This backdoor may be dropped by other malware.
It is used by other malware for its rootkit functionalities.
It hides files, processes, and/or registry entries.
It may also be used by other malware in performing their malicious routines. However, it requires other components in order to run properly.
Updated By: Sabrina Sioting