CIA operators reportedly use Assassin for a C2 to execute a number of jobs, obtain, after which periodically send out person knowledge for the CIA Listening Submit(s) (LP). Comparable to backdoor Trojan actions. Each AfterMidnight and Assassin run on Windows running method, are persistent, and periodically beacon to their configured LP to possibly