The URLs used in the test are at least 10 days old at Malc0de, MalwareURL, Nictasoft, MalShare, and others.
The files themselves are re-used over-and-over by the malc0ders.
In using Malc0de, one has to be aware that they will keep re-posting new URLs with the same re-used files.
What I am saying is that using published URLs to test softs can make it seem that the soft is doing great - providing 1st rate protection - but in reality it is not because the URLs and files are already old.
In a test of Qihoo you have to eliminate all files that are already detected by Bitdefender, Avira and Qihoo. Only then is the test result a validation of the product's protection potential.
All the AVs subscribe to essentially the same, identical malicious URL\ file lists.
Undetected samples from the Malware Hub and malware packs available at various sites are better for testing. But, admittedly, it is not a simple task to harvest enough undetected samples sometimes.
* * * * *
1243123.exe is Cerber.
PCMedik is a PUP. PCMedik and pcmedik aren't the same file; compare the SHA1 hashes.
You can't go by the machine learning\artificial intelligence file verdicts below from Malc0de files.
For example, FlashPlayerPro.exe is an Install Monster, but the ML\AI states "No threat found."
Another example, Couponscom.exe is a browser hijacker, but ML\AI states "No threat found."
These files and their URLs had been up on Malc0de for at least the week prior to 12/26 - when I submitted them for ML\AI analysis.
View attachment 129001