: If you suspect your system is compromised, move any cryptocurrency to a fresh wallet created on a known-clean device (preferably a hardware wallet).

: Steal login information for crypto exchanges and other sensitive accounts. Common Characteristics of Such Files

: Often password-protected to evade simple antivirus scans during download.