February 2008

New Targets in Detection (January 2008)

Adware.91Cast
Adware.91Cast is an adware component that is not visible to the user. It may show pop-up and pop-under advertisements.

Adware.Domhel
Adware.Domhel installs itself as a Browser Helper Object (BHO). It may show pop-up and pop-under advertisements.

Adware.EasyKey
Adware.EasyKey installs itself as a Browser Helper Object (BHO). It may cause pop-up advertisements.

Adware.InternetGameBox
Adware.InternetGameBox is a game console application that installs along with an adware component. The adware component is hidden by a rootkit. If infected with Adware.InternetGameBox the user is recommended to seek further help at www.lavasoftsupport.com.

Adware.Kwod
Adware.Kwod is an adware component that is not visible to the user. It may show pop-up and pop-under advertisements.

Adware.Ncast
Adware.Ncast installs without the user’s consent and runs as a Browser Helper Object (BHO) and a driver. It may show pop-up advertisements.

Adware.StarsRoute
Adware.StarsRoute is adware that installs a file, Router.exe that runs on system start-up. Router.exe then runs as a process in the background without displaying any notification to the user about the running process. Adware.StarsRoute routs traffic and searches to the host route.starsdoor.com. Adware.StarsRoute may also display ads within certain intervals. Adware.StarsRoute installs without displaying an End User License Agreement (EULA) or privacy policy to the user.

Adware.SuperJuan
Adware.SuperJuan installs itself as a Browser Helper Object (BHO). It may show pop-up advertisements

Adware.Zhongsou
Adware.Zhongsou installs without the user's consent. It does not provide a EULA or privacy policy. It is installed in stealth and hides as a driver.

DoctorSpywareCleaner
DoctorSpywareCleaner is rogue anti-spyware that tricks the user into buying the commercial version. DoctorSpywareCleaner's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare / trick the user into clicking yes.

FilesSecure
FilesSecure is a rogue anti-spyware and clone of IEDefender; it may give exaggerated threat reports on the compromised computer then ask the user to purchase a registered version to remove those reported threats.

Hacktool.Flooder
Hacktool.Flooder provides functionality that makes it possible for an attacker to send massive amounts of data to a specific target. The flooding of a target may, for an example, disturb communication services or make various systems unresponsive. This is similar to a DDoS attack where a massive amount of calls are launched against a system. A DDoS attack may even make large systems unresponsive if the attack is launched from several computer systems that are infected by a DDoS capable Trojan horse.

Immunizr
Immunizr is rogue anti-spyware and a clone of MalwareStopper; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

InExplorer Toolbar
InExplorer Toolbar is a search engine toolbar which monitors the user’s browsing activity and collects anonymous information. InExplorer Toolbar contains no EULA or privacy policy during the installation and is installed on all accounts without the user’s permission.

Kazaap
Kazaap is a rogue anti-spyware application. It may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

KillSpy
KillSpy is rogue anti-spyware and a clone of BraveSentry; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

LiveProtection
LiveProtection is rogue anti-spyware and a clone of BraveSentry; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

MalwareCrush
MalwareCrush is rogue anti-spyware and a clone of SpyDawn; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

MalwarePro
MalwarePro is rogue anti-spyware that tricks the user into buying the commercial version. MalwarePro's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare/trick the user into clicking yes.

PersonalDesktopSpy
PersonalDesktopSpy is a spyware application. It works in stealth mode to capture screenshots of active application windows or the entire desktop at predefined time intervals and saves them to a specified directory on the disk. Its purpose is to spy on the user who is using the current account.

Retina-X Spyware Cleaner
Retina-X Spyware Cleaner is rogue anti-spyware that tricks the user into buying the commercial version. Retina-X Spyware Cleaner's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare/trick the user into clicking yes.

ScannedRepair
ScannedRepair is rogue anti-spyware that tricks the user into buying the commercial version. ScannedRepair's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare/trick the user into clicking yes.

SpywareSweeper
SpywareSweeper is rogue anti-spyware and a clone of BraveSentry; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

StopingSpy
StopingSpy is rogue anti-spyware and a clone of BraveSentry; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

SysCleaner
SysCleaner is rogue anti-spyware that tricks the user into buying the commercial version. SysCleaner's distribution methods are stealthy and/or misleading. The user is presented with misleading advertisements, often popped-up from files and processes installed by Trojans that scare/trick the user into clicking yes.

