Antivirus utility avz 4.45. AVZ - antivirus from Zaitsev. Desktop startup recovery


tweet

There are universal programs like a Swiss knife. The hero of my article is just such a "universal". His name is AVZ(Antivirus Zaitsev). With the help of this free You can catch antivirus and viruses, and optimize the system, and fix problems.

AVZ features

I already talked about the fact that this is an antivirus program in. About the work of AVZ as a one-time antivirus (more precisely, an anti-rootkit) is well described in its help, but I will show you the other side of the program: checking and restoring settings.

What can be "fixed" with AVZ:

  • Repair startup programs (.exe, .com, .pif files)
  • Reset Internet Explorer settings to default
  • Restore Desktop Settings
  • Remove rights restrictions (for example, if a virus blocked the launch of programs)
  • Remove banner or window that appears before login
  • Remove viruses that can run with any program
  • Unblock Task Manager and Registry Editor (if the virus has prevented them from running)
  • Clear file
  • Disable autorun programs from flash drives and disks
  • Delete junk files from hard drive
  • Fix desktop issues
  • And much more

It can also be used to check the safety of Windows settings (in order to better protect against viruses), as well as optimize the system by cleaning startup.

The AVZ download page is at .

The program is free.

First, let's protect our Windows from careless actions

The AVZ program has very many functions affecting the operation of Windows. This is dangerously, because in case of an error, trouble can happen. Please read the text and help carefully before doing anything. The author of the article is not responsible for your actions.

In order to be able to "return everything as it was" after careless work with AVZ, I wrote this chapter.

This is a mandatory step, in fact, the creation of a "retreat" in case of careless actions - thanks to the restore point, it will be possible to restore the settings, the Windows registry to an earlier state.

Windows Recovery is a required component of all versions of Windows, starting with Windows ME. It is a pity that they usually do not remember about it and waste time reinstalling Windows and programs, although it was possible to just click a couple of times with the mouse and avoid all problems.

If the damage is serious (for example, some system files have been deleted), then System Restore will not help. In other cases - if you configured Windows incorrectly, "tricked" with the registry, installed a program from which Windows does not boot, incorrectly used the AVZ program - "System Restore" should help.

After work, AVZ creates subfolders with backups in its folder:

/backup- backup copies of the registry are stored there.

/Infected- copies of removed viruses.

/quarantine- copies of suspicious files.

If problems started after AVZ was running (for example, you thoughtlessly used the AVZ System Restore tool and the Internet stopped working) and Windows System Restore did not roll back the changes made, you can open registry backups from the folder backup.

How to create a restore point

Let's go to Start - Control Panel - System - System Protection:

Click "System Protection" in the "System" window.

Press the "Create" button.

The process of creating a restore point can take up to ten minutes. Then a window will appear:

The restore point will be created. By the way, they are automatically created when you install programs and drivers, but not always. Therefore, before dangerous actions (setting up, cleaning the system), it is better to once again create a restore point in order to praise yourself for foresight in case of trouble.

How to restore your computer using a restore point

There are two options for launching System Restore - from under running Windows and using the installation disc.

Option 1 - if Windows starts

Let's go to Start - All Programs - Accessories - System Tools - System Restore:

will start Choose a different restore point and press Further. A list of restore points will open. Choose the one you need:

The computer will automatically restart. After downloading, all settings, its registry and some important files will be restored.

Option 2 - If Windows won't boot

You need an "installation" disk with Windows 7 or Windows 8. Where to get it (or download), I wrote in.

We boot from the disk (how to boot from boot disks, it is written) and select:

Choose "System Restore" instead of installing Windows

Repairing the system after viruses or inept actions with the computer

Before all actions, get rid of viruses, for example, using. Otherwise, there will be no sense - the corrected settings will be "broken" by the running virus again.

Restarting Programs

If a virus has blocked the launch of any programs, then AVZ will help you. Of course, you also need to start AVZ itself, but it's pretty easy:

First we go to Control Panel- set any type of view, except for Category - Folders settings - View- uncheck Hide extensions for registered file types - OK. Now each file has extension- a few characters after the last dot in the name. Programs usually .exe and .com. To run AVZ antivirus on a computer where programs are prohibited, rename the extension to cmd or pif:

Then AVZ will start. Then in the program window itself, press File - :

Points to be noted:

1. Restore launch options.exe, .com, .pif files(actually solves the problem of running programs)

6. Remove all Policies (restrictions) of the current user(in some rare cases, this item also helps to solve the problem of starting programs if the virus is very harmful)

9. Removing system process debuggers(it is highly desirable to note this item, because even if you checked the system with an antivirus, something could remain from the virus. It also helps if the Desktop does not appear when the system starts)

, confirm the action, a window appears with the text "System Restore Completed". After that, it remains to restart the computer - the problem with starting programs will be solved!

Desktop startup recovery

A fairly common problem is that the desktop does not appear when the system starts.

Run Desktop you can do this: press Ctrl + Alt + Del, launch the Task Manager, there we press File - New Task (Run...) - enter explorer.exe:

OK- The desktop will start. But this is only a temporary solution to the problem - the next time you turn on the computer, you will have to repeat everything again.

In order not to do this every time, you need to restore the program launch key explorer("Explorer", which is responsible for the standard viewing of the contents of folders and the work of the Desktop). In AVZ we press File- and mark the item

Perform marked operations, confirm the action, press OK. Now when you start the computer, the desktop will start normally.

Unlock Task Manager and Registry Editor

If the virus has blocked the launch of the two above-mentioned programs, the ban can be removed through the AVZ program window. Just check two things:

11. Unlock Task Manager

17. Unlock Registry Editor

And press Perform the marked operations.

Problems with the Internet (Vkontakte, Odnoklassniki and antivirus sites do not open)

This component can check four categories of problems with different degrees of severity (each degree differs in the number of settings):

System problems- this includes security settings. By ticking the found items and clicking the button Fix flagged issues, some loopholes for viruses will be blocked. There is also a reverse side of the coin - increasing safety, reducing comfort. For example, if you disable autorun from removable media and CD-ROMs, when inserting flash drives and disks, a window with a choice of actions will not appear (view the contents, start the player, etc.) - you will have to open the Computer window and start viewing the contents of the disk manually. That is, viruses will not start automatically, and a convenient hint will not appear. Depending on the Windows settings, everyone will see their own list of system vulnerabilities here.

Browser settings and tweaks- Internet Explorer security settings are checked. As far as I know, the settings of other browsers (Google Chrome, Opera, Mozilla Firefox and others) are not checked. Even if you do not use Internet Explorer to surf the Internet, I advise you to run a check - the components of this browser are often used in various programs and are a potential "security hole" that should be closed.

Cleaning the system- partially duplicates the previous category, but does not affect the places where data about user actions are stored.

I recommend checking your system in categories System problems and Browser settings and tweaks by selecting the degree of danger Moderate problems. If the viruses did not touch the settings, then most likely you will be offered only one item - “autorun from removable media is allowed” (flash drives). If you check the box and thus prohibit autorun programs from flash drives, then you will at least partially protect your computer from viruses distributed on flash drives. More complete protection is achieved only with and working.

Cleaning the system from unnecessary files

Programs AVZ can clean the computer from unnecessary files. If the hard disk cleanup program is not installed on the computer, then AVZ will do, since there are many possibilities:

More about points:

  1. Clear system cache Prefetch- cleaning the folder with information about which files to load in advance for quick launch of programs. The option is useless, because Windows itself quite successfully monitors the Prefetch folder and cleans it up when required.
  2. Delete Windows log files- you can clean up a variety of databases and files that store various records of events occurring in the operating system. The option is useful if you need to free up a dozen or two megabytes of hard disk space. That is, the benefit from using is scanty, the option is useless.
  3. Delete memory dump files- when critical errors occur, Windows stops its work and shows a BSOD (blue screen of death), at the same time saving information about running programs and drivers to a file for later analysis by special programs to identify the culprit of the failure. The option is almost useless, as it allows you to win only ten megabytes of free space. Clearing the memory dump files does not harm the system.
  4. Clear Recent Documents List- oddly enough, the option clears the Recent Documents list. This list is in the Start menu. You can also clear the list manually by right-clicking on this item in the Start menu and selecting "Clear Recent Items List". Useful option: I noticed that clearing the list of recent documents allows the Start menu to display its menus a little faster. The system will not be damaged.
  5. Clearing the TEMP Folder- The holy grail for those who are looking for the cause of the disappearance of free space on the C: drive. The fact is that in the TEMP folder, many programs store files for temporary use, forgetting to “clean up after themselves” later. A typical example is archivers. Unpack the files there and forget to delete. Clearing the TEMP folder does not harm the system, it can free up a lot of space (in especially neglected cases, the gain in free space reaches fifty gigabytes!).
  6. Adobe Flash Player - cleaning up temporary files- "flash player" can save files for temporary use. They can be removed. Sometimes (rarely) the option helps in combating Flash Player glitches. For example, with video and audio playback problems on the Vkontakte website. There is no harm in using.
  7. Clearing the cache of the terminal client- as far as I know, this option clears the temporary files of the Windows component called "Remote Desktop Connection" (remote access to computers via RDP protocol). Option seems to be does no harm, it frees up space from a dozen megabytes at best. There is no point in using it.
  8. IIS - Delete HTTP Error Log- long to explain what it is. Let me just say that it is better not to enable the option to clear the IIS log. In any case, it does no harm, no benefit either.
  9. Macromedia Flash Player- item duplicates "Adobe Flash Player - Cleaning Temporary Files", but affects rather ancient versions of the Flash Player.
  10. Java - cache clearing- gives a gain of a couple of megabytes on the hard drive. I do not use Java programs, so I did not check the consequences of enabling the option. I don't recommend turning it on.
  11. Emptying the trash- the purpose of this item is absolutely clear from its name.
  12. Delete system update installation logs- Windows keeps a log of installed updates. Enabling this option clears the log. The option is useless because there is no free space to win.
  13. Remove Windows Update protocol- similar to the previous paragraph, but other files are deleted. It's also a useless option.
  14. Clear the MountPoints database- if icons with them are not created in the Computer window when connecting a flash drive or hard drive, this option can help. I advise you to turn it on only if you have problems connecting flash drives and disks.
  15. Internet Explorer - clear cache- clears temporary files of Internet Explorer. The option is safe and useful.
  16. Microsoft Office - clear cache- cleans temporary files of Microsoft Office programs - Word, Excel, PowerPoint and others. I can't check the security options because I don't have Microsoft Office.
  17. Clearing the Cache of the CD Burning System- a useful option that allows you to delete files that you have prepared for burning to discs.
  18. Cleaning up the TEMP system folder- unlike the user's TEMP folder (see point 5), clearing this folder is not always safe, and it usually frees up a little space. I don't recommend turning it on.
  19. MSI - cleaning the Config.Msi folder- this folder contains various files created by program installers. The folder is large if the installers didn't complete their work correctly, so clearing the Config.Msi folder is justified. However, be warned - there may be problems uninstalling programs that use .msi installers (for example, Microsoft Office).
  20. Clear task scheduler logs- The Windows Task Scheduler keeps a log where it records information about completed tasks. I do not recommend enabling this item, because there is no benefit, but it will add problems - the Windows Task Scheduler is a rather buggy component.
  21. Delete Windows setup protocols- winning a place is insignificant, it makes no sense to delete.
  22. Windows - clear icon cache- useful if you have problems with shortcuts. For example, when the Desktop appears, the icons do not appear immediately. Enabling this option will not affect system stability.
  23. Google Chrome - clear cache is a very useful option. Google Chrome stores copies of pages in a folder designated for this purpose in order to open sites faster (pages are loaded from the hard drive instead of downloading via the Internet). Sometimes the size of this folder reaches half a gigabyte. Cleaning is useful in terms of freeing up hard drive space; neither Windows nor Google Chrome affects stability.
  24. Mozilla Firefox - Cleaning up the CrashReports folder- every time a problem occurs with the Firefox browser and it crashes, report files are generated. This option deletes the report files. The gain of free space reaches a couple of dozen megabytes, that is, there is little sense from the option, but there is. The stability of Windows and Mozilla Firefox is not affected.

Depending on the installed programs, the number of points will differ. For example, if the Opera browser is installed, you can clear its cache too.

Cleaning the list of startup programs

A sure way to speed up the computer's startup and speed is to clean the autorun list. If unnecessary programs do not start, then the computer will not only turn on faster, but also work faster too - due to the freed up resources that will not be taken away by programs running in the background.

AVZ is able to view almost all loopholes in Windows through which programs are launched. You can view the autorun list in the Tools - Autorun Manager menu:

An ordinary user has absolutely no use for such powerful functionality, so I urge don't turn everything off. It is enough to look at only two points - Autorun folders and run*.

AVZ displays autostart not only for your user, but also for all other profiles:

In chapter run* it is better not to disable programs located in the section HKEY_USERS- this may disrupt other user profiles and the operating system itself. In chapter Autorun folders you can turn off everything you don't need.

Lines marked in green are recognized by the antivirus as known. This includes both Windows system programs and digitally signed third-party programs.

All other programs are marked in black. This does not mean that such programs are viruses or anything similar, just that not all programs are digitally signed.

Don't forget to stretch the first column wider so you can see the name of the program. The usual unchecking will temporarily disable the autorun of the program (you can then tick it again), selecting the item and pressing the button with a black cross will delete the entry forever (or until the program writes itself back to autorun).

The question arises: how to determine what can be disabled and what is not? There are two solutions:

First, there is common sense: by the name of the .exe file of the program, you can make a decision. For example, Skype creates an entry during installation to automatically start when you turn on your computer. If you do not need it, uncheck the box ending with skype.exe. By the way, many programs (including Skype) can remove themselves from startup by themselves, just uncheck the corresponding item in the settings of the program itself.

Secondly, you can search the Internet for information about the program. Based on the information received, it remains to decide whether to remove it from autorun or not. AVZ makes it easy to find information about points: just right-click on the item and select your favorite search engine:

By disabling unnecessary programs, you will noticeably speed up the startup of your computer. However, it is undesirable to disable everything in a row - this is fraught with the fact that you will lose the layout indicator, disable the antivirus, etc.

Disable only those programs that you know for sure - you don't need them in autorun.

Outcome

In principle, what I wrote about in the article is akin to driving nails with a microscope - the AVZ program is suitable for optimizing Windows, but in general it is a complex and powerful tool suitable for performing a variety of tasks. However, in order to use AVZ to its fullest, you need to thoroughly know Windows, so you can start small - namely, with what I described above.

If you have any questions or comments - under the articles there is a comment block where you can write to me. I follow the comments and will try to answer you as soon as possible.

There are many computer security software on the market. However, most of the best solutions are in the paid segment, so those who are not ready to give money for an antivirus have to choose from a much smaller number. AVZ belongs to such free solutions, being not a full-fledged antivirus that provides real-time protection, but a utility that can find and cure an already infected computer.

Judging by the assurances of the authors of this program, it has an impressive database of viruses (almost 300,000 pieces), several neuroprofiles, microprograms for treatment, heuristics, search and troubleshooting IPU, 400,000 signatures of safe files. Let's try to figure out how to use the AVZ utility.

Opportunities:

  • checking running processes;
  • heuristic check of the system;
  • search for potential vulnerabilities.

Principle of operation:

The program has a fairly simple and intuitive interface. When launched, you will be taken to the main window, in which you will need to select the type of check, as well as the memory area that you want to check. After that, you will need to click the "Start" button, and the program will start working.

