How it was:
1. We received a video:
https://t.me/notghosts/14In the video, a ghost is typing code. From the code, we found a TikTok username:
@0ng3dc5https://www.tiktok.com/@0ng3dc52. This TikTok profile contained a video with a description that included two links:
https://t.me/rewardpx/323. The link without a password allowed us to download the same video ("
s.mov") from TikTok in high quality.
4. In the video "
s.mov," we found the name and author of a book:
https://t.me/rewardpx/355. Additionally, on the video, codes were visible on a TV screen:
https://t.me/rewardpx/37These codes were coordinates (page.line.word).
6. From the collected phrase, we derived the password for the protected link:
https://t.me/rewardpx/40Using this link, we downloaded the file fish.rar.
7. Inside the archive, there was another archive key.rar, containing a file called "file." Inside "file," there was a Base64-encoded link to a Telegram channel:
https://t.me/rewardpx/42Today, a password-protected archive "10k.rar" was published here. It contained a secret word:
https://t.me/rewardpx/878. The archive also contained an encoded file "2049.mov.enc," which could be decrypted using the script "
Decryption.py." This resulted in a video:
https://t.me/rewardpx/459. In the video, we found part of the password for today's archive "10k.rar":
https://t.me/rewardpx/49This archive also included a hint for another archive "go.rar."
10. Today, a new video was released:
https://t.me/notghosts/18It included the phrase "IBM5100," while the archive "10k.rar" contained a clue for the password to "go.rar."
Result: We obtained the password:
https://t.me/rewardpx/89