How to set up smartphones and PCs. Informational portal

Download the avz utility without registration. AVZ antivirus utility

Description:
AVZ
- Free fast antivirus utility. Includes AVZ itself and additional utilities AVZGuard/AVZPM/BootCleaner.
The main purpose is to detect and remove SpyWare and AdWare modules, as well as Dialer (Trojan.Dialer), Trojans, BackDoor modules, network and mail worms, TrojanSpy, TrojanDownloader, TrojanDropper.
In fact, AVZ is an analogue of the popular Ad-aware program (of course, with its own characteristics).
Additional options include heuristic system checks, built-in Rootkit detection system, Winsock SPI/LSP settings analyzer, built-in process, service and driver manager, TCP/UDP open port analyzer, keylogger (Keylogger) and Trojan DLL detector that works without the use of signatures. (the original neuro-emulator is used, which allows you to investigate suspicious files using a neural network).

Features of the AVZ utility:
Heuristic system check firmware. Firmware searches for known SpyWare and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory.
Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes. The database is connected to all AVZ systems and works on the "friend/foe" principle - safe files are not quarantined, deletion and warnings are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color, the search for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk);
Built-in Rootkit detection system. The search for RootKit goes without the use of signatures based on the study of basic system libraries in order to intercept their functions. AVZ can not only detect RootKit, but also correctly block the operation of UserMode RootKit for its process and KernelMode RootKit at the system level. RootKit countermeasures apply to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the registry search system "sees" masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by RootKit. In my opinion, one of the main features of the RootKit countermeasure system is its performance in Win9X (the widespread opinion about the absence of RootKits running on the Win9X platform is deeply erroneous - hundreds of Trojans are known that intercept API functions to mask their presence, to distort the operation of API functions or monitor their use). Another feature is the universal KernelMode RootKit detection and blocking system, which works under Windows NT, Windows 2000 pro/server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1
Keylogger and Trojan DLL detector. The search for Keylogger and Trojan DLLs is based on system analysis without the use of a signature database, which makes it possible to reliably detect previously unknown Trojan DLLs and Keyloggers;
Neuroanalyzer. In addition to the signature analyzer, AVZ contains a neuroemulator that allows you to analyze suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.
Built-in analyzer of Winsock SPI/LSP settings. Allows you to analyze the settings, diagnose possible errors in the settings and perform automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities like LSPFix). To study SPI/LSP manually, the program has a special LSP/SPI settings manager. The operation of the Winsock SPI/LSP analyzer is affected by an anti-rootkit;
Built-in manager of processes, services and drivers. Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it "sees" the processes masked by the rootkit). The process manager is linked to the AVZ safe files database, recognized safe and system files are highlighted in color;
Built-in utility for searching files on a disk. Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the files masked by the rootkit and can delete them), the filter allows you to exclude from the search results files identified by AVZ as safe. Search results are available as a text log and as a table where you can mark a group of files for later deletion or quarantine
Built-in utility for searching data in the registry. Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them)
Built-in analyzer of open TCP/UDP ports. It is affected by the anti-rootkit, in Windows XP, for each port, the process using the port is displayed. The analyzer relies on an updated database of known Trojan/Backdoor ports and known system services. The search for Trojan ports is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port
Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt/W2K/XP.
Built-in analyzer Downloaded Program Files (DPF) - displays DPF elements, connected to all AVZ systems.
System recovery firmware. Firmware restores Internet Explorer settings, program launch options, and other system settings corrupted by malware. Restoration is started manually, parameters to be restored are specified by the user.
Heuristic file deletion. Its essence is that if malicious files were removed during the treatment and this option is enabled, then an automatic examination of the system is performed, covering classes, BHO, IE and Explorer extensions, all types of autorun available to AVZ, Winlogon, SPI / LSP, etc. . All found references to a deleted file are automatically purged, and information about what exactly was purged and where was entered into the log. For this cleaning, the system treatment microprogram engine is actively used;
Checking archives. Starting from version 3.60 AVZ supports scanning of archives and compound files. At the moment, ZIP, RAR, CAB, GZIP, TAR archives are checked; emails and MHT files; CHM archives
Checking and treating NTFS streams. Checking NTFS streams is included in AVZ since version 3.75
Control scripts. Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to use AVZ in a corporate network, including its launch during system boot.
Process Analyzer. The analyzer uses neural networks and analysis firmware, it is enabled when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.
AVZGuard system. Designed to fight against hard-to-remove malware, in addition to AVZ, it can protect user-specified applications, such as other anti-spyware and anti-virus programs.
Direct disk access system for working with locked files. Works on FAT16/FAT32/NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.
AVZPM process and driver monitoring driver. Designed to track the start and stop of processes and loading / unloading drivers to search for masquerading drivers and detect distortions in the structures describing processes and drivers created by DKOM rootkits.
Boot Cleaner driver. Designed to clean up the system (remove files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both in the process of restarting the computer, and during the treatment.

