AIFT Forensic Report | Flip Forensics
| Filename | 20240212-decrypted-Windows_Server_2022.E01 |
|---|---|
| SHA-256 | 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7 |
| MD5 | 6f912bbaa1500f4556bd6b4fa8466f02 |
| File Size | 1.46 GB (1572845047 bytes) |
| Hostname | WIN-NI9FBK23SLO |
| OS | Windows Server 2022 Standard (NT 10.0) 20348.1850 |
| Domain | branchoffice.example.com |
| IPs | 10.44.0.12 |
On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.
Look for any suspicious behaviour aside from these two IOC's.
Executive Summary
The server WIN-NI9FBK23SLO was compromised by human-operated ransomware. An attacker used the “admin†account to stage PsExec, Nmap and custom binaries, created a malicious scheduled task that pushes a payload to every workstation, and previewed a Ryuk ransom note days before the 12 Feb 2024 discovery. Confidence is HIGH; treat as an active, ongoing intrusion with CRITICAL severity.
Timeline (all UTC)
IOC Status
Attack Narrative
Initial Access – Unclear method; no phishing or exploit artifact recovered.
Execution – Confirmed: PsExec, Nmap, rename.exe, rundll32 executed under “admin†account.
Persistence – Confirmed: malicious scheduled task “Enterpries backup†configured to run with highest privileges.
Privilege Escalation – Not directly seen; all activity under existing local admin.
Lateral Movement – Confirmed: scheduled task embeds PsExec pushing rename.exe to six workstations via ADMIN$ with plaintext creds.
Collection – Observed: browser opens Active-Directory credential files (.xlsx, .csv).
Exfiltration – Likely: FTP sessions to 185.239.106.67 during incident window.
(Steps without direct evidence marked as inferred.)
Gaps & Unknowns
Recommended Next Steps
Findings
None – no suspicious entries present.
IOC Status
Data Gaps
Findings
\Enterpries backup, date 2024-02-06T21:49:21.961830+00:00, user "admin", run_level "HighestAvailable".C:\Windows\System32\Tasks\Enterpries backup to confirm triggers/schedule and retrieve rename.exe.C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, arguments -accept-eula \\Desktop-001...-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe.C:\Users\admin\Downloads\SysinternalsSuite\ for PsExec.exe hash and verify rename.exe payload on admin desktop.IOC Status
C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe with full lateral-movement syntax.Data Gaps
rename.exe and PsExec.exe.Findings
– Evidence: 2024-02-05T23:42:42.600456, name=npcap, imagepath=\SystemRoot\system32\DRIVERS\npcap.sys, start=System (1), row 305.
– Why it matters: gives adversary passive sniffing/ARP-spoof capability on every reboot; often packaged with PsExec/Metasploit toolsets.
– Alternative explanation: legitimate admin installed Wireshark/nmap, but no ticket or change record supplied.
– Verify: check install path, file hash, and uninstall registry entries for nmap/Npcap installer.
– Evidence: 2024-02-06T04:43:24.915457, name=BITS, servicedll=%SystemRoot%\System32\qmgr.dll, start=Manual (3), row 48.
– Why it matters: attackers use BITS jobs to download second-stage tools or exfil data with built-in Windows component.
– Alternative explanation: Windows update activity, but date is outside normal Patch-Tuesday window.
– Verify: enumerate active BITS jobs with bitsadmin /list or PowerShell Get-BitsTransfer on live image.
– Evidence: rows 63-592 (e.g. CaptureService_2a2ba346 2024-02-05T23:05:27.742237).
– Why it matters: matches pattern of service-hijack or DLL-sideloading bugs abused for privilege-escalation (e.g., RogueWin32Provider).
– Alternative explanation: Windows user-profile service duplication after update; still worth validating.
– Verify: compare servicedll paths and hashes between base and “2a2ba346â€/“81ec50†variants.
– Evidence: 2023-09-24T14:57:31.484438, name=RemoteRegistry, start=Auto Start (2), row 375.
– Why it matters: enables lateral-movement techniques such as remote credential harvesting or service configuration edits.
– Alternative explanation: some monitoring tools require it, but usually disabled by default on modern servers.
– Verify: check firewall rules (port 445/139) and recent remote registry API events.
– Evidence: rows 242 & 1422, timestamps 2024-01-19 & 2024-02-07.
– Why it matters: UAC bypass exploits sometimes target elevation services.
– Alternative explanation: normal browser auto-update.
– Verify: inspect elevation_service.exe hash and digital signature.
