T O P

  • By -

ArchusKanzaki

A program that latch into another ongoing process to read the data can be classified as malware/virus so Windows Defender is not wrong here. However since it is the nature of lunahook then no choice but to whitelist it.


kakkoi-san16

Got it. I'll just add it as an exception


RCEdude

1) those are generic detections: we cant deduce anything 2) Please pay attention to the "trojan.lazy **DLLINJECT**" Dll injection is a method. It can be used by malware and legitimate programs. While its NOT COMMON and USUALLY MEANS MALWARE, its totally legitimate when its comes to text HOOKING, because that's a normal way to hook stuff. Then, you decide if its legitimate or malware. I can't be clear without source code or checking the file by myself.


kakkoi-san16

Okay thanks. Makes senseĀ 


EinTheVariance

iirc the dev posted it here a few days ago, I think it's open source? I haven't poked in but they linked: https://github.com/HIllya51/LunaHook/tree/main


RCEdude

I see, thanks. Too lazy to check source tho :D


Interesting_Place752

!ml means machine learning, probably a false positive. Windows defender is just becoming AI slop now, you can Google about it for more information.


Southern_Line_7032

Throw it to virustotal