To provide a helpful report, please check the source where you found this name and provide:
Used to steal personal data or hijack computing resources.
Because the name is incomplete, it is not possible to generate a technical report on its functionality.