Note:
In case of problems with automatic database updates, you can download the archive containing the entire current database - avzbase.zip (the archive is updated twice a day)

AVZ is a free anti-virus program that is designed to clean your computer from Spyware and Adware programs, various Backdoor and Trojan components and other malicious code (Trojan downloaders, Dialer, etc.).

In addition to standard scanners (with a heuristic analyzer) and an auditor, it includes a number of malware removal automation tools, some of which are atypical (for 2007) and provide a fairly competent user with advanced controls.

The program was developed by Oleg Zaitsev. Since 2007, Oleg has been working at Kaspersky Lab and remains the sole developer of AVZ. The developments and technologies used in AVZ are included in the main products of Kaspersky Lab - Kaspersky Internet Security 2009/2010 and Kaspersky for Windows Workstations 6 MP4.

Appointment AVZ

The AVZ program is used to find and remove:

  • Spyware and Adware
  • Trojans
  • Backdoor
  • Viruses
  • Network worms
  • Mail worms
  • rootkits
  • Keyloggers

The program is also used to create logs useful when asking for help on antivirus forums.

Tools built into AVZ

  • System Heuristic Firmware

Microprograms search for known Spyware and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory.

  • Updated database of safe files

It includes digital signatures of tens of thousands of system files and files of known safe processes. The database is connected to all AVZ systems and works on the "friend/foe" principle - safe files are not quarantined, deletion and warnings are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color, the search for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk).

  • Rootkit detector (built-in)

The search for rootkits goes without the use of signatures, based on the study of basic system libraries in order to intercept their functions. AVZ can not only detect rootkits, but also properly block rootkits. Rootkit resistance applies to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the registry search system “sees” masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by rootkits. A feature of the anti-rootkit system is its performance in Windows 9x. Another feature is the universal system for detecting and blocking KernelMode rootkits, which works under Microsoft Windows NT, Microsoft Windows 2000 pro/server, Microsoft Windows XP/XP SP1/XP SP2/XP SP3, Microsoft Windows 2003 Server, Microsoft Windows 2003 Server SP1.

  • Keylogger and Trojan DLL detector

The search for keyloggers and Trojan DLLs is based on the analysis of the system without using the signature database, which makes it possible to reliably detect previously unknown Trojan DLLs and keyloggers.

  • Neuroanalyzer

In addition to the signature analyzer, AVZ contains a neuro-emulator that allows you to analyze suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.

  • Winsock SPI/LSP settings analyzer (built-in)

Allows you to analyze the settings, diagnose possible errors in the settings and perform automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities like LSPFix). To study SPI/LSP manually, the program has a special LSP/SPI settings manager. The operation of the Winsock SPI/LSP analyzer is affected by the anti-rootkit.

  • Manager of processes, services and drivers (built-in)

Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it “sees” the processes masked by the rootkit). The process manager is linked to the AVZ safe files database, recognized safe and system files are highlighted in color.

  • Utility for searching files on disk (built-in)

Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the files masked by the rootkit and can delete them), the filter allows you to exclude from the search results files identified by AVZ as safe. Search results are available as a text log and as a table where you can mark a group of files for later deletion or quarantine.

  • Utility for searching data in the registry (built-in)

Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them).

  • TCP/UDP open port analyzer (built-in)

It is affected by the anti-rootkit, in Microsoft Windows XP, for each port, the process using the port is displayed. The analyzer relies on an updated database of known Trojan/Backdoor ports and known system services. The search for Trojan ports is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port.

  • Analyzer of shared resources, network sessions and files open on the network (built-in)

Works in Microsoft Windows 9x and in Microsoft Windows NT/2000/XP.

  • Downloaded Program Files (DPF) analyzer (built-in)

Displays DPF elements, connected to all AVZ systems.

  • System recovery firmware

Firmware restores settings, program launch options, and other system settings damaged by malware. Restoration is started manually, parameters to be restored are specified by the user.

  • Heuristic file deletion

Its essence is that if malicious files were removed during the disinfection and this option is enabled, then an automatic examination of the system is performed, covering classes, BHO, extensions and Explorer, all types of autorun available to AVZ, Winlogon, SPI / LSP, etc. All found references to a deleted file are automatically cleaned up, and information about what exactly was cleaned up and where was entered into the log. For this cleaning, the microprogram engine for treating the system is actively used.

