AIFT Forensic Report | Flip Forensics
| Filename | 20240212-decrypted-Windows_Server_2022.E01 |
|---|---|
| SHA-256 | 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7 |
| MD5 | 6f912bbaa1500f4556bd6b4fa8466f02 |
| File Size | 1.46 GB (1572845047 bytes) |
| Hostname | WIN-NI9FBK23SLO |
| OS | Windows Server 2022 Standard (NT 10.0) 20348.1850 |
| Domain | branchoffice.example.com |
| IPs | 10.44.0.12 |
On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.
Look for any suspicious behaviour aside from these two IOC's.
Evidence across multiple artifacts indicates this server was used for hands-on administrative activity involving PsExec, remote admin shares (C$/ADMIN$), network scanning tooling (Nmap/Npcap/Zenmap), and an external FTP site shortly before the ransomware discovery date. Most concerning, a scheduled task \Enterpries backup is configured to run PsExec with embedded credentials (-u admin -p letmein) to execute C:\Users\admin\Desktop\rename.exe on multiple remote hosts, which is strongly consistent with automated lateral movement and payload deployment. A ransom-note-like file RyukReadMe.txt was opened from the admin desktop, suggesting ransomware activity in the environment (even though redpetya.exe is not observed in the provided artifacts). Overall assessment: system likely compromised (HIGH confidence) with CRITICAL severity, but direct evidence from the Feb 10–12 window is missing in most artifacts, so exact ransomware execution timing on this host is not provable from the provided data alone.
---
file:///C:/share/Clark.Nicholson/Documents/account_password.xlsx as user admin (row_ref 46). Confidence: HIGHC:\Users\admin\Downloads\SysinternalsSuite.zip from https://download.sysinternals.com/files/SysinternalsSuite.zip, state complete, user admin (row_ref 1). Confidence: HIGHfile:///C:/Users/admin/Downloads/SysinternalsSuite.zip user admin (row_ref 43). Confidence: HIGHC:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, executions=1, user admin (row_ref 12). Confidence: HIGHC:\Users\admin\Downloads\SysinternalsSuite\ including PsExec.exe at 23:14:39.491949 (row_ref 120) and PsExec64.exe at 23:14:39.522984 (row_ref 122). Confidence: MEDIUM (Shimcache = presence/compat cache, not proof of execution)C:\Users\admin\Downloads\SysinternalsSuite.zip (50.6 MB), user admin (row_ref 2). Confidence: MEDIUM\Device\HarddiskVolume2\Windows\System32\msdt.exe executed (row_ref 14). Confidence: MEDIUM (no command line)C:\Users\admin\Downloads\nmap-7.93-setup.exe from Softonic CDN, state complete, user admin (row_ref 2). Confidence: HIGH\Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe (row_ref 16). Confidence: HIGH\Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe (row_ref 15). Confidence: HIGH\10.44.24.9\admin$\PSEXESVC.exe observed (row_ref 8), consistent with PsExec service deployment over ADMIN$ involving 10.44.24.9. Confidence: HIGHfile:///C:/Users/admin/Desktop/RyukReadMe.txt, user admin (row_ref 48). Confidence: HIGH{7C5A40EF...}\Nmap\zenmap.exe) executions=2 and C:\Users\admin\Desktop\Nmap - Zenmap GUI.lnk executions=1, user admin (row_ref 19, 44). Confidence: HIGH\Enterpries backup, run as admin, run_level=HighestAvailable (row_ref 4). Confidence: HIGHcommand=C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe with arguments -accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe (row_ref 5). Confidence: HIGHC:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe and PsExec64.exe, executions=1 each, user admin (row_ref 27, 14). Confidence: HIGH\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe (row_ref 13). Confidence: HIGHC:\Users\admin\Desktop\share.zip (0.65 GB), user admin (row_ref 1). Confidence: MEDIUMMy Computer\Desktop\important.zip, user admin (row_ref 63). Confidence: MEDIUMftp://185.239.106.67/ and ftp://185.239.106.67/branchoffice.example.com/, user admin (row_ref 51, 50). Confidence: HIGH\\10.44.24.6\c$\Users (row_ref 22), \\10.44.24.1\c$\Users (row_ref 17), \\10.44.24.7\c$\Users (row_ref 27), \\10.44.24.9\c$\Users (row_ref 32), \\10.44.24.8\c$\Users (row_ref 4) as user admin. Confidence: MEDIUM (shellbags = browse evidence, not authentication proof)\Device\HarddiskVolume2\Windows\System32\mstsc.exe (row_ref 28). Confidence: HIGH\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row_ref 23). Confidence: HIGH\Device\HarddiskVolume2\Users\admin\Desktop\rename.exe under user SID S-1-5-21-1057484085-1795310446-2370380301-2611 (row_ref 73965). Confidence: HIGH(No provided artifacts contain events on 2024-02-10 through 2024-02-12; several explicitly end earlier.)
