-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Micosoft Defender Detects Flowkeeper as Trojan:Script/Wacatac.H!ml #107
Comments
Hello @titusz, thanks for the report! I can confirm that part of the Windows release pipeline scans
In the meantime I will submit those EXE files to Microsoft Security for validation, just in case. |
Just installed 24H2, works fine out of the box: Upgraded with the latest updates -- still works fine: Installed 2025 Cumulative Update Preview -- still works fine: Installed all "normal" updates on a 22H2 instance -- works fine there: Installed preview updates on 22H2 -- still works: Also ran Defender scans (Quick, Manual and offline) on both systems explicitly -- no threats detected. |
Alright, I was able to reproduce it by submitting the extracted Flowkeeper.exe to the latest Defender: https://www.virustotal.com/gui/file/07a82b4bc7fd6b049a77f65ef627b248638320ed6c8a9f9ced53072647b71d3a Already contacted Microsoft and other vendors to mark it as a false positive. Will need to think about how to avoid this for the future versions. |
Update -- Microsoft removed it as false positive, took them three days. Apparently they don't process those tickets on weekends. |
I will close this issue, but will certainly do a follow-up, because this is simply not sustainable -- I can't spend days submitting those Windows binaries to all antivirus vendors as false positives for each new release. As a follow-up I created a few other issues:
|
Windows flags and removes Flowkeeper.exe as
Trojan:Script/Wacatac.H!ml
.The text was updated successfully, but these errors were encountered: