Tags: strings binwalk 

Rating:

## Contact Card

Extract all the files
Run `binwalk` on all the files, one of them is a Win PE Executable
Open `www.random4.cpl` in Ghildra, or simply use strings
We get

> Thanks for the entrance! We pasted this for you: xSAvEyND. Accept?

pasted this for you is human speak for go to pastebin.com/raw/xSAvEyND

(Why is this 400 points, solved this in a min but I cannot solve the rest the day before LOL)

Flag: `syskronCTF{n3v3r_c11ck_unkn0wn_11nk5}`

Original writeup (https://github.com/QzSG/CTF-Write-Ups/blob/master/Syskron%20Security%20CTF/2020/Thursday.md#contact-card).