TNT2User.exe

eShield

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by eShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tightrope WebInstall installer. This is the uninstaller utility registered in the Windows Control Panel for the program eShield Browser Security by eShield. Additionally, the file is typically installed by a number of programs including TNT2-11433 Toolbar by Search.us.com and eShield Browser Security by Search.us.com, both potentially unwanted software.
Publisher:
eShield  (signed and verified)

Version:
2.0.0.2101

MD5:
bb953445d4ada7ff80525df22cc4fca7

SHA-1:
d5a8c013146663265e6499335b2050d209243db9

SHA-256:
0ccd283ece95620e3fcb2edc75a37b870d66ef858ab7fbc9acf4a966015059cd

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/27/2024 6:47:56 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Tightrope.eShield.Bundler (M)
16.6.30.2

File size:
678.2 KB (694,480 bytes)

Product version:
2.0.0.2101

Copyright:
© Eshield All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\tnt2\2.0.0.2101\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/22/2014 1:00:00 AM

Valid to:
7/22/2017 12:59:59 AM

Subject:
CN=eShield, O=eShield, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3FB390EC6E5B675E625C0B342989627A

File PE Metadata
Compilation timestamp:
6/14/2016 6:45:17 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:vdvlPV3RyQM5hjTD942LokdRdzFL/i6CFaV9qurd9MRrJWrL8MvsHVHdH:lQ5xx47sRxxTC6qgPXvsHVHR

Entry address:
0x41DF0

Entry point:
E8, 7F, A5, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 3C, 0B, 47, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 68, 64, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 8D, 85, E4, FC, FF, FF, 6A, 4C, 6A, 00, 50, E8, 5C, D9, FF, FF, 8D, 85, E0, FC, FF, FF, 83, C4, 0C, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Code size:
342 KB (350,208 bytes)

Program Uninstaller
Program name:
eShield Browser Security

Display publisher:
eShield

Uninstall string:
"C:\users\{user}\appdata\local\tnt2\2.0.0.2101\tnt2user.exe" \uninstall partner=11433


The file TNT2User.exe has been discovered within the following programs.

eShield Browser Security  by Search.us.com
This toolbar will install a Search.us.com web browser home page and search page hijacker.
64% remove it
TNT2-11433 Toolbar  by Search.us.com
74% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to a92-123-180-184.deploy.akamaitechnologies.com  (92.123.180.184:80)

TCP (HTTP):
Connects to 203-144-145-25.static.asianet.co.th  (203.144.145.25:80)

TCP (HTTP):
Connects to a92-123-180-194.deploy.akamaitechnologies.com  (92.123.180.194:80)

TCP (HTTP):
Connects to a184-51-148-112.deploy.static.akamaitechnologies.com  (184.51.148.112:80)

TCP (HTTP):
Connects to host-213.158.175.90.tedata.net  (213.158.175.90:80)

TCP (HTTP):
Connects to host-213.158.175.73.tedata.net  (213.158.175.73:80)

TCP (HTTP):
Connects to h216-165-156-107.mdsnwi.tisp.static.tds.net  (216.165.156.107:80)

TCP (HTTP):
Connects to cm-84.208.37.34.getinternet.no  (84.208.37.34:80)

TCP (HTTP):
Connects to akamai-ip17.telkom-ipnet.co.za  (165.165.47.17:80)

TCP (HTTP):
Connects to a96-16-99-200.deploy.akamaitechnologies.com  (96.16.99.200:80)

TCP (HTTP):
Connects to a92-123-180-66.deploy.akamaitechnologies.com  (92.123.180.66:80)

TCP (HTTP):
Connects to a84-53-132-226.deploy.akamaitechnologies.com  (84.53.132.226:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-197-50-184.deploy.static.akamaitechnologies.com  (23.197.50.184:80)

TCP (HTTP):

TCP (HTTP):
Connects to a184-51-148-146.deploy.static.akamaitechnologies.com  (184.51.148.146:80)

Remove TNT2User.exe - Powered by Reason Core Security