Skip to main content

Frequently Asked Questions (FAQs)

FAQs provide answers to commonly asked questions. Browse the topics below to quickly find the information you need.

  • Scan: Performs a quick, surface-level check of the submitted artifact. It uses multiple detection engines and threat intelligence sources to provide a verdict.

  • Sandbox: Performs an in-depth analysis by detonating the artifact in a secure virtual machine. It monitors runtime behavior, system and network activity, and generates a detailed report of potential malicious actions.

When you upload a ZIP file, you can choose to extract its contents before analysis or proceed without extraction.

If you select Extract ZIP File and enter the password for the ZIP file, the analysis behaves as follows:

  • If you enter the correct password, the archive is extracted, and the contained file is sandboxed or scanned.

    Note

    You may leave the field blank if the file is not password-protected.

  • If you leave the password blank or enter an incorrect password for a protected archive, the analysis fails.

If you do not select Extract ZIP File, the ZIP file is sandboxed or scanned without extracting its contents.

If you do not select Extract ZIP File, the ZIP file is sandboxed or scanned without extracting its contents.