grams that are deemed malicious or infected or could contain possible threats as well as information concerning the behaviors they manifested to be detected as malicious or infected and application settings and configurations, such as associated registry keys, and (iv) information about applications and files that were wrongfully classified as malicious, meaning that they were allowed to run or us