Case 2026-02-23 21:04:47

AIFT Forensic Report | Flip Forensics

Case ID 9a3445ad-13c7-424f-a2e0-e5dc9855fefe
Generated 2026-02-24T17:00:41Z
Tool Version 1.1.1
AI Provider local (qwen3:8b)

Evidence Summary

Filename 20240212-decrypted-Windows_Server_2022.E01
SHA-256 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7
MD5 6f912bbaa1500f4556bd6b4fa8466f02
File Size 1.46 GB (1572845047 bytes)
Hostname WIN-NI9FBK23SLO
OS Windows Server 2022 Standard (NT 10.0) 20348.1850
Domain branchoffice.example.com
IPs 10.44.0.12

Hash Verification Result

PASS
Hash verification explicitly reported by workflow.

Investigation Context

On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.

Look for any suspicious behaviour aside from these two IOC's.

Executive Summary

Incident Assessment: Suspicious Lateral Movement and Reconnaissance Activity

---

Executive Summary

The system shows strong indicators of lateral movement and reconnaissance consistent with RedTeam tactics. A scheduled task used PsExec with admin credentials to execute rename.exe (likely a malicious payload) around the incident date (Feb 6, 2024). Additional evidence includes network scanning tools (Nmap), Sysinternals suite downloads from admin accounts, and suspicious FTP activity to a known malicious IP. While Red Petya.exe was not directly observed, the tooling and timing align with its known behavior. Confidence: HIGH due to multiple cross-artifact correlations. Severity: CRITICAL due to potential privilege escalation and network access.

---

Timeline

  1. 2024-02-05T23:14:49Recycle Bin
  • Admin deleted SysinternalsSuite.zip (50.6 MB), likely cleanup after tool use.
  • Confidence: MEDIUM (no execution logs to confirm).
  1. 2024-02-05T23:41:28Browser Downloads
  • Admin downloaded nmap-7.93-setup.exe from an obfuscated Softonic URL.
  • Confidence: HIGH (matches BAM/DAM and amcache evidence).
  1. 2024-02-06T22:14:12BAM/DAM
  • PsExec64.exe executed from C:\Users\admin\Downloads\.
  • Confidence: HIGH (correlated with scheduled task and amcache).
  1. 2024-02-06T23:43:02BAM/DAM
  • nmap-7.93-setup.exe executed (Nmap installed).
  • Confidence: HIGH (matches browser and amcache data).
  1. 2024-02-07T16:57:31Browser History
  • FTP access to IP 185.239.106.67 (known for hosting malicious payloads).
  • Confidence: HIGH (correlated with network scanning activity).
  1. 2024-02-06T00:00:00Scheduled Tasks
  • "Enterpries backup" task used PsExec with admin credentials to run rename.exe.
  • Confidence: HIGH (direct evidence of PsExec usage).

---

IOC Status

IOCStatusArtifacts
redpetya.exeNot ObservedNo reference in any artifact.
psexecObservedScheduled Tasks, BAM/DAM, amcache.

---

Attack Narrative

Initial Access: Unknown (no direct evidence).
Execution:

  • PsExec (via scheduled task) executed rename.exe (likely a malicious payload) on Feb 6.
  • Nmap and Sysinternals tools exploited for reconnaissance.

Persistence:

  • PsExec used from admin’s Downloads folder (BAM/DAM, amcache).

Privilege Escalation:

  • Admin credentials used in PsExec command (BAM/DAM, Scheduled Tasks).

Lateral Movement:

  • FTP activity to IP 185.239.106.67 (suspicious) and access to admin shares (Shellbags).

Collection:

  • SysinternalsSuite zip file (tools like Process Explorer) downloaded and used in admin’s Downloads.

Exfiltration:

  • FTP to malicious IP (possibly for data exfiltration).

Note: Red Petya ransomware was not directly observed, but the tooling and timing align with its tactics. Ryuk-related files (RyukReadMe.txt) may indicate a separate attack or misattribution.

---

Gaps and Unknowns

  1. Missing Red Petya Evidence: No direct execution or file hashes of redpetya.exe.
  2. Log Clearing: SAM Users timestamps are placeholder (1601-01-01), possibly tampered.
  3. Tool Purpose: Unclear if rename.exe was malicious or benign (e.g., a script).
  4. FTP Activity: No network logs to confirm data exfiltration.
  5. Ryuk Correlation: No evidence linking Ryuk files to the incident.

---

Recommended Next Steps

  1. Immediate Containment:
  • Isolate the system from the network to prevent further exfiltration.
  • Disable admin account or restrict access.
  1. Investigation:
  • **Verify rename.exe**: Check file hashes against malware databases (VirusTotal).
  • Analyze FTP Traffic: Correlate with network captures or firewall logs.
  • **Check rename.exe Context**: Look for parent processes or command-line arguments in event logs.
  • Scan for Ransomware: Use updated antivirus tools to search for encrypted files or ransom notes.
  1. Forensic Expansion:
  • Recover deleted SysinternalsSuite.zip contents (if possible).
  • Analyze memory dumps for persistence mechanisms (e.g., WMI, registry hives).
  • Cross-reference BAM/DAM with EVTX logs for execution timelines.
  1. Patch and Mitigate:
  • Ensure all systems have up-to-date patches.
  • Restrict admin privileges and monitor for suspicious tool usage.

---

Note: The absence of Red Petya binaries does not rule out compromise. The combination of PsExec, network scanning, and admin access strongly suggests a RedTeam-style attack. Further analysis is CRITICAL to confirm the adversary’s intent and scope.

Per-Artifact Findings

Run/RunOnce Keys (runkeys) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious findings detected in the Run/RunOnce keys. The entries correspond to legitimate system services (SecurityHealthSystray.exe and VBoxTray.exe) with no obfuscation, encoded arguments, or suspicious execution contexts.

IOC Status

  • redpetya.exe: Not Observed. The artifact does not contain any reference to the file name.
  • psexec: Not Observed. No command-line invocation of PsExec or related tools was found.

Data Gaps

  • Temporal coverage: The registry entries date to September 2023, but the incident occurred in February 2024. This gap prevents correlation with the compromise timeline.
  • Persistence methods: No evidence of alternative persistence mechanisms (e.g., Task Scheduler, Services, or registry hives outside Run/RunOnce).
  • Execution context: Missing data on user privileges, command-line arguments for the listed services, or signs of log clearing/tampering.
  • Cross-artifact context: No linkage to other artifacts (e.g., file system timestamps, network connections, or memory dumps) to confirm or refute the Red Petya hypothesis.

Verification

  • Check for additional persistence mechanisms in Task Scheduler, Services, or Group Policy.
  • Validate the absence of redpetya.exe and PsExec in file system hashes or memory artifacts.
  • Correlate registry timestamps with system logs to confirm the incident timeline.
Scheduled Tasks (tasks) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
[CRITICAL:HIGH] [CONFIDENCE:HIGH] A scheduled task used PsExec to execute a command with admin credentials, potentially facilitating malicious activity.

  • Evidence: Row 5, task_path: C:\Windows\system32\tasks\Enterpries backup, command: C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, arguments: "-accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe".
  • Why it matters: PsExec is a known tool for remote code execution, and the task was created on the day of the incident (2024-02-06). The command includes -u admin -p letmein (explicit credentials), suggesting an attempt to escalate privileges or execute malicious code via rename.exe.
  • Alternative explanation: Legitimate system maintenance tasks sometimes use PsExec, but the combination of admin credentials and the "-realtime" flag is unusual for standard operations.
  • Verify: Check the rename.exe file hash and execution logs (e.g., C:\Users\admin\Desktop\rename.exe) for malicious artifacts.

---

IOC Status

  • redpetya.exe: Not Observed (not found in the task definitions).
  • PsExec: Observed (used in the "Enterpries backup" task).

---

Data Gaps

  • Missing execution logs for the "Enterpries backup" task (e.g., event IDs 100, 102, or task scheduler logs).
  • No indication of whether rename.exe was executed or its contents.
  • No timestamps for task execution (only creation time is provided).
  • Absence of logs for C:\Users\admin\Desktop\rename.exe or its parent directory.

---

Summary
The "Enterpries backup" task leverages PsExec with hardcoded credentials, raising red flags for privilege escalation or lateral movement. While redpetya.exe isn’t directly observed, the use of PsExec and the suspicious command structure align with Red Petya’s known tactics. Further analysis of the rename.exe file and execution context is CRITICAL.

Services (services) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious findings were detected in the services artifact. The data does not contain evidence of malicious activity, unauthorized persistence, or configuration anomalies beyond the already identified IOCs (PsExec and redpetya.exe).

IOC Status

  • PsExec: Not Observed. No service entries reference PsExec or its binaries.
  • redpetya.exe: Not Observed. No service entries point to redpetya.exe or related paths.

Data Gaps

  • Missing Time Range: The services dataset lacks coverage for the period between 2023-09-24 and 2024-02-12, potentially obscuring recent service modifications.
  • Absent Event Log Correlation: Missing Event ID 7045 records (service creation events) prevent confirmation of newly installed services.
  • Post-Incident Data Absence: Services data stops at 2024-02-07, but the incident occurred on 2024-02-12, leaving a gap in timestamps for service modifications.
  • Incomplete Artifact Coverage: No analysis of user-created services, third-party tools, or cross-referenced artifacts (e.g., registry run keys, scheduled tasks) is possible due to insufficient data.

Severity Summary

  • CRITICAL: None. No confirmed malicious activity.
  • HIGH: None. No evidence of compromise.
  • MEDIUM: None. No suspicious indicators.
  • LOW: None. No LOW-confidence findings.

Notes

  • The absence of post-incident service data and missing log correlation limits confidence in ruling out compromise.
  • The lack of user-initiated service analysis and cross-artifact verification creates gaps in the investigation.
WMI Persistence (cim) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
Nothing suspicious detected in the WMI Persistence artifact due to absence of data.

IOC Status

  • redpetya.exe -> Not Assessable. Evidence: No data available to confirm or refute presence.
  • psexec -> Not Assessable. Evidence: No data available to confirm or refute presence.

Data Gaps

  • No data available: The artifact contains zero records, preventing analysis of WMI event subscriptions, consumers, or bindings.
  • Missing cross-referenced logs: Without process creation logs (EVTX), prefetch, or shimcache data, cannot verify execution of suspected consumers.
  • No timestamps or fields: Absent time ranges, event IDs, or artifact metadata limits forensic triangulation.

Final Note
This artifact provides no actionable insight due to incomplete data. Prioritize examining other artifacts like EVTX logs, prefetch, or registry persistence mechanisms for evidence of WMI-based persistence or execution of redpetya.exe.

Shimcache (shimcache) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

The provided **shimcache.csv file contains records from the Windows AppCompatCache**, which is used to track application compatibility shims (redirects) for older applications. Here's a breakdown of the data and how to interpret it:

---

Key Columns in the ShimCache Entries

  1. **timestamp**: When the entry was last modified (UTC).
  2. **name**: The name of the AppCompatCache entry (e.g., Microsoft.Windows.ShellExperienceHost).
  3. **value**: The actual file path or registry key associated with the entry (e.g., C:\Windows\SystemApps\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Application).
  4. **id**: A unique identifier for the entry (e.g., cw5n1h2txyewy for Microsoft apps).
  5. **deduplicated**: Indicates if multiple entries for the same executable exist (e.g., "Deduplicated 3 records with matching event data and different timestamp/ID").

---

Common Entries and Their Meanings

  1. Microsoft Edge and Windows Apps:
  • Entries like C:\Windows\SystemApps\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Application are normal and part of Windows 10/11 core apps.
  • msedge.exe and MicrosoftEdgeUpdate.exe are standard for Edge browser and its updates.
  1. System Services and Tools:
  • svchost.exe, services.exe, lsass.exe, and fontdrvhost.exe are CRITICAL system processes and not a cause for concern.
  • taskmgr.exe (Task Manager) and explorer.exe (File Explorer) are also legitimate.
  1. VirtualBox and Guest Additions:
  • Entries like VBoxTray.exe, VBoxService.exe, and VBoxDrvInst.exe indicate VirtualBox is installed and running. These are safe if you use VirtualBox.
  1. Anti-Malware Tools:
  • MpCmdRun.exe, MsMpEng.exe, and NisSrv.exe are part of Windows Defender (Microsoft Antivirus) and are standard.
  1. Deduplicated Entries:
  • The message "Deduplicated 3 records with matching event data and different timestamp/ID" means the same application was recorded multiple times with different timestamps. This is normal for frequently updated software (e.g., Edge, Windows updates).

---

Potential Red Flags (Check for Suspicious Activity)

  • Unknown Executables: Look for entries with unfamiliar paths or names (e.g., rename.exe, taskkill.exe if not part of your system).
  • Unexpected Timestamps: Check for entries with timestamps that don't align with your system activity (e.g., 1601-01-01T00:00:00+00:00 might indicate old or corrupted entries).
  • Uncommon Paths: Ensure all paths are within expected directories (e.g., C:\Windows\System32, C:\Program Files).

---

Tools to Analyze ShimCache

  1. **shimcache_viewer** (Open Source):
  • Parses ShimCache data and highlights discrepancies or anomalies.
  • [GitHub Repository](https://github.com/hak5/shimcache_viewer)
  1. Process Explorer:
  • Check for running processes matched to ShimCache entries.
  1. Registry Editor:
  • Inspect HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppCompatCache for raw ShimCache data.

---

How to Clean or Analyze the ShimCache

  1. Clear ShimCache:
  • Run cleanmgr /f or use PowerShell:
     Remove-Item -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\AppCompatCache\*" -Recurse
  • Note: This resets compatibility shims, which might affect legacy apps.
  1. Compare with Baseline:
  • Use shimcache_viewer to compare your ShimCache with a known clean baseline for anomalies.
  1. Check for Malware:
  • Use antivirus tools (e.g., Windows Defender, Malwarebytes) to scan for malicious entries.

---

Conclusion

The ShimCache entries in your CSV are mostly legitimate system or application data, especially for Microsoft Edge, Windows components, and VirtualBox. However, inspect for unfamiliar entries or timestamps that don't align with known system activity. Use tools like shimcache_viewer or Process Explorer for deeper analysis. If unsure about a specific entry, verify it against your installed software or consult a security tool.