IOC Status
Data Gaps
Findings
Get-WmiObject -Namespace ROOT\DEFAULT -Class __EventFilter, etc.IOC Status
Data Gaps
Findings
\10.44.24.9\admin$\PSEXESVC.exe, last_modified 2024-02-05T23:25:15.663250+00:00.C:\Program Files (x86)\Nmap\nmap.exe & zenmap.exe.IOC Status
Data Gaps
Findings
– c:\users\admin\downloads\sysinternalssuite\psexec.exe row 71, mtime_regf 2024-02-06T22:14:12.373672
– c:\users\admin\downloads\sysinternalssuite\psexec64.exe row 73, mtime_regf 2024-02-06T22:14:14.995445
– c:\users\administrator\downloads\sysinternalssuite\psexec64.exe row 72, mtime_regf 2024-02-07T21:00:11.248564
– nmap-7.93-setup.exe row 62, first-seen 2024-02-07T21:00:11.233940
– nmap.exe row 63, ncat.exe row 59, nping.exe row 69, Zenmap.exe row 129 all mtime_regf 2024-02-06T21:01:08.x
– c:\users\admin\desktop\dir.exe row 13, size 0.77 MB, no publisher/hash, mtime_regf 2024-02-07T21:00:10.342958
– c:\users\admin\desktop\rename.exe row 80, size 0.22 MB, no publisher/hash, mtime_regf 2024-02-07T21:00:10.562542
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
psexec \\target -s cmd) may be missed.Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
None – the Activities Cache database contains zero records, so no user-interaction events are available for inspection.
IOC Status
Data Gaps
Findings
None – the SRUM network data set is empty.
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
IOC Status
Data Gaps
Findings
None – the quarantine table is empty.
IOC Status
Data Gaps
| Timestamp | Action | Details |
|---|---|---|
| 2026-02-18T17:40:01.026Z | case_created | {"case_id": "036ae21b-8394-46ed-9a7c-67a96acc5043","creation_time": "2026-02-18T17:40:01Z","name": "Case 2026-02-18 18:40:01"} |
| 2026-02-18T17:40:12.770Z | evidence_intake | {"dissect_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []} |
| 2026-02-18T17:40:12.770Z | image_opened | {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"} |
| 2026-02-18T17:40:27.568Z | parsing_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"} |
| 2026-02-18T17:40:27.681Z | parsing_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\runkeys.csv","duration_seconds": 0.113272,"function": "runkeys","record_count": 4} |
| 2026-02-18T17:40:27.681Z | parsing_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"} |
| 2026-02-18T17:40:31.294Z | parsing_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\tasks.csv","duration_seconds": 3.611868,"function": "tasks","record_count": 469} |
| 2026-02-18T17:40:31.294Z | parsing_started | {"artifact_key": "services","artifact_name": "Services","function": "services"} |
| 2026-02-18T17:40:34.409Z | parsing_completed | {"artifact_key": "services","artifact_name": "Services","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\services.csv","duration_seconds": 3.11477,"function": "services","record_count": 2332} |
| 2026-02-18T17:40:34.409Z | parsing_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"} |
| 2026-02-18T17:40:34.464Z | parsing_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\cim.csv","duration_seconds": 0.054939,"function": "cim","record_count": 0} |
| 2026-02-18T17:40:34.464Z | parsing_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"} |
| 2026-02-18T17:40:45.154Z | parsing_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\shimcache.csv","duration_seconds": 10.68968,"function": "shimcache","record_count": 1390} |
| 2026-02-18T17:40:45.154Z | parsing_started | {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"} |
| 2026-02-18T17:40:45.675Z | parsing_completed | {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\amcache.csv","duration_seconds": 0.520953,"function": "amcache","record_count": 615} |
| 2026-02-18T17:40:45.676Z | parsing_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"} |
| 2026-02-18T17:40:45.707Z | parsing_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\bam.csv","duration_seconds": 0.031039,"function": "bam","record_count": 101} |
| 2026-02-18T17:40:45.707Z | parsing_started | {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"} |
| 2026-02-18T17:40:45.744Z | parsing_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\userassist.csv","duration_seconds": 0.037165,"function": "userassist","record_count": 101} |
| 2026-02-18T17:40:45.744Z | parsing_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"} |
| 2026-02-18T17:40:45.756Z | parsing_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\recyclebin.csv","duration_seconds": 0.012126,"function": "recyclebin","record_count": 2} |
| 2026-02-18T17:40:45.757Z | parsing_started | {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"} |
| 2026-02-18T17:40:46.507Z | parsing_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\browser.history.csv","duration_seconds": 0.750687,"function": "browser.history","record_count": 60} |
| 2026-02-18T17:40:46.507Z | parsing_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"} |
| 2026-02-18T17:40:46.877Z | parsing_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\browser.downloads.csv","duration_seconds": 0.369863,"function": "browser.downloads","record_count": 4} |
| 2026-02-18T17:40:46.878Z | parsing_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"} |
| 2026-02-18T17:40:46.911Z | parsing_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\activitiescache.csv","duration_seconds": 0.033234,"function": "activitiescache","record_count": 0} |
| 2026-02-18T17:40:46.911Z | parsing_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"} |
| 2026-02-18T17:40:46.946Z | parsing_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\sru.network_data.csv","duration_seconds": 0.034681,"function": "sru.network_data","record_count": 0} |
| 2026-02-18T17:40:46.946Z | parsing_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"} |
| 2026-02-18T17:41:13.371Z | parsing_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\sru.application.csv","duration_seconds": 26.424973,"function": "sru.application","record_count": 73965} |
| 2026-02-18T17:41:13.372Z | parsing_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"} |
| 2026-02-18T17:41:13.489Z | parsing_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\shellbags.csv","duration_seconds": 0.117824,"function": "shellbags","record_count": 203} |
| 2026-02-18T17:41:13.490Z | parsing_started | {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"} |
| 2026-02-18T17:41:13.596Z | parsing_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\muicache.csv","duration_seconds": 0.106627,"function": "muicache","record_count": 596} |
| 2026-02-18T17:41:13.597Z | parsing_started | {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"} |
| 2026-02-18T17:41:13.601Z | parsing_completed | {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\sam.csv","duration_seconds": 0.004543,"function": "sam","record_count": 8} |
| 2026-02-18T17:41:13.601Z | parsing_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"} |
| 2026-02-18T17:41:13.609Z | parsing_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "E:\\Foraic\\cases\\036ae21b-8394-46ed-9a7c-67a96acc5043\\parsed\\defender.quarantine.csv","duration_seconds": 0.007908,"function": "defender.quarantine","record_count": 0} |
| 2026-02-18T17:41:23.234Z | prompt_submitted | {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."} |
| 2026-02-18T17:41:23.258Z | analysis_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:41:28.094Z | analysis_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 4.835065,"status": "success","token_count": 237} |
| 2026-02-18T17:41:28.094Z | analysis_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:41:39.996Z | analysis_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 11.901331,"status": "success","token_count": 743} |
| 2026-02-18T17:41:40.006Z | analysis_started | {"artifact_key": "services","artifact_name": "Services","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:00.552Z | analysis_completed | {"artifact_key": "services","artifact_name": "Services","duration_seconds": 20.545386,"status": "success","token_count": 962} |
| 2026-02-18T17:42:00.568Z | analysis_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:04.442Z | analysis_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 3.874315,"status": "success","token_count": 304} |
| 2026-02-18T17:42:04.442Z | analysis_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:19.821Z | analysis_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 15.37873,"status": "success","token_count": 726} |
| 2026-02-18T17:42:19.829Z | analysis_started | {"artifact_key": "amcache","artifact_name": "Amcache","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:32.455Z | analysis_completed | {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 12.62483,"status": "success","token_count": 886} |
| 2026-02-18T17:42:32.463Z | analysis_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:39.964Z | analysis_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 7.500862,"status": "success","token_count": 571} |
| 2026-02-18T17:42:39.965Z | analysis_started | {"artifact_key": "userassist","artifact_name": "UserAssist","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:50.578Z | analysis_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 10.612401,"status": "success","token_count": 821} |
| 2026-02-18T17:42:50.580Z | analysis_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:42:56.880Z | analysis_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 6.300336,"status": "success","token_count": 525} |
| 2026-02-18T17:42:56.881Z | analysis_started | {"artifact_key": "browser.history","artifact_name": "Browser History","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:10.714Z | analysis_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 13.832704,"status": "success","token_count": 990} |
| 2026-02-18T17:43:10.715Z | analysis_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:17.428Z | analysis_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 6.712418,"status": "success","token_count": 532} |
| 2026-02-18T17:43:17.428Z | analysis_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:20.281Z | analysis_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 2.85237,"status": "success","token_count": 159} |
| 2026-02-18T17:43:20.281Z | analysis_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:22.560Z | analysis_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 2.278601,"status": "success","token_count": 133} |
| 2026-02-18T17:43:22.560Z | analysis_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:40.103Z | analysis_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 17.541906,"status": "success","token_count": 1101} |
| 2026-02-18T17:43:40.724Z | analysis_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:43:50.898Z | analysis_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 10.174022,"status": "success","token_count": 789} |
| 2026-02-18T17:43:50.901Z | analysis_started | {"artifact_key": "muicache","artifact_name": "MUIcache","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:44:00.462Z | analysis_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 9.561152,"status": "success","token_count": 372} |
| 2026-02-18T17:44:00.463Z | analysis_started | {"artifact_key": "sam","artifact_name": "SAM Users","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:44:05.355Z | analysis_completed | {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 4.892378,"status": "success","token_count": 445} |
| 2026-02-18T17:44:05.356Z | analysis_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:44:07.809Z | analysis_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 2.45271,"status": "success","token_count": 189} |
| 2026-02-18T17:44:07.810Z | analysis_started | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "kimi-k2-turbo-preview","provider": "kimi"} |
| 2026-02-18T17:44:20.173Z | analysis_completed | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 12.362689,"status": "success","token_count": 971} |
| 2026-02-18T17:44:35.844Z | hash_verification | {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01"} |