download.pcbooster.com

WHOISGUARD, INC.  (Proxy Registrant)

Domain Information

The domain download.pcbooster.com is registered by proxy through ENOM, INC. and was originally registered in December of 2003. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Ashburn, Virginia within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Cloudfront CDN service which utilizes a number of proxy IP Addresses (see below).
Registrar:
ENOM, INC.

Server location:
Virginia, United States (US)

Create date:
Tuesday, December 16, 2003

Expires date:
Saturday, December 16, 2017

Updated date:
Saturday, April 11, 2015

ASN:
AS16509 AMAZON-02 - Amazon.com, Inc.,US

Root domain:

Scanner detections:
Detections  (96% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Optional.Installer.O, PUP.Optional.Installer.P, PUP.Optional.Installer.Q, Threat.Installer.EnergizerSoftechPvt, Win32.Generic.EnergizerSoftechPvt.Meta, Optional.BoostMyPC.SpeedbitTechnology.Installer.Meta (L), Win32.Generic.EnergizerSoftechPvt.Installer.Meta, PUP.Optional.SlimwareUtilitiesHoldings.Installer, PUP.PCBooster.Installer.Meta (L), PUP.PCBooster (L)
91.49%

Dr.Web
Program.Unwanted.62, infected with Trojan.DownLoader11.45558, Threat.Undefined, infected with Trojan.Winlock.11885, Detection.Undefined
40.43%

ESET NOD32
MSIL/MyPCBackup.B potentially unwanted application, Detection.Undefined
40.43%

Sophos
PUA 'Energizer Softech Installer' (of type Adware), Generic PUA KG, Energizer Softech Installer (PUA)
27.66%

Trend Micro House Call
TROJ_GEN.F47V0805, TROJ_GEN.F47V0601, Suspicious_GEN.F47V0914, TROJ_GEN.F47V1213, Suspicious_GEN.F47V1211, Suspicious_GEN.F47V0124, TROJ_GEN.F47V0909, Suspicious_GEN.F47V1204, Suspicious_GEN.F47V0414
23.40%

ESET NOD32
Win32/MyPCBackup, Win32/MyPCBackup.C potentially unwanted, MSIL/MyPCBackup
21.28%

McAfee
Artemis!FC59E655B27C, Artemis!FE291C11947C, Artemis!1715EA715159, Artemis!6D0CF2F01F5C, Artemis!3D7AC77F134D, Artemis!9EA2D62964A7
19.15%

Avira AntiVirus
Adware/MyPCBackup.5072640, Adware/MyPCBackup.5075240, W32/Parite, TR/Dropper.Gen, W32/Ramnit.C
10.64%

AVG
Generic
8.51%

Kaspersky
not-a-virus:RiskTool.Win32.MyPCBackup
6.38%

Bkav FE
W32.HfsAdware
6.38%

K7 AntiVirus
Unwanted-Program , Trojan
4.26%

Baidu Antivirus
PUA.MSIL.MyPCBackup
4.26%

VIPRE Antivirus
Trojan.Win32.Generic
4.26%

avast!
Win32:Malware-gen
4.26%

The domain download.pcbooster.com has been seen to resolve to the following 25 IP addresses.

September 15, 2016

September 15, 2016

November 12, 2015

November 12, 2015

August 12, 2014

August 12, 2014

August 12, 2014

August 12, 2014

August 12, 2014

server-54-230-50-5.jfk5.r.cloudfront.net
June 26, 2014

server-54-230-50-14.jfk5.r.cloudfront.net
June 26, 2014

server-54-230-49-154.jfk5.r.cloudfront.net
June 26, 2014

server-54-230-49-167.jfk5.r.cloudfront.net
June 26, 2014

server-205-251-251-165.jfk5.r.cloudfront.net
June 26, 2014

server-205-251-251-103.jfk5.r.cloudfront.net
June 26, 2014

server-54-230-48-33.jfk5.r.cloudfront.net
June 26, 2014

server-205-251-251-73.jfk5.r.cloudfront.net
June 26, 2014

server-54-230-39-215.jfk1.r.cloudfront.net
April 20, 2014

server-54-230-38-128.jfk1.r.cloudfront.net
April 20, 2014

server-54-230-39-39.jfk1.r.cloudfront.net
April 20, 2014

server-54-230-38-3.jfk1.r.cloudfront.net
April 20, 2014

server-204-246-169-6.jfk1.r.cloudfront.net
April 20, 2014

server-204-246-169-253.jfk1.r.cloudfront.net
April 20, 2014

server-54-230-38-184.jfk1.r.cloudfront.net
April 20, 2014

server-54-230-38-205.jfk1.r.cloudfront.net
April 20, 2014

File downloads found at URLs served by download.pcbooster.com.

1 / 68      (PUP)
http://download.pcbooster.com/2014/.../PCBoosterSetup.exe  (8ec03f5f76bea1eff1c76bd44d8a6641)

1 / 68      (PUP)
http://download.pcbooster.com/.../PCBoosterSetup.exe  (8cf19cbef0ca1603fbf54d2d790170bd)

4 / 68      (PUP)
http://download.pcbooster.com/2015/.../PCBoosterSetup.exe  (adc4891c69c82af55e1b3b179e215584)

2 / 68      (PUP)
http://download.pcbooster.com/.../PCBoosterSetup1.exe  (15cdb0dbab95789ec75725764a522ee3)

1 / 68      (PUP)
http://download.pcbooster.com/2014/.../PCBoosterSetup.exe  (3acd4130c3ded9e68b0c97f319a02025)

7 / 68      (PUP)
http://download.pcbooster.com/2015/.../PCBoosterSetup.exe  (e973c4a473f4f09673f31d2aa225ddf7)

5 / 68      (PUP)
http://download.pcbooster.com/2014/.../PCBoosterSetup.exe  (836203ad012806a9c7b757b70cf47639)

1 / 68      (PUP)
http://download.pcbooster.com/2015/.../PCBoosterSetup.exe  (638c22b5ede9f7c7c471c4fb5e04cfc5)

4 / 68      (PUP)
http://download.pcbooster.com/2014/.../PCBoosterSetup.exe  (9a096542c35475bbf10c8774ff50f7f9)

0 / 68
http://download.pcbooster.com/PCBoosterSetupSE1.exe  (c66886505231a1276f9718fcc1929e37)

3 / 68      (PUP)

5 / 68      (PUP)
http://download.pcbooster.com/GameBoosterSetup.exe  (fe291c11947ceec77dd9980c97286f96)

8 / 68      (PUP)
http://download.pcbooster.com/2014/.../PCBoosterSetup.exe  (fc59e655b27c0ed4ddf3a010be292745)

The following 3 files have been seen to comunicate with download.pcbooster.com in live environments.

URL:
http://download.pcbooster.com/

Network:
Amazon Cloudfront

SSL certificate subject:
CN=ssl321218.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO RSA Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
cloudflare-nginx