Home Malware Programs Downloaders Downloader.Liftoh


Posted: May 10, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 234
First Seen: May 10, 2013
Last Seen: February 21, 2023
OS(es) Affected: Windows

Downloader.Liftoh is a Trojan downloader that downloads other malware threats onto the infected computer. When executed, Downloader.Liftoh copies itself to the certain location. Downloader.Liftoh creates the registry entry so that it can run automatically every time Windows is started. Downloader.Liftoh includes an inserted DLL file which is unpacked into memory. The DLL file can download and execute payloads or insert them into existing processes. Downloader.Liftoh downloads and executes potentially malicious files from the certain domains.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Downloader.Liftoh may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner*

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

%UserProfile%\Application Data\[RANDOM LETTERS].exe File name: %UserProfile%\Application Data\[RANDOM LETTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%WINDIR%\Temp\Networks\taskmgr.exeHKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\[RANDOM LETTERS]\"CurrentPath111" "%WorkingDirectory%\%SampleName%"

Additional Information

The following directories were created: