Tags: memorydump volatility forensic 

Rating: 3.0

./vol2f/mnt/hgfs/CTF/CTFevents/2024/knightctf/forensic/KnightSquad.DMPprofile=Win7SP1x6423418filescan|grep.batVolatilityFoundationVolatilityFramework2.60x00000000b947d870160Rr\Device\HarddiskVolume2\Windows\System32\drivers\compbatt.sys0x00000000b947e780160Rr\Device\HarddiskVolume2\Windows\System32\drivers\battc.sys0x00000000b983d82020W\Device\HarddiskVolume2Recycle.Bin\S-1-5-21-3042789274-2628191860-436916936-1001$INPNSNE.bat 0x00000000b9932590 2 0 RW-rw- \Device\HarddiskVolume2\Users\siam\Documents\windows.bat 0x00000000ba11bd10 11 0 R--r-d \Device\HarddiskVolume2\Windows\System32\batmeter.dll 0x00000000ba3a7420 16 0 R--r-- \Device\HarddiskVolume2\Windows\Fonts\batang.ttc

opened windows.bat by 'cat' to verify that this file contains previous flag.

Flag format was: KCTF{D:\Program Files\Windows\here}

So the flag is: KCTF{C:\Users\siam\Documents}

Original writeup (https://youtu.be/dCwRMGqFewk?si=qnVDp_tHSyaneJvW).