TNT2User.exe

eShield

This is a component of the Tightrope WebInstall, a setup program that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by eShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is the uninstaller utility registered in the Windows Control Panel for the program eShield Browser Security by eShield. This file is typically installed with the program eShield Browser Security by Search.us.com which is a potentially unwanted software program.
Publisher:
eShield  (signed and verified)

Version:
2.0.0.2030

MD5:
f80a934f7f68e22d57ac9c59f55d8d45

SHA-1:
5b762ed8fe61b0c79d90530e0ac21ec5779aaa09

SHA-256:
22c70cbfe17832debca4947fd95d1a31681856fff43ec3436834af5c9e51665f

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/26/2024 3:46:58 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Tightrope.eShield (M)
15.12.18.8

File size:
651.2 KB (666,832 bytes)

Product version:
2.0.0.2030

Copyright:
© Eshield All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\tnt2\2.0.0.2030\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/21/2014 7:00:00 PM

Valid to:
7/21/2017 6:59:59 PM

Subject:
CN=eShield, O=eShield, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3FB390EC6E5B675E625C0B342989627A

File PE Metadata
Compilation timestamp:
12/17/2015 5:01:38 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:CdvymkUwMqjQMBQWlad1kWR0B5GT6Xd6d7JWyELHJy1qB7C9MRrJWrLFaPRz:ycBpIHjRY06ExYyGDMqgPAPRz

Entry address:
0x418D0

Entry point:
E8, 7F, A5, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 3C, 0B, 47, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 68, 64, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 8D, 85, E4, FC, FF, FF, 6A, 4C, 6A, 00, 50, E8, 5C, D9, FF, FF, 8D, 85, E0, FC, FF, FF, 83, C4, 0C, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.5522

Code size:
341 KB (349,184 bytes)

Program Uninstaller
Program name:
eShield Browser Security

Display publisher:
eShield

Uninstall string:
"C:\users\{user}\appdata\local\tnt2\2.0.0.2030\tnt2user.exe" \uninstall partner=11579


The file TNT2User.exe has been discovered within the following program.

eShield Browser Security  by Search.us.com
This toolbar will install a Search.us.com web browser home page and search page hijacker.
64% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to a92-123-180-194.deploy.akamaitechnologies.com  (92.123.180.194:80)

TCP (HTTP):
Connects to a96-17-182-121.deploy.akamaitechnologies.com  (96.17.182.121:80)

TCP (HTTP):
Connects to 86-120-38-10.rdsnet.ro  (86.120.38.10:80)

TCP (HTTP):
Connects to 125.235.4.59.adsl.viettel.vn  (125.235.4.59:80)

TCP (HTTP):
Connects to a92-123-180-184.deploy.akamaitechnologies.com  (92.123.180.184:80)

TCP (HTTP):
Connects to a88-221-254-184.deploy.akamaitechnologies.com  (88.221.254.184:80)

TCP (HTTP):
Connects to a84-53-132-249.deploy.akamaitechnologies.com  (84.53.132.249:80)

TCP (HTTP):
Connects to a23-209-190-11.deploy.static.akamaitechnologies.com  (23.209.190.11:80)

TCP (HTTP):
Connects to a110-164-253-145.deploy.static.akamaitechnologies.com  (110.164.253.145:80)

TCP (HTTP):
Connects to 86-120-38-19.rdsnet.ro  (86.120.38.19:80)

TCP (HTTP):
Connects to 210-86-141-41.static.asianet.co.th  (210.86.141.41:80)

TCP (HTTP):
Connects to 203-144-145-26.static.asianet.co.th  (203.144.145.26:80)

TCP (HTTP):
Connects to 203-144-145-25.static.asianet.co.th  (203.144.145.25:80)

TCP (HTTP):
Connects to 119-46-207-161.static.asianet.co.th  (119.46.207.161:80)

Remove TNT2User.exe - Powered by Reason Core Security