Assigned Zemana Anti-Malware 2.0

This thread is being handled by a member of the staff.

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Zemana Anti-Malware 2.9.1.402 Beta
Zemana AntiLogger Release Notes
  • Minor language improvements
  • Fixed an issue with upload
  • Added CyberGhost VPN to whitelist
  • Fixed a critical memory leak in archive manager module which crashed the application
  • Fixed a false positive with self signed Root CA detection
  • Fixed a false positive with crypto locker wallpaper detection
  • Improved scan report format (added cleaned and failed objects)
  • Improved detection for DNS hijackers
  • Improved detection for Browser Extensions
  • Improved cleaner against persistent malware with watchdogs
Credits

  • Bekir Ucarci
  • XIII
  • Rupert
  • Christopher Clayton
Known Issues

  • Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
Zemana AntiMalware 2.9.1.402 Beta
http://cdn9.zemana.com/AntiMalware/ZAMv2.9.1.402.Setup.exe

Zemana AntiMalware 2.9.1.402 Beta Portable
http://dl9.zemanaltd.netdna-cdn.com/AntiMalware/ZAMv2.9.1.402.exe
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Do they have plans to make ZAM with real-time, or will this remain for on-demand use?
Any known Advantage vs Disadvantage to HitmanPro?
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
  • Like
Reactions: yigido and Moose

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Zemana Anti-Malware 2.9.1.918 Beta
Added more locations to Smart and Deep Scan
Added support for old versions of Google Chrome
Added more filetypes
Fixed an issue with Internet Explorer group policy
Fixed an issue with license module.
Fixed an issue with RootCA detection.
Fixed an issue with CRC checksum calculation
Fixed an issue with extension scanning
Fixed a critical bug in registry scanning
Improved speed for system integrity checking
Improved detection for latest rootkits
Improved detection for exploitable document files
Improved scan reports panel
Improved Setup (Desktop icon shortcut issue fixed)
Improved proxy detection
Improved Browser Hijacker Detection and Removal
Increased detection rate against persistent malware
Minor bug fixes and improvements

Known Issues
Support for Safe Boot Mode
Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
Zemana AntiMalware 2.9.1.918 Beta
http://cdn9.zemana.com/AntiMalware/ZAMv2.9.1.918.Setup.exe

Zemana AntiMalware 2.9.1.918 Beta Portable
http://cdn9.zemana.com/AntiMalware/ZAMv2.9.1.918.exe
 
Last edited:

Welldone

Level 5
Verified
Dec 29, 2012
235
Any known Advantage vs Disadvantage to HitmanPro?

HitmanPro does not require antivirus engines or virus signatures to catch threats. Our product is technically very different compared to other solutions in the antivirus and antimalware industry.

At the core HitmanPro is based on a forensic behavioral scan and does not work with virus signatures. Actually, this means that HitmanPro does not look for verified malware at all. That may be a shocker but it makes perfect sense. We designed HitmanPro as a second opinion solution, to kill threats that your antivirus missed. In order to be able to do that it has to be fundamentally different, and as a result HitmanPro can also catch malware that no one knows about yet and where antivirus solutions have no signature for (the zero-day or early-life threats). Since most antivirus solutions rely on signatures (incl. most heuristic signatures), they are always lagging behind attackers. Antivirus solutions do not target what they haven’t seen before – they are in a cat-and-mouse game and this is a fundamental difference compared to HitmanPro.

With its forensics based core, HitmanPro basically works like a crime scene investigator or incident responder. It analyzes the programs on your computer and looks for unethical behaviors – including the behaviors that happened back in time, in the past when HitmanPro was not even on the computer. It tries to get answers to many questions, like (not a complete list):

  • Is it a known legitimate and trusted program?
  • When did it enter your system (date, time)?
  • How did it enter your system?
  • Did the program came from the internet? What address?
  • Did the program came automatically on the computer at the same time the user was browsing the web (e.g. drive-by exploit attack)
  • Can the user uninstall the program using the regular steps?
  • Does it try to survive on your system?
  • How does it run automatically when you start the computer? (there are many ways and tricks to look for)
  • Is the program encrypted, perhaps to evade security researchers?
  • Does it show version information and origin data?
  • Is it signed with a crafted certificate to thwart antivirus solutions?
  • What is it currently doing (is it active)?
  • Does its process reveal where or if it’s on the disk?
  • Is it communicating or listening for inbound connections?
  • Can the user interact with the program (does it e.g. have a window with controls)?
  • Is the program visible for the user, Windows processes and antivirus software?
  • What other things happened at the same time when the program came on the computer?
  • What is its relation to other programs and their behaviors?
When you ponder this list, you can understand that you should not run HitmanPro in safe mode, as it affects the ‘mining’ of behaviors; in safe mode, malware may not be active which affects the results. You could say that the more tricks malware has or tries to hide, the sooner it will be picked up. And HitmanPro can show you this data. Just double click on a detected item and you will get a list of some of the evidence it found, including registry and process objects, forensic cluster and a threat severity score. A knowledgeable person can also use this information to determine if a program belongs on the computer or not. Some examples:
nbccom_citadel_png_247460.png