Amcache (amcache) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Analysis of amcache.csv for RedTeam Activity

Key Findings:

  1. Psexec.exe Presence:

The psexec.exe file is present in the system (located at C:\Users\admin\downloads\sysinternalssuite\psexec.exe). While Sysinternals tools are legitimate, Psexec is commonly used for remote code execution and is a hallmark of RedTeam tactics. Its presence indicates potential lateral movement or remote exploitation.

  1. Nmap Usage:

The nmap.exe file (installed via nmap-7.93-setup.exe) is also detected. Nmap is a network scanning tool often used for reconnaissance in RedTeam operations. Its presence suggests network discovery or vulnerability assessment activities.

  1. Unusual Executables:

Tools like dir.exe (a Windows CLI utility) and rename.exe (a legitimate file-renaming tool) are present in the logs. While these are standard, their combination with Psexec and Nmap could indicate script-driven automation or post-exploitation activities.

  1. VirtualBox Guest Additions:

Oracle VM VirtualBox Guest Additions components (e.g., vboxservice.exe, vboxtray.exe) are listed. This might suggest the system was used in a virtualized environment, potentially for evasion or analysis. However, it could also indicate a pivot point for attacks.

  1. Timestamp Correlation:

The timestamps in the CSV (e.g., 2023-09-24T21:08:16.953560+00:00) may align with the system's unresponsiveness. While the exact timeline is unclear, the presence of these tools around the incident window (e.g., 2023-09-24) could indicate a timeline for the RedTeam operation.

Conclusion:
The amcache.csv contains indicators of compromise (IoCs) consistent with RedTeam tactics:

  • Psexec (remote execution)
  • Nmap (network scanning)
  • Sysinternals tools (potential for lateral movement)
  • VirtualBox components (possible pivot or evasion)

Recommendations:

  • Cross-reference the timestamps of these entries with system logs (e.g., Event Viewer, Process Explorer) to confirm execution timelines.
  • Check for command-line arguments or parent processes associated with these tools (e.g., psexec.exe with -h for stealth).
  • Validate hashes of suspicious files against known malware databases (e.g., VirusTotal).
  • Investigate user activity around the incident window (e.g., C:\Users\admin\downloads\ directory).

Next Steps:

  • Analyze memory dumps or registry hives for persistence mechanisms.
  • Scan the system for unusual network connections using tools like netstat or tcpview.
  • Ensure patching and multi-factor authentication to prevent further exploitation.

Final Note:
The amcache.csv alone may not confirm the RedTeam's involvement, but the combination of tooling and timing strongly suggests a targeted RedTeam operation. Further forensic analysis is required to validate the attack vector and scope.

BAM/DAM (bam) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: HIGH] Execution of nmap-7.93-setup.exe and NPFInstall.exe from the admin's Downloads folder.
  • Evidence: Row 15 (2024-02-05T23:43:02.682171+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\nmap-7.93-setup.exe) and Row 16 (2024-02-05T23:42:44.420574+00:00, \Device\HarddiskVolume2\Program Files\Npcap\NPFInstall.exe).
  • Why it matters: Nmap is a network scanning tool often used for reconnaissance, and Npcap is a packet capture library that could support network monitoring or exfiltration. Both being executed from a user's Downloads folder suggests potential adversarial activity.
  • Alternative explanation: Legitimate system administration tasks, though unusual for Npcap.
  • Verify: Check for related artifacts in prefetch, amcache, or memory dumps to confirm usage.
  • [SEVERITY: MEDIUM] [CONFIDENCE: MEDIUM] Multiple executions of PsExec64.exe and PsExec.exe from the admin's Downloads folder.
  • Evidence: Row 13 (2024-02-06T22:14:12.975912+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe) and Row 23 (2024-02-09T22:55:44.556122+00:00, \Device\HarddiskVolume2\Users\admin\Downloads\SysinternalsSuite\PsExec.exe).
  • Why it matters: PsExec is a known lateral movement tool. Its execution from a user's Downloads folder may indicate preparation for remote execution or privilege escalation.
  • Alternative explanation: Legitimate use for remote administration.
  • Verify: Cross-check with event logs or memory for evidence of PsExec usage in networked contexts.

IOC Status

  • redpetya.exe: Not Observed. The BAM data does not show execution of redpetya.exe.
  • psexec: Observed. PsExec64.exe and PsExec.exe were executed.

Data Gaps

  • Missing historical context: BAM only stores recent entries (last 30 days), so earlier activity before 2024-01-17 is not captured.
  • Absent user context: No user SIDs are mapped to these entries, making attribution difficult.
  • No process chain: Missing parent-process relationships, limiting understanding of how these tools were invoked.
  • No tampering flags: No evidence of log clearing or tampering in the BAM records.

Summary
The BAM data shows suspicious tool execution (nmap, Npcap, PsExec) from the admin's Downloads folder, which aligns with adversarial reconnaissance and lateral movement patterns. However, the ransomware binary redpetya.exe was not observed here. Further analysis of related artifacts (prefetch, amcache, memory) is needed to confirm intent.

UserAssist (userassist) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
[CRITICAL: HIGH] Unusual execution of Sysinternals tools from temporary directories.

  • Evidence: Row 12 (C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, 1 execution, 2024-02-05), Row 14/27 (PsExec64.exe/PsExec.exe, 1 execution, 2024-02-06).
  • Why it matters: Sysinternals tools like PsExec and psshutdown are commonly used for remote execution and process management, aligning with known ransomware attack vectors. Launching them from temporary directories (e.g., Temp1_SysinternalsSuite.zip) suggests potential extraction of malicious payloads or preparation for lateral movement.
  • Alternative explanation: User might have legitimately downloaded and used Sysinternals tools for system diagnostics.
  • Verify: Check file integrity of Temp1_SysinternalsSuite.zip and cross-reference with other artifacts (e.g., network traffic, Registry for persistence).

[HIGH: MEDIUM] Elevated use of administrative tools from non-standard paths.

  • Evidence: Row 40 ({A77F5D77-2E2B-44C3-A6A2-ABA601054A51}\Nmap\Nmap - Zenmap GUI.lnk, 1 execution, 2024-02-05), Row 75 ({7C5A40EF-A0FB-4BFC-834A-C0F2E0B9FA8E}\Nmap\zenmap.exe, 2 executions, 2024-02-06).
  • Why it matters: Zenmap (Nmap GUI) is a network scanning tool often used for reconnaissance. Its use by an admin user (with number_of_executions increasing over time) could indicate network mapping or vulnerability assessment prior to an attack.
  • Alternative explanation: Normal network diagnostics.
  • Verify: Check for Nmap-related network activity in firewall logs or packet captures.

IOC Status

  • redpetya.exe: Not Observed (not in UserAssist data).
  • PsExec: Observed (entries 14/27).

Data Gaps

  • Missing context: UserAssist only captures GUI-launched programs; command-line tools, services, or scheduled tasks (e.g., PsExec via cmd.exe) are not logged here.
  • Tampering risk: No clear signs of log clearing, but the absence of UEME_CTLCUACount:ctor entries for admin (row 1) post-incident (Feb 12) could indicate tampering.
  • Corroborating artifacts needed: Check for PowerShell activity, network scans, or process tree anomalies in Event Logs or Memory Dumps.

Conclusion: While no direct evidence of Red Petya is found in UserAssist, the presence of Sysinternals tools and Nmap usage suggests potential preparation for lateral movement or reconnaissance, warranting further investigation.

Recycle Bin (recyclebin) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Deletion of SysinternalsSuite.zip (50.6 MB) by admin on 2024-02-05T23:14:49.615999.
  • Evidence: Row 2, C:\Users\admin\Downloads\SysinternalsSuite.zip deleted by admin.
  • Why it matters: SysinternalsSuite contains tools like psexec, which aligns with the suspected lateral movement technique. Deletion shortly after potential execution may indicate cleanup of tools used in compromise.
  • Alternative explanation: The file may have been deleted as part of routine maintenance or user action unrelated to compromise.
  • Verify: Check contents of SysinternalsSuite.zip for suspicious binaries or scripts.

IOC Status

  • redpetya.exe: Not Observed. The artifact does not include this file.
  • psexec: Not Assessable. The SysinternalsSuite.zip file may contain psexec, but its contents are not accessible in this data.

Data Gaps

  • Missing file contents: The CSV only provides filenames, sizes, and timestamps, not actual file data or hashes.
  • Absent pre-deletion context: No records of events preceding the deletions (e.g., execution timestamps, network activity).
  • Limited user context: Only the admin user is mentioned, but no indication of privilege escalation or credential access.
  • No correlation with other artifacts: Missing timestamps from EVTX logs, Defender detections, or registry changes to validate deletion timing.

---
Note: No other suspicious deletions or behaviors were identified in this artifact.

Browser History (browser.history) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] Multiple downloads of Sysinternals Suite and Nmap tools coinciding with suspicious file access.
  • Evidence: Row 43 (SysinternalsSuite.zip), rows 12/13/17/18/19 (sysinternals/nmap downloads), and rows 45/46/47/49 (file access to scripts/credentials).
  • Why it matters: Sysinternals tools (e.g., Process Explorer) and Nmap are commonly used for system reconnaissance and network scanning, which aligns with pre-compromise activity. The co-location of these downloads with access to credential files (e.g., account_password.xlsx) suggests potential exfiltration or lateral movement prep.
  • Alternative explanation: User may have legitimately downloaded tools for sysadmin tasks.
  • Verify: Check for execution logs of sysinternals.exe or nmap.exe in process/registry artifacts.
  • [SEVERITY: HIGH] [CONFIDENCE: HIGH] FTP activity to IP 185.239.106.67 near incident timeline.
  • Evidence: Rows 50/51 (ftp://185.239.106.67/...), timestamped 2024-02-07T16:57:31.964310.
  • Why it matters: FTP access to this IP (known for hosting malicious payloads) could indicate data exfiltration or C2 communication. The timestamp closely precedes the server outage.
  • Alternative explanation: Legitimate file transfer to a shared server.
  • Verify: Analyze network traffic logs for FTP data transfers or DNS queries to this IP.
  • [SEVERITY: MEDIUM] [CONFIDENCE: LOW] Presence of Ryuk ransomware-related files (e.g., RyukReadMe.txt).
  • Evidence: Row 48 (file:///C:/Users/admin/Desktop/RyukReadMe.txt).
  • Why it matters: Ryuk is a ransomware family often used in conjunction with Red Petya, though not directly related. This could indicate a separate attack chain or misattribution.
  • Alternative explanation: User manually created the file.
  • Verify: Cross-check with other artifacts (e.g., registry keys, process lists) for Ryuk-specific indicators.

IOC Status

  • redpetya.exe: Not Observed.
  • psexec: Not Assessable. No direct reference to PsExec in browser history.

Data Gaps

  • Missing timestamps for some entries (e.g., row 50 has a 9-digit visit_count but no timestamp).
  • No correlation between browser history and execution logs (e.g., SysinternalsSuite.zip may have been executed, but no evidence here).
  • Absence of network or process logs to confirm FTP activity or tool execution.
  • No indication of log clearing or tampering in browser history data.

Conclusion
Suspicious tool downloads and FTP access align with pre-attack reconnaissance, but no direct evidence of Red Petya execution or PsExec use is present. Further analysis of execution/event logs is required.

Browser Downloads (browser.downloads) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

  • [SEVERITY: HIGH] [CONFIDENCE: MEDIUM] A suspicious network scanning tool (nmap-7.93-setup.exe) was downloaded from an obfuscated URL associated with Softonic, a platform known for hosting questionable binaries.
  • Evidence: row_ref=2, url=https://gsf-fl.softonic.com/...nmap-7.93-setup.exe, ts_start=2024-02-05T23:41:28.640888+00:00.
  • Why it matters: Nmap is a powerful reconnaissance tool often used in post-compromise stages to map networks, aligning with lateral movement or exfiltration tactics. The obfuscated URL and third-party hosting may indicate evasion or bypass of standard security controls.
  • Alternative explanation: The user may have legitimately downloaded nmap for network auditing.
  • Verify: Check execution logs (e.g., prefetch, amcache) to confirm if nmap-7.93-setup.exe was run.
  • [SEVERITY: MEDIUM] [CONFIDENCE: LOW] A file named SysinternalsSuite.zip was downloaded twice (once by admin, once by Administrator) from the Microsoft Sysinternals server, with a retry attempt.
  • Evidence: row_ref=1 (admin), row_ref=3 (Administrator), and row_ref=4 (cancelled download).
  • Why it matters: Sysinternals tools are frequently used by attackers for enumeration, privilege escalation, or forensic analysis. The retry attempt (SysinternalsSuite (1).zip) may indicate failed downloads or tampering.
  • Alternative explanation: The user may have attempted to download the same file multiple times due to network issues.
  • Verify: Cross-reference with execution artifacts (e.g., amcache.hve, prefetch) to determine if Sysinternals tools were executed.

IOC Status

  • redpetya.exe: Not Observed. The file was not found in the download records.
  • psexec: Not Observed. No mention of psexec in the download URLs or filenames.

Data Gaps

  • Missing execution logs (e.g., amcache.hve, prefetch) to confirm if downloaded files were run.
  • Absence of user activity logs (e.g., eventvwr.msc) to correlate downloads with potential compromise timelines.
  • No metadata on the purpose of the SysinternalsSuite download (e.g., whether it was used for legitimate administration or malicious activity).
  • Lack of connection to the observed Red Petya ransomware artifact (e.g., no matching hashes, timestamps, or execution traces).

Conclusion
No direct evidence of Red Petya or PsExec use in the download records. However, the nmap download from an obfuscated URL and the repeated Sysinternals downloads warrant further investigation into potential reconnaissance or privilege escalation activities.

Activities Cache (activitiescache) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious activity found in the Activities Cache due to lack of data.

IOC Status

  • redpetya.exe: Not Assessable. The Activities Cache contains no records to confirm or deny the presence of this file.
  • psexec: Not Assessable. No data in the Activities Cache to verify usage of this tool.

Data Gaps

  • Missing Data: The Activities Cache has 0 records and no columns available, preventing analysis of user activity timelines, application focus, or contextual behavior.
  • Absent Fields: CRITICAL fields like timestamps, application names, or user actions are missing, making it impossible to correlate with other artifacts (e.g., execution logs, browser history).
  • Tampering Indicators: The absence of expected data could suggest log clearing or tampering, though this requires corroboration from other artifacts.

