Popular Reviews

Adware Removal

» Adware Removal

Rogueware Removal

» Rogueware Removal

Keylogger Removal

Fix PC Errors

Helpful Definitions

Learn More

» Learn More

Antispyware Reviews

Registry Cleaner Reviews

Firewall Reviews

Spam Filter Reviews



"You guys rock. Your instructions were spot on! Thank You"
- J. Powell

"I was infected by SystemTool today. Thanks for the help on the page. I have removed it completely"
- L. Lepsře

"Your web page on Regclean was extremely helpful and very, very education. Its objectivity to was nothing short of excellent. Thank you..."
- Anthony G. Muya

"I want to express my thanks for the information on removing the browser hijacker. I took the steps you suggested and the follow-on precautions to prevent future infections... Thanks again"
- Carlos

For Information and Removal of AV8

    - what is AV8
    - automatic and manual removal instructions
    - personal assistance provided online or by phone to safely remove AV8.


AV8 is one of over 5 million rogue antivirus programs in the world.  This type of scarware affects nearly five percent of computers, and yours could very well be one of them.  How can you tell?  Are the security warnings you are seeing real or are they part of an elaborate ad campaign?  Rogue antivirus programs are adept at creating the illusion of security threats, and they are notoriously difficult to remove.  Read on to find out how to identify these scareware programs and how to safely and effectively remove them from your system.

What is AV8? 

AV8 is a scareware program, or rogue antivirus program.  These programs work to convince computer users that their systems are infected with malware, trojans, viruses, and other threats.  Their sole objective is to persuade the users to purchase their software, which actually provides little or no real protection.  The use of pop-up ads and false scan results are commonly used tools of the rogue antivirus program, and you will notice that these become more frequent and intrusive.  It is important to remember that any "threats" are false, as are any offers of protection from this rogue program.

AV8 is also known as Antivirus 8 and Antivirus8; it is an update of Antivirus 7.

How Does AV8 Access a Computer?

AV8 is able to access a computer in the following ways:

  • Social engineering methods. When emails are disguised as e-cards, sweepstakes winnings, or news alerts, it prompts a user action, and this is known as social engineering. These methods, which include phishing, make a computer user unwittingly spread or install malware, and scareware can find its way in. This is very common with scareware.
  • Trojans. Trojans are common in sites that offer adult, gaming, pirated, P2P, free, and social networking content. Clicking on an affected link, image, video, or ad can allow the trojans to carry malware into your system.
  • Malicious ads. These are common, particularly if you are searching for computer security information. The ads feature online malware scanners. If clicked on, this can allow rogue programs to enter into your computer.
  • Malicious websites. Again, these are common when you are looking for security information, but they are also common in searches for trending topics. A major current event, for instance, prompts many scareware developers to create websites, which have the relevant keywords. When a user clicks on them, they are presented with ads. Just clicking on the site may be enough to download the rogue program.
  • As a bundle. Third-party vendors sometimes bundle unnecessary software with their products to make money. This is known as "crapware," and it is possible that malware and scareware hitches a ride into your system this way.

What Will You Notice?

Pop-ups.  These are by far the most noticeable signs that a rogue antivirus program has been installed in your system.  They take two forms: alert messages and false scan results. Remember, these are false warnings.  The wording typical of AV8 includes:

  • This copy of AV is not genuine.

Your may be a victim of software counterfeiting.  This copy of Antivirus8 is not genuine and is not eligible to receive product support from Microsoft.

  • Warning! Identity theft attampt detected!

Attacker IP:

Attack Target: Microsoft Corp. Keys

Description: Remote host tries to get access to your personal information.

False scans.  These mimic the results issued by legitimate security programs, and AV8 even uses a recognizable yellow and blue shield system in their ad.  Antivirus8 is printed clearly at the top, accompanied by the slogan, "Protection against malicious software."  The ad in disguise indicates it has found a list of threats and recommends you remove all of these threats by upgrading your protection to the full AV8 software.  The files are not infections; they are either files that the rogue has created or legitimate files.  They are harmless to your system.

Blocked access to security programs.  This is a hallmark of scareware. When you try to run any program that may attempt to remove it, AV8 will issue a warning like the following:

Warning!  Active Virus detected!

Threat detected: Keylogger.iSnake.PRO

Infected file: C:\Windows\System32\cmd.exe

Slow functioning.  Scareware uses your system resources to power itself as it stays resident in your background.  This causes your other programs to respond more slowly, and you may find that routine tasks take longer to perform.

This scareware program is not necessarily harmful by itself; it does, however, leave your computer vulnerable to other forms of malware and should be removed immediately.

Removing AV8

Scareware is not classified as viruses, and it is designed to evade standard removal techniques, such as using the Uninstall feature or running your current antivirus program.  Because of their fairly sophisticated design, it is necessary to use more advanced measures.  Your options are:

Automatic Removal.  When you find a reputable program that has been designed specifically to handle scareware, you can run the software and safely remove AV8 from your machine.  Look for programs that:

  • Update their databases continually
  • Scan registry entries, files, running processes, and folders
  • Has a user-friendly interface with clear calls to action
  • Has technical support available

Two good places to start are:  Malwarebytes Anti-Malware (Malwarebytes has free malware removal) and Enigma's SpyHunter

Manual Removal.  This option can be tricky for those with technical experience, and very challenging for those without.  Most of us do not have a working knowledge of the system registry, and it can be difficult to find every single file.  It is tedious and time-consuming work, but it is possible.  If you would like more help, please don't hesitate to email us for detailed instructions.  When you have the support and time you need, try the following to remove AV8:

Block Processes:


Stop Processes:


Delete Registry Entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "AV8"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "WinNT-A8I 23.09.2010"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe "Debugger" = "C:\Program Files\AV8\av8.exe -d"

Delete AV8 Files:

c:\Documents and Settings\All Users\Start Menu\AV8\
c:\Documents and Settings\All Users\Start Menu\AV8\Antivirus8.lnk
c:\Documents and Settings\All Users\Start Menu\AV8\Uninstall.lnk
C:\Program Files\AV8\
C:\Program Files\AV8\av8.exe

Removing AV8 Automatically/Safely

For free automatic removal we recommend using Malwarebytes Anti-Malware. This program is widely recommended by reputable third-party sites, so you can be reasonably confident of its ability to safely get rid of AV8 and any hidden Trojans. As a precaution we recommend double checking your system with SpyHunter. This program requires paid registration to enable deletions, however it has a money back guaranteed and is the top of the line in malware removal. It should catch malware that evades Malwarebytes and block anything that tries to reinstal itself.

Download SpyHunter

Remove AV8 Now:

  1. Download and install Malwarebytes Anti-Malware and SpyHunter Download  
  2. Run a scan with Malwarebytes Anti-Malware.
  3. Remove all the detected infections (free).
  4. Run a scan with SpyHunter
  5. Remove any remaining infections
  6. Reboot and rescan with SpyHunter. Your computer should now be clean.

Important note: If Malwarebytes is blocked by malware then run Chameleon (Start Menu → All Programs → MalwareBytes' Anti-Malware → Tools → Malwarebytes' Anti-Malware Chameleon). If you need further help removing AV8 please email us at info@removeadware.com.au or call for personal assistance on toll-free number 888-655-3453, within the USA and Canada.

Disclaimer: This webpage was created to provide information on AV8 and how to uninstall it. Manual removal instructions are intended for use by technical experts and should be used at your own risk. We do not own or endorse AV8.

We are affiliated with some of the legitimate programs recommended on this website. Should you choose to use the programs recommended here, we may receive a fee that will help support the site.

All content copyright 2006-2017, RemoveAdware.com.au. Author: Wayne Davis.
All Rights Reserved. All trademarks and company brand names are acknowledged.
Privacy Policy | Terms Of Service