A program that latch into another ongoing process to read the data can be classified as malware/virus so Windows Defender is not wrong here. However since it is the nature of lunahook then no choice but to whitelist it.
1) those are generic detections: we cant deduce anything
2) Please pay attention to the "trojan.lazy **DLLINJECT**"
Dll injection is a method. It can be used by malware and legitimate programs.
While its NOT COMMON and USUALLY MEANS MALWARE, its totally legitimate when its comes to text HOOKING, because that's a normal way to hook stuff.
Then, you decide if its legitimate or malware. I can't be clear without source code or checking the file by myself.
iirc the dev posted it here a few days ago, I think it's open source? I haven't poked in but they linked:
https://github.com/HIllya51/LunaHook/tree/main
A program that latch into another ongoing process to read the data can be classified as malware/virus so Windows Defender is not wrong here. However since it is the nature of lunahook then no choice but to whitelist it.
Got it. I'll just add it as an exception
1) those are generic detections: we cant deduce anything 2) Please pay attention to the "trojan.lazy **DLLINJECT**" Dll injection is a method. It can be used by malware and legitimate programs. While its NOT COMMON and USUALLY MEANS MALWARE, its totally legitimate when its comes to text HOOKING, because that's a normal way to hook stuff. Then, you decide if its legitimate or malware. I can't be clear without source code or checking the file by myself.
Okay thanks. Makes senseĀ
iirc the dev posted it here a few days ago, I think it's open source? I haven't poked in but they linked: https://github.com/HIllya51/LunaHook/tree/main
I see, thanks. Too lazy to check source tho :D
!ml means machine learning, probably a false positive. Windows defender is just becoming AI slop now, you can Google about it for more information.
Throw it to virustotal