Andrey Hmelnikov - 40% Detection Rate *

Did you just stumble upon a download or a file on your computer that is digitally signed by Andrey Hmelnikov? Some of the security products refers to the detected files as Unwanted-Program ( 0040f9b41 ) and MultiPlug. The detection rate for the Andrey Hmelnikov files collected here is 40%. Please read on for more details.

You will typically notice Andrey Hmelnikov when double-clicking to run the file. The publisher name is then displayed as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Andrey  Hmelnikov appears as the verified publisher in the UAC dialog

You can view the digital signature details for Andrey Hmelnikov with the following procedure:

  1. Open up Windows Explorer and locate the Andrey Hmelnikov file
  2. Right-click on the file and select Properties
  3. Click the Digital Signatures tab
  4. Click the View Certificate button

Here is a screenshot of a file that has been digitally signed by Andrey Hmelnikov:

Screenshot of the Andrey  Hmelnikov certificate

As you can see in the screenshot above, Windows states that "This digital signature is OK". This means that the file has been published by Andrey Hmelnikov and that the file has not been tampered with.

If you click the View Certificate button shown in the screenshot above, you can examine all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also see the address for Andrey Hmelnikov, such as the street name, city and country.

Certum Code Signing CA has issued the Andrey Hmelnikov certificates. You can also examine the details of the issuer by clicking the View Certificate button shown in the screenshot above.

Andrey Hmelnikov Files

The following are the Andrey Hmelnikov files I have gathered, thanks to the FreeFixer users.

Detection RatioFile Name
22/57counter strike source game.exe
26/57Youwave.exe
19/54FM 21-15 Care and Use of Individual Clothing and Equipment - Department of the Army (1977).exe
17/568699.exe
13/56Download.exe
20/56728x90ad.exe
32/57Red Giant Magic Bullet Suite 11.4 Full Serial Key (32-64 bit).exe
36/57importantupdate.exe
11/57728x90ad.exe
4/57Download.exe

Scanner and Detection Names

Here's the detection names for the Andrey Hmelnikov files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
ALYacGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Mikey.8261, Gen:Variant.Adware.Mplug.30, Gen:Variant.Adware.MPLug.35
AVGGeneric6.NJY, Generic6.OWI, Generic_r.VD, Generic6.DFJ, Generic.AF9, Generic6.LQG, Generic6.RHR
AVwareRiskware.Win32.Multiplug.fk (v)
Ad-AwareGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Kazy.481287, Gen:Variant.Adware.Mplug.21, Gen:Variant.Adware.MPlug.31, Gen:Variant.Adware.Mplug.30, Gen:Variant.Adware.MPLug.35
AegisLabTroj.W32.Gen
AgnitumTrojan.Badur!
AhnLab-V3PUP/Win32.MultiPlug
Antiy-AVLGrayWare[AdWare:not-a-virus]/Win32.MultiPlug.oaqk
AvastWin32:MultiPlug-SM [PUP], Win32:Dropper-gen [Drp], Win32:MultiPlug-JU [PUP], Win32:MultiPlug-SY [PUP], Win32:MultiPlug-WR [PUP], Win32:MultiPlug-QV [PUP]
AviraAdware/MPlug.trou, PUA/Multiplug.trou, ADWARE/MultiPlug.Gen7, ADWARE/MultiPlug.Gen4
BitDefenderGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Kazy.481287, Gen:Variant.Adware.Mplug.21, Gen:Variant.Adware.MPlug.31, Gen:Variant.Adware.Mplug.30, Gen:Variant.Adware.MPLug.35
BkavW32.HfsAdware.E192, W32.HfsAdware.5C2A, W32.HfsAdware.6D6E, W32.HfsAdware.768D, W32.HfsAdware.5DC0
CAT-QuickHealAdware.Multiplug.D6
ComodoApplication.Win32.Multiplug.CT, Application.Win32.AdWare.MultiPlug.VA
CyrenW32/S-05e718fa!Eldorado, W32/S-fb69ed61!Eldorado, W32/MultiPlug.H.gen!Eldorado
DrWebTrojan.Crossrider.36840, Trojan.Crossrider1.22656
ESET-NOD32a variant of Win32/Adware.MultiPlug.ES, a variant of Win32/AdWare.MultiPlug.CT, a variant of Win32/Adware.MultiPlug.ED, a variant of Win32/Adware.MultiPlug.EP, a variant of Win32/Adware.MultiPlug.EZ, a variant of Win32/Adware.MultiPlug.FA, a variant of Win32/Adware.MultiPlug.EI
EmsisoftGen:Variant.Adware.Mikey.7658 (B), Gen:Variant.Adware.Kazy.481287 (B), Gen:Variant.Adware.Mplug.21 (B), Gen:Variant.Adware.MPlug.31 (B), Gen:Variant.Adware.Mplug.30 (B), Gen:Variant.Adware.MPLug.35 (B)
F-ProtW32/S-05e718fa!Eldorado, W32/S-e978168d!Eldorado, W32/S-fb69ed61!Eldorado, W32/MultiPlug.H.gen!Eldorado, W32/S-05ee4373!Eldorado
F-SecureGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Kazy.481287, Gen:Variant.Adware.Mplug.21, Gen:Variant.Adware.MPlug.31, Gen:Variant.Adware.Mplug, Gen:Variant.Adware.MPLug
FortinetRiskware/MultiPlug
GDataGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Kazy.481287, Gen:Variant.Adware.Mplug.21, Win32.Adware.Multiplug.X, Gen:Variant.Adware.MPlug.31, Gen:Variant.Adware.Mplug.30, Gen:Variant.Adware.MPLug.35
JiangminAdWare/MultiPlug.card, AdWare/MultiPlug.dikv
K7AntiVirusUnwanted-Program ( 0040f9b41 ), Unwanted-Program ( 0040f9681 ), Unwanted-Program ( 0040f9a71 )
K7GWUnwanted-Program ( 0040f9b41 ), Unwanted-Program ( 0040f9681 ), Unwanted-Program ( 0040f9a71 )
Kasperskynot-a-virus:AdWare.Win32.MultiPlug.oaqk
MalwarebytesPUP.Optional.MultiPlug.A, PUP.Optional.MultiPlug, PUP.Optional.Unizeto
McAfeeMultiplug-FVQ, MultiPlug-FVQ, MultiPlug-FRO, MultiPlug-FTS, MultiPlug-FVZ, MultiPlug-FUV, MultiPlug-FWG
McAfee-GW-EditionBehavesLike.Win32.SoftPulse.tc, MultiPlug-FVQ, BehavesLike.Win32.ArcadeWeb.cc, BehavesLike.Win32.Downloader.th, BehavesLike.Win32.Downloader.tc, MultiPlug-FUV, MultiPlug-FWG
MicroWorld-eScanGen:Variant.Adware.Mikey.7658, Gen:Variant.Adware.Mplug.21, Gen:Variant.Adware.MPlug.31, Gen:Variant.Adware.Mplug.30, Gen:Variant.Adware.MPLug.35
MicrosoftSoftwareBundler:Win32/InstalleRex
NANO-AntivirusRiskware.Win32.MultiPlug.dnzymr, Riskware.Win32.MultiPlug.dfjscb, Riskware.Win32.MultiPlug.dkntvn, Trojan.Win32.Crossrider.dniokz, Riskware.Win32.MultiPlug.dogrkr
PandaGeneric Suspicious
RisingPE:Malware.XPACK-HIE/Heur!1.9C48
SophosMultiPlug
TencentTrojan.Win32.Qudamah.Gen.4
VBA32suspected of Heur.Malware-Cryptor.Multiplug, SScope.Adware.MultiPlug, Heur.Malware-Cryptor.Multiplug
VIPRERiskware.Win32.Multiplug.fk (v)
ZillyaTrojan.Badur.Win32.16183, Adware.MultiPlug.Win32.213922

* How the Detection Percentage is Calculated

The detection percentage is based on that I've collected 1242 scan results for the Andrey Hmelnikov files. 499 of these scan results came up with some sort of detection. You can view the full details of the scan results by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply