cp.tuguu.com

Tuguu SLU

Domain Information

The domain cp.tuguu.com registered by Tuguu SLU was initially registered in June of 2008 through SOLUCIONES CORPORATIVAS IP,SLU. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Roubaix, Nord-Pas-De-Calais within France which resides on the RIPE Network Coordination Centre network.
Remove Malware from cp.tuguu.com - Powered by Reason Core Security
Registrar:
SOLUCIONES CORPORATIVAS IP, SL

Server location:
Nord-Pas-De-Calais, France (FR)

Create date:
Sunday, June 01, 2008

Expires date:
Thursday, June 01, 2023

Updated date:
Monday, June 01, 2015

ASN:
AS16276 OVH OVH Systems

Root domain:

Scanner detections:
Detections  (88% detected)

Scan engine
Details
Detections

avast!
NSIS:DomaIQ-C [PUP], Win32:DomaIQ-AI [PUP], Win32:PUP-gen [PUP], Win32:DomaIQ-M [PUP], Win32:DomaIQ-I [PUP]
100.00%

Sophos
Generic PUA CF, DomainIQ pay-per install
100.00%

VIPRE Antivirus
DomaIQ
100.00%

Avira AntiVirus
APPL/DomaIQ.Gen, APPL/DomaIQ.Gen7, APPL/DomaIQ.454000, APPL/DomalQ.D
100.00%

Reason Heuristics
PUP.TUGUUSL.X, PUP.Awimba.W, PUP.TUGUUSL.W, PUP.Installer.Awimba.R, PUP.Awimba.X, PUP.Installer.TuguuSL.R, PUP.Tuguu, PUP.Tuguu.Bundler, PUP.Tuguu.Bundler (M)
100.00%

Malwarebytes
PUP.FakeFlash.Domaiq, Adware.DomaIQ, PUP.Optional.BundleInstaller.A, PUP.FlashPlayer.Domaiq
100.00%

Comodo Security
Application.Win32.DomaIQ.~qk, ApplicUnwnt, UnclassifiedMalware, Application.Win32.DomaIQ.T, Application.Win32.Downloader.Agent.WA
100.00%

ESET NOD32
Win32/DomaIQ
100.00%

Dr.Web
Adware.W3i.29, Adware.W3i.37, Adware.W3i.28
96.55%

Fortinet FortiGate
W32/Crypt.AALD!tr, W32/DomaIQ.C, W32/DomaIQ.I, Adware/DomaIQ, Riskware/DomaIQ.C!tr, W32/DomaIQ.D, W32/Agent.HUUT!tr
96.55%

IKARUS anti.virus
AdWare.DomaIQ, Win32.SuspectCrc, Trojan-Dropper, APPL, Trojan-Ransom.Win32.Blocker, Trojan.Win32.Ceatrg, AdWare.Win32.InstallIQ
93.10%

McAfee
Artemis!6CB0CF92BC81, Artemis!DF5D68BF1F9D, Artemis!F59175B24213, Artemis!657D56BCEF84, Artemis!747157DF0CAD, Artemis!19C2A66A893E, Artemis!B4CE7026FDB5, Artemis!055FEE8816E0, Artemis!3363A098371D, Artemis!8081A62A8030, Artemis!5437D917A69D, Artemis!C2E09F9C9792, Artemis!0655343DE61B, Artemis!57AB8883A7BD, Artemis!76E54EF518C3, Artemis!AC6761AD0568, Artemis!8A9F19603E8B, Artemis!A98D22869CDC
89.66%

K7 Gateway Antivirus
Trojan , Riskware
86.21%

K7 AntiVirus
Trojan , Unwanted-Program , Riskware, Adware
86.21%

McAfee Web Gateway
Artemis!6CB0CF92BC81, Heuristic.BehavesLike.Win32.Suspicious-PKR.G, Artemis!F59175B24213, Artemis!657D56BCEF84, Artemis!747157DF0CAD, BehavesLike.Win32.PWSZbot.mh
86.21%

The domain cp.tuguu.com has been seen to resolve to the following IP address.

January 31, 2014

File downloads found at URLs served by cp.tuguu.com.

17 / 68    (Adware)

1 / 68      (Adware)

 
Latest 30 of 333 download URLs

Remove Malware from cp.tuguu.com - Powered by Reason Core Security