0x07 Bacon Smoked 25pts Category Forensics Briefing Can you decrypt the c2 traffic and find out the first command ran by the attacker on victim machine? Flag format: flag{command} Solution Flag Flag: