We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kaspersky detected Follow.exe as threats
事件: 检测到恶意对象 用户: LAPTOP-40KCET3U\Lee Tzehan 用户类型: 活动用户 应用程序名称: explorer.exe 应用程序路径: C:\Windows 组件: 文件反病毒 结果说明: 检测到 名称: UDS:DangerousObject.Multi.Generic 精确度: 确切 威胁级别: 高 对象类型: 文件 对象名称: Follow.exe 对象路径: C:\Users\Lee Tzehan\AppData\Local\Follow MD5: A7780E32128E01388725D728385DA796 原因: 云保护
not feed issue
No response
The text was updated successfully, but these errors were encountered:
FOL-891 false positives from Anti Virus
Sorry, something went wrong.
Bot detected the issue body's language is not English, translate it automatically. 👯👭🏻🧑🤝🧑👫🧑🏿🤝🧑🏻👩🏾🤝👨🏿👬🏿
Event: Malicious object detected User: LAPTOP-40KCET3U\Lee Tzehan User Type: Active User Application name: explorer.exe Application path: C:\Windows Component: File Anti-Virus Result description: Detected Name: UDS:DangerousObject.Multi.Generic Accuracy: Exact Threat Level: High Object type: file Object name: Follow.exe Object path: C:\Users\Lee Tzehan\AppData\Local\Follow MD5: A7780E32128E01388725D728385DA796 Reason: Cloud Protection
My Kaspersky deleted this application
No branches or pull requests
Describe the bug
kaspersky detected Follow.exe as threats
事件: 检测到恶意对象
用户: LAPTOP-40KCET3U\Lee Tzehan
用户类型: 活动用户
应用程序名称: explorer.exe
应用程序路径: C:\Windows
组件: 文件反病毒
结果说明: 检测到
名称: UDS:DangerousObject.Multi.Generic
精确度: 确切
威胁级别: 高
对象类型: 文件
对象名称: Follow.exe
对象路径: C:\Users\Lee Tzehan\AppData\Local\Follow
MD5: A7780E32128E01388725D728385DA796
原因: 云保护
Feed Info
not feed issue
Reproduction Video
No response
Environment
No response
Validations
Contributions
The text was updated successfully, but these errors were encountered: