danishjuzdan / jnativehook

Automatically exported from code.google.com/p/jnativehook
0 stars 0 forks source link

Jar detected as Trojan.Hook by Malwarebytes #97

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. Scan the jar with malwarebytes.

Full scan on virustotal (detection rate 2/56):
https://www.virustotal.com/file/9aae01d12e63de2b0162a1dee8bade1f38f0f6e35fa2d330
d1ea64672213eff2/analysis/

The process is indeed hooking so it's probably not unexpected that it's 
detected, but it still is of course not wanted, and if avoidable, should be 
avoided. I hope there are ways to solve this.

Original issue reported on code.google.com by LordHamani1 on 5 Jun 2015 at 11:16

GoogleCodeExporter commented 9 years ago
Its probably detected due to using 
https://msdn.microsoft.com/en-us/library/windows/desktop/ms644990%28v=vs.85%29.a
spx.  Any program that calls that function will probably be flagged.  There are 
probably ways to defeat the false alarm, but I'm not going to go try and work 
around a false positive in malware bytes.

Original comment by a...@1stleg.com on 7 Jun 2015 at 1:15