cp.tuguu.com

Tuguu SLU

Domain Information

The domain cp.tuguu.com registered by Tuguu SLU was initially registered in June of 2008 through SOLUCIONES CORPORATIVAS IP,SLU. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Roubaix, Nord-Pas-De-Calais within France which resides on the RIPE Network Coordination Centre network.
Registrar:
SOLUCIONES CORPORATIVAS IP, SL

Server location:
Nord-Pas-De-Calais, France (FR)

Create date:
Sunday, June 01, 2008

Expires date:
Thursday, June 01, 2023

Updated date:
Monday, June 01, 2015

ASN:
AS16276 OVH OVH Systems

Root domain:

Scanner detections:
Detections  (93% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.TUGUUSL.W, PUP.Awimba.W, PUP.TUGUUSL.X, PUP.Installer.Awimba.R, PUP.Awimba.X, PUP.Tuguu, PUP.Tuguu.Bundler, PUP.Bundler.Awimba, PUP.Tuguu.Awimba.Bundler (M), PUP.Tuguu.Bundler (M), PUP.Tuguu (M)
100.00%

avast!
NSIS:DomaIQ-C [PUP], Win32:DomaIQ-AI [PUP], Win32:PUP-gen [PUP], Win32:DomaIQ-M [PUP], Win32:DomaIQ-I [PUP], Win32:DomaIQ-F [PUP]
89.19%

VIPRE Antivirus
DomaIQ
89.19%

Avira AntiVirus
APPL/DomaIQ.Gen7, APPL/DomalQ.D, PUA/DomaIQ.Gen
89.19%

Sophos
DomainIQ pay-per install, Generic PUA CF, PUA 'DomaIQ pay-per install'
89.19%

ESET NOD32
Win32/DomaIQ, Win32/DomaIQ.C potentially unwanted
89.19%

Malwarebytes
PUP.FakeFlash.Domaiq, Adware.DomaIQ, PUP.Optional.BundleInstaller.A, PUP.FlashPlayer.Domaiq, PUP.DomaIQ
86.49%

Comodo Security
ApplicUnwnt, UnclassifiedMalware, Application.Win32.DolmaIQ.~zq, Application.Win32.DomaIQ.T, Application.Win32.DomaIQ.~A
86.49%

Dr.Web
Adware.W3i.29, Adware.W3i.37, Adware.W3i.28
86.49%

K7 AntiVirus
Trojan , Unwanted-Program , Riskware, Adware
83.78%

K7 Gateway Antivirus
Trojan , Unwanted-Program
81.08%

McAfee
Artemis!657D56BCEF84, Artemis!FBC01F93E69E, Artemis!747157DF0CAD, Artemis!AD7075C10AB8, RDN/Generic PUP.z!dj, Artemis!28EEABA0918A, Artemis!B4CE7026FDB5, Artemis!3363A098371D, Artemis!5437D917A69D, Artemis!76E54EF518C3, Artemis!8A9F19603E8B, Artemis!D95BD3EC15C9, Artemis!0A6A656C5FEC
78.38%

IKARUS anti.virus
AdWare.DomaIQ, APPL, Trojan.SuspectCRC, Trojan-Ransom.Win32.Blocker, Trojan.Win32.Ceatrg, Trojan-Dropper, PUA.DomaIQ, Win32.SuspectCrc
78.38%

Fortinet FortiGate
W32/DomaIQ.I, W32/DomaIQ.C, Adware/DomaIQ, W32/Crypt.AALD!tr, Adware/DomainIQ, W32/DomaIQ.D, W32/Agent.HUUT!tr, Adware/Fam.NB
78.38%

Norman
Obfuscated.gen!r, Suspicious_Gen4.ERZRG
75.68%

The domain cp.tuguu.com has been seen to resolve to the following IP address.

January 31, 2014

File downloads found at URLs served by cp.tuguu.com.

 
Latest 30 of 416 download URLs

URL:
http://cp.tuguu.com/

Web server:
Apache