Data on detected objects
August 12, 2024
ID 181469
The scope of transmitted data on detected objects depending on the type of the object is listed in the following table.
Data on detected objects
| Parameter | Data type | Description | Example |
---|---|---|---|---|
|
| MD5 | MD5 hash of the file or composite object that was sent for scanning. |
|
| SHA256 | SHA256 hash of the file or composite object that was sent for scanning. |
| |
| String | Name of the file or composite object that was sent for scanning. |
| |
| String | Type of the file or composite object that was sent for scanning. |
| |
| Integer | Size of the file or composite object that was sent for scanning, in bytes. |
| |
| MD5 | MD5 hash of the file (simple object or file within a composite object) in which the threat was detected. |
| |
| String | Name of the file (simple object or file within a composite object) in which the threat was detected. |
| |
| Integer | Size of the file (simple object or file within a composite object) in which the threat was detected, in bytes. |
| |
|
| String | URL of the detected object. |
|
|
| Array | List of domains to which detected objects belong. For the |
|