This section lists reports for file and malware threats
that are directly related to the primary query object. Each entry
includes a brief summary and a link to the full report. The summary
includes the following information:
-
Basic identification details, such as detection name,
SHA-1 value, and file size
-
The threat's notable characteristics and the corresponding
risk level for each
-
A map that describes the threat's geographic distribution
and overall prevalence