Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting…