Finding c2f.exe

Following on from The Cassette Tape clues and a set of Coordinates being found a Discord member set out to the location at Whicker Road in Adelaide. More stickers were found stuck to posts at the location. QR codes were found on the stickers

Another of the codes lead to https://ibb.co/dGDwU9  an Image title '2' and showing a string of drip speak code. Translating that gave an email address pcwas@gmail.com.

At the Whicker Road site, behind a chain link fence. Items were found discarded. A soft toy tiger, a child's backpack and a toy car. If you remember back to Zachary's drawings during the snapchat tasks, these are some of the items that he drew. This was when it became clear to the Discord members that these items were very important and had been left there intentionally.

Inside the backpack, was a bloody striped T-shirt with the initials K_F on the tag. (This could be the reference during a conversation with happy_drip on Snapchat where he referred to 'clothes tag'.) The Bad Boi Hard drive, and a torn up letter addressed to Jordan from Ash. More images from the find are located here https://imgur.com/a/UA6wxyZ

The tiger toy was torn open and a QR code was found stuffed inside, leading to the "Zachary's Zoo" tumblr.

On the torn up letter from Ash to Jordan codes were written in red. Solving those led to https://ibb.co/m0d22U and https://ibb.co/dGDwU9 More drip speak code. Decoding those led to a google drive with five drive folders. It was called "BADBOI7z" indicating the information on the drive was what was located on the hard drive given to Ash in the C2f.exe video.

+ Drives 1-3 led to the the rsu2o mp4.

+ Drive 5 had a text file called hello_drips.txt The text read pD?8E9:6=9>:D6AEDE:. Run through a ROT47 decoder the result was: Asngthielhmiseptsti] which is a scrambled version of the phrase itsthesimplethings

+ Drive 4 had a .bat file and an .exe file. Using a password the Discord members gained access to the dripspeak.exe (which was later given in an instagram post for the public to download).

The google drive code led to https://ibb.co/g6rve9 titled "guess_who".

A Discord member was able to decompile the source code found in the .exe file and found it led to 100 reedemable bandcamp codes to download a hidden bandcamp file called "oh look you found it"

Another Discord member was able to find a .zip file in the the "guess who" image and it contained this image. Using an LSB tool it was found to contain coded dripspeak

(=0"+".I>zLbQr.%p6zMfT 1bKPAaMKDWH(Kapv

This was translated into a hidden soundcloud link. titled "routine"

Other codes found on the note from Ash to Jordan https://imgur.com/a/C86ngPG

Inside the toy car a piece of paper was found with a decoded clue of "qmykg" which leads to a streamable: https://streamable.com/qmykg

unfortunately that video has now been removed. It was called 'you should know' and a transcript of that video is as follows:

"chosen drips it is time to bring danny back, we have something in the works, choose a drip to slave under you. you will watch them closely you will both secretly need to find out the following, danny's favourite film, the names of his past and present pets, any names of family members. make us proud." Obviously this related to the email address that was decoded earlier. IKWSI wanted Discord members to gain the trust of Danny from Racka Racka, and find out certain key pieces of information from him that would help to break into his email account.