While fixing an issue on a user system, you accidentally discover a file had the user's keystrokes entered. The user denies having created the file. What kind of infection has occurred on the user's system?