These programs have various functions, such as concealing files in the system, hiding the windows of running applications, or terminating active processes. The group includes cryptocurrency miners that generate coins using the target device’s resources. Cybercriminals usually use them in stealth mode. They are not malicious in themselves. Unlike NetTool, such programs are designed to operate locally.