VDF History

Il file VDF contiene tutte le caratteristiche dei malware usate dal motore Avira.

Avira aggiorna i propri file VDF diverse volte al giorno per assicurare che i vostri prodotti di sicurezza Avira continuino a scovare gli ultimi pericoli elettronici. Tenere il vostro file VDF aggiornato è vitale per la sicurezza del vostro computer.

Dettagli della versione 7.11.64.226 IVDF

Questo file VDF è stato pubblicato il mercoledì 13 marzo 2013 00:05 CET

La sequenti firme dei virus sono stati aggiunti al nostro database delle firme (149 vdf):

  • Adware/iBryte.phjo
  • Adware/LoadMoney.lku
  • BDS/Agent.asova
  • BDS/Agent.dbih
  • BDS/Papras.plx.1
  • BDS/ZAccess.boky.1
  • EXP/Pidief.dsr
  • EXP/Pidief.dss
  • EXP/Pidief.dst
  • EXP/Pidief.dsu
  • EXP/Pidief.dsv
  • EXP/Pidief.dsw
  • EXP/Pidief.dsx
  • EXP/Pidief.dsy
  • EXP/Pidief.dsz
  • EXP/Pidief.efh
  • HTML/DeCodor.A
  • HTML/EndScript.B
  • HTML/EndScript.C
  • HTML/EndScript.D
  • HTML/IFrame.atu
  • HTML/IFrame.aua
  • HTML/IFrame.aub
  • HTML/IFrame.aue
  • HTML/Redirect.24621
  • HTML/Urlins.A
  • Java/Jogek.aco
  • Java/Jogek.adq
  • Java/Jogek.adr
  • Java/Jogek.ads
  • Java/Jogek.adt
  • Java/Jogek.adu
  • Java/Jogek.adv
  • Java/Jogek.adw
  • Java/Jogek.adx
  • Java/Jogek.ady
  • Java/Jogek.adz
  • Java/Jogek.aea
  • Java/Jogek.aeb
  • Java/Jogek.aec
  • Java/Jogek.aed
  • Java/Jogek.aee
  • Java/Jogek.aef
  • Java/Jogek.aeg
  • Java/Jogek.aeh
  • Java/Jogek.aei
  • Java/Jogek.aej
  • Java/Jogek.aek
  • Java/Jogek.ael
  • Java/Jogek.aem
  • Java/Jogek.aeq
  • Java/Jogek.aes
  • Java/Jogek.aet
  • Java/Jogek.aeu
  • Java/Jogek.aev
  • Java/Jogek.aew
  • Java/Jogek.aex
  • Java/Jogek.aey
  • JS/ChBrowser.987452
  • JS/Dldr.Agent.ahc
  • JS/Dldr.Agent.ahe
  • JS/Dldr.Agent.ahg
  • JS/Dldr.Agent.ahh
  • JS/Pidief.266548
  • TR/Agent.436598745
  • TR/Agent.touemna
  • TR/Apex.D.1
  • TR/Apex.D.2
  • TR/Apex.D.3
  • TR/Apex.D.5
  • TR/Apex.D.6
  • TR/Apex.D.7
  • TR/Apexy.C.1
  • TR/Apexy.C.2
  • TR/Apexy.C.3
  • TR/Apexy.C.4
  • TR/Apexy.C.5
  • TR/Autorun.lgx.1
  • TR/Bublik.aisi.1
  • TR/Buzus.130757896
  • TR/Drop.Sirefef.B.1475
  • TR/Drop.Sirefef.C.147
  • TR/FakeAV.244224587
  • TR/FakeAV.45215489
  • TR/FakeAV.axo
  • TR/FakeSysdef.A.99
  • TR/Graftor.73073.1
  • TR/Injector.lgx.1
  • TR/Jorik.27025614
  • TR/Kazy.153295.3
  • TR/Kryptik.WY
  • TR/Kryptik.WZ
  • TR/Kryptik.XA
  • TR/Kryptik.XB
  • TR/LockScreen.CX
  • TR/LockScreen.DB
  • TR/LockScreen.DC
  • TR/LockScreen.DE
  • TR/Medfos.A.39
  • TR/Medfos.A.40
  • TR/Meredrop.A.13816
  • TR/Oficla.45213660
  • TR/PSW.Fareit.1305
  • TR/PSW.Tepfer.hbym.1
  • TR/PSW.Zbot.AL.6591
  • TR/PSW.Zbot.AL.6592
  • TR/Qhost.rusea
  • TR/Qhost.ruseb
  • TR/Qhost.rusec
  • TR/Qhost.rused
  • TR/Qhost.rusee
  • TR/Qhost.rusef
  • TR/Qhost.ruseg
  • TR/Qhost.ruseh
  • TR/Ransom.Blocker.cdui.1
  • TR/Ransom.Foreign.aqow
  • TR/Ransom.Foreign.aqow.10
  • TR/Ransom.Foreign.aqow.6
  • TR/Ransom.Foreign.aqow.7
  • TR/Ransom.Foreign.aqow.8
  • TR/Ransom.Foreign.aqow.9
  • TR/Rogue.KD.896104.1
  • TR/Rogue.KD.896138.1
  • TR/Rogue.kdv.895241.1
  • TR/Rogue.kdz.10676.1
  • TR/Rogue.kdz.10683.4
  • TR/Rogue.kdz.10683.5
  • TR/Rogue.kdz.10683.6
  • TR/Rogue.kdz.10683.7
  • TR/Rogue.kdz.10709.1
  • TR/Rogue.kdz.10714.1
  • TR/Rogue.kdz.10727.1
  • TR/Rogue.kdz.10727.3
  • TR/Rogue.kdz.10727.4
  • TR/Rogue.kdz.10729.1
  • TR/Rogue.kdz.750801
  • TR/Skillis.teda
  • TR/Spy.Chat.9344001
  • TR/Spy.ZBot.2344965
  • TR/Spy.ZBot.jqvf.1
  • TR/Tracur.BF.1443
  • TR/Tracur.BF.1444
  • TR/Urausy.C.3192
  • TR/Virtool.Xiaoho.60
  • TR/Winwebsec.532489
  • TR/Zappy.mnt
  • TR/Zusy.210944561
  • TR/Zusy.215040548
  • Worm/Vobfus.2539524