TNT2User.exe

Freshy

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by Freshy has been detected as adware by 3 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. Additionally, the file is typically installed by a number of programs including Findwide Toolbar by FindWide and TNT2-11045 Toolbar by Search.us.com, both potentially unwanted software.
Publisher:
Freshy.com  (signed by Freshy)

Version:
2.0.0.1895

MD5:
681865ee8cf2d59ef5e18ef388faccd0

SHA-1:
8591a9ba953041516ffeea8a47c181112a37021b

SHA-256:
4f1b688c66676221f56aefe411dd67eeb74e5f81932b9ca3df0393556a781c50

Scanner detections:
3 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/26/2024 3:58:01 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3303

ESET NOD32
Win32/Toolbar.TNT2.A potentially unwanted application
7.0.302.0

Reason Heuristics
Threat.Tightrope.Bundler
15.4.2.1

File size:
667.8 KB (683,776 bytes)

Product version:
2.0.0.1895

Copyright:
© Freshy.com All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall

Language:
English (United States)

Common path:
C:\Documents and Settings\{user}\Application data\tnt2\2.0.0.1895\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/20/2013 1:00:00 AM

Valid to:
6/29/2016 1:59:59 AM

Subject:
CN=Freshy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Freshy, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3FE613DB866C04EE49FDF0645F3F9391

File PE Metadata
Compilation timestamp:
10/28/2014 7:25:00 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:2hy0eTFw6ms0FMQR0DPRPkc8CRwSDb9CXtgZFkc9MRrJWr5gC2aYa:dTJpvhKcrWXkZqgiC2ad

Entry address:
0x3915B

Entry point:
E8, 9C, 9D, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 48, F8, 46, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 91, 62, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 01, DA, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Code size:
330 KB (337,920 bytes)

The file TNT2User.exe has been discovered within the following programs.

Findwide Toolbar  by FindWide
This is a potentially unwanted web browser toolbar that delivers ads to the user's web browser including coupons, deals, or special offers from select merchants and stores.
search.findwide.com
86% remove it
TNT2-11045 Toolbar  by Search.us.com
Publisher's description - “Search.us.com provides users with access to a rich collection of resources, including without limitation various communications tools, forums, shopping services, search services and personalized content. You also understand and agree that the Search.us.”
support.search.us.com/terms.php
82% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to etg-01-034.etg.ras.cantv.net  (200.44.26.34:80)

TCP (HTTP):
Connects to etg-01-024.etg.ras.cantv.net  (200.44.26.24:80)

TCP (HTTP):
Connects to a95-101-89-226.deploy.akamaitechnologies.com  (95.101.89.226:80)

TCP (HTTP):
Connects to a95-101-72-59.deploy.akamaitechnologies.com  (95.101.72.59:80)

TCP (HTTP):
Connects to a92-123-65-18.deploy.akamaitechnologies.com  (92.123.65.18:80)

TCP (HTTP):
Connects to a92-123-64-195.deploy.akamaitechnologies.com  (92.123.64.195:80)

TCP (HTTP):
Connects to a112-78-33-16.deploy.akamaitechnologies.com  (112.78.33.16:80)

Remove TNT2User.exe - Powered by Reason Core Security