Description of AV8 consequences of its residing on your PC

AV 8 (AV8) pretends to provide the following services: virus protection, spyware protection, live protection. AV 7 provided the same kit of services. There is nothing strange in this coincidence, for both these programs are modifications of such renowned counterfeits as Antivir, Antivir 2010, and Antivir Antivirus. The same detection name is normally assigned by spyware scanners to any of these programs.
Online scanner is considered to be a  start point for the trickery aimed at convincing users to perform paid activation of the deceptive and obtrusive program. However, other start points exist and, as a consequence, other trickery workflows are practices.
If the usual pattern is kept, online scanner persuades users into uploading and installing AV 8. Further trickery development is a subject for the sections that follow.
Get rid of AV 8 as it interferes with many programs. Likewise many other rogue self-advertisers, it benefits from these producing relevant alerts. Click here to start virus and fake antispyware disposal right now.

AV8 Technical Details

  • Full name: AV 8, AV8, AV-8
  • Version: 2010
  • Type: Rogue anti-spyware
  • Origin: Russian federation

Signs of being infected with AV8:

Upload of AV 8 might be followed by installation request. This is to legalize the program in the opinion of user. Naturally the program self-installs, if the request is ignored. This request is usually a first sign of the fake antispyware infection. Earlier sign betrays browser hijacker. It is not a sure sign though and is subject to examination. The sign is online scanner displayed by web-browser. In order to make sure the website displayed is a casual redirection by online traps or to remove   AV 8 related hijacker, click here to conduct free system scan.
General symptoms of the adware are similar or rather the same as of other malware of its family released before. Once infected system is launched, the adware starts thanks to startup key in System Registry. It generates popups notifying of the following issues: identity theft attempts, Email-Worm.Zhelatin, Keylogger.iSnake.PRO. The last of the threat notifications explains why certain program cannot run and Keylogger.iSnake.PRO is the reason. In reality, the program is blocked by AV 8 to scaring purposes.
Scan window by AV 8 is one of its nag screens. All the names listed as threats found are random names as no memory scan takes place.

Automatic Removal of AV8 from your PC:

Most of the tricks applied to prevent AV 8 removal do not work in Safe Mode. To get Safe Mode on, reboot and continuously press F8. This will open Advanced Boot Menu and let you choose the required mode.

AV8 Removal Tool

Manual Removal of AV8:

To reboot in Safe Node is a general precaution when removing dangerous programs. Since the fake utility is such, reboot in Safe Mode before disposing of the adware entries to prevent possible system and software and data corruption.

Remove AV8 files and dll’s:

c:\Documents and Settings\All Users\Start Menu\AV8\
c:\Documents and Settings\All Users\Start Menu\AV8\Antivirus8.lnk
c:\Documents and Settings\All Users\Start Menu\AV8\Uninstall.lnk
C:\Program Files\AV8\
C:\Program Files\AV8\av8.exe
%UserProfile%\Desktop\Antivirus8.lnk

Unregister AV8 registry values:

HKEY_CURRENT_USER\Software\A88246
HKEY_CURRENT_USER\Software\WinFD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “AV8”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform “WinNT-A8I 23.09.2010”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe “Debugger” = “C:\Program Files\AV8\av8.exe -d”

AV8 Remover with free scan