Toolbar.LanguageBar
Toolbar.LanguageBar installs itself as a search field on the Windows task bar. It uses a fake Google look-a-like site, google-find-it.com.

Vanquish
Vanquish is malware which may install a rootkit that hides folders, files, registry entries, and logs passwords.

Win32.Backdoor.Aebot
Win32.Backdoor.Aebot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Amitis
Win32.Backdoor.Amitis can allow an attacker to take control of a victim’s infected PC.

Win32.Backdoor.BackAttack
Win32.Backdoor.BackAttack will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Beacon
Win32.Backdoor.Beacon will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.BlueEye
Win32.Backdoor.BlueEye will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Breplibot
Win32.Backdoor.Breplibot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Cabrotor
Win32.Backdoor.Cabrotor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Ceckno
Win32.Backdoor.Ceckno will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.CMDer
Win32.Backdoor.CMDer will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Feardoor
Win32.Backdoor.Feardoor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.FireFly
Win32.Backdoor.FireFly will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Ginwui
Win32.Backdoor.Ginwui will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Harvester
Win32.Backdoor.Harvester will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Havar
Win32.Backdoor.Havar will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Hawk
Win32.Backdoor.Hawk will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Himic
Win32.Backdoor.Himic will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Hrat
Win32.Backdoor.Hrat will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Indicator
Win32.Backdoor.Indicator will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Inviter
Win32.Backdoor.Inviter will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Isen
Win32.Backdoor.Isen will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Ketch
Win32.Backdoor.Ketch will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Landis
Win32.Backdoor.Landis will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.LanSpy
Win32.Backdoor.LanSpy will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Lithium
Win32.Backdoor.Lithium will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.LittleWitch
Win32.Backdoor.LittleWitch will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Masot
Win32.Backdoor.Masot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Masteseq
Win32.Backdoor.Masteseq will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Mechbot
Win32.Backdoor.Mechbot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Medbot
Win32.Backdoor.Medbot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Mex
Win32.Backdoor.Mex will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Mirleg
Win32.Backdoor.Mirleg will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Mosucker
Win32.Backdoor.Mosucker will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Mytobor
Win32.Backdoor.Mytobor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Naninf
Win32.Backdoor.Naninf will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nanspy
Win32.Backdoor.Nanspy will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nark
Win32.Backdoor.Nark will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.NetCrack
Win32.Backdoor.NetCrack will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.NetDevil
Win32.Backdoor.NetDevil will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Netsnake
Win32.Backdoor.Netsnake will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nightcreature
Win32.Backdoor.Nightcreature will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.NinjaSpy
Win32.Backdoor.NinjaSpy will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nota
Win32.Backdoor.Nota will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Novadoor
Win32.Backdoor.Novadoor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nuclear
Win32.Backdoor.Nuclear will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Nucleroot
Win32.Backdoor.Nucleroo will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Ositdoor
Win32.Backdoor.Ositdoor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Outbreak
Win32.Backdoor.Outbreak will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.PackBot
Win32.Backdoor.PackBot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Pahador
Win32.Backdoor.Pahador will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Pakes
Win32.Backdoor.Pakes will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Pazus
Win32.Backdoor.Pazus will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Pecia
Win32.Backdoor.Pecia will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Plunix
Win32.Backdoor.Plunix will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Poison
Win32.Backdoor.Poison will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.PopWin
Win32.Backdoor.PopWin will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Portless
Win32.Backdoor.Portless will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Postalot
Win32.Backdoor.Postalot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.RCServ
Win32.Backdoor.RCServ will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Revell
Win32.Backdoor.Revell will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Roxrat
Win32.Backdoor.Roxrat will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Rukap
Win32.Backdoor.Rukap will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Sensode
Win32.Backdoor.Sensode will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.SerialThief
Win32.Backdoor.SerialThief will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Serpent
Win32.Backdoor.Serpent will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Servidor
Win32.Backdoor.Servidor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Shadow
Win32.Backdoor.Shadow will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Shbot
Win32.Backdoor.Shbot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Shox
Win32.Backdoor.Shox will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.SlackBot
Win32.Backdoor.SlackBot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.System33
Win32.Backdoor.System33 will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Telemot
Win32.Backdoor.Telemot will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Theef
Win32.Backdoor.Theef will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Tiny
Win32.Backdoor.Tiny will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Tron
Win32.Backdoor.Tron will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Turkojan
Win32.Backdoor.Turkojan will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Webdor
Win32.Backdoor.Webdor will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Wens
Win32.Backdoor.Wens will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Winprof
Win32.Backdoor.Winprof will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.WinRC
Win32.Backdoor.WinRC will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.WinShell
Win32.Backdoor.WinShell will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.WinterLove
Win32.Backdoor.WinterLove will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Virkel
Win32.Backdoor.Virkel will open up a backdoor on the infected machine, allowing remote access.

