Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun
Please see the PDFÂ attached