---
name/command contains redpetya.exe (rows 1–2, timestamp 2023-09-24T14:57:27.211781+00:00).command/arguments contain redpetya.exe (dataset includes task dated 2024-02-06T21:49:21.961830+00:00, row_refs 4–5).imagepath/servicedll reference redpetya.exe (coverage ends 2024-02-07T20:59:49.395916Z, e.g., row_ref 463).redpetya.exe as specified in each per-artifact IOC section.command=C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe with remote targets and embedded creds (task date 2024-02-06T21:49:21.961830+00:00, row_refs 4–5).C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe last run 2024-02-06T22:14:10.115000+00:00 (row_ref 27); PsExec64.exe 2024-02-06T22:14:12.356998+00:00 (row_ref 14).PsExec64.exe 2024-02-06T22:14:12.975912+00:00 (row_ref 13); PsExec.exe 2024-02-09T22:55:44.556122+00:00 (row_ref 23).psexec.exe 2024-02-06T22:14:12.373672+00:00 (row_ref 71); psexec64.exe 2024-02-06T22:14:14.995445+00:00 (row_ref 73).C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe 2024-02-05T23:14:39.491949+00:00 (row_ref 120) and \10.44.24.9\admin$\PSEXESVC.exe 2024-02-05T23:25:15.663250+00:00 (row_ref 8).---
admin:PsExec.exe and PsExec64.exe at 2024-02-06T22:14:10.115000+00:00 and 2024-02-06T22:14:12.356998+00:00 (row_refs 27, 14).PsExec64.exe at 2024-02-06T22:14:12.975912+00:00 (row_ref 13) and later PsExec.exe at 2024-02-09T22:55:44.556122+00:00 (row_ref 23).nmap-7.93-setup.exe from Softonic at 2024-02-05T23:41:28.640888+00:00 → 23:41:37.446659+00:00 (row_ref 2).nmap-7.93-setup.exe (2024-02-05T23:43:02.682171+00:00, row_ref 15) and NPFInstall.exe (2024-02-05T23:42:44.420574+00:00, row_ref 16).\Enterpries backup (date 2024-02-06T21:49:21.961830+00:00, row_ref 4) runs as admin with run_level=HighestAvailable.PsExec.exe with arguments to run against \\Desktop-001 through \\Desktop-006 and execute C:\Users\admin\Desktop\rename.exe with embedded password letmein (row_ref 5).\10.44.24.9\admin$\PSEXESVC.exe at 2024-02-05T23:25:15.663250+00:00 (row_ref 8), consistent with PsExec service staging over ADMIN$.\\10.44.24.1\c$\Users, \\10.44.24.6\c$\Users, \\10.44.24.7\c$\Users, \\10.44.24.8\c$\Users, \\10.44.24.9\c$\Users on 2024-02-08 08:16:56–08:39:20 (row_refs 17, 22, 27, 4, 32), consistent with admin-share reconnaissance/interaction.account_password.xlsx from C:/share/... at 2024-02-05T23:09:16.723713+00:00 (row_ref 46). This suggests exposure to credential material but does not prove theft.185.239.106.67 and path /branchoffice.example.com/ at 2024-02-07T16:57:05.940533+00:00 and 2024-02-07T16:57:31.964310+00:00 (row_refs 51, 50). This is consistent with external file transfer; actual transfer volume/files are not provable from browser history alone.C:\Users\admin\Desktop\RyukReadMe.txt at 2024-02-06T20:53:29.889280+00:00 (row_ref 48), which is highly suggestive of ransomware presence (Ryuk-named note), but does not confirm encryption on this host.redpetya.exe is not observed in any provided artifact datasets.---
7045) and start/stop (7036),4624), explicit credential use, SMB share access (5140/5145),4688) for rename.exe, rundll32.exe, msdt.exe, Nmap scans, etc.---
Based on confirmed PsExec tasking and multi-host targeting (\\Desktop-001 … \\Desktop-006) in tasks row_ref 5 (timestamp 2024-02-06T21:49:21.961830+00:00). Goal: stop further lateral execution.
Acquire C:\Windows\System32\Tasks\Enterpries backup (task XML) and TaskCache registry entries; then disable/delete. Evidence basis: tasks row_refs 4–5 show PsExec with embedded credentials and payload rename.exe.
admin account credentials everywhere it applies**The task arguments explicitly contain -u admin -p letmein (tasks row_ref 5). Treat these credentials as compromised; reset domain/local passwords and invalidate any reused secrets.
C:\Users\admin\Desktop\rename.exe (referenced by tasks rowref 5; executed per sru.application at 2024-02-09T22:56:00+00:00, rowref 73965; also present in amcache row_ref 80).C:\Users\admin\Desktop\dir.exe (present in amcache row_ref 13) due to masquerade risk.10.44.24.1/.6/.7/.8/.9, and Desktop-001…Desktop-006):7045) to validate PsExec PSEXESVC creation around shimcache 2024-02-05T23:25:15.663250+00:00 (row_ref 8).4624 (type 3/10), 5140/5145 (share access), and 4688 (process creation w/ command line) around 2024-02-05 to 2024-02-09 and especially Feb 10–12 (currently missing in artifacts).\Enterpries backup (task exists per tasks row_ref 4).RyukReadMe.txt and preserve it (opened per browser.history 2024-02-06T20:53:29.889280+00:00, row_ref 48).If you provide EVTX (Security/System/TaskScheduler) and a file listing/timeline around Feb 12, I can tighten the narrative from “likely compromise” to confirmed execution, identify the source of lateral movement, and determine whether exfiltration occurred.
Nothing suspicious is present in these Run/RunOnce entries; both autoruns point to expected Windows/VirtualBox components and do not reference the suspected IOCs.
name or command values contain redpetya.exe in rows 1–2 (timestamp 2023-09-24T14:57:27.211781+00:00).name or command values contain psexec/psexesvc in rows 1–2 (timestamp 2023-09-24T14:57:27.211781+00:00).HKLM\...\Run, HKCU\...\Run, RunOnce, etc.) these values came from, limiting interpretation and follow-up validation.username is empty for both rows (rows 1–2), so it’s not possible to scope to a specific account/profile from this output.PSEXESVC.Winlogon\Userinit/Shell, IFEO, AppInit_DLLs.Evidence reviewed (benign autoruns):
SecurityHealth → %windir%\system32\SecurityHealthSystray.exe at 2023-09-24T14:57:27.211781+00:00.VBoxTray → %SystemRoot%\system32\VBoxTray.exe at 2023-09-24T14:57:27.211781+00:00.Findings
2024-02-06T21:49:21.961830+00:00, task \Enterpries backup run as user admin with run_level=HighestAvailable (row_ref 4). Action shows command=C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe and arguments=-accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe (row_ref 5).-u admin -p letmein, and executing rename.exe from a user desktop is atypical for legitimate enterprise backups.2024-02-06T21:49:21Z (e.g., TaskScheduler events 106/140/200 and logon events), and collect/inspect C:\Users\admin\Desktop\rename.exe (hash, signature, compile time, strings).admin).\Enterpries backup shows user_id=admin and run_level=HighestAvailable (row_ref 4), executing PsExec (row_ref 5).admin is expected, when it last logged on, and whether this task exists in the live C:\Windows\System32\Tasks\Enterpries backup XML with the same action/user settings.IOC Status
psexec → Observedcommand=C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe in task \Enterpries backup (row_ref 5), with task timestamp 2024-02-06T21:49:21.961830+00:00 (row_ref 4).redpetya.exe → Not Observedcommand or arguments contain redpetya.exe in the provided Scheduled Tasks data.Data Gaps
date field (many tasks have blank date), or execution history; therefore we cannot determine how often/when \Enterpries backup actually ran, only that the definition exists and has a recorded timestamp (rows 4–5).Microsoft-Windows-TaskScheduler/Operational.evtx (task registered/updated/launched events),PsExec.exe, rename.exe, and any ransomware-related binaries,C:\Users\admin\Desktop\rename.exe and any artifacts on \\Desktop-00x targets.Nothing suspicious was identified in this Services artifact beyond standard Windows/Defender/Edge/virtualization components; no obvious malicious/persistence-style services (odd names, non-system image paths, or suspicious service DLLs) are present.
imagepath or servicedll entries reference redpetya.exe anywhere in the provided records/time range.PSEXESVC, psexec.exe) in the provided records/time range.TrustedInstaller, row_ref 463), but the incident was discovered 2024-02-12; any services created/modified between Feb 7–Feb 12 are not captured here.ServiceType, StartName, or registry ACLs—fields that often help spot malicious persistence.PSEXESVC)PSEXEC*.pf), Amcache/Shimcache, SRUM, EDR telemetryC:\Windows\PSEXESVC.exe (varies)None of that is available in this artifact.
Recommended next artifacts to review (to confirm scope/entry/lateral movement):
System/Security/Event logs (esp. 7045/4624/4672), Prefetch, Amcache + Shimcache, Scheduled Tasks, Run keys, WMI persistence, $MFT timeline/file system triage for redpetya.exe/related drops, and remote execution traces (SMB/Admin$).
Nothing suspicious can be identified from this WMI Persistence artifact because it contains zero records (no event filters/consumers/bindings to evaluate).
Records: 0, Time range: N/A to N/A, and “No columns available” in the provided CSV, so WMI event filters/consumers/bindings (typical WMI persistence components) cannot be assessed at all from this source.Findings
10.44.24.9.2024-02-05T23:25:15.663250+00:00, path \10.44.24.9\admin$\PSEXESVC.exe, row_ref 8.PSEXESVC.exe is the PsExec service binary typically copied to admin$ during remote execution, indicating likely remote command execution/lateral movement activity involving 10.44.24.9.10.44.24.9, review Service Control Manager events and service artifacts for PSEXESVC (e.g., Windows System log Event IDs 7045/7036) and correlate with Security log logons (4624 type 3) around 2024-02-05T23:25Z.C:\Users\admin\Downloads\SysinternalsSuite\ shortly before the PSEXESVC.exe admin$ observation.2024-02-05T23:14:39.491949+00:00, C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, row_ref 120; 2024-02-05T23:14:40.054529+00:00, ...\Procmon.exe, row_ref 59; 2024-02-05T23:14:38.368250+00:00, ...\procdump.exe, row_ref 70; 2024-02-05T23:14:36.867004+00:00, ...\logonsessions.exe, row_ref 20; plus multiple other Sysinternals binaries at 2024-02-05T23:14:34Z–23:14:40Z (rows 19–81, 119–143).\admin$\PSEXESVC.exe.C:\Users\admin\Downloads\SysinternalsSuite\ file hashes and timestamps, Prefetch (if enabled) for execution evidence, and Sysmon/EDR telemetry for command lines (especially ProcDump targeting lsass.exe).2022-09-01T22:36:02+00:00, C:\Program Files (x86)\Nmap\nmap.exe, row_ref 98; 2022-09-01T22:36:06+00:00, ...\zenmap.exe, row_ref 100; 2024-02-05T23:41:37.445576+00:00, C:\Users\admin\Downloads\nmap-7.93-setup.exe, row_ref 115.nmap.exe/zenmap.exe around the incident window.certutil.exe is recorded, which is a common “living-off-the-land” tool for downloading/encoding/decoding payloads.2023-07-07T21:21:32.208891+00:00, C:\Windows\SYSTEM32\certutil.exe, row_ref 108 (and SysWOW64 variant row_ref 107).certutil is frequently abused to fetch or decode malware; however Shimcache does not provide command-line context or prove execution.2023-07-07T21:21Z, and check for downloaded artifacts in temp/user directories.IOC Status
psexec → Observed2024-02-05T23:14:39.491949+00:00 C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row_ref 120); 2024-02-05T23:25:15.663250+00:00 \10.44.24.9\admin$\PSEXESVC.exe (row_ref 8); 2024-02-05T23:14:39.522984+00:00 ...\PsExec64.exe (row_ref 122).redpetya.exe → Not Observedredpetya.exe in the path field.Data Gaps
2024-02-07T10:22:21.783407+00:00, while the ransomware was discovered on 12 Feb 2024; activity between 2024-02-07 and 2024-02-12 is not covered here, limiting direct linkage to the outbreak time.\10.44.24.9\admin$\... paths suggest remote activity, but this artifact alone cannot confirm directionality (whether this host accessed 10.44.24.9 or vice versa) or the originating account.10.44.24.9).Findings
2024-02-07T21:00:11.233940+00:00 c:\users\admin\downloads\nmap-7.93-setup.exe publisher=insecure.org product_name=nmap (row_ref 62)2024-02-06T21:01:08.501123+00:00 c:\program files (x86)\nmap\nmap.exe publisher=insecure.org product_name=nmap (row_ref 63)2024-02-06T20:14:15.370394+00:00 c:\program files (x86)\nmap\zenmap.exe version=7.93 product_name=zenmap (row_ref 129)2024-02-06T21:01:08.124117+00:00 c:\program files\npcap\npcap.sys publisher=insecure.com llc. product_name=npcap (row_ref 67)NMAP.EXE, ZENMAP.EXE), Security logs (4688), Sysmon (1/3), and firewall logs around 2024-02-06 to 2024-02-07 UTC.2024-02-07T21:00:10.951519+00:00 c:\users\administrator\downloads\sysinternalssuite\autologon64.exe publisher=sysinternals - www.sysinternals.com product_name=sysinternals autologon (row_ref 3)Winlogon values) and check for execution evidence (Prefetch for AUTOLOGON64.EXE, process creation logs).dir.exe, rename.exe) with missing publisher/product metadata.2024-02-07T21:00:10.342958+00:00 c:\users\admin\desktop\dir.exe publisher= product_name= (row_ref 13)2024-02-07T21:00:10.562542+00:00 c:\users\admin\desktop\rename.exe publisher= product_name= (row_ref 80)IOC Status
psexec → Observed2024-02-06T22:14:12.373672+00:00 c:\users\admin\downloads\sysinternalssuite\psexec.exe product_name=sysinternals psexec (row_ref 71)2024-02-06T22:14:14.995445+00:00 c:\users\admin\downloads\sysinternalssuite\psexec64.exe product_name=sysinternals psexec (row_ref 73)2024-02-07T21:00:11.248564+00:00 c:\users\administrator\downloads\sysinternalssuite\psexec64.exe product_name=sysinternals psexec (row_ref 72)redpetya.exe → Not Observedpath entries containing redpetya.exe in provided Amcache rows (212 records).Data Gaps
mtime_regf) but does not prove execution on its own; no command-line, parent process, user context, or remote origin data is present (limits confirming how/if tools were run).2024-02-09T21:00:06.885025+00:00, but the ransomware impact was discovered 2024-02-12; activity on/after Feb 10–12 is not covered by this artifact extract/time range.PSEXESVC service creation events).Findings
\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe (row_ref 13)\Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row_ref 23)2024-02-06T22:14Z and 2024-02-09T22:55Z, and check for the presence of PSEXESVC artifacts on disk/registry.\Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe (row_ref 15)\Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe (row_ref 16)\Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe (row_ref 17)Nmap output files, Zenmap profiles) and correlate with firewall/proxy/network telemetry around 2024-02-05T23:42Z and 2024-02-08T19:06Z.\Device\HarddiskVolume2\Windows\System32\mstsc.exe (row_ref 28)Default.rdp, HKCU\Software\Microsoft\Terminal Server Client) for destination hosts and usernames around 2024-02-08T19:03Z.rundll32.exe executed (common LOLBin; could be benign or abuse depending on arguments—not available here).\Device\HarddiskVolume2\Windows\System32\rundll32.exe (row_ref 18)rundll32.exe is a common “living off the land” binary used to run malicious DLL exports or scriptlets; BAM does not capture command-line to confirm.rundll32.exe around 2024-02-09T20:59Z.msdt.exe executed (living-off-the-land potential; context unknown).\Device\HarddiskVolume2\Windows\System32\msdt.exe (row_ref 14)msdt.exe has been abused for code execution in past attack chains; BAM lacks command line/parent process to confirm intent.msdt.exe command-line/parent around 2024-02-05T23:21Z and inspect related diagnostic package invocations.IOC Status
psexec → ObservedPsExec64.exe (row_ref 13)PsExec.exe (row_ref 23)redpetya.exe → Not Observedpath entries in this BAM/DAM dataset match redpetya.exe (all 32 records listed; none contain that filename).Data Gaps
ts and path; it does not include user SID, hostname/remote target, parent process, command line, hashes, or execution outcome. This limits attribution (which account), intent (what arguments were used), and whether tools were used maliciously vs legitimately._dedup_comment), which may obscure frequency/repetition patterns of execution.Findings
admin.2024-02-06T22:14:10.115000+00:00, C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, executions=1, username=admin (row_ref 27); 2024-02-06T22:14:12.356998+00:00, C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe, executions=1, username=admin (row_ref 14).2024-02-06 22:14 UTC, and check for PSEXESVC.exe artifacts.psshutdown64.exe from a Temp extraction path (suggesting it was run directly from a ZIP/unpacked temp folder).2024-02-05T23:14:20.084999+00:00, C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, executions=1, username=admin (row_ref 12).2024-02-05 23:14 UTC (e.g., Event IDs 1074/6006/6008), and review prefetch/Amcache for the binary’s execution details.admin shortly before PsExec activity (potential internal reconnaissance).2024-02-06T21:09:13.195999+00:00, {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Nmap\zenmap.exe, executions=2, username=admin (row_ref 19); plus shortcut execution 2024-02-06T21:09:13.195999+00:00, C:\Users\admin\Desktop\Nmap - Zenmap GUI.lnk, executions=1 (row_ref 44) and 2024-02-05T23:43:16.150000+00:00, {A77F5D77-2E2B-44C3-A6A2-ABA601054A51}\Nmap\Nmap - Zenmap GUI.lnk, executions=1 (row_ref 41).2024-02-09T19:48:28.288000+00:00, dsa.msc executions=5, username=admin (row_ref 6) and corresponding shortcut Active Directory Users and Computers.lnk executions=5 (row_ref 37); 2024-02-09T22:52:31.673000+00:00, Task Scheduler.lnk executions=3, username=admin (row_ref 47); 2024-02-09T22:53:05.400000+00:00, cmd.exe executions=7, username=admin (row_ref 13).admin.C:\Windows\System32\Tasks\) and AD change/audit logs for modifications around 2024-02-09 19:48–22:53 UTC.IOC Status
