Case 2026-02-26 12:03:45

AIFT Forensic Report | Flip Forensics

Case ID 9110b811-141a-417f-a333-f029766c459c
Generated 2026-02-26T12:44:14Z
Tool Version 1.2
AI Provider local (gpt-oss:120b)

Evidence Summary

Filename 20240212-decrypted-Windows_Server_2022.E01
SHA-256 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7
MD5 6f912bbaa1500f4556bd6b4fa8466f02
File Size 1.46 GB (1572845047 bytes)
Hostname WIN-NI9FBK23SLO
OS Windows Server 2022 Standard (NT 10.0) 20348.1850
Domain branchoffice.example.com
IPs 10.44.0.12

Hash Verification Result

PASS
Hash verification explicitly reported by workflow.

Investigation Context

On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.

Look for any suspicious behaviour aside from these two IOC's.

Executive Summary

Executive Summary
The evidence shows clear use of PsExec‑related tools, a malicious‑looking scheduled task, and extensive admin‑share enumeration shortly before the Red Petya ransom screen appeared on 12 Feb 2024. While the ransomware binary redpetya.exe itself was never seen in any artifact, the combination of a “Enterpries backup” task that runs PsExec (tasks row 5, 2024‑02‑06 21:49:21.961830 UTC) and multiple Sysinternals downloads, execution traces (BAM row 13 & 23, 2024‑02‑06/09), and remote‑share activity (Shellbags rows 4‑32, early Feb 2024) strongly suggests the host was compromised and used for lateral movement and payload deployment. Confidence that the system was compromised: HIGH; overall severity: CRITICAL because the host displayed ransomware and likely participated in spreading it.

---

Timeline (selected CRITICAL events)

Timestamp (UTC)Source ArtifactEventConfidence
2024‑02‑05 23:13:17 – 23:14:39Browser.history / browser.downloads / shimcache / amcacheDownload of Sysinternals Suite (contains PsExec) – evidence of tool staging.HIGH
2024‑02‑05 23:14:39.491949 – 23:14:39.522984ShimcacheC:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe & PsExec64.exe recorded.HIGH
2024‑02‑05 23:14:49.615999Recycle BinDeletion of SysinternalsSuite.zip (admin).MEDIUM
2024‑02‑05 23:25:15.663250Shimcache\\10.44.24.9\admin$\PSEXESVC.exe (PsExec service binary on remote share).HIGH
2024‑02‑05 23:40:22 – 23:41:28Browser.history / browser.downloadsSearch for and download of Nmap installer.HIGH
2024‑02‑06 00:06:00SRUM.applicationExecution of nmap.exe & zenmap.exe (foreground cycle time logged).MEDIUM
2024‑02‑06 21:49:21.961830Scheduled Tasks (tasks) – row 4Creation of Enterpries backup task (run level HighestAvailable, user admin).HIGH
2024‑02‑06 21:49:21.961830Scheduled Tasks – row 5Task command = C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe; arguments include -u admin -p letmein … rename.exe.HIGH
2024‑02‑06 22:14:12.373672 – 22:14:14.995445Amcachepsexec.exe and psexec64.exe recorded in admin’s Downloads folder.HIGH
2024‑02‑06 22:14:12.975912 – 22:55:44.556122BAM/DAMExecution of PsExec64.exe and PsExec.exe from the same folder.HIGH
2024‑02‑07 04:04:00Shellbags – row 63Access to Desktop\important.zip (potential staging archive).MEDIUM
2024‑02‑07 08:16‑08:39Shellbags – rows 4‑32Enumeration of admin shares on hosts 10.44.24.1‑9 (c$).HIGH
2024‑02‑07 22:53:05 – 22:56:00SRUM.applicationExecution of rename.exe (desktop) and repeated DismHost.exe from temp folders.MEDIUM
2024‑02‑08 08:30 – 08:40Shellbags – rows 4, 17, 22, 27, 32Continued remote‑share browsing of multiple workstations.HIGH
2024‑02‑09 22:53 – 22:56UserAssist – rows 27, 14Interactive launch of PsExec64.exe / PsExec.exe via Explorer.HIGH
2024‑02‑09 22:55 – 22:56BAM/DAM – rows 13, 23Final PsExec executions recorded before telemetry stops.HIGH
2024‑02‑12 ??:??:??Incident observation (outside collected data)Red Petya ransomware screen displayed on the server.

(All timestamps are taken directly from the listed artifacts; confidence reflects the strength of the supporting evidence.)

---

IOC Status

IOCObservationSupporting Artifact(s)
redpetya.exeNot Observed – no entry in Run/RunOnce, Scheduled Tasks, Services, ShimCache, Amcache, BAM/DAM, UserAssist, MUICache, or any other artifact.
PsExec / PsExec‑related activityObserved – multiple PsExec binaries downloaded, executed, and referenced in a scheduled task; also a remote service binary PSEXESVC.exe seen on a network share.Shimcache rows 120/122, Amcache rows 71‑73, BAM/DAM rows 13/23, Scheduled‑Task row 5, Shellbags remote‑share entries, UserAssist rows 27/14, SRUM (application) – no direct PsExec record but corroborated by other sources.

---

Attack Narrative

PhaseEvidence (Confirmed)Inferred / Uncertain
Initial AccessLikely credential reuse or privileged admin account (admin) used to create a scheduled task and browse admin shares (Shellbags rows 4‑32, 2024‑02‑07). No direct log of how credentials were obtained.The exact entry vector (phishing, credential dump, or stolen password) is unknown.
ExecutionPsExec binaries executed from the admin’s Downloads folder (BAM/DAM rows 13/23; UserAssist rows 27/14). The Enterpries backup task explicitly invokes PsExec with clear‑text credentials (-u admin -p letmein).Whether PsExec was used to launch the ransomware payload (redpetya.exe) is not directly logged.
PersistenceCreation of the Enterpries backup scheduled task (tasks row 4) with HighestAvailable run level; the task remains on disk after creation. No service persistence observed (services artifact).No evidence of further persistence mechanisms (registry Run keys, additional tasks) beyond this task.
Privilege Escalation / Lateral MovementRemote admin‑share enumeration across five workstations (Shellbags rows 4‑32) and presence of PSEXESVC.exe on \\10.44.24.9\admin$ (Shimcache row 8) strongly indicate lateral movement using PsExec.No explicit log of successful remote command execution on those hosts (e.g., SMB session logs).
Discovery / ReconExecution of Nmap (nmap.exe / zenmap.exe) recorded in SRUM (2024‑02‑06) and download of Nmap installer (browser.history rows 12‑20).The scan targets and results are unknown.
Collection / StagingPresence of important.zip on the desktop (Shellbags row 63) and numerous user‑profile folder accesses (Shellbags many rows) suggest data collection.No file‑hash or exfiltration logs to confirm actual theft.
ExfiltrationNo network flow or FTP upload logs captured; a single FTP URL to an external IP appears in browser.history (2024‑02‑07 16:57:31, row 50) – possible exfiltration channel.No confirmation that data was successfully transferred.
Impact – Ransomware ExecutionRed Petya ransomware screen observed on 12 Feb 2024. No forensic trace of the binary itself, but the timeline of PsExec usage, custom rename.exe launch, and scheduled task execution align with a probable payload delivery shortly after 9 Feb.Direct evidence of redpetya.exe execution is missing; the ransomware may have been delivered in‑memory or from a remote share not logged.

Overall Narrative: An admin‑level account created a HIGH‑privilege scheduled task that launched PsExec with hard‑coded credentials to run a local utility (rename.exe). Concurrently, the attacker used PsExec to move laterally across several workstations, enumerated admin shares, and performed internal network scans with Nmap. Staging files (e.g., important.zip) were prepared, and a brief FTP connection to an external server was made. Within days, the Red Petya ransomware displayed on the server, likely deployed by the PsExec‑driven chain, even though the binary itself was not captured in the collected artifacts.

---

Gaps and Unknowns

GapWhy it matters / possible anti‑forensic sign
No post‑12 Feb logs (tasks, BAM/DAM, SRUM stop on 9‑10 Feb)Could indicate log clearing or collection cut‑off before the final ransomware execution.
Missing process‑creation (Sysmon/4688) and security event logsPrevents verification of exact command‑line arguments, parent‑process trees, and authentication events for PsExec.
**No file‑system metadata for redpetya.exe or rename.exe**Hinders confirmation that the ransomware binary existed or was executed from disk.
Zero entries in SRUM network data and Defender quarantineMay suggest SRUM was disabled/cleared or Defender was not active, both possible anti‑forensic actions.
No SMB session or Netlogon logsUnable to prove successful remote service creation or file copies to the observed admin shares.
No hash values for many binaries (PsExec, rename.exe, important.zip)Limits ability to compare against known malicious versions or detect tampering.
Scheduled‑task trigger details missingWe cannot ascertain whether the task ran automatically at the time of the ransomware event.
SAM snapshot predates incident (2023‑09‑24)No visibility into account changes, new privileged users, or password resets around the attack window.

---

Recommended Next Steps

Immediate Containment (if still online)

  1. Isolate the host from the network (air‑gap or VLAN quarantine).
  2. Disable the “Enterpries backup” scheduled task and any other unknown tasks.
  3. **Reset the password for the admin account** and any other privileged accounts; enforce MFA.

Evidence Collection

  1. Acquire the full Windows Event Log set (Security, System, Microsoft‑Windows‑TaskScheduler/Operational, Microsoft‑Windows‑Sysmon/Operational) covering 2024‑02‑01 to 2024‑02‑15.
  2. Export SMB/Netlogon session logs from the domain controller and from the host (e.g., netstat -an, Windows Firewall logs).
  3. Pull full registry hives (including all Run/RunOnce, Services, and WMI subscription keys) to verify any hidden persistence.
  4. Capture a live memory dump (if still possible) to search for in‑memory‑only ransomware payloads.
  5. Perform a complete $MFT/USN journal parse to locate any creation/modification of redpetya.exe, rename.exe, or important.zip.

Analysis

  1. Correlate the gathered process‑creation events with the PsExec timestamps (Feb 5‑9) to verify the exact command line and remote targets.
  2. Compute SHA‑1/256 hashes for all PsExec‑related binaries, rename.exe, and the ZIP archives; compare against threat‑intel feeds.
  3. Review network flow/Zeek or Netmon captures for the FTP session to 185.239.106.67 and any SMB traffic to the 10.44.24.* hosts.
  4. Examine PowerShell transcription logs and Windows Defender ATP alerts for any detection of the ransomware payload.

