Elex Hijacker

By CagedTech in Browser Hijackers

Threat Scorecard

Popularity Rank: 59
Threat Level: 50 % (Medium)
Infected Computers: 2,033,162
First Seen: April 1, 2015
Last Seen: February 7, 2026
OS(es) Affected: Windows

The Elex Hijacker is a Web browser hijacker that may take over a Web browser, change its homepage and other settings and prevent computer users from restoring their Web browser to its default setting. The Elex Hijacker may be associated with a variety of other unwanted symptoms. The main reason that makes the Elex Hijacker is considered a browser hijacker is because its main purpose is to take over a Web browser to force computer users to view certain websites repeatedly and open new Web browser windows and tabs while the computer users attempt to use their computers. The Elex Hijacker is promoted as a useful Web browser extension or add-on. However, PC security researchers have determined that the Elex Hijacker does not offer any useful or beneficial service. Rather, the Elex Hijacker is designed to make money at the expense of computer users by displaying advertisements or forcing them to visit websites related to their affiliate websites.

The Elex Hijacker may Expose Your Computer to Threatening Content

One of the main problems related to the Elex Hijacker is that computer users don't really have any control over the websites that their Web browser forces them to visit. This may cause computers to become infected with threats or other low-level threats as a result of the Elex Hijacker redirects or pop-ups. Essentially, the Elex Hijacker itself is a low-level threat, but various pop-up messages and affiliated websites may expose your computer to more threatening unwanted content. Another issue with the Elex Hijacker is that it may deliver large volumes of advertising content to computer users in the form of banners, inserted links, pop-up advertisements, and other unwanted advertisements added to the websites viewed on the affected Web browser. The Elex Hijacker may cause important performance issues on affected computers. If the Elex Hijacker is installed on your Web browser, this may increase the probability of crashing, freezing or a slower performance.

How the Elex Hijacker may Infect a Computer

One of the ways in which the Elex Hijacker may be distributed is by using typical threat deliver methods. Because of this, you should be well protected from the Elex Hijacker if your computer is safeguarded against threats, or if you have taken steps to avoid threats when browsing the Web. However, browser hijackers such as the Elex Hijacker may pass anti-malware protection. This is because the Elex Hijacker and other low-level threats also may be distributed by bundling them with other software. Computer users may be confused or surprised by the sudden appearance of the Elex Hijacker on their Web browser, which may happen right after they have installed software on their computers. However, the software is rarely the culprit. Rather, it is not uncommon for free programs to be bundled with components like the Elex Hijacker, often advertised as useful Web browser add-ons or extensions. Once the Elex Hijacker enters a computer, it may take the form of a browser toolbar or extension and interfere with the affected Web browser constantly.

Why the Elex Hijacker may be Bundled with Other Software

The most common way of distributing the Elex Hijacker and similar low-level threats is by bundling them with other software. Con artists may take popular free software and use custom installers or bundlers to include the Elex Hijacker or similar components along with the installation of that software. In most cases, the custom installers may be created to make it hard for computer users to realize that the Elex Hijacker or another unwanted component is being installed. The Elex Hijacker may be set to be installed by default, requiring computer users to opt out. The option to opt out of installing the Elex Hijacker also may be hidden behind a 'Custom Installation' or 'Advanced Installation' options. Computer users are advised to pay careful attention to the entire set up process when installing any new software.

Aliases

5 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Fortinet Riskware/Elex
Panda PUP/XTab
McAfee Artemis!5C76D5C030CB
AhnLab-V3 PUP/Win32.Generic
McAfee-GW-Edition Artemis!Trojan

SpyHunter Detects & Remove Elex Hijacker

File System Details

Elex Hijacker may create the following file(s):
# File Name MD5 Detections
1. WinSAP.dll 2f7bae01856c042b065cb8d691665cc8 3,825
2. kokoko2.dll 65dd228ceb3bfd8e2daa1cd3473145c4 3,581
3. terana64.dll 67a8678a6a84d323814b3dea0eb271b0 3,125
4. ~seEBF0.tmp f836ee87da9248456dfab1227ffb25ef 2,776
5. ~seD124.tmp 0a2b05b9c1f413510f6c036c260264fc 1,745
6. glory.dll 24d733bdb924df52f0c0966c6233bacc 1,520
7. kitty1.dll fbac42b2e87374cbbe6ea6c233167124 1,431
8. terana.dll fe035b504be7efa437cad67c871eb4d4 1,408
9. kokoko1.dll 4d15e77941a8b96209d561b6d859dd5f 1,219
10. ~se8F5.tmp 19488e1593252b738beebf8632b57075 1,202
11. Jamper.dll c17e67bdcbcec49226dadf6450287ef6 1,113
12. synctool.dll 6f749bd448a92962b31e16d9bae77125 916
13. ~se2C2E.tmp 395d2b83b78cd1e0ac59b85e230f0221 572
14. NetUtils2016.sys.0e680f4f 999995e6e594d8f7aa72029c8eb2b952 556
15. FirefoxUpdate.exe ea4172402f973e5b9bbfae6f0a17fe24 484
16. ~se5BA.tmp 0f393897a889d3a7b528283060c6c2e6 446
17. ~se82E5.tmp 89e194be6e316330a6bdf40b05186c6f 347
18. 30daf459e79c5d26366654b1b482e87.cab:dp 5ada1bee43ca44d6b481fa8ec52e4dc7 160
19. ~seC9E4.tmp c54124960ef22465484ee7cd99ff37b6 126
20. ~seEE92.tmp 51f76a0fdeeee8f4c75c0a14b037027b 93
21. CPK.exe 3232a5dd21a04641e2b4f3875f554151 31
22. ~seF619.tmp 59ceb9de4c5be1491fe4d54a5b9cd2c9 28
23. BIT.dll 02dc3a4ac9e298878fca4dc5ee5d0e9a 20
24. file.exe 7e291e0449f35a53bc873f2f39d0f783 9
25. Archer.dll fb05d6f5d14aee88fdea16766130e75e 8
26. Snare.dll 39cc352e988e2939bc587c0bb9c76a0a 8
27. Kitty.dll 3b35fd22f7c67cdfd897fad1c6edf2e2 3
More files

Registry Details

Elex Hijacker may create the following registry entry or registry entries:
SOFTWARE\ompndb
SOFTWARE\WOW6432Node\ompndb

Directories

Elex Hijacker may create the following directory or directories:

%ALLUSERSPROFILE%\rEuWuFTools
%APPDATA%\appyphinek
%APPDATA%\dapicult
%APPDATA%\herley
%PROGRAMFILES%\Nidaty
%PROGRAMFILES%\apptools
%PROGRAMFILES%\clugoghphwodom
%PROGRAMFILES%\clugokftgh
%PROGRAMFILES%\clunaent
%PROGRAMFILES%\coercock
%PROGRAMFILES%\coerkocult
%PROGRAMFILES%\cogapymoderther
%PROGRAMFILES%\coicerph
%PROGRAMFILES%\coidswermepy
%PROGRAMFILES%\coohatain
%PROGRAMFILES%\cootion
%PROGRAMFILES%\copkmahoch
%PROGRAMFILES%\daletictain
%PROGRAMFILES%\dapasy
%PROGRAMFILES%\datosh
%PROGRAMFILES%\deceward
%PROGRAMFILES%\dedoly
%PROGRAMFILES%\deqosehasity
%PROGRAMFILES%\dermupy
%PROGRAMFILES%\derrepyvivering
%PROGRAMFILES%\diaent
%PROGRAMFILES%\dliterpory
%PROGRAMFILES%\dnesharuzus
%PROGRAMFILES%\dralach
%PROGRAMFILES%\dranoge
%PROGRAMFILES%\drarainganipition
%PROGRAMFILES%\drecetain
%PROGRAMFILES%\drenackghowedom
%PROGRAMFILES%\dresle
%PROGRAMFILES%\dretule
%PROGRAMFILES%\drewespgrerwey
%PROGRAMFILES%\drizphqolother
%PROGRAMFILES%\drjother
%PROGRAMFILES%\drpasydest
%PROGRAMFILES%\druciy
%PROGRAMFILES%\druditain
%PROGRAMFILES%\eepyruha
%PROGRAMFILES%\emather
%PROGRAMFILES%\fepuly
%PROGRAMFILES%\figasy
%PROGRAMFILES%\fijushreibuent
%PROGRAMFILES%\fovigemei
%PROGRAMFILES%\garunufupy
%PROGRAMFILES%\gazshrasity
%PROGRAMFILES%\gefudom
%PROGRAMFILES%\gersieddrerterpy
%PROGRAMFILES%\gertery
%PROGRAMFILES%\ghabuty
%PROGRAMFILES%\gherertionghatersh
%PROGRAMFILES%\ghergersyqerkeing
%PROGRAMFILES%\gherjech
%PROGRAMFILES%\gherkadomijly
%PROGRAMFILES%\ghezeentghicay
%PROGRAMFILES%\ghgersybqury
%PROGRAMFILES%\ghibay
%PROGRAMFILES%\ghijerght
%PROGRAMFILES%\ghmalyanacoing
%PROGRAMFILES%\ghojetain
%PROGRAMFILES%\ghojiryjile
%PROGRAMFILES%\ghorugh
%PROGRAMFILES%\ghubuge
%PROGRAMFILES%\ghuverckplokaent
%PROGRAMFILES%\gjadom
%PROGRAMFILES%\gokolestepation
%PROGRAMFILES%\graghmerrek
%PROGRAMFILES%\granidomrsaph
%PROGRAMFILES%\grerght
%PROGRAMFILES%\grersiward
%PROGRAMFILES%\griduy
%PROGRAMFILES%\grigikcunack
%PROGRAMFILES%\grihersmiritain
%PROGRAMFILES%\griqitherphegoty
%PROGRAMFILES%\grokise
%PROGRAMFILES%\groseghtjibied
%PROGRAMFILES%\grtase
%PROGRAMFILES%\grupward
%PROGRAMFILES%\grurecult
%PROGRAMFILES%\grutesy
%PROGRAMFILES%\gubicult
%PROGRAMFILES%\hecyhewury
%PROGRAMFILES%\herary
%PROGRAMFILES%\hidupyplumole
%PROGRAMFILES%\hiulysaey
%PROGRAMFILES%\holush
%PROGRAMFILES%\hubishrwoy
%PROGRAMFILES%\humedomlutik
%PROGRAMFILES%\huweried
%PROGRAMFILES%\icackaraergh
%PROGRAMFILES%\idoing
%PROGRAMFILES%\idotion
%PROGRAMFILES%\ifeghtarinuph
%PROGRAMFILES%\jercaenttrch
%PROGRAMFILES%\jerjers
%PROGRAMFILES%\jetrympward
%PROGRAMFILES%\jeweseprsot
%PROGRAMFILES%\kedasepuving
%PROGRAMFILES%\kikusphudoght
%PROGRAMFILES%\lafetqilse
%PROGRAMFILES%\lerlaied
%PROGRAMFILES%\lermacultoqus
%PROGRAMFILES%\lfasyjiqege
%PROGRAMFILES%\mehition
