Results 1 to 1 of 1
  1. #1
    Veteran Dwar is on a distinguished road Dwar's Avatar
    Join Date
    2010 Mar
    Thanked 2,220 Times in 286 Posts
    Rep Power

    AVZ Antiviral Toolkit. Protect computer from unknown viruses, trojans other malware

    AVZ Antiviral Toolkit is a system analysis and repair solution designed for automatic or manual search and removal of the following:
    • Spyware, adware programs, and modules (a key function of this application).
    • Rootkits and malware that hide their processes.
    • Network and email worms.
    • Trojans (all varieties, in particular Trojan-PSW, Trojan-Downloader, and Trojan-Spy) and back doors (programs used for stealthy remote control of computers).
    • Deceptive dialers (Dialer, Trojan.Dialer, Porn-Dialer).
    • Keystroke loggers and other applications that spy on the user.

    The toolkit is a direct analog of such applications as Trojan Hunter and LavaSoft Ad-aware 6. Its primary task is removal of adware, spyware and trojans.

    It should be noted from the outset that spyware and adware applications are not viruses or trojans by definition. They spy on the user and download data and program code to the infected computer mainly for marketing purposes. This means that the information they upload does not contain critical data, such as passwords, credit card numbers, or the like, while the downloaded data contains only ads or program updates. Yet very often the dividing line between spyware and trojans is very thin, complicating precise classification. Classification methods and criteria are described in these help files.

    A feature of AVZ is that it enables the user to configure the way the application responds to every category of malware. For example, you can configure it to remove any viruses or trojans detected, while blocking the removal of adware.

    Another feature of AVZ is multiple heuristic checks that are not based on signature-based search. These checks include searching for rootkits, keyloggers, and various backdoor exploits against a database of standard TCP/UDP ports. Such search methods make it possible to detect new varieties of malware.

    In addition to the signature-based file search capability that is standard for programs in its class, AVZ incorporates a database of digital signatures of tens of thousands of system files. This database helps to minimize the number of false positives returned by the heuristics analyzer while also serving a number of other purposes. In particular, the file search system has a filter for excluding known files from search results. Trusted processes are color-coded in the manager of running processes and SPI settings. When files are being quarantined, AVZ prevents known files from being added to quarantine.

    Practice shows that very often a spyware application can be categorized as adware and the other way around, for the simple reason that targeted advertising is the purpose of spying in most cases. For such eventualities, a common category called “spy” was introduced to include both adware and spyware. The term “spy” provides the most fitting description for this class of programs.

    The purpose of the application is as follows:
    • AV database — Helps diagnose malware known to AVZ and removes it. Removal involves automatic cleanup of malware traces in the registry and in the INI files that are critical to system operation. In this regard, AVZ is convenient for a quick cleanup of an infected PC before bringing in “heavy artillery” – installing a powerful anti-virus package and using it to run a scan. The scanner can scan archives of common types, email files, and NTFS streams.
    • The AV scanner can be integrated with The Bat by using a plug-in. The AVZ database is updated daily.
    • Quick automatic PC scan with the results displayed in the html log file. During the scan, files found in the AVZ Trusted Objects Database and the Microsoft Security Catalog are filtered out, which considerably reduces the size of logs. This mode is convenient for a quick scan of a suspicious computer by the administrator, and for a remote scan of the system. The ability to run system analysis and to quarantine objects by using a script makes it possible to automate this operation fully. By this means, the local user’s involvement is reduced to running a *.bat file.
    • Automatic quarantining of files that do not have a Microsoft digital signature and are not described in the AVZ Trusted Objects Database. To make these files subsequently analyzed manually or by using anti-virus applications. Additionally, AVZ supports list-based quarantine and quarantine commands in scripts, which simplifies remote collection of suspicious files from PCs being scanned.
    • Search for rootkits and other API hooks, with the ability to search for hidden processes. Besides analysis of hooks, AVZ has the functionality to neutralize UserMode and KernelMode rootkits.
    • System Restore. AVZ contains microprograms that automatically fix common corruptions of Internet Explorer and Windows Explorer settings, reset desktop settings, and neutralize policy rules set by trojans. Anti-virus applications do not normally perform these operations, which is why normal system operation is not restored after a trojan or spyware has been removed.
    • Automatic checking of SPI/LSP settings and automatic fixing of errors. This eliminates most of the LSP problems encountered after the removal of some adware types. If settings cannot be restored, the toolkit will fully recreate them.
    • File search. The search function is protected by the AVZ Rootkit Block (antirootkit), which offers a number of useful virus and trojan search functions. For example, antirootkit filters out files that have been cleared through the AVZ Trusted Objects Database and the Microsoft Security Catalog, allowing the search scope to be narrowed considerably.
    • A script language for controlling AVZ. Scripts make it possible to use AVZ in a corporate network. In this case, AVZ can be launched from a logon script or autorun and run according to an administrator-developed script. Scripts also make it possible to automate the majority of AVZ operations.
    • Built-in disk inspector. The disk inspector creates databases containing file information that corresponds to the user settings (by specifying folders and search masks). These databases can be used for keeping track of disk changes.
    • Process Manager, which makes it possible to run a search for suspicious objects in maximum heuristics mode.
    • The AVZGuard system, which protects AVZ and legitimate applications from malware affecting the system and limits the impact of malware on the system.
    • A system providing direct access to the disk for handling blocked files. It operates on FAT16/FAT32/NTFS systems and is supported by all Windows NT operating systems, enabling the scanner to analyze blocked files and quarantine them.
    • The AVZPM processes and drivers monitor. It keeps track of processes that are started and stopped and drivers that are loaded and unloaded in order to locate hidden drivers and detect corruptions created by DKOM rootkits in structures that describe processes and drivers.
    • Boot Cleaner driver. Designed for cleaning the system (removing files, drivers, services, and registry keys) from KernelMode. The cleanup operation can be performed both during PC rebooting and while the toolkit repairs the system.
    • Vulnerability search. Designed for locating invalid PC settings that can adversely affect security.
    • Backup. Designed for backing up critical system settings. Backup is carried out upon user command or automatically while the toolkit repairs and restores the system.
    • Troubleshooting wizard. This system automatically locates and eliminates issues that result from infection by malware and clears traces of user activity and trash from the PC.

    Download AVZ (English Help included):

    How to scan your computer, save the log and run a script using the AVZ utility?

  2. The Following 5 Users Say Thank You to Dwar For This Useful Post:

Similar Threads

  1. [malware] Soulsaver Hack Satria 2nd
    By Dwar in forum Software & Hardware
    Replies: 3
    Last Post: 2012-08-21, 11:19 AM
  2. [Tutorial] How to protect your computer if Virus, Keylogger, Trojans
    By Mmandy in forum Software & Hardware
    Replies: 7
    Last Post: 2012-08-10, 04:39 PM
  3. Very careful what you download, Malware rodoxfnx
    By themalikao in forum Software & Hardware
    Replies: 24
    Last Post: 2012-04-26, 06:15 PM
  4. [ASK] best solution protect .dll
    By gosicks in forum C/C++
    Replies: 6
    Last Post: 2010-11-25, 01:00 PM
Visitors found this page by searching for:

avz4 the bat

скачать avz english

avz check file authenticity by microsoft security catalog

windows vista tcp port avz antiviral toolkit

help avz trojan

avzina pono


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts