Installing a "backdoor" that allows hackers to control your computer remotely.
📌 Never download software that requires you to disable your firewall or antivirus. If you have already run this file, immediately change your passwords and perform a full system scan using a reputable tool like Malwarebytes or Windows Defender.
Using your GPU/CPU for hidden cryptocurrency mining.