Normally after scanning an URL with executable via VT URL scan a pop-up would open up that allowed access to an av report scan and with one glance of an eye we could see whether avast and or other av solutions had detection for a certain threat or not. With new.virustotal com this additional scan function seems gone, making VT URL scanning nothing better or worse as a web rep tool. So we have to establish the file MD5 has first and look for detection or not via other resources. Why they obscured scan results in this way?
This file not being detected by avast has another reason alltogether. That reason it is a PUP or risktool. Scanners like ClamAv flagging this as PUA.Packed.PECompact-2 does not have all the latest technology aboard to even come to terms with all packers/protection and what have you in modern malware etc. From the Emisoft result we know we deal with a risktool. Now I greatly miss the bugbopper site where these enthusiasts there could come up with the right name convention terminology, e.g. this is such an such a virus, then furthermore it could be classified as part of this family and that subfamily etc. and so on. A great pity it was discontinued because it had a wealth of malware resources and data on malcode there. They functioned for me as a sort of Linneus not for flower determination but for malware name convention. Now we have to take the file “by the hash id” to knwo what we really deal with uniquely, because some malware comes up uniquely all the time all of the time. Who said that they would make it easy on you? ;D