<?xml version="1.0" encoding="utf-8"?>
				<rss version="2.0">
				<channel><title>Avira Virus Lab</title>
			        <link>https://www.avira.com/en/support-virus-lab</link>
			        <description>Inventory of malware names, multi-language description and detection date.</description>
			        <language>en</language>
			        <pubDate>Thu, 29 Aug 2019 10:35:25 +0200</pubDate>
			        <lastBuildDate>Tue, 22 Feb 2022 10:34:17 +0100</lastBuildDate>
			        <image>
			            <url>https://www.webassetscdn.com/avira/prod/assets/www/_pim/_misc/avira-logo.png</url>
			            <title>Avira Virus Lab</title>
			            <link>https://www.avira.com/en/support-virus-lab</link>
			            <description>Inventory of malware names, multi-language description and detection date.</description>
			            <width>443</width>
			            <height>142</height>
			        </image><item>
			            <title>TR/Autoit.QX</title>
			            <link>https://www.avira.com/en/support-threats-summary/7964</link>
			            <description>
			                <![CDATA[The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.]]></description>
			            <pubDate>Fri, 20 Apr 2018 00:00:00 +0200</pubDate>
			            <guid isPermaLink="false">TR/Autoit.QX</guid>
			        </item><item>
			            <title>TR/Occamy.mlwax</title>
			            <link>https://www.avira.com/en/support-threats-summary/7966</link>
			            <description>
			                <![CDATA[The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.]]></description>
			            <pubDate>Wed, 14 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">TR/Occamy.mlwax</guid>
			        </item><item>
			            <title>DDOS</title>
			            <link>https://www.avira.com/en/support-threats-summary/7934</link>
			            <description>
			                <![CDATA[The term 'DDOS' denotes a program that is able to perform distributed denial of service attacks such as on certain Internet sites.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">DDOS</guid>
			        </item><item>
			            <title>DOS</title>
			            <link>https://www.avira.com/en/support-threats-summary/7935</link>
			            <description>
			                <![CDATA[The term 'DOS' denotes a DOS file virus.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">DOS</guid>
			        </item><item>
			            <title>BDC</title>
			            <link>https://www.avira.com/en/support-threats-summary/7931</link>
			            <description>
			                <![CDATA[The term 'BDC' denotes a backdoor client program. Such programs are used to spy out or change data on a computer.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">BDC</guid>
			        </item><item>
			            <title>APPL</title>
			            <link>https://www.avira.com/en/support-threats-summary/7929</link>
			            <description>
			                <![CDATA[The term APPL denotes an application of dubious origin or which might be hazardous to use. In case you would like to use the application anyway you may want to exclude it from scanning.
This class of detection flags applications that if used unproperly or with malicious intent might damage or compromise security on the local system, remote systems or network infrastructure. These are legitimate applications that can be used to extract protected information, provide remote access to the local machine, modify advanced system settings or perform advanced operating system or networking functions.
This detection doesn't mean that the file is malicious. However, if the file got on the system without the user's knowledge the system's security might be compromised.
Disabling this detection is recommended for advanced users that understand the risks and how to use these applications.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">APPL</guid>
			        </item><item>
			            <title>BOO</title>
			            <link>https://www.avira.com/en/support-threats-summary/7933</link>
			            <description>
			                <![CDATA[The term 'BOO' denotes a boot sector or master boot sector virus.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">BOO</guid>
			        </item><item>
			            <title>BAT</title>
			            <link>https://www.avira.com/en/support-threats-summary/7930</link>
			            <description>
			                <![CDATA[The term 'BAT' denotes a virus in a batch format. Batch file viruses execute commands from the command line whereby the system can be modified.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">BAT</guid>
			        </item><item>
			            <title>BDS</title>
			            <link>https://www.avira.com/en/support-threats-summary/7932</link>
			            <description>
			                <![CDATA[The term 'BDS' denotes a backdoor server program. Backdoor server programs are used to spy out, modify, or delete data.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">BDS</guid>
			        </item><item>
			            <title>ADSPY</title>
			            <link>https://www.avira.com/en/support-threats-summary/7925</link>
			            <description>
			                <![CDATA[The term 'ADSPY' denotes adware or spyware. This type of malware is able to change browser settings, for instance, by manipulating registry settings or by using NTFS streams. Very often IE exploits are used to manipulate the browserhelp.dll extension.]]></description>
			            <pubDate>Fri, 02 Mar 2018 00:00:00 +0100</pubDate>
			            <guid isPermaLink="false">ADSPY</guid>
			        </item></channel></rss>