%PROGRAMFILES%\meqoshvurery
%PROGRAMFILES%\mevaentcoijely
%PROGRAMFILES%\mijerwardplemese
%PROGRAMFILES%\miqoshzesetion
%PROGRAMFILES%\miwertainckerpsp
%PROGRAMFILES%\mizotycernery
%PROGRAMFILES%\mokagecerpuly
%PROGRAMFILES%\naerentprefos
%PROGRAMFILES%\nasitain
%PROGRAMFILES%\nelithetay
%PROGRAMFILES%\nerrachghefeing
%PROGRAMFILES%\nerwughlleried
%PROGRAMFILES%\newughikeing
%PROGRAMFILES%\nilchtherjerent
%PROGRAMFILES%\nimkdejersp
%PROGRAMFILES%\nitish
%PROGRAMFILES%\niwerdavitain
%PROGRAMFILES%\nofoiedanasition
%PROGRAMFILES%\nvather
%PROGRAMFILES%\pciphtheviry
%PROGRAMFILES%\peloch
%PROGRAMFILES%\perkaght
%PROGRAMFILES%\peroty
%PROGRAMFILES%\phaderplemaing
%PROGRAMFILES%\phagiselipege
%PROGRAMFILES%\phapergeatjaied
%PROGRAMFILES%\phbiiedtorle
%PROGRAMFILES%\phediktebaght
%PROGRAMFILES%\pheption
%PROGRAMFILES%\pherluied
%PROGRAMFILES%\pherlutherprudit
%PROGRAMFILES%\phohatyreamuy
%PROGRAMFILES%\phudikthwisy
%PROGRAMFILES%\phuhos
%PROGRAMFILES%\phuige
%PROGRAMFILES%\phuquk
%PROGRAMFILES%\phviingstaledom
%PROGRAMFILES%\pirering
%PROGRAMFILES%\placutherghulers
%PROGRAMFILES%\plberied
%PROGRAMFILES%\plebuckwuwury
%PROGRAMFILES%\plelage
%PROGRAMFILES%\plerqer
%PROGRAMFILES%\plokoy
%PROGRAMFILES%\pluteward
%PROGRAMFILES%\preguckuech
%PROGRAMFILES%\prergasp
%PROGRAMFILES%\prerqiwarddacertain
%PROGRAMFILES%\prerus
%PROGRAMFILES%\pripiieddocch
%PROGRAMFILES%\prissy
%PROGRAMFILES%\prjoentmerdery
%PROGRAMFILES%\prlusterkogh
%PROGRAMFILES%\projlyanubay
%PROGRAMFILES%\prunaplatuph
%PROGRAMFILES%\prusash
%PROGRAMFILES%\pubight
%PROGRAMFILES%\qeqotion
%PROGRAMFILES%\qitech
%PROGRAMFILES%\qivethercoqerly
%PROGRAMFILES%\qnuhegach
%PROGRAMFILES%\rEuWuFTools
%PROGRAMFILES%\razoward
%PROGRAMFILES%\reasetyulesp
%PROGRAMFILES%\reawerghtraserph
%PROGRAMFILES%\rebergeclarodom
%PROGRAMFILES%\reilechjpu
%PROGRAMFILES%\reiwaghgherfile
%PROGRAMFILES%\remerspwaqing
%PROGRAMFILES%\reoientrusoge
%PROGRAMFILES%\reratqatudom
%PROGRAMFILES%\rerkuy
%PROGRAMFILES%\rersse
%PROGRAMFILES%\retawardkukty
%PROGRAMFILES%\reuses
%PROGRAMFILES%\riferpy
%PROGRAMFILES%\rosatain
%PROGRAMFILES%\sagerspkawege
%PROGRAMFILES%\sahotplerpoied
%PROGRAMFILES%\saquterpward
%PROGRAMFILES%\serhesy
%PROGRAMFILES%\sewasemhient
%PROGRAMFILES%\shapoly
%PROGRAMFILES%\shepashkuderward
%PROGRAMFILES%\shijerghnuguch
%PROGRAMFILES%\shntherquhither
%PROGRAMFILES%\shoccult
%PROGRAMFILES%\shodisyqrugh
%PROGRAMFILES%\shomephclezeried
%PROGRAMFILES%\shorush
%PROGRAMFILES%\shumaing
%PROGRAMFILES%\shuqitainstazegh
%PROGRAMFILES%\shurerphraterward
%PROGRAMFILES%\sokeing
%PROGRAMFILES%\stiduy
%PROGRAMFILES%\stumogeqebut
%PROGRAMFILES%\tukoentvegsh
%PROGRAMFILES%\valoryatusation
%PROGRAMFILES%\vastyatedeing
%PROGRAMFILES%\vehotherdreguty
%PROGRAMFILES%\vieshhubule
%PROGRAMFILES%\voboght
%PROGRAMFILES(x86)%\Aterlutthikile
%PROGRAMFILES(x86)%\Nidaty
%PROGRAMFILES(x86)%\apptools
%PROGRAMFILES(x86)%\cluberspmercerk
%PROGRAMFILES(x86)%\clugoghphwodom
%PROGRAMFILES(x86)%\clugokftgh
%PROGRAMFILES(x86)%\clunaent
%PROGRAMFILES(x86)%\cluvigegowory
%PROGRAMFILES(x86)%\coepageatovry
%PROGRAMFILES(x86)%\coercock
%PROGRAMFILES(x86)%\coerkocult
%PROGRAMFILES(x86)%\cogapymoderther
%PROGRAMFILES(x86)%\coicerph
%PROGRAMFILES(x86)%\coidswermepy
%PROGRAMFILES(x86)%\conochdupution
%PROGRAMFILES(x86)%\coohatain
%PROGRAMFILES(x86)%\copkmahoch
%PROGRAMFILES(x86)%\couwadomcerperdom
%PROGRAMFILES(x86)%\daletictain
%PROGRAMFILES(x86)%\dapasy
%PROGRAMFILES(x86)%\datosh
%PROGRAMFILES(x86)%\deceward
%PROGRAMFILES(x86)%\dedoly
%PROGRAMFILES(x86)%\deqosehasity
%PROGRAMFILES(x86)%\dermupy
%PROGRAMFILES(x86)%\derrepyvivering
%PROGRAMFILES(x86)%\diaent
%PROGRAMFILES(x86)%\dliterpory
%PROGRAMFILES(x86)%\dnesharuzus
%PROGRAMFILES(x86)%\donagesetese
%PROGRAMFILES(x86)%\drakerlecgadom
%PROGRAMFILES(x86)%\dralach
%PROGRAMFILES(x86)%\dranoge
%PROGRAMFILES(x86)%\drarainganipition
%PROGRAMFILES(x86)%\drecetain
%PROGRAMFILES(x86)%\drejiy
%PROGRAMFILES(x86)%\drenackghowedom
%PROGRAMFILES(x86)%\dresle
%PROGRAMFILES(x86)%\dretule
%PROGRAMFILES(x86)%\drewespgrerwey
%PROGRAMFILES(x86)%\drizphqolother
%PROGRAMFILES(x86)%\drjother
%PROGRAMFILES(x86)%\droqekziday
%PROGRAMFILES(x86)%\drpasydest
%PROGRAMFILES(x86)%\druciy
%PROGRAMFILES(x86)%\druditain
%PROGRAMFILES(x86)%\dudusyplesoch
%PROGRAMFILES(x86)%\duqitainpcile
%PROGRAMFILES(x86)%\eepyruha
%PROGRAMFILES(x86)%\emather
%PROGRAMFILES(x86)%\fepuly
%PROGRAMFILES(x86)%\fermuge
%PROGRAMFILES(x86)%\ferory
%PROGRAMFILES(x86)%\feusenofs
%PROGRAMFILES(x86)%\figasy
%PROGRAMFILES(x86)%\fijushreibuent
%PROGRAMFILES(x86)%\filetnemerck
%PROGRAMFILES(x86)%\fovigemei
%PROGRAMFILES(x86)%\garunufupy
%PROGRAMFILES(x86)%\gazshrasity
%PROGRAMFILES(x86)%\gefing
%PROGRAMFILES(x86)%\gefudom
%PROGRAMFILES(x86)%\gerrershsterother
%PROGRAMFILES(x86)%\gersoghgrlopy
%PROGRAMFILES(x86)%\gertery
%PROGRAMFILES(x86)%\ghabuty
%PROGRAMFILES(x86)%\gherertionghatersh
%PROGRAMFILES(x86)%\ghergersyqerkeing
%PROGRAMFILES(x86)%\gherhis
%PROGRAMFILES(x86)%\gherjech
%PROGRAMFILES(x86)%\gherkadomijly
%PROGRAMFILES(x86)%\ghgersybqury
%PROGRAMFILES(x86)%\ghibay
%PROGRAMFILES(x86)%\ghijerght
%PROGRAMFILES(x86)%\ghmalyanacoing
%PROGRAMFILES(x86)%\ghojetain
%PROGRAMFILES(x86)%\ghojiryjile
%PROGRAMFILES(x86)%\ghorugh
%PROGRAMFILES(x86)%\ghubuge
%PROGRAMFILES(x86)%\ghuverckplokaent
%PROGRAMFILES(x86)%\gjadom
%PROGRAMFILES(x86)%\gokolestepation
%PROGRAMFILES(x86)%\granidomrsaph
%PROGRAMFILES(x86)%\grawition
%PROGRAMFILES(x86)%\grcakmiberdom
%PROGRAMFILES(x86)%\grerght
%PROGRAMFILES(x86)%\grersiward
%PROGRAMFILES(x86)%\grerzersp
%PROGRAMFILES(x86)%\griduy
%PROGRAMFILES(x86)%\grihersmiritain
%PROGRAMFILES(x86)%\griqitherphegoty
%PROGRAMFILES(x86)%\grocentreevugh
%PROGRAMFILES(x86)%\grokise
%PROGRAMFILES(x86)%\gromeent
%PROGRAMFILES(x86)%\groseghtjibied
%PROGRAMFILES(x86)%\grtase
%PROGRAMFILES(x86)%\grupward
%PROGRAMFILES(x86)%\grurecult
%PROGRAMFILES(x86)%\grutesy
%PROGRAMFILES(x86)%\gubicult
%PROGRAMFILES(x86)%\hecyhewury
%PROGRAMFILES(x86)%\herary
%PROGRAMFILES(x86)%\herhery
%PROGRAMFILES(x86)%\herjery
%PROGRAMFILES(x86)%\hertion
%PROGRAMFILES(x86)%\hidupyplumole
%PROGRAMFILES(x86)%\hiulysaey
%PROGRAMFILES(x86)%\holush
%PROGRAMFILES(x86)%\howight
%PROGRAMFILES(x86)%\hubishrwoy
%PROGRAMFILES(x86)%\humedomlutik
%PROGRAMFILES(x86)%\huvachreerjepy
%PROGRAMFILES(x86)%\icackaraergh
%PROGRAMFILES(x86)%\icockreoguing
%PROGRAMFILES(x86)%\idoing
%PROGRAMFILES(x86)%\idotion
%PROGRAMFILES(x86)%\ifeghtarinuph
%PROGRAMFILES(x86)%\jacestreward
%PROGRAMFILES(x86)%\jegoing
%PROGRAMFILES(x86)%\jercaenttrch
%PROGRAMFILES(x86)%\jerjers
%PROGRAMFILES(x86)%\jetrympward
%PROGRAMFILES(x86)%\jevilewomuty
%PROGRAMFILES(x86)%\jeweseprsot
%PROGRAMFILES(x86)%\jntmodo
%PROGRAMFILES(x86)%\jorosparertary
%PROGRAMFILES(x86)%\judolyderfck
%PROGRAMFILES(x86)%\juserly
%PROGRAMFILES(x86)%\kajuynobersh
%PROGRAMFILES(x86)%\kedasepuving
%PROGRAMFILES(x86)%\keoght
%PROGRAMFILES(x86)%\kikusphudoght
%PROGRAMFILES(x86)%\kukther
%PROGRAMFILES(x86)%\kuroplgaly
%PROGRAMFILES(x86)%\lafetqilse
%PROGRAMFILES(x86)%\lerlaied
%PROGRAMFILES(x86)%\lermacultoqus
%PROGRAMFILES(x86)%\lerqashchigother
%PROGRAMFILES(x86)%\letegeshopother
%PROGRAMFILES(x86)%\lfasyjiqege
%PROGRAMFILES(x86)%\lgechsteris
%PROGRAMFILES(x86)%\lhoyplerwuse
%PROGRAMFILES(x86)%\lomutherbagaied
%PROGRAMFILES(x86)%\luhuch
%PROGRAMFILES(x86)%\lurshgerns
%PROGRAMFILES(x86)%\lwuward
%PROGRAMFILES(x86)%\magdom
%PROGRAMFILES(x86)%\mehition
%PROGRAMFILES(x86)%\meqoshvurery
%PROGRAMFILES(x86)%\mertoghtzehige
%PROGRAMFILES(x86)%\mevaentcoijely
%PROGRAMFILES(x86)%\mijerwardplemese
%PROGRAMFILES(x86)%\miqoshzesetion
%PROGRAMFILES(x86)%\miwertainckerpsp
%PROGRAMFILES(x86)%\mizotycernery
%PROGRAMFILES(x86)%\mokagecerpuly
%PROGRAMFILES(x86)%\muziiedsvosh
%PROGRAMFILES(x86)%\naerentprefos
%PROGRAMFILES(x86)%\nasitain
%PROGRAMFILES(x86)%\negerle
%PROGRAMFILES(x86)%\negoent
%PROGRAMFILES(x86)%\nelithetay
%PROGRAMFILES(x86)%\nerrachghefeing
%PROGRAMFILES(x86)%\nerwughlleried
%PROGRAMFILES(x86)%\newughikeing
%PROGRAMFILES(x86)%\nilchtherjerent
%PROGRAMFILES(x86)%\nimkdejersp
%PROGRAMFILES(x86)%\nitish
%PROGRAMFILES(x86)%\niwerdavitain
%PROGRAMFILES(x86)%\noferkgrorerk
%PROGRAMFILES(x86)%\nofoiedanasition
%PROGRAMFILES(x86)%\nulchsezas
%PROGRAMFILES(x86)%\nvather
%PROGRAMFILES(x86)%\pciphtheviry
%PROGRAMFILES(x86)%\pedittawese
%PROGRAMFILES(x86)%\pekusy
%PROGRAMFILES(x86)%\peloch
%PROGRAMFILES(x86)%\peroty
%PROGRAMFILES(x86)%\phaderplemaing
%PROGRAMFILES(x86)%\phagiselipege
%PROGRAMFILES(x86)%\phagoge
%PROGRAMFILES(x86)%\phapergeatjaied
%PROGRAMFILES(x86)%\pharudom
%PROGRAMFILES(x86)%\phediktebaght
%PROGRAMFILES(x86)%\pheption
%PROGRAMFILES(x86)%\pherluied
%PROGRAMFILES(x86)%\pherlutherprudit
%PROGRAMFILES(x86)%\phertuph
%PROGRAMFILES(x86)%\pherzok
%PROGRAMFILES(x86)%\philughgrukis
%PROGRAMFILES(x86)%\phudikthwisy
%PROGRAMFILES(x86)%\phuige
%PROGRAMFILES(x86)%\phuquk
%PROGRAMFILES(x86)%\phviingstaledom
%PROGRAMFILES(x86)%\pirering
%PROGRAMFILES(x86)%\pizery
%PROGRAMFILES(x86)%\placutherghulers
%PROGRAMFILES(x86)%\platergh
%PROGRAMFILES(x86)%\platety
%PROGRAMFILES(x86)%\plberied
%PROGRAMFILES(x86)%\plebuckwuwury
%PROGRAMFILES(x86)%\plelage
%PROGRAMFILES(x86)%\plercitzumet
%PROGRAMFILES(x86)%\plibedom
%PROGRAMFILES(x86)%\plizoy
%PROGRAMFILES(x86)%\plokoy
%PROGRAMFILES(x86)%\pluteward
%PROGRAMFILES(x86)%\poaentdermuch
%PROGRAMFILES(x86)%\preguckuech
%PROGRAMFILES(x86)%\prergasp
%PROGRAMFILES(x86)%\prerqiwarddacertain
%PROGRAMFILES(x86)%\prerus
%PROGRAMFILES(x86)%\prifuly
%PROGRAMFILES(x86)%\pripiieddocch
%PROGRAMFILES(x86)%\prissy
%PROGRAMFILES(x86)%\prjoentmerdery
%PROGRAMFILES(x86)%\prlusterkogh
%PROGRAMFILES(x86)%\projlyanubay
%PROGRAMFILES(x86)%\prunaplatuph
%PROGRAMFILES(x86)%\prusash
%PROGRAMFILES(x86)%\prutuy
%PROGRAMFILES(x86)%\pubight
%PROGRAMFILES(x86)%\qalolefaqent
%PROGRAMFILES(x86)%\qeqotion
%PROGRAMFILES(x86)%\qerhawardkiztion
%PROGRAMFILES(x86)%\qerzise
%PROGRAMFILES(x86)%\qitech
%PROGRAMFILES(x86)%\qivethercoqerly
%PROGRAMFILES(x86)%\qnuhegach
%PROGRAMFILES(x86)%\razoward
%PROGRAMFILES(x86)%\reasetyulesp
%PROGRAMFILES(x86)%\reawerghtraserph
%PROGRAMFILES(x86)%\rebergeclarodom
%PROGRAMFILES(x86)%\reerwerghtsergale
%PROGRAMFILES(x86)%\referkzabak
%PROGRAMFILES(x86)%\reilechjpu
%PROGRAMFILES(x86)%\reiwaghgherfile
%PROGRAMFILES(x86)%\remerspwaqing
%PROGRAMFILES(x86)%\reocight
%PROGRAMFILES(x86)%\reoientrusoge
%PROGRAMFILES(x86)%\reonosptewoy
%PROGRAMFILES(x86)%\reosetherprutaent
%PROGRAMFILES(x86)%\reowtainvesck
%PROGRAMFILES(x86)%\reratqatudom
%PROGRAMFILES(x86)%\rerkuy
%PROGRAMFILES(x86)%\rersse
%PROGRAMFILES(x86)%\reurusptujos
%PROGRAMFILES(x86)%\reuses
%PROGRAMFILES(x86)%\riferpy
%PROGRAMFILES(x86)%\rilethercheduied
%PROGRAMFILES(x86)%\ripitsjile
%PROGRAMFILES(x86)%\rjatain
%PROGRAMFILES(x86)%\rokaphdruzitain
%PROGRAMFILES(x86)%\rolugh
%PROGRAMFILES(x86)%\rosatain
%PROGRAMFILES(x86)%\sagerspkawege
%PROGRAMFILES(x86)%\saquterpward
%PROGRAMFILES(x86)%\serhesy
%PROGRAMFILES(x86)%\sewasemhient
%PROGRAMFILES(x86)%\shapoly
%PROGRAMFILES(x86)%\shbseverqersp
%PROGRAMFILES(x86)%\shekicult
%PROGRAMFILES(x86)%\shepashkuderward
%PROGRAMFILES(x86)%\shetighaterbent
%PROGRAMFILES(x86)%\shijerghnuguch
%PROGRAMFILES(x86)%\shntherquhither
%PROGRAMFILES(x86)%\shoccult
%PROGRAMFILES(x86)%\shodisyqrugh
%PROGRAMFILES(x86)%\shomephclezeried
%PROGRAMFILES(x86)%\shorush
%PROGRAMFILES(x86)%\shumaing
%PROGRAMFILES(x86)%\shuqitainstazegh
%PROGRAMFILES(x86)%\shurerphraterward
%PROGRAMFILES(x86)%\sokeing
%PROGRAMFILES(x86)%\stiduy
%PROGRAMFILES(x86)%\stumogeqebut
%PROGRAMFILES(x86)%\thaberchnaey
%PROGRAMFILES(x86)%\therhisy
%PROGRAMFILES(x86)%\toliingcluverph
%PROGRAMFILES(x86)%\tukerty
%PROGRAMFILES(x86)%\tukoentvegsh
%PROGRAMFILES(x86)%\valoryatusation
%PROGRAMFILES(x86)%\vastyatedeing
%PROGRAMFILES(x86)%\vehotherdreguty
%PROGRAMFILES(x86)%\vervghtprerqercult
%PROGRAMFILES(x86)%\vieshhubule
%PROGRAMFILES(x86)%\vndomkivory
%PROGRAMFILES(x86)%\voboght

URLs

Elex Hijacker may call the following URLs:

fgldnknlljnfcfgchdijbjmmkdkmnabn

Analysis Report

General information

Family Name: Elex Hijacker
Signature status: Self Signed

Known Samples

MD5: 75eea2c64d18315c1594b8dcff08af8c
SHA1: 764fa4baa8bdacd87c00c22979e60b1716930fd3
SHA256: 9E9689F259E2537A021D55895B4FCF015ADB1F8D9BD19E81968FB1F6A5817957
File Size: 309.13 KB, 309128 bytes
MD5: 462bcabe6467d6d7b6ca91fe00249810
SHA1: 186e4eebb66f1f6a875b4419573f3822060c031e
SHA256: 7FEED78302B3A6D5A3CBF4ADDE042F6AF6F46E3793793D3DDF9A822786A44299
File Size: 1.54 MB, 1536696 bytes
MD5: 1e90afb2ae9c1b3860cc24a68dd54904
SHA1: bb5dae47380c6c9d5528c114e15f3bbc1af1021d
SHA256: 19A40AE684A1B6548BAA5758D309625BA6FD211DF18EEE59D5F5BF9041E3C241
File Size: 770.22 KB, 770224 bytes
MD5: 382affca0b18c88e11092ef6ca189b95
SHA1: 8256d809ab0d8eeebca5a5ae156ef9900573eca8
SHA256: 664FB20556BC4775A31C13718AF0FBA3EB1B9FF7ABB7F791C364B9A3E89AA520
File Size: 1.50 MB, 1498552 bytes
MD5: ad6b6f53490746c3c62f3d3f176300d5
SHA1: 395c116d7cf1f2fd70d42a67dc8621e424ea4b4a
SHA256: F3F01E19C6B98289D63BD30C5CEB6DA775F00EA385417FA6755545D8F41F20B6
File Size: 671.33 KB, 671328 bytes
Show More
MD5: ad6f38048314b3a1316c114ae8b8c480
SHA1: c937732ab7957c90cfc0f51aa62615429dcf4d51
SHA256: 3C7F766442DD72324ACC88E7DEF3DB48CF023F8E0DE1DDFAE91B591C28FC03E3
File Size: 302.91 KB, 302912 bytes
MD5: 9a61a82224f10e8bc144a681186d2921
SHA1: 4507dac70c5ccea0be4f838ec448a5558003968d
SHA256: BFC02B669EBCF359257F0D923152AF97DAE118C39E19446A70CF4EA5074A67E7
File Size: 903.03 KB, 903032 bytes
MD5: 06a5be47c95c0831d5e477a2ffad444e
SHA1: c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83
SHA256: 9B6C082BB8D225C97EFB1E87D514283B56B427D966476D01A38FC160C9B20209
File Size: 646.33 KB, 646328 bytes
MD5: 03f8be4e6503f7ce0c7c87f79ba6c57b
SHA1: be8f6c434c32907e537fdd537c288efce8eca842
SHA256: 1812F1FCB1F3860B1064C335C1764CBB60CD36C3C4D019F4AF90796D1A61E418
File Size: 473.94 KB, 473944 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments PANDA Viewer installer
Company Name
  • BANANA SUMMER LIMITED
  • Beijing ELEX Technology Co. Ltd.
  • File Syn
  • HTabp.com
  • One Syn
  • Portmon/EE
  • Real-skill.com
File Description
  • File Work
  • FileWork_Bra
  • HTabp
  • PANDA Viewer installer
  • Portmon/EE
  • Real-skill
  • Syn worker
  • v9hometools
File Version
  • 14.4.4.15
  • 6.6.86.1691
  • 6.6.86.1606
  • 6.5.7605.1001
  • 6.2.7602.1015
  • 6,3,7601,1322
  • 1.0.0.3
  • 1.0.0.2
Internal Name
  • FileWork.exe
  • HTabp.exe
  • portmon.exe
  • Real-skill.exe
  • SynWork.exe
  • v9home_tools.exe
  • Worker.exe
Legal Copyright
  • (c) <Beijing ELEX Technology Co. Ltd.>. All rights reserved.
  • Copyright (C) 2014
  • Copyright (C) HTabp.com 2010
  • Copyright (C) Real-skill System Link 2002
  • Copyright 2016 BANANA SUMMER LIMITED All rights reserved.
  • One Syn
  • Portmon/EE
  • SynWork
Original Filename
  • FileWork.exe
  • HTabp.exe
  • portmon.exe
  • Real-skill.exe
  • SynWork.exe
  • v9home_tools.exe
  • Worker.exe
Product Name
  • 548_sof
  • 1511_smt_istartsurf
  • 2002_cor_vi-view
  • 3428_smt_istartsurf
  • 3899_cornl_istartsurf
  • padingpadingpadingpadingpadingpadingpadingpadingpadingpadingpadingpadingpadingpading
  • PANDA Viewer installer
  • v9hometools
Product Version
  • 14.4.4.15
  • 6.6.86.1691
  • 6.6.86.1606
  • 6.5.7605.1001
  • 6.2.7602.1015
  • 6,3,7601,1322
  • 1.0.0.3

Digital Signatures

Signer Root Status
Li Mo DigiCert Assured ID Code Signing CA-1 Self Signed
Xiaoqing Liu DigiCert Assured ID Code Signing CA-1 Self Signed
Shulan Hou DigiCert SHA2 Assured ID Code Signing CA Self Signed
Shenzhen Zhongxiao Trading Co.,Ltd. GlobalSign Root Not Trusted
Hefei Zhimingxingtong Software&Technology Co., Ltd. GlobalSign CodeSigning CA - G2 Self Signed
Show More
Minidigital Technology Co., Limited GlobalSign CodeSigning CA - G2 Self Signed
Beijing ELEX Technology Co.,Ltd VeriSign Class 3 Code Signing 2010 CA Self Signed
Yang Liwei WoSign Class 2 Code Signing CA Self Signed
Lei Rong thawte SHA256 Code Signing CA Self Signed

Block Information

Similar Families

  • Elex.J
  • Elex.M

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\1287765\1287765.zipdir\mainlog\c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83_000064_2025-12-19[20-34-50-586].log Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\xldownload.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\zlib1.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbd4b.tmp\7za.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbd4b.tmp\nsexec.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbd4b.tmp\res.7z Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nstd517.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\pandaviewer\libdui.dll Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\pandaviewer\pandaviewer.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\pandaviewer\pandaviewerinstaller.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\pandaviewer\pandaviewerserviceup.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\pandaviewer\thumbnail.ico Generic Write,Read Attributes
c:\users\user\appdata\local\temp\pandaviewer\uninstall.exe Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe ꖙ촉童ǜ RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • OutputDebugString
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ZwMapViewOfSection
Process Shell Execute
  • CreateProcess
Other Suspicious
  • AdjustTokenPrivileges
  • SetWindowsHookEx
Network Winsock2
  • WSAStartup
Network Winsock
  • closesocket
  • connect
  • freeaddrinfo
  • getaddrinfo
  • socket
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
Show More
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Shell Command Execution

"C:\Users\Xrdjitfi\AppData\Local\Temp\PandaViewer\PandaViewerinstaller.exe"
"C:\Users\Jeirhhui\AppData\Local\Temp\nslBD4B.tmp\7za.exe" e res.7z -ppswd00 -o.\ -aoa

Trending

Most Viewed

Loading...