A harmless software in which a malicious program has been concealed, for example fraudulent collection, falsification or destruction of data.