after they infect the product, they may be silently downloading other malware like ransomware and Adware. The apps and information do occur sometimes in type of file attachments through e mail or messaging apps sent from hackers, by file-sharing Web-sites, Sharing illegal online games, and clicking/downloading files on random Internet sites operate