Remediation / Prevention

  1. Ensure Windows Defender (or an EDR) is enabled and its real‑time protection is active; verify that quarantine logs are being retained.
  2. Harden PsExec usage: restrict the tool via AppLocker or Windows Defender Application Control, and monitor for its execution.
  3. Apply least‑privilege principles: remove unnecessary admin share access, enforce credential guard, and disable remote admin shares where not required.
  4. Conduct a full credential‑access audit (Mimikatz, LSASS dumps) to confirm no password hashes were harvested.

By addressing the gaps above and following the containment and collection steps, the team can confirm whether the Red Petya payload was executed, determine the full scope of lateral movement, and prevent further compromise across the branch office environment.

Per-Artifact Findings

Run/RunOnce Keys (runkeys) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
None – no autorun entries in the Run/RunOnce keys show suspicious paths, LOLBins, encoded arguments, or known malicious binaries.

IOC Status

  • redpetya.exeNot Observed – the two Run/RunOnce entries are SecurityHealthSystray.exe (row 1) and VBoxTray.exe (row 2); no reference to redpetya.exe appears.
  • psexecNot Observed – neither row contains a command line invoking psexec.exe or any PsExec‑related arguments.

Data Gaps

  • The artifact covers only a single timestamp (2023‑09‑24 14:57:27 UTC) and includes just two autorun values, providing an extremely limited view of persistence mechanisms.
  • No username fields are populated, so it is impossible to determine whether the entries were created under a privileged or user context.
  • No other Run/RunOnce locations (HKLM vs. HKCU sub‑keys), scheduled tasks, services, or startup folders are present; absence of these could hide additional persistence.
  • No evidence of redpetya.exe or PsExec usage elsewhere (e.g., process creation logs, SMB session logs) – those artifacts are required to confirm lateral movement or execution.
  • Lack of timestamps before/after the observed date prevents building a timeline of when (or if) malicious entries might have been added or later removed.

Additional artifacts to examine: full Registry hive (including all Run/RunOnce sub‑keys), Sysmon event logs (process creation, network connections), SMB/Remote Service logs for PsExec activity, and file system metadata for the redpetya.exe binary.

Scheduled Tasks (tasks) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: CRITICAL] [CONFIDENCE: HIGH] A new scheduled task Enterpries backup was created on 2024‑02‑06 21:49:21.961830 UTC (row 4) under the local admin account (user_id admin) with run level HighestAvailable.
  • Evidence: task_pathC:\Windows\system32\tasks\Enterpries backup; date2024-02-06T21:49:21.961830+00:00; user_idadmin; display_nameEnterpries backup; run_levelHighestAvailable (row 4).
  • Why it matters: The task resides outside the default Microsoft namespace, runs with elevated privileges, and was created just days before the ransomware incident – a classic persistence/lateral‑movement vector.
  • Alternative explanation: Could be a legitimate admin‑created backup job, but the name is miss‑spelled and the timing is suspicious.
  • Verify: Correlate with Windows Event Logs (TaskScheduler/Operational) for the creation event and check the task XML for any additional payload paths.
  • [SEVERITY: HIGH] [CONFIDENCE: HIGH] The Enterpries backup task invokes PsExec.exe from a user‑downloaded location and passes a command that copies/executess rename.exe from the admin’s Desktop with clear‑text credentials (-u admin -p letmein).
  • Evidence: arguments"-accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe" and commandC:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row 5).
  • Why it matters: PsExec is a known lateral‑movement tool; the use of hard‑coded credentials and a user‑land executable (rename.exe) strongly indicates malicious activity, possibly the deployment of ransomware components.
  • Alternative explanation: An admin may have been using PsExec for a legitimate bulk rename operation, but the inclusion of multiple remote desktops and the “realtime” flag are atypical for benign admin tasks.
  • Verify: Locate rename.exe on the filesystem, hash it, and compare against known Red Petya payloads; review network logs for outbound SMB connections to the listed desktops.
  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] A CreateExplorerShellUnelevatedTask references C:\Windows\explorer.exe with the argument /NoUACCheck.
  • Evidence: Row 2 shows commandC:\Windows\explorer.exe and arguments/NoUACCheck.
  • Why it matters: Disabling UAC checks can be abused to run code with reduced prompts, a technique sometimes leveraged by ransomware to hide its execution.
  • Alternative explanation: May be a legitimate customization for a specific user environment.
  • Verify: Check the task’s trigger and creator; look for any associated scripts or binaries launched by this task.

IOC Status

  • redpetya.exeNot Observed – No scheduled‑task entry references this filename or path.
  • PsExecObserved – Appears as the command for the Enterpries backup task (row 5).

Data Gaps

  1. Timeline coverage ends on 2024‑02‑06 – The ransomware screen appeared on 2024‑02‑12, but the task list contains no entries after Feb 6. Any tasks created between Feb 7‑12 (or later) are absent, limiting visibility into the final compromise steps.
  2. Missing trigger details – The CSV does not include the task trigger (e.g., at logon, on boot, or one‑time). Without this we cannot confirm whether the task executed automatically at the time of the incident.
  3. No hash or size fields – The artifact does not provide hashes of the executable arguments (e.g., rename.exe), preventing direct malware identification.
  4. No correlation with EVTX – Scheduled‑task creation events in the Windows Microsoft‑Windows‑TaskScheduler/Operational log are not supplied; correlating timestamps would strengthen attribution.
  5. Potential log tampering – The _dedup_comment notes many deduplicated records, suggesting multiple identical entries may have been collapsed; if an adversary cleared or edited the task schedule, the original timestamps could be lost.

Additional artifacts that would aid the investigation: TaskScheduler EVTX logs, file system metadata for rename.exe and PsExec.exe (creation/modification times, hashes), network connection logs to the listed desktops, and any process creation events (Process Creation EVTX) for the PsExec execution.

Services (services) LOW
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • **[SEVERITY: LOW] [CONFIDENCE: LOW] No services referencing the ransomware binary redpetya.exe.
  • Evidence: The imagepath column contains only system paths (e.g., %SystemRoot%\system32\svchost.exe, C:\Program Files (x86)\Microsoft\Edge\...) and never the filename redpetya.exe. No row mentions this name.
  • Why it matters: A service that loads the ransomware executable would be a strong persistence indicator. Its absence suggests the ransomware did not achieve boot‑time persistence via a Windows service (or the service was created after the latest timestamp in the data).
  • Alternative explanation: The malicious binary could have been launched directly (e.g., via psexec) without being registered as a service, or the service could have been created after 2024‑02‑07 (the latest record).
  • Verify: Correlate with EVTX Event ID 7045 (Service installation) from the system‑event log covering 12 Feb 2024 onward to see if any new service entry appears.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] No evidence of a PsExec‑created service (psexesvc or similar).
  • Evidence: The name column does not contain entries such as psexesvc, PsExecSvc, or any other unconventional service name. All listed services are known Windows or vendor components.
  • Why it matters: PsExec often creates a temporary service to execute remote commands. Its presence would indicate lateral‑movement activity.
  • Alternative explanation: PsExec may have been used with the -s flag to run directly without installing a service, or any PsExec‑related service was created after the last timestamp (2024‑02‑07 20:59).
  • Verify: Search the System and Security Event logs for Event ID 7045 or 4688 entries showing psexesvc.exe execution around the incident window.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] No newly‑added auto‑start services during the observed window.
  • Evidence: The start column shows 105 Auto‑Start entries, all of which correspond to standard Windows components (e.g., WinDefend, W32Time, WpnService). No service with a creation timestamp after 2023‑09‑24 (the bulk of the data) shows a start type of “Auto” that is atypical.
  • Why it matters: New auto‑start services are a common persistence technique. Their absence reduces the likelihood of a lingering service‑based foothold.
  • Alternative explanation: A malicious service could have been configured to start “Manual” and later launched on demand, or it could have been added after the data cutoff.
  • Verify: Review the System Event log for Service Control Manager events (ID 7045) after 2024‑02‑07 to confirm whether any new services were added.

IOC Status

  • redpetya.exeNot Observed – No service entry references this filename.
  • psexec / PsExec‑related serviceNot Observed – No psexesvc or similar service name appears.

Data Gaps

  1. Time coverage: The services artifact stops at 2024‑02‑07 20:59 UTC, whereas the ransomware screen was seen on 12 Feb 2024. Any services installed or modified between 07 Feb and 12 Feb (or later) are missing, preventing confirmation of post‑incident persistence mechanisms.
  2. Missing Event ID 7045 records: The dataset does not include the Service Control Manager events that would explicitly log service creation (Event ID 7045). Without these, we cannot definitively state that no new services were installed.
  3. No command‑line data: PsExec usage can be inferred from process creation logs (Event 4688) showing psexesvc.exe or psexec.exe. Those logs are not present, so lateral‑movement via PsExec cannot be ruled out.
  4. No file‑system metadata: Confirmation that the redpetya.exe binary existed on the system (e.g., from an MSFT_FileName artifact) is absent, so we cannot verify whether it was ever placed on disk.

Recommended Next Steps

  • Pull System and Security EVTX files for the window 08 Feb 2024 – 15 Feb 2024 and search for Event ID 7045 (service install) and 4688 (process creation) to capture any late‑stage service or PsExec activity.
  • Query the Shellbags / Prefetch and FileSystem artifacts for the presence of redpetya.exe to confirm if the binary was ever written to disk.
  • Examine Network logs for SMB traffic to/from the server around 12 Feb 2024, which may indicate PsExec‑style remote execution.

Conclusion: Within the provided services data (up to 07 Feb 2024), there is no concrete evidence of malicious services, the ransomware binary, or PsExec‑related service creation. The lack of coverage for the CRITICAL post‑incident period is the primary limitation. Further log collection covering the incident dates is required for a definitive assessment.

WMI Persistence (cim) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

IOC Status

  • redpetya.exe (FileName) → Not Assessable – the WMI Persistence artifact contains no records to indicate the presence or absence of this file.
  • psexec (SuspiciousTools) → Not Assessable – no WMI event subscription data is available to show execution or use of PsExec.

Data Gaps

  • The supplied WMI Persistence artifact contains zero records (“No columns available.”), providing no timestamps, event filter definitions, consumer commands, or binding identifiers.
  • Consequently, we cannot determine whether any WMI‐based persistence mechanisms (EventFilters, EventConsumers, or FilterToConsumerBindings) exist, nor can we correlate such mechanisms with process creation logs, Prefetch, or ShimCache entries.
  • The absence of data may reflect a collection issue (e.g., failed export, corrupted repository) or that the target system simply has no WMI persistence objects, but the artifact as provided is insufficient for any forensic assessment.
  • To resolve this, acquire a complete WMI repository dump (e.g., using wmic /namespace:\\root\subscription path __eventfilter list /format:csv, eventconsumer, and __filtertoconsumerbinding), and correlate with system logs (EVTX, Prefetch, ShimCache) and network traffic to evaluate the suspected PsExec activity and the redpetya.exe payload.
Shimcache (shimcache) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: CRITICAL] [CONFIDENCE: HIGH] Evidence of PsExec lateral‑movement activity.
  • Evidence:
  • Row 8 – 2024‑02‑05T23:25:15.663250+00:00\\10.44.24.9\admin$\PSEXESVC.exe (PsExec service executable on a remote admin share).
  • Row 120 – 2024‑02‑05T23:14:39.491949+00:00C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (local copy of PsExec).
  • Row 122 – 2024‑02‑05T23:14:39.522984+00:00C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe.
  • Why it matters: PsExec is a known tool for executing commands remotely and is frequently abused for lateral movement and privilege escalation in ransomware campaigns. The presence of both the service binary on a network share and the client binary in the user’s download folder strongly suggests active use.
  • Alternative explanation: An administrator may have placed PsExec on the host for legitimate remote management; however, combined with the remote‑share copy (PSEXESVC) and the timing (Feb 2024, just before the ransomware event) this is more consistent with attacker activity.
  • Verify: Correlate these entries with Windows Event Logs (Process Creation – 4688, PowerShell – 4104) and network logs for SMB connections to 10.44.24.9 around the same timestamps; also check Prefetch/Amcache for execution artifacts.
  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Large number of Sysinternals utilities on the host, indicating possible credential‑access and enumeration actions.
  • Evidence: Multiple rows on 2024‑02‑05 showing copies of Sysinternals tools in C:\Users\admin\Downloads\SysinternalsSuite\ such as: pslist.exe, pslist64.exe, pskill.exe, pskill64.exe, PsInfo.exe, PsInfo64.exe, pspasswd.exe, pspasswd64.exe, psloglist.exe, psloglist64.exe, PsLoggedon.exe, PsLoggedon64.exe, procmon.exe, procmon64.exe, procdump.exe, procdump64.exe, ADExplorer.exe, ADExplorer64.exe, Autoruns.exe, Autoruns64.exe, Bginfo.exe, Bginfo64.exe, etc. (rows 31‑58, 59‑68, 70‑84, 90‑114, 119‑138, 140‑154).
  • Why it matters: Sysinternals tools are routinely used by attackers for process enumeration (pslist, psinfo), credential enumeration (PsLoggedon, PsGetSid), and dumping memory (procdump). Their presence in a user’s temp/download directory shortly before the ransomware incident suggests they were staged for post‑compromise activity.
  • Alternative explanation: An administrator or user may have downloaded the Sysinternals Suite for legitimate troubleshooting. Without corroborating execution evidence, the intent cannot be definitively proven.
  • Verify: Search for corresponding execution records in Prefetch, Amcache, or Sysmon (Event 1) and check for creation of scheduled tasks or services that reference these binaries.
  • **[SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Remote UNC path entries to \\10.44.24.9\admin$ indicating possible file staging or remote execution.**
  • Evidence:
  • Row 3 – 2019‑12‑06T21:29:00+00:00\\10.44.24.9\admin$\write.exe.
  • Row 4 – 2019‑12‑07T09:10:00.444992+00:00\\10.44.24.9\admin$\winhlp32.exe.
  • Row 5 – 2023‑11‑16T12:11:09.408899+00:00\\10.44.24.9\admin$\regedit.exe.
  • Row 6 – 2023‑11‑16T12:03:42.085066+00:00\\10.44.24.9\admin$\splwow64.exe.
  • Row 7 – 2023‑11‑16T12:13:19.602324+00:00\\10.44.24.9\admin$\notepad.exe.
  • Row 9 – 2019‑12‑07T09:09:39.615219+00:00\\10.44.24.9\admin$\hh.exe.
  • Row 10 – 2024‑01‑09T22:58:00.092497+00:00\\10.44.24.9\admin$\HelpPane.exe.
  • Row 11 – 2024‑01‑09T22:57:19.264709+00:00\\10.44.24.9\admin$\explorer.exe.
  • Row 12 – 2023‑11‑16T12:03:29.749149+00:00\\10.44.24.9\admin$\bfsvc.exe.
  • Why it matters: The repeated presence of standard system binaries accessed via a UNC path to an administrator share suggests an attacker may have copied tools to the remote host for later execution (common in post‑exploitation). Coupled with the PsExec entries, this pattern points to lateral movement using SMB.
  • Alternative explanation: These entries could result from legitimate remote administration (e.g., a sysadmin using SMB to run tools remotely). Lack of execution proof leaves some uncertainty.
  • Verify: Review SMB session logs, 445 TCP traffic, and Windows Security logs for successful authentication from the source IP (10.44.24.9). Look for created services or scheduled tasks referencing these UNC paths.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] Massive proliferation of dismhost.exe copies in temporary folders (e.g., rows 1‑2, 13‑14, 31‑...‑514).**
  • Evidence: Over 150 entries of dismhost.exe located in various %TEMP% sub‑folders dated 2021‑05‑08 (e.g., C:\Users\admin\AppData\Local\Temp\0498F23C-...dismhost.exe).
  • Why it matters: While dismhost.exe is a legitimate Windows component, the sheer number of temporary copies may indicate a tool or script that extracts or stages files (potentially used to hide malicious payloads). However, the timestamps are from 2021, well before the incident, and no recent copies appear.
  • Alternative explanation: These are leftover artifacts from a legitimate Windows Update or system maintenance routine long ago.
  • Verify: Check for any corresponding entries in Prefetch/Amcache for execution and inspect the file hashes if possible to determine if they have been tampered.

IOC Status

  • redpetya.exeNot Observed – No redpetya.exe path appears in the shimcache data.
  • psexecObservedPSEXESVC.exe (row 8) and PsExec.exe / PsExec64.exe (rows 120, 122) are present.

Data Gaps

  • The shimcache only records file path and last‑modified timestamps; it does not confirm execution. Corroborating evidence (Prefetch, Amcache, EVTX 4688, Sysmon 1) is required to prove the binaries actually ran.
  • The timestamp range ends at 2024‑02‑07 10:22 UTC, just after the ransomware display (12 Feb 2024). Any activity on 12 Feb 2024 itself may be missing if logs were cleared or not captured.
  • No hash or size information is available, limiting verification of whether the observed binaries are the legitimate versions or have been tampered.
  • Network logs (SMB connections, DNS queries) are absent, preventing confirmation of the remote share interactions with 10.44.24.9.
  • No evidence of scheduled tasks, services, or registry persistence mechanisms is available in this artifact; additional artifacts (Task Scheduler, Registry, WMI) should be examined.
  • The large number of dismhost.exe entries are old (2021) and may be unrelated, but without file metadata they cannot be definitively ruled out.

Next steps: Correlate these shimcache entries with process creation logs, network traffic, and other persistence artifacts to verify actual execution and assess the extent of lateral movement and credential‑access activity.

Amcache (amcache) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Execution of Sysinternals PsExec tools from a user’s Downloads folder shortly before the ransomware event.
  • Evidence:
  • 2024-02-06T22:14:12.373672+00:00c:\users\admin\downloads\sysinternalssuite\psexec.exe – publisher “sysinternals – www.sysinternals.com” – row 71.
  • 2024-02-07T21:00:11.248564+00:00c:\users\administrator\downloads\sysinternalssuite\psexec64.exe – publisher “sysinternals – www.sysinternals.com” – row 72.
  • 2024-02-06T22:14:14.995445+00:00c:\users\admin\downloads\sysinternalssuite\psexec64.exe – publisher “sysinternals – www.sysinternals.com” – row 73.
  • Why it matters: PsExec is a well‑known remote execution tool used by attackers for lateral movement and to launch payloads such as ransomware. Its presence on user download locations (rather than the standard Sysinternals store) and the timing (within days of the Feb 12 Red Petya screen) align with the suspicion of PsExec misuse.
  • Alternative explanation: Sysinternals tools are legitimate and may have been downloaded for legitimate administration. However, their location in a user’s Downloads directory and lack of accompanying system‑wide installation hint at ad‑hoc use.
  • Verify: Correlate these file records with Windows Event Logs, PowerShell logs, and Network traces for PsExec service creation or remote SMB connections around 2024‑02‑06 to 2024‑02‑09.
  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Presence of unknown executables with no publisher metadata in user‑level folders.
  • Evidence:
  • 2023-09-24T21:08:17.211145+00:00c:\windows\system32\aggregatorhost.exe – publisher blank – row 1.
  • 2024-02-07T21:00:10.342958+00:00c:\users\admin\desktop\dir.exe – publisher blank – row 13.
  • 2024-02-07T21:00:10.562542+00:00c:\users\admin\desktop\rename.exe – publisher blank – row 80.
  • Why it matters: Executables lacking publisher information and residing outside typical system directories are often indicative of custom or malicious tools. Their appearance close to the incident window (Feb 07) could suggest staging or execution of payloads.
  • Alternative explanation: These could be benign utilities placed by IT staff or users (e.g., a custom script named dir.exe). Without hash or further context, the intent is unclear.
  • Verify: Compute SHA‑1 hashes of the files and submit them to threat‑intel platforms; examine last‑access timestamps, creation/modification times, and related command‑line logs (e.g., Prefetch/ShimCache).
  • [SEVERITY: MEDIUM] [CONFIDENCE: LOW] Installation of network‑reconnaissance utilities (Nmap, Zenmap, Npcap).
  • Evidence:
  • 2024-02-06T21:01:08.309662+00:00c:\program files (x86)\nmap\ncat.exe – publisher blank – row 59.
  • 2024-02-06T21:01:08.326410+00:00c:\program files (x86)\nmap\ndiff.exe – publisher blank – product “zenmap” – row 60.
  • 2024-02-07T21:00:11.233940+00:00c:\users\admin\downloads\nmap-7.93-setup.exe – publisher “insecure.org” – product “nmap” – row 62.
  • 2024-02-06T21:01:08.124117+00:00c:\program files\npcap\npcap.sys – publisher “insecure.com llc.” – product “npcap” – row 67.
  • Why it matters: Nmap is frequently used by attackers for internal network mapping before lateral movement. Its appearance shortly before the ransomware event could indicate reconnaissance.
  • Alternative explanation: Nmap is also a common legitimate security‑testing tool; the presence alone does not prove malicious intent.
  • Verify: Look for corresponding command‑line usage in Prefetch or Event Logs; check for network scans in firewall or IDS logs around the same dates.
  • **[SEVERITY: LOW] [CONFIDENCE: HIGH] No evidence of the Red Petya binary (redpetya.exe) in the Amcache inventory.**
  • Evidence: The full Amcache record list (rows 1‑539) contains no entry where path ends with redpetya.exe.
  • Why it matters: Absence suggests the ransomware binary was either executed from a location not captured by Amcache, deleted before the snapshot, or delivered via in‑memory execution.
  • Alternative explanation: The ransomware may have been run from a removable drive or remote share not recorded in Amcache.
  • Verify: Search other artifacts (ShimCache, Prefetch, $MFT, or memory dumps) for redpetya.exe or its hash.

IOC Status

  • redpetya.exe (FileName)Not Observed – No matching path entry in Amcache.
  • psexec (SuspiciousTool)Observed – See rows 71‑73 (Sysinternals PsExec binaries in user download folders).

Data Gaps

  1. Time coverage ends 2024‑02‑09 21:00:06, three days before the ransomware screen appeared (2024‑02‑12). Any activity after this cutoff is invisible in this artifact.
  2. Missing SHA‑1 hashes for all entries; without hash values we cannot directly compare to threat‑intel databases or confirm file integrity.
  3. No command‑line or process‑creation data (e.g., Prefetch, ShimCache) in this export, limiting the ability to confirm execution of the listed binaries.
  4. Potential tampering: The deduplication comments indicate many duplicate records were collapsed; while not inherently suspicious, it reduces granularity that might reveal rapid re‑creation of files.
  5. Other useful artifacts: ShimCache, Prefetch, Windows Event Logs (Security, Sysmon), network flow logs, and memory snapshots would help confirm the actual execution of PsExec, the unknown executables, and any lateral movement or ransomware payload deployment.

---
All conclusions are drawn strictly from the provided Amcache data; no external information was fabricated.

BAM/DAM (bam) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: CRITICAL] [CONFIDENCE: HIGH] Execution of PsExec tools from a user‑download directory.
  • Evidence:
  • 2024‑02‑06T22:14:12.975912+00:00 – \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe (row 13)
  • 2024‑02‑09T22:55:44.556122+00:00 – \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe (row 23)
  • Why it matters: PsExec is a known credential‑stealing and lateral‑movement tool; its execution from a user’s Downloads folder shortly before the ransomware display strongly suggests it was used to propagate or trigger the attack.
  • Alternative explanation: An administrator may have been testing PsExec for legitimate remote administration; however the timing (days before the Red Petya event) and placement in a non‑system folder make malicious use more likely.
  • Verify: Correlate with Windows Security logs (4624, 4648) and Sysmon Event 1/5 entries for the same timestamps to confirm the source account and remote targets.
  • [SEVERITY: MEDIUM] [CONFIDENCE: HIGH] Execution of network‑reconnaissance tools (Nmap suite).
  • Evidence:
  • 2024‑02‑05T23:43:02.682171+00:00 – \Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe (row 15)
  • 2024‑02‑08T19:06:34.806301+00:00 – \Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe (row 17)
  • 2024‑02‑05T23:42:44.420574+00:00 – \Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe (row 16)
  • Why it matters: Nmap components are frequently used by attackers for internal host discovery and port scanning prior to lateral movement; their presence indicates possible pre‑attack reconnaissance.
  • Alternative explanation: Legitimate security testing or IT staff installing the toolset.
  • Verify: Review Event 1 (process creation) and network connection logs for outbound scans originating from the host at the same timestamps.
  • [SEVERITY: LOW] [CONFIDENCE: HIGH] Execution of generic system utilities often abused by ransomware (cmd.exe, rundll32.exe).
  • Evidence:
  • 2024‑02‑09T22:53:10.175224+00:00 – \Device\HarddiskVolume2\Windows\System32\cmd.exe (row 12)
  • 2024‑02‑09T20:59:30.651415+00:00 – \Device\HarddiskVolume2\Windows\System32\rundll32.exe (row 18)
  • Why it matters: These binaries are routinely leveraged to launch payloads or execute scripts; their near‑simultaneous appearance on the night of Feb 9 may be part of the ransomware execution chain.
  • Alternative explanation: Normal user or system task (e.g., script execution, maintenance).
  • Verify: Examine command‑line arguments in Sysmon Event 1 or PowerShell logs to determine what commands were run.

---

IOC Status

  • redpetya.exeNot Observed – No entry for this filename appears in the BAM/DAM records.
  • PsExec (both PsExec.exe and PsExec64.exe) → Observed – See rows 13 and 23 (timestamps above).

---

Data Gaps

  • Time coverage: BAM/DAM data ends at 2024‑02‑09 22:55 UTC, three days before the ransomware screen was first seen (12 Feb 2024). Any execution activity on 12 Feb or later is absent.
  • Missing fields: No user SID, process command‑line, parent‑process ID, or network‑connection data are captured, limiting attribution and impact assessment.
  • Potential log tampering: The _dedup_comment indicates many duplicate events were collapsed; while expected for BAM, it obscures the exact count of executions, which could hide burst activity.
  • Other artifacts needed:
  • Sysmon (Event 1/5/6) logs for full process‑creation trees and command‑line arguments.
  • Security Event Log (4624/4648) to see authentication events tied to PsExec usage.
  • Prefetch/Amcache to verify whether redpetya.exe was ever executed on this host.
  • Network traffic captures (e.g., Zeek, NetEvent) for evidence of lateral movement or exfiltration after the PsExec timestamps.

These gaps mean the current BAM/DAM view provides strong indication of tool execution but cannot conclusively map the full attack timeline or confirm the presence of the ransomware binary on this particular server.

UserAssist (userassist) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • **[SEVERITY: CRITICAL] [CONFIDENCE: HIGH] Execution of PsExec binaries from the Administrator’s user profile.
  • Evidence:
  • Row 27 – C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, 1 execution, 2024‑02‑06T22:14:10.115000Z, user admin.
  • Row 14 – C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe, 1 execution, 2024‑02‑06T22:14:12.356998Z, user admin.
  • Why it matters: PsExec is a well‑known LOLBin used for remote code execution and lateral movement; its launch via Explorer indicates interactive use that could have been leveraged to spread the ransomware.
  • Alternative explanation: An administrator may have been performing legitimate remote‑execution testing or maintenance.
  • Verify: Correlate with Windows Security Event logs (4624, 4688) and Sysmon for network connections originated from the PsExec processes; check for remote service creation or SMB connections at the same timestamps.
  • **[SEVERITY: HIGH] [CONFIDENCE: HIGH] Frequent interactive use of cmd.exe.
  • Evidence: Row 13 – {1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\cmd.exe, 7 executions, 2024‑02‑09T22:53:05.400000Z, user admin.
  • Why it matters: HIGH count of command‑prompt launches shortly before the ransomware display suggests possible manual command‑line activity (e.g., script execution, privilege escalation).
  • Alternative explanation: Routine administrative tasks using the command prompt.
  • Verify: Review command‑line logging (Event 4688, Sysmon 1) for the specific cmd.exe processes to identify supplied arguments and any subsequent file writes or network activity.
  • **[SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Execution of Nmap/Zenmap GUI.
  • Evidence: Row 19 – {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Nmap\zenmap.exe, 2 executions, 2024‑02‑06T21:09:13.195999Z, user admin.
  • Why it matters: Network scanning tools are often used in the reconnaissance phase of an intrusion; the timing coincides with other suspicious activity.
  • Alternative explanation: A legitimate network audit performed by an admin.
  • Verify: Examine network logs for outbound scans from the host at the same times; check if Nmap was run with aggressive options.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] One‑off launch of psshutdown64.exe.
  • Evidence: Row 12 – C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, 1 execution, 2024‑02‑05T23:14:20.084999Z, user admin.
  • Why it matters: psshutdown can be used to reboot or shut down remote machines, a technique sometimes employed before ransomware encryption.
  • Alternative explanation: Accidental or test execution of the utility.
  • Verify: Look for corresponding system shutdown/reboot events (Event 1074, Sysmon 12) around the timestamp.

IOC Status

  • redpetya.exeNot Observed – The UserAssist artifact only records Explorer‑launched programs; no entry for redpetya.exe appears, so its presence cannot be confirmed via this data source.
  • PsExecObserved – Executed twice (PsExec.exe and PsExec64.exe) by user admin on 2024‑02‑06 (see rows 27 & 14).

Data Gaps

  • Temporal coverage: The latest UserAssist entry is 2024‑02‑09 22:53 UTC; there is no data after the ransomware display (12 Feb 2024), leaving a gap for the CRITICAL compromise window.
  • Scope limitation: UserAssist only logs programs launched through Explorer (GUI). It does not capture:
  • Command‑line only executions (e.g., scheduled tasks, services, remote PowerShell).
  • Execution by other accounts (e.g., SYSTEM, SERVICE) that may have run redpetya.exe.
  • Network activity, file writes, or registry modifications associated with the observed launches.
  • Missing fields: No command‑line arguments, parent‑process IDs, or hashes; these are needed to confirm whether the PsExec instances were used to launch the ransomware or other malicious payloads.
  • Recommended additional artifacts:
  1. Windows Security Event Log (4624, 4648, 4688) – to see logon sessions and process creation details.
  2. Sysmon operational log – for full process trees, hashes, and network connections.
  3. PowerShell transcription/Module logs – to detect hidden script execution.
  4. **Windows Shortcut (.lnk) and Scheduled Task artifacts** – may contain execution of redpetya.exe outside Explorer.

These supplementary sources are required to determine the full extent of the compromise, confirm lateral movement, and locate the redpetya.exe binary.

Recycle Bin (recyclebin) MEDIUM
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Deletion of a Sysinternals utilities archive shortly before the ransomware incident.
  • Evidence: 2024-02-05T23:14:49.615999+00:00, C:\Users\admin\Downloads\SysinternalsSuite.zip, 50.6 MB, admin (row 2).
  • Why it matters: Sysinternals tools (e.g., PsExec, ProcDump, AccessChk) are frequently used for credential dumping, lateral movement, and post‑compromise activity; removing the archive from the system may indicate an attempt to hide tool usage after malicious actions.
  • Alternative explanation: The administrator may have simply cleaned up a downloaded utilities package after legitimate use.
  • Verify: Correlate this timestamp with Windows Event Logs (e.g., Process Creation events, Sysmon logs) and network logs for any PsExec or Sysinternals executable launches around 2024‑02‑05 – 2024‑02‑06.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] Deletion of a large share.zip file from the desktop.**
  • Evidence: 2024-02-06T22:14:44.067999+00:00, C:\Users\admin\Desktop\share.zip, 0.65 GB, admin (row 1).
  • Why it matters: The size suggests it could contain data staged for exfiltration or a payload; its removal may be an attempt to erase evidence.
  • Alternative explanation: The file could be a routine user archive (e.g., personal documents, software bundle) that the admin decided to discard.
  • Verify: Examine prior file creation/modification events for share.zip and any associated file access or network transfer logs to determine its contents and purpose.

IOC Status

  • redpetya.exe → Not Observed. (No record of this filename appears in the Recycle Bin data.)
  • psexec → Not Observed. (No explicit reference to PsExec executable or usage appears in the Recycle Bin data.)

Data Gaps

  • The Recycle Bin artifact provides only deletion timestamps, paths, file sizes, and usernames. It lacks:
  • The contents of the deleted ZIP archives, preventing determination of whether they held malicious payloads, credentials, or exfiltrated data.
  • Creation/modification timestamps for the files, which would help place the deletions in the overall attack timeline.
  • Process execution logs (e.g., Sysmon, Security Event ID 4688) that could confirm whether Sysinternals tools or PsExec were launched around the deletion times.
  • Network activity logs that could show data transfer of the share.zip payload.
  • Coverage of the CRITICAL window on 12 Feb 2024 when the ransomware displayed; the recycle‑bin timestamps end on 6 Feb, leaving a gap of six days with no evidence from this artifact.
  • To strengthen the investigation, additional artifacts such as System/Event logs, PowerShell transcription logs, Sysmon event streams, Windows Defender alerts, and network flow records should be collected and correlated with the timestamps above.
Browser History (browser.history) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: HIGH] External FTP connection to an un‑trusted IP address.
  • Evidence: 2024-02-07T16:57:31.964310+00:00, URL ftp://185.239.106.67/branchoffice.example.com/, browser iexplore, username admin (row 50).
  • Why it matters: FTP to a public IP can be used for data exfiltration or to fetch additional payloads; the host 185.239.106.67 is not a known internal service.
  • Alternative explanation: Could be a legitimate file transfer by an administrator; however the timing (just after the ransomware event) and lack of other internal FTP logs make malicious use plausible.
  • Verify: Capture network traffic (PCAP) for the time window around 2024‑02‑07 and query external threat intel on 185.239.106.67 for known C2 or malicious activity.
  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Download and local storage of Sysinternals Suite (includes PsExec).
  • Evidence 1: 2024-02-05T23:13:17.260740+00:00, URL https://www.bing.com/search?q=download+sysinternals+suite…, title download sysinternals suite - Search, username admin (row 8).
  • Evidence 2: 2024-02-05T23:13:27.154423+00:00, URL https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite, title Sysinternals Suite - Sysinternals \| Microsoft Learn, username admin (row 11).
  • Evidence 3: 2024-02-05T23:13:45.314323+00:00, URL file:///C:/Users/admin/Downloads/SysinternalsSuite.zip, username admin (row 43).
  • Why it matters: Sysinternals contains tools (PsExec, ProcDump, AccessChk) frequently leveraged for credential dumping and lateral movement; the presence of a local ZIP suggests the tools were staged on the compromised host.
  • Alternative explanation: Administrator may have legitimately downloaded Sysinternals for troubleshooting. The proximity to the ransomware event raises suspicion.
  • Verify: Examine file system for the presence of the downloaded ZIP, hash it, and compare against known malicious variants; review process creation logs for psexec.exe or other Sysinternals utilities executed after 2024‑02‑05.
  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Use of Nmap download pages – possible network reconnaissance.
  • Evidence: 2024-02-05T23:40:22.322380+00:00, URL https://www.bing.com/search?...download+nmap…, title download nmap - Search, username admin (row 12). Follow‑up URLs to Softonic download pages (rows 17‑20).
  • Why it matters: Nmap is a network scanning tool; downloading it shortly before the ransomware incident could indicate pre‑attack reconnaissance.
  • Alternative explanation: Admin testing network tools; no execution evidence in this artifact.
  • Verify: Check for nmap.exe binaries on disk and correlate with any subsequent network scan logs (e.g., Windows Firewall, IDS alerts).
  • [SEVERITY: MEDIUM] [CONFIDENCE: LOW] Local access to potentially sensitive scripts and credential files.
  • Evidence: Multiple file:/// entries on 2024‑02‑05/07 for C:/scripts/activeDirectory_user_import.csv (row 45), C:/share/Clark.Nicholson/Documents/account_password.xlsx (row 46), C:/share/Clark.Nicholson/Documents/account_edit.docx (row 47), and C:/Users/admin/Desktop/RyukReadMe.txt (row 48).
  • Why it matters: Access to AD import scripts and password spreadsheets may indicate preparation for credential harvesting or lateral movement.
  • Alternative explanation: Routine administrative work; no indication of exfiltration in this artifact.
  • Verify: Audit file timestamps, ACLs, and look for copies of these files elsewhere (e.g., network shares, external uploads).
  • [SEVERITY: LOW] [CONFIDENCE: LOW] Repeated visits to Microsoft Edge welcome pages.
  • Evidence: Numerous rows from 2023‑11‑04 to 2024‑02‑05 showing URLs like https://go.microsoft.com/fwlink/... and Welcome to Microsoft Edge (rows 1‑7, 23‑31, etc.).
  • Why it matters: Likely benign browser onboarding; no direct link to the incident.
  • Alternative explanation: Normal user activity.
  • Verify: Not needed for incident response.

IOC Status

  • redpetya.exeNot Observed (no record of this filename in the browser history).
  • psexecNot Observed (no URL or file reference to psexec.exe; however, Sysinternals Suite download is observed, which contains PsExec).

Data Gaps

  • Missing execution logs: No records of processes launched (e.g., psexec.exe, redpetya.exe, nmap.exe). Without Sysmon or Windows Event logs, we cannot confirm tool execution.
  • Limited network data: Only FTP URLs are visible; full network traffic capture is needed to see whether the FTP session succeeded or if other C2 channels were used.
  • File system artefacts absent: The browser history does not contain hashes or existence checks for the downloaded ZIPs; a file‑system scan would reveal whether the binaries are present and their timestamps.
  • No timestamps after 2024‑02‑07: The artifact ends shortly after the ransomware display was observed; later activity (post‑infection) cannot be assessed here.
  • User context ambiguity: Both admin and Administrator accounts appear; privilege levels and session separation are unclear.

Further artefacts to request: Sysmon/event logs, Windows Prefetch, MFT entries for the downloaded files, network PCAPs covering 2024‑02‑05 – 2024‑02‑12, and any Windows Security logs indicating credential dumping or lateral movement.

Browser Downloads (browser.downloads) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Download of Sysinternals Suite (potential source of PsExec).
  • Evidence: row_ref 1 – 2024‑02‑05T23:13:32.211950 Z → C:\Users\admin\Downloads\SysinternalsSuite.zip from https://download.sysinternals.com/files/SysinternalsSuite.zip (state = complete, browser = edge, user = admin). Also row_ref 3 – 2023‑11‑04T15:25:24.686308 Z → C:\Users\Administrator\Downloads\SysinternalsSuite.zip from the same URL (complete, user = Administrator).
  • Why it matters: Sysinternals Suite contains PsExec, a tool explicitly mentioned as a suspicious indicator and commonly used for lateral movement and privilege escalation in ransomware campaigns. The presence of a recent download (Feb 5, 2024) a week before the ransomware display suggests possible preparation for the attack.
  • Alternative explanation: Sysinternals tools are frequently used by legitimate administrators for troubleshooting; the download could be a routine maintenance activity.
  • Verify: Search the Prefetch, AmCache, or Windows Event Logs for execution of any executable within the downloaded Sysinternals Suite (e.g., psexec.exe) on the same host.
  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Download of Nmap installer.
  • Evidence: row_ref 2 – 2024‑02‑05T23:41:28.640888 Z → C:\Users\admin\Downloads\nmap-7.93-setup.exe from https://gsf-fl.softonic.com/.../nmap-7.93-setup.exe?... (state = complete, browser = edge, user = admin).
  • Why it matters: Nmap is a network discovery/scanning tool that can be employed by attackers to map internal hosts prior to lateral movement. Its download shortly before the ransomware incident may indicate reconnaissance activity.
  • Alternative explanation: Nmap is a legitimate security utility; the download may reflect routine security testing by an admin.
  • Verify: Check for execution of nmap-7.93-setup.exe and subsequent nmap.exe processes, plus any command‑line arguments indicating host scanning, in process creation logs or Sysmon event streams.

IOC Status

  • redpetya.exeNot Observed – No download entry for redpetya.exe appears in the browser‑downloads artifact.
  • psexecNot Observed as a named file, but Indirectly indicated by the Sysinternals Suite download (see Finding 1).