redpetya.exe → Not Observed (no matching path/value present in provided UserAssist rows).psexec → ObservedPsExec.exe at 2024-02-06T22:14:10.115000+00:00 (row_ref 27); PsExec64.exe at 2024-02-06T22:14:12.356998+00:00 (row_ref 14).Data Gaps
1601-01-01T00:00:00+00:00 with executions 0 (multiple rows), indicating missing/invalid “last run” times for those items; this prevents building a complete timeline from this artifact alone.2024-02-09T22:53:05.400000+00:00, while the incident was discovered 2024-02-12; activity between Feb 9 and Feb 12 is not visible in this artifact.PSEXESVC).Findings
2024-02-05T23:14:49.615999+00:00, path C:\Users\admin\Downloads\SysinternalsSuite.zip, user admin, size 50.6 MB, row_ref 2.PsExec*.exe, Amcache/Shimcache, Sysmon EID 1 if present) and look for psexec service artifacts (PSEXESVC) in System logs.share.zip (0.65 GB) was deleted from the admin user’s Desktop, which may indicate data staging/exfiltration or cleanup.2024-02-06T22:14:44.067999+00:00, path C:\Users\admin\Desktop\share.zip, user admin, size 0.65 GB, row_ref 1.$Recycle.Bin metadata / USN Journal / MFT entries (if available) to determine original filename timestamps and whether it was moved/copied elsewhere before deletion.IOC Status
redpetya.exe → Not Observed (no matching filename/path in the provided Recycle Bin records)psexec → Not Observed (no explicit psexec file/service name present in these Recycle Bin records; only a deleted Sysinternals suite archive that could contain it)Data Gaps
admin between 2024-02-05T23:14:49.615999+00:00 and 2024-02-06T22:14:44.067999+00:00; it does not cover the incident discovery date (12 Feb 2024), so activity closer to the ransomware event is not assessable here.Findings
2024-02-07T16:57:05.940533+00:00 ftp://185.239.106.67/ visit_count=2 user=admin (row_ref 51); 2024-02-07T16:57:31.964310+00:00 ftp://185.239.106.67/branchoffice.example.com/ visit_count=9 user=admin (row_ref 50).2024-02-07T16:57Z, and inspect any local FTP client artifacts/credentials and files transferred (e.g., recent files, $MFT, Prefetch, WebCacheV01.dat, and any FTP client configuration files).RyukReadMe.txt on the admin desktop, strongly suggestive of Ryuk ransomware presence or a copied ransom note.2024-02-06T20:53:29.889280+00:00 file:///C:/Users/admin/Desktop/RyukReadMe.txt user=admin (row_ref 48).C:\Users\admin\Desktop\RyukReadMe.txt, look for ransomware execution artifacts (Prefetch for common droppers/encryptors, SRUM, Amcache/Shimcache, Scheduled Tasks, Services, and relevant event logs).2024-02-05T23:40:22.322380+00:00 Bing search download nmap (row_ref 12); navigation to Softonic Nmap pages including https://nmap.en.softonic.com/download at 2024-02-05T23:41:09.940691+00:00 (rowref 18) and related Softonic URLs (rowrefs 17, 19, 20), user=admin.nmap.exe presence and execution (Prefetch, Amcache, Shimcache), and review EDR/process telemetry for scans and command lines around 2024-02-05T23:40Z.2024-02-05T23:13:17.260740+00:00 Bing search download sysinternals suite (row_ref 8); 2024-02-05T23:13:27.154423+00:00 visit to Microsoft Learn Sysinternals Suite page (row_ref 11); 2024-02-05T23:13:45.314323+00:00 local file opened file:///C:/Users/admin/Downloads/SysinternalsSuite.zip (row_ref 43), user=admin. Similar prior activity exists for Administrator on 2023-11-04 and local open SysinternalsSuite.zip on 2023-11-04T15:26:31.564228+00:00 (row_ref 57).PsExec.exe (file system, Prefetch PSEXEC*.pf, Amcache, Shimcache) and review Windows Security logs for service creation/remote service installs typical of PsExec.account_password.xlsx opened from a share path.2024-02-05T23:09:16.723713+00:00 file:///C:/share/Clark.Nicholson/Documents/account_password.xlsx user=admin (row_ref 46).IOC Status
redpetya.exe → Not Observed (no URL/title/path contains redpetya.exe in the provided browser history rows).psexec → Not Observed (no explicit browser history entries referencing “psexec”; note Sysinternals download may include it but that is not proof of use from this artifact alone—see Findings/evidence above).Data Gaps
2024-02-07T16:57:31.964310+00:00, but the incident was discovered 2024-02-12; activity between Feb 7–Feb 12 is not present here, so compromise actions closer to discovery are not assessable from this artifact.from_url), limiting reconstruction of user navigation paths.Findings
2024-02-05T23:41:28.640888+00:00 → 2024-02-05T23:41:37.446659+00:00, C:\Users\admin\Downloads\nmap-7.93-setup.exe, URL https://gsf-fl.softonic.com/.../nmap-7.93-setup.exe?...&url=https://nmap.en.softonic.com&Filename=nmap-7.93-setup.exe, state complete, user admin (row_ref 2).nmap-7.93-setup.exe (Prefetch, Amcache, Shimcache, SRUM/AppCompat) and correlate with process/network activity around 2024-02-05 23:41 UTC.2024-02-05T23:13:32.211950+00:00 → 2024-02-05T23:13:41.429815+00:00, C:\Users\admin\Downloads\SysinternalsSuite.zip, URL https://download.sysinternals.com/files/SysinternalsSuite.zip, state complete, user admin (row_ref 1).2023-11-04T15:25:24.686308+00:00 → 2023-11-04T15:26:13.780079+00:00, C:\Users\Administrator\Downloads\SysinternalsSuite.zip, same URL, state complete, user Administrator (row_ref 3).2023-11-04T15:25:50.105404+00:00, C:\Users\Administrator\Downloads\SysinternalsSuite (1).zip, same URL, state cancelled (row_ref 4).procexp*.exe, psexec*.exe, autoruns*.exe, etc.) via Prefetch/Amcache/Shimcache, and check for corresponding Windows Event Logs (Process Creation 4688/Sysmon 1 if available).IOC Status
