I'm trying to follow this. You mined and you claimed coins from the fork? Are you using the virus version of the wallet?
Yes, i claimed coins from fork, then sent all the coins to one BTG address and used this address for mining.
version of the wallet .. yes, I saw the Virustotal triggering..
but I downloaded from the official site, who can be trusted if not by the developers?
(I thought so)
So I used the wallet "as is", trusting the development team.
what is the checksum of your wallet?
I could not answer right away, because for this, I need to open a computer, connect another hard disk and boot from it.
so.
hash of the wallet that I installed.
Sorry for the big images.
SHA-256 checksum - 53e01dd7366e87fb920645b29541f8487f6f9eec233cbb43032c60c0398fc9fa






-------------------------------
MORE STILL MORE INTERESTING !!
If ONE SAME FILE is checked for virustotal.com - Different results are obtained!
If on virustotal.com
provide a link to
https://github.com/BTCGPU/BTCGPU/releases/download/0.15.0.1/bitcoingold-0.15.0-win64-setup.exethen this result is obtained
https://www.virustotal.com/#/url/6e7b2078df16062464410a99c6a6f687e87624083c59009e2f36c0b7069361a8/detectionALL CLEAR !!!BUTIf the
SAME FILE is downloaded to your computer and upload to virustotal.com
we GET OTHER RESULTS !!!!!https://www.virustotal.com/#/file/53e01dd7366e87fb920645b29541f8487f6f9eec233cbb43032c60c0398fc9fa/detection(
I downloaded this file today, right now. And it still contains viruses.)


----------------------
I already wrote about this in another thread----------------------------
I will repeat my assumption:
my suggestion:
For analysis by reference, one file is provided, and for users, another.
I think the developers implemented the back-door in the wallet and selectively (randomly) steal the user's coins.