bypassing <7 proxies ... direct connection established
hacking through your firewall ... access granted
deploying counter hacks ... counter hacks successfully deployed on your computer rn
installing remote virus trojan ... >9000 backdoors installed
erasing any evidence ... all evidence completely erased