Awards
Solves
| Challenge | Category | Value | Time |
| What is the filename of the ransomware launched by the attackers | Forensics | 50 | |
| What is the path of the original implant | Forensics | 20 | |
| What algorithm is used to encrypt the files | Forensics | 20 |
| Challenge | Category | Value | Time |
| What is the filename of the ransomware launched by the attackers | Forensics | 50 | |
| What is the path of the original implant | Forensics | 20 | |
| What algorithm is used to encrypt the files | Forensics | 20 |