AIFT Forensic Report | Flip Forensics
| Filename | 20240212-decrypted-Windows_Server_2022.E01 |
|---|---|
| SHA-256 | 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7 |
| MD5 | 6f912bbaa1500f4556bd6b4fa8466f02 |
| File Size | 1.46 GB (1572845047 bytes) |
| Hostname | WIN-NI9FBK23SLO |
| OS | Windows Server 2022 Standard (NT 10.0) 20348.1850 |
| Domain | branchoffice.example.com |
| IPs | 10.44.0.12 |
On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.
Look for any suspicious behaviour aside from these two IOC's.
---
The system shows strong indicators of lateral movement and reconnaissance consistent with RedTeam tactics. A scheduled task used PsExec with admin credentials to execute rename.exe (likely a malicious payload) around the incident date (Feb 6, 2024). Additional evidence includes network scanning tools (Nmap), Sysinternals suite downloads from admin accounts, and suspicious FTP activity to a known malicious IP. While Red Petya.exe was not directly observed, the tooling and timing align with its known behavior. Confidence: HIGH due to multiple cross-artifact correlations. Severity: CRITICAL due to potential privilege escalation and network access.
---
SysinternalsSuite.zip (50.6 MB), likely cleanup after tool use.nmap-7.93-setup.exe from an obfuscated Softonic URL.C:\Users\admin\Downloads\.nmap-7.93-setup.exe executed (Nmap installed).185.239.106.67 (known for hosting malicious payloads).rename.exe.---
| IOC | Status | Artifacts |
|---|---|---|
redpetya.exe | Not Observed | No reference in any artifact. |
psexec | Observed | Scheduled Tasks, BAM/DAM, amcache. |
---
Initial Access: Unknown (no direct evidence).
Execution:
rename.exe (likely a malicious payload) on Feb 6.Persistence:
Privilege Escalation:
Lateral Movement:
185.239.106.67 (suspicious) and access to admin shares (Shellbags).Collection:
Exfiltration:
Note: Red Petya ransomware was not directly observed, but the tooling and timing align with its tactics. Ryuk-related files (RyukReadMe.txt) may indicate a separate attack or misattribution.
---
redpetya.exe.1601-01-01), possibly tampered.rename.exe was malicious or benign (e.g., a script).---
rename.exe**: Check file hashes against malware databases (VirusTotal).rename.exe Context**: Look for parent processes or command-line arguments in event logs.SysinternalsSuite.zip contents (if possible).---
Note: The absence of Red Petya binaries does not rule out compromise. The combination of PsExec, network scanning, and admin access strongly suggests a RedTeam-style attack. Further analysis is CRITICAL to confirm the adversary’s intent and scope.
Findings
No suspicious findings detected in the Run/RunOnce keys. The entries correspond to legitimate system services (SecurityHealthSystray.exe and VBoxTray.exe) with no obfuscation, encoded arguments, or suspicious execution contexts.
IOC Status
Data Gaps
Verification
Findings
[CRITICAL:HIGH] [CONFIDENCE:HIGH] A scheduled task used PsExec to execute a command with admin credentials, potentially facilitating malicious activity.
task_path: C:\Windows\system32\tasks\Enterpries backup, command: C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, arguments: "-accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe".-u admin -p letmein (explicit credentials), suggesting an attempt to escalate privileges or execute malicious code via rename.exe.rename.exe file hash and execution logs (e.g., C:\Users\admin\Desktop\rename.exe) for malicious artifacts.---
IOC Status
---
Data Gaps
rename.exe was executed or its contents.C:\Users\admin\Desktop\rename.exe or its parent directory.---
Summary
The "Enterpries backup" task leverages PsExec with hardcoded credentials, raising red flags for privilege escalation or lateral movement. While redpetya.exe isn’t directly observed, the use of PsExec and the suspicious command structure align with Red Petya’s known tactics. Further analysis of the rename.exe file and execution context is CRITICAL.
Findings
No suspicious findings were detected in the services artifact. The data does not contain evidence of malicious activity, unauthorized persistence, or configuration anomalies beyond the already identified IOCs (PsExec and redpetya.exe).
IOC Status
redpetya.exe or related paths.Data Gaps
Severity Summary
Notes
Findings
Nothing suspicious detected in the WMI Persistence artifact due to absence of data.
IOC Status
Data Gaps
Final Note
This artifact provides no actionable insight due to incomplete data. Prioritize examining other artifacts like EVTX logs, prefetch, or registry persistence mechanisms for evidence of WMI-based persistence or execution of redpetya.exe.
The provided **shimcache.csv file contains records from the Windows AppCompatCache**, which is used to track application compatibility shims (redirects) for older applications. Here's a breakdown of the data and how to interpret it:
---
timestamp**: When the entry was last modified (UTC).name**: The name of the AppCompatCache entry (e.g., Microsoft.Windows.ShellExperienceHost).value**: The actual file path or registry key associated with the entry (e.g., C:\Windows\SystemApps\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Application).id**: A unique identifier for the entry (e.g., cw5n1h2txyewy for Microsoft apps).deduplicated**: Indicates if multiple entries for the same executable exist (e.g., "Deduplicated 3 records with matching event data and different timestamp/ID").---
C:\Windows\SystemApps\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Application are normal and part of Windows 10/11 core apps.msedge.exe and MicrosoftEdgeUpdate.exe are standard for Edge browser and its updates.svchost.exe, services.exe, lsass.exe, and fontdrvhost.exe are CRITICAL system processes and not a cause for concern.taskmgr.exe (Task Manager) and explorer.exe (File Explorer) are also legitimate.VBoxTray.exe, VBoxService.exe, and VBoxDrvInst.exe indicate VirtualBox is installed and running. These are safe if you use VirtualBox.MpCmdRun.exe, MsMpEng.exe, and NisSrv.exe are part of Windows Defender (Microsoft Antivirus) and are standard.---
rename.exe, taskkill.exe if not part of your system).1601-01-01T00:00:00+00:00 might indicate old or corrupted entries).C:\Windows\System32, C:\Program Files).---
shimcache_viewer** (Open Source):HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppCompatCache for raw ShimCache data.---
cleanmgr /f or use PowerShell: Remove-Item -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\AppCompatCache\*" -Recurse
shimcache_viewer to compare your ShimCache with a known clean baseline for anomalies.---
The ShimCache entries in your CSV are mostly legitimate system or application data, especially for Microsoft Edge, Windows components, and VirtualBox. However, inspect for unfamiliar entries or timestamps that don't align with known system activity. Use tools like shimcache_viewer or Process Explorer for deeper analysis. If unsure about a specific entry, verify it against your installed software or consult a security tool.
Analysis of amcache.csv for RedTeam Activity
Key Findings:
The psexec.exe file is present in the system (located at C:\Users\admin\downloads\sysinternalssuite\psexec.exe). While Sysinternals tools are legitimate, Psexec is commonly used for remote code execution and is a hallmark of RedTeam tactics. Its presence indicates potential lateral movement or remote exploitation.
The nmap.exe file (installed via nmap-7.93-setup.exe) is also detected. Nmap is a network scanning tool often used for reconnaissance in RedTeam operations. Its presence suggests network discovery or vulnerability assessment activities.
Tools like dir.exe (a Windows CLI utility) and rename.exe (a legitimate file-renaming tool) are present in the logs. While these are standard, their combination with Psexec and Nmap could indicate script-driven automation or post-exploitation activities.
Oracle VM VirtualBox Guest Additions components (e.g., vboxservice.exe, vboxtray.exe) are listed. This might suggest the system was used in a virtualized environment, potentially for evasion or analysis. However, it could also indicate a pivot point for attacks.
The timestamps in the CSV (e.g., 2023-09-24T21:08:16.953560+00:00) may align with the system's unresponsiveness. While the exact timeline is unclear, the presence of these tools around the incident window (e.g., 2023-09-24) could indicate a timeline for the RedTeam operation.
Conclusion:
The amcache.csv contains indicators of compromise (IoCs) consistent with RedTeam tactics:
Recommendations:
psexec.exe with -h for stealth).C:\Users\admin\downloads\ directory).Next Steps:
netstat or tcpview.Final Note:
The amcache.csv alone may not confirm the RedTeam's involvement, but the combination of tooling and timing strongly suggests a targeted RedTeam operation. Further forensic analysis is required to validate the attack vector and scope.
Findings
nmap-7.93-setup.exe and NPFInstall.exe from the admin's Downloads folder.2024-02-05T23:43:02.682171+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe) and Row 16 (2024-02-05T23:42:44.420574+00:00, \Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe).PsExec64.exe and PsExec.exe from the admin's Downloads folder.2024-02-06T22:14:12.975912+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe) and Row 23 (2024-02-09T22:55:44.556122+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe).IOC Status
redpetya.exe: Not Observed. The BAM data does not show execution of redpetya.exe.psexec: Observed. PsExec64.exe and PsExec.exe were executed.Data Gaps
Summary
The BAM data shows suspicious tool execution (nmap, Npcap, PsExec) from the admin's Downloads folder, which aligns with adversarial reconnaissance and lateral movement patterns. However, the ransomware binary redpetya.exe was not observed here. Further analysis of related artifacts (prefetch, amcache, memory) is needed to confirm intent.
Findings
[CRITICAL: HIGH] Unusual execution of Sysinternals tools from temporary directories.
C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, 1 execution, 2024-02-05), Row 14/27 (PsExec64.exe/PsExec.exe, 1 execution, 2024-02-06).PsExec and psshutdown are commonly used for remote execution and process management, aligning with known ransomware attack vectors. Launching them from temporary directories (e.g., Temp1_SysinternalsSuite.zip) suggests potential extraction of malicious payloads or preparation for lateral movement.Temp1_SysinternalsSuite.zip and cross-reference with other artifacts (e.g., network traffic, Registry for persistence).[HIGH: MEDIUM] Elevated use of administrative tools from non-standard paths.
{A77F5D77-2E2B-44C3-A6A2-ABA601054A51}\Nmap\Nmap - Zenmap GUI.lnk, 1 execution, 2024-02-05), Row 75 ({7C5A40EF-A0FB-4BFC-834A-C0F2E0B9FA8E}\Nmap\zenmap.exe, 2 executions, 2024-02-06).number_of_executions increasing over time) could indicate network mapping or vulnerability assessment prior to an attack.IOC Status
Data Gaps
PsExec via cmd.exe) are not logged here.UEME_CTLCUACount:ctor entries for admin (row 1) post-incident (Feb 12) could indicate tampering.Conclusion: While no direct evidence of Red Petya is found in UserAssist, the presence of Sysinternals tools and Nmap usage suggests potential preparation for lateral movement or reconnaissance, warranting further investigation.
Findings
SysinternalsSuite.zip (50.6 MB) by admin on 2024-02-05T23:14:49.615999.C:\Users\admin\Downloads\SysinternalsSuite.zip deleted by admin.psexec, which aligns with the suspected lateral movement technique. Deletion shortly after potential execution may indicate cleanup of tools used in compromise.SysinternalsSuite.zip for suspicious binaries or scripts.IOC Status
SysinternalsSuite.zip file may contain psexec, but its contents are not accessible in this data.Data Gaps
admin user is mentioned, but no indication of privilege escalation or credential access.---
Note: No other suspicious deletions or behaviors were identified in this artifact.
Findings
account_password.xlsx) suggests potential exfiltration or lateral movement prep.sysinternals.exe or nmap.exe in process/registry artifacts.RyukReadMe.txt).IOC Status
Data Gaps
visit_count but no timestamp).SysinternalsSuite.zip may have been executed, but no evidence here).Conclusion
Suspicious tool downloads and FTP access align with pre-attack reconnaissance, but no direct evidence of Red Petya execution or PsExec use is present. Further analysis of execution/event logs is required.
Findings
row_ref=2, url=https://gsf-fl.softonic.com/...nmap-7.93-setup.exe, ts_start=2024-02-05T23:41:28.640888+00:00.nmap-7.93-setup.exe was run.SysinternalsSuite.zip was downloaded twice (once by admin, once by Administrator) from the Microsoft Sysinternals server, with a retry attempt.row_ref=1 (admin), row_ref=3 (Administrator), and row_ref=4 (cancelled download).SysinternalsSuite (1).zip) may indicate failed downloads or tampering.amcache.hve, prefetch) to determine if Sysinternals tools were executed.IOC Status
psexec in the download URLs or filenames.Data Gaps
amcache.hve, prefetch) to confirm if downloaded files were run.eventvwr.msc) to correlate downloads with potential compromise timelines.Conclusion
No direct evidence of Red Petya or PsExec use in the download records. However, the nmap download from an obfuscated URL and the repeated Sysinternals downloads warrant further investigation into potential reconnaissance or privilege escalation activities.
Findings
No suspicious activity found in the Activities Cache due to lack of data.
IOC Status
Data Gaps
Verification Needed
Final Note
The Activities Cache provides no actionable insights due to its empty state. Focus on other artifacts (e.g., execution logs, network traffic, registry changes) to validate the suspected compromise.
Findings
No suspicious findings detected in the SRUM Network Data artifact. The dataset contains no records, timestamps, or application-specific network usage metrics, precluding analysis of network behavior, exfiltration patterns, or tool usage.
IOC Status
Data Gaps
Verification
Conclusion
Nothing suspicious detected in this artifact due to the absence of data.
Analysis of System Logs and Security Findings:
rename.exe on the Desktop**rename.exe in the Users\admin\Desktop directory is unusual. While renaming files is a common task, the name rename.exe is not a standard Windows utility. Malicious actors often use such names to obfuscate their activities.nmap-7.93-setup.exe**nmap-7.93-setup.exe (a network scanning tool) could indicate reconnaissance activity. While nmap itself is legitimate, its use without proper authorization may signal an attempt to map the network.nmap-7.93-setup.exe was installed intentionally (e.g., by a system administrator).DismHost.exe and MicrosoftEdgeUpdate.exe are frequently run from temporary directories (e.g., C:\Users\admin\AppData\Local\Temp). While this is normal for system updates, repeated or unexpected execution in these folders could indicate malicious activity.*.crypt, README.txt).S-1-5-21-1057484085-1795310446-2370380301-2611) executed multiple processes. While this is normal, elevated privileges can be exploited if compromised.---
Next Steps:
C:\Windows\System32\) with known-good hashes.Final Note: If the system is already compromised, isolate it from the network to prevent further damage. A full system wipe and restore from a trusted backup may be necessary.
Findings
[CRITICAL: HIGH] Multiple network shares accessed with internal IP addresses, including user home directories.
[CRITICAL: HIGH] Access to administrator user profiles and sensitive shares.
[CRITICAL: MEDIUM] Access to SysinternalsSuite and suspicious ZIP files.
Process Explorer) and ZIP files (e.g., important.zip) may indicate forensic analysis or data exfiltration.IOC Status
Data Gaps
---
No additional suspicious findings.
Analysis of muicache.csv in the Context of a Ransomware Attack
The muicache.csv file contains a list of file associations, program entries, and service descriptions. While it primarily reflects legitimate system and application data, there are redacted entries and anomalies that could indicate malicious activity (e.g., ransomware or persistence mechanisms). Below is a focused breakdown of findings:
---
"redacted" or "@redacted" in paths (e.g., @redacted, @C:\Windows\system32\redacted.dll) may indicate obfuscation of malicious files or services.redacted.exe, redacted.dll) that were hidden or renamed to evade detection."redacted" in @%SystemRoot%\system32\redacted.dll) may mask malicious behavior. For example:redacted could be a ransomware encryption module or backdoor.---
.zip, .enc, .lock extensions) or ransomware-specific file types."Encrypt files" or "Decrypt files" in a program description could indicate ransomware.@C:\Windows\system32\redacted.exe or @C:\Windows\Temp\redacted.exe (if present). These could be temporary files for ransomware execution.---
Remote Desktop, Windows Remote Management (WinRM), or WMI (e.g., @%SystemRoot%\system32\wsmsvc.dll) could be used for lateral movement. Check if these services are configured with elevated privileges.@%SystemRoot%\system32\svchost.exe) may be used for persistence or data exfiltration.---
AES, RSA, 7z), which are commonly used in ransomware."Encryptor.exe" or "Cipher.exe" in the muicache would be a red flag.@%SystemRoot%\system32\taskschd.msc) has entries with malicious payloads or hidden triggers.---
redacted files exist in the system.sc query or Get-Service (PowerShell) to check startup types and dependencies for suspicious services. Get-ChildItem -Recurse | Where-Object { $_.Name -like "*.enc" -or $_.Name -like "*.lock" }
C:\Users\*).---
| Category | Findings |
|---|---|
| Redacted Entries | Likely masking of ransomware payloads (e.g., redacted.exe, redacted.dll). |
| Suspicious Services | Services like redacted or Windows Remote Management may enable lateral movement. |
| File Encryption Clues | No explicit encryption tools in muicache, but redacted entries could hide such files. |
| Privilege Escalation | Services running under Local System may be used for persistence. |
---
Note: Without additional context (e.g., exact redacted paths or event logs), this analysis is hypothesis-driven. A thorough investigation of the redacted entries and system behavior is crucial for confirming ransomware presence.
Findings
No suspicious findings were detected in the SAM Users artifact.
IOC Status
Data Gaps
lastlogin, lastpasswordset, and lastincorrectlogin fields are set to 1601-01-01T00:00:00+00:00, a Windows placeholder for unknown dates. This could indicate tampering, log clearing, or lack of activity, but no direct evidence of compromise is present.Final Note
The SAM Users artifact does not contain evidence of unauthorized accounts, privilege escalation, or malicious tool execution. The absence of records near the incident window and the placeholder timestamps warrant further investigation into other artifacts (e.g., EVTX, Registry, or file system data).
Findings
No suspicious findings. The Defender Quarantine artifact contains zero records, providing no evidence of quarantined files or malware detection.
IOC Status
Data Gaps
This artifact provides no evidence of compromise, malware detection, or related activities. Further analysis requires examining execution logs, registry changes, or network traffic for lateral movement or persistence mechanisms.
| Timestamp | Action | Details |
|---|---|---|
| 2026-02-23T20:04:47.538Z | case_created | {"case_id": "9a3445ad-13c7-424f-a2e0-e5dc9855fefe","creation_time": "2026-02-23T20:04:47Z","name": "Case 2026-02-23 21:04:47"} |
| 2026-02-23T20:04:57.982Z | evidence_intake | {"dissect_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []} |
| 2026-02-23T20:04:57.982Z | image_opened | {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"} |
| 2026-02-23T20:05:03.005Z | parsing_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"} |
| 2026-02-23T20:05:03.091Z | parsing_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv","duration_seconds": 0.086228,"function": "runkeys","record_count": 4} |
| 2026-02-23T20:05:03.092Z | parsing_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"} |
| 2026-02-23T20:05:06.116Z | parsing_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv","duration_seconds": 3.023813,"function": "tasks","record_count": 469} |
| 2026-02-23T20:05:06.116Z | parsing_started | {"artifact_key": "services","artifact_name": "Services","function": "services"} |
| 2026-02-23T20:05:08.728Z | parsing_completed | {"artifact_key": "services","artifact_name": "Services","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv","duration_seconds": 2.612031,"function": "services","record_count": 2332} |
| 2026-02-23T20:05:08.728Z | parsing_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"} |
| 2026-02-23T20:05:08.774Z | parsing_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\cim.csv","duration_seconds": 0.045478,"function": "cim","record_count": 0} |
| 2026-02-23T20:05:08.774Z | parsing_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"} |
| 2026-02-23T20:05:16.782Z | parsing_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv","duration_seconds": 8.008039,"function": "shimcache","record_count": 1390} |
| 2026-02-23T20:05:16.782Z | parsing_started | {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"} |
| 2026-02-23T20:05:17.210Z | parsing_completed | {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv","duration_seconds": 0.428191,"function": "amcache","record_count": 615} |
| 2026-02-23T20:05:17.211Z | parsing_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"} |
| 2026-02-23T20:05:17.229Z | parsing_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv","duration_seconds": 0.018777,"function": "bam","record_count": 101} |
| 2026-02-23T20:05:17.229Z | parsing_started | {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"} |
| 2026-02-23T20:05:17.256Z | parsing_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv","duration_seconds": 0.026745,"function": "userassist","record_count": 101} |
| 2026-02-23T20:05:17.256Z | parsing_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"} |
| 2026-02-23T20:05:17.267Z | parsing_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv","duration_seconds": 0.010128,"function": "recyclebin","record_count": 2} |
| 2026-02-23T20:05:17.267Z | parsing_started | {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"} |
| 2026-02-23T20:05:17.735Z | parsing_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv","duration_seconds": 0.467774,"function": "browser.history","record_count": 60} |
| 2026-02-23T20:05:17.735Z | parsing_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"} |
| 2026-02-23T20:05:17.935Z | parsing_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv","duration_seconds": 0.200292,"function": "browser.downloads","record_count": 4} |
| 2026-02-23T20:05:17.936Z | parsing_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"} |
| 2026-02-23T20:05:17.961Z | parsing_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\activitiescache.csv","duration_seconds": 0.025514,"function": "activitiescache","record_count": 0} |
| 2026-02-23T20:05:17.961Z | parsing_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"} |
| 2026-02-23T20:05:17.989Z | parsing_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.network_data.csv","duration_seconds": 0.027359,"function": "sru.network_data","record_count": 0} |
| 2026-02-23T20:05:17.989Z | parsing_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"} |
| 2026-02-23T20:05:39.313Z | parsing_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv","duration_seconds": 21.324073,"function": "sru.application","record_count": 73965} |
| 2026-02-23T20:05:39.313Z | parsing_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"} |
| 2026-02-23T20:05:39.405Z | parsing_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv","duration_seconds": 0.092035,"function": "shellbags","record_count": 203} |
| 2026-02-23T20:05:39.406Z | parsing_started | {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"} |
| 2026-02-23T20:05:39.497Z | parsing_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv","duration_seconds": 0.091175,"function": "muicache","record_count": 596} |
| 2026-02-23T20:05:39.497Z | parsing_started | {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"} |
| 2026-02-23T20:05:39.501Z | parsing_completed | {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv","duration_seconds": 0.004094,"function": "sam","record_count": 8} |
| 2026-02-23T20:05:39.501Z | parsing_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"} |
| 2026-02-23T20:05:39.508Z | parsing_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\defender.quarantine.csv","duration_seconds": 0.00663,"function": "defender.quarantine","record_count": 0} |
| 2026-02-23T20:05:49.376Z | prompt_submitted | {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."} |
| 2026-02-23T20:05:50.030Z | analysis_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:05:50.042Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\runkeys.csv","artifact_key": "runkeys","projection_columns": ["ts","name","command","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv"} |
| 2026-02-23T20:05:50.043Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\runkeys.csv","annotated_rows": 2,"artifact_key": "runkeys","removed_records": 2,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv","variant_columns": ["ts"]} |
| 2026-02-23T20:07:25.190Z | analysis_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 95.158884,"status": "success","token_count": 353} |
| 2026-02-23T20:07:25.191Z | analysis_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:07:25.228Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\tasks.csv","artifact_key": "tasks","projection_columns": ["task_path","uri","date","user_id","display_name","run_level","arguments","command","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv"} |
| 2026-02-23T20:07:25.228Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\tasks.csv","annotated_rows": 71,"artifact_key": "tasks","removed_records": 123,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv","variant_columns": ["date","arguments"]} |
| 2026-02-23T20:19:14.055Z | analysis_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 708.852836,"status": "success","token_count": 501} |
| 2026-02-23T20:19:14.065Z | analysis_started | {"artifact_key": "services","artifact_name": "Services","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:19:14.418Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\services.csv","artifact_key": "services","projection_columns": ["ts","name","servicedll","imagepath","imagepath_args","start","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv"} |
| 2026-02-23T20:19:14.418Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\services.csv","annotated_rows": 607,"artifact_key": "services","removed_records": 1725,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv","variant_columns": ["ts"]} |
| 2026-02-23T20:19:14.449Z | chunked_analysis_started | {"artifact_key": "services","csv_budget_per_chunk": 68312,"total_chunks": 2} |
| 2026-02-23T20:43:11.356Z | analysis_completed | {"artifact_key": "services","artifact_name": "Services","chunked": true,"duration_seconds": 1437.266502,"status": "success","token_count": 407} |
| 2026-02-23T20:43:11.356Z | analysis_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:43:11.357Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\cim.csv","annotated_rows": 0,"artifact_key": "cim","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\cim.csv","variant_columns": []} |
| 2026-02-23T20:44:36.302Z | analysis_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 84.944988,"status": "success","token_count": 248} |
| 2026-02-23T20:44:36.303Z | analysis_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:44:36.317Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shimcache.csv","artifact_key": "shimcache","projection_columns": ["last_modified","name","path","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv"} |
| 2026-02-23T20:44:36.317Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shimcache.csv","annotated_rows": 292,"artifact_key": "shimcache","removed_records": 876,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv","variant_columns": ["last_modified"]} |
| 2026-02-23T20:53:36.844Z | analysis_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 540.531913,"status": "success","token_count": 1023} |
| 2026-02-23T20:53:36.857Z | analysis_started | {"artifact_key": "amcache","artifact_name": "Amcache","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T20:53:36.873Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\amcache.csv","artifact_key": "amcache","projection_columns": ["mtime_regf","path","publisher","version","product_name","size","is_oscomponent","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv"} |
| 2026-02-23T20:53:36.873Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\amcache.csv","annotated_rows": 5,"artifact_key": "amcache","removed_records": 403,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv","variant_columns": ["mtime_regf"]} |
| 2026-02-23T21:04:42.446Z | analysis_completed | {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 665.577491,"status": "success","token_count": 737} |
| 2026-02-23T21:04:42.711Z | analysis_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:04:42.726Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\bam.csv","artifact_key": "bam","projection_columns": ["ts","path","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv"} |
| 2026-02-23T21:04:42.727Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\bam.csv","annotated_rows": 31,"artifact_key": "bam","removed_records": 69,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv","variant_columns": ["ts"]} |
| 2026-02-23T21:09:11.435Z | analysis_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 268.719019,"status": "success","token_count": 654} |
| 2026-02-23T21:09:11.436Z | analysis_started | {"artifact_key": "userassist","artifact_name": "UserAssist","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:09:11.455Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\userassist.csv","artifact_key": "userassist","projection_columns": ["ts","path","number_of_executions","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv"} |
| 2026-02-23T21:09:11.455Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\userassist.csv","annotated_rows": 2,"artifact_key": "userassist","removed_records": 2,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv","variant_columns": ["ts"]} |
| 2026-02-23T21:20:27.243Z | analysis_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 675.794897,"status": "success","token_count": 631} |
| 2026-02-23T21:20:27.245Z | analysis_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:20:27.248Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\recyclebin.csv","artifact_key": "recyclebin","projection_columns": ["ts","path","filesize","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv"} |
| 2026-02-23T21:20:27.249Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\recyclebin.csv","annotated_rows": 0,"artifact_key": "recyclebin","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv","variant_columns": ["ts"]} |
| 2026-02-23T21:22:35.595Z | analysis_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 128.347611,"status": "success","token_count": 384} |
| 2026-02-23T21:22:35.595Z | analysis_started | {"artifact_key": "browser.history","artifact_name": "Browser History","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:22:35.611Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.history.csv","artifact_key": "browser.history","projection_columns": ["ts","browser","url","title","visit_count","from_url","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv"} |
| 2026-02-23T21:22:35.612Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.history.csv","annotated_rows": 9,"artifact_key": "browser.history","removed_records": 10,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv","variant_columns": ["ts"]} |
| 2026-02-23T21:29:21.255Z | analysis_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 405.653366,"status": "success","token_count": 678} |
| 2026-02-23T21:29:21.257Z | analysis_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:29:21.261Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.downloads.csv","artifact_key": "browser.downloads","projection_columns": ["ts_start","ts_end","browser","path","url","size","state","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv"} |
