The number of instances of this threat that were detected.
The hash value associated with the detected threat.
Additional information about where this threat was detected.
The name of the detected threat.
The source that detected this threat.