Keyfinder.exe flagged as malicious software

Posted on 2007-07-31
Last Modified: 2008-01-09
Keyfinder.exe from Magic Jelly Beans is being flagged by TrendMicro's Anti-Spyware as malicious code.  Is this a false positive?

How does one know?

Running Windows XP Home SP2 - up to date
TM AntiSpyware V. 3.0 up to date
Question by:Robert
    LVL 6

    Accepted Solution


    false positive:

    Another thing I'd like to address is all of the emails I've been receiving saying the Keyfinder is infected with a virus. No... it's not. Your virus scanner, essentially, is being overprotective. It's trying to do more than scan for viruses. With today's wonderful world of spyware, it seems that a lot of scanners out there are identifying software that "can be used by a malicious user for malevolent purposes." (That is a direct quote from the Trendmicro write-up for the Keyfinder.)

    Author Comment

    I just watched the movie, "Who Killed the Electric Car?"  Not that that is a direct segue, it's probably more of a non-sequitur.

    Anyhow, I went to Trend Micro's website, and did a search on "keyfinder" - which came up empty.

    I next googled "trend micro keyfinder" and went thru Ed Bott's Blog ( to find a link back to Trend Micro about keyfinder (

    iIt's explanation does make some sense:  "Its information gathering capability can be used by a malicious user for malevolent purposes..." as you had noted.   Ah, back to the Electric Car movie.  As General Motors would like to tell it - if it would even acknowledge the EV1 - that the EV1 was not environmentally or financially worthwhile.  Segue with me now... Trend Micro will write up keyfinder on its website, but you can't find it thru Trend Micro!

    My .02 USD, not sure it's even worth a single dong.


    ps - $1 USD = 16,010 Vietnam Dong as of 7/10/07  Exchange rates are subject to change.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Most PC repair technicians (if not all) always start their cleanup process by emptying the temp folders before running any removal tools. It makes sense because temp folders are common places for malware installers to lurk and removing all the junk …
    We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the att…
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now