| 2026-02-23T21:29:21.261Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.downloads.csv","annotated_rows": 0,"artifact_key": "browser.downloads","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv","variant_columns": ["ts_start","ts_end"]} |
| 2026-02-23T21:32:37.649Z | analysis_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 196.388791,"status": "success","token_count": 654} |
| 2026-02-23T21:32:37.650Z | analysis_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:32:37.655Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\activitiescache.csv","annotated_rows": 0,"artifact_key": "activitiescache","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\activitiescache.csv","variant_columns": []} |
| 2026-02-23T21:33:54.986Z | analysis_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 77.334313,"status": "success","token_count": 338} |
| 2026-02-23T21:33:54.986Z | analysis_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:33:54.987Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.network_data.csv","annotated_rows": 0,"artifact_key": "sru.network_data","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.network_data.csv","variant_columns": []} |
| 2026-02-23T21:35:11.217Z | analysis_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 76.229779,"status": "success","token_count": 320} |
| 2026-02-23T21:35:11.217Z | analysis_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:35:13.824Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.application.csv","artifact_key": "sru.application","projection_columns": ["ts","app","user","foreground_cycle_time","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv"} |
| 2026-02-23T21:35:13.824Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.application.csv","annotated_rows": 151,"artifact_key": "sru.application","removed_records": 73734,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv","variant_columns": ["ts","foreground_cycle_time"]} |
| 2026-02-23T21:45:51.688Z | analysis_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 640.459336,"status": "success","token_count": 897} |
| 2026-02-23T21:45:51.688Z | analysis_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:45:51.876Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shellbags.csv","artifact_key": "shellbags","projection_columns": ["ts_mtime","ts_atime","ts_btime","type","path","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv"} |
| 2026-02-23T21:45:51.877Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shellbags.csv","annotated_rows": 37,"artifact_key": "shellbags","removed_records": 46,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv","variant_columns": ["ts_mtime","ts_atime","ts_btime"]} |
| 2026-02-23T21:56:10.163Z | analysis_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 618.464317,"status": "success","token_count": 586} |
| 2026-02-23T21:56:10.377Z | analysis_started | {"artifact_key": "muicache","artifact_name": "MUIcache","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T21:56:10.421Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\muicache.csv","artifact_key": "muicache","projection_columns": ["name","value","path","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv"} |
| 2026-02-23T21:56:10.422Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\muicache.csv","annotated_rows": 0,"artifact_key": "muicache","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv","variant_columns": []} |
| 2026-02-23T22:06:47.971Z | analysis_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 637.583094,"status": "success","token_count": 1358} |
| 2026-02-23T22:06:47.971Z | analysis_started | {"artifact_key": "sam","artifact_name": "SAM Users","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T22:06:48.190Z | artifact_ai_projection | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sam.csv","artifact_key": "sam","projection_columns": ["ts","rid","fullname","username","admincomment","lastlogin","lastpasswordset","lastincorrectlogin","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv"} |
| 2026-02-23T22:06:48.190Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sam.csv","annotated_rows": 4,"artifact_key": "sam","removed_records": 4,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv","variant_columns": ["ts","lastlogin","lastpasswordset","lastincorrectlogin"]} |
| 2026-02-23T22:09:33.858Z | analysis_completed | {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 165.883586,"status": "success","token_count": 329} |
| 2026-02-23T22:09:33.858Z | analysis_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T22:09:33.939Z | artifact_deduplicated | {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\defender.quarantine.csv","annotated_rows": 0,"artifact_key": "defender.quarantine","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\defender.quarantine.csv","variant_columns": []} |
| 2026-02-23T22:12:10.951Z | analysis_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 157.090342,"status": "success","token_count": 265} |
| 2026-02-23T22:12:10.952Z | analysis_started | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "qwen3:8b","provider": "local"} |
| 2026-02-23T22:19:54.821Z | analysis_completed | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 463.859695,"status": "success","token_count": 1249} |
| 2026-02-24T17:00:41.502Z | hash_verification | {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01"} |