Awards
Solves
| Challenge | Category | Value | Time |
| What algorithm is used to encrypt the files | Forensics | 20 | |
| What is the URL used to download the encryption configuration | Forensics | 30 | |
| What is the encryption key | Forensics | 20 | |
| Is it called login or log in | Mobile | 30 | |
| What is the email used by the adversaries | Forensics | 10 | |
| What is the email address of the victim | Forensics | 10 |