Avira Save 20% on AVG Internet Security 2012 3 PCs 2 Years

TR/Autoit.QX
The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.

TR/Occamy.mlwax
The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.

DDOS
The term 'DDOS' denotes a program that is able to perform distributed denial of service attacks such as on certain Internet sites.

DOS
The term 'DOS' denotes a DOS file virus.

BDC
The term 'BDC' denotes a backdoor client program. Such programs are used to spy out or change data on a computer.

APPL
The term APPL denotes an application of dubious origin or which might be hazardous to use. In case you would like to use the application anyway you may want to exclude it from scanning. This class of detection flags applications that if used unproperly or with malicious intent might damage or compromise security on the local system, remote systems or network infrastructure. These are legitimate applications that can be used to extract protected information, provide remote access to the local machine, modify advanced system settings or perform advanced operating system or networking functions. This detection doesn't mean that the file is malicious. However, if the file got on the system without the user's knowledge the system's security might be compromised. Disabling this detection is recommended for advanced users that understand the risks and how to use these applications.

BOO
The term 'BOO' denotes a boot sector or master boot sector virus.

BAT
The term 'BAT' denotes a virus in a batch format. Batch file viruses execute commands from the command line whereby the system can be modified.

BDS
The term 'BDS' denotes a backdoor server program. Backdoor server programs are used to spy out, modify, or delete data.

ADSPY
The term 'ADSPY' denotes adware or spyware. This type of malware is able to change browser settings, for instance, by manipulating registry settings or by using NTFS streams. Very often IE exploits are used to manipulate the browserhelp.dll extension.