Data on detected objects
8 November 2023
ID 181469
The scope of transmitted data on detected objects depending on the type of the object is listed in the following table.
Data on detected objects
| Parameter | Data type | Description | Example |
---|---|---|---|---|
|
| MD5 | MD5 hash of the file or composite object that was sent for scanning. |
|
| SHA256 | SHA256 hash of the file or composite object that was sent for scanning. |
| |
| String | Name of the file or composite object that was sent for scanning. |
| |
| String | Type of the file or composite object that was sent for scanning. |
| |
| Integer | Size of the file or composite object that was sent for scanning, in bytes. |
| |
| MD5 | MD5 hash of the file (simple object or file within a composite object) in which the threat was detected. |
| |
| String | Name of the file (simple object or file within a composite object) in which the threat was detected. |
| |
| Integer | Size of the file (simple object or file within a composite object) in which the threat was detected, in bytes. |
| |
|
| String | URL of the detected object. |
|
|
| Array | List of domains to which detected objects belong. For the |
|