A user on a corporate laptop discovers that their bank account and social media accounts have all been hacked. The user has highly secure passwords and has never accessed the accounts on another device. The user brings their laptop to the company's system administrator for review. What does the system administrator find out about the user’s computer?