HitmanPro also has several unique cloud components:
  1. Our CAMHB technology (Cloud-Assisted Miniport Hook Bypass) provides new communication addresses for HitmanPro, so it can communicate directly with the lowest hard disk driver on your computer. This comes in handy when a rootkit is manipulating the Windows device stack to prevent the user and antivirus software from accessing the sectors where the malware lives. HitmanPro can compare the data on the raw sectors with information it gets back from the Windows API’s. HitmanPro has its own Direct Disk Access module, which also contains e.g. a NTFS disk parser, so it does not have to rely on functions offered by the system (which are often manipulated).
  2. Our Prestine cloud service returns safe clean versions of infected system files, when HitmanPro was unable to find a safe clean version locally. Because instead of trying to remove an infection, HitmanPro replaces it with a non-infected version downloaded from our server. Because attackers have unlimited ways to infect files, it is impossible to create a disinfection solution for each virus type. So HitmanPro does not need to know how a virus works in order to recover you from it.
  3. Our Gossip cloud service helps HitmanPro to target e.g. fake antivirus software. These types of malware (Fake AV) behave like legitimate software. These infections are often discussed on security forums way before antivirus solutions have a signature for them. Our Gossip technology leverages search engines to ‘hear’ what people are talking about in security forums.
  4. Our Excalibur remnant cloud service offers users with clean-up detections for cases where e.g. your antivirus software (only) removed the malicious program at an earlier point in time. Since the forensic scan relies on this malicious program to come up with evidence and a thorough removal recipe, the remnant scan offers a way to remove the remaining objects that the antivirus solution was not aware of. This technology is also particularly effective against potentially unwanted programs (PUPs) as well.
  5. Our Strider third opinion cloud service offers signature-based knowledge of threats that HitmanPro found on your computer and found before on other people’s computers. This can be helpful so users can know what kind of threat their computers were infected with. This also helps in case HitmanPro could not find enough evidence to flag a file as malware. This is apparently the service some people judge our solution for – the detection by Kaspersky and Bitdefender, which are our trusted signature partners.
Crusader
After HitmanPro created the list of objects to attack, it engages its Crusader removal engine. This is another technology of ours that works with the evidence gathered during the forensic behavioral scan and, when needed, will also involve our CAMHB and Prestine technologies. Because depending on this information it takes different steps to ensure proper removal of the threats. It also deploys locks on the malicious objects so the active malware cannot re-infect the system during the removal process.

More is not better
I’d like to point out that introducing more engines does not simply improve malware detection or removal. It also increases the likelihood of false positives on legitimate programs. Since we do not use any Kaspersky and Bitdefender code in our client software, we do not benefit or inherit issues either.

Judging HitmanPro on the amount of engines sounds great, but Kaspersky and Bitdefender are not the ‘engines’ you should be talking about. E.g. if a sector or file is actively camouflaged by malware, it does not matter how many engines you have. You need the technology to be able to read the data in the first place. And removing malware is a totally different game. Doing it wrong can wreck a computer, making problems worse than the malware infection. Threat removal also has little to do with how many ‘engines’ a product has. These are some nice examples:


Source: Post #6
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Zemana Anti-Malware 2.9.1.944 Beta
Fixed an issue which is introduced in previous version causing crash on upload
Better handling of malware using NTFS Alternate Data Streams (ADS)
Known Issues

Support for Safe Boot Mode
Multi language support (If you would like to contribute, please reach us from dev@zemana.com)

Zemana AntiMalware 2.9.1.944 Beta
http://cdn9.zemana.com/AntiMalware/ZAMv2.9.1.944.Setup.exe

Zemana AntiMalware 2.9.1.944 Beta Portable
http://cdn9.zemana.com/AntiMalware/ZAMv2.9.1.944.exe
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Zemana Anti-Malware 2.10.1.17 Beta
Fixed an issue with report deletion
Fixed an issue with corrupted digital signatures
Improved browser hijack detection
Minor bugfixes and improvements

