TNT2User.exe

FindWide

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application TNT2User.exe by FindWide has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This file is typically installed with the program Findwide Toolbar by FindWide which is a potentially unwanted software program. While running, it connects to the Internet address 30.3a.1632.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
FindWide  (signed and verified)

Version:
2.0.0.1983

MD5:
fd1192800c55ce4abacaf5c39d620398

SHA-1:
78a5d19675623f0a21c3f32a63226f0bf3e0a16d

SHA-256:
6140d9931251a5706cb1f610bf15adf826b3585557bdbc3cef06697e4cc0abc1

Scanner detections:
13 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 10:51:14 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
FindWide
2016.0.3127

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Toolbar.600
9.0.1.05190

ESET NOD32
Win32/Toolbar.TNT2.A potentially unwanted (variant)
9.11536

Fortinet FortiGate
Riskware/Agent
5/9/2015

G Data
Win32.Application.Agent.DZ8N4T
15.5.25

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
14.0.0.2066

Panda Antivirus
PUP/TNT2Toolbar
15.05.09.06

Qihoo 360 Security
Win32/Virus.WebToolbar.d46
1.0.0.1015

Reason Heuristics
PUP.Tightrope.Bundler
15.4.26.18

Sophos
Generic PUA HP
4.98

VIPRE Antivirus
Threat.4150696
39486

Zillya! Antivirus
Adware.Agent.Win32.54555
2.0.0.2154

File size:
677.3 KB (693,504 bytes)

Product version:
2.0.0.1983

Copyright:
© Findwide All Rights Reserved

Original file name:
TNT2User.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\tnt2\2.0.0.1983\tnt2user.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/20/2013 1:00:00 AM

Valid to:
4/4/2016 1:59:59 AM

Subject:
CN=FindWide, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=FindWide, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
77A7F86399C7BD73854873DA281178E9

File PE Metadata
Compilation timestamp:
4/21/2015 7:04:42 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:ts6aQ6FD29r88EYqySwgrqgPSDRHfqKwMX:ts6abFIrsYqVteRHfqUX

Entry address:
0x3A7FB

Entry point:
E8, 9C, 9D, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 38, 09, 47, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 91, 62, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, D1, D9, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Code size:
335.5 KB (343,552 bytes)

The file TNT2User.exe has been discovered within the following program.

Findwide Toolbar  by FindWide
This is a potentially unwanted web browser toolbar that delivers ads to the user's web browser including coupons, deals, or special offers from select merchants and stores.
search.findwide.com
86% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 30.3a.1632.ip4.static.sl-reverse.com  (50.22.58.48:80)

TCP (HTTP):
Connects to d9.3f.6132.ip4.static.sl-reverse.com  (50.97.63.217:80)

TCP (HTTP):
Connects to 18.55.c0ad.ip4.static.sl-reverse.com  (173.192.85.24:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to a95-100-170-26.deploy.akamaitechnologies.com  (95.100.170.26:80)

TCP (HTTP):
Connects to 203-144-145-26.static.asianet.co.th  (203.144.145.26:80)

TCP (HTTP):
Connects to 125.235.36.152.adsl.viettel.vn  (125.235.36.152:80)

Remove TNT2User.exe - Powered by Reason Core Security