Eddie System/Environment Report - 12/9/2023 - 12:17 AM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19045.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Anonymous\AppData\Local\Eddie\default.profile Data path: C:\Users\Anonymous\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: fe80::1, 192.168.100.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 76 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.startlast: True areas.allowlist: us,be areas.denylist: ca mode.type: openvpn mode.protocol: TCP mode.alt: 1 proxy.mode: none network.entry.iplayer: ipv4-only network.ipv6.mode: block ---------------------------- Logs: . 2023.12.09 01:51:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:51:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:51:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:51:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:51:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:56176 . 2023.12.09 01:51:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:51:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:56176 [nonblock] . 2023.12.09 01:51:19 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:56176 . 2023.12.09 01:51:19 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:51:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:56176 . 2023.12.09 01:51:19 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51532 . 2023.12.09 01:51:19 - SSL > LOG6[0]: s_connect: connecting 194.187.251.116:443 . 2023.12.09 01:51:19 - SSL > LOG5[0]: s_connect: connected 194.187.251.116:443 . 2023.12.09 01:51:19 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51533 . 2023.12.09 01:51:19 - SSL > LOG6[0]: SNI: sending servername: 194.187.251.116 . 2023.12.09 01:51:19 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:51:52 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:51:52 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:51:52 - Disconnecting . 2023.12.09 01:51:52 - Sending hard termination signal . 2023.12.09 01:51:53 - Routes, delete 194.187.251.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:51:53 - Routes, delete 194.187.251.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:51:53 - Connection terminated. I 2023.12.09 01:51:56 - Checking authorization ... . 2023.12.09 01:51:57 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:51:57 - Connecting to Capricornus (Belgium, Brussels) . 2023.12.09 01:51:59 - Routes, add 194.187.251.92/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:51:59 - Routes, add 194.187.251.92/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:51:59 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:51:59 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:51:59 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:51:59 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\b249ecab65b1bc296b72175169f9e7c5a7eb3d8abca54b79416ea7f07d8aee8c.tmp.ssl . 2023.12.09 01:51:59 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:51:59 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:51:59 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:51:59 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:51:59 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:13283 . 2023.12.09 01:51:59 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:51:59 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:51:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:51:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:51:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:51:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:51:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:51:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:13283 . 2023.12.09 01:51:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:51:59 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:13283 [nonblock] . 2023.12.09 01:51:59 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:13283 . 2023.12.09 01:51:59 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:51:59 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:13283 . 2023.12.09 01:51:59 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51575 . 2023.12.09 01:51:59 - SSL > LOG6[0]: s_connect: connecting 194.187.251.92:443 . 2023.12.09 01:51:59 - SSL > LOG5[0]: s_connect: connected 194.187.251.92:443 . 2023.12.09 01:51:59 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51576 . 2023.12.09 01:51:59 - SSL > LOG6[0]: SNI: sending servername: 194.187.251.92 . 2023.12.09 01:51:59 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:52:31 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:52:31 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:52:31 - Disconnecting . 2023.12.09 01:52:31 - Sending hard termination signal . 2023.12.09 01:52:32 - Routes, delete 194.187.251.92/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:52:32 - Routes, delete 194.187.251.92/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:52:32 - Connection terminated. I 2023.12.09 01:52:35 - Checking authorization ... . 2023.12.09 01:52:36 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:52:36 - Connecting to Castor (Belgium, Brussels) . 2023.12.09 01:52:37 - Routes, add 91.207.57.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:52:37 - Routes, add 91.207.57.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:52:37 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:52:37 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:52:38 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:52:38 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\cad980761b298186516310abca1cab7343e611d0404c62fd019e47826e2510eb.tmp.ssl . 2023.12.09 01:52:38 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:52:38 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:52:38 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:52:38 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:52:38 - SSL > LOG6[ui]: Service [openvpn] (FD=480) bound to 127.0.0.1:8545 . 2023.12.09 01:52:38 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:52:38 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:52:38 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:52:38 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:52:38 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:52:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:52:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:52:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:8545 . 2023.12.09 01:52:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:52:38 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:8545 [nonblock] . 2023.12.09 01:52:38 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:8545 . 2023.12.09 01:52:38 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:52:38 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:8545 . 2023.12.09 01:52:38 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51603 . 2023.12.09 01:52:38 - SSL > LOG6[0]: s_connect: connecting 91.207.57.116:443 . 2023.12.09 01:52:38 - SSL > LOG5[0]: s_connect: connected 91.207.57.116:443 . 2023.12.09 01:52:38 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51604 . 2023.12.09 01:52:38 - SSL > LOG6[0]: SNI: sending servername: 91.207.57.116 . 2023.12.09 01:52:38 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:53:09 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:53:09 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:53:09 - Disconnecting . 2023.12.09 01:53:09 - Sending hard termination signal . 2023.12.09 01:53:10 - Routes, delete 91.207.57.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:53:10 - Routes, delete 91.207.57.116/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:53:10 - Connection terminated. I 2023.12.09 01:53:13 - Checking authorization ... . 2023.12.09 01:53:14 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:53:14 - Connecting to Diadema (Belgium, Brussels) . 2023.12.09 01:53:14 - Routes, add 194.187.251.164/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:53:14 - Routes, add 194.187.251.164/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:53:15 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:53:15 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:53:15 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:53:15 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\c8d9066394f5a5cba1650f50257c92c5fd821d50c0bedd57de62cdb58d7a79c3.tmp.ssl . 2023.12.09 01:53:15 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:53:15 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:53:15 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:53:15 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:53:15 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:56722 . 2023.12.09 01:53:15 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:53:15 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:53:15 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:53:15 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:53:15 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:53:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:53:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:53:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:56722 . 2023.12.09 01:53:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:53:15 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:56722 [nonblock] . 2023.12.09 01:53:15 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:56722 . 2023.12.09 01:53:15 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:53:15 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:56722 . 2023.12.09 01:53:15 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51613 . 2023.12.09 01:53:15 - SSL > LOG6[0]: s_connect: connecting 194.187.251.164:443 . 