Did you just find a download or a file on your computer that is digitally signed by Yang Liu? Some of the security products refers to the detected files as W32.HfsAdware.5684 and a variant of Win32/ELEX.HU potentially unwanted. The detection rate for the Yang Liu files collected here is 13%. Please read on for more details.
You will probably notice Yang Liu when running the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:
You can view the additional details from the Yang Liu digital signature with the following procedure:
Here is a screenshot of a file that has been signed by Yang Liu:
As you can see in the screencap above, Windows reports that "This digital signature is OK". This implies that the file has been published by Yang Liu and that the file has not been tampered with.
If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also view the address for Yang Liu, such as the street name, city and country.
thawte SHA256 Code Signing CA has issued the Yang Liu certificates. You can also view the details of the issuer by clicking the View Certificate button shown in the screenshot above.
The following are the Yang Liu files I have collected, thanks to the FreeFixer users.
Detection Ratio | File Name |
---|---|
2/54 | winzipersvc.exe |
14/57 | browserServer.exe |
5/55 | winzipersvc.exe |
16/57 | winzipersvc.exe |
3/56 | winzipersvc.exe |
2/57 | winzipersvc.exe |
1/56 | winzipersvc.exe |
14/52 | winzipersvc.exe |
24/55 | winzipersvc.exe |
4/56 | winzipersvc.exe |
2/57 | winzipper.exe |
3/57 | winzipper.exe |
2/56 | winzipersvc.exe |
11/55 | winzipersvc.exe |
15/55 | winzipersvc.exe |
2/53 | winzipper.exe |
11/55 | winzipersvc.exe |
8/56 | wzShellctx64.dll |
9/58 | winziper.exe |
25/57 | winzipersvc.exe |
0/57 | wzShellctx64.dll |
Here's the detection names for the Yang Liu files. I've grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.
Scanner | Detection Names |
---|---|
AVG | Generic.378, Agent, Generic.FE9, Generic.038, Generic.228, Generic.4DE, Generic.720, Elex.AJX |
AVware | Adware.Elex, Trojan.Win32.Generic!BT |
Ad-Aware | Application.Elex.AD |
AegisLab | Application.Elex.Gen!c, Adwareare.Elex.Jtpb!c, Adware.W32.Elex!c, W32.Troj.Agent!c, Virus.Gen!c, Virus.Gen|2|103!c |
Antiy-AVL | Trojan/Win32.TSGeneric, GrayWare[AdWare:not-a-virus,HEUR]/Win32.ELEX |
Arcabit | Application.Elex.AD |
Avira | ADWARE/ELEX.jdse, ADWARE/ELEX.jtpb, ADWARE/ELEX.sxbu, PUA/Subtab.Gen7, ADWARE/ELEX.EL.8 |
Baidu | Win32.Trojan.WisdomEyes.151026.9950.9974, Win32.Trojan.WisdomEyes.151026.9950.9978 |
BitDefender | Application.Elex.AD |
Bkav | W32.HfsAdware.5684, W64.HfsAdware.5684 |
Comodo | ApplicUnwnt.Win32.Gen.a |
CrowdStrike | malicious_confidence_60% (D), malicious_confidence_70% (D) |
Cyren | W32/Trojan.URDF-8545, W32/Trojan.WSCV-0020, W32/Trojan.PVCA-8061 |
DrWeb | Adware.Mutabaha.1230, Adware.Mutabaha.1195, Adware.Mutabaha.1821, Adware.Mutabaha.1682, Adware.Mutabaha.1627, Adware.Mutabaha.1199, Adware.Mutabaha.1644 |
ESET-NOD32 | Win32/ELEX.HO potentially unwanted, a variant of Win32/Obfuscated.NFU, a variant of Win32/ELEX.HU potentially unwanted, a variant of Win32/ELEX.HL potentially unwanted, a variant of Win32/ELEX.IH potentially unwanted, a variant of Win32/ELEX.IE potentially unwanted, a variant of Win32/ELEX.CK potentially unwanted, a variant of Win32/ELEX.IC potentially unwanted |
F-Secure | Application.Elex.AD |
Fortinet | Riskware/Elex |
GData | Application.Elex.AD, Win32.Trojan.Agent.1LBYG7, Win32.Trojan.Agent.EUUE85, Win32.Trojan.Agent.N82FLS, Win32.Trojan.Agent.36E19U |
Ikarus | PUA.AddLyrics, PUA.Elex, Trojan.Win32.Xadupi |
Invincea | virus.win32.grenam.b, virus.win32.sality.at |
Jiangmin | KVBASE |
K7AntiVirus | Adware ( 004efe271 ), Adware ( 004f415d1 ), Adware ( 004e85841 ) |
K7GW | Adware ( 004efe271 ), Adware ( 004f415d1 ), Adware ( 004e85841 ) |
Kaspersky | not-a-virus:HEUR:AdWare.Win32.ELEX.gen |
McAfee | Artemis!69BBD1CB539B, Artemis!C43247ACD29D, Artemis!3BADA292A7FA, Artemis!C2320271220D, Artemis!AEA496686F15, Artemis!6DA4ED7C99F2, Artemis!5E2764D70089, PUP-FGX |
McAfee-GW-Edition | Artemis!PUP, Artemis, Artemis!Trojan, PUP-FGX |
MicroWorld-eScan | Application.Elex.AD |
Microsoft | Trojan:Win32/Ghokswa, Trojan:Win32/Xadupi |
Panda | PUP/Winzipper |
Qihoo-360 | HEUR/QVM10.1.5A53.Malware.Gen, HEUR/QVM10.1.0000.Malware.Gen, Win32/Virus.Adware.0b4, HEUR/QVM10.1.Malware.Gen |
Rising | PUA.ELEX!8.E6-vQK4hva4uzN (Cloud), PE:Malware.Generic/QRS!1.9E2D [F], Malware.Generic!TsbQLc7BnDS@5 (Thunder), Malware.Generic!baQsuneN33B@5 (thunder) |
SUPERAntiSpyware | PUP.ELEX/Variant |
Sophos | Generic PUA DF (PUA), Generic PUA FC (PUA), Generic PUA GK (PUA), Generic PUA NP (PUA), Generic PUA IB (PUA) |
Symantec | Trojan.Gen.2 |
TrendMicro | TROJ_GEN.R0C1C0DGJ16, TROJ_GEN.R00XC0SFD16, TROJ_GEN.R00JC0DHT16 |
TrendMicro-HouseCall | TROJ_GEN.R0C1C0DGJ16, TROJ_GEN.R00JC0DHT16 |
VIPRE | Adware.Elex (not malicious), Trojan.Win32.Generic!BT |
Yandex | Riskware.Agent!, PUA.ELEX! |
The detection percentage is based on that I have collected 1340 scan results for the Yang Liu files. 173 of these scan results came up with some sort of detection. If you like, you can review the full details of the scan reports by examining the files listed above.
The analysis is based on certificates with the following serial numbers: