TNT2User.exe

eShield

This is a component of the Tightrope WebInstall, a setup program that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by eShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is the uninstaller utility registered in the Windows Control Panel for the program eShield Browser Security by eShield. This file is typically installed with the program eShield Browser Security by Search.us.com which is a potentially unwanted software program.
Publisher:
eShield  (signed and verified)

Version:
2.0.0.2065

MD5:
bd2c2006a7eb6e430b175b9489d40d10

SHA-1:
16ebd768ee467721738a2dd9045a5eabd9525810

SHA-256:
f5e1bfdee32d2ba8fa27b55083e27352a4ca23e5035d3b479bc54afeb611fa39

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/26/2024 4:13:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Tightrope.eShield (M)
16.3.18.6

File size:
651.2 KB (666,832 bytes)

Product version:
2.0.0.2065

Copyright:
© Eshield All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\tnt2\2.0.0.2065\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/21/2014 7:00:00 PM

Valid to:
7/21/2017 6:59:59 PM

Subject:
CN=eShield, O=eShield, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3FB390EC6E5B675E625C0B342989627A

File PE Metadata
Compilation timestamp:
3/15/2016 10:23:59 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:NdvymkUwxJQM4gzyNE7Fmg32xQQqYDbujJwxqNbC9MRrJWrLFaPwD:vC4pG5dmxwsbCiA4qgPAPwD

Entry address:
0x418E0

Entry point:
E8, 7F, A5, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 3C, 0B, 47, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 68, 64, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 8D, 85, E4, FC, FF, FF, 6A, 4C, 6A, 00, 50, E8, 5C, D9, FF, FF, 8D, 85, E0, FC, FF, FF, 83, C4, 0C, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.5523

Code size:
341 KB (349,184 bytes)

Program Uninstaller
Program name:
eShield Browser Security

Display publisher:
eShield

Uninstall string:
"C:\users\{user}\appdata\local\tnt2\2.0.0.2065\tnt2user.exe" \uninstall partner=11579


The file TNT2User.exe has been discovered within the following program.

eShield Browser Security  by Search.us.com
This toolbar will install a Search.us.com web browser home page and search page hijacker.
64% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to ns1.ibspark.com  (54.72.130.67:80)

TCP (HTTP):
Connects to a92-123-180-194.deploy.akamaitechnologies.com  (92.123.180.194:80)

TCP (HTTP):
Connects to a92-123-180-184.deploy.akamaitechnologies.com  (92.123.180.184:80)

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.230.96:80)

TCP (HTTP):
Connects to a96-17-10-10.deploy.akamaitechnologies.com  (96.17.10.10:80)

TCP (HTTP):
Connects to a92-122-48-59.deploy.akamaitechnologies.com  (92.122.48.59:80)

TCP (HTTP):

TCP (HTTP):
Connects to 201-221-130-144.telebucaramanga.net.co  (201.221.130.144:80)

TCP (HTTP):
Connects to 201-221-130-139.telebucaramanga.net.co  (201.221.130.139:80)

TCP (HTTP):
Connects to websafe.virginmedia.com  (62.254.123.86:80)

TCP (HTTP):
Connects to unknown.interbgc.com  (217.9.235.153:80)

TCP (HTTP):
Connects to sj236-50.dialup.seed.net.tw  (139.175.236.50:80)

TCP (HTTP):
Connects to node-202-78-239-171.alliancebroadband.in  (202.78.239.171:80)

TCP (HTTP):
Connects to ec2-54-187-169-64.us-west-2.compute.amazonaws.com  (54.187.169.64:80)

TCP (HTTP):
Connects to broadband.actcorp.in  (202.83.22.216:80)

TCP (HTTP):
Connects to a95-101-81-153.deploy.akamaitechnologies.com  (95.101.81.153:80)

TCP (HTTP):
Connects to a92-123-64-217.deploy.akamaitechnologies.com  (92.123.64.217:80)

Remove TNT2User.exe - Powered by Reason Core Security