Awards
Solves
| Challenge | Category | Value | Time |
| Decrypt the flag.txt.nviso on the user's desktop | Forensics | 100 | |
| What is the filename of the ransomware launched by the attackers | Forensics | 50 | |
| What exploit was abused to gain a local administrator beacon | Forensics | 50 | |
| What is the path of the original implant | Forensics | 20 | |
| HTB - Self | Hack The Box | 20 | |
| What is the MITRE ATT&CK ID of the technique | Forensics | 10 |