Histórico do VDF

O arquivo VDF contém todos os padrões de detecção de malware usados pela ferramenta Avira.

A Avira atualiza seus arquivos VDF várias vezes ao dia, garantindo que seus produtos de segurança Avira continuem a detectar as mais recentes ameaças eletrônicas. Manter seu arquivo VDF atualizado é vital para a segurança de seu computador.

Versão iVDF 7.11.29.70 detalhes

Este arquivo VDF foi publicado em sexta-feira, 4 de maio de 2012 19:53 GMT+2

Os padrões de detecção a seguir foram incluídos no nosso banco de dados de padrão de detecção (152 registros VDF):

  • Adware/Click.WinLNK
  • Adware/Rogue.12390.J
  • BAT/Small.T.10
  • BAT/Small.T.11
  • BAT/Small.T.12
  • BAT/Small.T.13
  • BAT/Small.T.14
  • BAT/Small.T.15
  • BAT/Small.T.16
  • BAT/Small.T.17
  • BAT/Small.T.18
  • BAT/Small.T.19
  • BAT/Small.T.20
  • BAT/Small.T.21
  • BAT/Small.T.22
  • BAT/Small.T.23
  • BAT/Small.T.24
  • BAT/Small.T.5
  • BAT/Small.T.6
  • BAT/Small.T.7
  • BAT/Small.T.8
  • BAT/Small.T.9
  • BDS/Andromeda.A.1
  • BDS/Bredolab.zwy.jh
  • BDS/Fynloski.1998848
  • EXP/2011-3544.GP
  • EXP/2012-0507.AI
  • EXP/2012-0507.AK
  • EXP/2012-0507.BL
  • EXP/2012-0507.BM
  • EXP/2012-0507.BN
  • EXP/Pidief.cxm
  • EXP/Pidief.cxn
  • HTML/IFrame.ags
  • Java/Dldr.Treams.B
  • Java/Dldr.Treams.C
  • Java/Dldr.Treams.D
  • Java/Dldr.Treams.E
  • JOKE/StartCmd.A
  • JS/Dldr.Expack.W.1
  • JS/Dldr.Expack.W.2
  • JS/Dldr.Expack.X
  • JS/Obfuscated.TJ
  • JS/Redirector.VE
  • PHISH/Cartasi.BV
  • PHP/WebShell.P
  • Rkit/Agent.165376.JH
  • RKIT/Medyies.ver
  • TR/Ainslot.225280
  • TR/Autoit.331776
  • TR/Banker.Agent.hho
  • TR/Barys.460.JH.3
  • TR/Barys.992.JH
  • TR/Barys.992.JH.2
  • TR/ClickDownload.B
  • TR/Crypt.Gypikon.B.4
  • TR/Dldr.Beebone.BA.2
  • TR/Dldr.Beebone.BA.3
  • TR/Dldr.Beebone.BA.J
  • TR/Dldr.Beebone.BB.J
  • TR/Dldr.Isser.A
  • TR/Dldr.Keer.A
  • TR/Dldr.Keer.B
  • TR/Dldr.Yerf.A
  • TR/Dldr.Yloru.A
  • TR/Dorkbot.77824.32
  • TR/Dorkbot.94208.50
  • TR/Dorkbot.94208.56
  • TR/Drop.Avreal.A
  • TR/Drop.Avreal.B
  • TR/Drop.Avreal.C
  • TR/Drop.Avreal.D
  • TR/Drop.Avreal.E
  • TR/Drop.Avreal.F
  • TR/Drop.Xecoq.A
  • TR/FakeAV.3653632
  • TR/FakeMSN.H
  • TR/Graftor.20892
  • TR/Injector.MH
  • TR/Kazy.MS
  • TR/Kazy.MT
  • TR/Kazy.MU
  • TR/Kazy.MV
  • TR/Kazy.MW
  • TR/Kazy.MX
  • TR/Kazy.MY
  • TR/Kazy.MZ
  • TR/Kazy.NA
  • TR/Kazy.NB
  • TR/Kazy.ND
  • TR/Kazy.NE
  • TR/Kazy.NF
  • TR/Kazy.NG
  • TR/Kazy.NH
  • TR/Kazy.NI
  • TR/Kazy.NK
  • TR/Kazy.NM
  • TR/Kazy.NN
  • TR/Llac.118784
  • TR/Llac.290816
  • TR/LockScreen.AH
  • TR/Malex.E.891
  • TR/Nebuler.368640.37
  • TR/Nebuler.368640.42
  • TR/Nebuler.368640.53
  • TR/Nebuler.368640.54
  • TR/Nebuler.368640.60
  • TR/Pontoeb.40960
  • TR/Ransom.274432
  • TR/Ransom.CU
  • TR/Ransom.EZ.218
  • TR/Rebhip.1355776
  • TR/Rimecud.A.501
  • TR/Rogue.6554582.JH
  • TR/Slenfbot.249856
  • TR/Slenfbot.249856.1
  • TR/Slenfbot.253952.12
  • TR/Slenfbot.253952.13
  • TR/Slenfbot.253952.14
  • TR/Slenfbot.253952.23
  • TR/Slenfbot.253952.26
  • TR/Slenfbot.253952.27
  • TR/Slenfbot.253952.30
  • TR/Slenfbot.253952.31
  • TR/Slenfbot.253952.36
  • TR/Slenfbot.253952.4
  • TR/Slenfbot.253952.47
  • TR/Slenfbot.253952.49
  • TR/Slenfbot.253952.52
  • TR/Slenfbot.253952.55
  • TR/Slenfbot.253952.6
  • TR/Slenfbot.258048.22
  • TR/Slenfbot.258048.25
  • TR/Spy.Bancos.BQ
  • TR/Spy.Bancos.BY
  • TR/Spy.ZBot.ZV
  • TR/Stekct.122880
  • TR/Tuax.90112
  • TR/VB.Inject.IX.2
  • TR/VB.Inject.IX.3
  • TR/Vobfus.233472.38
  • TR/Vobfus.233472.39
  • TR/Vobfus.233472.43
  • Worm/Dorkbot.I.377
  • Worm/Hamweq.A.JH
  • Worm/Hamweq.A.JH.2
  • Worm/Hamweq.H
  • Worm/Slenfbot.A.537
  • Worm/VBNA.E
  • Worm/Vobfus.EU.JH
  • Worm/Vobfus.EV.2
  • Worm/Vobfus.EV.3