Known Issues
Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
Support for Safe Boot Mode

Zemana AntiMalware 2.10.1.17 Beta
http://cdn9.zemana.com/AntiMalware/ZAMv2.10.1.17.Setup.exe

Zemana AntiMalware 2.10.1.17 Beta Portable
http://cdn9.zemana.com/AntiMalware/ZAMv2.10.1.17.exe
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
Last edited:

Azure

Level 28
Verified
Top Poster
Content Creator
Oct 23, 2014
1,712
http://www.zemana.com/WhatsNew.aspx?ProductID=2

Zemana Anti-Malware 2.10.1.774

Friday, April 24, 2015 7:50 PM
  • Highly optimized scan speed (nearly 3x times faster than the older versions with 10x faster system integrity checking)
  • Highly improved detection rate for browser extensions
  • Highly optimized memory usage
  • Added self protection against malware process termination attacks (automatically activated)
  • Added right click and double click support to Drag And Drop panel
  • Added support for scanning files on network drives
  • Added About Dialog to tray menu
  • Added Delete All button to excluded items panel
  • Improved DNS hjack detection
  • Improved license check module
  • Improved support for UAC
  • Improved detection against latest fileless malware samples
  • Improved directory enumeration against rootkits
  • Improved malware trace cleaning
  • Improved malware remnant cleaning
  • Improved registry cleaning
  • Improved browser extension cleaning
  • Improved autoruns database
  • Fixed FP with Root CA and Wallpaper detection.
  • Fixed an issue with tray icon position remembering
  • Fixed an issue with folder exclusions
  • Fixed an issue with post reboot scan
  • Removed version suffix from portable file name
 

BoraMurdar

Community Manager
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Zemana Anti-Malware 2.10.1.895
  • Fixed a bug in system restore point creation
  • Fixed a bug in file enumeration in non NTFS drives
  • Fixed a bug with exclusions
  • Improved report format
  • Improved user experience
  • Improved browser hijack cleaner
Known Issues
  • Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
  • Support for Safe Boot Mode
Credits
  • Marcel Subrt
Download Installer
Download Portable
 

BoraMurdar

Community Manager
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Zemana Anti-Malware 2.11.1.9

Wednesday, April 29, 2015 5:30 PM
  • Fixed a bug in registry enumeration
  • Fixed a bug in service
  • Added more scan locations
  • Fixed a bug in malware scanning and cleaning
Known Issues

  • Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
  • Support for Safe Boot Mode
 

xxtoss23

Level 24
Verified
Top Poster
Well-known
Dec 4, 2013
1,308
Zemana Anti-Malware 2.11.1.62

Monday, May 4, 2015 3:30 PM
  • Minor improvements
  • Fixed an issue with rootkit cleaning
  • Improved licensing and partner id system
Known Issues

  • Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
  • Support for Safe Boot Mode
 

sonylxn

Level 4
Verified
Jan 26, 2015
160
apparently now you have to register first to download latest beta version. not a problem anyways.
 
Y

yigido

Thread author
Zemana Anti-Malware 2.11.2.62 Stable Release

Tuesday, May 5, 2015 9:26 AM
  • This RELEASE build is the stable version of previous BETA version (2.11.1.62)
Known Issues
  • Multi language support (If you would like to contribute, please reach us from dev@zemana.com)
  • Support for Safe Boot Mode
Source : http://blog.zemana.com/2015/05/zemana-antimalware-new-stable-version.html

Zemana AntiMalware New Stable Version Released

First, we would like to thank you for your participation in the Zemana AntiMalware beta program. It's because of you, our valuable beta users, that our products are improving every day, and we would like you to know that you enable us to offer our users a seamless product.

As with all beta programs, our beta release may have caused some problems on your computer in the beginning, and you may have removed our program from your system.

However, we have solved more than 90% of the bugs that cause errors. Because of this, we would like you to download and retry the latest stable release (2.11.2.62) of Zemana AntiMalware.

As our early beta tester, you will have a chance to use your lifetime license for Zemana AntiMalware stable version. If you lost your license key, you can recover it by entering your registered email address here.

Please call us or email us and let us know what we could have done better. We'll do all we can to make things right for you immediately, and we'll also learn from your criticism to make a better malware remover for everyone.
Thank you in advance for your help.
 
Last edited by a moderator:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top