ThreatInfo research digest
A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.
Category overview
Reports worth opening
Adware
Review browser changes, bundled installers, extensions, and unexpected advertising behavior.
29b610e22bdb558437b566c55b4ad0a3PUP/PUA
Check whether the file came from an installer bundle, optimizer, updater, or optional offer.
Trojan
Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.
1d95f7c9135fefc44b34ef89a26de425Ransomware
Prioritize isolation and backup checks when this class appears on an endpoint.
Virus
Look for copied or modified executables and scan related files created around the same time.
How to use this digest
Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.