Histórico do VDF

O arquivo VDF contém todos os padrões de detecção de malware usados pela ferramenta Avira.

A Avira atualiza seus arquivos VDF várias vezes ao dia, garantindo que seus produtos de segurança Avira continuem a detectar as mais recentes ameaças eletrônicas. Manter seu arquivo VDF atualizado é vital para a segurança de seu computador.

Versão iVDF 7.11.85.170 detalhes

Este arquivo VDF foi publicado em quinta-feira, 20 de junho de 2013 07:51 GMT+2

Os padrões de detecção a seguir foram incluídos no nosso banco de dados de padrão de detecção (119 registros VDF):

  • Adware/Agent.aece.165
  • Adware/AureateGroupMail.A.14
  • Adware/DomaIQ.cc.376
  • Adware/DomaIQ.cc.377
  • Adware/DomaIQ.cc.378
  • Adware/SMSHoax.109.275
  • Adware/SMSHoax.5.366
  • BDS/Fynloski.A.6863
  • BDS/Fynloski.A.6866
  • BDS/Fynloski.A.6870
  • BDS/MSIL.Bladabindi.F.346
  • BDS/Xtreme.zlb
  • TR/Agent.ARCP.16
  • TR/Agent.ARCP.17
  • TR/Barys.1412.3
  • TR/Barys.2182.570
  • TR/Comrerop.A.441
  • TR/Dldr.Beebone.JO.701
  • TR/Dldr.Beebone.JO.702
  • TR/Dldr.Beebone.JO.703
  • TR/Dldr.Beebone.JO.704
  • TR/Dldr.Beebone.JO.705
  • TR/Dldr.Beebone.JO.706
  • TR/Dldr.Beebone.JO.707
  • TR/Dldr.Beebone.JO.708
  • TR/Dldr.Beebone.JO.709
  • TR/Dldr.Beebone.JO.710
  • TR/Dldr.Beebone.JO.711
  • TR/Dldr.Beebone.JO.712
  • TR/Dldr.Beebone.JO.713
  • TR/Dldr.Beebone.JO.714
  • TR/Dldr.Beebone.JO.715
  • TR/Dldr.Beebone.JO.716
  • TR/Dldr.Beebone.JO.717
  • TR/Dldr.Beebone.JO.718
  • TR/Dldr.Beebone.JO.719
  • TR/Dldr.Beebone.JO.720
  • TR/Dldr.Beebone.JR.40
  • TR/Dldr.Cetex.A.24
  • TR/Drop.Injector.iqcn
  • TR/Drop.Tracur.C.226
  • TR/Fake.Rean.5408
  • TR/Fake.Rean.5409
  • TR/Fake.Rean.5410
  • TR/FakeAV.rqbu
  • TR/Kazy.143360
  • TR/Kazy.169119.113
  • TR/Kazy.169119.114
  • TR/Kazy.169442.115
  • TR/Kazy.171560.3
  • TR/Kazy.5389.18
  • TR/MSIL.Disfa.aozh
  • TR/MSIL.Disfa.augl
  • TR/MSIL.Disfa.augm
  • TR/Obfuscate.Agr.4
  • TR/PSW.Zbot.10439
  • TR/PSW.Zbot.AM.12883
  • TR/Ransom.Foreign.eaid
  • TR/Rogue.19017.2
  • TR/Rogue.19258.8
  • TR/Spy.131072.356
  • TR/Spy.1775616.1
  • TR/Spy.1787904.4
  • TR/Spy.1788928.9
  • TR/Spy.17920.79
  • TR/Spy.1794048.32
  • TR/Spy.1796608
  • TR/Spy.1802240.48
  • TR/Spy.1803776.5
  • TR/Spy.1812480.7
  • TR/Spy.1826304.2
  • TR/Spy.1839616.3
  • TR/Spy.1856000.4
  • TR/Spy.1870336.4
  • TR/Spy.Banker.185
  • TR/Spy.Banker.186
  • TR/Spy.Banker.187
  • TR/Spy.Banker.188
  • TR/Spy.Banker.189
  • TR/Spy.ZBot.mfuu
  • TR/Spy.ZBot.mluu
  • TR/Spy.ZBot.mlwa
  • TR/Symmi.20370.23
  • TR/Symmi.4958.13
  • TR/Tracur.AU.1413
  • TR/Tracur.AU.1414
  • TR/Tracur.AU.1415
  • TR/Tracur.AU.1416
  • TR/Tracur.AU.1417
  • TR/Tracur.AU.1418
  • TR/Tracur.AU.1419
  • TR/Tracur.AU.1420
  • TR/Tracur.AU.1421
  • TR/Urausy.C.21433
  • TR/Urausy.C.21434
  • TR/Urausy.C.21435
  • TR/Urausy.C.21436
  • TR/Urausy.C.21437
  • TR/Urausy.C.21438
  • TR/Urausy.C.21439
  • TR/Urausy.C.21440
  • TR/Urausy.C.21441
  • TR/Urausy.C.21442
  • TR/Urausy.C.21443
  • TR/Urausy.C.21444
  • TR/Urausy.C.21445
  • TR/Urausy.C.21446
  • TR/Urausy.C.21447
  • TR/Urausy.C.21448
  • TR/VB.Inject.AN.127
  • TR/VBKrypt.quxs
  • TR/Vundo.A.957
  • TR/Winwebsec.A.12310
  • TR/Winwebsec.A.12311
  • Worm/Gamarue.V.15
  • Worm/Gamarue.V.16
  • Worm/Luder.btam
  • Worm/Luder.btup
  • Worm/Vobfus.A.234