Jump to content

Antivirus utility AVZ 5.53 [Comss]


FaridKhan

Recommended Posts

Antivirus utility AVZ 5.53 [Comss]

[center][img]https://i.postimg.cc/FzTJ3MLq/caeccafa0b35.jpg[/img][/center]


AVZ - Free fast a working antivirus utility. Includes AVZ itself and additional utilities AVZGuard / AVZPM / BootCleaner.
Its main purpose is to detect and remove SpyWare and AdWare modules, as well as Dialer (Trojan.Dialer), Trojans, BackDoor modules, network and mail worms, TrojanSpy, TrojanDownloader, TrojanDropper.
In fact, AVZ is an analogue of the popular Ad-aware program (of course, with its own peculiarities).
Additional options include a heuristic system scan, built-in Rootkit detection, Winsock SPI / LSP settings analyzer, built-in process, service and driver manager, open TCP / UDP port analyzer, Keylogger and Trojan DLLs that work without signatures (the original neuroemulator is used, which allows you to study suspicious files using a neural network).

Additional Information:
• Firmware for heuristic system check. Firmware searches for known SpyWare and viruses by indirect indications - based on the analysis of the registry, files on disk and in memory.
• Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes. The base is connected to all AVZ systems and works on the "friend / foe" principle - safe files are not quarantined, deletion and warning messages are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color; searching for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk);
• Built-in Rootkit detection system. The search for RootKit goes without the use of signatures based on the study of the basic system libraries in order to intercept their functions. AVZ can not only detect RootKit, but also correctly block the UserMode RootKit for its process and KernelMode RootKit at the system level. RootKit counteraction applies to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the search system in the registry "sees" masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by RootKit. One of the main features of the RootKit countermeasure system in my opinion is its performance in Win9X (the widespread opinion about the absence of RootKit, working on the Win9X platform is deeply mistaken - there are hundreds of Trojans known to intercept API functions to mask their presence, to distort the operation of API functions or monitor their use). Another feature is the KernelMode RootKit, a universal detection and blocking system that works under Windows NT, Windows 2000 pro / server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1
• Detector keyloggers (Keylogger) and Trojan DLLs. The search for Keylogger and Trojan DLLs is carried out on the basis of system analysis without using a signature database, which makes it possible to reliably detect in advance unknown Trojan DLL and Keylogger;
• Neuroanalyzer. In addition, the AVZ signature analyzer contains a neuroemulator that allows you to study suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.
• Built-in analyzer Winsock SPI / LSP settings. Allows you to analyze the settings, diagnose possible errors in the settings and make automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities such as LSPFix). To study SPI / LSP manually, the program has a special LSP / SPI settings manager. The Winsock SPI / LSP analyzer is covered by an anti-rootkit;
• Built-in manager of processes, services and drivers. Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it "sees" the processes masked by the rootkit). The process manager is linked to the AVZ safe file database, the identified safe and system files are highlighted in color;
• Built-in utility to find files on the disk. It allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" files masked by the rootkit and can delete them), the filter allows excluding files recognized by AVZ as safe from the search results. The search results are available in the form of a text protocol and in the form of a table, in which you can mark a group of files for later deletion or quarantine
• Built-in utility for searching data in the registry. It allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table, in which you can mark several keys for their export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them)
• Built-in analyzer of open TCP / UDP ports. It is subject to the anti-rootkit effect; in Windows XP, the process using the port is displayed for each port. The analyzer relies on an updated database of ports of known Trojan / Backdoor programs and known system services. Searching for ports of Trojans is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port
• Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt / W2K / XP.
• Built-in analyzer Downloaded Program Files (DPF) - displays DPF elements, connected to all AVZ systems.
• System recovery firmware. Firmware repairs Internet Explorer settings, startup settings, and other system settings that are corrupted by malware. Recovery is started manually, the parameters to be restored are specified by the user.
• Heuristic file deletion. Its essence is that if during the treatment, malicious files were deleted and this option is enabled, then the system is automatically examined, covering classes, BHO, IE and Explorer extensions, all available AVZ types of autorun, Winlogon, SPI / LSP, etc. ... All found links to a remote file are automatically cleaned up, and information is entered into the log about what exactly and where was cleaned up. For this cleaning, the system treatment microprogram engine is actively used;
• Checking archives. Starting from version 3.60 AVZ supports scanning archives and compound files. Currently, archives in ZIP, RAR, CAB, GZIP, TAR formats are being checked; emails and MHT files; CHM archives
Check and disinfect NTFS streams. Checking NTFS streams is included in AVZ since version 3.75
• Control scripts. Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow using AVZ in a corporate network, including its launch during system boot.
• Process analyzer. The analyzer uses neural networks and analysis firmware; it turns on when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.
• AVZGuard system. Designed to combat hard-to-remove malicious programs, in addition to AVZ, it can protect user-specified applications, for example, other anti-spyware and anti-virus programs.
• System of direct access to the disk for working with locked files. Works on FAT16 / FAT32 / NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.
• Driver for monitoring processes and AVZPM drivers. Designed to track the start and stop of processes and load / unload drivers to find cloaked drivers and detect corruptions in the structures describing processes and drivers created by DKOM rootkits.
• Driver Boot Cleaner. Designed to perform system cleaning (removing files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both during computer restart and during disinfection.
New in 5.53:
• Fresh assembly of AVZ with up-to-date databases.
• Removed English. help from the archive.

[img]https://i.postimg.cc/VN8pRL26/Dnomi.gif[/img]

[code] https://rapidgator.net/file/a1396189caddb4db63834b281cd71f45/AVZ_5.53.zip.html
[/code]


[code] https://nitro.download/view/99441D9C8F116D8/AVZ_5.53.zip[/code]


Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...