Unlike other computer virus, the role of this Trojan horse is to continue monitoring infected PC instead of focusing on computer data destruction on the infected computers or stealing important information in your computer, such as stealing passwords, account ID, bank information, online payment password, etc. it is mainly used for breaking a leaky backdoor of the security protection in your compu