VDF History

The VDF file contains all the malware detection patterns used by the Avira engine.

Avira updates its VDF files several times in a typical day, ensuring that your Avira security products continue to detect the latest electronic threats. Keeping your VDF file up to date is vital to the safety of your computer.


iVDF version 7.11.28.144 details

This VDF file was published on Tuesday, April 24, 2012 8:51 PM GMT+02:00

The following signature(s) were added to our signatures database (161 vdf records):

  • Adware/CPush.D
  • Adware/Mediaget.A
  • BAT/Qhost.II
  • BDC/Hupigon.B
  • BDC/Hupigon.D
  • BDC/PcClient.A
  • BDC/VBKrypt.E
  • BDC/VBKrypt.F
  • BDC/VBKrypt.G
  • BDC/Zegost.A
  • BDC/Zelgost.B
  • BDC/ZXProxy.A
  • BDS/Agent.ABCO.1
  • BDS/Cycbot.40960
  • EXP/08-5353.AI.4
  • EXP/08-5353.AL.1
  • EXP/10-0840.P.3
  • EXP/11-3544.CR.3
  • EXP/11-3544.DW.2
  • EXP/11-3544.DX.2
  • EXP/11-3544.DY.2
  • EXP/11-3544.DZ.1
  • EXP/11-3544.EB.1
  • EXP/11-3544.EC.1
  • EXP/11-3544.ED.1
  • EXP/11-3544.EE.2
  • EXP/11-3544.EF.1
  • EXP/11-3544.EG.1
  • EXP/11-3544.EH.1
  • EXP/11-3544.EZ.1
  • EXP/11-3544.FA.1
  • EXP/11-3544.FC.1
  • EXP/11-3544.FD.1
  • EXP/11-3544.FF
  • EXP/11-3544.FG
  • EXP/11-3544.FH.1
  • EXP/11-3544.FI.1
  • EXP/12-0507.AB
  • EXP/12-0507.X.1
  • EXP/C99Shell.T
  • EXP/CVE-2012-0507.W
  • EXP/CVE-2012-0754.I
  • EXP/Java.Bytever.A
  • EXP/Pidief.cxr
  • EXP/Pidief.cxs
  • EXP/Pidief.cxt
  • EXP/Pidief.cxx
  • EXP/Pidief.cyi
  • Java/Dldr.Small.CC
  • Java/Dldr.Small.CD
  • Java/Dldr.Small.CE
  • JS/iFrame.aam
  • JS/iFrame.TC
  • JS/Redirect.BH
  • JS/Redirector.OE.2
  • JS/Redirector.OF.2
  • PHISH/Mastercard.E
  • RKIT/Winnti.j
  • TR/Barys.432.17
  • TR/Clicker.AZ
  • TR/Dldr.Banload.T.9
  • TR/Dldr.Kazy.CL
  • TR/Dorkbot.188416.39
  • TR/Dorkbot.73728
  • TR/Drop.Agent.aom
  • TR/Drop.Banker.J.8
  • TR/Drop.Dapato.azkd
  • TR/Drop.Fakap.A
  • TR/Drop.Nimnul.A
  • TR/Drop.Siggen.F
  • TR/Fake.pav.1003
  • TR/Fakealert.WI.2
  • TR/FakeAV.miag
  • TR/FakeAV.miao
  • TR/Graftor.20717.1
  • TR/Injector.LJ
  • TR/Jorik.188416.2
  • TR/Jorik.188416.27
  • TR/Jorik.188416.3
  • TR/Jorik.188416.33
  • TR/Jorik.188416.7
  • TR/Jorik.208896
  • TR/Kanav.A
  • TR/Kazy.67062.4
  • TR/Kazy.67062.5
  • TR/Kryptik.229376
  • TR/Nebuler.372736.38
  • TR/PSW.Agent.CO
  • TR/PSW.OnlineGames.F
  • TR/PSW.QQpass.AZ
  • TR/PSW.QQpass.BS
  • TR/PSW.QQpass.BY
  • TR/PWS.Gamania.J
  • TR/Ransom.Gimemo.qyj
  • TR/Ransom.Gimemo.qyn
  • TR/Ransom.HP.1
  • TR/Rogue.kdv.605235.1
  • TR/Rogue.kdv.606297.1
  • TR/Spy.155722.1
  • TR/Spy.634925.1
  • TR/Spy.Agent.348160
  • TR/Spy.Winnti.A
  • TR/Spy.ZBot.ZV.1
  • TR/Tusha.A
  • TR/VBKrypt.CD
  • TR/Vobfus.208896
  • TR/Vobfus.274432.12
  • TR/Vobfus.274432.14
  • TR/Vobfus.274432.15
  • TR/Vobfus.274432.24
  • TR/Vobfus.294912.31
  • TR/Vobfus.294912.32
  • TR/WinwebsecA.A.45
  • TR/WinwebsecA.A.46
  • TR/WinwebsecA.A.47
  • TR/WinwebsecA.A.48
  • TR/WinwebsecA.A.49
  • TR/WinwebsecA.A.50
  • TR/WinwebsecA.A.51
  • TR/WinwebsecA.A.52
  • TR/WinwebsecA.A.53
  • TR/WinwebsecA.A.54
  • TR/WinwebsecA.A.55
  • TR/WinwebsecA.A.56
  • TR/WinwebsecA.A.57
  • TR/WinwebsecA.A.58
  • TR/WinwebsecA.A.59
  • TR/WinwebsecA.A.60
  • TR/WinwebsecA.A.61
  • TR/WinwebsecA.A.62
  • TR/WinwebsecA.A.63
  • TR/WinwebsecA.A.64
  • TR/WinwebsecA.A.65
  • TR/WinwebsecA.A.66
  • TR/WinwebsecA.A.67
  • TR/WinwebsecA.A.68
  • TR/WinwebsecA.A.69
  • TR/WinwebsecA.A.70
  • TR/WinwebsecA.A.71
  • TR/WinwebsecA.A.72
  • TR/WinwebsecA.A.73
  • TR/WinwebsecA.A.74
  • TR/WinwebsecA.A.75
  • TR/WinwebsecA.A.76
  • TR/WinwebsecA.A.77
  • TR/WinwebsecA.A.78
  • TR/WinwebsecA.A.79
  • TR/WinwebsecA.A.80
  • TR/WinwebsecA.A.81
  • TR/WinwebsecA.A.82
  • TR/WinwebsecA.A.83
  • TR/WinwebsecA.A.84
  • TR/WinwebsecA.A.85
  • TR/WinwebsecA.A.86
  • TR/WinwebsecA.A.87
  • TR/WinwebsecA.A.88
  • TR/WinwebsecA.A.89
  • TR/Zapchast.K
  • TR/Zeroll.118784
  • TR/Zusy.4583.4
  • Worm/Vobfus.O.23