Process
Security
Reputation
Content
File Ops
Network Ops
Registry Ops
Injection/Hook Ops
Suspicious Events
Damage
File Name | File Path | File Size (bytes) | Time |
---|
Renamed Name | Renamed File Path | Source Name | Source File Path | Time |
---|
File Name | File Path | File Size (bytes) | Time |
---|
File Name | File Path | File Size (bytes) | Time |
---|
File Name | File Path | File Size (bytes) | Time |
---|
Rep | Protocol | URL | Action | Dst IP | Dst Port | Src IP | Src Port | Time |
---|
Protocol | Expected App Protocol | Dst IP | Dst Port | Src IP | Src Port | Time |
---|
Src IP | Src Port | Time |
---|
Registry Key | Action | Value | Data Old | Data New | Time |
---|
Target | Action | Description | Result | Time |
---|
Damage | Resource | Time |
---|