redpetya.exe → Not Observed (no download record for this filename/path/URL in the provided Browser Downloads rows).psexec → Not Assessable (this artifact only shows downloads; it does not show execution, and no explicit psexec filename appears in the download paths/URLs—SysinternalsSuite may contain PsExec, but inclusion/extraction/execution is not shown here).Data Gaps
2023-11-04T15:25:24.686308+00:00 to 2024-02-05T23:41:28.640888+00:00; it does not include the incident date (2024-02-12) and cannot confirm what happened on/after that date from downloads alone.Nothing suspicious can be identified from this artifact because there are zero Activities Cache (Windows Timeline) records in the provided data.
PSEXESVC), ADMIN$ file drops.redpetya.exe, psexec.exe, or renamed equivalents.redpetya.exe, hash, compile time (if available), C:\Windows\Temp, C:\Users\*\AppData\Local\Temp, C:\Windows\System32\ recent writes.Nothing suspicious can be identified from this SRUM Network Data artifact because it contains 0 records (no timestamps, no applications, no network usage entries).
Findings
\Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe user S-1-5-21-1057484085-1795310446-2370380301-2611 foregroundcycletime 37987545588 (row_ref 66925)\Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe user ...-2611 foregroundcycletime 227183733421 (row_ref 66926)\Device\HarddiskVolume2\Program Files (x86)\Nmap\nmap.exe user ...-2611 foregroundcycletime 221269249429 (row_ref 66927)nmap.exe, PowerShell history, SRUM Network Connectivity, firewall logs).\Device\HarddiskVolume2\Windows\System32\mstsc.exe user S-1-5-21-1057484085-1795310446-2370380301-2611 foregroundcycletime 2907504339 (row_ref 72016)\Device\HarddiskVolume2\Windows\System32\rdpclip.exe user ...-2611 foregroundcycletime 12051315832 (row_ref 66907)...-2611 account.\Device\HarddiskVolume2\Users\admin\Desktop\rename.exe user S-1-5-21-1057484085-1795310446-2370380301-2611 foregroundcycletime 13284139184 (row_ref 73965)C:\Users\admin\Desktop\rename.exe, inspect file metadata/signature, and correlate with file rename activity (USN Journal, $MFT, ransomware note extensions) around the same timeframe....-2611 user (could also align with attacker “living off the land”).\Device\HarddiskVolume2\Windows\System32\msconfig.exe user ...-2611 foregroundcycletime 907622122 (row_ref 68717)\Device\HarddiskVolume2\Windows\System32\cleanmgr.exe user ...-2611 foregroundcycletime 2519540870 (row_ref 68619)\Device\HarddiskVolume2\Windows\System32\sc.exe user S-1-5-18 foregroundcycletime 112479860 (row_ref 795)IOC Status
redpetya.exe → Not Observed (no app value matching redpetya.exe in provided SRUM rows)psexec → Not Observed (no psexec.exe, PsExec, or typical service name hints are present in app values in provided SRUM rows)Data Gaps
PSEXEC*, NMAP*, RENAME*), Amcache/Shimcache, USN Journal, SRUM Network Connectivity, RDP logs (TerminalServices-*), and file acquisition for rename.exe and any Nmap outputs/scripts.Findings
2024-02-05T23:13:42+00:00 path My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite.zip username admin (row_ref 60); 2024-02-05T23:14:42+00:00 path My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite username admin (row_ref 61). Also 2023-11-04T15:33:16+00:00 path My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite username Administrator (row_ref 203).psexec.exe/psexesvc.exe and related artifacts (Prefetch, Amcache/Shimcache, Service Control Manager/System event logs for service install/start, and ADMIN$ writes).2024-02-08T08:16:56+00:00 \\10.44.24.6\c$\Users user admin (row_ref 22); 2024-02-08T08:22:12+00:00 \\10.44.24.1\c$\Users user admin (row_ref 17); 2024-02-08T08:29:48+00:00 \\10.44.24.7\c$\Users user admin (row_ref 27); 2024-02-08T08:33:14+00:00 \\10.44.24.9\c$\Users user admin (row_ref 32); 2024-02-08T08:39:20+00:00 \\10.44.24.8\c$\Users user admin (row_ref 4). Presence of \\10.44.24.9\admin$ (row_ref 35; timestamp not populated in this record).C$/ADMIN$ across several systems is commonly associated with remote execution frameworks (including PsExec) and ransomware propagation.2024-02-08T08:16–08:39 UTC.2024-02-07T04:04:00+00:00 path My Computer\Desktop\important.zip username admin (row_ref 63).C:\Users\<profile>\Desktop\important.zip, review contents and origin (Zone.Identifier ADS, file creation/modify times, AV/EDR detections).IOC Status
redpetya.exe → Not Observed (no shellbag path contains redpetya.exe).psexec → Not Observed (string/tool name not present in shellbag paths); however, SysinternalsSuite (which may contain PsExec) Observed as above (rows 60, 61, 203).Data Gaps
psexec (or any tool) was run, only that certain paths were browsed.ts_atime and ts_btime are empty for all records (per stats), limiting timeline fidelity and preventing confirmation of first-seen vs last-modified shell item times.\\10.44.24.9\admin$ row_ref 35), so sequencing is incomplete.C:\Windows\System32\winevt\Logs\*, and SMB/Firewall logs on the involved hosts (10.44.24.1/.6/.7/.8/.9).Nothing suspicious was identified in this MUIcache dataset beyond normal Windows/Server administration components; however, this artifact cannot reliably confirm or refute ransomware execution or PsExec use due to missing timestamps and limited coverage of non-shell execution.
path entries containing redpetya.exe in the provided CSV (596 rows).path entries containing psexec, psexec.exe, psexesvc, or PAExec in the provided CSV (596 rows).C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe row_ref 39-40, C:\Windows\regedit.exe row_ref 41-42, C:\Windows\system32\mmc.exe row_ref 3-4, and various RSAT/AD tools like dsadmin.dll row_ref 225, 584-587), MUIcache does not include command lines, scripts, modules used, remote targets, or user intent—so credential access, lateral movement, and persistence cannot be assessed here.PSEXEC*.pf, PAEXEC*.pf, powershell*.pf, suspicious binaries), if enabled.C:\Windows\System32\Tasks\, and Task Scheduler operational log.redpetya.exe was found): $MFT, USN Journal, and ransomware note artifacts (extensions, dropped files).Nothing suspicious detected in this SAM Users data: it only shows default built-in local accounts and no evidence of unauthorized account creation or privilege abuse.
lastlogin, lastpasswordset, and lastincorrectlogin are all 1601-01-01T00:00:00Z for every account (rows 1–4), so this dataset cannot be used to determine whether these accounts were used or modified.net localgroup/LSA policy artifactsPSEXESVC, Prefetch, SCM event logs) and execution traces (Prefetch, Shimcache, Amcache, SRUM)Nothing suspicious can be identified from this artifact because it contains zero Defender Quarantine records.
| Timestamp | Action | Details |
|---|---|---|
| 2026-02-18T18:27:17.009Z | case_created | {"case_id": "10887ec4-142c-4364-9e97-baa750118587","creation_time": "2026-02-18T18:27:17Z","name": "Case 2026-02-18 19:27:17"} |
| 2026-02-18T18:27:27.976Z | evidence_intake | {"dissect_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []} |
| 2026-02-18T18:27:27.976Z | image_opened | {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"} |
| 2026-02-18T18:28:10.389Z | parsing_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"} |
| 2026-02-18T18:28:10.494Z | parsing_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\runkeys.csv","duration_seconds": 0.105677,"function": "runkeys","record_count": 4} |
| 2026-02-18T18:28:10.495Z | parsing_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"} |
| 2026-02-18T18:28:14.133Z | parsing_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\tasks.csv","duration_seconds": 3.638804,"function": "tasks","record_count": 469} |
| 2026-02-18T18:28:14.134Z | parsing_started | {"artifact_key": "services","artifact_name": "Services","function": "services"} |
| 2026-02-18T18:28:17.188Z | parsing_completed | {"artifact_key": "services","artifact_name": "Services","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\services.csv","duration_seconds": 3.054528,"function": "services","record_count": 2332} |
| 2026-02-18T18:28:17.188Z | parsing_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"} |
| 2026-02-18T18:28:17.241Z | parsing_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\cim.csv","duration_seconds": 0.05272,"function": "cim","record_count": 0} |
| 2026-02-18T18:28:17.241Z | parsing_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"} |
| 2026-02-18T18:28:27.304Z | parsing_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\shimcache.csv","duration_seconds": 10.061885,"function": "shimcache","record_count": 1390} |
| 2026-02-18T18:28:27.304Z | parsing_started | {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"} |
| 2026-02-18T18:28:27.819Z | parsing_completed | {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\amcache.csv","duration_seconds": 0.514766,"function": "amcache","record_count": 615} |
| 2026-02-18T18:28:27.819Z | parsing_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"} |
| 2026-02-18T18:28:27.841Z | parsing_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\bam.csv","duration_seconds": 0.021942,"function": "bam","record_count": 101} |
| 2026-02-18T18:28:27.841Z | parsing_started | {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"} |
| 2026-02-18T18:28:27.872Z | parsing_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\userassist.csv","duration_seconds": 0.031504,"function": "userassist","record_count": 101} |
| 2026-02-18T18:28:27.873Z | parsing_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"} |
| 2026-02-18T18:28:27.883Z | parsing_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\recyclebin.csv","duration_seconds": 0.010675,"function": "recyclebin","record_count": 2} |
| 2026-02-18T18:28:27.883Z | parsing_started | {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"} |
| 2026-02-18T18:28:28.616Z | parsing_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\browser.history.csv","duration_seconds": 0.732468,"function": "browser.history","record_count": 60} |
| 2026-02-18T18:28:28.616Z | parsing_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"} |
| 2026-02-18T18:28:28.982Z | parsing_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\browser.downloads.csv","duration_seconds": 0.366133,"function": "browser.downloads","record_count": 4} |
| 2026-02-18T18:28:28.982Z | parsing_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"} |
| 2026-02-18T18:28:29.013Z | parsing_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\activitiescache.csv","duration_seconds": 0.030459,"function": "activitiescache","record_count": 0} |
| 2026-02-18T18:28:29.014Z | parsing_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"} |
| 2026-02-18T18:28:29.047Z | parsing_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\sru.network_data.csv","duration_seconds": 0.033704,"function": "sru.network_data","record_count": 0} |
| 2026-02-18T18:28:29.047Z | parsing_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"} |
| 2026-02-18T18:28:55.259Z | parsing_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\sru.application.csv","duration_seconds": 26.210886,"function": "sru.application","record_count": 73965} |
| 2026-02-18T18:28:55.259Z | parsing_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"} |
| 2026-02-18T18:28:55.370Z | parsing_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\shellbags.csv","duration_seconds": 0.111563,"function": "shellbags","record_count": 203} |
| 2026-02-18T18:28:55.371Z | parsing_started | {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"} |
| 2026-02-18T18:28:55.476Z | parsing_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\muicache.csv","duration_seconds": 0.105857,"function": "muicache","record_count": 596} |
| 2026-02-18T18:28:55.477Z | parsing_started | {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"} |
| 2026-02-18T18:28:55.481Z | parsing_completed | {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\sam.csv","duration_seconds": 0.004891,"function": "sam","record_count": 8} |
| 2026-02-18T18:28:55.482Z | parsing_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"} |
| 2026-02-18T18:28:55.490Z | parsing_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "E:\\Foraic\\cases\\10887ec4-142c-4364-9e97-baa750118587\\parsed\\defender.quarantine.csv","duration_seconds": 0.008059,"function": "defender.quarantine","record_count": 0} |
| 2026-02-18T18:29:04.951Z | prompt_submitted | {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."} |
| 2026-02-18T18:29:04.972Z | analysis_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:29:17.576Z | analysis_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 12.603615,"status": "success","token_count": 523} |
| 2026-02-18T18:29:17.577Z | analysis_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:29:33.484Z | analysis_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 15.907549,"status": "success","token_count": 922} |
| 2026-02-18T18:29:33.495Z | analysis_started | {"artifact_key": "services","artifact_name": "Services","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:29:46.735Z | analysis_completed | {"artifact_key": "services","artifact_name": "Services","duration_seconds": 13.240334,"status": "success","token_count": 591} |
| 2026-02-18T18:29:46.752Z | analysis_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:29:53.476Z | analysis_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 6.723056,"status": "success","token_count": 370} |
| 2026-02-18T18:29:53.476Z | analysis_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:30:20.168Z | analysis_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 26.69126,"status": "success","token_count": 1279} |
| 2026-02-18T18:30:20.176Z | analysis_started | {"artifact_key": "amcache","artifact_name": "Amcache","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:30:39.708Z | analysis_completed | {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 19.531079,"status": "success","token_count": 1100} |
| 2026-02-18T18:30:39.715Z | analysis_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:31:02.460Z | analysis_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 22.744482,"status": "success","token_count": 1254} |
| 2026-02-18T18:31:02.462Z | analysis_started | {"artifact_key": "userassist","artifact_name": "UserAssist","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:31:26.943Z | analysis_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 24.480536,"status": "success","token_count": 1349} |
| 2026-02-18T18:31:26.945Z | analysis_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:31:40.146Z | analysis_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 13.200297,"status": "success","token_count": 737} |
| 2026-02-18T18:31:40.146Z | analysis_started | {"artifact_key": "browser.history","artifact_name": "Browser History","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:32:04.781Z | analysis_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 24.634694,"status": "success","token_count": 1564} |
| 2026-02-18T18:32:04.783Z | analysis_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:32:19.544Z | analysis_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 14.76613,"status": "success","token_count": 962} |
| 2026-02-18T18:32:19.544Z | analysis_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:32:29.738Z | analysis_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 10.188345,"status": "success","token_count": 525} |
| 2026-02-18T18:32:29.738Z | analysis_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:32:38.896Z | analysis_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 9.16896,"status": "success","token_count": 462} |
| 2026-02-18T18:32:38.896Z | analysis_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:33:02.801Z | analysis_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 23.90035,"status": "success","token_count": 1376} |
| 2026-02-18T18:33:03.649Z | analysis_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:33:23.146Z | analysis_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 19.484233,"status": "success","token_count": 1093} |
| 2026-02-18T18:33:23.150Z | analysis_started | {"artifact_key": "muicache","artifact_name": "MUIcache","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:33:35.577Z | analysis_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 12.429293,"status": "success","token_count": 651} |
| 2026-02-18T18:33:35.577Z | analysis_started | {"artifact_key": "sam","artifact_name": "SAM Users","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:33:44.307Z | analysis_completed | {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 8.730122,"status": "success","token_count": 448} |
| 2026-02-18T18:33:44.307Z | analysis_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:33:52.020Z | analysis_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 7.713708,"status": "success","token_count": 408} |
| 2026-02-18T18:33:52.020Z | analysis_started | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "gpt-5.2","provider": "openai"} |
| 2026-02-18T18:34:56.337Z | analysis_completed | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 64.308546,"status": "success","token_count": 4043} |
| 2026-02-18T18:35:44.361Z | hash_verification | {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01"} |