: Record every key you type, including passwords, credit card numbers, and private messages.
: Take periodic pictures of your desktop to see what you are viewing.
Malicious files with names like this often use "infection detector" or "scanner" as a lure to trick users into running them. Once executed, they can: