Malware analysis and vulnerability check with free online services, for
sticky password premium.exe (downloaded with sharewareonsale hub, I renamed it setup.exe):
virustotal (click)
metadefender (click) (Filseclab engine shows TrojanDldr.Generic.cfzp)
jotti (click)
I've done the same for
sharewareonsale hub (I renamed it setup.exe):
virustotal (click) (ClamAV shows nothing)
metadefender (click) (ClamAV shows nothing)
jotti (click) (ClamAV shows PUA.Win.Packer.Exe-6)
virscan (click) (ClamAV shows PUA.Win.Packer.Exe-6, Fprot shows [NO-PARSE]W32/Felix:CO
elphi!Eldorado[/NO-PARSE])
I also scanned those two files with Win10Defender, SuperAntiSpyware free, MalwareBytesAntiMalware2 free, EmsisoftEmergengyKit free, GridinSoftAntiMalware (taken from giveawayoftheday).
The program is directly installed in
c:\program files (x86) (in x64 machines...).
I didn't try the sticky password installer (taken from their main website): I
think we will be able to choose the install path with it.
No problems during installation and at its startup.