64 - Non-repudiation and Authenticity

The Compromised System establishes a connection to the attacker's command and control server, which then issues commands to the system to control the malware.