Ghost Process_B
Memory Forensic
100 pts
standard
Challenge Description
Endpoint protection flagged suspicious activity on a corporate machine, but no malware file was found on disk.
A full memory dump was captured before the machine was powered off. Your job is to analyze the dump, uncover the hidden threat running entirely in memory, and trace the attacker's infrastructure.
Category : Memory Forensics
Difficulty : Advanced
Q1. What is the suspicious parent-child process relationship?
Flag format : HackCTF{PARENT.EXE_CHILD.EXE}
Correct answer unlocks Q2 — Injected Process Detection.
Submit Flag
Login to submit a flag.