Yes it was as I assure every scan always includes PUPs as I care less about how long a scan takes, the longer the better in my book. But thanks for asking, never hurts to remind Users 'if they expect full results, go the full route. of new notes, I ran across yet another dirty GOM Playayer file, again same Avast results (supposedly clean).
Please kindly consider the following request regarding my initial post, for it really needs re-titled and moreover the post’s body totally replaced.
My post’s body should/might well have been seen as…
Out of 58 AV companies, as few as one or even none may correctly scan an .exe.
Hi everybody,
Here’s a tip we all need to share, maybe even pin it somewhere.
1/23/2018, ref. continued uuguru ‘house cleaning’, note following cut-pasted virustotal.com scan results for submitted (GOMPLAYERGLOBALSETUP.EXE v1.0.3751 w-my approx. download date being 2011), Avast’s Community Forum posted results include submitted scr-shot of virustotal.com’s webpage regarding the scan completion, ref. URL…
https://www.virustotal.com/#/file/a5a4ea2b1b8c83ddbebcf601aa2da84c5bedeb16a1495b9ecbd125bdd62da85a/detection
This listed, just now scanned, detected Virus listed below. and while it dates back to Jul 6, 2011, reportedly then firstin the wild.
Note, in as much as back then, I was in the habit of checking various websites like CNET, etc, for updated freeware version of GOM Player, usually only updating them when my then current one went ‘south’ or began showing signs of corruption and fortunately never used this executable, but only now ran across it when 'house cleaning the EHD.
My today’s Web search on Virustotal’s dirty detected file, finds…
Bloodhound.MalPE was/is the latest Trojan infection to be causing all sorts of chaos on the net. Specifically, Bloodhound.MalPE is a detection which may be triggered when malware is packed in a particular way to avoid detection. The majority of the malware seen obfuscated in this way have been Trojan password stealers.
Some Trojan password stealers may be capable of modifying registry data to execute a dropped copy of the Trojan at each Windows start.
The following symptoms are commonly known to be related to this parasite, Bloodhound.MalPE:
- Browser and search engine hijacked by malicious web sites
- Incapability to alter desktop wallpaper, unable to delete strange desktop icons
- Bloodhound.MalPE re-creates itself after been eliminated manually, exceptionally complicated to get rid of
- Corrupt or missing registry keys, dlls and system files produce "Blue Screen"
- Slow pc, long startup and re boot with windows screen freeze
- Pop-up blocker unable close pop-up windows, overflowed Computer with disturbing porn pop-up messages
Characteristics of Bloodhound.MalPE are as follows:
- Monitors registry records, captures surfing history and Windows activity to create matching pop ups
- Logs active security software, deactivates antivirus and firewall programs and forwards private information to outlying sites
- Bloodhound.MalPE installs itself into system and downloads malicious Trojan and adware bundles via security leaks.
- Enables an In Process Object/Server - Common with DLL Injections
- The Process is packed and/or encrypted using a software packing process
- Creation and Registration of a Browser Helper Object in Internet Explorer
- Registers a Dynamic Link Library (DLL) File
- The Process is polymorphic and can change its structure
- Found on infected systems and resists interrogation by security products
That as still posted (from July 2011) at…
http://www.pcthreat.com/parasitebyid-9485en.html
<cut-pasted virustotal’s scan results>
1 / 58 <one of 58 AV companies>
One engine detected this file
SHA-256
a5a4ea2b1b8c83ddbebcf601aa2da84c5bedeb16a1495b9ecbd125bdd62da85a
File name
GOMPLAYERGLOBALSETUP.EXE
File size
27.73 MB
Last analysis
2018-01-23 13:23:35 UTC
Detection Details Community
Symantec
Bloodhound.MalPE
Ad-Aware
Clean
AegisLab
Clean
AhnLab-V3
Clean
ALYac
Clean
Antiy-AVL
Clean
Arcabit
Clean
Avast
Clean
Avast Mobile Security
Clean
AVG
Clean
Avira
Clean
AVware
Clean
Baidu
Clean
BitDefender
Clean
Bkav
Clean
CAT-QuickHeal
Clean
ClamAV
Clean
CMC
Clean
Comodo
Clean
Cyren
Clean
DrWeb
Clean
Emsisoft
Clean
eScan
May differ from commercial off-the-shelf product. The company decides the particular settings with which the engine should run in VirusTotal.
Clean
ESET-NOD32
Clean
F-Prot
Clean
F-Secure
Clean
Fortinet
Clean
GData
Clean
Ikarus
Clean
Jiangmin
Clean
K7AntiVirus
Clean
K7GW
Clean
Kaspersky
Clean
Kingsoft
Clean
Malwarebytes
Clean
MAX
Clean
McAfee
Clean
McAfee-GW-Edition
Clean
Microsoft
Clean
NANO-Antivirus
Clean
nProtect
Clean
Panda
Clean
Qihoo-360
Clean
Rising
Clean
Sophos AV
Clean
SUPERAntiSpyware
Clean
Tencent
Clean
TheHacker
Clean
TrendMicro
Clean
TrendMicro-HouseCall
Clean
VBA32
Clean
VIPRE
Clean
ViRobot
Clean
Webroot
Clean
Yandex
Clean
Zillya
Clean
ZoneAlarm
Clean
Zoner
Clean
Alibaba
Unable to process file type
CrowdStrike Falcon
Unable to process file type
Cybereason
Unable to process file type
Cylance
Unable to process file type
eGambit
Unable to process file type
Endgame
Unable to process file type
Palo Alto Networks
Unable to process file type
SentinelOne
Unable to process file type
Sophos ML
Unable to process file type
Symantec Mobile Insight
Unable to process file type
Trustlook
Unable to process file type