The results for our miner and Claymore's are at least somewhat understandable given that there is a anti-debug and anti-reversing code but the result of ethminer is really mind-boggling. This is quite unfortunate as there is no easy way to separate the software that can be trusted from the scams.
Well, as you can see in the post above yours, these scans should be taken with huge grain of salt. According to this site, the
Claymore's miner is teaming with infections (dozens of them), so is the ethminer. Is this actually true? No, certainly not -
these results obviously are not accurate and often give a lot of false positives. We can't expect any anti-virus developer to make sure that there aren't any false positives, because it doesn't really concern them - if their software finds a threat that isn't there, they aren't affected negatively in any way.
And really, think about it: we have spent a lot of time and efforts to make our miner as fast as possible and this wasn't easy at all. The potential profits if more people start using our miner are much higher than any potential profits of trying to infect them with malware. Why we would want to undermine our own efforts?
If the file has the right checksums:
File: PhoenixMiner_2.1.zip
SHA-1: 37211462abc8fedb88930589cea0710b3aaa81b8
SHA-256: 23b6ffd3d67980bce45ef7196fed7349c5e6c0a2b1f3fe5b2182aa58f1ebbd21
SHA-512: 74e4332f0027aa1ae7071bcf83ab37deb790b3a2f341539cc523182cc9a951578ebebe306a1ffcc93d2b5fbd31ebe9e7dbc7ff56ce0d4349d230c5c986ba7996
then we can assure you
that it is 100% clean. The checksums can be checked online or with a program like HashCheck (
https://github.com/gurnec/HashCheck).