Files and Dumps |
The section contains two tables: Created files and Dumps. The number of objects detected during the analysis is displayed to the right from the table name. To open a necessary table, click its name. To sort table columns in ascending or descending order click the column titles. To download a file from the table, click Download the file Created files The table contains information about files created during the analysis. The table displays a path, hash, and name of a detected threat. Dumps The table contains information about the following objects: •Dumps. •Injections. •Memory blocks that are allocated by the running sample. Memory allocations may contain traces of malicious activity. The table displays a file name, hash, unique number of a process (PID), and name of the detected threat.
|