Histórico do VDF

O arquivo VDF contém todos os padrões de detecção de malware usados pela ferramenta Avira.

A Avira atualiza seus arquivos VDF várias vezes ao dia, garantindo que seus produtos de segurança Avira continuem a detectar as mais recentes ameaças eletrônicas. Manter seu arquivo VDF atualizado é vital para a segurança de seu computador.

Versão iVDF 7.11.50.34 detalhes

Este arquivo VDF foi publicado em quarta-feira, 14 de novembro de 2012 20h17min00s GMT+01:00

Os padrões de detecção a seguir foram incluídos no nosso banco de dados de padrão de detecção (124 registros VDF):

  • BDS/Buterat.5897558
  • BDS/Buterat.utqa
  • EXP/4681.BO
  • EXP/4681.BP
  • EXP/4681.BQ
  • EXP/5076.A
  • EXP/Pdfjsc.aeb
  • EXP/Pidief.DLC.1
  • EXP/SWF.DW
  • EXP/SWF.DX
  • HTML/IFrame.ale
  • HTML/IFrame.ali
  • HTML/IFrame.alj
  • HTML/IFrame.F.2
  • HTML/ScrInject.AJ.1
  • HTML/SrcInject.AR.1
  • Java/Dldr.Dermit.DV
  • Java/Dldr.Dermit.DW
  • Java/Dldr.Dermit.DX
  • Java/Dldr.Dermit.DY
  • Java/Dldr.Dermit.DZ
  • Java/Dldr.Dermit.EB
  • Java/Dldr.Dermit.EC
  • Java/Dldr.Dermit.ED
  • Java/Dldr.Dermit.EE
  • Java/Dldr.Dermit.EF
  • Java/Dldr.Kara.AT.2
  • Java/Dldr.Lama.MW.2
  • Java/Dldr.Lamar.NW
  • Java/Dldr.Lamar.OB
  • Java/Dldr.Lamar.OC
  • Java/Dldr.Lamar.OD
  • Java/Dldr.Lamar.OE
  • Java/Dldr.Lamar.OF
  • Java/Dldr.Lamar.OG
  • Java/Dldr.Lamar.OI
  • Java/Dldr.Lamar.OJ
  • Java/Dldr.Pesur.AO
  • Java/Dldr.Pesur.AP
  • Java/Dldr.Pesur.AQ
  • Java/Dldr.Pesur.W.2
  • Java/Dldr.Strex.AP
  • Java/Dldr.Strex.AQ
  • Java/Dldr.Themod.CQ
  • Java/Dldr.Themod.CR
  • Java/Dldr.Themod.CS
  • Java/Dldr.Themod.CT
  • Java/Dldr.Themod.CU
  • Java/Dldr.Themod.CV
  • Java/Dldr.Themod.CW
  • Java/Dldr.Treams.HN
  • Java/Dldr.Treams.HO
  • Java/Dldr.Treams.HP
  • JAVA/Inject.BF
  • Java/Jogek.IK
  • Java/Jogek.IL
  • Java/Jogek.IM
  • Java/Jogek.IN
  • Java/Jogek.IO
  • Java/Jogek.IP
  • Java/Jogek.IQ
  • JAVA/SMSpap.A
  • JAVA/SMSpap.B
  • JAVA/SMSpap.C
  • JAVA/SMSpap.D
  • JAVA/SMSpap.E
  • JAVA/SMSpap.F
  • JAVA/SMSpap.G
  • JAVA/SMSpap.H
  • JAVA/SMSpap.I
  • JAVA/SMSpap.J
  • JAVA/SMSpap.K
  • JAVA/SMSpap.L
  • JAVA/SMSpap.M
  • JAVA/SMSpap.N
  • JAVA/SMSpap.O
  • JAVA/SMSpap.P
  • JAVA/SMSpap.Q
  • JAVA/SMSpap.R
  • JAVA/SMSpap.S
  • JS/BlacoleRef.W.26
  • JS/BlacoleRef.W.27
  • JS/BlacoleRef.W.28
  • JS/iFrame.75A445F1
  • JS/iFrame.bhv
  • JS/iFrame.cje
  • JS/iFrame.VN
  • JS/iFrame.VO
  • JS/iFrame.VP
  • MACOS/Imuler.D.1
  • TR/Autodwe.A
  • TR/Bancos.AY
  • TR/BHO.Binko.A
  • TR/Buzus.87799541
  • TR/Dldr.Moure.98771
  • TR/Drop.UJC.98772
  • TR/Fakealert.sea
  • TR/FakeAV.778966521
  • TR/FakeAV.887955425
  • TR/FakeAV.88795641
  • TR/FakeScanner.HU
  • TR/FakeScanner.S.1
  • TR/Gupboot.987721
  • TR/Hamweq.C
  • TR/Injector.akv
  • TR/Obfuscate.987124
  • TR/PSW.OnlGame.9987
  • TR/Rogue.887995421
  • TR/Rogue.opqewa
  • TR/Sirefef.9767823
  • TR/Spy.ZBot.7656771
  • TR/Spy.ZBot.99871
  • TR/Spy.ZBot.AGS.2
  • TR/VBKrypt.CZ
  • TR/Winwebsec.226589
  • TR/Winwebsec.722136
  • TR/Winwebsec.879955
  • TR/Winwebsec.987234
  • TR/Yakes.90210
  • TR/Zieepay.A
  • TR/Zusy.888795654
  • Worm/Ngrbot.D
  • Worm/Vobfus.1642987
  • Worm/Vobfus.987782