Loioir Description

Type: Possibly Unwanted Program

The Loioir malware is a Trojan that is designed to carry out Distributed-Denial-of-Service attacks on computer networks and servers that have access to the Internet via a public Web portal. The Loioir Trojan is similar to Orbyddos, BlackRev, and Orbiter, and can be operated remotely. The Loioir malware may be spread among users by using Trojan-Downloaders such as Winpud and Bartallex and exploit kits such as Sweet Orange. The Loioir Trojan is not programmed to collect information and is not a threat to your sensitive data, but Loioir may hijack most of your system resources and Internet traffic to execute its operations. The Loioir Trojan may be registered as a network adapter on infected systems, decrease your computer performance, and diminish your download and upload speed. The Loioir Trojan is known to use the names of popular PC games to hide its executable in the AppData folder and remain undetected.

Security scanners may detect the Loioir malware as DDoS:MSIL/Loioir and Trojan.MSIL.Loior. The Loioir Trojan may use a shadow instance of your default Internet client to launch a DDoS attack and download instructions from its 'Command and Control' server. The operators of the Loioir malware may use their botnet to earn money by offering DDoS attack on demand and bring down the servers of small businesses and large corporations alike. The Loioir malware is a modern day cyber threat that should not be underestimated. The Loioir botnet has the potential to keep targeted servers offline for as long as a month, and that may cost millions to international companies. As stated above, the Loioir malware may be registered as a network adapter and may feature an outdated digital certificate, which might help system administrators to find its main executable. Computer users that are infected with the Loioir malware should install a renowned anti-malware suite that can handle the removal of the Loioir Trojan for them.

Technical Information

File System Details

Loioir creates the following file(s):
# File Name MD5 Detection Count
1 Swift_PC_Optimizer_13.exe 3a9b746086c89e8808ea7406d7c977ee 3
2 %APPDATA%\lolclient\local store\cache.exe N/A
3 %TEMP%\genx5.exe N/A
4 \dgdgdsggd.exe N/A
5 Cb2rJvGOx3V6nsqxTBvJppp N/A
6 Cb2rJvGOx3V6nsqxTBvJ N/A

Registry Details

Loioir creates the following registry entry or registry entries:
Registry key
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\SwiftPCOptimizer
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\SwiftPCOptimizer_Start
Regexp file mask
%WINDIR%\System32\Tasks\SwiftPCOptimizer[RANDOM CHARACTERS]
%PROGRAMFILES%\Swift PC Optimizer
%PROGRAMFILES(x86)%\Swift PC Optimizer

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.