The Expert Community for Bathroom Remodeling

Download the avz utility official Russian version. AVZ antivirus utility

AVZ antivirus utility designed to detect and remove SpyWare and AdWare programs from the system, as well as:

  • Dialer (Trojan.Dialer)
  • Trojans
  • Network and mail worms
  • TrojanSpy, TrojanDownloader, TrojanDropper
  • BackDoor modules
The utility is similar to TrojanHunter and LavaSoft Ad-aware 6. The main task of the program is to remove SpyWare and Trojans.

The features of the AVZ utility (except for the signature scanner) are:

  • Heuristic system check firmware. Firmware searches for known SpyWare and viruses based on the analysis of the registry, files on disk and in memory.
  • Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes.
  • Built-in Rootkit detection system.
  • Keylogger and Trojan DLL detector.
  • Neuroanalyzer. In addition to the signature analyzer, AVZ contains a neuroemulator that allows you to analyze suspicious files using a neural network.
  • Built-in analyzer of Winsock SPI/LSP settings.
  • Built-in manager of processes, services and drivers.
  • Built-in utility for searching files on a disk. Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search.
  • Built-in utility for searching data in the registry. Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion.
  • Built-in analyzer of open TCP/UDP ports.
  • Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt/W2K/XP.
  • System recovery firmware. Firmware restores Internet Explorer settings, program launch options, and other system settings corrupted by malware
  • Heuristic file deletion.
  • Checking archives.
  • Checking and treating NTFS streams.
  • AVZGuard system.
  • Boot Cleaner driver.
  • AVZPM process and driver monitoring driver.
  • Process Analyzer.

Changes in AVZ Anti-Virus Utility 4.46 (02/29/2016):

  • Improvements and modifications for compatibility with Windows 10

AVZ is a free utility designed to find and remove viruses, as well as to restore system settings after malicious programs.

Preparation for work

1. Download the AVZ utility from the official website: http://z-oleg.com/avz4.zip

2. Unzip the archive

3. Run the file from the archive avz.exe

4. Go to the menu File and choose Database update

Click Start to start the update process :

Anti-virus databases are being updated:

When the databases are updated, this message will appear. Click OK:

Virus check

To scan for viruses, check all disks on the computer on the left, check the box on the right Perform treatment, and click the button below Start:

System Restore

A very useful feature of the AVZ utility is System Restore. It will come in handy after removing malware to eliminate their traces. To start System Restore, click File -> System Restore:

Check the appropriate checkboxes and click the button Perform marked operations:

Confirm your intent:

Cleaning up browsers with AVZ

From the main menu select File.

Select an item Troubleshooting Wizard:

In field Degree of danger select All problems.

Click Start.

Check the boxes for the following:

  • Clearing the TEMP folder;
  • Adobe Flash Player - cleaning up temporary files;
  • Macromedia Flash Player - clearing caches;
  • Cleaning up the TEMP system folder;
  • Clear caches of all installed browsers;

Click the button Fix flagged issues.

Description:
AVZ
- Free fast antivirus utility. Includes AVZ itself and additional utilities AVZGuard/AVZPM/BootCleaner.
The main purpose is to detect and remove SpyWare and AdWare modules, as well as Dialer (Trojan.Dialer), Trojans, BackDoor modules, network and mail worms, TrojanSpy, TrojanDownloader, TrojanDropper.
In fact, AVZ is an analogue of the popular Ad-aware program (of course, with its own characteristics).
Additional options include heuristic system checks, built-in Rootkit detection system, Winsock SPI/LSP settings analyzer, built-in process, service and driver manager, TCP/UDP open port analyzer, keylogger (Keylogger) and Trojan DLL detector that works without the use of signatures. (the original neuro-emulator is used, which allows you to investigate suspicious files using a neural network).

