user4
1st place
320 points
Awards
Hint 14
hints
Hint for Decrypt data
-10
Hint 20
hints
Hint for Attacker's tool
-10
Solves
| Challenge | Category | Value | Time |
| Start | 100 | ||
| Guided analysis | 100 | ||
| Suspicious connection | 10 | ||
| Identify the process | 10 | ||
| Identify the executable | 10 | ||
| Examine the executable | 15 | ||
| Quick memory check | 10 | ||
| Recover encryption key | 5 | ||
| Open file | 5 | ||
| Decrypt data | 20 | ||
| Malware persistence | 15 | ||
| Timestamp check | 10 | ||
| Primary malware location | 5 | ||
| Attacker's tool | 15 | ||
| Delivery method | 10 | ||
| The end | 0 |