TNT2User.exe

Freshy

This is a component of the Tightrope WebInstall, a setup program that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by Freshy has been detected as adware by 4 anti-malware scanners. Additionally, the file is typically installed by a number of programs including Findwide Toolbar by FindWide and TNT2-11219 Toolbar by Search.us.com, both potentially unwanted software. While running, it connects to the Internet address 30.3a.1632.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
Freshy.com  (signed by Freshy)

Version:
2.0.0.1928

MD5:
e9c6ffc49b1a60794d1d9f39b86c0cf3

SHA-1:
75c64fec6901eb751d3e6918af4885026737fc9e

SHA-256:
793030c4fe96d28eb9e2df545541c118956c3daf225d5984b0e39dd79e203faf

Scanner detections:
4 / 68

Status:
Adware

Analysis date:
12/26/2024 3:45:37 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2016.0.3227

ESET NOD32
Win32/Toolbar.TNT2.A potentially unwanted application
7.0.302.0

Reason Heuristics
Threat.Tightrope.Freshy
15.4.2.1

VIPRE Antivirus
Trojan.Win32.Generic
37558

File size:
671.8 KB (687,872 bytes)

Product version:
2.0.0.1928

Copyright:
© Freshy.com All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\tnt2\2.0.0.1928\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/20/2013 2:00:00 AM

Valid to:
6/29/2016 2:59:59 AM

Subject:
CN=Freshy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Freshy, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3FE613DB866C04EE49FDF0645F3F9391

File PE Metadata
Compilation timestamp:
1/10/2015 2:19:54 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:B4pK06ZzM6uhkcyN5WlBhUBJsL4gJDdYgN/kAwlvIdQhrZh2f69MRrJWreqkwbRJ:YMZ1uhHecnFFdkllAdQLA6qg/kwbRJ

Entry address:
0x39B4B

Entry point:
E8, 2C, 9D, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 70, 08, 47, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 21, 62, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 01, DA, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.5648

Code size:
332.5 KB (340,480 bytes)

The file TNT2User.exe has been discovered within the following programs.

Findwide Toolbar  by FindWide
This is a potentially unwanted web browser toolbar that delivers ads to the user's web browser including coupons, deals, or special offers from select merchants and stores.
search.findwide.com
86% remove it
TNT2-11219 Toolbar  by Search.us.com
Publisher's description - “Search.us.com provides users with access to a rich collection of resources, including without limitation various communications tools, forums, shopping services, search services and personalized content. You also understand and agree that the Search.us.”
support.search.us.com/terms.php
76% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to a96-17-202-210.deploy.akamaitechnologies.com  (96.17.202.210:80)

TCP (HTTP):
Connects to a96-17-182-121.deploy.akamaitechnologies.com  (96.17.182.121:80)

TCP (HTTP):
Connects to a91-245-214-11.deploy.akamaitechnologies.com  (91.245.214.11:80)

TCP (HTTP):
Connects to a88-221-89-40.deploy.akamaitechnologies.com  (88.221.89.40:80)

TCP (HTTP):
Connects to a31-14-104-73.deploy.akamaitechnologies.com  (31.14.104.73:80)

TCP (HTTP):
Connects to 203tdev20.codetel.net.do  (200.88.20.203:80)

TCP (HTTP):
Connects to 201.146.158.95-rev.novatel.bg  (95.158.146.201:80)

Remove TNT2User.exe - Powered by Reason Core Security