, please do not do so.

  8. As this infection will not allow you run executables unless they have certain filenames, we need to rename the core MalwareBytes' Anti-Malware executable so that it can run. To do this open the C:\program files\Malwarebytes' Anti-Malware\ folder. To open this folder, click on the Start button and type in the search field:

    C:\program files\Malwarebytes Anti-Malware\

    Then press the enter button on your keyboard.

  9. The MalwareBytes' Anti-Malware folder should now be open and you should see numerous files within it. Look for a file named mbam.exe and right-click on i. When the menu appears select Rename and change the name of the file to iexplore.exe. Once the file has been renamed to iexplore.exe, double-click on it to start the program. MBAM will now start and you will be at the main program screen as shown below.

    Malwarebytes Anti-Malware

    Please click on the Scan Now button to start the scan. If there is an update available for Malwarebytes it will automatically download and install it before performing the scan.

  10. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.

    Malwarebytes Anti-Malware

  11. When MBAM is finished scanning it will display a screen that displays any malware that it has detected. Please note that the infections found may be different than what is shown in the image below due to the guide being updated for newer versions of MBAM.

    MalwareBytes Scan Results

    You should now click on the Remove Selected button to remove all the seleted malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  12. You can now exit the MBAM program. If you wish to use MalwareBytes' in the future, I suggest you now uninstall and reinstall it again so that all the files are using the correct names.

  13. As many rogues and other malware are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:

    How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector


Your computer should now be free of the Antivirus 8 program. You may want to consider purchasing the PRO version of Malwarebytes Anti-Malware to protect against these types of threats in the future, as if you had the real-time protection component, that comes with the paid for version, activated it would not have allowed this infection to install.

View Associated Antivirus8 Files

c:\Documents and Settings\All Users\Start Menu\AV8\ c:\Documents and Settings\All Users\Start Menu\AV8\Antivirus8.lnk c:\Documents and Settings\All Users\Start Menu\AV8\Uninstall.lnk C:\Program Files\AV8\ C:\Program Files\AV8\av8.exe %UserProfile%\Desktop\Antivirus8.lnk

File Location Notes:

%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.

View Associated Antivirus8 Registry Information

HKEY_CURRENT_USER\Software\A88246 HKEY_CURRENT_USER\Software\WinFD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "AV8" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "WinNT-A8I 23.09.2010" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe "Debugger" = "C:\Program Files\AV8\av8.exe -d"

This is a self-help guide. Use at your own risk. can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus,Trojan,Spyware, and Malware Removal Logs forum.

If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.

search guides


Remember Me
Sign in anonymously