_______ _______ _ _______ _______ _______ _______ _______
( ____ \/ ___ )| \ /\( ____ \( ____ )( ____ \|\ /|( ____ \( ____ \
| ( \/\/ ) || \ / /| ( \/| ( )|| ( \/( \ / )| ( \/| ( \/
| | / )| (_/ / | (__ | (____)|| (__ \ (_) / | (__ | |
| | _/ / | _ ( | __) | _____)| __) ) _ ( | __) | |
| | / _/ | ( \ \ | ( | ( | ( / ( ) \ | ( | |
| (____/\( (__/\| / \ \| (____/\| ) | (____/\( / \ )| (____/\| (____/\
(_______/\_______/|_/ \/(_______/|/ (_______/|/ \|(_______/(_______/
Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution