Popular Reviews

Adware Removal

» Adware Removal

Rogueware Removal

» Rogueware Removal

Keylogger Removal

Fix PC Errors

Helpful Definitions

Learn More

» Learn More

Antispyware Reviews

Registry Cleaner Reviews

Firewall Reviews

Spam Filter Reviews

Antivirus 8


  6th November 2010

Antivirus 8 - One Sequel to Miss This Year

Lots of software designers spend their time building new versions of older programs, and when they upgrade to a newer version, getting a title that includes the edition number (like 8, 9, or 10) is not uncommon. Even Windows does this to some degree. It's not hard to think back to Windows 3.1 and look at the differences implemented between that operating system and today's Windows 7. Just because a program has a wonderfully convincing number after its name, though, doesn't imply that it is as reliable as it should be, and that is certainly the case with Antivirus 8. A rogue security program, this is one piece of software you could probably leave off your list of "Must Installs."

What You May Notice

If you do have Antivirus 8 on your computer, there are several different things you're likely to notice right away. One of the most prominent is the virus scanner itself. It can load as soon as your computer does or any time you happen to have your machine turned on. The virus scanner looks exactly as you might imagine it. At the top left of your screen, you'll see the text "Antivirus 8" and "Protection Against Malicious Software." On the right side of the screen, there's a link that says "Get Full Time Protection." The menu runs down the left side of the program window, and it includes typical entries like "Program Overview," "ScanPC," "License," "Update," and "Help." The rest of the window is devoted to the scan itself, and here it lists the names of the files the scanner found, the alert level for each, and whether or not the problematic software is active on your machine. Once it finishes this scan, you'll get a report that says "Attention" and lists the number of threats the scan found. It lets you know the name of each threat, and at the bottom of the screen, you can click to remove them. Clicking on that button takes you to the site's home page where you'll be asked to purchase the full version of the program before you can move forward.

None of the threats the scanner actually lists are truly threats. Most of them are legitimate programs found on your computer. In fact, removing any of them could seriously damage your operating system as a whole.

In addition to the scanner, pop up security messages are fairly common with this program. These can either come in the form of a more traditional pop up ad that you see online, or they might even appear as a Windows Notification balloon near your computer's clock. Each alert is designed to worry you enough to purchase the full version of the software.  Many of the threats have grammatical errors that distinguish them from actual warning messages you could see on your computer. The text of the three most common ads reads:

  • This copy of AV is not genuine

Your may be a victim of software counterfeiting. This copy of Antivirus 8 is not genuine and is not eligible to receive the full range of upgrades and product support from Microsoft.

  • Warning! Identity Theft Attampt detected!

Attacker IP:

Attack Target: Microsoft Corp. Keys

Description: Remote host tries to get access to your personal information.

  • Warning! New Virus Detected!

Threat Detected: Email-Worm.Zhelatin

Infected file:

Description: Worm Email-Worm.Zhelatin.vy is virus-like malware with desctructive code, and is able to mutate, replacing its own code by itself. This makes Email-Worm.Zhelatin.vy very dangerous, hard to find, and difficult to delete. Like most viruses, worm Email-Worm-Zhelatin.vy may spread to other computers by secretly emailing themselves to Internet users in your address book.

One other notable feature of this program is that it has the ability to keep certain programs from running on your computer. In most cases, it keeps you from running programs that can remove the rogue security software, but that's not always the case. You may find yourself wondering why it stopped one program or another. The most commonly stopped programs are web browsers, task manager, and even the registry editor. In every case, Antivirus 8 will send out a warning message to you to tell you that it is responsible for terminating the program, then it will tell you the file itself has an infection embedded in it. The text usually reads something like: "Warning! Active Virus Detected! Threat detected: Keylogger.iSnake.PRO. Infected File: C:\Windows\System32\cmd.ext." As was the case with the scan results above, the file you tried to run isn't actually infected, so make certain that you don't remove it from your system.

Antivirus 8 - What Is It?

Antivirus 8 is rogue antivirus software, and it's sometimes called rogue security software. The program is related to Antivirus 7 and Antivir 10. All of them display very similar symptoms, and it is possible that you could have more than one installed at the same time. Because they can open security holes inside your system, removing this program or any of its associates at your earliest opportunity is an absolute must.

It is important to note that your current antivirus solution that you have installed on your computer may not be able to handle this problem for you. Remember that it's not actually a virus, and while many good antivirus solutions do a great job at looking at the code definition of virus, then finding it on your computer, they don't always do a great job of detecting rogue programs. As a result, if your software didn't find it, there's no reason to get rid of it. You'll just want to add to your arsenal to build a more comprehensive security suite.

Removing Antivirus 8

Removing this program is easier than you may think. You essentially have two main options. First, you can manually remove it from your system. This involves deleting program files and eliminating the registry keys the program creates. If, however, you've never performed either of these tasks on your own, it's important to note that it can be a bit dangerous, as you could eliminate the wrong files or make a mistake inside the registry, leaving you in a bit of a bind. You can email us for help for a list of detailed instructions. The associated files and registry keys appear at the end of this article. You will have to reveal some hidden files temporarily on your computer during the process, and it's a good idea to go ahead and scan your computer using a solid security program after you've finished to ensure you didn't miss anything.

Your other option is to download and install a dependable antispyware solution. There are many of these available, and two strong choices are Malwarebytes Anti-Malware (Malwarebytes has free malware removal) and Enigma's SpyHunter. Whatever title you decide on, make certain that you update it after you install it, then go ahead and scan your computer with the software. It will remove Antivirus 8 from your computer, and as long as you use it regularly, keep your computer safe from other similar programs in the future.

Associated Files and Registry Keys:

HKEY_CURRENT_USER\Software\A88246
HKEY_CURRENT_USER\Software\WinFD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "AV8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "WinNT-A8I 23.09.2010"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe "Debugger" = "C:\Program Files\AV8\av8.exe -d"

av8.exe

 Antivirus8.lnk

 Uninstall.lnk



We are affiliated with some of the legitimate programs recommended on this website. Should you choose to use the programs recommended here, we may receive a fee that will help support the site.

NEWS | ARTICLES | REVIEWS | CONTACTS | LINK TO US
All content copyright 2006-2017, RemoveAdware.com.au. Author: Wayne Davis.
All Rights Reserved. All trademarks and company brand names are acknowledged.
Privacy Policy | Terms Of Service