# Student Country Points
1 DSheeran us 3,153
2 BGutierrez es 3,153
3 YDajdaj sa 2,683
4 APosadas mx 2,428
5 TTuma at 469
6 ESmajlovic us 431
7 HHeadapohl us 50
8 CParra mx 0
9 MMachac ch 0
10 LLeon hr 0
Module 0: Windows Binaries Points Solved by First solvers
Class 1 (Brief): Compiling & Building Executables 10 129% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 2 (Brief): Windows Executables Format 10 129% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 3 (Brief): Windows Loader 10 129% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 4 (Brief): .NET Assemblies 10 114% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 5 (Lab): Windows Binaries Example 10 100% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Module 1: Dynamic Analysis Points Solved by First solvers
Class 1 (Brief): Malicious Software 101 20 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 2 (Brief): Analysis Lab & Tools 20 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 3 (Lab): Sandbox Analysis 20 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 4 (Lab): Analysis Inside a Virtual Machine 20 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5 (Brief): Process and Network Monitoring 30 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Module 2: Tools Arsenal Points Solved by First solvers
Class 1 (Brief): PE Editors & Process Explorer 30 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 2 (Brief): WinDbg, IDA Pro & Qilinq 30 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3 (Chall): PE Editors Exercise 30 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 4 (Lab): Debuggers & Disassemblers 40 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 4.1 (Chall): Debuggers & Disassemblers 41 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 5 (Lab): Wireshark 101 46 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5.1 (Lab): Fakenet 101 46 86% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5.2 (Lab): Inetsim 101 46 71% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Module 3: Packers & Obfuscators Points Solved by First solvers
Class 1 (Brief): Carnita Methodology 50 71% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 2 (Brief):Unpacking & Deobfuscation Strategy 50 71% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3 (Lab): Unpacking UPX 55 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3.1 (Lab): Unpacking UPX 55 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4 (Lab): Unpacking ASPack 56 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.1 (Lab): Unpacking ASPack 56 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.2 (Lab): Unpacking ASPack 57 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5 (Chall): Unpacking UPX your way 65 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 6 (Chall): Unpacking for Flag 75 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Module 4: Reverse Engineering Points Solved by First solvers
Class 1 (Brief): Disassembler Process 60 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 2 (Brief): Assembly Operands 60 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3 (Brief): Calling Conventions 60 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3.1 (Chall): Calling Conventions 61 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3.2 (Chall): Calling Conventions 61 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4 (Lab): Windows 32-bit Calling Convention 65 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.1 (Lab): Windows 32-bit Calling Convention 65 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.2 (Chall): Windows 32-bit Calling Convention 66 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5 (Lab): Find the Password 67 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5.1 (Lab): Find the Password 68 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 6 (Chall): G0T Password? 75 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Module 5: Aniti-Malware Tricks Points Solved by First solvers
Class 1 (Brief): Anti-Debugging 68 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 2 (Brief): Anti-VM and Packers 69 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 3 (Brief): Process Injection 70 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4 (Lab): Anti-Debugging Ticks 71 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.1 (Chall): Patch the Binary 75 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 4.2 (Chall): Find the Offset 76 57% First to solve this challenge!APosadas
Second to solve this challenge!BGutierrez
Third to solve this challenge!DSheeran
Class 5 (Lab): Anti-Malware Ticks 78 57% First to solve this challenge!BGutierrez
Second to solve this challenge!APosadas
Third to solve this challenge!DSheeran
Module 6: Process Injection Points Solved by First solvers
Class 1 (Lab): CreateRemoteThread Technique 75 71% First to solve this challenge!BGutierrez
Second to solve this challenge!APosadas
Third to solve this challenge!DSheeran
Class 2 (Lab): SetThreadContext Technique 75 71% First to solve this challenge!BGutierrez
Second to solve this challenge!APosadas
Third to solve this challenge!DSheeran
Class 2.1 (Lab): SetThreadContext Technique 75 86% First to solve this challenge!BGutierrez
Second to solve this challenge!APosadas
Third to solve this challenge!DSheeran
Class 3 (Chall): Find the Window 80 57% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 4 (Chall): Find the Shellcode 95 57% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Third to solve this challenge!YDajdaj
Class 5 (Chall): Intercept the Shellcode 100 43% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Module 7: .NET Reversing Points Solved by First solvers
Class 1 (Lab): Reflection 101 80 43% First to solve this challenge!YDajdaj
Second to solve this challenge!DSheeran
Third to solve this challenge!BGutierrez
Class 1.1 (Chall) FindMethod by ID 85 29% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Class 1.2 (Chall) FindMethod by Name 90 29% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Class 2 (Lab): Deobfuscating Stage1 from Resources 95 29% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Class 3 (Lab): Patching Binary for Dumping 100 29% First to solve this challenge!DSheeran
Second to solve this challenge!BGutierrez
Class 4 (Lab): Limitations of DnSpy 105 0% Unsolved
Class 4.1 (Lab): Introducing WinDbg SOS Plugin 110 0% Unsolved
Class 4.2 (Lab): Finding Second stage Entry Point 115 0% Unsolved
Class 4.3 (Lab): Finding & Automating the Decryption of Third Stage 120 0% Unsolved
Module 8: Dissecting Infostealers like a BOSS Points Solved by First solvers
Class 1 (Lab): Scripts 101 90 0% Unsolved
Class 2 (Lab): Dissecting BAT Downloader 90 0% Unsolved
Class 3 (Lab): Dissecting Powershell Dropper with NeZa 90 0% Unsolved
Class 3.1 (Lab): Dissecting Powershell Dropper 90 0% Unsolved
Class 4 (Lab): Dissecting JavaScript Chrome Extension 91 0% Unsolved
Class 4.1 (Lab): Dissecting JavaScript Chrome Extension 91 0% Unsolved
Class 4.2 (Lab): Dissecting JavaScript Chrome Extension 91 0% Unsolved
Class 5 (Chall): Dissecting Infostealer 120 0% Unsolved
Class 5.1 (Chall): Dissecting the Plugin 150 0% Unsolved
Module 9: Fighting Ransomware Points Solved by First solvers
Class 1 (Lab): Intercepting RSA key with NeZa 100 0% Unsolved
Class 2 (Lab): Intercepting AES key with NeZa 100 0% Unsolved
Class 3 (Lab): Unhooking a locked machine with NeZa 110 0% Unsolved
Class 4 (Lab): Reversing Ryuk Ransomware with IDA 120 0% Unsolved
Class 4.1 (Lab): Recovering Ryuk Files with NeZa 120 0% Unsolved
Class 5 (Chall): Restoring Locked Keyboard 130 0% Unsolved
Class 6 (Chall): Recovering Encrypted Machine 200 0% Unsolved