the moment they infect the device, they may be silently downloading other malware like ransomware and Adware. The purposes and files do appear occasionally in kind of file attachments by e-mail or messaging applications sent from hackers, by means of file-sharing websites, Sharing illegal video games, and clicking/downloading data files on random I