Elex Hijacker
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 58 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 2,036,159 |
| First Seen: | April 1, 2015 |
| Last Seen: | March 25, 2026 |
| OS(es) Affected: | Windows |
The Elex Hijacker is a Web browser hijacker that may take over a Web browser, change its homepage and other settings and prevent computer users from restoring their Web browser to its default setting. The Elex Hijacker may be associated with a variety of other unwanted symptoms. The main reason that makes the Elex Hijacker is considered a browser hijacker is because its main purpose is to take over a Web browser to force computer users to view certain websites repeatedly and open new Web browser windows and tabs while the computer users attempt to use their computers. The Elex Hijacker is promoted as a useful Web browser extension or add-on. However, PC security researchers have determined that the Elex Hijacker does not offer any useful or beneficial service. Rather, the Elex Hijacker is designed to make money at the expense of computer users by displaying advertisements or forcing them to visit websites related to their affiliate websites.
Table of Contents
The Elex Hijacker may Expose Your Computer to Threatening Content
One of the main problems related to the Elex Hijacker is that computer users don't really have any control over the websites that their Web browser forces them to visit. This may cause computers to become infected with threats or other low-level threats as a result of the Elex Hijacker redirects or pop-ups. Essentially, the Elex Hijacker itself is a low-level threat, but various pop-up messages and affiliated websites may expose your computer to more threatening unwanted content. Another issue with the Elex Hijacker is that it may deliver large volumes of advertising content to computer users in the form of banners, inserted links, pop-up advertisements, and other unwanted advertisements added to the websites viewed on the affected Web browser. The Elex Hijacker may cause important performance issues on affected computers. If the Elex Hijacker is installed on your Web browser, this may increase the probability of crashing, freezing or a slower performance.
How the Elex Hijacker may Infect a Computer
One of the ways in which the Elex Hijacker may be distributed is by using typical threat deliver methods. Because of this, you should be well protected from the Elex Hijacker if your computer is safeguarded against threats, or if you have taken steps to avoid threats when browsing the Web. However, browser hijackers such as the Elex Hijacker may pass anti-malware protection. This is because the Elex Hijacker and other low-level threats also may be distributed by bundling them with other software. Computer users may be confused or surprised by the sudden appearance of the Elex Hijacker on their Web browser, which may happen right after they have installed software on their computers. However, the software is rarely the culprit. Rather, it is not uncommon for free programs to be bundled with components like the Elex Hijacker, often advertised as useful Web browser add-ons or extensions. Once the Elex Hijacker enters a computer, it may take the form of a browser toolbar or extension and interfere with the affected Web browser constantly.
Why the Elex Hijacker may be Bundled with Other Software
The most common way of distributing the Elex Hijacker and similar low-level threats is by bundling them with other software. Con artists may take popular free software and use custom installers or bundlers to include the Elex Hijacker or similar components along with the installation of that software. In most cases, the custom installers may be created to make it hard for computer users to realize that the Elex Hijacker or another unwanted component is being installed. The Elex Hijacker may be set to be installed by default, requiring computer users to opt out. The option to opt out of installing the Elex Hijacker also may be hidden behind a 'Custom Installation' or 'Advanced Installation' options. Computer users are advised to pay careful attention to the entire set up process when installing any new software.
Aliases
5 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Fortinet | Riskware/Elex |
| Panda | PUP/XTab |
| McAfee | Artemis!5C76D5C030CB |
| AhnLab-V3 | PUP/Win32.Generic |
| McAfee-GW-Edition | Artemis!Trojan |
SpyHunter Detects & Remove Elex Hijacker
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | WinSAP.dll | 2f7bae01856c042b065cb8d691665cc8 | 3,825 |
| 2. | kokoko2.dll | 65dd228ceb3bfd8e2daa1cd3473145c4 | 3,581 |
| 3. | terana64.dll | 67a8678a6a84d323814b3dea0eb271b0 | 3,125 |
| 4. | ~seEBF0.tmp | f836ee87da9248456dfab1227ffb25ef | 2,776 |
| 5. | ~seD124.tmp | 0a2b05b9c1f413510f6c036c260264fc | 1,745 |
| 6. | glory.dll | 24d733bdb924df52f0c0966c6233bacc | 1,520 |
| 7. | kitty1.dll | fbac42b2e87374cbbe6ea6c233167124 | 1,431 |
| 8. | terana.dll | fe035b504be7efa437cad67c871eb4d4 | 1,408 |
| 9. | kokoko1.dll | 4d15e77941a8b96209d561b6d859dd5f | 1,219 |
| 10. | ~se8F5.tmp | 19488e1593252b738beebf8632b57075 | 1,202 |
| 11. | Jamper.dll | c17e67bdcbcec49226dadf6450287ef6 | 1,113 |
| 12. | synctool.dll | 6f749bd448a92962b31e16d9bae77125 | 916 |
| 13. | ~se2C2E.tmp | 395d2b83b78cd1e0ac59b85e230f0221 | 572 |
| 14. | NetUtils2016.sys.0e680f4f | 999995e6e594d8f7aa72029c8eb2b952 | 556 |
| 15. | FirefoxUpdate.exe | ea4172402f973e5b9bbfae6f0a17fe24 | 484 |
| 16. | ~se5BA.tmp | 0f393897a889d3a7b528283060c6c2e6 | 446 |
| 17. | ~se82E5.tmp | 89e194be6e316330a6bdf40b05186c6f | 347 |
| 18. | 30daf459e79c5d26366654b1b482e87.cab:dp | 5ada1bee43ca44d6b481fa8ec52e4dc7 | 160 |
| 19. | ~seC9E4.tmp | c54124960ef22465484ee7cd99ff37b6 | 126 |
| 20. | ~seEE92.tmp | 51f76a0fdeeee8f4c75c0a14b037027b | 93 |
| 21. | CPK.exe | 3232a5dd21a04641e2b4f3875f554151 | 31 |
| 22. | ~seF619.tmp | 59ceb9de4c5be1491fe4d54a5b9cd2c9 | 28 |
| 23. | BIT.dll | 02dc3a4ac9e298878fca4dc5ee5d0e9a | 20 |
| 24. | file.exe | 7e291e0449f35a53bc873f2f39d0f783 | 9 |
| 25. | Archer.dll | fb05d6f5d14aee88fdea16766130e75e | 8 |
| 26. | Snare.dll | 39cc352e988e2939bc587c0bb9c76a0a | 8 |
| 27. | Kitty.dll | 3b35fd22f7c67cdfd897fad1c6edf2e2 | 3 |
Registry Details
Directories
Elex Hijacker may create the following directory or directories:
| %ALLUSERSPROFILE%\rEuWuFTools |
| %APPDATA%\appyphinek |
| %APPDATA%\dapicult |
| %APPDATA%\herley |
| %PROGRAMFILES%\Nidaty |
| %PROGRAMFILES%\apptools |
| %PROGRAMFILES%\clugoghphwodom |
| %PROGRAMFILES%\clugokftgh |
| %PROGRAMFILES%\clunaent |
| %PROGRAMFILES%\coercock |
| %PROGRAMFILES%\coerkocult |
| %PROGRAMFILES%\cogapymoderther |
| %PROGRAMFILES%\coicerph |
| %PROGRAMFILES%\coidswermepy |
| %PROGRAMFILES%\coohatain |
| %PROGRAMFILES%\cootion |
| %PROGRAMFILES%\copkmahoch |
| %PROGRAMFILES%\daletictain |
| %PROGRAMFILES%\dapasy |
| %PROGRAMFILES%\datosh |
| %PROGRAMFILES%\deceward |
| %PROGRAMFILES%\dedoly |
| %PROGRAMFILES%\deqosehasity |
| %PROGRAMFILES%\dermupy |
| %PROGRAMFILES%\derrepyvivering |
| %PROGRAMFILES%\diaent |
| %PROGRAMFILES%\dliterpory |
| %PROGRAMFILES%\dnesharuzus |
| %PROGRAMFILES%\dralach |
| %PROGRAMFILES%\dranoge |
| %PROGRAMFILES%\drarainganipition |
| %PROGRAMFILES%\drecetain |
| %PROGRAMFILES%\drenackghowedom |
| %PROGRAMFILES%\dresle |
| %PROGRAMFILES%\dretule |
| %PROGRAMFILES%\drewespgrerwey |
| %PROGRAMFILES%\drizphqolother |
| %PROGRAMFILES%\drjother |
| %PROGRAMFILES%\drpasydest |
| %PROGRAMFILES%\druciy |
| %PROGRAMFILES%\druditain |
| %PROGRAMFILES%\eepyruha |
| %PROGRAMFILES%\emather |
| %PROGRAMFILES%\fepuly |
| %PROGRAMFILES%\figasy |
| %PROGRAMFILES%\fijushreibuent |
| %PROGRAMFILES%\fovigemei |
| %PROGRAMFILES%\garunufupy |
| %PROGRAMFILES%\gazshrasity |
| %PROGRAMFILES%\gefudom |
| %PROGRAMFILES%\gersieddrerterpy |
| %PROGRAMFILES%\gertery |
| %PROGRAMFILES%\ghabuty |
| %PROGRAMFILES%\gherertionghatersh |
| %PROGRAMFILES%\ghergersyqerkeing |
| %PROGRAMFILES%\gherjech |
| %PROGRAMFILES%\gherkadomijly |
| %PROGRAMFILES%\ghezeentghicay |
| %PROGRAMFILES%\ghgersybqury |
| %PROGRAMFILES%\ghibay |
| %PROGRAMFILES%\ghijerght |
| %PROGRAMFILES%\ghmalyanacoing |
| %PROGRAMFILES%\ghojetain |
| %PROGRAMFILES%\ghojiryjile |
| %PROGRAMFILES%\ghorugh |
| %PROGRAMFILES%\ghubuge |
| %PROGRAMFILES%\ghuverckplokaent |
| %PROGRAMFILES%\gjadom |
| %PROGRAMFILES%\gokolestepation |
| %PROGRAMFILES%\graghmerrek |
| %PROGRAMFILES%\granidomrsaph |
| %PROGRAMFILES%\grerght |
| %PROGRAMFILES%\grersiward |
| %PROGRAMFILES%\griduy |
| %PROGRAMFILES%\grigikcunack |
| %PROGRAMFILES%\grihersmiritain |
| %PROGRAMFILES%\griqitherphegoty |
| %PROGRAMFILES%\grokise |
| %PROGRAMFILES%\groseghtjibied |
| %PROGRAMFILES%\grtase |
| %PROGRAMFILES%\grupward |
| %PROGRAMFILES%\grurecult |
| %PROGRAMFILES%\grutesy |
| %PROGRAMFILES%\gubicult |
| %PROGRAMFILES%\hecyhewury |
| %PROGRAMFILES%\herary |
| %PROGRAMFILES%\hidupyplumole |
| %PROGRAMFILES%\hiulysaey |
| %PROGRAMFILES%\holush |
| %PROGRAMFILES%\hubishrwoy |
| %PROGRAMFILES%\humedomlutik |
| %PROGRAMFILES%\huweried |
| %PROGRAMFILES%\icackaraergh |
| %PROGRAMFILES%\idoing |
| %PROGRAMFILES%\idotion |
| %PROGRAMFILES%\ifeghtarinuph |
| %PROGRAMFILES%\jercaenttrch |
| %PROGRAMFILES%\jerjers |
| %PROGRAMFILES%\jetrympward |
| %PROGRAMFILES%\jeweseprsot |
| %PROGRAMFILES%\kedasepuving |
| %PROGRAMFILES%\kikusphudoght |
| %PROGRAMFILES%\lafetqilse |
| %PROGRAMFILES%\lerlaied |
| %PROGRAMFILES%\lermacultoqus |
| %PROGRAMFILES%\lfasyjiqege |
| %PROGRAMFILES%\mehition |
| %PROGRAMFILES%\meqoshvurery |
| %PROGRAMFILES%\mevaentcoijely |
| %PROGRAMFILES%\mijerwardplemese |
| %PROGRAMFILES%\miqoshzesetion |
| %PROGRAMFILES%\miwertainckerpsp |
| %PROGRAMFILES%\mizotycernery |
| %PROGRAMFILES%\mokagecerpuly |
| %PROGRAMFILES%\naerentprefos |
| %PROGRAMFILES%\nasitain |
| %PROGRAMFILES%\nelithetay |
| %PROGRAMFILES%\nerrachghefeing |
| %PROGRAMFILES%\nerwughlleried |
| %PROGRAMFILES%\newughikeing |
| %PROGRAMFILES%\nilchtherjerent |
| %PROGRAMFILES%\nimkdejersp |
| %PROGRAMFILES%\nitish |
| %PROGRAMFILES%\niwerdavitain |
| %PROGRAMFILES%\nofoiedanasition |
| %PROGRAMFILES%\nvather |
| %PROGRAMFILES%\pciphtheviry |
| %PROGRAMFILES%\peloch |
| %PROGRAMFILES%\perkaght |
| %PROGRAMFILES%\peroty |
| %PROGRAMFILES%\phaderplemaing |
| %PROGRAMFILES%\phagiselipege |
| %PROGRAMFILES%\phapergeatjaied |
| %PROGRAMFILES%\phbiiedtorle |
| %PROGRAMFILES%\phediktebaght |
| %PROGRAMFILES%\pheption |
| %PROGRAMFILES%\pherluied |
| %PROGRAMFILES%\pherlutherprudit |
| %PROGRAMFILES%\phohatyreamuy |
| %PROGRAMFILES%\phudikthwisy |
| %PROGRAMFILES%\phuhos |
| %PROGRAMFILES%\phuige |
| %PROGRAMFILES%\phuquk |
| %PROGRAMFILES%\phviingstaledom |
| %PROGRAMFILES%\pirering |
| %PROGRAMFILES%\placutherghulers |
| %PROGRAMFILES%\plberied |
| %PROGRAMFILES%\plebuckwuwury |
| %PROGRAMFILES%\plelage |
| %PROGRAMFILES%\plerqer |
| %PROGRAMFILES%\plokoy |
| %PROGRAMFILES%\pluteward |
| %PROGRAMFILES%\preguckuech |
| %PROGRAMFILES%\prergasp |
| %PROGRAMFILES%\prerqiwarddacertain |
| %PROGRAMFILES%\prerus |
| %PROGRAMFILES%\pripiieddocch |
| %PROGRAMFILES%\prissy |
| %PROGRAMFILES%\prjoentmerdery |
| %PROGRAMFILES%\prlusterkogh |
| %PROGRAMFILES%\projlyanubay |
| %PROGRAMFILES%\prunaplatuph |
| %PROGRAMFILES%\prusash |
| %PROGRAMFILES%\pubight |
| %PROGRAMFILES%\qeqotion |
| %PROGRAMFILES%\qitech |
| %PROGRAMFILES%\qivethercoqerly |
| %PROGRAMFILES%\qnuhegach |
| %PROGRAMFILES%\rEuWuFTools |
| %PROGRAMFILES%\razoward |
| %PROGRAMFILES%\reasetyulesp |
| %PROGRAMFILES%\reawerghtraserph |
| %PROGRAMFILES%\rebergeclarodom |
| %PROGRAMFILES%\reilechjpu |
| %PROGRAMFILES%\reiwaghgherfile |
| %PROGRAMFILES%\remerspwaqing |
| %PROGRAMFILES%\reoientrusoge |
| %PROGRAMFILES%\reratqatudom |
| %PROGRAMFILES%\rerkuy |
| %PROGRAMFILES%\rersse |
| %PROGRAMFILES%\retawardkukty |
| %PROGRAMFILES%\reuses |
| %PROGRAMFILES%\riferpy |
| %PROGRAMFILES%\rosatain |
| %PROGRAMFILES%\sagerspkawege |
| %PROGRAMFILES%\sahotplerpoied |
| %PROGRAMFILES%\saquterpward |
| %PROGRAMFILES%\serhesy |
| %PROGRAMFILES%\sewasemhient |
| %PROGRAMFILES%\shapoly |
| %PROGRAMFILES%\shepashkuderward |
| %PROGRAMFILES%\shijerghnuguch |
| %PROGRAMFILES%\shntherquhither |
| %PROGRAMFILES%\shoccult |
| %PROGRAMFILES%\shodisyqrugh |
| %PROGRAMFILES%\shomephclezeried |
| %PROGRAMFILES%\shorush |
| %PROGRAMFILES%\shumaing |
| %PROGRAMFILES%\shuqitainstazegh |
| %PROGRAMFILES%\shurerphraterward |
| %PROGRAMFILES%\sokeing |
| %PROGRAMFILES%\stiduy |
| %PROGRAMFILES%\stumogeqebut |
| %PROGRAMFILES%\tukoentvegsh |
| %PROGRAMFILES%\valoryatusation |
| %PROGRAMFILES%\vastyatedeing |
| %PROGRAMFILES%\vehotherdreguty |
| %PROGRAMFILES%\vieshhubule |
| %PROGRAMFILES%\voboght |
| %PROGRAMFILES(x86)%\Aterlutthikile |
| %PROGRAMFILES(x86)%\Nidaty |
| %PROGRAMFILES(x86)%\apptools |
| %PROGRAMFILES(x86)%\cluberspmercerk |
| %PROGRAMFILES(x86)%\clugoghphwodom |
| %PROGRAMFILES(x86)%\clugokftgh |
| %PROGRAMFILES(x86)%\clunaent |
| %PROGRAMFILES(x86)%\cluvigegowory |
| %PROGRAMFILES(x86)%\coepageatovry |
| %PROGRAMFILES(x86)%\coercock |
| %PROGRAMFILES(x86)%\coerkocult |
| %PROGRAMFILES(x86)%\cogapymoderther |
| %PROGRAMFILES(x86)%\coicerph |
| %PROGRAMFILES(x86)%\coidswermepy |
| %PROGRAMFILES(x86)%\conochdupution |
| %PROGRAMFILES(x86)%\coohatain |
| %PROGRAMFILES(x86)%\copkmahoch |
| %PROGRAMFILES(x86)%\couwadomcerperdom |
| %PROGRAMFILES(x86)%\daletictain |
| %PROGRAMFILES(x86)%\dapasy |
| %PROGRAMFILES(x86)%\datosh |
| %PROGRAMFILES(x86)%\deceward |
| %PROGRAMFILES(x86)%\dedoly |
| %PROGRAMFILES(x86)%\deqosehasity |
| %PROGRAMFILES(x86)%\dermupy |
| %PROGRAMFILES(x86)%\derrepyvivering |
| %PROGRAMFILES(x86)%\diaent |
| %PROGRAMFILES(x86)%\dliterpory |
| %PROGRAMFILES(x86)%\dnesharuzus |
| %PROGRAMFILES(x86)%\donagesetese |
| %PROGRAMFILES(x86)%\drakerlecgadom |
| %PROGRAMFILES(x86)%\dralach |
| %PROGRAMFILES(x86)%\dranoge |
| %PROGRAMFILES(x86)%\drarainganipition |
| %PROGRAMFILES(x86)%\drecetain |
| %PROGRAMFILES(x86)%\drejiy |
| %PROGRAMFILES(x86)%\drenackghowedom |
| %PROGRAMFILES(x86)%\dresle |
| %PROGRAMFILES(x86)%\dretule |
| %PROGRAMFILES(x86)%\drewespgrerwey |
| %PROGRAMFILES(x86)%\drizphqolother |
| %PROGRAMFILES(x86)%\drjother |
| %PROGRAMFILES(x86)%\droqekziday |
| %PROGRAMFILES(x86)%\drpasydest |
| %PROGRAMFILES(x86)%\druciy |
| %PROGRAMFILES(x86)%\druditain |
| %PROGRAMFILES(x86)%\dudusyplesoch |
| %PROGRAMFILES(x86)%\duqitainpcile |
| %PROGRAMFILES(x86)%\eepyruha |
| %PROGRAMFILES(x86)%\emather |
| %PROGRAMFILES(x86)%\fepuly |
| %PROGRAMFILES(x86)%\fermuge |
| %PROGRAMFILES(x86)%\ferory |
| %PROGRAMFILES(x86)%\feusenofs |
| %PROGRAMFILES(x86)%\figasy |
| %PROGRAMFILES(x86)%\fijushreibuent |
| %PROGRAMFILES(x86)%\filetnemerck |
| %PROGRAMFILES(x86)%\fovigemei |
| %PROGRAMFILES(x86)%\garunufupy |
| %PROGRAMFILES(x86)%\gazshrasity |
| %PROGRAMFILES(x86)%\gefing |
| %PROGRAMFILES(x86)%\gefudom |
| %PROGRAMFILES(x86)%\gerrershsterother |
| %PROGRAMFILES(x86)%\gersoghgrlopy |
| %PROGRAMFILES(x86)%\gertery |
| %PROGRAMFILES(x86)%\ghabuty |
| %PROGRAMFILES(x86)%\gherertionghatersh |
| %PROGRAMFILES(x86)%\ghergersyqerkeing |
| %PROGRAMFILES(x86)%\gherhis |
| %PROGRAMFILES(x86)%\gherjech |
| %PROGRAMFILES(x86)%\gherkadomijly |
| %PROGRAMFILES(x86)%\ghgersybqury |
| %PROGRAMFILES(x86)%\ghibay |
| %PROGRAMFILES(x86)%\ghijerght |
| %PROGRAMFILES(x86)%\ghmalyanacoing |
| %PROGRAMFILES(x86)%\ghojetain |
| %PROGRAMFILES(x86)%\ghojiryjile |
| %PROGRAMFILES(x86)%\ghorugh |
| %PROGRAMFILES(x86)%\ghubuge |
| %PROGRAMFILES(x86)%\ghuverckplokaent |
| %PROGRAMFILES(x86)%\gjadom |
| %PROGRAMFILES(x86)%\gokolestepation |
| %PROGRAMFILES(x86)%\granidomrsaph |
| %PROGRAMFILES(x86)%\grawition |
| %PROGRAMFILES(x86)%\grcakmiberdom |
| %PROGRAMFILES(x86)%\grerght |
| %PROGRAMFILES(x86)%\grersiward |
| %PROGRAMFILES(x86)%\grerzersp |
| %PROGRAMFILES(x86)%\griduy |
| %PROGRAMFILES(x86)%\grihersmiritain |
| %PROGRAMFILES(x86)%\griqitherphegoty |
| %PROGRAMFILES(x86)%\grocentreevugh |
| %PROGRAMFILES(x86)%\grokise |
| %PROGRAMFILES(x86)%\gromeent |
| %PROGRAMFILES(x86)%\groseghtjibied |
| %PROGRAMFILES(x86)%\grtase |
| %PROGRAMFILES(x86)%\grupward |
| %PROGRAMFILES(x86)%\grurecult |
| %PROGRAMFILES(x86)%\grutesy |
| %PROGRAMFILES(x86)%\gubicult |
| %PROGRAMFILES(x86)%\hecyhewury |
| %PROGRAMFILES(x86)%\herary |
| %PROGRAMFILES(x86)%\herhery |
| %PROGRAMFILES(x86)%\herjery |
| %PROGRAMFILES(x86)%\hertion |
| %PROGRAMFILES(x86)%\hidupyplumole |
| %PROGRAMFILES(x86)%\hiulysaey |
| %PROGRAMFILES(x86)%\holush |
| %PROGRAMFILES(x86)%\howight |
| %PROGRAMFILES(x86)%\hubishrwoy |
| %PROGRAMFILES(x86)%\humedomlutik |
| %PROGRAMFILES(x86)%\huvachreerjepy |
| %PROGRAMFILES(x86)%\icackaraergh |
| %PROGRAMFILES(x86)%\icockreoguing |
| %PROGRAMFILES(x86)%\idoing |
| %PROGRAMFILES(x86)%\idotion |
| %PROGRAMFILES(x86)%\ifeghtarinuph |
| %PROGRAMFILES(x86)%\jacestreward |
| %PROGRAMFILES(x86)%\jegoing |
| %PROGRAMFILES(x86)%\jercaenttrch |
| %PROGRAMFILES(x86)%\jerjers |
| %PROGRAMFILES(x86)%\jetrympward |
| %PROGRAMFILES(x86)%\jevilewomuty |
| %PROGRAMFILES(x86)%\jeweseprsot |
| %PROGRAMFILES(x86)%\jntmodo |
| %PROGRAMFILES(x86)%\jorosparertary |
| %PROGRAMFILES(x86)%\judolyderfck |
| %PROGRAMFILES(x86)%\juserly |
| %PROGRAMFILES(x86)%\kajuynobersh |
| %PROGRAMFILES(x86)%\kedasepuving |
| %PROGRAMFILES(x86)%\keoght |
| %PROGRAMFILES(x86)%\kikusphudoght |
| %PROGRAMFILES(x86)%\kukther |
| %PROGRAMFILES(x86)%\kuroplgaly |
| %PROGRAMFILES(x86)%\lafetqilse |
| %PROGRAMFILES(x86)%\lerlaied |
| %PROGRAMFILES(x86)%\lermacultoqus |
| %PROGRAMFILES(x86)%\lerqashchigother |
| %PROGRAMFILES(x86)%\letegeshopother |
| %PROGRAMFILES(x86)%\lfasyjiqege |
| %PROGRAMFILES(x86)%\lgechsteris |
| %PROGRAMFILES(x86)%\lhoyplerwuse |
| %PROGRAMFILES(x86)%\lomutherbagaied |
| %PROGRAMFILES(x86)%\luhuch |
| %PROGRAMFILES(x86)%\lurshgerns |
| %PROGRAMFILES(x86)%\lwuward |
| %PROGRAMFILES(x86)%\magdom |
| %PROGRAMFILES(x86)%\mehition |
| %PROGRAMFILES(x86)%\meqoshvurery |
| %PROGRAMFILES(x86)%\mertoghtzehige |
| %PROGRAMFILES(x86)%\mevaentcoijely |
| %PROGRAMFILES(x86)%\mijerwardplemese |
| %PROGRAMFILES(x86)%\miqoshzesetion |
| %PROGRAMFILES(x86)%\miwertainckerpsp |
| %PROGRAMFILES(x86)%\mizotycernery |
| %PROGRAMFILES(x86)%\mokagecerpuly |
| %PROGRAMFILES(x86)%\muziiedsvosh |
| %PROGRAMFILES(x86)%\naerentprefos |
| %PROGRAMFILES(x86)%\nasitain |
| %PROGRAMFILES(x86)%\negerle |
| %PROGRAMFILES(x86)%\negoent |
| %PROGRAMFILES(x86)%\nelithetay |
| %PROGRAMFILES(x86)%\nerrachghefeing |
| %PROGRAMFILES(x86)%\nerwughlleried |
| %PROGRAMFILES(x86)%\newughikeing |
| %PROGRAMFILES(x86)%\nilchtherjerent |
| %PROGRAMFILES(x86)%\nimkdejersp |
| %PROGRAMFILES(x86)%\nitish |
| %PROGRAMFILES(x86)%\niwerdavitain |
| %PROGRAMFILES(x86)%\noferkgrorerk |
| %PROGRAMFILES(x86)%\nofoiedanasition |
| %PROGRAMFILES(x86)%\nulchsezas |
| %PROGRAMFILES(x86)%\nvather |
| %PROGRAMFILES(x86)%\pciphtheviry |
| %PROGRAMFILES(x86)%\pedittawese |
| %PROGRAMFILES(x86)%\pekusy |
| %PROGRAMFILES(x86)%\peloch |
| %PROGRAMFILES(x86)%\peroty |
| %PROGRAMFILES(x86)%\phaderplemaing |
| %PROGRAMFILES(x86)%\phagiselipege |
| %PROGRAMFILES(x86)%\phagoge |
| %PROGRAMFILES(x86)%\phapergeatjaied |
| %PROGRAMFILES(x86)%\pharudom |
| %PROGRAMFILES(x86)%\phediktebaght |
| %PROGRAMFILES(x86)%\pheption |
| %PROGRAMFILES(x86)%\pherluied |
| %PROGRAMFILES(x86)%\pherlutherprudit |
| %PROGRAMFILES(x86)%\phertuph |
| %PROGRAMFILES(x86)%\pherzok |
| %PROGRAMFILES(x86)%\philughgrukis |
| %PROGRAMFILES(x86)%\phudikthwisy |
| %PROGRAMFILES(x86)%\phuige |
| %PROGRAMFILES(x86)%\phuquk |
| %PROGRAMFILES(x86)%\phviingstaledom |
| %PROGRAMFILES(x86)%\pirering |
| %PROGRAMFILES(x86)%\pizery |
| %PROGRAMFILES(x86)%\placutherghulers |
| %PROGRAMFILES(x86)%\platergh |
| %PROGRAMFILES(x86)%\platety |
| %PROGRAMFILES(x86)%\plberied |
| %PROGRAMFILES(x86)%\plebuckwuwury |
| %PROGRAMFILES(x86)%\plelage |
| %PROGRAMFILES(x86)%\plercitzumet |
| %PROGRAMFILES(x86)%\plibedom |
| %PROGRAMFILES(x86)%\plizoy |
| %PROGRAMFILES(x86)%\plokoy |
| %PROGRAMFILES(x86)%\pluteward |
| %PROGRAMFILES(x86)%\poaentdermuch |
| %PROGRAMFILES(x86)%\preguckuech |
| %PROGRAMFILES(x86)%\prergasp |
| %PROGRAMFILES(x86)%\prerqiwarddacertain |
| %PROGRAMFILES(x86)%\prerus |
| %PROGRAMFILES(x86)%\prifuly |
| %PROGRAMFILES(x86)%\pripiieddocch |
| %PROGRAMFILES(x86)%\prissy |
| %PROGRAMFILES(x86)%\prjoentmerdery |
| %PROGRAMFILES(x86)%\prlusterkogh |
| %PROGRAMFILES(x86)%\projlyanubay |
| %PROGRAMFILES(x86)%\prunaplatuph |
| %PROGRAMFILES(x86)%\prusash |
| %PROGRAMFILES(x86)%\prutuy |
| %PROGRAMFILES(x86)%\pubight |
| %PROGRAMFILES(x86)%\qalolefaqent |
| %PROGRAMFILES(x86)%\qeqotion |
| %PROGRAMFILES(x86)%\qerhawardkiztion |
| %PROGRAMFILES(x86)%\qerzise |
| %PROGRAMFILES(x86)%\qitech |
| %PROGRAMFILES(x86)%\qivethercoqerly |
| %PROGRAMFILES(x86)%\qnuhegach |
| %PROGRAMFILES(x86)%\razoward |
| %PROGRAMFILES(x86)%\reasetyulesp |
| %PROGRAMFILES(x86)%\reawerghtraserph |
| %PROGRAMFILES(x86)%\rebergeclarodom |
| %PROGRAMFILES(x86)%\reerwerghtsergale |
| %PROGRAMFILES(x86)%\referkzabak |
| %PROGRAMFILES(x86)%\reilechjpu |
| %PROGRAMFILES(x86)%\reiwaghgherfile |
| %PROGRAMFILES(x86)%\remerspwaqing |
| %PROGRAMFILES(x86)%\reocight |
| %PROGRAMFILES(x86)%\reoientrusoge |
| %PROGRAMFILES(x86)%\reonosptewoy |
| %PROGRAMFILES(x86)%\reosetherprutaent |
| %PROGRAMFILES(x86)%\reowtainvesck |
| %PROGRAMFILES(x86)%\reratqatudom |
| %PROGRAMFILES(x86)%\rerkuy |
| %PROGRAMFILES(x86)%\rersse |
| %PROGRAMFILES(x86)%\reurusptujos |
| %PROGRAMFILES(x86)%\reuses |
| %PROGRAMFILES(x86)%\riferpy |
| %PROGRAMFILES(x86)%\rilethercheduied |
| %PROGRAMFILES(x86)%\ripitsjile |
| %PROGRAMFILES(x86)%\rjatain |
| %PROGRAMFILES(x86)%\rokaphdruzitain |
| %PROGRAMFILES(x86)%\rolugh |
| %PROGRAMFILES(x86)%\rosatain |
| %PROGRAMFILES(x86)%\sagerspkawege |
| %PROGRAMFILES(x86)%\saquterpward |
| %PROGRAMFILES(x86)%\serhesy |
| %PROGRAMFILES(x86)%\sewasemhient |
| %PROGRAMFILES(x86)%\shapoly |
| %PROGRAMFILES(x86)%\shbseverqersp |
| %PROGRAMFILES(x86)%\shekicult |
| %PROGRAMFILES(x86)%\shepashkuderward |
| %PROGRAMFILES(x86)%\shetighaterbent |
| %PROGRAMFILES(x86)%\shijerghnuguch |
| %PROGRAMFILES(x86)%\shntherquhither |
| %PROGRAMFILES(x86)%\shoccult |
| %PROGRAMFILES(x86)%\shodisyqrugh |
| %PROGRAMFILES(x86)%\shomephclezeried |
| %PROGRAMFILES(x86)%\shorush |
| %PROGRAMFILES(x86)%\shumaing |
| %PROGRAMFILES(x86)%\shuqitainstazegh |
| %PROGRAMFILES(x86)%\shurerphraterward |
| %PROGRAMFILES(x86)%\sokeing |
| %PROGRAMFILES(x86)%\stiduy |
| %PROGRAMFILES(x86)%\stumogeqebut |
| %PROGRAMFILES(x86)%\thaberchnaey |
| %PROGRAMFILES(x86)%\therhisy |
| %PROGRAMFILES(x86)%\toliingcluverph |
| %PROGRAMFILES(x86)%\tukerty |
| %PROGRAMFILES(x86)%\tukoentvegsh |
| %PROGRAMFILES(x86)%\valoryatusation |
| %PROGRAMFILES(x86)%\vastyatedeing |
| %PROGRAMFILES(x86)%\vehotherdreguty |
| %PROGRAMFILES(x86)%\vervghtprerqercult |
| %PROGRAMFILES(x86)%\vieshhubule |
| %PROGRAMFILES(x86)%\vndomkivory |
| %PROGRAMFILES(x86)%\voboght |
URLs
Elex Hijacker may call the following URLs:
| fgldnknlljnfcfgchdijbjmmkdkmnabn |
Analysis Report
General information
| Family Name: | Elex Hijacker |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
75eea2c64d18315c1594b8dcff08af8c
SHA1:
764fa4baa8bdacd87c00c22979e60b1716930fd3
SHA256:
9E9689F259E2537A021D55895B4FCF015ADB1F8D9BD19E81968FB1F6A5817957
File Size:
309.13 KB, 309128 bytes
|
|
MD5:
462bcabe6467d6d7b6ca91fe00249810
SHA1:
186e4eebb66f1f6a875b4419573f3822060c031e
SHA256:
7FEED78302B3A6D5A3CBF4ADDE042F6AF6F46E3793793D3DDF9A822786A44299
File Size:
1.54 MB, 1536696 bytes
|
|
MD5:
1e90afb2ae9c1b3860cc24a68dd54904
SHA1:
bb5dae47380c6c9d5528c114e15f3bbc1af1021d
SHA256:
19A40AE684A1B6548BAA5758D309625BA6FD211DF18EEE59D5F5BF9041E3C241
File Size:
770.22 KB, 770224 bytes
|
|
MD5:
382affca0b18c88e11092ef6ca189b95
SHA1:
8256d809ab0d8eeebca5a5ae156ef9900573eca8
SHA256:
664FB20556BC4775A31C13718AF0FBA3EB1B9FF7ABB7F791C364B9A3E89AA520
File Size:
1.50 MB, 1498552 bytes
|
|
MD5:
ad6b6f53490746c3c62f3d3f176300d5
SHA1:
395c116d7cf1f2fd70d42a67dc8621e424ea4b4a
SHA256:
F3F01E19C6B98289D63BD30C5CEB6DA775F00EA385417FA6755545D8F41F20B6
File Size:
671.33 KB, 671328 bytes
|
Show More
|
MD5:
ad6f38048314b3a1316c114ae8b8c480
SHA1:
c937732ab7957c90cfc0f51aa62615429dcf4d51
SHA256:
3C7F766442DD72324ACC88E7DEF3DB48CF023F8E0DE1DDFAE91B591C28FC03E3
File Size:
302.91 KB, 302912 bytes
|
|
MD5:
9a61a82224f10e8bc144a681186d2921
SHA1:
4507dac70c5ccea0be4f838ec448a5558003968d
SHA256:
BFC02B669EBCF359257F0D923152AF97DAE118C39E19446A70CF4EA5074A67E7
File Size:
903.03 KB, 903032 bytes
|
|
MD5:
06a5be47c95c0831d5e477a2ffad444e
SHA1:
c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83
SHA256:
9B6C082BB8D225C97EFB1E87D514283B56B427D966476D01A38FC160C9B20209
File Size:
646.33 KB, 646328 bytes
|
|
MD5:
03f8be4e6503f7ce0c7c87f79ba6c57b
SHA1:
be8f6c434c32907e537fdd537c288efce8eca842
SHA256:
1812F1FCB1F3860B1064C335C1764CBB60CD36C3C4D019F4AF90796D1A61E418
File Size:
473.94 KB, 473944 bytes
|
|
MD5:
f8b2dace0100feb2fa70d7208af20771
SHA1:
4aefa4aa1e021bd3d9bf7ea89b78a909e07a90ad
SHA256:
2662ABB600B52A6A084A143B5367311F9D8842B1940CB711B1933536971B6238
File Size:
319.94 KB, 319944 bytes
|
|
MD5:
1cc61422fcd2dcb1af35d5c404312395
SHA1:
b1a540af10d631e572d2d306a8ac1b6d713c66aa
SHA256:
CDEEFDA934CFE635171AC13E7CE93B43943516C2FA34647ED49A13EBAD6759E4
File Size:
350.46 KB, 350456 bytes
|
|
MD5:
ce3c72aafcc3bfd6a611fbbdfeb96e7f
SHA1:
227d01b7e7c4b15bf18a6d2b24ac80cb8458c176
SHA256:
E667685365A9B8C20A161394AC62FCDB17B5027ACA89AF6F1921047FF86CC2E5
File Size:
291.42 KB, 291424 bytes
|
|
MD5:
79503edda5527c95c46aec5cdbea5f56
SHA1:
83bf97dfeb5af627b36feae972f1c5489a3d729d
SHA256:
E8375485BE4CACE16122FD52D5DEC27CA23DBF39C703A25E57F41B0310406F28
File Size:
524.29 KB, 524288 bytes
|
|
MD5:
a5572f56cfc0046e82ea650b4833bf58
SHA1:
d07bb493f9b94b1388b790b3fb2a1d89ede72f66
SHA256:
25C8B24B0696CECB136FB0ABA9B064EEB5C96F6FAF92E41ED1EC9E8D4E351622
File Size:
1.93 MB, 1932812 bytes
|
|
MD5:
eaa2e0bb7f1f87600304a9e220fb922a
SHA1:
38602f960e9fc058c57ada4ba2b3b287d5fb15ac
SHA256:
288F60318E04D09EE03D7B6E6F0BE4AC7B8F71B2E1E5CF20AD680FA13CBF1D6C
File Size:
116.74 KB, 116736 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | PANDA Viewer installer |
| Company Name |
Show More
|
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
Show More
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Li Mo | DigiCert Assured ID Code Signing CA-1 | Self Signed |
| Xiaoqing Liu | DigiCert Assured ID Code Signing CA-1 | Self Signed |
| Shulan Hou | DigiCert SHA2 Assured ID Code Signing CA | Self Signed |
| Shenzhen Zhongxiao Trading Co.,Ltd. | GlobalSign | Root Not Trusted |
| Hefei Zhimingxingtong Software&Technology Co., Ltd. | GlobalSign CodeSigning CA - G2 | Self Signed |
Show More
| Minidigital Technology Co., Limited | GlobalSign CodeSigning CA - G2 | Self Signed |
| Beijing ELEX Technology Co.,Ltd | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Yang Liwei | WoSign Class 2 Code Signing CA | Self Signed |
| Lei Rong | thawte SHA256 Code Signing CA | Hash Mismatch |
| Lei Rong | thawte SHA256 Code Signing CA | Self Signed |
File Traits
- big overlay
- dll
- HighEntropy
- Installer Manifest
- nosig nsis
- Nullsoft Installer
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 367 |
|---|---|
| Potentially Malicious Blocks: | 38 |
| Whitelisted Blocks: | 327 |
| Unknown Blocks: | 2 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Elex.J
- Elex.M
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\1287765\1287765.zipdir\mainlog\c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83_000064_2025-12-19[20-34-50-586].log | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\xldownload.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\zlib1.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\res.7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstd517.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\pandaviewer\libdui.dll | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewerinstaller.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewerserviceup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\thumbnail.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\uninstall.exe | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꖙ촉童ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Other Suspicious |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Syscall Use |
Show More
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Xrdjitfi\AppData\Local\Temp\PandaViewer\PandaViewerinstaller.exe"
|
"C:\Users\Jeirhhui\AppData\Local\Temp\nslBD4B.tmp\7za.exe" e res.7z -ppswd00 -o.\ -aoa
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\38602f960e9fc058c57ada4ba2b3b287d5fb15ac_0000116736.,LiQMAxHB
|