: If you suspect your system is compromised, move any cryptocurrency to a fresh wallet created on a known-clean device (preferably a hardware wallet).
: Steal login information for crypto exchanges and other sensitive accounts. Common Characteristics of Such Files
: Often password-protected to evade simple antivirus scans during download.