Data Gaps

  • The artifact only shows download events; there are no execution logs (Prefetch, AmCache, Sysmon, or Event ID 4688) to confirm whether the downloaded Sysinternals Suite or Nmap were actually run.
  • No timestamps after 2024‑02‑05 are present, leaving a gap of one week (Feb 6‑12) during which the ransomware became visible. Activity in that window cannot be assessed from this source.
  • Missing fields such as file hash (SHA‑256) prevent verification of the exact binaries (e.g., to rule out tampered or maliciously repackaged tools).
  • No evidence of PsExec execution, credential‑dumping tools, or redpetya.exe download/execution; correlating with other artifacts (process creation, network connections, SMB logs) would be required to confirm lateral movement or ransomware deployment.

Recommended next steps

  1. Query Windows Event Logs, Prefetch, AmCache, and Sysmon for any execution of psexec.exe, nmap.exe, or files extracted from the Sysinternals ZIP between 2024‑02‑05 and 2024‑02‑12.
  2. Collect file hash values of the downloaded archives from the filesystem and compare against known good Microsoft/Softonic hashes.
  3. Review SMB/PowerShell remote execution logs for evidence of PsExec or other remote service usage.
  4. Expand the timeline with endpoint detection logs (e.g., Windows Defender ATP) to cover the missing week leading up to the ransomware display.
Activities Cache (activitiescache) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
None – the Activities Cache artifact contains no records, so no suspicious behavior can be observed.

IOC Status

  • FileName – redpetya.exeNot Assessable – the artifact has no entries to indicate execution or access of this file.
  • SuspiciousTool – psexecNot Assessable – no activity records are present that could show usage of PsExec.

Data Gaps

  • The Activities Cache database is empty (Record count: 0, Time range: N/A to N/A). Consequently, there are no timestamps, application names, document paths, or URLs to analyze.
  • Absence of any timeline data prevents verification of user activity before, during, or after the ransomware event, including potential use of remote‑execution tools, privilege‑escalation utilities, or access to sensitive files.
  • No evidence of log clearing or tampering can be assessed from this artifact because the source itself provides no entries.

Recommended Next Steps

  • Acquire additional artefacts that capture process creation (e.g., Sysmon, Windows Event Logs), command‑line usage, or network connections to confirm or refute the use of PsExec and execution of redpetya.exe.
  • Examine registry Run/RunOnce keys, scheduled tasks, and Services registry for persistence mechanisms associated with Red Petya.
  • Collect credential‑access artefacts (e.g., LSASS dumps, Mimikatz logs) and file‑system audit logs to assess privilege‑escalation and lateral‑movement activity.
SRUM Network Data (sru.network_data) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

IOC Status

  • redpetya.exe → Not Assessable. No SRUM network records to indicate activity from this binary.
  • psexec → Not Assessable. SRUM network data contains no entries to evaluate usage of PsExec or any related process.

Data Gaps

  • The SRUM Network Data artifact contains zero records (Record count: 0) and no timestamps, application names, or byte counts, rendering any analysis of network activity impossible.
  • Absence of time ranges prevents correlation with the reported incident on 12 Feb 2024.
  • Without per‑application network usage, we cannot verify lateral‑movement tools (e.g., PsExec), ransomware execution (redpetya.exe), or any data exfiltration.
  • No evidence of log clearing or intentional tampering is visible, but the complete lack of entries could itself indicate that the SRUM database was cleared, disabled, or the collection failed.

Recommended Follow‑up

  • Acquire additional artifacts: Windows Event Logs (Security, PowerShell, Sysmon), Prefetch, MRU, and the SRUM “App” and “Connection” tables, as well as any firewall or network flow logs that cover the timeframe around 12 Feb 2024.
  • Verify SRUM service status and collection settings on the host to ensure it was enabled during the incident period.
  • Examine the host for remnants of PsExec usage (e.g., scheduled tasks, service creation, SMB temporary files) and the redpetya.exe binary (hashes, file timestamps, execution records) using other forensic sources.
SRUM Application (sru.application) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Execution of network‑reconnaissance tools (Nmap).
  • Evidence: 2024-02-06T00:06:00+00:00\Device\HarddiskVolume2\Program Files (x86)\Nmap\nmap.exe (SID S‑1‑5‑21‑1057484085‑1795310446‑2370380301‑2611) – foreground cycle time = 221 269 249 429 cycles.

2024-02-06T00:06:00+00:00\Device\HarddiskVolume2\Program Files (x86)\Nmap\zenmap.exe (same SID) – foreground cycle time = 227 183 733 421 cycles.

  • Why it matters: Nmap is a common post‑compromise scanning tool; its execution under an administrative SID suggests an adversary was mapping the network after gaining privileged access.
  • Alternative explanation: An authorized administrator could have been performing legitimate network testing. The large cycle times are consistent with a long‑running scan, but the presence of the tool on a server that previously displayed ransomware is unusual.
  • Verify: Correlate with other logs (e.g., Windows Firewall, PowerShell transcript, network flow logs) to confirm whether Nmap was invoked intentionally or maliciously and identify any hosts it probed.
  • **[SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Repeated execution of DismHost.exe from transient Temp directories.**
  • Evidence: Multiple rows (e.g., 2023-12-13T09:13:00+00:00...\Temp\20E089F8-EEF8-44B1-BBEC-E61F1584B677\DismHost.exe SID S‑1‑5‑18, foreground cycle time = 5 407 258 740; 2023-12-14T20:18:00+00:00...\Temp\F454C235-AF12-47F8-9364-F55374E33E80\DismHost.exe foreground cycle time = 2 794 428 053; etc., spanning the whole investigation window).
  • Why it matters: DismHost.exe is a legitimate DISM component, but its frequent launch from random %TEMP% paths is a known “Living‑off‑the‑Land” technique used to evade detection and execute code with elevated privileges.
  • Alternative explanation: Some automated maintenance or imaging scripts may invoke DISM from temporary locations; however, the sheer volume and the varied GUID‑named folders are atypical for routine updates.
  • Verify: Examine the command‑line arguments for each DismHost.exe instance (via Process Creation logs or Sysmon) and check the associated payload files for signs of malicious modules or scripts.
  • **[SEVERITY: LOW] [CONFIDENCE: LOW] Presence of a user‑level rename.exe on the desktop.**
  • Evidence: 2024-02-09T22:56:00+00:00\Device\HarddiskVolume2\Users\admin\Desktop\rename.exe (SID S‑1‑5‑21‑1057484085‑1795310446‑2370380301‑2611) – foreground cycle time = 13 284 139 184 cycles.
  • Why it matters: Unknown utility on the desktop could be a custom tool used by an attacker to rename or manipulate files (e.g., ransomware payload).
  • Alternative explanation: The file may be a benign third‑party utility installed by an administrator. No other corroborating evidence (e.g., hash, execution context) is present.
  • Verify: Hash the binary, compare against known software catalogs, and check for any associated scheduled tasks or registry Run keys.
  • [SEVERITY: NONE] No evidence of the primary IOCs.
  • The SRUM data contains no records for redpetya.exe or psexec.exe.

IOC Status

  • redpetya.exeNot Observed (no matching app value in the SRUM records).
  • psexecNot Observed (no matching app value).

Data Gaps

  • Timeline coverage: The SRUM records end at 2024‑02‑09 22:56 UTC, two days before the ransomware incident reported on 12 Feb 2024. Consequently, any malicious activity that triggered the “Red Petya” display (including execution of redpetya.exe or PsExec lateral movement) is outside the observable window.
  • Missing fields: The SRUM export provides only foreground_cycle_time (CPU cycles spent in the foreground). It lacks explicit process command‑line arguments, hashes, network connections, or parent‑process IDs, limiting the ability to confirm “living‑off‑the‑land” misuse of DismHost.exe or to associate the Nmap executions with a specific attacker command.
  • Potential log tampering: The _dedup_comment column shows extensive deduplication (e.g., “Deduplicated 1346 records”). While deduplication is a normal export optimization, it obscures the raw event count and may hide spikes in activity that could be indicative of an attack.
  • Additional artifacts needed:
  1. Process Creation logs ( Sysmon Event 4688 / 4689 ) for full command‑line capture of DismHost.exe, rename.exe, and the Nmap binaries.
  2. Network session logs (Windows Filtering Platform, NetFlow, or PCAP) to see if the Nmap tools actually scanned internal hosts.
  3. Security Event Log (Event 7045 – Service Installation, Event 4624 – Logons) around the 12‑Feb window to catch PsExec usage or new services.
  4. **File‑system metadata (hashes, timestamps) for the rename.exe and any redpetya.exe binaries** that may reside elsewhere on the disk.

*Given the lack of direct evidence for the ransomware binary and PsExec, the most actionable leads are the Nmap scans and the anomalous DismHost.exe launches, which should be pursued with the supplemental logs above.*

Shellbags (shellbags) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: CRITICAL] [CONFIDENCE: HIGH] Remote administrative‑share enumeration across multiple hosts.
  • Evidence:
  • 2024-02-08T08:39:20+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.8\c$\Users (row 4).
  • 2024-02-08T08:22:12+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.1\c$\Users (row 17).
  • 2024-02-08T08:16:56+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.6\c$\Users (row 22).
  • 2024-02-08T08:29:48+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.7\c$\Users (row 27).
  • 2024-02-08T08:33:14+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.9\c$\Users (row 32).
  • 2023-09-24T20:02:32+00:00 – accessed Network\<USERS_PROPERTY_VIEW {999534523}>\WIN‑NI9FBK23SLO.branchoffice.example.com\home$\Jorden.Davidson (row 40).
  • Why it matters: Enumerating the default administrative shares (c$) on several internal IPs is a classic step in lateral‑movement attacks, often performed with tools such as PsExec. The timestamps (early February 2024) are immediately after the Red Petya outbreak, suggesting post‑infection credential use.
  • Alternative explanation: Legitimate administrators could be browsing shared user profiles for routine maintenance. However, the breadth (five distinct hosts) and concentration of activity within a single day are atypical for routine work.
  • Verify: Pull Windows Security Event logs (4624/4625) for the same timestamps to confirm use of credentialed remote execution (e.g., PsExec, SMB Session) from the source account (admin).
  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Presence of Sysinternals tooling and a suspicious archive on the desktop.
  • Evidence:
  • 2024-02-05T23:13:42+00:00My Computer\{088e3905‑0323‑4b02‑9826‑5d99428e115f}\SysinternalsSuite.zip (row 60).
  • 2024-02-07T04:04:00+00:00My Computer\Desktop\important.zip (row 63).
  • Why it matters: Sysinternals tools are frequently used for privilege escalation, credential dumping, and lateral movement. The “important.zip” may be a staging archive for exfiltration or for bundling malicious payloads (e.g., Red Petya).
  • Alternative explanation: An administrator could have legitimately downloaded Sysinternals for troubleshooting and later placed a personal archive on the desktop. The lack of accompanying execution events leaves intent uncertain.
  • Verify: Search the Prefetch, AmCache, and Event Log (4688) for executions of psexec.exe, procmon.exe, procdump.exe, or any process that extracts the zip contents.
  • [SEVERITY: MEDIUM] [CONFIDENCE: LOW] Extensive browsing of user profile folders on remote hosts.
  • Evidence: Multiple rows (e.g., rows 5‑14, 18‑19, 23‑24, 28‑29, 33‑34) show access to c$\Users\<username> and their Documents folders across hosts 10.44.24.8, .1, .6, .7, .9 during 2023‑2024.
  • Why it matters: Indicates collection of user data (documents) that could be staged for exfiltration or searched for credentials.
  • Alternative explanation: Routine admin audit of user folders. The repeated pattern across many accounts may still be benign.
  • Verify: Correlate with file‑creation/deletion (USN/Journal) events for copied files and with network traffic logs for outbound data transfers.

IOC Status

  • redpetya.exeNot Observed – No entry with that filename appears in the Shellbag data.
  • psexecNot Observed – No explicit psexec.exe or related execution record is present; however, the remote admin‑share activity is consistent with PsExec usage.

Data Gaps

  • Missing atime/ctime: The ts_atime and ts_btime columns are empty, limiting ability to differentiate first‑time access from later updates.
  • No process execution records: Shellbags capture folder navigation only; they do not show which executables were run, so we cannot directly confirm execution of PsExec, Sysinternals tools, or redpetya.exe.
  • No file‑level hashes or content: Without hash data we cannot verify whether important.zip or SysinternalsSuite.zip contain malicious payloads.
  • Limited timeline coverage: The earliest entries are from mid‑2023; any earlier compromise activity (e.g., initial Red Petya infection) would not be reflected here.
  • Potential log tampering: The presence of many deduplicated rows suggests some consolidation of identical events; however, no explicit evidence of log clearing is visible in this artifact.

Recommended next steps

  1. Collect Windows Security, Sysmon, and PowerShell logs for the Feb 2024 window to identify credentialed remote executions (e.g., PsExec) and process creation of Sysinternals binaries.
  2. **Extract and hash the SysinternalsSuite.zip and important.zip** to compare against known malicious signatures.
  3. Query SMB session logs (e.g., Netlogon, NetShare) on the involved hosts (10.44.24.*) to confirm successful connections and potential credential reuse.
  4. Review network flow captures for outbound traffic from the workstation to external IPs that could indicate exfiltration of the “important.zip” contents.
MUIcache (muicache) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious entries are present in the MUICache data. All recorded FriendlyAppName / ApplicationCompany pairs correspond to legitimate Windows system components or Microsoft‑signed applications located in standard system directories (e.g., C:\Windows\system32, C:\Program Files). There are no entries for the file name redpetya.exe, nor any known lateral‑movement tools such as psexec.exe, and no anomalous executables in user‑writable locations.

IOC Status

  • redpetya.exeNot Observed – no row references a path or description matching this filename.
  • psexecNot Observed – no entry references “psexec” or its typical executable name.

Data Gaps

  • No timestamps: MUICache does not store execution times, so it cannot be correlated with the Feb 12 2024 incident or used to build a timeline.
  • Limited scope: The artifact only records display strings (friendly name, company) for executables that have been launched; it provides no command‑line arguments, parent‑process information, or user context beyond the username field.
  • Potentially missing evidence: If the malicious binary was executed from a non‑standard location (e.g., %TEMP%, user profile) and later deleted, it would still appear in MUICache if the display string was cached. No such entries are present, suggesting either the binary was never run on this host or the cache was cleared/tampered with.
  • Corroboration needed: To confirm or refute compromise, additional artifacts (Prefetch, Amcache, Shimcache, process creation logs, PowerShell transcript logs, network connections, Sysmon events) should be examined. These can provide timestamps, execution paths, and evidence of credential‑access tools (e.g., Mimikatz) or lateral‑movement activity.

In summary, the MUICache artifact does not reveal any execution of the Red Petya ransomware binary or PsExec, and shows only normal Microsoft‑signed activity. Further forensic sources are required to determine whether the ransomware was present or executed on this system.

SAM Users (sam) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Nothing suspicious observed in the SAM Users artifact: only the default built‑in accounts (Administrator, Guest, DefaultAccount, WDAGUtilityAccount) are present, each with placeholder timestamps (1601‑01‑01) and no evidence of recent creation, privilege changes, or password modifications【row_ref=1-4】.

IOC Status

  • redpetya.exe → Not Assessable (file artifact not present in SAM data).
  • psexec → Not Assessable (process/tool artifact not present in SAM data).

Data Gaps

  • Temporal coverage: The SAM snapshot is from 2023‑09‑24, more than four months before the February 12 2024 ransomware incident, so any account activity around the compromise window cannot be observed here.
  • Missing fields: No account creation dates, modification timestamps, or explicit group‑membership data are available; only last‑login/password fields (all set to the sentinel value 1601‑01‑01) are present, limiting ability to detect newly created or altered privileged accounts.
  • No evidence of tampering: The deduplication comment indicates records were de‑duplicated, but no gaps or missing rows are evident within this limited view.
  • Correlative artifacts needed: To assess privileged‑access abuse or lateral‑movement tools (e.g., PsExec), consult Security Event logs (Event IDs 4720, 4722, 4732, 4624, 4648), process creation logs, and Registry autorun locations. These would provide creation/modification timestamps, group membership changes, and execution traces that the SAM file alone cannot reveal.
Defender Quarantine (defender.quarantine) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

IOC Status

  • redpetya.exeNot Observed. No quarantine entries reference this filename.
  • psexecNot Observed. No quarantine entries reference PsExec or related tool names.

Data Gaps

  • The Defender Quarantine artifact contains zero records (Record count: 0), providing no timestamps, file paths, threat names, or detection contexts to analyze.
  • Without any entries, we cannot assess whether any malicious files were detected, whether persistence locations were targeted, or if repeated quarantines occurred.
  • The absence of data prevents verification of remediation success/failure, correlation with other logs (e.g., EVTX), or determination of any timeline of malicious activity.

Recommended next steps

  • Acquire additional forensic sources (e.g., Windows Defender operational logs, EVTX files, Sysmon events, PowerShell transcript logs) that record detection and remediation actions.
  • Collect Windows Registry hives, scheduled task definitions, and startup folder contents to investigate persistence mechanisms that may have been used by Red Petya or PsExec.
  • Examine network connection logs and SMB session records to corroborate any lateral movement attempts.

Audit Trail

View Audit Entries (111)
Timestamp Action Details
2026-02-26T12:03:45.195Z case_created {"case_id": "9110b811-141a-417f-a333-f029766c459c","creation_time": "2026-02-26T12:03:45Z","name": "Case 2026-02-26 12:03:45"}
2026-02-26T12:04:02.293Z evidence_intake {"dissect_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []}
2026-02-26T12:04:02.294Z image_opened {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"}
2026-02-26T12:04:08.252Z parsing_started {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"}
2026-02-26T12:04:08.376Z parsing_completed {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv","duration_seconds": 0.124179,"function": "runkeys","record_count": 4}
2026-02-26T12:04:08.376Z parsing_started {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"}
2026-02-26T12:04:11.672Z parsing_completed {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv","duration_seconds": 3.295663,"function": "tasks","record_count": 469}
2026-02-26T12:04:11.672Z parsing_started {"artifact_key": "services","artifact_name": "Services","function": "services"}
2026-02-26T12:04:13.647Z parsing_completed {"artifact_key": "services","artifact_name": "Services","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv","duration_seconds": 1.975661,"function": "services","record_count": 2332}
2026-02-26T12:04:13.648Z parsing_started {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"}
2026-02-26T12:04:13.703Z parsing_completed {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/cim.csv","duration_seconds": 0.055436,"function": "cim","record_count": 0}
2026-02-26T12:04:13.703Z parsing_started {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"}
2026-02-26T12:04:20.771Z parsing_completed {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv","duration_seconds": 7.068334,"function": "shimcache","record_count": 1390}
2026-02-26T12:04:20.771Z parsing_started {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"}
2026-02-26T12:04:21.126Z parsing_completed {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv","duration_seconds": 0.355014,"function": "amcache","record_count": 615}
2026-02-26T12:04:21.127Z parsing_started {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"}
2026-02-26T12:04:21.150Z parsing_completed {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv","duration_seconds": 0.023312,"function": "bam","record_count": 101}
2026-02-26T12:04:21.150Z parsing_started {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"}
2026-02-26T12:04:21.178Z parsing_completed {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv","duration_seconds": 0.027911,"function": "userassist","record_count": 101}
2026-02-26T12:04:21.178Z parsing_started {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"}
2026-02-26T12:04:21.190Z parsing_completed {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv","duration_seconds": 0.011627,"function": "recyclebin","record_count": 2}
2026-02-26T12:04:21.190Z parsing_started {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"}
2026-02-26T12:04:22.545Z parsing_completed {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv","duration_seconds": 1.355747,"function": "browser.history","record_count": 60}
2026-02-26T12:04:22.546Z parsing_started {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"}
2026-02-26T12:04:23.040Z parsing_completed {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv","duration_seconds": 0.494389,"function": "browser.downloads","record_count": 4}
2026-02-26T12:04:23.040Z parsing_started {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"}
2026-02-26T12:04:23.062Z parsing_completed {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/activitiescache.csv","duration_seconds": 0.021865,"function": "activitiescache","record_count": 0}
2026-02-26T12:04:23.062Z parsing_started {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"}
2026-02-26T12:04:23.930Z parsing_completed {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.network_data.csv","duration_seconds": 0.868076,"function": "sru.network_data","record_count": 0}
2026-02-26T12:04:23.930Z parsing_started {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"}
2026-02-26T12:04:39.037Z parsing_completed {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv","duration_seconds": 15.106736,"function": "sru.application","record_count": 73965}
2026-02-26T12:04:39.037Z parsing_started {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"}
2026-02-26T12:04:39.136Z parsing_completed {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv","duration_seconds": 0.098833,"function": "shellbags","record_count": 203}
2026-02-26T12:04:39.136Z parsing_started {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"}
2026-02-26T12:04:39.211Z parsing_completed {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv","duration_seconds": 0.074759,"function": "muicache","record_count": 596}
2026-02-26T12:04:39.211Z parsing_started {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"}
2026-02-26T12:04:39.216Z parsing_completed {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv","duration_seconds": 0.004795,"function": "sam","record_count": 8}
2026-02-26T12:04:39.216Z parsing_started {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"}
2026-02-26T12:04:39.226Z parsing_completed {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/defender.quarantine.csv","duration_seconds": 0.009947,"function": "defender.quarantine","record_count": 0}
2026-02-26T12:04:46.453Z prompt_submitted {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."}
2026-02-26T12:04:46.966Z analysis_started {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:04:46.971Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/runkeys.csv","artifact_key": "runkeys","projection_columns": ["ts","name","command","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv"}
2026-02-26T12:04:46.971Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/runkeys.csv","annotated_rows": 2,"artifact_key": "runkeys","removed_records": 2,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/runkeys.csv","variant_columns": ["ts"]}
2026-02-26T12:05:06.802Z analysis_completed {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 19.836158,"status": "success","token_count": 393}
2026-02-26T12:05:06.802Z analysis_started {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:05:06.819Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/tasks.csv","artifact_key": "tasks","projection_columns": ["task_path","uri","date","user_id","display_name","run_level","arguments","command","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv"}
2026-02-26T12:05:06.819Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/tasks.csv","annotated_rows": 71,"artifact_key": "tasks","removed_records": 123,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/tasks.csv","variant_columns": ["date","arguments"]}
2026-02-26T12:06:19.817Z analysis_completed {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 73.014988,"status": "success","token_count": 1106}
2026-02-26T12:06:19.824Z analysis_started {"artifact_key": "services","artifact_name": "Services","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:06:19.846Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/services.csv","artifact_key": "services","projection_columns": ["ts","name","servicedll","imagepath","imagepath_args","start","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv"}
2026-02-26T12:06:19.846Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/services.csv","annotated_rows": 607,"artifact_key": "services","removed_records": 1725,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/services.csv","variant_columns": ["ts"]}
2026-02-26T12:08:45.732Z analysis_completed {"artifact_key": "services","artifact_name": "Services","duration_seconds": 145.908078,"status": "success","token_count": 1206}
2026-02-26T12:08:45.733Z analysis_started {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:08:45.733Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/cim.csv","annotated_rows": 0,"artifact_key": "cim","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/cim.csv","variant_columns": []}
2026-02-26T12:10:36.818Z analysis_completed {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 111.085007,"status": "success","token_count": 334}
2026-02-26T12:10:36.818Z analysis_started {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:10:36.828Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shimcache.csv","artifact_key": "shimcache","projection_columns": ["last_modified","name","path","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv"}
2026-02-26T12:10:36.828Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shimcache.csv","annotated_rows": 292,"artifact_key": "shimcache","removed_records": 876,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shimcache.csv","variant_columns": ["last_modified"]}
2026-02-26T12:13:11.260Z analysis_completed {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 154.441672,"status": "success","token_count": 1754}
2026-02-26T12:13:11.269Z analysis_started {"artifact_key": "amcache","artifact_name": "Amcache","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:13:11.280Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/amcache.csv","artifact_key": "amcache","projection_columns": ["mtime_regf","path","publisher","version","product_name","size","is_oscomponent","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv"}
2026-02-26T12:13:11.280Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/amcache.csv","annotated_rows": 5,"artifact_key": "amcache","removed_records": 403,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/amcache.csv","variant_columns": ["mtime_regf"]}
2026-02-26T12:14:47.717Z analysis_completed {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 96.447378,"status": "success","token_count": 1445}
2026-02-26T12:14:47.725Z analysis_started {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:14:47.727Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/bam.csv","artifact_key": "bam","projection_columns": ["ts","path","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv"}
2026-02-26T12:14:47.727Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/bam.csv","annotated_rows": 31,"artifact_key": "bam","removed_records": 69,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/bam.csv","variant_columns": ["ts"]}
2026-02-26T12:15:35.015Z analysis_completed {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 47.289834,"status": "success","token_count": 1059}
2026-02-26T12:15:35.016Z analysis_started {"artifact_key": "userassist","artifact_name": "UserAssist","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:15:35.018Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/userassist.csv","artifact_key": "userassist","projection_columns": ["ts","path","number_of_executions","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv"}
2026-02-26T12:15:35.018Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/userassist.csv","annotated_rows": 2,"artifact_key": "userassist","removed_records": 2,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/userassist.csv","variant_columns": ["ts"]}
2026-02-26T12:16:32.122Z analysis_completed {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 57.105818,"status": "success","token_count": 1162}
2026-02-26T12:16:32.123Z analysis_started {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:16:32.124Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/recyclebin.csv","artifact_key": "recyclebin","projection_columns": ["ts","path","filesize","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv"}
2026-02-26T12:16:32.124Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/recyclebin.csv","annotated_rows": 0,"artifact_key": "recyclebin","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/recyclebin.csv","variant_columns": ["ts"]}
2026-02-26T12:16:58.887Z analysis_completed {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 26.763627,"status": "success","token_count": 732}
2026-02-26T12:16:58.887Z analysis_started {"artifact_key": "browser.history","artifact_name": "Browser History","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:16:58.889Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.history.csv","artifact_key": "browser.history","projection_columns": ["ts","browser","url","title","visit_count","from_url","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv"}
2026-02-26T12:16:58.889Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.history.csv","annotated_rows": 9,"artifact_key": "browser.history","removed_records": 10,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.history.csv","variant_columns": ["ts"]}
2026-02-26T12:17:58.207Z analysis_completed {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 59.319968,"status": "success","token_count": 1388}
2026-02-26T12:17:58.208Z analysis_started {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:17:58.209Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.downloads.csv","artifact_key": "browser.downloads","projection_columns": ["ts_start","ts_end","browser","path","url","size","state","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv"}
2026-02-26T12:17:58.209Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/browser.downloads.csv","annotated_rows": 0,"artifact_key": "browser.downloads","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/browser.downloads.csv","variant_columns": ["ts_start","ts_end"]}
2026-02-26T12:18:52.370Z analysis_completed {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 54.161908,"status": "success","token_count": 950}
2026-02-26T12:18:52.370Z analysis_started {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:18:52.371Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/activitiescache.csv","annotated_rows": 0,"artifact_key": "activitiescache","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/activitiescache.csv","variant_columns": []}
2026-02-26T12:20:45.445Z analysis_completed {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 113.074464,"status": "success","token_count": 368}
2026-02-26T12:20:45.445Z analysis_started {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:20:45.446Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.network_data.csv","annotated_rows": 0,"artifact_key": "sru.network_data","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.network_data.csv","variant_columns": []}
2026-02-26T12:22:39.590Z analysis_completed {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 114.144389,"status": "success","token_count": 370}
2026-02-26T12:22:39.590Z analysis_started {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:22:40.266Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.application.csv","artifact_key": "sru.application","projection_columns": ["ts","app","user","foreground_cycle_time","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv"}
2026-02-26T12:22:40.266Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sru.application.csv","annotated_rows": 151,"artifact_key": "sru.application","removed_records": 73734,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sru.application.csv","variant_columns": ["ts","foreground_cycle_time"]}
2026-02-26T12:26:05.261Z analysis_completed {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 205.670674,"status": "success","token_count": 1306}
2026-02-26T12:26:06.131Z analysis_started {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:26:06.133Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shellbags.csv","artifact_key": "shellbags","projection_columns": ["ts_mtime","ts_atime","ts_btime","type","path","username","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv"}
2026-02-26T12:26:06.133Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/shellbags.csv","annotated_rows": 37,"artifact_key": "shellbags","removed_records": 46,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/shellbags.csv","variant_columns": ["ts_mtime","ts_atime","ts_btime"]}
2026-02-26T12:28:59.014Z analysis_completed {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 172.883207,"status": "success","token_count": 1321}
2026-02-26T12:28:59.017Z analysis_started {"artifact_key": "muicache","artifact_name": "MUIcache","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:28:59.022Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/muicache.csv","artifact_key": "muicache","projection_columns": ["name","value","path","username"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv"}
2026-02-26T12:28:59.022Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/muicache.csv","annotated_rows": 0,"artifact_key": "muicache","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/muicache.csv","variant_columns": []}
2026-02-26T12:31:50.738Z analysis_completed {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 171.721687,"status": "success","token_count": 521}
2026-02-26T12:31:50.739Z analysis_started {"artifact_key": "sam","artifact_name": "SAM Users","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:31:50.739Z artifact_ai_projection {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sam.csv","artifact_key": "sam","projection_columns": ["ts","rid","fullname","username","admincomment","lastlogin","lastpasswordset","lastincorrectlogin","_dedup_comment"],"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv"}
2026-02-26T12:31:50.739Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/sam.csv","annotated_rows": 4,"artifact_key": "sam","removed_records": 4,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/sam.csv","variant_columns": ["ts","lastlogin","lastpasswordset","lastincorrectlogin"]}
2026-02-26T12:34:10.300Z analysis_completed {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 139.561392,"status": "success","token_count": 380}
2026-02-26T12:34:10.300Z analysis_started {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:34:10.301Z artifact_deduplicated {"analysis_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed_deduplicated/defender.quarantine.csv","annotated_rows": 0,"artifact_key": "defender.quarantine","removed_records": 0,"source_csv": "/mnt/g/AIFT/cases/9110b811-141a-417f-a333-f029766c459c/parsed/defender.quarantine.csv","variant_columns": []}
2026-02-26T12:37:42.014Z analysis_completed {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 211.713937,"status": "success","token_count": 304}
2026-02-26T12:37:42.015Z analysis_started {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "gpt-oss:120b","provider": "local"}
2026-02-26T12:39:28.294Z analysis_completed {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 106.278767,"status": "success","token_count": 2816}
2026-02-26T12:44:14.866Z hash_verification {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "/mnt/g/AIFT/20240212-decrypted-Windows_Server_2022.E01"}