download.majorshare.com

Major Share

Domain Information

The domain download.majorshare.com registered by Major Share was initially registered in July of 2007 through NAME.COM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Scottsdale, Arizona within the United States which resides on the GoDaddy.com, LLC network.
Remove Malware from download.majorshare.com - Powered by Reason Core Security
Registrar:
NAME.COM, INC.

Server location:
Arizona, United States (US)

Create date:
Saturday, July 07, 2007

Expires date:
Thursday, July 07, 2016

Updated date:
Tuesday, June 16, 2015

ASN:
AS26496 AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC

Root domain:

Scanner detections:
Detections  (71% detected)

Scan engine
Details
Detections

ESET NOD32
Win32/Somoto, Win32/Somoto.E potentially unwanted
76.47%

Trend Micro House Call
TROJ_GEN.F47V1208, Suspicious_GEN.F47V0617, TROJ_GEN.R0CBC0OGF14, Suspicious_GEN.F47V0817, TROJ_GEN.R02PC0OJ214, TROJ_GEN.R021H05KQ14, Suspicious_GEN.F47V1201, Suspicious_GEN.F47V0123
52.94%

McAfee
Artemis!AA30CCF5D549, Artemis!FF4AFDD94F59, RDN/Generic.dx!dcn, Artemis!D867F8E16F41, Artemis!AB1CA49257E4, Artemis!103C2E8BE9C5, Artemis!9A5356779F2B, Artemis!ACAE313E5FB7, Artemis!8FDDFC8884D0
52.94%

Fortinet FortiGate
Riskware/Somoto
52.94%

McAfee Web Gateway
Artemis!AA30CCF5D549, Artemis!FF4AFDD94F59, RDN/Generic.dx!dcn, BehavesLike.Win32.Trojan.tc, BehavesLike.Win32.CryptInno.tc
47.06%

Baidu Antivirus
Adware.Win32.Somoto
41.18%

VIPRE Antivirus
Trojan.Win32.Generic, PUA.Win32.Somoto.gen (not malicious)
35.29%

Sophos
Mal/Generic-S, Generic PUA FD, Generic PUA PL, Generic PUA DI
23.53%

Dr.Web
Adware.Eorezo.48, Adware.Eorezo.211, Adware.Eorezo.212
17.65%

K7 Gateway Antivirus
Trojan , Adware
17.65%

K7 AntiVirus
Trojan , Adware
17.65%

Trend Micro
TROJ_GEN.R0CBC0OGF14, TROJ_GEN.R02PC0OJ214
11.76%

Kaspersky
not-a-virus:Downloader.Win32.AdLoad
11.76%

ESET NOD32
Win32/Somoto.E potentially unwanted application, Detection.Undefined
11.76%

Reason Heuristics
PUP.Somoto.GurkanDilmen.Installer (M)
11.76%

The domain download.majorshare.com has been seen to resolve to the following 2 IP addresses.

December 1, 2014

ip-50-63-157-6.ip.secureserver.net
March 15, 2014

File downloads found at URLs served by download.majorshare.com.

7 / 68      (PUP)

1 / 68      (PUP)

3 / 68      (inconclusive)

1 / 68      (inconclusive)

2 / 68

10 / 68    (PUP)

10 / 68    (PUP)
http://download.majorshare.com/.../setup-dvd.exe  (ab1ca49257e4e414ec3d877d3122e94c)

1 / 68      (inconclusive)

5 / 68      (PUP)
http://download.majorshare.com/.../setup-dvd.exe  (direct youtube downloader 2.exe)

5 / 68      (PUP)

4 / 68      (PUP)

13 / 68    (PUP)

10 / 68    (Malware)
http://download.majorshare.com/.../setup-remove-ads.exe  (49981926ce0e6cc850ad87e619ff8c79)

3 / 68      (Malware)
http://download.majorshare.com/.../setup-dvd.exe  (183e9413a1e1e646bfec387bf4f9cc05)

7 / 68      (PUP)
http://download.majorshare.com/.../setup-dvd.exe  (ff4afdd94f594174624f3f9d811f536b)

3 / 68      (inconclusive)

3 / 68      (inconclusive)

URL:
http://download.majorshare.com/

Web server:
nginx/1.8.1

Remove Malware from download.majorshare.com - Powered by Reason Core Security