While the application is running, various events can occur. The events may be informational or may contain important data. For example, the application can use events to notify about a successful application database update, or to inform about an error in the operation of application components that must be eliminated.
The application generates various types of reports based on events that occur while the application is running.
Events and reports may contain the following personal data:
User name and user ID of operating system users
Paths to user files
IP addresses of remote devices that are scanned by the Anti-Cryptor task
IP addresses of senders and receivers of network packets scanned by the Firewall Management task
Detected malicious, phishing, adware web addresses, and web addresses that contain legal software that may be used by criminals to damage your device or personal data
Names of the containers and images
Paths to the containers and images
Names and IDs of the devices
Web addresses of the repositories
File names, paths to files, and hash-sums of executable application files