Remote access: Gain control of infected machines remotely.
Keylogging: Record keystrokes on the target system.
File management: Upload, download, and delete files on the target system.
System surveillance: Capture screenshots, record audio/video, and access webcam.
Persistence: Establish...