ThreatInfo policy
Terms of Use
Rules for using ThreatInfo malware reports, search, downloads, and file reputation data.
Using ThreatInfo
ThreatInfo provides malware intelligence, file reputation reports, hashes, detection names, category pages, and related security context. By using this website, you agree to use the information for lawful security research, incident response, system administration, and personal protection purposes.
You may view, search, and reference public report pages. You may not use ThreatInfo to attack systems, distribute malware, automate abusive scraping, misrepresent detections, or interfere with the availability of the service.
Report data and accuracy
ThreatInfo reports are based on observed file metadata, GridinSoft detection names, hashes, telemetry signals, and related analysis. Malware classification can change as files are reanalyzed, signatures are updated, or additional context becomes available.
The service is provided for informational security use. A report should not be treated as the only basis for deleting, allowing, blocking, or accusing a publisher or file. Always compare the exact hash, file path, signature, and local system context.
Downloads and security software
ThreatInfo may offer a GridinSoft Anti-Malware download for scanning and removal. Downloaded software is subject to its license terms and should be installed only on systems where you have authorization to run security tools.
Availability and changes
ThreatInfo may update pages, routes, detection descriptions, download links, policies, or service behavior without prior notice. We may restrict automated traffic, abusive use, or activity that creates operational or security risk.