I would also like to note that the creators very carefully approached the organization of the usability of the program. The main window has thematic tabs that allow you to quickly jump to the necessary actions by checking by memory area, file type, or other search parameters. I was also pleased with the settings panel for actions when threats are detected. For each type of threat, you can pre-select the type of action you want, and when it is detected, the program will either perform it automatically or ask you what you want to do in this case.

Pros:

  • simple and convenient interface;
  • good database of viruses;
  • fast operation and low resource consumption;
  • AVZ utility can be downloaded for free.

Minuses:

  • does not provide real-time protection.

The AVZ utility is a pretty good tool for curing an already infected computer of viruses. If you have such a need, you can download Kaspersky AVZ for free on our website.

AVZ is a small free program to remove spyware and adware from your computer. This application is equipped with scanning and automatic detection of potential threats.

While surfing the Web or installing software, there is a possibility that malware will also be installed unnoticed, which will display ads or steal passwords.

To protect your working system from such malicious applications, it is good to use the AVZ utility. It scans systems for dangerous files, uses heuristics to detect suspicious software in the background, quarantines infected objects, and more. By downloading AVZ for free, you can protect your confidential data from unauthorized persons. In addition, the application protects the computer from installing adware in browsers.

The main functions of AVZ are to ensure the security of the computer and remove the malware present on it. To do this, this anti-virus software uses a special algorithm in the background - heuristic analysis. For prevention, you can force a scan of selected areas of the hard drive. In addition, checking removable media when connected to a PC has a good effect - many computers get infected in this way. Detected viruses can be removed or quarantined.

The program is highly customizable, and you can choose all the necessary values ​​​​so that in the future it will make all decisions for you and not distract you from other things.

The main features of the AVZ program are as follows:

  • detection of different types of malicious software;
  • Scanning System;
  • use of heuristic analysis;
  • keylogger detection;
  • removable media scanning;
  • checking active processes;
  • detection of potential vulnerabilities.

The AVZ program does an excellent job with adware or spyware. At the same time, it works in the background, but you can force the scanning process to quickly search for new vulnerabilities. Note that this antivirus works without installation, and for work you just need to download AVZ for free and unzip its archive to the desired folder.

However, this program is not omnipotent, and for comprehensive protection of your computer, it is better to install another antivirus software, such as Avast or Norton. As an analogue of AVZ, you can use the Ad-Aware Free antivirus, which also detects malware well.

An excellent program for removing viruses and restoring the system is AVZ (Zaitsev's Antivirus). You can download AVZ by clicking on the orange button after generating links.And if the virus blocks the download, then try downloading the entire anti-virus suite!

The main features of AVZ are virus detection and removal.

The AVZ anti-virus utility is designed to detect and remove:

  • SpyWare and AdWare modules - this is the main purpose of the utility
  • Dialer (Trojan.Dialer)
  • Trojans
  • BackDoor modules
  • Network and mail worms
  • TrojanSpy, TrojanDownloader, TrojanDropper

The utility is a direct analog of TrojanHunter and LavaSoft Ad-aware 6 programs. The primary task of the program is to remove SpyWare and Trojans.

The features of the AVZ utility (in addition to the typical signature scanner) are:

  • Heuristic system check firmware. Firmware searches for known SpyWare and viruses by indirect signs - based on the analysis of the registry, files on disk and in memory.
  • Updated database of safe files. It includes digital signatures of tens of thousands of system files and files of known safe processes. The database is connected to all AVZ systems and works on the "friend/foe" principle - safe files are not quarantined, deletion and warnings are blocked for them, the database is used by an anti-rootkit, a file search system, and various analyzers. In particular, the built-in process manager highlights safe processes and services with color, the search for files on the disk can exclude known files from the search (which is very useful when searching for Trojans on the disk);
  • Built-in Rootkit detection system. The search for RootKit goes without the use of signatures based on the study of basic system libraries in order to intercept their functions. AVZ can not only detect RootKit, but also correctly block the operation of UserMode RootKit for its process and KernelMode RootKit at the system level. RootKit countermeasures apply to all AVZ service functions, as a result, the AVZ scanner can detect masked processes, the registry search system "sees" masked keys, etc. The anti-rootkit is equipped with an analyzer that detects processes and services masked by RootKit. In my opinion, one of the main features of the RootKit countermeasure system is its performance in Win9X (the widespread opinion about the absence of RootKits running on the Win9X platform is deeply erroneous - hundreds of Trojans are known that intercept API functions to mask their presence, to distort the operation of API functions or monitor their use). Another feature is the universal KernelMode RootKit detection and blocking system, which works under Windows NT, Windows 2000 pro/server, XP, XP SP1, XP SP2, Windows 2003 Server, Windows 2003 Server SP1
  • Keylogger and Trojan DLL detector. The search for Keylogger and Trojan DLLs is based on system analysis without the use of a signature database, which makes it possible to reliably detect previously unknown Trojan DLLs and Keyloggers;
  • Neuroanalyzer. In addition to the signature analyzer, AVZ contains a neuroemulator that allows you to analyze suspicious files using a neural network. Currently, the neural network is used in the keylogger detector.
  • Built-in analyzer of Winsock SPI/LSP settings. Allows you to analyze the settings, diagnose possible errors in the settings and perform automatic treatment. The possibility of automatic diagnostics and treatment is useful for novice users (there is no automatic treatment in utilities like LSPFix). To study SPI/LSP manually, the program has a special LSP/SPI settings manager. The operation of the Winsock SPI/LSP analyzer is affected by an anti-rootkit;
  • Built-in manager of processes, services and drivers. Designed to study running processes and loaded libraries, running services and drivers. The operation of the process manager is affected by the anti-rootkit (as a result, it "sees" the processes masked by the rootkit). The process manager is linked to the AVZ safe files database, recognized safe and system files are highlighted in color;
  • Built-in utility for searching files on a disk. Allows you to search for a file by various criteria, the capabilities of the search system are superior to those of the system search. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the files masked by the rootkit and can delete them), the filter allows you to exclude from the search results files identified by AVZ as safe. Search results are available as a text log and as a table where you can mark a group of files for later deletion or quarantine
  • Built-in utility for searching data in the registry. Allows you to search for keys and parameters according to a given pattern, the search results are available in the form of a text protocol and in the form of a table in which several keys can be marked for export or deletion. The operation of the search system is affected by the anti-rootkit (as a result, the search "sees" the registry keys masked by the rootkit and can delete them)
  • Built-in analyzer of open TCP/UDP ports. It is affected by the anti-rootkit, in Windows XP, for each port, the process using the port is displayed. The analyzer relies on an updated database of known Trojan/Backdoor ports and known system services. The search for Trojan ports is included in the main system check algorithm - when suspicious ports are detected, warnings are displayed in the protocol indicating which Trojans tend to use this port
  • Built-in analyzer of shared resources, network sessions and files opened over the network. Works in Win9X and Nt/W2K/XP.
  • Built-in analyzer Downloaded Program Files (DPF) - displays DPF elements, connected to all AVZ systems.
  • System recovery firmware. Firmware restores Internet Explorer settings, program launch options, and other system settings corrupted by malware. Restoration is started manually, parameters to be restored are specified by the user.
  • Heuristic file deletion. Its essence is that if malicious files were removed during the treatment and this option is enabled, then an automatic examination of the system is performed, covering classes, BHO, IE and Explorer extensions, all types of autorun available to AVZ, Winlogon, SPI / LSP, etc. . All found references to a deleted file are automatically purged, and information about what exactly was purged and where was entered into the log. For this cleaning, the system treatment microprogram engine is actively used;
  • Checking archives. Starting from version 3.60 AVZ supports scanning of archives and compound files. At the moment, ZIP, RAR, CAB, GZIP, TAR archives are checked; emails and MHT files; CHM archives
  • Checking and treating NTFS streams. Checking NTFS streams is included in AVZ since version 3.75
  • Control scripts. Allows the administrator to write a script that performs a set of specified operations on the user's PC. Scripts allow you to use AVZ in a corporate network, including its launch during system boot.
  • Process Analyzer. The analyzer uses neural networks and analysis firmware, it is enabled when advanced analysis is enabled at the maximum heuristic level and is designed to search for suspicious processes in memory.
  • AVZGuard system. Designed to fight against hard-to-remove malware, in addition to AVZ, it can protect user-specified applications, such as other anti-spyware and anti-virus programs.
  • Direct disk access system for working with locked files. Works on FAT16/FAT32/NTFS, is supported on all operating systems of the NT line, allows the scanner to analyze locked files and place them in quarantine.
  • AVZPM process and driver monitoring driver. Designed to track the start and stop of processes and loading / unloading drivers to search for masquerading drivers and detect distortions in the structures describing processes and drivers created by DKOM rootkits.
  • Boot Cleaner driver. Designed to clean up the system (remove files, drivers and services, registry keys) from KernelMode. The cleaning operation can be performed both in the process of restarting the computer, and during the treatment.

