Home Malware Programs Potentially Unwanted Programs (PUPs) Booster.exe CPU Miner

Booster.exe CPU Miner

Posted: October 23, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 124
First Seen: October 23, 2017
Last Seen: December 30, 2020
OS(es) Affected: Windows

The Booster.exe CPU Miner or PC Booster miner is a silently mining Trojan, which might be installed and executed automatically. The purpose of this miner is to use a significant portion of the CPU's resources constantly to mine for a digital cryptocurrency. The catch is that everything that the CPU mines will be transferred to a wallet address that belongs to the authors of the Booster.exe CPU Miner. Basically, this means that victims will have their PC's performance degraded to make money for someone else. Clearly, the Booster.exe CPU Miner is an annoying and aggressive application that must be stopped immediately since letting it run on your computer might be accompanied by undesired side effects such as:

  • Degraded system performance.
  • Inability to launch or use software that requires a significant amount of CPU resources.
  • System instability.
  • High CPU temperature which might reduce the component's lifespan.

The Booster.exe CPU Miner might be brought to your computer via a fake download, game crack, software keygen, or another shady piece of software that was probably downloaded from an equally shady website. The advice to readers is to stay away from suspicious digital content and Web destinations since these are the places that are most likely to threaten you with the Booster.exe CPU Miner or more potent cyber threats.

The Booster.exe CPU Miner may disguise itself as 'VsGraphics Desktop' a legitimate process description that Microsoft uses. However, you can recognize the fake process quickly due to the amount of CPU resources it uses – often over 50% of the available ones. The best way to remove the Booster.exe CPU Miner is to use a reputable anti-virus utility since this is the guaranteed way to fully eliminate all of the miner's components.

Technical Details

Registry Modifications

The following newly produced Registry Values are:

File name without pathREAD_IT.district