This guide is here to help you make informed decisions, but the final call on file safety is yours.
Use your best judgment and be cautious. If you're unsure, consider seeking professional help from a security expert.



When conducting a VirusTotal (VT) scan, follow these steps to thoroughly analyze the results:

  • Ensure that the scan date is recent. If not, click on the 'Reanalyze' button and scan to detect new threats or remove old false positives.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Look at the top-right side of the screen.)

Scan Date
Scan Date location in VirusTotal

• Creation Time, First Seen In The Wild, and First Submission:

◦ Creation Time may be unreliable if obviously fake (e.g., set in the future).

◦ Compare First Seen In The Wild and First Submission dates with the product release date to identify recycled malware.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab.)

Details Tab
Details tab in VirusTotal

• Ignore names resembling hashes or generic terms like 'sample1.exe'.

• Multiple names for unrelated products suggest potential malware.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Names' section.)

Submitted Names
Submitted names section

• For pirated software, signatures won't be helpful as cracks or patched files won't be valid, but typically if there was an invalid signature it would be suspicious.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Signature info' section.)

Signature Info
Signature information

• Execution Parents/Resource Parents:

◦ Focus on installers or archives that contained, dropped, or downloaded the file. Ignore if scanning an installer that wasn't extracted from another file.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Execution Parents' section.)

Execution Parents
Execution Parents section

• Dropped Files/Bundled Files:

◦ Examine files extracted from the scanned file, particularly useful when scanning archive files.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Bundled Files' section → Scroll down a bit more until you see the 'Dropped Files' section.)

Bundled Files
Bundled and Dropped Files sections

• Graph Summary

◦ Take a quick glance at everything once more.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Graph Summary' section.)

Graph Summary
Graph Summary visualization

• Beware of overwhelming malicious results, but also consider false positives. (e.g. drive.google.com is currently flagged as a phishing site by one of the AVs)

• Suspicion arises if a file meant to be benign (e.g., a keygen or patcher) makes unexpected requests.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Contacted IP addresses' section.)

Contacted IPs
Contacted IP addresses section

• Opening and reading files, writing/deleting temp files, and expected installer activities are generally benign.

• Suspicion arises if the file exhibits unusual behavior or accesses unnecessary areas.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Behavior' tab → Scroll down and notice the info presented to you.)

Behavior Tab
Behavior tab overview

• Generic/gen/susgen detections (like W32.Trojan.Gen) or AI/ML labels may indicate potential malware that doesn't match known signatures.

• Common detections for cracks, patches, etc., include riskware, hacktool, and not-a-virus (last one is specific to Kaspersky).

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Detection' tab → Scroll down and notice the info presented to you.)

Detections Tab
Detection results

• Although rare, alarming statements like 'all your files are belong to us', take immediate action.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Behavior' tab → Scroll down until you see the 'Highlighted actions' tab.)

Highlighted Actions
Highlighted actions section

• New files may lack accurate detections, while older files should have more reliable results.

• A file's age can provide context; newer files warrant closer scrutiny.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'History' tab.)

File Age
File history information

• If numerous specific detections align, it indicates higher risk.

(Go to the VirusTotal site → Upload your file or search the file hash/url → Look at the 'Popular threat label' section → Look at the 'Threat categories' section → Look at the 'Family labels' section.)

Similar Detections
Threat categorization sections

• While often cluttered, occasionally valuable insights or warnings are found.

Community Voting
Community voting
Community Comments
Community comments

(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Community' tab.)


• Even with thorough analysis, some uncertainty may remain. Exercise caution with suspicious files and generic detections.

• If unsure, refrain from using the file.

Old owner - ilike2burnthing

New / Current owner - Clara

Not By AI

(With <3 )

If you have any feedback you want to give me, please fill in a form here.


Go back to the top