Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun

Please see the PDF attached