Restoring system settings.

  • Repair launch options.exe .com .pif
  • Reset IE settings
  • Restoring Desktop Settings
  • Removing all user restrictions
  • Deleting a message in Winlogon
  • Restoring File Explorer Settings
  • Removing system process debuggers
  • Restoring Safe Mode Boot Settings
  • Unlock Task Manager
  • Cleaning up the host file
  • Fixing SPI/LSP Settings
  • Reset SPI/LSP and TCP/IP settings
  • Unlocking the Registry Editor
  • Clearing MountPoints keys
  • Replacing DNS servers
  • Removing the proxy setting for the IE/EDGE server
  • Removing Google Restrictions


Program tools:

  • Process Manager
  • Service and Driver Manager
  • Kernel space modules
  • Internal DLL Manager
  • Registry search
  • File search
  • Search by cookie
  • Startup manager
  • Browser extension manager
  • Control Panel Applet Manager (cpl)
  • File Explorer Extension Manager
  • Print Extension Manager
  • Task Scheduler Manager
  • Protocol and handler manager
  • DPF manager
  • Active Setup Manager
  • Winsock SPI Manager
  • Host File Manager
  • TCP/UDP port manager
  • Manager of network shares and network connections
  • A set of system utilities
  • Checking a file against the safe files database
  • Checking a file against the Microsoft Security Catalog
  • Calculating MD5 sums of files

Here is such a rather big set to save your computer from various infections!

AVZ is an anti-virus scanner for removing Trojans, Backdoor components, AdWare, SpyWare programs, and other malicious code from your computer. You can download the latest version of AVZ from the official website at the bottom of the page. The Internet has long been an integral part of our lives. Searching for information, downloading files, exchanging letters and links - all this is done as simply as possible. However, not everything is so rosy. After all, insidious viruses live on the expanses of the World Wide Web. Of course, now there are not as many of them as twenty years ago, but there is still a chance to pick up a malicious program. And what she will do is not predictable. Maybe it will “merge” your information somewhere. Or maybe just erase everything from the hard drive. There are a lot of options, and all of them are not very pleasant.

Various antivirus utilities come to the rescue, ready to protect your computer from malware, trojans and worms. One such program is the AVZ antivirus scanner. It has an icon in the form of a sword and shield (which, as it were, hints) and a good, constantly updated database about the “enemies” of your PC. In addition, it is distributed absolutely free of charge, which also cannot but rejoice. Download AVZ for free from our website right now. link below.

It works on almost any machine, regardless of whether they have the relatively fresh Windows 10 installed on them or the semi-legendary (everyone has heard, but few have seen) XP.

AVZ is able to quickly detect SpyWare and AdWare modules, Trojans, network and mail worms and other very unnecessary programs on your PC. With his task, I must say, he copes just fine. Download AVZ for free right now from the link at the bottom of the review.

Functional

The AVZ utility turned out to be surprisingly multifaceted and multifunctional. In addition to the “standard” signature scanner for such utilities, the program has many features and skills. Namely:

  • It contains firmware for heuristic check of the system. These programs look for SpyWare and viruses using circumstantial indications. To do this, the registry, files on the disk and in the computer's memory are analyzed.
  • The database of safe files is regularly updated. This base is incredibly extensive. This includes the digital signatures of a huge number (counting in the tens of thousands) of system files and files of known safe processes.
  • The base interacts directly with AVZ, working on a simple, but popular and effective principle of "friend / foe". In this case, safe files cannot be quarantined or deleted. The security base is used by the file search system, as well as various analyzers. So, the process manager will highlight services and processes that are recognized as safe, with a special color. The search on the disk can be configured in such a way that it excludes all known files from the selection. This approach is especially useful when catching Trojans.
  • Built-in Rootkit detection system. The rootkit provides masking of malicious objects, controls some system processes, and also engages in espionage by collecting data. Getting rid of such an uninvited guest is a matter of honor. The advantage of the AVZ utility is that this program is able not only to detect RootKit, but also to correctly block its operation both at the level of a separate process and the system as a whole.
  • At the same time, the scanner is able to detect masked objects, keys, etc.
  • Detects and destroys "keyloggers", as well as Trojan DLLs. This action is performed without using the signature database, based only on the analysis of the system.
  • It has its own neuroanalyzer. The neuroemulator built into the utility makes it possible to investigate suspicious files using a neural network.
  • The program has a built-in analyzer of Winsock SPI/LSP settings. Analyzes settings, looks for errors in them, and can also correct them. This feature is especially useful for novice users.
  • It has its own manager of processes, services and drivers. Analyzes the processes, libraries, services and drivers that have been started. Able to detect masked processes in them.
  • Built-in search for files on disk. It has many criteria, surpassing the "built-in" search system. The result is given in the form of a table, which separately indicates the files available for quarantine.
    Search data in the registry, allowing you to search for parameters and keys.
  • Checking and analyzing open TCP/UDP ports. Searches for Trojans.
  • There are programs for system recovery. Works great in case of damage to individual files or sectors of the system by malware.
  • Removing malicious files.
  • Scanning archives and compound files.
  • Ability to write your own script to perform certain actions.

Program Benefits

  • Convenient to use.
  • Free.
  • Extensive database.
  • Has many additional features.

disadvantages

  • Not detected.

System requirements

Operating system: W9x, Windows NT, 2000 Professional and Server, XP Home Edition and XP Professional (SP1, SP2, SP3), Windows 2003 (SP1), Windows Vista (SP1, SP2), Windows 7, 8, 8.1 and 10 AVZPM, AVZGuard, BootCleaner technologies are not supported in Win 9x and 64-bit versions of XP/Vista/Win7/8/8.1/10 operating systems.

Editor's Choice
Alexander Lukashenko on August 18 appointed Sergei Rumas head of government. Rumas is already the eighth prime minister during the reign of the leader ...

From the ancient inhabitants of America, the Mayans, Aztecs and Incas, amazing monuments have come down to us. And although only a few books from the time of the Spanish ...

Viber is a multi-platform application for communication over the world wide web. Users can send and receive...

Gran Turismo Sport is the third and most anticipated racing game of this fall. At the moment, this series is actually the most famous in ...
Nadezhda and Pavel have been married for many years, got married at the age of 20 and are still together, although, like everyone else, there are periods in family life ...
("Post office"). In the recent past, people most often used mail services, since not everyone had a telephone. What should I say...
Today's conversation with the Chairman of the Supreme Court Valentin SUKALO can be called significant without exaggeration - it concerns...
Dimensions and weights. The sizes of the planets are determined by measuring the angle at which their diameter is visible from the Earth. This method is not applicable to asteroids: they ...
The world's oceans are home to a wide variety of predators. Some wait for their prey in hiding and surprise attack when...