July 25, 2022 at 11:02 AM
Scanning a 7Z archive: in order to prove the users safety;
associated the included executable hasn't any sense at all.
The result is always a FUD archive; or rarely very few Heuristic,
Anti-Malware(s) approximation of the Malware detected, inside.
So, given the latter reason: unlocked data has been analyzed.
Java | JAR file has been tested over raw VT engine: resulting clean.
The folders - /profiles/ - and - /rules/ - contains several code source instructions,
which stand used from the BIN shared above: during the integration annexed in the;
Burp Suite - Security Assessment applicative. Despite their appearance, the quantitative is wide;
so, I didn't see them; or looking to go forward further. It's not my share, and then; be careful before
executing the extension. At least, until you wanna be sure of the weird Malware activity: I didn't write.
Evidence MD5: 255951c8b229dd1ef916dd90a5776c0b
Evidence SHA-256: d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064
Evidence URL: https://www.virustotal.com/gui/file/d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064/detection
Evidence QUK: https://virusscan.jotti.org/en-US/filescanjob/xkf0lbfdfy
Heuristics: https://metadefender.opswat.com/ | https://www.joesandbox.com/
associated the included executable hasn't any sense at all.
The result is always a FUD archive; or rarely very few Heuristic,
Anti-Malware(s) approximation of the Malware detected, inside.
So, given the latter reason: unlocked data has been analyzed.
Java | JAR file has been tested over raw VT engine: resulting clean.
The folders - /profiles/ - and - /rules/ - contains several code source instructions,
which stand used from the BIN shared above: during the integration annexed in the;
Burp Suite - Security Assessment applicative. Despite their appearance, the quantitative is wide;
so, I didn't see them; or looking to go forward further. It's not my share, and then; be careful before
executing the extension. At least, until you wanna be sure of the weird Malware activity: I didn't write.
Evidence MD5: 255951c8b229dd1ef916dd90a5776c0b
Evidence SHA-256: d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064
Evidence URL: https://www.virustotal.com/gui/file/d7381aac54239a4f077a0907712ce726f49b0c53cf0098814bc101cba3f52064/detection
Evidence QUK: https://virusscan.jotti.org/en-US/filescanjob/xkf0lbfdfy
Heuristics: https://metadefender.opswat.com/ | https://www.joesandbox.com/
