{% extends "layout.html" %} {% block content %}

{% if result.is_malicious %} Malware Detected {% else %} File Safe {% endif %}

{% if result.is_malicious %} {% else %} {% endif %}

Scan Results for: {{ result.filename }}

File Type: {{ result.file_type }}

Threat Confidence: {{ result.confidence }}%
{{ result.confidence }}%
Detailed Analysis
{% if 'url' in result %} {% if result.is_malicious %}
URL Analysis Results
Scanned URL:
{{ result.url }}
{% for threat in result.threats %}

Category: {{ threat.category }}

Description: {{ threat.description }}

Risk Details

{{ threat.risk }}


Safety Tips: {{ threat.safety_tips }}

{% endfor %}
Safety Recommendations
  • Do not visit this URL or click any links associated with it
  • If you've already visited the URL, clear your browser cache and cookies
  • Run a security scan on your device
  • Report this URL to relevant security authorities
{% else %}
URL Analysis Results
Scanned URL:
{{ result.url }}

This URL appears to be safe. No malicious content or suspicious behavior was detected.

Security Checks Performed:
  • Domain reputation analysis
  • SSL certificate verification
  • Malware signature detection
  • Phishing pattern analysis
  • Blacklist verification
{% endif %} {% else %} {% if result.is_malicious %}
Threats Detected
{% for threat in result.threats %}

Description: {{ threat.description }}

Indicators: {{ threat.indicators }}


Risk Assessment

{{ threat.risk }}


Recommendation: {{ threat.recommendations }}

{% endfor %}
File Hash (SHA-256):
{{ result.file_hash }}

This unique fingerprint can be used to check this file against malware databases or for reference in security reports.

Detailed Recommendations
  • Immediate Action: Do not open or execute this file. Quarantine or delete it immediately.
  • System Scan: Run a full system scan using a trusted antivirus/anti-malware program.
  • Network Monitoring: Monitor your network for unusual outbound connections.
  • Password Security: If you've already executed this file, change passwords for important accounts.
  • Source Verification: Contact the file source to verify legitimacy if it came from a seemingly trusted source.
  • Update Security: Ensure your operating system and security software are up-to-date.
{% else %}
No Threats Detected

Our AI-powered malware detection system did not identify any malicious code or suspicious behavior in this file.

Analysis Details:
  • Scanned file: {{ result.filename }}
  • File type: {{ result.file_type }}
  • Confidence score: {{ result.confidence }}% (lower is better)
  • Analysis checks performed: Executable code, entropy analysis, pattern matching, signature verification, behavioral analysis
Safety Recommendations
  • Source Verification: Always verify files come from trusted sources.
  • Visual Inspection: Check file names and extensions before opening.
  • Caution with Macros: Be careful with documents containing macros or scripts.
  • Regular Updates: Keep your operating system and applications updated.
  • Backup Important Data: Maintain regular backups of critical files.
{% endif %} {% endif %}
{% if result.report_available %}
PDF Report Available

A detailed PDF report has been generated for this scan. You can download it for reference or documentation purposes.

Report path: {{ result.report_path }}

{% elif result.report_requested or result.report_error %}
Report Generation Issue

Your PDF report was requested but could not be generated due to a technical issue.

Error: {{ result.report_error }}

{% endif %}
{% endblock %}