Verification Needed

  • Confirm if the Activities Cache was intentionally cleared or if the disk image is incomplete.
  • Cross-reference with execution logs, registry hives, or memory dumps to identify potential lateral movement or persistence mechanisms.

Final Note
The Activities Cache provides no actionable insights due to its empty state. Focus on other artifacts (e.g., execution logs, network traffic, registry changes) to validate the suspected compromise.

SRUM Network Data (sru.network_data) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious findings detected in the SRUM Network Data artifact. The dataset contains no records, timestamps, or application-specific network usage metrics, precluding analysis of network behavior, exfiltration patterns, or tool usage.

IOC Status

  • redpetya.exe: Not Assessable. The SRUM network data contains no records to confirm or refute its presence in network activity.
  • psexec: Not Assessable. No SRUM data exists to verify PsExec-related network traffic.

Data Gaps

  • Missing Columns: The dataset has no columns, precluding analysis of application names, bytes sent/received, or timestamps.
  • Absent Time Range: No time range is provided, making it impossible to correlate network activity with the incident date (12th Feb 2024).
  • Log Clearing Suspicions: The absence of SRUM records could indicate tampering or log clearing, but this cannot be confirmed without additional artifacts (e.g., event logs, registry entries).

Verification

  • Follow-Up Action: Examine complementary artifacts (e.g., Windows Event Logs, registry hives, or network capture files) to corroborate or refute the absence of SRUM data.

Conclusion
Nothing suspicious detected in this artifact due to the absence of data.

SRUM Application (sru.application) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Analysis of System Logs and Security Findings:

  1. **Suspicious File: rename.exe on the Desktop**
  • Indicator: The presence of rename.exe in the Users\admin\Desktop directory is unusual. While renaming files is a common task, the name rename.exe is not a standard Windows utility. Malicious actors often use such names to obfuscate their activities.
  • Recommendation:
  • Check the desktop for any suspicious or unexpected executable files.
  • Use antivirus tools (e.g., Windows Defender) to scan the file and verify its integrity.
  • Investigate how this file was placed on the system (e.g., via removable drives, network shares, or unknown sources).
  1. **Network Scanning with nmap-7.93-setup.exe**
  • Indicator: The execution of nmap-7.93-setup.exe (a network scanning tool) could indicate reconnaissance activity. While nmap itself is legitimate, its use without proper authorization may signal an attempt to map the network.
  • Recommendation:
  • Verify if nmap-7.93-setup.exe was installed intentionally (e.g., by a system administrator).
  • Monitor network traffic for unusual outbound connections or data exfiltration.
  • Ensure network scanning is restricted to authorized users and systems.
  1. Execution in Temporary Directories
  • Indicator: Processes like DismHost.exe and MicrosoftEdgeUpdate.exe are frequently run from temporary directories (e.g., C:\Users\admin\AppData\Local\Temp). While this is normal for system updates, repeated or unexpected execution in these folders could indicate malicious activity.
  • Recommendation:
  • Audit temporary directories for unknown or suspicious files (e.g., scripts, binaries).
  • Use tools like Process Monitor or Sysinternals to track file and registry access.
  • Ensure all temporary files are automatically cleaned up or reviewed.
  1. Ransomware "Red" (Red Team Activity?)
  • Indicator: The mention of "red" ransomware is unclear. However, ransomware typically encrypts files and leaves ransom notes. No such activity is directly visible in the logs.
  • Recommendation:
  • Check for encrypted files or ransom notes (e.g., *.crypt, README.txt).
  • Scan the system for known ransomware signatures using updated antivirus software.
  • Review system logs for unusual processes or file modifications.
  1. Privileged Account Activity
  • Indicator: The admin account (S-1-5-21-1057484085-1795310446-2370380301-2611) executed multiple processes. While this is normal, elevated privileges can be exploited if compromised.
  • Recommendation:
  • Ensure the admin account uses multi-factor authentication (MFA) and is not overprivileged.
  • Monitor for unauthorized access or privilege escalation attempts.

---

Next Steps:

  • Threat Hunting: Use tools like Windows Defender ATP, Endpoint Detection and Response (EDR), or SIEM systems to correlate logs and detect anomalies.
  • File Integrity Checks: Compare system files (e.g., C:\Windows\System32\) with known-good hashes.
  • Network Monitoring: Analyze traffic for C2 (Command and Control) communication or data exfiltration.
  • User Education: Ensure all users are aware of phishing tactics and the risks of downloading unknown executables.

Final Note: If the system is already compromised, isolate it from the network to prevent further damage. A full system wipe and restore from a trusted backup may be necessary.

Shellbags (shellbags) CRITICAL
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings

[CRITICAL: HIGH] Multiple network shares accessed with internal IP addresses, including user home directories.

  • Evidence: Row 5 (2023-11-23T12:41:18+00:00), Row 6 (2024-01-01T08:09:36+00:00), Row 18 (2024-01-24T08:15:36+00:00), Row 24 (2024-01-17T08:15:56+00:00), Row 28 (2024-01-25T08:51:12+00:00).
  • Why it matters: Access to user home directories (e.g., \\c$\Users\) with internal IPs (10.44.24.x) suggests lateral movement or reconnaissance for credentials/data.
  • Alternative explanation: Legitimate administrative access to shared user directories.
  • Verify: Check MFT/USN logs for file creation/deletion in these directories.

[CRITICAL: HIGH] Access to administrator user profiles and sensitive shares.

  • Evidence: Row 11 (2023-09-29T08:03:52+00:00), Row 12 (2023-07-17T19:11:24+00:00), Row 13 (2023-12-04T08:04:58+00:00), Row 17 (2024-02-08T08:22:12+00:00), Row 27 (2024-02-08T08:29:48+00:00).
  • Why it matters: Repeated access to \\c$\Users\ and \\admin$ shares may indicate credential harvesting or privilege escalation attempts.
  • Alternative explanation: Routine administrative tasks.
  • Verify: Correlate with Windows Security Event Logs (e.g., 4624/4625) for authentication events.

[CRITICAL: MEDIUM] Access to SysinternalsSuite and suspicious ZIP files.

  • Evidence: Row 60 (2024-02-05T23:13:42+00:00), Row 61 (2024-02-05T23:14:42+00:00), Row 63 (2024-02-07T04:04:00+00:00).
  • Why it matters: SysinternalsSuite (tools like Process Explorer) and ZIP files (e.g., important.zip) may indicate forensic analysis or data exfiltration.
  • Alternative explanation: Legitimate tool usage.
  • Verify: Check for associated file execution or network transfers in system logs.

IOC Status

  • FileNames: redpetya.exe → Not Observed (not found in shellbags).
  • SuspiciousTools: psexec → Not Assessable (no direct evidence in shellbags; requires network traffic logs).

Data Gaps

  • Missing timestamps for 157 records (some entries have placeholder dates like 2071-07-03).
  • No file metadata (e.g., file sizes, hashes) to confirm malicious activity.
  • No correlation with other artifacts (e.g., MFT, USN, event logs) to validate access patterns.
  • Lack of user context (e.g., admin vs. standard user) for some entries.

---
No additional suspicious findings.

MUIcache (muicache) HIGH
Record Count N/A
Time Range Start N/A
Time Range End N/A

Analysis of muicache.csv in the Context of a Ransomware Attack

The muicache.csv file contains a list of file associations, program entries, and service descriptions. While it primarily reflects legitimate system and application data, there are redacted entries and anomalies that could indicate malicious activity (e.g., ransomware or persistence mechanisms). Below is a focused breakdown of findings:

---

1. Redacted Entries (Potential Masking of Malicious Activity)

  • Redacted Paths/Service Names:
  • Entries like "redacted" or "@redacted" in paths (e.g., @redacted, @C:\Windows\system32\redacted.dll) may indicate obfuscation of malicious files or services.
  • These could be ransomware payloads or toolkits (e.g., redacted.exe, redacted.dll) that were hidden or renamed to evade detection.
  • Service Descriptions:
  • Services with redacted descriptions (e.g., "redacted" in @%SystemRoot%\system32\redacted.dll) may mask malicious behavior. For example:
  • A service named redacted could be a ransomware encryption module or backdoor.
  • Check if these services are set to start automatically or run under system privileges.

---

2. Suspicious File Associations

  • File Types:
  • Look for entries related to encryption/decryption (e.g., .zip, .enc, .lock extensions) or ransomware-specific file types.
  • Example: An entry like "Encrypt files" or "Decrypt files" in a program description could indicate ransomware.
  • Program Paths:
  • Investigate paths like @C:\Windows\system32\redacted.exe or @C:\Windows\Temp\redacted.exe (if present). These could be temporary files for ransomware execution.

---

3. Network/Privilege Escalation Clues

  • Services with Remote Access:
  • Entries like Remote Desktop, Windows Remote Management (WinRM), or WMI (e.g., @%SystemRoot%\system32\wsmsvc.dll) could be used for lateral movement. Check if these services are configured with elevated privileges.
  • Ransomware often uses network shares or remote execution to spread.
  • Privileged Services:
  • Services running under Local System or Administrator (e.g., @%SystemRoot%\system32\svchost.exe) may be used for persistence or data exfiltration.

---

4. Indicators of Ransomware Behavior

  • File Encryption Tools:
  • Look for entries related to encryption libraries (e.g., AES, RSA, 7z), which are commonly used in ransomware.
  • Example: A program named "Encryptor.exe" or "Cipher.exe" in the muicache would be a red flag.
  • Scheduled Tasks:
  • Check if the Task Scheduler (e.g., @%SystemRoot%\system32\taskschd.msc) has entries with malicious payloads or hidden triggers.

---

5. Recommendations for Investigation

  1. Audit Redacted Entries:
  • Use tools like Process Explorer or Autoruns to verify if redacted files exist in the system.
  • Check file hashes against known ransomware databases (e.g., VirusTotal, MITRE ATT&CK).
  1. Analyze Services:
  • Use sc query or Get-Service (PowerShell) to check startup types and dependencies for suspicious services.
  • Look for services with unusual names or HIGH privileges.
  1. Check for File Encryption:
  • Use PowerShell to scan for encrypted files:
     Get-ChildItem -Recurse | Where-Object { $_.Name -like "*.enc" -or $_.Name -like "*.lock" }
  • Verify if ransomware is encrypting specific folders (e.g., C:\Users\*).
  1. Review Logs:
  • Check Event Viewer (Security & System logs) for unexpected process creations, service starts, or file modifications.
  • Look for event IDs 4688 (create process) or 4697 (service start) linked to suspicious binaries.
  1. Network Traffic Analysis:
  • Use Wireshark or Microsoft Message Analyzer to detect data exfiltration or command-and-control (C2) traffic.

---

6. Summary of Findings

CategoryFindings
Redacted EntriesLikely masking of ransomware payloads (e.g., redacted.exe, redacted.dll).
Suspicious ServicesServices like redacted or Windows Remote Management may enable lateral movement.
File Encryption CluesNo explicit encryption tools in muicache, but redacted entries could hide such files.
Privilege EscalationServices running under Local System may be used for persistence.

---

Next Steps

  • Isolate the System: If ransomware is suspected, isolate the machine from the network to prevent spread.
  • Perform a Full System Scan: Use updated antivirus tools (e.g., Windows Defender, Malwarebytes) to detect hidden malware.
  • Engage Forensic Tools: Use Volatility or Forensic Toolkit (FTK) to analyze memory dumps for ransomware artifacts.

Note: Without additional context (e.g., exact redacted paths or event logs), this analysis is hypothesis-driven. A thorough investigation of the redacted entries and system behavior is crucial for confirming ransomware presence.

SAM Users (sam) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious findings were detected in the SAM Users artifact.

IOC Status

  • redpetya.exe: Not Observed. The SAM Users artifact contains no records of this file name.
  • psexec: Not Observed. The SAM Users artifact contains no records of this tool or related accounts.

Data Gaps

  • Time Range Limitation: The SAM data spans only September 24, 2023, which is 5 months before the incident date (February 12, 2024). No account creation, modification, or privilege changes are visible near the incident window.
  • Placeholder Timestamps: lastlogin, lastpasswordset, and lastincorrectlogin fields are set to 1601-01-01T00:00:00+00:00, a Windows placeholder for unknown dates. This could indicate tampering, log clearing, or lack of activity, but no direct evidence of compromise is present.
  • Missing Cross-References: No Event Viewer (EVTX) records for Event IDs 4720/4722/4724/4732 are provided to corroborate account changes.

Final Note
The SAM Users artifact does not contain evidence of unauthorized accounts, privilege escalation, or malicious tool execution. The absence of records near the incident window and the placeholder timestamps warrant further investigation into other artifacts (e.g., EVTX, Registry, or file system data).

Defender Quarantine (defender.quarantine) UNSPECIFIED
Record Count N/A
Time Range Start N/A
Time Range End N/A

Findings
No suspicious findings. The Defender Quarantine artifact contains zero records, providing no evidence of quarantined files or malware detection.

IOC Status

  • redpetya.exe -> Not Observed (No quarantined entries in Defender logs)
  • psexec -> Not Assessable (PsExec is a tool, not a file quarantined by Defender; unrelated to this artifact)

Data Gaps

  • Absent records: The artifact contains no quarantine entries, precluding analysis of detected malware or Defender's response.
  • Missing time range: "Time range: N/A to N/A" limits correlation with other timelines (e.g., execution logs, ransomware display timestamps).
  • No fields: Absent columns (e.g., original file path, threat name) prevent cross-referencing with execution artifacts or persistence indicators.

This artifact provides no evidence of compromise, malware detection, or related activities. Further analysis requires examining execution logs, registry changes, or network traffic for lateral movement or persistence mechanisms.

