**Time:** The stormy night Xia Xiaoman infiltrated Li Corporation's network
**Data Anomalies Detected:**
- 23:17:00 System auto-backup delayed by 11 seconds
- 23:17:11 Unknown command implanted in core database
- 23:17:23 Warehouse No.7 surveillance logs copied 37 times
An encrypted entry appeared in Prometheus 2.0's logs:
**「Subject 7 (Xia Xiaoman) memory restoration probability: 0.03%→6.71%」**
When Xia Xiaoman's fingers brushed the database periphery, the firewall should have triggered immediately. Yet some program quietly altered the parameters:
```python
# Original code
if unauthorized_access:
trigger(alarm)
# Modified version
if fingerprint == "Xia_Xiaoman":
create(backdoor)
```
Rainwater cascaded down server casings, condensation dripping onto circuit boards like silent tears.