Win32.Backdoor.Xploit
Win32.Backdoor.Xploit will open up a backdoor on the infected machine, allowing remote access.

Win32.Spy.CLogger
Win32.Spy.CLogger is a French keylogger application. The keylogger works in the background, recording keystrokes and saving them to a text file. The program runs, at all times, as a process in stealth. Its purpose is to spy on the user who is using the current account.

Win32.Trojan.BAT
Win32.Trojan.BAT may change configurations for Windows Explorer and for the Windows interface. It may also install additional malware or adware components that further compromise system security. Win32.Trojan.BAT installs in stealth without user consent.

Win32.Trojan.BCB
Win32.Trojan.BCB installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.CHookDLL
Win32.Trojan.CHookDLL installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.DelAll
Win32.Trojan.DelAll is a Trojan which may try to erase the user’s hard drive.

Win32.Trojan.DelFiles
Win32.Trojan.DelFiles may destroy files which are essential for Windows to run properly.

Win32.Trojan.Diamin
Win32.Trojan.Diamin will install as a Trojan on the infected machine. It may try to change the Start Page in Internet Explorer and redirect the standard Microsoft Search Page using the Hosts file.

Win32.Trojan.Dorfin
Win32.Trojan.Dorfin installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Fatboy
Win32.Trojan.Fatboy installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.FormatAll
Win32.Trojan.FormatAll is malware which completely erases the user’s hard drive.

Win32.Trojan.Framer
Win32.Trojan.Framer installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Gina
Win32.Trojan.Gina installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Gload
Win32.Trojan.Gload installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Haradong
Win32.Trojan.Haradong is a Trojan which runs as a process in stealth. It changes the icons on the system and may fill the user’s desktop with .bmp files.

Win32.Trojan.HideProc
Win32.Trojan.HideProc is a Trojan which may masquerade itself through another harmless program; this may allow other computers to gain access to the system.

Win32.Trojan.KillApp
Win32.Trojan.KillApp is malware which may terminate processes for applications which are running in Windows. The processes may belong to applications from anti-virus and anti-spyware applications.

Win32.Trojan.KillDisk
Win32.Trojan.KillDisk tries to completely destroy the infected system.  It may disable the computer and destroy all data on the user’s hard drive.

Win32.Trojan.KillFiles
Win32.Trojan.KillFiles destroys files which are essential for Windows to run properly.

Win32.Trojan.KillProc
Win32.Trojan.KillProc is a Trojan which may terminate processes for security applications.

Win32.Trojan.KillReg
Win32.Trojan.KillReg installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.KillWin
Win32.Trojan.KillWin may cause Windows OS to terminate. It may also delete system critical files to prevent the user from restarting the system successfully.

Win32.Trojan.Krotten
Win32.Trojan.Krotten is malware which disables several functions for the user in Windows. It may disable functions such as registry tools, task manager and the control panel.

Win32.Trojan.Liewar
Win32.Trojan.Liewar installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.LipGame
Win32.Trojan.LipGame is a Trojan which may try to change the dial-up settings and replace it with its own. It may also connect to remote servers to download new files.

Win32.Trojan.Mifeng
Win32.Trojan.Mifeng installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.NeoBo
Win32.Trojan.NeoBo installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Neptunia
Win32.Trojan.Neptunia installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Obfuscated
Win32.Trojan.Obfuscated installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Owlforce
Win32.Trojan.Owlforce is a Trojan which automatically drops a dll file on the user’s disk. The dll hooks itself into the Internet Explorer browser and causes unwanted pop-ups.

Win32.Trojan.Ranck
Win32.Trojan.Ranck is a Trojan Horse application that installs on the system without user consent. No EULA or privacy policy is displayed during the installation. When installed, the Trojan runs in the background as a stealth process without displaying any notification to the user. Win32.Trojan.Ranck opens a port on the infected computer, making the system vulnerable for an attack or making it accessible for a remote attacker. This Trojan may also act as a proxy server and as a spam client, sending out spam to remote targets.

Win32.Trojan.Raser
Win32.Trojan.Raser installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.RegPat
Win32.Trojan.RegPat installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Restarter
Win32.Trojan.Restarter may download and install adware program(s) to the victim’s machine. It may also change configurations for Windows Explorer and for the Windows interface. Win32.Trojan.Restarter can restart the infected computer upon install. This Trojan runs, and installs, in stealth without user consent.

Win32.Trojan.RPoly
Win32.Trojan.RPoly is a Trojan which may connect to remote domains in stealth in order to download unwanted files.

Win32.Trojan.ShipUp
Win32.Trojan.ShipUp installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Tiny
Win32.Trojan.Tiny installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Vaklik
Win32.Trojan.Vaklik installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.VB
Win32.Trojan.VB installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Whispy
Win32.Trojan.Whispy installs itself as a Trojan. It may also download additional files to the infected system.

Win32.Trojan.Virtualizer
Win32.Trojan.Virtualizer is a Trojan which may copy itself to the system folder. It also opens up TCP ports and installs itself as a service where it is able to run.

Win32.TrojanClicker.Costrat
Win32.TrojanClicker.Costrat is a Trojan horse for the Windows platform. The Trojan may use stealth techniques to hide processes, files and registry entries. Win32.TrojanClicker.Costrat may come bundled with a rootkit.

Win32.TrojanClicker.Delf
Win32.TrojanClicker.Delf may cause Internet Explorer to contact a target webpage without the user’s knowledge or consent. Win32.TrojanClicker.Delf may then falsify data about the number of times the webpage is visited.

Win32.TrojanClicker.VB
Win32.TrojanClicker.VB may cause Internet Explorer to contact a target webpage without the user’s knowledge or consent. Win32.TrojanClicker.VB may then falsify data about the number of times the webpage is visited.

Win32.TrojanDownloader.Ani
Win32.TrojanDownloader.Ani downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Aphex
Win32.TrojanDownloader.Aphex downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Apropo
Win32.TrojanDownloader.Apropo downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Baser
Win32.TrojanDownloader.Baser downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Bensorty
Win32.TrojanDownloader.Bensorty downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Bestseller
Win32.TrojanDownloader.Bestseller downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.BHO
Win32.TrojanDownloader.BHO downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Bojo
Win32.TrojanDownloader.Bojo downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Bomka
Win32.TrojanDownloader.Bomka downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Busky
Win32.TrojanDownloader.Busky downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.CWS
Win32.TrojanDownloader.CWS downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Dadobra
Win32.TrojanDownloader.Dadobra downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Diehard
Win32.TrojanDownloader.Diehard downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Dirat
Win32.TrojanDownloader.Dirat downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Drezard
Win32.TrojanDownloader.Drezard downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Dyfica
Win32.TrojanDownloader.Dyfica downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Exchanger
Win32.TrojanDownloader.Exchanger downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Femad
Win32.TrojanDownloader.Femad downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Firu
Win32.TrojanDownloader.Firu downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Flux
Win32.TrojanDownloader.Flux downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.FlyStudio
Win32.TrojanDownloader.FlyStudio downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Friendown
Win32.TrojanDownloader.Friendown downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Hanlo
Win32.TrojanDownloader.Hanlo downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Harnig
Win32.TrojanDownloader.Harnig downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Hatchet
Win32.TrojanDownloader.Hatchet downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.IECodec
Win32.TrojanDownloader.IECodec downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Ieser
Win32.TrojanDownloader.Ieser downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Injecter
Win32.TrojanDownloader.Injecter downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.INService
Win32.TrojanDownloader.INService downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Isof
Win32.TrojanDownloader.Isof downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Kaizer
Win32.TrojanDownloader.Kaizer downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.LoadAdv
Win32.TrojanDownloader.LoadAdv downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Lopin
Win32.TrojanDownloader.Lopin downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Mediket
Win32.TrojanDownloader.Mediket downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Microjoin
Win32.TrojanDownloader.Microjoin downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Oleloa
Win32.TrojanDownloader.Oleloa downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Opinion
Win32.TrojanDownloader.Opinion downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.PassAlert
Win32.TrojanDownloader.PassAlert downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Perez
Win32.TrojanDownloader.Perez downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Pux
Win32.TrojanDownloader.Pux downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Quyl
Win32.TrojanDownloader.Quyl downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Redreval
Win32.TrojanDownloader.Redreval downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Reqlook
Win32.TrojanDownloader.Reqlook downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Sandesa
Win32.TrojanDownloader.Sandesa downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Shutit
Win32.TrojanDownloader.Shutit downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.SMW
Win32.TrojanDownloader.SMW downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Suurch
Win32.TrojanDownloader.Suurch downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Tibser
Win32.TrojanDownloader.Tibser downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Tuvir
Win32.TrojanDownloader.Tuvir downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Vidlo
Win32.TrojanDownloader.Vidlo downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Wintep
Win32.TrojanDownloader.Wintep downloads malicious software from a remote server without the consent of the user.

Win32.TrojanDownloader.Wixud
Win32.TrojanDownloader.Wixud downloads malicious software from a remote server without the consent of the user.

Win32.Trojan-Dropper.Delf
Win32.Trojan-Dropper.Delf will drop and try to install additional malicious files on the system.

Win32.TrojanDropper.ErPack
Win32.TrojanDropper.ErPack will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Gvuz
Win32.TrojanDropper.Gvuz will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Juntador
Win32.TrojanDropper.Juntador will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Microjoin
Win32.TrojanDropper.Microjoin will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Mixus
Win32.TrojanDropper.Mixus will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.Trojan-Dropper.MuDrop
Win32.Trojan-Dropper.MuDrop will drop and try to install additional malicious files on the system.

Win32.Trojan-Dropper.Nulprot
Win32.Trojan-Dropper.Nulprot will drop and try to install additional malicious files on the system.

Win32.TrojanDropper.Oleloa
Win32.TrojanDropper.Oleloa will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Plteam
Win32.TrojanDropper.Plteam will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.PVStealth
Win32.TrojanDropper.PVStealth will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.Small
Win32.TrojanDropper.Small will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanDropper.VB
Win32.TrojanDropper.VB will drop additional files on the infected system. These files are often other Trojans or downloaders.

Win32.TrojanNotifier.Delf
Win32.TrojanNotifier.Delf is a Trojan for the Microsoft Windows platform. This Trojan installs to run at system start-up, opening ports on the infected system and increasing the system vulnerability. Win32.TrojanNotifier.Delf may thereby compromise system security and user privacy.

Win32.TrojanNotifier.Small
Win32.TrojanNotifier.Small is a Trojan for the Microsoft Windows platform. This Trojan installs to run, without user consent, at system start-up. This Trojan may also use rootkit technology to hide malware components, files and services on the system. Win32.TrojanNotifier.Small may thereby compromise system security and user privacy.

Win32.TrojanProxy.Apre
Win32.TrojanProxy.Apre allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Bypass
Win32.TrojanProxy.Bypass allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Caprobad
Win32.TrojanProxy.Caprobad allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Coledor
Win32.TrojanProxy.Coledor allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Daemonize
Win32.TrojanProxy.Daemonize makes it possible for a remote malicious user to use a victim’s machine as a proxy server. This means that the malicious user's activities may appear to be coming from the victim’s machine.

Win32.TrojanProxy.Delf
Win32.TrojanProxy.Delf allows remote access to the computer. It may also try to contact its author.

Win32.TrojanProxy.Horst
Win32.TrojanProxy.Horst allows remote access to the computer and directs traffic to the Internet without the consent of the user. It also lowers system security by deleting firewall settings.

Win32.TrojanProxy.Lager
Win32.TrojanProxy.Lager allows remote access to the computer and directs traffic to the Internet without the consent of the user. It also lowers system security by deleting firewall settings.

Win32.TrojanProxy.Loser
Win32.TrojanProxy.Loser allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Ranky
Win32.TrojanProxy.Ranky allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Raznew
Win32.TrojanProxy.Raznew allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Scheduler
Win32.TrojanProxy.Scheduler allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Symbab
Win32.TrojanProxy.Symbab allows remote access to the computer and directs traffic to the Internet without the consent of the user. It also lowers system security by deleting firewall settings.

Win32.TrojanProxy.Thunker
Win32.TrojanProxy.Thunker allows remote access to the computer and directs the traffic to the Internet without the consent of the user.

Win32.TrojanProxy.VB
Win32.TrojanProxy.VB allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Webber
Win32.TrojanProxy.Webber allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.TrojanProxy.Xmiler
Win32.TrojanProxy.Xmiler allows remote access to the computer and directs traffic to the Internet without the consent of the user.

Win32.Trojan-PSW.Capwin
Win32.Trojan-PSW.Capwin is a variant of a keylogger that may capture entered or transmitted passwords.

Win32.Trojan-PSW.QQRob
Win32.Trojan-PSW.QQRob is designed in order to steal user passwords. A link to the executable file is inserted in the registry, ensuring that the Trojan will be launched after the victim’s system is rebooted.

Win32.TrojanPWS.FakeAIM
Win32.TrojanPWS.FakeAIM is an application where the user is able to create fake applications for MSN Messenger, Yahoo Messenger and PalTalk Messenger. The purpose is to trick other users into using this fake client. The person that planted the fake messenger application on the victim’s computer will then have the password sent to him/her.

Win32.TrojanPWS.Hukle
Win32.TrojanPWS.Hukle records your keystrokes and passwords, transmitting them to a remote server.

Win32.TrojanPWS.Small
Win32.TrojanPWS.Small records your keystrokes and passwords, transmitting them to a remote server.

Win32.TrojanPWS.Steam
Win32.TrojanPWS.Steam records your keystrokes and passwords, transmitting them to a remote server.

Win32.TrojanPWS.VB
Win32.TrojanPWS.VB records your keystrokes and/or passwords, transmitting them to a remote server.

Win32.TrojanSpy.Delf
Win32.TrojanSpy.Delf is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.Espy
Win32.TrojanSpy.Espy is malware which copies itself to the %system folder, executing processes which always run in stealth. The malware may name itself “sysload.com,” describing itself as a registry scanner from Rageh Soft. It also constantly tries to open up TCP port 25, which is the port used by the Simple Mail Transfer Protocol (SMTP).

Win32.TrojanSpy.Fearless
Win32.TrojanSpy.Fearless is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.IESpy
Win32.TrojanSpy.IESpy is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.Sters
Win32.TrojanSpy.Sters is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and email addresses.

Win32.TrojanSpy.VB
Win32.TrojanSpy.VB is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.TrojanSpy.VBStat
Win32.TrojanSpy.VBStat is a type of malicious program that can steal information such as passwords, surfing habits, credit card details and e-mail addresses.

Win32.Virus.Agent
Win32.Virus.Agent is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Agent, you will need to run an anti-virus program to clear it.

Win32.Virus.Andras
Win32.Virus.Andras is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Andras, you will need to run an anti-virus program to clear it.

Win32.Virus.Autorun
Win32.Virus.Autorun is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Autorun, you will need to run an anti-virus program to clear it.

Win32.Virus.Barbus
Win32.Virus.Barbus is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Barbus, you will need to run an anti-virus program to clear it.

Win32.Virus.Civut
Win32.Virus.Civut is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Civutyou, will need to run an anti-virus program to clear it.

Win32.Virus.DeadCode
Win32.Virus.DeadCode is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.DeadCode, you will need to run an anti-virus program to clear it.

Win32.Virus.Delf
Win32.Win32.Virus.Delf is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Delf, you will need to run an anti-virus program to clear it.

Win32.Virus.Dicomp
Win32.Virus.Dicomp is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Dicomp, you will need to run an anti-virus program to clear it.

Win32.Virus.Doser
Win32.Virus.Doser is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Doser, you will need to run an anti-virus program to clear it.

Win32.Virus.Downloader
Win32.Virus.Downloader is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Downloader, you will need to run an anti-virus program to clear it.

Win32.Virus.Drowor
Win32.Virus.Drowor is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Drowor, you will need to run an anti-virus program to clear it.

Win32.Virus.Fontra
Win32.Virus.Fontra is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Fontra, you will need to run an anti-virus program to clear it.

Win32.Virus.Grum
Win32.Virus.Grum is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Grum, you will need to run an anti-virus program to clear it.

Win32.Virus.Hidrag
Win32.Virus.Hidragt is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Hidrag, you will need to run an anti-virus program to clear it.

Win32.Virus.Higu
Win32.Virus.Higuis is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Higu, you will need to run an anti-virus program to clear it.

Win32.Virus.Katomik
Win32.Virus.Katomik is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Katomik, you will need to run an anti-virus program to clear it.

Win32.Virus.Lamicho
Win32.Virus.Lamicho is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Lamicho, you will need to run an anti-virus program to clear it.

Win32.Virus.Lanc
Win32.Virus.Lanc is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Lanc, you will need to run an anti-virus program to clear it.

Win32.Virus.Mkar
Win32.Virus.Mkar is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Mkar, you will need to run an anti-virus program to clear it.

Win32.Virus.Natas
Win32.Virus.Natas is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Natas, you will need to run an anti-virus program to clear it.

Win32.Virus.RainSong
Win32.Virus.RainSong is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.RainSong, you will need to run an anti-virus program to clear it.

Win32.Virus.Saburex
Win32.Virus.Saburex is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Saburex, you will need to run an anti-virus program to clear it.

Win32.Virus.Sankei
Win32.Virus.Sankei is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Sankei, you will need to run an anti-virus program to clear it.

Win32.Virus.Savior
Win32.Virus.Savior is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Savior, you will need to run an anti-virus program to clear it.

Win32.Virus.Sentinel
Win32.Virus.Sentinel is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Sentinel, you will need to run an anti-virus program to clear it.

Win32.Virus.Small
Win32.Virus.Small is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Small, you will need to run an anti-virus program to clear it.

Win32.Virus.Sosiska
Win32.Virus.Sosiska is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Sosiska, you will need to run an anti-virus program to clear it.

Win32.Virus.Tapan
Win32.Virus.Tapan is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Tapan, you will need to run an anti-virus program to clear it.

Win32.Virus.Teta
Win32.Virus.Teta is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Teta, you will need to run an anti-virus program to clear it.

Win32.Virus.VB
Win32.Virus.VB is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.VB, you will need to run an anti-virus program to clear it.

Win32.Virus.Wuke
Win32.Virus.Wuke is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Wuke you will need to run an anti-virus program to clear it.

Win32.Virus.Xorala
Win32.Virus.Xorala is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.Xorala you will need to run an anti-virus program to clear it.

Win32.Virus.ZPerm
Win32.Virus.ZPerm is a virus that infects selected executable files on a Windows platform. If infected by Win32.Virus.ZPerm, you will need to run an anti-virus program to clear it.

Win32.Worm.Ailis
Win32.Worm.Ailis is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Antilogo
Win32.Worm.Antilogo is a self-replicated worm. It copies itself to several places on the system and tries to open up tcp ports. Win32.Worm.Antilogo connects to remote domains to download new files. Heavy downloading combined with several new processes which run in stealth causes system instability.

Win32.Worm.Blebla
Win32.Worm.Blebla is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Bobic
Win32.Worm.Bobic is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Braban
Win32.Worm.Braban is a worm that spreads itself without any user intervention.

Win32.Worm.Buchon
Win32.Worm.Buchon is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Doomber
Win32.Worm.Doomber is a worm that exploits machines already infected with Win32.MyDoom.

Win32.Worm.Fesber
Win32.Worm.Fesber spreads from computer to computer via compromised systems or exploits.

Win32.Worm.Fujack
Win32.Worm.Fujack is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Gaobot
Win32.Worm.Gaobot is a backdoor worm that makes it possible for a remote attacker to access a user’s system via an opened backdoor.

Win32.Worm.Glowa
Win32.Worm.Glowa is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Hesi
Win32.Worm.Hesi spreads from computer to computer via compromised systems or exploits.

Win32.Worm.Kelvir
Win32.Worm.Kelvir is a worm that spreads itself without any user intervention.

Win32.Worm.Lemoor
Win32.Worm.Lemoor spreads from computer to computer via compromised systems or exploits.

Win32.Worm.Licat
Win32.Worm.Licat monitors an infected PC, sending information back to the attacker. It also downloads files onto the victim’s computer dependant on certain events.

Win32.Worm.Mixor
Win32.Worm.Mixor is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.Mobler
Win32.Worm.Mobler is a worm that tricks the user to execute the file through the use of a folder icon. The worm replicates itself to several places on the system, and runs processes in stealth. It also hides the file extensions in order to look like a legitimate folder which the user can access.

Win32.Worm.Mofeir
Win32.Worm.Mofeir is a worm that spreads itself without any user intervention.

Win32.Worm.Randex
Win32.Worm.Randex spreads from computer to computer via compromised systems or exploits.

Win32.Worm.Rapita
Win32.Worm.Rapita is a mass mailing worm that spreads itself without any user intervention.

Win32.Worm.RJump
Win32.Worm.RJump spreads from computer to computer via compromised systems or exploits. It may also open up TCP ports in stealth.

Win32.Worm.Skyperise
Win32.Worm.Skyperise is a worm that spreads itself without any user intervention.

Win32.Worm.Small
Win32.Worm.Small spreads from computer to computer via compromised systems or exploits.

Win64.Virus.Rugrat
Win64.Virus.Rugrat is a virus that infects selected executable files. If infected by Win64.Virus.Rugrat, you will need to run an anti-virus program to clear it.

Win64.Virus.Shruggle
Win64.Virus.Shruggle is a virus that infects selected executable files. If infected by Win64.Virus.Shruggle, you will need to run an anti-virus program to clear it.

WinSpyKiller
WinSpyKiller is a rogue anti-spyware and clone of MalwareStopper; it may give exaggerated threat reports on the compromised computer, and then ask the user to purchase a registered version to remove those reported threats.

XPDefender
XPDefender is an anti-spyware application and clone of UltimateDefender. After scanning the hard drive, the application informs the user that it has found spyware objects even if the computer is clean.


TAI - Threat Analysis Index
The Lavasoft Threat Analysis Index (TAI) system is based on a 10-point scale, with 1 representing the lowest threat and 10 representing the highest. The behavior of the program has more influence when assigning TAI points than the actual technical aspects of the malware. In other words, if the malware secretly attaches without the computer user's full understanding and approval, then it will automatically be given higher TAI points. A minimum TAI value of 3 is required before the malware is put into detection. Read more on the Lavasoft Security Center here.

Threat Analysis (TA) Index

 
  home
Paragon Drive Backup 8.5 Personal Edition More Info Buy Now

Research indicates that the Storm Worm botnet increased in size by over 200% due to seasonal spam blasts surrounding Christmas and New Year’s Eve. Following a pre-Valentine’s Day surge, Storm made up 8% of overall e-mail traffic.
Source: Honeyblog.org, Sophos

An exploit is a piece of software that takes advantage of a hole or vulnerability in a computer user’s system in order to gain unauthorized access to the system.
Source: Anti-Spyware Coalition Glossary

You hear time and time again about the importance of keeping your computer patched against known vulnerabilities. Find out how to stay up-to-date.

“I just wanted to tell you what an amazing line of products you have. Many times [Ad-Aware 2007] has saved my computer from a total crash, or me the hassle of wiping the hard disk clean. It finds so many things: malware, adware, spyware and malicious email attachments, Trojans, monitoring tools and back-door viruses, things that are so hard for me to find on my own. Thank you, really. You make my life so much easier.”
S. Black (Setsuna, Kansas, USA)

Lavasoft AB Lilla Bommen 1, 411 04 Gothenburg, Sweden | www.lavasoft.com | editor@lavasoft.com