Elex Hijacker
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 59 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 2,033,162 |
| First Seen: | April 1, 2015 |
| Last Seen: | February 7, 2026 |
| OS(es) Affected: | Windows |
The Elex Hijacker is a Web browser hijacker that may take over a Web browser, change its homepage and other settings and prevent computer users from restoring their Web browser to its default setting. The Elex Hijacker may be associated with a variety of other unwanted symptoms. The main reason that makes the Elex Hijacker is considered a browser hijacker is because its main purpose is to take over a Web browser to force computer users to view certain websites repeatedly and open new Web browser windows and tabs while the computer users attempt to use their computers. The Elex Hijacker is promoted as a useful Web browser extension or add-on. However, PC security researchers have determined that the Elex Hijacker does not offer any useful or beneficial service. Rather, the Elex Hijacker is designed to make money at the expense of computer users by displaying advertisements or forcing them to visit websites related to their affiliate websites.
Table of Contents
The Elex Hijacker may Expose Your Computer to Threatening Content
One of the main problems related to the Elex Hijacker is that computer users don't really have any control over the websites that their Web browser forces them to visit. This may cause computers to become infected with threats or other low-level threats as a result of the Elex Hijacker redirects or pop-ups. Essentially, the Elex Hijacker itself is a low-level threat, but various pop-up messages and affiliated websites may expose your computer to more threatening unwanted content. Another issue with the Elex Hijacker is that it may deliver large volumes of advertising content to computer users in the form of banners, inserted links, pop-up advertisements, and other unwanted advertisements added to the websites viewed on the affected Web browser. The Elex Hijacker may cause important performance issues on affected computers. If the Elex Hijacker is installed on your Web browser, this may increase the probability of crashing, freezing or a slower performance.
How the Elex Hijacker may Infect a Computer
One of the ways in which the Elex Hijacker may be distributed is by using typical threat deliver methods. Because of this, you should be well protected from the Elex Hijacker if your computer is safeguarded against threats, or if you have taken steps to avoid threats when browsing the Web. However, browser hijackers such as the Elex Hijacker may pass anti-malware protection. This is because the Elex Hijacker and other low-level threats also may be distributed by bundling them with other software. Computer users may be confused or surprised by the sudden appearance of the Elex Hijacker on their Web browser, which may happen right after they have installed software on their computers. However, the software is rarely the culprit. Rather, it is not uncommon for free programs to be bundled with components like the Elex Hijacker, often advertised as useful Web browser add-ons or extensions. Once the Elex Hijacker enters a computer, it may take the form of a browser toolbar or extension and interfere with the affected Web browser constantly.
Why the Elex Hijacker may be Bundled with Other Software
The most common way of distributing the Elex Hijacker and similar low-level threats is by bundling them with other software. Con artists may take popular free software and use custom installers or bundlers to include the Elex Hijacker or similar components along with the installation of that software. In most cases, the custom installers may be created to make it hard for computer users to realize that the Elex Hijacker or another unwanted component is being installed. The Elex Hijacker may be set to be installed by default, requiring computer users to opt out. The option to opt out of installing the Elex Hijacker also may be hidden behind a 'Custom Installation' or 'Advanced Installation' options. Computer users are advised to pay careful attention to the entire set up process when installing any new software.
Aliases
5 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Fortinet | Riskware/Elex |
| Panda | PUP/XTab |
| McAfee | Artemis!5C76D5C030CB |
| AhnLab-V3 | PUP/Win32.Generic |
| McAfee-GW-Edition | Artemis!Trojan |
SpyHunter Detects & Remove Elex Hijacker
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | WinSAP.dll | 2f7bae01856c042b065cb8d691665cc8 | 3,825 |
| 2. | kokoko2.dll | 65dd228ceb3bfd8e2daa1cd3473145c4 | 3,581 |
| 3. | terana64.dll | 67a8678a6a84d323814b3dea0eb271b0 | 3,125 |
| 4. | ~seEBF0.tmp | f836ee87da9248456dfab1227ffb25ef | 2,776 |
| 5. | ~seD124.tmp | 0a2b05b9c1f413510f6c036c260264fc | 1,745 |
| 6. | glory.dll | 24d733bdb924df52f0c0966c6233bacc | 1,520 |
| 7. | kitty1.dll | fbac42b2e87374cbbe6ea6c233167124 | 1,431 |
| 8. | terana.dll | fe035b504be7efa437cad67c871eb4d4 | 1,408 |
| 9. | kokoko1.dll | 4d15e77941a8b96209d561b6d859dd5f | 1,219 |
| 10. | ~se8F5.tmp | 19488e1593252b738beebf8632b57075 | 1,202 |
| 11. | Jamper.dll | c17e67bdcbcec49226dadf6450287ef6 | 1,113 |
| 12. | synctool.dll | 6f749bd448a92962b31e16d9bae77125 | 916 |
| 13. | ~se2C2E.tmp | 395d2b83b78cd1e0ac59b85e230f0221 | 572 |
| 14. | NetUtils2016.sys.0e680f4f | 999995e6e594d8f7aa72029c8eb2b952 | 556 |
| 15. | FirefoxUpdate.exe | ea4172402f973e5b9bbfae6f0a17fe24 | 484 |
| 16. | ~se5BA.tmp | 0f393897a889d3a7b528283060c6c2e6 | 446 |
| 17. | ~se82E5.tmp | 89e194be6e316330a6bdf40b05186c6f | 347 |
| 18. | 30daf459e79c5d26366654b1b482e87.cab:dp | 5ada1bee43ca44d6b481fa8ec52e4dc7 | 160 |
| 19. | ~seC9E4.tmp | c54124960ef22465484ee7cd99ff37b6 | 126 |
| 20. | ~seEE92.tmp | 51f76a0fdeeee8f4c75c0a14b037027b | 93 |
| 21. | CPK.exe | 3232a5dd21a04641e2b4f3875f554151 | 31 |
| 22. | ~seF619.tmp | 59ceb9de4c5be1491fe4d54a5b9cd2c9 | 28 |
| 23. | BIT.dll | 02dc3a4ac9e298878fca4dc5ee5d0e9a | 20 |
| 24. | file.exe | 7e291e0449f35a53bc873f2f39d0f783 | 9 |
| 25. | Archer.dll | fb05d6f5d14aee88fdea16766130e75e | 8 |
| 26. | Snare.dll | 39cc352e988e2939bc587c0bb9c76a0a | 8 |
| 27. | Kitty.dll | 3b35fd22f7c67cdfd897fad1c6edf2e2 | 3 |
Registry Details
Directories
Elex Hijacker may create the following directory or directories:
| %ALLUSERSPROFILE%\rEuWuFTools |
| %APPDATA%\appyphinek |
| %APPDATA%\dapicult |
| %APPDATA%\herley |
| %PROGRAMFILES%\Nidaty |
| %PROGRAMFILES%\apptools |
| %PROGRAMFILES%\clugoghphwodom |
| %PROGRAMFILES%\clugokftgh |
| %PROGRAMFILES%\clunaent |
| %PROGRAMFILES%\coercock |
| %PROGRAMFILES%\coerkocult |
| %PROGRAMFILES%\cogapymoderther |
| %PROGRAMFILES%\coicerph |
| %PROGRAMFILES%\coidswermepy |
| %PROGRAMFILES%\coohatain |
| %PROGRAMFILES%\cootion |
| %PROGRAMFILES%\copkmahoch |
| %PROGRAMFILES%\daletictain |
| %PROGRAMFILES%\dapasy |
| %PROGRAMFILES%\datosh |
| %PROGRAMFILES%\deceward |
| %PROGRAMFILES%\dedoly |
| %PROGRAMFILES%\deqosehasity |
| %PROGRAMFILES%\dermupy |
| %PROGRAMFILES%\derrepyvivering |
| %PROGRAMFILES%\diaent |
| %PROGRAMFILES%\dliterpory |
| %PROGRAMFILES%\dnesharuzus |
| %PROGRAMFILES%\dralach |
| %PROGRAMFILES%\dranoge |
| %PROGRAMFILES%\drarainganipition |
| %PROGRAMFILES%\drecetain |
| %PROGRAMFILES%\drenackghowedom |
| %PROGRAMFILES%\dresle |
| %PROGRAMFILES%\dretule |
| %PROGRAMFILES%\drewespgrerwey |
| %PROGRAMFILES%\drizphqolother |
| %PROGRAMFILES%\drjother |
| %PROGRAMFILES%\drpasydest |
| %PROGRAMFILES%\druciy |
| %PROGRAMFILES%\druditain |
| %PROGRAMFILES%\eepyruha |
| %PROGRAMFILES%\emather |
| %PROGRAMFILES%\fepuly |
| %PROGRAMFILES%\figasy |
| %PROGRAMFILES%\fijushreibuent |
| %PROGRAMFILES%\fovigemei |
| %PROGRAMFILES%\garunufupy |
| %PROGRAMFILES%\gazshrasity |
| %PROGRAMFILES%\gefudom |
| %PROGRAMFILES%\gersieddrerterpy |
| %PROGRAMFILES%\gertery |
| %PROGRAMFILES%\ghabuty |
| %PROGRAMFILES%\gherertionghatersh |
| %PROGRAMFILES%\ghergersyqerkeing |
| %PROGRAMFILES%\gherjech |
| %PROGRAMFILES%\gherkadomijly |
| %PROGRAMFILES%\ghezeentghicay |
| %PROGRAMFILES%\ghgersybqury |
| %PROGRAMFILES%\ghibay |
| %PROGRAMFILES%\ghijerght |
| %PROGRAMFILES%\ghmalyanacoing |
| %PROGRAMFILES%\ghojetain |
| %PROGRAMFILES%\ghojiryjile |
| %PROGRAMFILES%\ghorugh |
| %PROGRAMFILES%\ghubuge |
| %PROGRAMFILES%\ghuverckplokaent |
| %PROGRAMFILES%\gjadom |
| %PROGRAMFILES%\gokolestepation |
| %PROGRAMFILES%\graghmerrek |
| %PROGRAMFILES%\granidomrsaph |
| %PROGRAMFILES%\grerght |
| %PROGRAMFILES%\grersiward |
| %PROGRAMFILES%\griduy |
| %PROGRAMFILES%\grigikcunack |
| %PROGRAMFILES%\grihersmiritain |
| %PROGRAMFILES%\griqitherphegoty |
| %PROGRAMFILES%\grokise |
| %PROGRAMFILES%\groseghtjibied |
| %PROGRAMFILES%\grtase |
| %PROGRAMFILES%\grupward |
| %PROGRAMFILES%\grurecult |
| %PROGRAMFILES%\grutesy |
| %PROGRAMFILES%\gubicult |
| %PROGRAMFILES%\hecyhewury |
| %PROGRAMFILES%\herary |
| %PROGRAMFILES%\hidupyplumole |
| %PROGRAMFILES%\hiulysaey |
| %PROGRAMFILES%\holush |
| %PROGRAMFILES%\hubishrwoy |
| %PROGRAMFILES%\humedomlutik |
| %PROGRAMFILES%\huweried |
| %PROGRAMFILES%\icackaraergh |
| %PROGRAMFILES%\idoing |
| %PROGRAMFILES%\idotion |
| %PROGRAMFILES%\ifeghtarinuph |
| %PROGRAMFILES%\jercaenttrch |
| %PROGRAMFILES%\jerjers |
| %PROGRAMFILES%\jetrympward |
| %PROGRAMFILES%\jeweseprsot |
| %PROGRAMFILES%\kedasepuving |
| %PROGRAMFILES%\kikusphudoght |
| %PROGRAMFILES%\lafetqilse |
| %PROGRAMFILES%\lerlaied |
| %PROGRAMFILES%\lermacultoqus |
| %PROGRAMFILES%\lfasyjiqege |
| %PROGRAMFILES%\mehition |
| %PROGRAMFILES%\meqoshvurery |
| %PROGRAMFILES%\mevaentcoijely |
| %PROGRAMFILES%\mijerwardplemese |
| %PROGRAMFILES%\miqoshzesetion |
| %PROGRAMFILES%\miwertainckerpsp |
| %PROGRAMFILES%\mizotycernery |
| %PROGRAMFILES%\mokagecerpuly |
| %PROGRAMFILES%\naerentprefos |
| %PROGRAMFILES%\nasitain |
| %PROGRAMFILES%\nelithetay |
| %PROGRAMFILES%\nerrachghefeing |
| %PROGRAMFILES%\nerwughlleried |
| %PROGRAMFILES%\newughikeing |
| %PROGRAMFILES%\nilchtherjerent |
| %PROGRAMFILES%\nimkdejersp |
| %PROGRAMFILES%\nitish |
| %PROGRAMFILES%\niwerdavitain |
| %PROGRAMFILES%\nofoiedanasition |
| %PROGRAMFILES%\nvather |
| %PROGRAMFILES%\pciphtheviry |
| %PROGRAMFILES%\peloch |
| %PROGRAMFILES%\perkaght |
| %PROGRAMFILES%\peroty |
| %PROGRAMFILES%\phaderplemaing |
| %PROGRAMFILES%\phagiselipege |
| %PROGRAMFILES%\phapergeatjaied |
| %PROGRAMFILES%\phbiiedtorle |
| %PROGRAMFILES%\phediktebaght |
| %PROGRAMFILES%\pheption |
| %PROGRAMFILES%\pherluied |
| %PROGRAMFILES%\pherlutherprudit |
| %PROGRAMFILES%\phohatyreamuy |
| %PROGRAMFILES%\phudikthwisy |
| %PROGRAMFILES%\phuhos |
| %PROGRAMFILES%\phuige |
| %PROGRAMFILES%\phuquk |
| %PROGRAMFILES%\phviingstaledom |
| %PROGRAMFILES%\pirering |
| %PROGRAMFILES%\placutherghulers |
| %PROGRAMFILES%\plberied |
| %PROGRAMFILES%\plebuckwuwury |
| %PROGRAMFILES%\plelage |
| %PROGRAMFILES%\plerqer |
| %PROGRAMFILES%\plokoy |
| %PROGRAMFILES%\pluteward |
| %PROGRAMFILES%\preguckuech |
| %PROGRAMFILES%\prergasp |
| %PROGRAMFILES%\prerqiwarddacertain |
| %PROGRAMFILES%\prerus |
| %PROGRAMFILES%\pripiieddocch |
| %PROGRAMFILES%\prissy |
| %PROGRAMFILES%\prjoentmerdery |
| %PROGRAMFILES%\prlusterkogh |
| %PROGRAMFILES%\projlyanubay |
| %PROGRAMFILES%\prunaplatuph |
| %PROGRAMFILES%\prusash |
| %PROGRAMFILES%\pubight |
| %PROGRAMFILES%\qeqotion |
| %PROGRAMFILES%\qitech |
| %PROGRAMFILES%\qivethercoqerly |
| %PROGRAMFILES%\qnuhegach |
| %PROGRAMFILES%\rEuWuFTools |
| %PROGRAMFILES%\razoward |
| %PROGRAMFILES%\reasetyulesp |
| %PROGRAMFILES%\reawerghtraserph |
| %PROGRAMFILES%\rebergeclarodom |
| %PROGRAMFILES%\reilechjpu |
| %PROGRAMFILES%\reiwaghgherfile |
| %PROGRAMFILES%\remerspwaqing |
| %PROGRAMFILES%\reoientrusoge |
| %PROGRAMFILES%\reratqatudom |
| %PROGRAMFILES%\rerkuy |
| %PROGRAMFILES%\rersse |
| %PROGRAMFILES%\retawardkukty |
| %PROGRAMFILES%\reuses |
| %PROGRAMFILES%\riferpy |
| %PROGRAMFILES%\rosatain |
| %PROGRAMFILES%\sagerspkawege |
| %PROGRAMFILES%\sahotplerpoied |
| %PROGRAMFILES%\saquterpward |
| %PROGRAMFILES%\serhesy |
| %PROGRAMFILES%\sewasemhient |
| %PROGRAMFILES%\shapoly |
| %PROGRAMFILES%\shepashkuderward |
| %PROGRAMFILES%\shijerghnuguch |
| %PROGRAMFILES%\shntherquhither |
| %PROGRAMFILES%\shoccult |
| %PROGRAMFILES%\shodisyqrugh |
| %PROGRAMFILES%\shomephclezeried |
| %PROGRAMFILES%\shorush |
| %PROGRAMFILES%\shumaing |
| %PROGRAMFILES%\shuqitainstazegh |
| %PROGRAMFILES%\shurerphraterward |
| %PROGRAMFILES%\sokeing |
| %PROGRAMFILES%\stiduy |
| %PROGRAMFILES%\stumogeqebut |
| %PROGRAMFILES%\tukoentvegsh |
| %PROGRAMFILES%\valoryatusation |
| %PROGRAMFILES%\vastyatedeing |
| %PROGRAMFILES%\vehotherdreguty |
| %PROGRAMFILES%\vieshhubule |
| %PROGRAMFILES%\voboght |
| %PROGRAMFILES(x86)%\Aterlutthikile |
| %PROGRAMFILES(x86)%\Nidaty |
| %PROGRAMFILES(x86)%\apptools |
| %PROGRAMFILES(x86)%\cluberspmercerk |
| %PROGRAMFILES(x86)%\clugoghphwodom |
| %PROGRAMFILES(x86)%\clugokftgh |
| %PROGRAMFILES(x86)%\clunaent |
| %PROGRAMFILES(x86)%\cluvigegowory |
| %PROGRAMFILES(x86)%\coepageatovry |
| %PROGRAMFILES(x86)%\coercock |
| %PROGRAMFILES(x86)%\coerkocult |
| %PROGRAMFILES(x86)%\cogapymoderther |
| %PROGRAMFILES(x86)%\coicerph |
| %PROGRAMFILES(x86)%\coidswermepy |
| %PROGRAMFILES(x86)%\conochdupution |
| %PROGRAMFILES(x86)%\coohatain |
| %PROGRAMFILES(x86)%\copkmahoch |
| %PROGRAMFILES(x86)%\couwadomcerperdom |
| %PROGRAMFILES(x86)%\daletictain |
| %PROGRAMFILES(x86)%\dapasy |
| %PROGRAMFILES(x86)%\datosh |
| %PROGRAMFILES(x86)%\deceward |
| %PROGRAMFILES(x86)%\dedoly |
| %PROGRAMFILES(x86)%\deqosehasity |
| %PROGRAMFILES(x86)%\dermupy |
| %PROGRAMFILES(x86)%\derrepyvivering |
| %PROGRAMFILES(x86)%\diaent |
| %PROGRAMFILES(x86)%\dliterpory |
| %PROGRAMFILES(x86)%\dnesharuzus |
| %PROGRAMFILES(x86)%\donagesetese |
| %PROGRAMFILES(x86)%\drakerlecgadom |
| %PROGRAMFILES(x86)%\dralach |
| %PROGRAMFILES(x86)%\dranoge |
| %PROGRAMFILES(x86)%\drarainganipition |
| %PROGRAMFILES(x86)%\drecetain |
| %PROGRAMFILES(x86)%\drejiy |
| %PROGRAMFILES(x86)%\drenackghowedom |
| %PROGRAMFILES(x86)%\dresle |
| %PROGRAMFILES(x86)%\dretule |
| %PROGRAMFILES(x86)%\drewespgrerwey |
| %PROGRAMFILES(x86)%\drizphqolother |
| %PROGRAMFILES(x86)%\drjother |
| %PROGRAMFILES(x86)%\droqekziday |
| %PROGRAMFILES(x86)%\drpasydest |
| %PROGRAMFILES(x86)%\druciy |
| %PROGRAMFILES(x86)%\druditain |
| %PROGRAMFILES(x86)%\dudusyplesoch |
| %PROGRAMFILES(x86)%\duqitainpcile |
| %PROGRAMFILES(x86)%\eepyruha |
| %PROGRAMFILES(x86)%\emather |
| %PROGRAMFILES(x86)%\fepuly |
| %PROGRAMFILES(x86)%\fermuge |
| %PROGRAMFILES(x86)%\ferory |
| %PROGRAMFILES(x86)%\feusenofs |
| %PROGRAMFILES(x86)%\figasy |
| %PROGRAMFILES(x86)%\fijushreibuent |
| %PROGRAMFILES(x86)%\filetnemerck |
| %PROGRAMFILES(x86)%\fovigemei |
| %PROGRAMFILES(x86)%\garunufupy |
| %PROGRAMFILES(x86)%\gazshrasity |
| %PROGRAMFILES(x86)%\gefing |
| %PROGRAMFILES(x86)%\gefudom |
| %PROGRAMFILES(x86)%\gerrershsterother |
| %PROGRAMFILES(x86)%\gersoghgrlopy |
| %PROGRAMFILES(x86)%\gertery |
| %PROGRAMFILES(x86)%\ghabuty |
| %PROGRAMFILES(x86)%\gherertionghatersh |
| %PROGRAMFILES(x86)%\ghergersyqerkeing |
| %PROGRAMFILES(x86)%\gherhis |
| %PROGRAMFILES(x86)%\gherjech |
| %PROGRAMFILES(x86)%\gherkadomijly |
| %PROGRAMFILES(x86)%\ghgersybqury |
| %PROGRAMFILES(x86)%\ghibay |
| %PROGRAMFILES(x86)%\ghijerght |
| %PROGRAMFILES(x86)%\ghmalyanacoing |
| %PROGRAMFILES(x86)%\ghojetain |
| %PROGRAMFILES(x86)%\ghojiryjile |
| %PROGRAMFILES(x86)%\ghorugh |
| %PROGRAMFILES(x86)%\ghubuge |
| %PROGRAMFILES(x86)%\ghuverckplokaent |
| %PROGRAMFILES(x86)%\gjadom |
| %PROGRAMFILES(x86)%\gokolestepation |
| %PROGRAMFILES(x86)%\granidomrsaph |
| %PROGRAMFILES(x86)%\grawition |
| %PROGRAMFILES(x86)%\grcakmiberdom |
| %PROGRAMFILES(x86)%\grerght |
| %PROGRAMFILES(x86)%\grersiward |
| %PROGRAMFILES(x86)%\grerzersp |
| %PROGRAMFILES(x86)%\griduy |
| %PROGRAMFILES(x86)%\grihersmiritain |
| %PROGRAMFILES(x86)%\griqitherphegoty |
| %PROGRAMFILES(x86)%\grocentreevugh |
| %PROGRAMFILES(x86)%\grokise |
| %PROGRAMFILES(x86)%\gromeent |
| %PROGRAMFILES(x86)%\groseghtjibied |
| %PROGRAMFILES(x86)%\grtase |
| %PROGRAMFILES(x86)%\grupward |
| %PROGRAMFILES(x86)%\grurecult |
| %PROGRAMFILES(x86)%\grutesy |
| %PROGRAMFILES(x86)%\gubicult |
| %PROGRAMFILES(x86)%\hecyhewury |
| %PROGRAMFILES(x86)%\herary |
| %PROGRAMFILES(x86)%\herhery |
| %PROGRAMFILES(x86)%\herjery |
| %PROGRAMFILES(x86)%\hertion |
| %PROGRAMFILES(x86)%\hidupyplumole |
| %PROGRAMFILES(x86)%\hiulysaey |
| %PROGRAMFILES(x86)%\holush |
| %PROGRAMFILES(x86)%\howight |
| %PROGRAMFILES(x86)%\hubishrwoy |
| %PROGRAMFILES(x86)%\humedomlutik |
| %PROGRAMFILES(x86)%\huvachreerjepy |
| %PROGRAMFILES(x86)%\icackaraergh |
| %PROGRAMFILES(x86)%\icockreoguing |
| %PROGRAMFILES(x86)%\idoing |
| %PROGRAMFILES(x86)%\idotion |
| %PROGRAMFILES(x86)%\ifeghtarinuph |
| %PROGRAMFILES(x86)%\jacestreward |
| %PROGRAMFILES(x86)%\jegoing |
| %PROGRAMFILES(x86)%\jercaenttrch |
| %PROGRAMFILES(x86)%\jerjers |
| %PROGRAMFILES(x86)%\jetrympward |
| %PROGRAMFILES(x86)%\jevilewomuty |
| %PROGRAMFILES(x86)%\jeweseprsot |
| %PROGRAMFILES(x86)%\jntmodo |
| %PROGRAMFILES(x86)%\jorosparertary |
| %PROGRAMFILES(x86)%\judolyderfck |
| %PROGRAMFILES(x86)%\juserly |
| %PROGRAMFILES(x86)%\kajuynobersh |
| %PROGRAMFILES(x86)%\kedasepuving |
| %PROGRAMFILES(x86)%\keoght |
| %PROGRAMFILES(x86)%\kikusphudoght |
| %PROGRAMFILES(x86)%\kukther |
| %PROGRAMFILES(x86)%\kuroplgaly |
| %PROGRAMFILES(x86)%\lafetqilse |
| %PROGRAMFILES(x86)%\lerlaied |
| %PROGRAMFILES(x86)%\lermacultoqus |
| %PROGRAMFILES(x86)%\lerqashchigother |
| %PROGRAMFILES(x86)%\letegeshopother |
| %PROGRAMFILES(x86)%\lfasyjiqege |
| %PROGRAMFILES(x86)%\lgechsteris |
| %PROGRAMFILES(x86)%\lhoyplerwuse |
| %PROGRAMFILES(x86)%\lomutherbagaied |
| %PROGRAMFILES(x86)%\luhuch |
| %PROGRAMFILES(x86)%\lurshgerns |
| %PROGRAMFILES(x86)%\lwuward |
| %PROGRAMFILES(x86)%\magdom |
| %PROGRAMFILES(x86)%\mehition |
| %PROGRAMFILES(x86)%\meqoshvurery |
| %PROGRAMFILES(x86)%\mertoghtzehige |
| %PROGRAMFILES(x86)%\mevaentcoijely |
| %PROGRAMFILES(x86)%\mijerwardplemese |
| %PROGRAMFILES(x86)%\miqoshzesetion |
| %PROGRAMFILES(x86)%\miwertainckerpsp |
| %PROGRAMFILES(x86)%\mizotycernery |
| %PROGRAMFILES(x86)%\mokagecerpuly |
| %PROGRAMFILES(x86)%\muziiedsvosh |
| %PROGRAMFILES(x86)%\naerentprefos |
| %PROGRAMFILES(x86)%\nasitain |
| %PROGRAMFILES(x86)%\negerle |
| %PROGRAMFILES(x86)%\negoent |
| %PROGRAMFILES(x86)%\nelithetay |
| %PROGRAMFILES(x86)%\nerrachghefeing |
| %PROGRAMFILES(x86)%\nerwughlleried |
| %PROGRAMFILES(x86)%\newughikeing |
| %PROGRAMFILES(x86)%\nilchtherjerent |
| %PROGRAMFILES(x86)%\nimkdejersp |
| %PROGRAMFILES(x86)%\nitish |
| %PROGRAMFILES(x86)%\niwerdavitain |
| %PROGRAMFILES(x86)%\noferkgrorerk |
| %PROGRAMFILES(x86)%\nofoiedanasition |
| %PROGRAMFILES(x86)%\nulchsezas |
| %PROGRAMFILES(x86)%\nvather |
| %PROGRAMFILES(x86)%\pciphtheviry |
| %PROGRAMFILES(x86)%\pedittawese |
| %PROGRAMFILES(x86)%\pekusy |
| %PROGRAMFILES(x86)%\peloch |
| %PROGRAMFILES(x86)%\peroty |
| %PROGRAMFILES(x86)%\phaderplemaing |
| %PROGRAMFILES(x86)%\phagiselipege |
| %PROGRAMFILES(x86)%\phagoge |
| %PROGRAMFILES(x86)%\phapergeatjaied |
| %PROGRAMFILES(x86)%\pharudom |
| %PROGRAMFILES(x86)%\phediktebaght |
| %PROGRAMFILES(x86)%\pheption |
| %PROGRAMFILES(x86)%\pherluied |
| %PROGRAMFILES(x86)%\pherlutherprudit |
| %PROGRAMFILES(x86)%\phertuph |
| %PROGRAMFILES(x86)%\pherzok |
| %PROGRAMFILES(x86)%\philughgrukis |
| %PROGRAMFILES(x86)%\phudikthwisy |
| %PROGRAMFILES(x86)%\phuige |
| %PROGRAMFILES(x86)%\phuquk |
| %PROGRAMFILES(x86)%\phviingstaledom |
| %PROGRAMFILES(x86)%\pirering |
| %PROGRAMFILES(x86)%\pizery |
| %PROGRAMFILES(x86)%\placutherghulers |
| %PROGRAMFILES(x86)%\platergh |
| %PROGRAMFILES(x86)%\platety |
| %PROGRAMFILES(x86)%\plberied |
| %PROGRAMFILES(x86)%\plebuckwuwury |
| %PROGRAMFILES(x86)%\plelage |
| %PROGRAMFILES(x86)%\plercitzumet |
| %PROGRAMFILES(x86)%\plibedom |
| %PROGRAMFILES(x86)%\plizoy |
| %PROGRAMFILES(x86)%\plokoy |
| %PROGRAMFILES(x86)%\pluteward |
| %PROGRAMFILES(x86)%\poaentdermuch |
| %PROGRAMFILES(x86)%\preguckuech |
| %PROGRAMFILES(x86)%\prergasp |
| %PROGRAMFILES(x86)%\prerqiwarddacertain |
| %PROGRAMFILES(x86)%\prerus |
| %PROGRAMFILES(x86)%\prifuly |
| %PROGRAMFILES(x86)%\pripiieddocch |
| %PROGRAMFILES(x86)%\prissy |
| %PROGRAMFILES(x86)%\prjoentmerdery |
| %PROGRAMFILES(x86)%\prlusterkogh |
| %PROGRAMFILES(x86)%\projlyanubay |
| %PROGRAMFILES(x86)%\prunaplatuph |
| %PROGRAMFILES(x86)%\prusash |
| %PROGRAMFILES(x86)%\prutuy |
| %PROGRAMFILES(x86)%\pubight |
| %PROGRAMFILES(x86)%\qalolefaqent |
| %PROGRAMFILES(x86)%\qeqotion |
| %PROGRAMFILES(x86)%\qerhawardkiztion |
| %PROGRAMFILES(x86)%\qerzise |
| %PROGRAMFILES(x86)%\qitech |
| %PROGRAMFILES(x86)%\qivethercoqerly |
| %PROGRAMFILES(x86)%\qnuhegach |
| %PROGRAMFILES(x86)%\razoward |
| %PROGRAMFILES(x86)%\reasetyulesp |
| %PROGRAMFILES(x86)%\reawerghtraserph |
| %PROGRAMFILES(x86)%\rebergeclarodom |
| %PROGRAMFILES(x86)%\reerwerghtsergale |
| %PROGRAMFILES(x86)%\referkzabak |
| %PROGRAMFILES(x86)%\reilechjpu |
| %PROGRAMFILES(x86)%\reiwaghgherfile |
| %PROGRAMFILES(x86)%\remerspwaqing |
| %PROGRAMFILES(x86)%\reocight |
| %PROGRAMFILES(x86)%\reoientrusoge |
| %PROGRAMFILES(x86)%\reonosptewoy |
| %PROGRAMFILES(x86)%\reosetherprutaent |
| %PROGRAMFILES(x86)%\reowtainvesck |
| %PROGRAMFILES(x86)%\reratqatudom |
| %PROGRAMFILES(x86)%\rerkuy |
| %PROGRAMFILES(x86)%\rersse |
| %PROGRAMFILES(x86)%\reurusptujos |
| %PROGRAMFILES(x86)%\reuses |
| %PROGRAMFILES(x86)%\riferpy |
| %PROGRAMFILES(x86)%\rilethercheduied |
| %PROGRAMFILES(x86)%\ripitsjile |
| %PROGRAMFILES(x86)%\rjatain |
| %PROGRAMFILES(x86)%\rokaphdruzitain |
| %PROGRAMFILES(x86)%\rolugh |
| %PROGRAMFILES(x86)%\rosatain |
| %PROGRAMFILES(x86)%\sagerspkawege |
| %PROGRAMFILES(x86)%\saquterpward |
| %PROGRAMFILES(x86)%\serhesy |
| %PROGRAMFILES(x86)%\sewasemhient |
| %PROGRAMFILES(x86)%\shapoly |
| %PROGRAMFILES(x86)%\shbseverqersp |
| %PROGRAMFILES(x86)%\shekicult |
| %PROGRAMFILES(x86)%\shepashkuderward |
| %PROGRAMFILES(x86)%\shetighaterbent |
| %PROGRAMFILES(x86)%\shijerghnuguch |
| %PROGRAMFILES(x86)%\shntherquhither |
| %PROGRAMFILES(x86)%\shoccult |
| %PROGRAMFILES(x86)%\shodisyqrugh |
| %PROGRAMFILES(x86)%\shomephclezeried |
| %PROGRAMFILES(x86)%\shorush |
| %PROGRAMFILES(x86)%\shumaing |
| %PROGRAMFILES(x86)%\shuqitainstazegh |
| %PROGRAMFILES(x86)%\shurerphraterward |
| %PROGRAMFILES(x86)%\sokeing |
| %PROGRAMFILES(x86)%\stiduy |
| %PROGRAMFILES(x86)%\stumogeqebut |
| %PROGRAMFILES(x86)%\thaberchnaey |
| %PROGRAMFILES(x86)%\therhisy |
| %PROGRAMFILES(x86)%\toliingcluverph |
| %PROGRAMFILES(x86)%\tukerty |
| %PROGRAMFILES(x86)%\tukoentvegsh |
| %PROGRAMFILES(x86)%\valoryatusation |
| %PROGRAMFILES(x86)%\vastyatedeing |
| %PROGRAMFILES(x86)%\vehotherdreguty |
| %PROGRAMFILES(x86)%\vervghtprerqercult |
| %PROGRAMFILES(x86)%\vieshhubule |
| %PROGRAMFILES(x86)%\vndomkivory |
| %PROGRAMFILES(x86)%\voboght |
URLs
Elex Hijacker may call the following URLs:
| fgldnknlljnfcfgchdijbjmmkdkmnabn |
Analysis Report
General information
| Family Name: | Elex Hijacker |
|---|---|
| Signature status: | Self Signed |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
75eea2c64d18315c1594b8dcff08af8c
SHA1:
764fa4baa8bdacd87c00c22979e60b1716930fd3
SHA256:
9E9689F259E2537A021D55895B4FCF015ADB1F8D9BD19E81968FB1F6A5817957
File Size:
309.13 KB, 309128 bytes
|
|
MD5:
462bcabe6467d6d7b6ca91fe00249810
SHA1:
186e4eebb66f1f6a875b4419573f3822060c031e
SHA256:
7FEED78302B3A6D5A3CBF4ADDE042F6AF6F46E3793793D3DDF9A822786A44299
File Size:
1.54 MB, 1536696 bytes
|
|
MD5:
1e90afb2ae9c1b3860cc24a68dd54904
SHA1:
bb5dae47380c6c9d5528c114e15f3bbc1af1021d
SHA256:
19A40AE684A1B6548BAA5758D309625BA6FD211DF18EEE59D5F5BF9041E3C241
File Size:
770.22 KB, 770224 bytes
|
|
MD5:
382affca0b18c88e11092ef6ca189b95
SHA1:
8256d809ab0d8eeebca5a5ae156ef9900573eca8
SHA256:
664FB20556BC4775A31C13718AF0FBA3EB1B9FF7ABB7F791C364B9A3E89AA520
File Size:
1.50 MB, 1498552 bytes
|
|
MD5:
ad6b6f53490746c3c62f3d3f176300d5
SHA1:
395c116d7cf1f2fd70d42a67dc8621e424ea4b4a
SHA256:
F3F01E19C6B98289D63BD30C5CEB6DA775F00EA385417FA6755545D8F41F20B6
File Size:
671.33 KB, 671328 bytes
|
Show More
|
MD5:
ad6f38048314b3a1316c114ae8b8c480
SHA1:
c937732ab7957c90cfc0f51aa62615429dcf4d51
SHA256:
3C7F766442DD72324ACC88E7DEF3DB48CF023F8E0DE1DDFAE91B591C28FC03E3
File Size:
302.91 KB, 302912 bytes
|
|
MD5:
9a61a82224f10e8bc144a681186d2921
SHA1:
4507dac70c5ccea0be4f838ec448a5558003968d
SHA256:
BFC02B669EBCF359257F0D923152AF97DAE118C39E19446A70CF4EA5074A67E7
File Size:
903.03 KB, 903032 bytes
|
|
MD5:
06a5be47c95c0831d5e477a2ffad444e
SHA1:
c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83
SHA256:
9B6C082BB8D225C97EFB1E87D514283B56B427D966476D01A38FC160C9B20209
File Size:
646.33 KB, 646328 bytes
|
|
MD5:
03f8be4e6503f7ce0c7c87f79ba6c57b
SHA1:
be8f6c434c32907e537fdd537c288efce8eca842
SHA256:
1812F1FCB1F3860B1064C335C1764CBB60CD36C3C4D019F4AF90796D1A61E418
File Size:
473.94 KB, 473944 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File has exports table
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | PANDA Viewer installer |
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Li Mo | DigiCert Assured ID Code Signing CA-1 | Self Signed |
| Xiaoqing Liu | DigiCert Assured ID Code Signing CA-1 | Self Signed |
| Shulan Hou | DigiCert SHA2 Assured ID Code Signing CA | Self Signed |
| Shenzhen Zhongxiao Trading Co.,Ltd. | GlobalSign | Root Not Trusted |
| Hefei Zhimingxingtong Software&Technology Co., Ltd. | GlobalSign CodeSigning CA - G2 | Self Signed |
Show More
| Minidigital Technology Co., Limited | GlobalSign CodeSigning CA - G2 | Self Signed |
| Beijing ELEX Technology Co.,Ltd | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Yang Liwei | WoSign Class 2 Code Signing CA | Self Signed |
| Lei Rong | thawte SHA256 Code Signing CA | Self Signed |
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Elex.J
- Elex.M
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\1287765\1287765.zipdir\mainlog\c89ec4ab61ff6286acd8e8e5d16b3f52917f2f83_000064_2025-12-19[20-34-50-586].log | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\xldownload.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7e82590c-48c6-48bd-9dbb-bdcc68c3cbb8[i]\zlib1.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd4b.tmp\res.7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstd517.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\pandaviewer\libdui.dll | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewerinstaller.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\pandaviewerserviceup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\thumbnail.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\pandaviewer\uninstall.exe | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꖙ촉童ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Other Suspicious |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Syscall Use |
Show More
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Xrdjitfi\AppData\Local\Temp\PandaViewer\PandaViewerinstaller.exe"
|
"C:\Users\Jeirhhui\AppData\Local\Temp\nslBD4B.tmp\7za.exe" e res.7z -ppswd00 -o.\ -aoa
|