2023.12.09 01:53:15 - SSL > LOG5[0]: s_connect: connected 194.187.251.164:443 . 2023.12.09 01:53:15 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51614 . 2023.12.09 01:53:15 - SSL > LOG6[0]: SNI: sending servername: 194.187.251.164 . 2023.12.09 01:53:15 - SSL > LOG6[0]: Peer certificate not required ! 2023.12.09 01:53:19 - Disconnecting . 2023.12.09 01:53:19 - Sending soft termination signal . 2023.12.09 01:53:22 - Sending hard termination signal . 2023.12.09 01:53:22 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.12.09 01:53:22 - Routes, delete 194.187.251.164/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:53:23 - Routes, delete 194.187.251.164/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:53:23 - Connection terminated. I 2023.12.09 01:53:23 - Cancel requested. ! 2023.12.09 01:53:23 - Session terminated. I 2023.12.09 01:53:31 - Session starting. I 2023.12.09 01:53:31 - Checking authorization ... . 2023.12.09 01:53:32 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 01:53:32 - IPv6 disabled with packet filtering. ! 2023.12.09 01:53:32 - Connecting to Metallah (United States of America, Pennsylvania) . 2023.12.09 01:53:32 - Routes, add 156.96.151.133/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:53:33 - Routes, add 156.96.151.133/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:53:33 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:53:33 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:53:33 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:53:33 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\740ee2c87f106a587979b12a4c0ff26ceb018fe1fc06c9cd9eeb22a0acdbe405.tmp.ssl . 2023.12.09 01:53:33 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:53:33 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:53:33 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:53:33 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:53:33 - SSL > LOG6[ui]: Service [openvpn] (FD=472) bound to 127.0.0.1:41183 . 2023.12.09 01:53:33 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:53:33 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:53:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:53:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:53:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:53:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:53:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:53:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:41183 . 2023.12.09 01:53:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:53:33 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:41183 [nonblock] . 2023.12.09 01:53:33 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:41183 . 2023.12.09 01:53:33 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:53:33 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:41183 . 2023.12.09 01:53:33 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51623 . 2023.12.09 01:53:33 - SSL > LOG6[0]: s_connect: connecting 156.96.151.133:443 . 2023.12.09 01:53:33 - SSL > LOG5[0]: s_connect: connected 156.96.151.133:443 . 2023.12.09 01:53:33 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51624 . 2023.12.09 01:53:33 - SSL > LOG6[0]: SNI: sending servername: 156.96.151.133 . 2023.12.09 01:53:33 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:54:05 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:54:05 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:54:05 - Disconnecting . 2023.12.09 01:54:05 - Sending hard termination signal . 2023.12.09 01:54:06 - Routes, delete 156.96.151.133/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:54:06 - Routes, delete 156.96.151.133/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:54:06 - IPv6 restored with packet filtering. . 2023.12.09 01:54:06 - Connection terminated. I 2023.12.09 01:54:09 - Checking authorization ... . 2023.12.09 01:54:10 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:54:10 - Connecting to Musca (United States of America, Atlanta, Georgia) . 2023.12.09 01:54:10 - Routes, add 64.42.179.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:54:11 - Routes, add 64.42.179.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:54:11 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:54:11 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:54:11 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:54:11 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\128979e91dbe9f4452203b809daf453a7d8f71dab099d93dfc6b49da8bdaaf88.tmp.ssl . 2023.12.09 01:54:11 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:54:11 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:54:11 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:54:11 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:54:11 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:26932 . 2023.12.09 01:54:11 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:54:11 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:54:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:54:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:54:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:54:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:54:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:54:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:26932 . 2023.12.09 01:54:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:54:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:26932 [nonblock] . 2023.12.09 01:54:11 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:26932 . 2023.12.09 01:54:11 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:54:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:26932 . 2023.12.09 01:54:11 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51631 . 2023.12.09 01:54:11 - SSL > LOG6[0]: s_connect: connecting 64.42.179.44:443 . 2023.12.09 01:54:13 - SSL > LOG5[0]: s_connect: connected 64.42.179.44:443 . 2023.12.09 01:54:13 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51632 . 2023.12.09 01:54:13 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.44 . 2023.12.09 01:54:13 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:54:43 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:54:43 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:54:43 - Disconnecting . 2023.12.09 01:54:43 - Sending hard termination signal . 2023.12.09 01:54:44 - Routes, delete 64.42.179.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:54:44 - Routes, delete 64.42.179.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:54:44 - Connection terminated. I 2023.12.09 01:54:47 - Checking authorization ... . 2023.12.09 01:54:48 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:54:48 - Connecting to Iklil (United States of America, New York City) . 2023.12.09 01:54:48 - Routes, add 146.70.115.220/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:54:48 - Routes, add 146.70.115.220/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:54:49 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:54:49 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:54:49 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:54:49 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\859df6a77995bcbd12d46cd33d7305362054977c5387d752145c346fa93cc2c4.tmp.ssl . 2023.12.09 01:54:49 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:54:49 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:54:49 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:54:49 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:54:49 - SSL > LOG6[ui]: Service [openvpn] (FD=476) bound to 127.0.0.1:31875 . 2023.12.09 01:54:49 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:54:49 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:54:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:54:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:54:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:54:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:54:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:54:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:31875 . 2023.12.09 01:54:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:54:49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:31875 [nonblock] . 2023.12.09 01:54:49 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:31875 . 2023.12.09 01:54:49 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:54:49 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:31875 . 2023.12.09 01:54:49 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51642 . 2023.12.09 01:54:49 - SSL > LOG6[0]: s_connect: connecting 146.70.115.220:443 . 2023.12.09 01:54:49 - SSL > LOG5[0]: s_connect: connected 146.70.115.220:443 . 2023.12.09 01:54:49 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51643 . 2023.12.09 01:54:49 - SSL > LOG6[0]: SNI: sending servername: 146.70.115.220 . 2023.12.09 01:54:49 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:55:20 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:55:20 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:55:20 - Disconnecting . 2023.12.09 01:55:20 - Sending hard termination signal . 2023.12.09 01:55:21 - Routes, delete 146.70.115.220/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:55:21 - Routes, delete 146.70.115.220/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:55:21 - Connection terminated. I 2023.12.09 01:55:24 - Checking authorization ... . 2023.12.09 01:55:25 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:55:25 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2023.12.09 01:55:25 - Routes, add 64.42.179.36/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:55:26 - Routes, add 64.42.179.36/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:55:26 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:55:26 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:55:26 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:55:26 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\be623c6858bf0f05597ad762c1b4f8865fac9fb2802f60ccc5989889a3eeed61.tmp.ssl . 2023.12.09 01:55:26 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:55:26 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:55:26 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:55:26 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:55:26 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:8700 . 2023.12.09 01:55:26 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:55:26 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:55:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:55:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:55:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:55:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:55:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:55:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:8700 . 2023.12.09 01:55:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:55:26 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:8700 [nonblock] . 2023.12.09 01:55:26 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:8700 . 2023.12.09 01:55:26 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:55:26 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:8700 . 2023.12.09 01:55:26 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51652 . 2023.12.09 01:55:26 - SSL > LOG6[0]: s_connect: connecting 64.42.179.36:443 . 2023.12.09 01:55:26 - SSL > LOG5[0]: s_connect: connected 64.42.179.36:443 . 2023.12.09 01:55:26 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51653 . 2023.12.09 01:55:26 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.36 . 2023.12.09 01:55:26 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:55:59 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:55:59 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:55:59 - Disconnecting . 2023.12.09 01:55:59 - Sending hard termination signal . 2023.12.09 01:55:59 - Routes, delete 64.42.179.36/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:56:00 - Routes, delete 64.42.179.36/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:56:00 - Connection terminated. I 2023.12.09 01:56:03 - Checking authorization ... . 2023.12.09 01:56:03 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:56:03 - Connecting to Pollux (United States of America, Jacksonville, Florida) . 2023.12.09 01:56:04 - Routes, add 198.203.28.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:56:04 - Routes, add 198.203.28.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:56:04 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:56:04 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:56:04 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:56:04 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\48f45e5a91535cea8022bb70d7c5b31cd664c1990cd10a267979236c215314ea.tmp.ssl . 2023.12.09 01:56:04 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:56:04 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:56:04 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:56:04 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:56:04 - SSL > LOG6[ui]: Service [openvpn] (FD=472) bound to 127.0.0.1:21039 . 2023.12.09 01:56:04 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:56:04 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:56:04 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:56:04 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:56:04 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:56:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:56:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:56:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:21039 . 2023.12.09 01:56:04 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:56:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:21039 [nonblock] . 2023.12.09 01:56:04 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:21039 . 2023.12.09 01:56:04 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:56:04 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:21039 . 2023.12.09 01:56:04 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51659 . 2023.12.09 01:56:04 - SSL > LOG6[0]: s_connect: connecting 198.203.28.44:443 . 2023.12.09 01:56:04 - SSL > LOG5[0]: s_connect: connected 198.203.28.44:443 . 2023.12.09 01:56:04 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51660 . 2023.12.09 01:56:04 - SSL > LOG6[0]: SNI: sending servername: 198.203.28.44 . 2023.12.09 01:56:04 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:56:37 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:56:37 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:56:37 - Disconnecting . 2023.12.09 01:56:37 - Sending hard termination signal . 2023.12.09 01:56:37 - Routes, delete 198.203.28.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:56:37 - Routes, delete 198.203.28.44/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:56:37 - Connection terminated. I 2023.12.09 01:56:40 - Checking authorization ... . 2023.12.09 01:56:41 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:56:41 - Connecting to Mensa (United States of America, Dallas, Texas) . 2023.12.09 01:56:42 - Routes, add 199.249.230.8/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:56:42 - Routes, add 199.249.230.8/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:56:42 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:56:42 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:56:42 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:56:42 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\82a64d480ae2b0fb37c8397e665b5954093a87a7764fc653bc6bc9051d26d853.tmp.ssl . 2023.12.09 01:56:42 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:56:42 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:56:42 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:56:42 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:56:42 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:9145 . 2023.12.09 01:56:42 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:56:42 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:56:42 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:56:42 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:56:42 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:56:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:56:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:56:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:9145 . 2023.12.09 01:56:42 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:56:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9145 [nonblock] . 2023.12.09 01:56:42 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9145 . 2023.12.09 01:56:42 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:56:42 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:9145 . 2023.12.09 01:56:42 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51666 . 2023.12.09 01:56:42 - SSL > LOG6[0]: s_connect: connecting 199.249.230.8:443 . 2023.12.09 01:56:42 - SSL > LOG5[0]: s_connect: connected 199.249.230.8:443 . 2023.12.09 01:56:42 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51667 . 2023.12.09 01:56:42 - SSL > LOG6[0]: SNI: sending servername: 199.249.230.8 . 2023.12.09 01:56:42 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:56:55 - Collect information about AirVPN completed . 2023.12.09 01:57:14 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:57:14 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:57:14 - Disconnecting . 2023.12.09 01:57:14 - Sending hard termination signal . 2023.12.09 01:57:14 - Routes, delete 199.249.230.8/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:57:15 - Routes, delete 199.249.230.8/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:57:15 - Connection terminated. I 2023.12.09 01:57:18 - Checking authorization ... . 2023.12.09 01:57:18 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:57:18 - Connecting to Pegasus (United States of America, Dallas, Texas) . 2023.12.09 01:57:19 - Routes, add 199.249.230.18/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:57:19 - Routes, add 199.249.230.18/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:57:19 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:57:19 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:57:19 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:57:19 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\99a0fec53c431d8e7783f7e15b89fd13621cb5732b3c814091f60bd7e2eb267d.tmp.ssl . 2023.12.09 01:57:19 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:57:19 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:57:19 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:57:19 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:57:19 - SSL > LOG6[ui]: Service [openvpn] (FD=488) bound to 127.0.0.1:36082 . 2023.12.09 01:57:19 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:57:19 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:57:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:57:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:57:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:57:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:57:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:57:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:36082 . 2023.12.09 01:57:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:57:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:36082 [nonblock] . 2023.12.09 01:57:19 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:36082 . 2023.12.09 01:57:19 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:57:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:36082 . 2023.12.09 01:57:19 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51680 . 2023.12.09 01:57:19 - SSL > LOG6[0]: s_connect: connecting 199.249.230.18:443 . 2023.12.09 01:57:20 - SSL > LOG5[0]: s_connect: connected 199.249.230.18:443 . 2023.12.09 01:57:20 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51681 . 2023.12.09 01:57:20 - SSL > LOG6[0]: SNI: sending servername: 199.249.230.18 . 2023.12.09 01:57:20 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:57:52 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:57:52 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:57:52 - Disconnecting . 2023.12.09 01:57:52 - Sending hard termination signal . 2023.12.09 01:57:52 - Routes, delete 199.249.230.18/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:57:53 - Routes, delete 199.249.230.18/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:57:53 - Connection terminated. I 2023.12.09 01:57:56 - Checking authorization ... . 2023.12.09 01:57:56 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:57:56 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.12.09 01:57:57 - Routes, add 64.42.179.52/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:57:57 - Routes, add 64.42.179.52/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:57:57 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:57:57 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:57:57 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:57:57 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\2c9c0d6fabfadc45d460ef7c1df5111ac2768f9bd6df5a63634b542f3d2ec8da.tmp.ssl . 2023.12.09 01:57:57 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:57:57 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:57:57 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:57:57 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:57:57 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:7648 . 2023.12.09 01:57:57 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:57:57 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:57:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:57:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:57:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:57:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:57:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:57:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:7648 . 2023.12.09 01:57:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:57:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7648 [nonblock] . 2023.12.09 01:57:57 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7648 . 2023.12.09 01:57:57 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:57:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:7648 . 2023.12.09 01:57:57 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51688 . 2023.12.09 01:57:57 - SSL > LOG6[0]: s_connect: connecting 64.42.179.52:443 . 2023.12.09 01:57:58 - SSL > LOG5[0]: s_connect: connected 64.42.179.52:443 . 2023.12.09 01:57:58 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51689 . 2023.12.09 01:57:58 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.52 . 2023.12.09 01:57:58 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:58:30 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:58:30 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:58:30 - Disconnecting . 2023.12.09 01:58:30 - Sending hard termination signal . 2023.12.09 01:58:30 - Routes, delete 64.42.179.52/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:58:30 - Routes, delete 64.42.179.52/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:58:30 - Connection terminated. I 2023.12.09 01:58:34 - Checking authorization ... . 2023.12.09 01:58:34 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:58:34 - Connecting to Ran (United States of America, Dallas, Texas) . 2023.12.09 01:58:35 - Routes, add 199.249.230.28/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:58:35 - Routes, add 199.249.230.28/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:58:35 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:58:35 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:58:35 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:58:35 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\da52ebcf84332dddce81b4ea12bba3e1e7513826af8b545e410b1827728a1241.tmp.ssl . 2023.12.09 01:58:35 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:58:35 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:58:35 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:58:35 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:58:35 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:43260 . 2023.12.09 01:58:35 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:58:35 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:58:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:58:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:58:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:58:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:58:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:58:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:43260 . 2023.12.09 01:58:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:58:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:43260 [nonblock] . 2023.12.09 01:58:35 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:43260 . 2023.12.09 01:58:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:58:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:43260 . 2023.12.09 01:58:35 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51701 . 2023.12.09 01:58:35 - SSL > LOG6[0]: s_connect: connecting 199.249.230.28:443 . 2023.12.09 01:58:35 - SSL > LOG5[0]: s_connect: connected 199.249.230.28:443 . 2023.12.09 01:58:35 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51702 . 2023.12.09 01:58:35 - SSL > LOG6[0]: SNI: sending servername: 199.249.230.28 . 2023.12.09 01:58:35 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 01:59:07 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 01:59:07 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 01:59:07 - Disconnecting . 2023.12.09 01:59:07 - Sending hard termination signal . 2023.12.09 01:59:08 - Routes, delete 199.249.230.28/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:59:08 - Routes, delete 199.249.230.28/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:59:08 - Connection terminated. I 2023.12.09 01:59:11 - Checking authorization ... . 2023.12.09 01:59:12 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 01:59:12 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.12.09 01:59:12 - Routes, add 64.42.179.60/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:59:13 - Routes, add 64.42.179.60/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 01:59:13 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 01:59:13 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 01:59:13 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 01:59:13 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\a10204222603b21d928ffc83cdbde97ff6de9680729a9575cf1a5d19f4936bc1.tmp.ssl . 2023.12.09 01:59:13 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 01:59:13 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 01:59:13 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 01:59:13 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 01:59:13 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:47895 . 2023.12.09 01:59:13 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 01:59:13 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 01:59:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 01:59:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 01:59:13 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 01:59:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:59:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 01:59:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:47895 . 2023.12.09 01:59:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 01:59:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:47895 [nonblock] . 2023.12.09 01:59:13 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:47895 . 2023.12.09 01:59:13 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 01:59:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:47895 . 2023.12.09 01:59:13 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51708 . 2023.12.09 01:59:13 - SSL > LOG6[0]: s_connect: connecting 64.42.179.60:443 . 2023.12.09 01:59:13 - SSL > LOG5[0]: s_connect: connected 64.42.179.60:443 . 2023.12.09 01:59:13 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51709 . 2023.12.09 01:59:13 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.60 . 2023.12.09 01:59:13 - SSL > LOG6[0]: Peer certificate not required ! 2023.12.09 01:59:26 - Disconnecting . 2023.12.09 01:59:26 - Sending soft termination signal . 2023.12.09 01:59:29 - Sending hard termination signal . 2023.12.09 01:59:29 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.12.09 01:59:30 - Routes, delete 64.42.179.60/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 01:59:30 - Routes, delete 64.42.179.60/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 01:59:30 - Connection terminated. I 2023.12.09 01:59:30 - Cancel requested. ! 2023.12.09 01:59:30 - Session terminated. I 2023.12.09 02:00:54 - Session starting. I 2023.12.09 02:00:55 - Checking authorization ... . 2023.12.09 02:00:56 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:00:56 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.12.09 02:00:56 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:00:56 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:00:56 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:00:56 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:00:56 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:00:56 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\6a48b65eb4f1dcf00cddac9d827fb6f1dc88d9b89ab9d6a31397c4673d3c0453.tmp.ssl . 2023.12.09 02:00:56 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:00:56 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:00:56 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:00:56 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:00:56 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:48676 . 2023.12.09 02:00:56 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:00:56 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:00:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:00:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:00:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:00:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:00:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:00:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:00:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:00:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:48676 . 2023.12.09 02:00:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:00:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:48676 [nonblock] . 2023.12.09 02:00:57 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:48676 . 2023.12.09 02:00:57 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:00:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:48676 . 2023.12.09 02:00:57 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51729 . 2023.12.09 02:00:57 - SSL > LOG6[0]: s_connect: connecting 64.42.179.62:443 . 2023.12.09 02:00:57 - SSL > LOG5[0]: s_connect: connected 64.42.179.62:443 . 2023.12.09 02:00:57 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51730 . 2023.12.09 02:00:57 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.62 . 2023.12.09 02:00:57 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:01:29 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:01:29 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:01:29 - Disconnecting . 2023.12.09 02:01:29 - Sending hard termination signal . 2023.12.09 02:01:29 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:01:29 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:01:29 - Connection terminated. I 2023.12.09 02:01:32 - Checking authorization ... . 2023.12.09 02:01:33 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:01:33 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.12.09 02:01:34 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:01:34 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:01:34 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:01:34 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:01:34 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:01:34 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\fc86a97cb0880fc2a717ee4f42db4954e5276c90de3370c39e3dc986e1a81cf4.tmp.ssl . 2023.12.09 02:01:34 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:01:34 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:01:34 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:01:34 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:01:34 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:63137 . 2023.12.09 02:01:34 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:01:34 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:01:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:01:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:01:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:01:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:01:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:01:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:01:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:01:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:63137 . 2023.12.09 02:01:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:01:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:63137 [nonblock] . 2023.12.09 02:01:34 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:63137 . 2023.12.09 02:01:34 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:01:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:63137 . 2023.12.09 02:01:34 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51744 . 2023.12.09 02:01:34 - SSL > LOG6[0]: s_connect: connecting 64.42.179.62:443 . 2023.12.09 02:01:34 - SSL > LOG5[0]: s_connect: connected 64.42.179.62:443 . 2023.12.09 02:01:34 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51745 . 2023.12.09 02:01:34 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.62 . 2023.12.09 02:01:34 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:02:06 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:02:06 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:02:06 - Disconnecting . 2023.12.09 02:02:06 - Sending hard termination signal . 2023.12.09 02:02:07 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:02:07 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:02:07 - Connection terminated. I 2023.12.09 02:02:10 - Checking authorization ... . 2023.12.09 02:02:11 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:02:11 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.12.09 02:02:11 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:02:11 - Routes, add 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:02:12 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:02:12 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:02:12 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:02:12 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\fa5846f27f76304b71adbcfa7ae6b080f640e5317e4cd2b6efd895cbf599b940.tmp.ssl . 2023.12.09 02:02:12 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:02:12 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:02:12 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:02:12 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:02:12 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:16733 . 2023.12.09 02:02:12 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:02:12 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:02:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:02:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:02:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:02:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:02:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:02:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:02:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:02:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:16733 . 2023.12.09 02:02:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:02:12 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:16733 [nonblock] . 2023.12.09 02:02:12 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:16733 . 2023.12.09 02:02:12 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:02:12 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:16733 . 2023.12.09 02:02:12 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51751 . 2023.12.09 02:02:12 - SSL > LOG6[0]: s_connect: connecting 64.42.179.62:443 . 2023.12.09 02:02:12 - SSL > LOG5[0]: s_connect: connected 64.42.179.62:443 . 2023.12.09 02:02:12 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51752 . 2023.12.09 02:02:12 - SSL > LOG6[0]: SNI: sending servername: 64.42.179.62 . 2023.12.09 02:02:12 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:02:43 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:02:43 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:02:43 - Disconnecting . 2023.12.09 02:02:43 - Sending hard termination signal . 2023.12.09 02:02:44 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:02:44 - Routes, delete 64.42.179.62/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:02:44 - Connection terminated. I 2023.12.09 02:02:47 - Checking authorization ... I 2023.12.09 02:02:47 - Cancel requested. ! 2023.12.09 02:02:47 - Session terminated. I 2023.12.09 02:04:41 - Session starting. I 2023.12.09 02:04:41 - Checking authorization ... . 2023.12.09 02:04:42 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:04:42 - Connecting to Libra (United States of America, Atlanta, Georgia) . 2023.12.09 02:04:42 - Routes, add 64.42.179.69/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:04:43 - Routes, add 64.42.179.69/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:04:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:04:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:04:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:04:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:04:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:04:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:04:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:04:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.69:443 . 2023.12.09 02:04:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:04:43 - OpenVPN > UDP link local: (not bound) . 2023.12.09 02:04:43 - OpenVPN > UDP link remote: [AF_INET]64.42.179.69:443 . 2023.12.09 02:05:15 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:05:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.09 02:05:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2023.12.09 02:05:20 - Disconnecting . 2023.12.09 02:05:21 - Routes, delete 64.42.179.69/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:05:21 - Routes, delete 64.42.179.69/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:05:21 - Connection terminated. I 2023.12.09 02:05:24 - Checking authorization ... . 