Features of the AVZ utility:
Heuristic system check firmware. Firmware searches for known SpyWare and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory.
Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes. The database is connected to all AVZ systems and works on the "friend/foe" principle - safe files are not quarantined, deletion and warnings are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color, the search for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk);
Built-in Rootkit detection system. The search for RootKit goes without the use of signatures based on the study of basic system libraries in order to intercept their functions. AVZ can not only detect RootKit, but also correctly block the operation of UserMode RootKit for its process and KernelMode RootKit at the system level. RootKit countermeasures apply to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the registry search system "sees" masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by RootKit. In my opinion, one of the main features of the RootKit countermeasure system is its performance in Win9X (the widespread opinion about the absence of RootKits running on the Win9X platform is deeply erroneous - hundreds of Trojans are known that intercept API functions to mask their presence, to distort the operation of API functions or monitor their use). Another feature is the universal KernelMode RootKit detection and blocking system, which works under Windows NT, Windows 2000 pro/server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1
Keylogger and Trojan DLL detector. The search for Keylogger and Trojan DLLs is based on system analysis without the use of a signature database, which makes it possible to reliably detect previously unknown Trojan DLLs and Keyloggers;
Neuroanalyzer. In addition to the signature analyzer, AVZ contains a neuroemulator that allows you to analyze suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.
Built-in analyzer of Winsock SPI/LSP settings. Allows you to analyze the settings, diagnose possible errors in the settings and perform automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities like LSPFix). To study SPI/LSP manually, the program has a special LSP/SPI settings manager. The operation of the Winsock SPI/LSP analyzer is affected by an anti-rootkit;
Built-in manager of processes, services and drivers. Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it "sees" the processes masked by the rootkit). The process manager is linked to the AVZ safe files database, recognized safe and system files are highlighted in color;
Built-in utility for searching files on a disk. Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the files masked by the rootkit and can delete them), the filter allows you to exclude from the search results files identified by AVZ as safe. Search results are available as a text log and as a table where you can mark a group of files for later deletion or quarantine
Built-in utility for searching data in the registry. Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them)
Built-in analyzer of open TCP/UDP ports. It is affected by the anti-rootkit, in Windows XP, for each port, the process using the port is displayed. The analyzer relies on an updated database of known Trojan/Backdoor ports and known system services. The search for Trojan ports is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port
Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt/W2K/XP.
Built-in analyzer Downloaded Program Files (DPF) - displays DPF elements, connected to all AVZ systems.
System recovery firmware. Firmware restores Internet Explorer settings, program launch options, and other system settings corrupted by malware. Restoration is started manually, parameters to be restored are specified by the user.
Heuristic file deletion. Its essence is that if malicious files were removed during the disinfection and this option is enabled, then an automatic examination of the system is performed, covering classes, BHO, IE and Explorer extensions, all types of autorun available to AVZ, Winlogon, SPI / LSP, etc. . All found references to a deleted file are automatically purged, and information about what exactly was purged and where was entered into the log. For this cleaning, the system treatment microprogram engine is actively used;
Checking archives. Starting from version 3.60 AVZ supports scanning of archives and compound files. At the moment, ZIP, RAR, CAB, GZIP, TAR archives are checked; emails and MHT files; CHM archives
Checking and treating NTFS streams. Checking NTFS streams is included in AVZ since version 3.75
Control scripts. Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to use AVZ in a corporate network, including its launch during system boot.
Process Analyzer. The analyzer uses neural networks and analysis firmware, it is enabled when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.
AVZGuard system. Designed to fight against hard-to-remove malware, in addition to AVZ, it can protect user-specified applications, such as other anti-spyware and anti-virus programs.
Direct disk access system for working with locked files. Works on FAT16/FAT32/NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.
AVZPM process and driver monitoring driver. Designed to track the start and stop of processes and loading / unloading drivers to search for masquerading drivers and detect distortions in the structures describing processes and drivers created by DKOM rootkits.
Boot Cleaner driver. Designed to clean up the system (remove files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both in the process of restarting the computer, and during the treatment.

Note:
In case of problems with automatic database updates, you can download the archive containing the entire current database - avzbase.zip (the archive is updated twice a day)

AVZ is an effective and popular antivirus program among users. AVZ has extensive functionality that allows you to detect and subsequently neutralize various dangerous elements. These include viruses, mail and network worms, rootkits, trojans, and the like. The application contains a huge number of important tools to ensure guaranteed protection against viruses. It is also necessary to note the database of safe updated files.

Purpose of AVZ Free Antivirus Utility

The main purpose of the AVZ antivirus utility is to detect and remove:

Dialer (Trojan.Dialer).

AdWare and SpyWare modules.

Trojan programs.

Mail and network worms.

BackDoor modules.

TrojanDropper, TrojanDownloader, TrojanSpy.

Key Features

Firmware that provides heuristic system checks. The action of the firmware is based on the search for known viruses and SpyWare based on the available indirect signs - based on the analysis of files, the registry in memory and on the disk.

Updated database of system and safe files. This database includes digital signatures of thousands of safe process files and system files. The base is connected to each of the systems of the AVZ anti-virus utility, and its functioning is carried out according to the “friend/foe” principle - safe files are not quarantined, warnings and deletion are blocked for them, the base is used by anti-rootkit, various analyzers, file search system. The built-in process manager, in particular, highlights safe services and processes with a certain color, and file search can use the exclusion of known files from the search (which is very important and useful when searching for Trojans on a disk).

Built-in Rootkit Finder. RootKit detection is carried out based on the study of the main system libraries for the possibility of intercepting their functions without the use of signatures. The anti-virus utility is able to detect not only RootKit, but also correctly block the actions of UserMode RootKit in its process, as well as KernelMode RootKit at the system level. The RootKit countermeasure function is available in all AVZ service functions, as a result, the AVZ scanner is able to detect masked processes, and in the registry, the search system easily finds masked keys and the like.

The anti-rootkit is equipped with an analyzer that searches for services and processes where RootKit is disguised. One of the main features of the AVZ system of the RootKit countermeasures utility lies in its operability in Win9X (many rootkits work on Win9X systems too, intercepting API functions to disguise themselves). The next feature of AVZ will be a universal system for finding and blocking KernelMode RootKit.

Keylogger and Trojan DLL detector. The search for Trojan DLLs, as well as Keylogger keyloggers, is performed without using a signature database based on system analysis, which makes it possible to detect previously unknown Keylogger and Trojan DLLs with great confidence.

Neuroanalyzer. AVZ for Windows, in addition to the signature analyzer, includes a neuroemulator that can analyze suspicious files using a neural network. To date, the neural network is effectively used in the keylogger detector.

Winsock SPI/LSP Settings Analyzer. The built-in Winsock analyzer makes it possible to analyze the settings, diagnose possible errors in the settings, and then perform automatic treatment. The possibility of automatic diagnostics and subsequent treatment will be extremely useful for beginners and inexperienced users (there is no automatic treatment in programs like LSPFix). To study SPI/LSP manually, the utility uses a specialized LSP/SPI settings manager. And on Winsock, an anti-rootkit action is performed, which stops the work of malicious code.

Built-in manager of services, processes and drivers. This built-in dispatcher is designed to study loaded libraries, running processes, drivers and services. The operation of the process manager is also affected by the anti-rootkit (as a result, it can “see” processes that are masked by the rootkit). The process manager has a close relationship with the AVZ utility's safe files database, recognized system and safe files are highlighted in a special color;

Built-in utility that searches for files on a disk. This utility allows you to search for files according to a variety of criteria, while the capabilities of the search system are an order of magnitude higher than those of the system search. The anti-rootkit also extends to the search system, thanks to which the search quickly detects files masked by the rootkit and can delete them. At the same time, files identified as safe can be filtered out using a filter that excludes these files from search results. The search results can be made available as a table or as a text log, where you can mark the listed files for quarantine or subsequent deletion.

Built-in utility for finding data in the registry. This utility allows you to search for parameters and keys according to a given pattern, the results will be available in the form of a table or in the form of a text protocol, where you can immediately mark a group of keys for deleting or exporting them. The anti-rootkit quickly detects files masked by the rootkit and can easily delete them.

TCP/UDP Open Port Analyzer. It is also protected by an anti-rootkit, in Windows XP it is even displayed for each port of the process that uses it. The analyzer is based on a timely updated database of ports of known system services and Trojan/Backdoor programs. The search for Trojan ports is included in the basic system check algorithm - if suspicious ports are detected, a warning is indicated in the protocol indicating which Trojans can use this port for malicious purposes.

Analyzer of network sessions, shared resources of open files over the network. It works in Nt/W2K/XP and Win9X.

DPF Analyzer (Downloaded Program Files)- shows DPF elements, has a connection to AVZ systems.

Heuristic file deletion. If this option is enabled and dangerous files were removed during disinfection, then an automatic system scan is performed, which includes IE extensions, classes, BHO, Winlogon, autorun types, and the like. Detected links to a dangerous file are cleaned, and this is noted in the protocol. For cleaning, microprograms for treating the system are actively used.

System recovery firmware. They restore settings for program launch options, Internet Explorer, and other settings corrupted by malware. You can start the recovery manually, the user specifies the parameters to be restored.

Checking archives. Since version 3.60 AVZ, archives and component parts are checked. TAR, GZIP, RAR, ZIP archives are being checked; MHT files and CHM emails; archives.

Control scripts. The administrator can write a script that will perform a set of specified operations on the user's PC. Such scripts are convenient to use in a corporate network.

Checking and treating an NTFS stream.

Process Analyzer. Uses microprograms for analysis and neural networks. Used in advanced analysis, designed to find suspicious processes in memory.

AVZGuard function. Provides a fight against hard-to-remove dangerous programs, it is also able to protect applications that the user specifies.

Boot Cleaner Driver. Used to clean the system (registry keys, drivers, files) from KernelMode.

Process monitoring driver as well as AVZPM drivers. Used to track startup, load/unload drivers, stop processes, find masquerading drivers, and find changes in driver structures that create DKOM rootkits.

Direct access function for working with locked files. Allows the scanner to analyze locked files and send them to quarantine.

AVZ is a small free program to remove spyware and adware from your computer. This application is equipped with scanning and automatic detection of potential threats.

While surfing the Web or installing software, there is a possibility that malware will also be installed unnoticed, which will display ads or steal passwords.

To protect your working system from such malicious applications, it is good to use the AVZ utility. It scans systems for dangerous files, uses heuristics to detect suspicious software in the background, quarantines infected objects, and more. By downloading AVZ for free, you can protect your confidential data from unauthorized persons. In addition, the application protects the computer from installing adware in browsers.

The main functions of AVZ are to ensure the security of the computer and remove the malware present on it. To do this, this anti-virus software uses a special algorithm in the background - heuristic analysis. For prevention, you can force a scan of selected areas of the hard drive. In addition, checking removable media when connected to a PC has a good effect - many computers get infected in this way. Detected viruses can be removed or quarantined.

The program is highly customizable, and you can choose all the necessary values ​​​​so that in the future it will make all decisions for you and not distract you from other things.

The main features of the AVZ program are as follows:

  • detection of different types of malicious software;
  • Scanning System;
  • use of heuristic analysis;
  • keylogger detection;
  • removable media scanning;
  • checking active processes;
  • detection of potential vulnerabilities.

The AVZ program does an excellent job with adware or spyware. At the same time, it works in the background, but you can force the scanning process to quickly search for new vulnerabilities. Note that this antivirus works without installation and for work you just need to download AVZ for free and unzip its archive to the desired folder.

However, this program is not omnipotent, and for comprehensive protection of your computer, it is better to install another antivirus software, such as Avast or Norton. As an analogue of AVZ, you can use the Ad-Aware Free antivirus, which also detects malware well.

Similar posts