  • Checking archives

Starting from version 3.60, AVZ supports scanning of archives and compound files. At the moment, ZIP, RAR, CAB, tar archives are checked; emails and MHT files; CHM archives.

  • Checking and treating NTFS streams

Checking NTFS streams has been included in AVZ since version 3.75.

  • Control scripts

Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to use AVZ in a corporate network, including its launch during system boot.

  • Process Analyzer

The analyzer uses neural networks and analysis firmware, it is enabled when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.

  • AVZGuard system

Designed to fight hard-to-remove malware, in addition to AVZ, it can protect user-specified applications, such as other anti-spyware and anti-virus programs.

  • Direct disk access system for working with locked files

Works on FAT16/FAT32/NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.

  • AVZPM Process and Driver Monitoring Driver

Designed to track the start and stop of processes and loading / unloading drivers to search for masquerading drivers and detect distortions in the structures describing processes and drivers created by DKOM rootkits.

  • Boot Cleaner Driver

Designed to clean up the system (remove files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both in the process of restarting the computer, and during the treatment.

Antivirus utility AVZ designed to detect and remove:

  • SpyWare and AdWare modules - this is the main purpose of the utility
  • Dialer (Trojan.Dialer)
  • Trojans
  • BackDoor modules
  • Network and mail worms
  • TrojanSpy, TrojanDownloader, TrojanDropper

The main features of the AVZ utility (in addition to the typical signature scanner)

System Heuristic Firmware. Firmware searches for known SpyWare and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory.

Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes. The database is connected to all AVZ systems and works on the "friend/foe" principle - safe files are not quarantined, deletion and warnings are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color, the search for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk);

Built-in Rootkit detection system. The search for RootKit goes without the use of signatures based on the study of basic system libraries in order to intercept their functions. AVZ can not only detect RootKit, but also correctly block the operation of UserMode RootKit for its process and KernelMode RootKit at the system level. RootKit countermeasures apply to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the registry search system "sees" masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by RootKit. In my opinion, one of the main features of the RootKit countermeasure system is its performance in Win9X (the widespread opinion about the absence of RootKits running on the Win9X platform is deeply erroneous - hundreds of Trojans are known that intercept API functions to mask their presence, to distort the operation of API functions or monitor their use). Another feature is the universal KernelMode RootKit detection and blocking system, which works under Windows NT, Windows 2000 pro/server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1

Keylogger and Trojan DLL detector. The search for Keylogger and Trojan DLLs is based on system analysis without the use of a signature database, which makes it possible to reliably detect previously unknown Trojan DLLs and Keyloggers;

Neuroanalyzer. In addition to the signature analyzer, AVZ contains a neuroemulator that allows you to analyze suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.

Built-in Winsock SPI/LSP Settings Analyzer. Allows you to analyze the settings, diagnose possible errors in the settings and perform automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities like LSPFix). To study SPI/LSP manually, the program has a special LSP/SPI settings manager. The operation of the Winsock SPI/LSP analyzer is affected by an anti-rootkit;

Built-in manager of processes, services and drivers. Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it "sees" the processes masked by the rootkit). The process manager is linked to the AVZ safe files database, recognized safe and system files are highlighted in color;

Built-in utility for searching files on a disk. Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the files masked by the rootkit and can delete them), the filter allows you to exclude from the search results files identified by AVZ as safe. Search results are available as a text log and as a table where you can mark a group of files for later deletion or quarantine

Built-in utility for searching data in the registry. Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them)

Built-in TCP/UDP Open Port Analyzer. It is affected by the anti-rootkit, in Windows XP, for each port, the process using the port is displayed. The analyzer relies on an updated database of known Trojan/Backdoor ports and known system services. The search for Trojan ports is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port

Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt/W2K/XP.

Built-in Downloaded Program Files (DPF) analyzer- displays DPF elements, connected to all AVZ systems.

System recovery firmware. Firmware restores Internet Explorer settings, program launch options, and other system settings corrupted by malware. Restoration is started manually, parameters to be restored are specified by the user.

Heuristic file deletion. Its essence is that if malicious files were removed during the treatment and this option is enabled, then an automatic examination of the system is performed, covering classes, BHO, IE and Explorer extensions, all types of autorun available to AVZ, Winlogon, SPI / LSP, etc. . All found references to a deleted file are automatically purged, and information about what exactly was purged and where was entered into the log. For this cleaning, the system treatment microprogram engine is actively used;

Checking archives. Starting from version 3.60 AVZ supports scanning of archives and compound files. At the moment, ZIP, RAR, CAB, GZIP, TAR archives are checked; emails and MHT files; CHM archives

Checking and treating NTFS streams. Checking NTFS streams is included in AVZ since version 3.75

Control scripts. Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to use AVZ in a corporate network, including its launch during system boot.

Process Analyzer. The analyzer uses neural networks and analysis firmware, it is enabled when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.

AVZGuard system. Designed to fight against hard-to-remove malware, in addition to AVZ, it can protect user-specified applications, such as other anti-spyware and anti-virus programs.

Direct disk access system for working with locked files. Works on FAT16/FAT32/NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.

AVZPM Process and Driver Monitoring Driver. Designed to track the start and stop of processes and loading / unloading drivers to search for masquerading drivers and detect distortions in the structures describing processes and drivers created by DKOM rootkits.

Boot Cleaner Driver. Designed to clean up the system (remove files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both in the process of restarting the computer, and during the treatment.

AVZ is a small free program to remove spyware and adware from your computer. This application is equipped with scanning and automatic detection of potential threats.

While surfing the Web or installing software, there is a possibility that malware will also be installed unnoticed, which will display ads or steal passwords.

To protect your working system from such malicious applications, it is good to use the AVZ utility. It scans systems for dangerous files, uses heuristics to detect suspicious software in the background, quarantines infected objects, and more. By downloading AVZ for free, you can protect your confidential data from unauthorized persons. In addition, the application protects the computer from installing adware in browsers.

The main functions of AVZ are to ensure the security of the computer and remove the malware present on it. To do this, this anti-virus software uses a special algorithm in the background - heuristic analysis. For prevention, you can force a scan of selected areas of the hard drive. In addition, checking removable media when connected to a PC has a good effect - many computers get infected in this way. Detected viruses can be removed or quarantined.

The program is highly customizable, and you can choose all the necessary values ​​​​so that in the future it will make all decisions for you and not distract you from other things.

The main features of the AVZ program are as follows:

  • detection of different types of malicious software;
  • Scanning System;
  • use of heuristic analysis;
  • keylogger detection;
  • removable media scanning;
  • checking active processes;
  • detection of potential vulnerabilities.

The AVZ program does an excellent job with adware or spyware. At the same time, it works in the background, but you can force the scanning process to quickly search for new vulnerabilities. Note that this antivirus works without installation, and for work you just need to download AVZ for free and unzip its archive to the desired folder.

However, this program is not omnipotent, and for comprehensive protection of your computer, it is better to install another antivirus software, such as Avast or Norton. As an analogue of AVZ, you can use the Ad-Aware Free antivirus, which also detects malware well.

Program interface: Russian

Platform:XP/7/Vista

Manufacturer: Oleg Zaitsev

AVZ is a very powerful free anti-virus package that combines in its functionality quite a lot of features that are characteristic not only of anti-viruses, but also of anti-advertising modules, and even optimizers of the operating system itself.

The main features of the AVZ program

To begin with, we note exactly those main modules that are part of this software product. These are modules AVZGuard, AVZPM, BootCleaner and several others. The first module is designed to track and correctly remove various kinds of malicious programs that cannot be removed by the built-in tools of the operating system. The second component is a tool for monitoring system processes, background services, and drivers loaded into the system. The third module is an operating system optimizer that allows you to remove unnecessary files, dynamic libraries, perform a complete cleaning of the system registry, check and fix boot sector entries, and much more.

As for the basic principles of the program, they, like most programs of this kind, are based on in-depth heuristic analysis. Moreover, the application is able to block rootkits, spyware and trojans that work without the use of signatures. By the way, some anti-virus programs may not detect and allow this kind of threat to enter the system, since they are built specifically on scanning signatures. In this case, things are a little different. In addition, this software package has a constantly running Winsock SPI / LSP connection monitoring tool, taking into account the analysis of all settings. Equally important is the function of analyzing and constantly monitoring TCP / UDP settings, the external use of which can lead to malware penetration into the system. Also, the program prevents third-party unauthorized access, including blocking hacker attacks.

If we talk about restoring settings, then they are presented quite differently. First of all, this concerns the settings of Internet Explorer and the launch settings of programs and applications that could be damaged as a result of malware penetrating the computer. And, of course, the application allows you to block and get rid of various keyloggers that can track all user actions on the keyboard, thereby allowing you to find out passwords for accessing sites, web wallets, various cards, etc.

Top Related Articles