Perform file operations and block mouse and keyboard inputs. Moreover, it deploys tools like Mimikatz for credential theft and a rootkit to hide its presence. The malware also integrates an ...