The domain download.pcbooster.com is registered by proxy through ENOM, INC. and was originally registered in December of 2003. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Ashburn, Virginia within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Cloudfront CDN service which utilizes a number of proxy IP Addresses (see below).
Registrant:
WHOISGUARD, INC.
Server location:
Virginia, United States (US)
Create date:
Tuesday, December 16, 2003
Expires date:
Saturday, December 16, 2017
Updated date:
Saturday, April 11, 2015
ASN:
AS16509 AMAZON-02 - Amazon.com, Inc.,US
Scanner detections:
Detections (96% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Optional.Installer.O, PUP.Optional.Installer.P, PUP.Optional.Installer.Q, Threat.Installer.EnergizerSoftechPvt, Win32.Generic.EnergizerSoftechPvt.Meta, Optional.BoostMyPC.SpeedbitTechnology.Installer.Meta (L), Win32.Generic.EnergizerSoftechPvt.Installer.Meta, PUP.Optional.SlimwareUtilitiesHoldings.Installer, PUP.PCBooster.Installer.Meta (L), PUP.PCBooster (L)
91.49%
Dr.Web
Program.Unwanted.62, infected with Trojan.DownLoader11.45558, Threat.Undefined, infected with Trojan.Winlock.11885, Detection.Undefined
40.43%
ESET NOD32
MSIL/MyPCBackup.B potentially unwanted application, Detection.Undefined
40.43%
Sophos
PUA 'Energizer Softech Installer' (of type Adware), Generic PUA KG, Energizer Softech Installer (PUA)
27.66%
Trend Micro House Call
TROJ_GEN.F47V0805, TROJ_GEN.F47V0601, Suspicious_GEN.F47V0914, TROJ_GEN.F47V1213, Suspicious_GEN.F47V1211, Suspicious_GEN.F47V0124, TROJ_GEN.F47V0909, Suspicious_GEN.F47V1204, Suspicious_GEN.F47V0414
23.40%
ESET NOD32
Win32/MyPCBackup, Win32/MyPCBackup.C potentially unwanted, MSIL/MyPCBackup
21.28%
McAfee
Artemis!FC59E655B27C, Artemis!FE291C11947C, Artemis!1715EA715159, Artemis!6D0CF2F01F5C, Artemis!3D7AC77F134D, Artemis!9EA2D62964A7
19.15%
Avira AntiVirus
Adware/MyPCBackup.5072640, Adware/MyPCBackup.5075240, W32/Parite, TR/Dropper.Gen, W32/Ramnit.C
10.64%
Kaspersky
not-a-virus:RiskTool.Win32.MyPCBackup
6.38%
Bkav FE
W32.HfsAdware
6.38%
K7 AntiVirus
Unwanted-Program , Trojan
4.26%
Baidu Antivirus
PUA.MSIL.MyPCBackup
4.26%
VIPRE Antivirus
Trojan.Win32.Generic
4.26%
avast!
Win32:Malware-gen
4.26%
The domain download.pcbooster.com has been seen to resolve to the following 25 IP addresses.
server-54-230-50-5.jfk5.r.cloudfront.net
June 26, 2014
server-54-230-50-14.jfk5.r.cloudfront.net
June 26, 2014
server-54-230-49-154.jfk5.r.cloudfront.net
June 26, 2014
server-54-230-49-167.jfk5.r.cloudfront.net
June 26, 2014
server-205-251-251-165.jfk5.r.cloudfront.net
June 26, 2014
server-205-251-251-103.jfk5.r.cloudfront.net
June 26, 2014
server-54-230-48-33.jfk5.r.cloudfront.net
June 26, 2014
server-205-251-251-73.jfk5.r.cloudfront.net
June 26, 2014
server-54-230-39-215.jfk1.r.cloudfront.net
April 20, 2014
server-54-230-38-128.jfk1.r.cloudfront.net
April 20, 2014
server-54-230-39-39.jfk1.r.cloudfront.net
April 20, 2014
server-54-230-38-3.jfk1.r.cloudfront.net
April 20, 2014
server-204-246-169-6.jfk1.r.cloudfront.net
April 20, 2014
server-204-246-169-253.jfk1.r.cloudfront.net
April 20, 2014
server-54-230-38-184.jfk1.r.cloudfront.net
April 20, 2014
server-54-230-38-205.jfk1.r.cloudfront.net
April 20, 2014
File downloads found at URLs served by download.pcbooster.com.
The following 3 files have been seen to comunicate with download.pcbooster.com in live environments.
URL:
http://download.pcbooster.com/
Network:
Amazon Cloudfront
SSL certificate subject:
CN=ssl321218.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
SSL certificate issuer:
CN=COMODO RSA Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Web server:
cloudflare-nginx