2023.12.09 02:05:25 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:05:25 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:05:25 - Routes, add 208.77.22.214/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:05:25 - Routes, add 208.77.22.214/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:05:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:05:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:05:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:05:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:05:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:05:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:05:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:05:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]208.77.22.214:443 . 2023.12.09 02:05:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:05:25 - OpenVPN > UDP link local: (not bound) . 2023.12.09 02:05:25 - OpenVPN > UDP link remote: [AF_INET]208.77.22.214:443 . 2023.12.09 02:05:57 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:05:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.09 02:06:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2023.12.09 02:06:02 - Disconnecting . 2023.12.09 02:06:03 - Routes, delete 208.77.22.214/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:06:03 - Routes, delete 208.77.22.214/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:06:03 - Connection terminated. I 2023.12.09 02:06:06 - Checking authorization ... . 2023.12.09 02:06:07 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2023.12.09 02:06:07 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:06:07 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:06:08 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:06:08 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:06:08 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:06:08 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:06:08 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\3c9c269f2a2d957738387f4cb24651f57d0c6daaaa25802139d2d927a4cb0fb4.tmp.ssl . 2023.12.09 02:06:08 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:06:08 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:06:08 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:06:08 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:06:08 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:10993 . 2023.12.09 02:06:08 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:06:08 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:06:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:06:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:06:08 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:06:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:06:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:06:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:06:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:06:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:10993 . 2023.12.09 02:06:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:06:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:10993 [nonblock] . 2023.12.09 02:06:08 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:10993 . 2023.12.09 02:06:08 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:06:08 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:10993 . 2023.12.09 02:06:08 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51774 . 2023.12.09 02:06:08 - SSL > LOG6[0]: s_connect: connecting 208.77.22.26:443 . 2023.12.09 02:06:08 - SSL > LOG5[0]: s_connect: connected 208.77.22.26:443 . 2023.12.09 02:06:08 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51775 . 2023.12.09 02:06:08 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.26 . 2023.12.09 02:06:08 - SSL > LOG6[0]: Peer certificate not required ! 2023.12.09 02:06:38 - Disconnecting . 2023.12.09 02:06:38 - Sending soft termination signal . 2023.12.09 02:06:41 - Sending hard termination signal . 2023.12.09 02:06:41 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.12.09 02:06:42 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:06:42 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:06:42 - Connection terminated. I 2023.12.09 02:06:42 - Cancel requested. ! 2023.12.09 02:06:42 - Session terminated. I 2023.12.09 02:08:32 - Session starting. I 2023.12.09 02:08:33 - Checking authorization ... . 2023.12.09 02:08:33 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 02:08:34 - IPv6 disabled with packet filtering. ! 2023.12.09 02:08:34 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:08:34 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:08:34 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:08:34 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:08:34 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:08:34 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:08:34 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\643e0d17058f56714651b2a02af5207046d04e366a2f2677ffe21d5b0fd146e0.tmp.ssl . 2023.12.09 02:08:34 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:08:34 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:08:34 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:08:34 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:08:34 - SSL > LOG6[ui]: Service [openvpn] (FD=476) bound to 127.0.0.1:23671 . 2023.12.09 02:08:34 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:08:34 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:08:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:08:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:08:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:08:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:08:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:08:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:08:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:08:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:23671 . 2023.12.09 02:08:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:08:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:23671 [nonblock] . 2023.12.09 02:08:35 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:23671 . 2023.12.09 02:08:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:08:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:23671 . 2023.12.09 02:08:35 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51787 . 2023.12.09 02:08:35 - SSL > LOG6[0]: s_connect: connecting 208.77.22.26:443 . 2023.12.09 02:08:35 - SSL > LOG5[0]: s_connect: connected 208.77.22.26:443 . 2023.12.09 02:08:35 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51788 . 2023.12.09 02:08:35 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.26 . 2023.12.09 02:08:35 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:09:07 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:09:07 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:09:07 - Disconnecting . 2023.12.09 02:09:07 - Sending hard termination signal . 2023.12.09 02:09:07 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:09:07 - Routes, skipped for 2607:9000:0:85:dc22:2f6:2bc5:19c1 : IPv6 blocked. . 2023.12.09 02:09:07 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:09:07 - IPv6 restored with packet filtering. . 2023.12.09 02:09:07 - Connection terminated. I 2023.12.09 02:09:11 - Checking authorization ... . 2023.12.09 02:09:11 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 02:09:11 - IPv6 disabled with packet filtering. ! 2023.12.09 02:09:11 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:09:12 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:09:12 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:09:12 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:09:12 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:09:12 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:09:12 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\1e028a9682c08ca691faebf6b6ac89f7dda711542584aeff207369a87674685d.tmp.ssl . 2023.12.09 02:09:12 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:09:12 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:09:12 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:09:12 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:09:12 - SSL > LOG6[ui]: Service [openvpn] (FD=480) bound to 127.0.0.1:34983 . 2023.12.09 02:09:12 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:09:12 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:09:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:09:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:09:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:09:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:09:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:09:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:09:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:09:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:34983 . 2023.12.09 02:09:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:09:12 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:34983 [nonblock] . 2023.12.09 02:09:12 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:34983 . 2023.12.09 02:09:12 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:09:12 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:34983 . 2023.12.09 02:09:12 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51794 . 2023.12.09 02:09:12 - SSL > LOG6[0]: s_connect: connecting 208.77.22.26:443 . 2023.12.09 02:09:12 - SSL > LOG5[0]: s_connect: connected 208.77.22.26:443 . 2023.12.09 02:09:12 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51795 . 2023.12.09 02:09:12 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.26 . 2023.12.09 02:09:12 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:09:44 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:09:44 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:09:44 - Disconnecting . 2023.12.09 02:09:44 - Sending hard termination signal . 2023.12.09 02:09:45 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:09:45 - Routes, skipped for 2607:9000:0:85:dc22:2f6:2bc5:19c1 : IPv6 blocked. . 2023.12.09 02:09:45 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:09:45 - IPv6 restored with packet filtering. . 2023.12.09 02:09:45 - Connection terminated. I 2023.12.09 02:09:48 - Checking authorization ... . 2023.12.09 02:09:49 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 02:09:49 - IPv6 disabled with packet filtering. ! 2023.12.09 02:09:49 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:09:50 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:09:50 - Routes, add 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:09:50 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:09:50 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:09:50 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:09:50 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\33d73985c849d08e0913f4a7de380d62d633ee68a9f424be6247327428cc2913.tmp.ssl . 2023.12.09 02:09:50 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:09:50 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:09:50 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:09:50 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:09:50 - SSL > LOG6[ui]: Service [openvpn] (FD=464) bound to 127.0.0.1:56184 . 2023.12.09 02:09:50 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:09:50 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:09:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:09:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:09:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:09:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:09:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:09:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.12.09 02:09:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.12.09 02:09:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:56184 . 2023.12.09 02:09:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:09:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:56184 [nonblock] . 2023.12.09 02:09:50 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:56184 . 2023.12.09 02:09:50 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:09:50 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:56184 . 2023.12.09 02:09:50 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51806 . 2023.12.09 02:09:50 - SSL > LOG6[0]: s_connect: connecting 208.77.22.26:443 . 2023.12.09 02:09:50 - SSL > LOG5[0]: s_connect: connected 208.77.22.26:443 . 2023.12.09 02:09:50 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51807 . 2023.12.09 02:09:50 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.26 . 2023.12.09 02:09:50 - SSL > LOG6[0]: Peer certificate not required ! 2023.12.09 02:10:13 - Disconnecting . 2023.12.09 02:10:13 - Sending soft termination signal . 2023.12.09 02:10:16 - Sending hard termination signal . 2023.12.09 02:10:16 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.12.09 02:10:17 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:10:17 - Routes, skipped for 2607:9000:0:85:dc22:2f6:2bc5:19c1 : IPv6 blocked. . 2023.12.09 02:10:17 - Routes, delete 208.77.22.26/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:10:17 - IPv6 restored with packet filtering. . 2023.12.09 02:10:17 - Connection terminated. I 2023.12.09 02:10:17 - Cancel requested. ! 2023.12.09 02:10:17 - Session terminated. I 2023.12.09 02:12:41 - Session starting. I 2023.12.09 02:12:41 - Checking authorization ... . 2023.12.09 02:12:42 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 02:12:42 - IPv6 disabled with packet filtering. ! 2023.12.09 02:12:42 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:12:43 - Routes, add 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:12:43 - Routes, add 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:12:43 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:12:43 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:12:43 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:12:43 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\5871d19747e6409736d84313395b3146d67aede861a32bb22c3340adbc30e1e7.tmp.ssl . 2023.12.09 02:12:43 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:12:43 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:12:43 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:12:43 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:12:43 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:16063 . 2023.12.09 02:12:43 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:12:43 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:12:43 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:12:43 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:12:43 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:12:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 02:12:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 02:12:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:16063 . 2023.12.09 02:12:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:12:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:16063 [nonblock] . 2023.12.09 02:12:43 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:16063 . 2023.12.09 02:12:43 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:12:43 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:16063 . 2023.12.09 02:12:43 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51816 . 2023.12.09 02:12:43 - SSL > LOG6[0]: s_connect: connecting 208.77.22.213:443 . 2023.12.09 02:12:43 - SSL > LOG5[0]: s_connect: connected 208.77.22.213:443 . 2023.12.09 02:12:43 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51817 . 2023.12.09 02:12:43 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.213 . 2023.12.09 02:12:43 - SSL > LOG6[0]: Peer certificate not required . 2023.12.09 02:13:16 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.12.09 02:13:16 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2023.12.09 02:13:16 - Disconnecting . 2023.12.09 02:13:16 - Sending hard termination signal . 2023.12.09 02:13:16 - Routes, delete 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:13:16 - Routes, skipped for 2607:9000:0:85:dc22:2f6:2bc5:19c1 : IPv6 blocked. . 2023.12.09 02:13:17 - Routes, delete 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:13:17 - IPv6 restored with packet filtering. . 2023.12.09 02:13:17 - Connection terminated. I 2023.12.09 02:13:20 - Checking authorization ... . 2023.12.09 02:13:20 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" . 2023.12.09 02:13:20 - IPv6 disabled with packet filtering. ! 2023.12.09 02:13:20 - Connecting to Superba (United States of America, Chicago, Illinois) . 2023.12.09 02:13:21 - Routes, add 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:13:21 - Routes, add 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", already exists. . 2023.12.09 02:13:21 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2023.12.09 02:13:21 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2023.12.09 02:13:21 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2023.12.09 02:13:21 - SSL > LOG5[ui]: Reading configuration from file C:\Users\Anonymous\AppData\Local\Eddie\4a1b2b582124b032ef645500963092fa8a0347c8d3af29f00e33c23767c1bd0e.tmp.ssl . 2023.12.09 02:13:21 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.12.09 02:13:21 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.12.09 02:13:21 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.12.09 02:13:21 - SSL > LOG5[ui]: Configuration successful . 2023.12.09 02:13:21 - SSL > LOG6[ui]: Service [openvpn] (FD=480) bound to 127.0.0.1:45503 . 2023.12.09 02:13:21 - SSL > LOG6[cron]: Executing cron jobs . 2023.12.09 02:13:21 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2023.12.09 02:13:21 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.12.09 02:13:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.12.09 02:13:21 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.12.09 02:13:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 02:13:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2023.12.09 02:13:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:45503 . 2023.12.09 02:13:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.12.09 02:13:21 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:45503 [nonblock] . 2023.12.09 02:13:21 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:45503 . 2023.12.09 02:13:21 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.12.09 02:13:21 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:45503 . 2023.12.09 02:13:21 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:51825 . 2023.12.09 02:13:21 - SSL > LOG6[0]: s_connect: connecting 208.77.22.213:443 . 2023.12.09 02:13:22 - SSL > LOG5[0]: s_connect: connected 208.77.22.213:443 . 2023.12.09 02:13:22 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.100.4:51826 . 2023.12.09 02:13:22 - SSL > LOG6[0]: SNI: sending servername: 208.77.22.213 . 2023.12.09 02:13:22 - SSL > LOG6[0]: Peer certificate not required ! 2023.12.09 02:13:33 - Disconnecting . 2023.12.09 02:13:33 - Sending soft termination signal . 2023.12.09 02:13:36 - Sending hard termination signal . 2023.12.09 02:13:36 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.12.09 02:13:37 - Routes, delete 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)". . 2023.12.09 02:13:37 - Routes, skipped for 2607:9000:0:85:dc22:2f6:2bc5:19c1 : IPv6 blocked. . 2023.12.09 02:13:37 - Routes, delete 208.77.22.213/32 for interface "Wi-Fi (Broadcom 802.11n Network Adapter)", not exists. . 2023.12.09 02:13:37 - IPv6 restored with packet filtering. . 2023.12.09 02:13:37 - Connection terminated. I 2023.12.09 02:13:37 - Cancel requested. ! 2023.12.09 02:13:37 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.100.1", "interface_index": 16, "metric": 0, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "192.168.100.0\/24", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "192.168.100.4\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "192.168.100.255\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "192.168.163.0\/24", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "192.168.163.1\/32", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "192.168.163.255\/32", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "192.168.174.0\/24", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "192.168.174.1\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "192.168.174.255\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{A4F8AEE7-27EE-496B-895E-4391057F866A}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{2B25F655-551E-4C92-B54F-5B085BC5B334}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{6A59057D-7DAB-4379-939D-BC44012505A1}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 57, "metric": 256, "interface": "{725D4EC0-D729-4D40-A443-16C7DEF32692}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 64, "metric": 256, "interface": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{A4F8AEE7-27EE-496B-895E-4391057F866A}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 3, "metric": 256, "interface": "{2B25F655-551E-4C92-B54F-5B085BC5B334}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 8, "metric": 256, "interface": "{6A59057D-7DAB-4379-939D-BC44012505A1}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 57, "metric": 256, "interface": "{725D4EC0-D729-4D40-A443-16C7DEF32692}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 64, "metric": 256, "interface": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{A4F8AEE7-27EE-496B-895E-4391057F866A}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{2B25F655-551E-4C92-B54F-5B085BC5B334}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{6A59057D-7DAB-4379-939D-BC44012505A1}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 57, "metric": 256, "interface": "{725D4EC0-D729-4D40-A443-16C7DEF32692}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 64, "metric": 256, "interface": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}" }, { "destination": "fe80::32be:6e1f:8396:1a16\/128", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}" }, { "destination": "fe80::359f:7bf3:9ea6:915b\/128", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{2B25F655-551E-4C92-B54F-5B085BC5B334}" }, { "destination": "fe80::4610:bdb1:63ed:9877\/128", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "fe80::5f8f:5663:3679:4e2\/128", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{A4F8AEE7-27EE-496B-895E-4391057F866A}" }, { "destination": "fe80::8a84:90e6:5b82:7c0c\/128", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "fe80::97c2:3814:ab86:3877\/128", "gateway": "::", "interface_index": 64, "metric": 256, "interface": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}" }, { "destination": "fe80::9910:59bf:5f46:1181\/128", "gateway": "::", "interface_index": 57, "metric": 256, "interface": "{725D4EC0-D729-4D40-A443-16C7DEF32692}" }, { "destination": "fe80::afcb:a415:8ebe:31ef\/128", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{6A59057D-7DAB-4379-939D-BC44012505A1}" }, { "destination": "fe80::f936:f206:725f:a4bf\/128", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{78601C84-7901-4971-AF40-5754EA90F017}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{A4F8AEE7-27EE-496B-895E-4391057F866A}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 3, "metric": 256, "interface": "{2B25F655-551E-4C92-B54F-5B085BC5B334}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 16, "metric": 256, "interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 8, "metric": 256, "interface": "{6A59057D-7DAB-4379-939D-BC44012505A1}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 13, "metric": 256, "interface": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 57, "metric": 256, "interface": "{725D4EC0-D729-4D40-A443-16C7DEF32692}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 64, "metric": 256, "interface": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}" } ], "ipv4-default-gateway": "192.168.100.1", "ipv4-default-interface": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}", "interfaces": [ { "friendly": "Ethernet", "id": "{A4F8AEE7-27EE-496B-895E-4391057F866A}", "name": "Ethernet", "description": "Qualcomm Atheros AR8172\/8176\/8178 PCI-E Fast Ethernet Controller (NDIS 6.30)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::5f8f:5663:3679:4e2", "169.254.81.187" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection", "id": "{725D4EC0-D729-4D40-A443-16C7DEF32692}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9910:59bf:5f46:1181", "169.254.12.192" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "OpenVPN Data Channel Offload", "id": "{0D40ACA8-434A-49C7-A1EE-540DE2B9869F}", "name": "OpenVPN Data Channel Offload", "description": "OpenVPN Data Channel Offload", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::97c2:3814:ab86:3877", "169.254.78.38" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{6A59057D-7DAB-4379-939D-BC44012505A1}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::afcb:a415:8ebe:31ef", "169.254.193.251" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{9D7609FB-FA22-4D95-BAB1-C921164694BC}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::32be:6e1f:8396:1a16", "169.254.237.215" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "VMware Network Adapter VMnet1", "id": "{78601C84-7901-4971-AF40-5754EA90F017}", "name": "VMware Network Adapter VMnet1", "description": "VMware Virtual Ethernet Adapter for VMnet1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "725", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::4610:bdb1:63ed:9877", "192.168.163.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "VMware Network Adapter VMnet8", "id": "{9E0C7BBC-9FC9-4FA9-B553-B69621BC0E1D}", "name": "VMware Network Adapter VMnet8", "description": "VMware Virtual Ethernet Adapter for VMnet8", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "718", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f936:f206:725f:a4bf", "192.168.174.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{AEC2C2DE-9E4B-4C66-9EFE-2AE8EA12E8EE}", "name": "Wi-Fi", "description": "Broadcom 802.11n Network Adapter", "type": "Wireless80211", "status": "Up", "bytes_received": "487400834", "bytes_sent": "47898740", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8a84:90e6:5b82:7c0c", "192.168.100.4" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{2B25F655-551E-4C92-B54F-5B085BC5B334}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::359f:7bf3:9ea6:915b", "169.254.252.64" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{FC7899EE-54E5-11EE-BC7F-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Anonymous Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Qualcomm Atheros AR8172/8176/8178 PCI-E Fast Ethernet Controller (NDIS 6.30) Physical Address. . . . . . . . . : 20-1A-06-9A-9C-15 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-72-5D-4E-C0 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter OpenVPN Data Channel Offload: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : OpenVPN Data Channel Offload Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 36-23-87-FB-5B-07 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 36-23-87-FB-53-07 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter VMware Network Adapter VMnet1: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1 Physical Address. . . . . . . . . : 00-50-56-C0-00-01 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::4610:bdb1:63ed:9877%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.163.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 100683862 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2C-97-E4-86-20-1A-06-9A-9C-15 DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter VMware Network Adapter VMnet8: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8 Physical Address. . . . . . . . . : 00-50-56-C0-00-08 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f936:f206:725f:a4bf%14(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.174.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 117461078 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2C-97-E4-86-20-1A-06-9A-9C-15 DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Broadcom 802.11n Network Adapter Physical Address. . . . . . . . . : 34-23-87-FB-5B-07 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::8a84:90e6:5b82:7c0c%16(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.100.4(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Saturday, December 9, 2023 12:15:32 AM Lease Expires . . . . . . . . . . : Sunday, December 10, 2023 12:15:31 AM Default Gateway . . . . . . . . . : 192.168.100.1 DHCP Server . . . . . . . . . . . : 192.168.100.1 DHCPv6 IAID . . . . . . . . . . . : 120857479 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2C-97-E4-86-20-1A-06-9A-9C-15 DNS Servers . . . . . . . . . . . : fe80::1%16 192.168.100.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 34-23-87-FB-5B-08 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes