Files with certain extensions or audio recordings captured on a microphone could fall under this category. This second point is particularly interesting, since it may indicate that the trojanized ...