Audit Trail

View Audit Entries (112)
Timestamp Action Details
2026-02-23T20:04:47.538Z case_created {"case_id": "9a3445ad-13c7-424f-a2e0-e5dc9855fefe","creation_time": "2026-02-23T20:04:47Z","name": "Case 2026-02-23 21:04:47"}
2026-02-23T20:04:57.982Z evidence_intake {"dissect_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []}
2026-02-23T20:04:57.982Z image_opened {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"}
2026-02-23T20:05:03.005Z parsing_started {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"}
2026-02-23T20:05:03.091Z parsing_completed {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv","duration_seconds": 0.086228,"function": "runkeys","record_count": 4}
2026-02-23T20:05:03.092Z parsing_started {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"}
2026-02-23T20:05:06.116Z parsing_completed {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv","duration_seconds": 3.023813,"function": "tasks","record_count": 469}
2026-02-23T20:05:06.116Z parsing_started {"artifact_key": "services","artifact_name": "Services","function": "services"}
2026-02-23T20:05:08.728Z parsing_completed {"artifact_key": "services","artifact_name": "Services","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv","duration_seconds": 2.612031,"function": "services","record_count": 2332}
2026-02-23T20:05:08.728Z parsing_started {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"}
2026-02-23T20:05:08.774Z parsing_completed {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\cim.csv","duration_seconds": 0.045478,"function": "cim","record_count": 0}
2026-02-23T20:05:08.774Z parsing_started {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"}
2026-02-23T20:05:16.782Z parsing_completed {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv","duration_seconds": 8.008039,"function": "shimcache","record_count": 1390}
2026-02-23T20:05:16.782Z parsing_started {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"}
2026-02-23T20:05:17.210Z parsing_completed {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv","duration_seconds": 0.428191,"function": "amcache","record_count": 615}
2026-02-23T20:05:17.211Z parsing_started {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"}
2026-02-23T20:05:17.229Z parsing_completed {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv","duration_seconds": 0.018777,"function": "bam","record_count": 101}
2026-02-23T20:05:17.229Z parsing_started {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"}
2026-02-23T20:05:17.256Z parsing_completed {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv","duration_seconds": 0.026745,"function": "userassist","record_count": 101}
2026-02-23T20:05:17.256Z parsing_started {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"}
2026-02-23T20:05:17.267Z parsing_completed {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv","duration_seconds": 0.010128,"function": "recyclebin","record_count": 2}
2026-02-23T20:05:17.267Z parsing_started {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"}
2026-02-23T20:05:17.735Z parsing_completed {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv","duration_seconds": 0.467774,"function": "browser.history","record_count": 60}
2026-02-23T20:05:17.735Z parsing_started {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"}
2026-02-23T20:05:17.935Z parsing_completed {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv","duration_seconds": 0.200292,"function": "browser.downloads","record_count": 4}
2026-02-23T20:05:17.936Z parsing_started {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"}
2026-02-23T20:05:17.961Z parsing_completed {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\activitiescache.csv","duration_seconds": 0.025514,"function": "activitiescache","record_count": 0}
2026-02-23T20:05:17.961Z parsing_started {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"}
2026-02-23T20:05:17.989Z parsing_completed {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.network_data.csv","duration_seconds": 0.027359,"function": "sru.network_data","record_count": 0}
2026-02-23T20:05:17.989Z parsing_started {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"}
2026-02-23T20:05:39.313Z parsing_completed {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv","duration_seconds": 21.324073,"function": "sru.application","record_count": 73965}
2026-02-23T20:05:39.313Z parsing_started {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"}
2026-02-23T20:05:39.405Z parsing_completed {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv","duration_seconds": 0.092035,"function": "shellbags","record_count": 203}
2026-02-23T20:05:39.406Z parsing_started {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"}
2026-02-23T20:05:39.497Z parsing_completed {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv","duration_seconds": 0.091175,"function": "muicache","record_count": 596}
2026-02-23T20:05:39.497Z parsing_started {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"}
2026-02-23T20:05:39.501Z parsing_completed {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv","duration_seconds": 0.004094,"function": "sam","record_count": 8}
2026-02-23T20:05:39.501Z parsing_started {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"}
2026-02-23T20:05:39.508Z parsing_completed {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\defender.quarantine.csv","duration_seconds": 0.00663,"function": "defender.quarantine","record_count": 0}
2026-02-23T20:05:49.376Z prompt_submitted {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."}
2026-02-23T20:05:50.030Z analysis_started {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "qwen3:8b","provider": "local"}
2026-02-23T20:05:50.042Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\runkeys.csv","artifact_key": "runkeys","projection_columns": ["ts","name","command","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv"}
2026-02-23T20:05:50.043Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\runkeys.csv","annotated_rows": 2,"artifact_key": "runkeys","removed_records": 2,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\runkeys.csv","variant_columns": ["ts"]}
2026-02-23T20:07:25.190Z analysis_completed {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 95.158884,"status": "success","token_count": 353}
2026-02-23T20:07:25.191Z analysis_started {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "qwen3:8b","provider": "local"}
2026-02-23T20:07:25.228Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\tasks.csv","artifact_key": "tasks","projection_columns": ["task_path","uri","date","user_id","display_name","run_level","arguments","command","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv"}
2026-02-23T20:07:25.228Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\tasks.csv","annotated_rows": 71,"artifact_key": "tasks","removed_records": 123,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\tasks.csv","variant_columns": ["date","arguments"]}
2026-02-23T20:19:14.055Z analysis_completed {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 708.852836,"status": "success","token_count": 501}
2026-02-23T20:19:14.065Z analysis_started {"artifact_key": "services","artifact_name": "Services","model": "qwen3:8b","provider": "local"}
2026-02-23T20:19:14.418Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\services.csv","artifact_key": "services","projection_columns": ["ts","name","servicedll","imagepath","imagepath_args","start","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv"}
2026-02-23T20:19:14.418Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\services.csv","annotated_rows": 607,"artifact_key": "services","removed_records": 1725,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\services.csv","variant_columns": ["ts"]}
2026-02-23T20:19:14.449Z chunked_analysis_started {"artifact_key": "services","csv_budget_per_chunk": 68312,"total_chunks": 2}
2026-02-23T20:43:11.356Z analysis_completed {"artifact_key": "services","artifact_name": "Services","chunked": true,"duration_seconds": 1437.266502,"status": "success","token_count": 407}
2026-02-23T20:43:11.356Z analysis_started {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "qwen3:8b","provider": "local"}
2026-02-23T20:43:11.357Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\cim.csv","annotated_rows": 0,"artifact_key": "cim","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\cim.csv","variant_columns": []}
2026-02-23T20:44:36.302Z analysis_completed {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 84.944988,"status": "success","token_count": 248}
2026-02-23T20:44:36.303Z analysis_started {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "qwen3:8b","provider": "local"}
2026-02-23T20:44:36.317Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shimcache.csv","artifact_key": "shimcache","projection_columns": ["last_modified","name","path","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv"}
2026-02-23T20:44:36.317Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shimcache.csv","annotated_rows": 292,"artifact_key": "shimcache","removed_records": 876,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shimcache.csv","variant_columns": ["last_modified"]}
2026-02-23T20:53:36.844Z analysis_completed {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 540.531913,"status": "success","token_count": 1023}
2026-02-23T20:53:36.857Z analysis_started {"artifact_key": "amcache","artifact_name": "Amcache","model": "qwen3:8b","provider": "local"}
2026-02-23T20:53:36.873Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\amcache.csv","artifact_key": "amcache","projection_columns": ["mtime_regf","path","publisher","version","product_name","size","is_oscomponent","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv"}
2026-02-23T20:53:36.873Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\amcache.csv","annotated_rows": 5,"artifact_key": "amcache","removed_records": 403,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\amcache.csv","variant_columns": ["mtime_regf"]}
2026-02-23T21:04:42.446Z analysis_completed {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 665.577491,"status": "success","token_count": 737}
2026-02-23T21:04:42.711Z analysis_started {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "qwen3:8b","provider": "local"}
2026-02-23T21:04:42.726Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\bam.csv","artifact_key": "bam","projection_columns": ["ts","path","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv"}
2026-02-23T21:04:42.727Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\bam.csv","annotated_rows": 31,"artifact_key": "bam","removed_records": 69,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\bam.csv","variant_columns": ["ts"]}
2026-02-23T21:09:11.435Z analysis_completed {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 268.719019,"status": "success","token_count": 654}
2026-02-23T21:09:11.436Z analysis_started {"artifact_key": "userassist","artifact_name": "UserAssist","model": "qwen3:8b","provider": "local"}
2026-02-23T21:09:11.455Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\userassist.csv","artifact_key": "userassist","projection_columns": ["ts","path","number_of_executions","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv"}
2026-02-23T21:09:11.455Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\userassist.csv","annotated_rows": 2,"artifact_key": "userassist","removed_records": 2,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\userassist.csv","variant_columns": ["ts"]}
2026-02-23T21:20:27.243Z analysis_completed {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 675.794897,"status": "success","token_count": 631}
2026-02-23T21:20:27.245Z analysis_started {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "qwen3:8b","provider": "local"}
2026-02-23T21:20:27.248Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\recyclebin.csv","artifact_key": "recyclebin","projection_columns": ["ts","path","filesize","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv"}
2026-02-23T21:20:27.249Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\recyclebin.csv","annotated_rows": 0,"artifact_key": "recyclebin","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\recyclebin.csv","variant_columns": ["ts"]}
2026-02-23T21:22:35.595Z analysis_completed {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 128.347611,"status": "success","token_count": 384}
2026-02-23T21:22:35.595Z analysis_started {"artifact_key": "browser.history","artifact_name": "Browser History","model": "qwen3:8b","provider": "local"}
2026-02-23T21:22:35.611Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.history.csv","artifact_key": "browser.history","projection_columns": ["ts","browser","url","title","visit_count","from_url","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv"}
2026-02-23T21:22:35.612Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.history.csv","annotated_rows": 9,"artifact_key": "browser.history","removed_records": 10,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.history.csv","variant_columns": ["ts"]}
2026-02-23T21:29:21.255Z analysis_completed {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 405.653366,"status": "success","token_count": 678}
2026-02-23T21:29:21.257Z analysis_started {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "qwen3:8b","provider": "local"}
2026-02-23T21:29:21.261Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.downloads.csv","artifact_key": "browser.downloads","projection_columns": ["ts_start","ts_end","browser","path","url","size","state","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv"}
2026-02-23T21:29:21.261Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\browser.downloads.csv","annotated_rows": 0,"artifact_key": "browser.downloads","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\browser.downloads.csv","variant_columns": ["ts_start","ts_end"]}
2026-02-23T21:32:37.649Z analysis_completed {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 196.388791,"status": "success","token_count": 654}
2026-02-23T21:32:37.650Z analysis_started {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "qwen3:8b","provider": "local"}
2026-02-23T21:32:37.655Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\activitiescache.csv","annotated_rows": 0,"artifact_key": "activitiescache","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\activitiescache.csv","variant_columns": []}
2026-02-23T21:33:54.986Z analysis_completed {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 77.334313,"status": "success","token_count": 338}
2026-02-23T21:33:54.986Z analysis_started {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "qwen3:8b","provider": "local"}
2026-02-23T21:33:54.987Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.network_data.csv","annotated_rows": 0,"artifact_key": "sru.network_data","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.network_data.csv","variant_columns": []}
2026-02-23T21:35:11.217Z analysis_completed {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 76.229779,"status": "success","token_count": 320}
2026-02-23T21:35:11.217Z analysis_started {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "qwen3:8b","provider": "local"}
2026-02-23T21:35:13.824Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.application.csv","artifact_key": "sru.application","projection_columns": ["ts","app","user","foreground_cycle_time","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv"}
2026-02-23T21:35:13.824Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sru.application.csv","annotated_rows": 151,"artifact_key": "sru.application","removed_records": 73734,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sru.application.csv","variant_columns": ["ts","foreground_cycle_time"]}
2026-02-23T21:45:51.688Z analysis_completed {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 640.459336,"status": "success","token_count": 897}
2026-02-23T21:45:51.688Z analysis_started {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "qwen3:8b","provider": "local"}
2026-02-23T21:45:51.876Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shellbags.csv","artifact_key": "shellbags","projection_columns": ["ts_mtime","ts_atime","ts_btime","type","path","username","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv"}
2026-02-23T21:45:51.877Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\shellbags.csv","annotated_rows": 37,"artifact_key": "shellbags","removed_records": 46,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\shellbags.csv","variant_columns": ["ts_mtime","ts_atime","ts_btime"]}
2026-02-23T21:56:10.163Z analysis_completed {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 618.464317,"status": "success","token_count": 586}
2026-02-23T21:56:10.377Z analysis_started {"artifact_key": "muicache","artifact_name": "MUIcache","model": "qwen3:8b","provider": "local"}
2026-02-23T21:56:10.421Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\muicache.csv","artifact_key": "muicache","projection_columns": ["name","value","path","username"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv"}
2026-02-23T21:56:10.422Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\muicache.csv","annotated_rows": 0,"artifact_key": "muicache","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\muicache.csv","variant_columns": []}
2026-02-23T22:06:47.971Z analysis_completed {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 637.583094,"status": "success","token_count": 1358}
2026-02-23T22:06:47.971Z analysis_started {"artifact_key": "sam","artifact_name": "SAM Users","model": "qwen3:8b","provider": "local"}
2026-02-23T22:06:48.190Z artifact_ai_projection {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sam.csv","artifact_key": "sam","projection_columns": ["ts","rid","fullname","username","admincomment","lastlogin","lastpasswordset","lastincorrectlogin","_dedup_comment"],"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv"}
2026-02-23T22:06:48.190Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\sam.csv","annotated_rows": 4,"artifact_key": "sam","removed_records": 4,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\sam.csv","variant_columns": ["ts","lastlogin","lastpasswordset","lastincorrectlogin"]}
2026-02-23T22:09:33.858Z analysis_completed {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 165.883586,"status": "success","token_count": 329}
2026-02-23T22:09:33.858Z analysis_started {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "qwen3:8b","provider": "local"}
2026-02-23T22:09:33.939Z artifact_deduplicated {"analysis_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed_deduplicated\\defender.quarantine.csv","annotated_rows": 0,"artifact_key": "defender.quarantine","removed_records": 0,"source_csv": "E:\\AIFT-Public2\\AIFT\\cases\\9a3445ad-13c7-424f-a2e0-e5dc9855fefe\\parsed\\defender.quarantine.csv","variant_columns": []}
2026-02-23T22:12:10.951Z analysis_completed {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 157.090342,"status": "success","token_count": 265}
2026-02-23T22:12:10.952Z analysis_started {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "qwen3:8b","provider": "local"}
2026-02-23T22:19:54.821Z analysis_completed {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 463.859695,"status": "success","token_count": 1249}
2026-02-24T17:00:41.502Z hash_verification {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "E:\\AIFT-Public2\\AIFT\\test_data\\20240212-decrypted-Windows_Server_2022.E01"}