cltmng.exe

Search Protect

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application cltmng.exe by ClientConnect has been detected as adware by 10 anti-malware scanners. This file is typically installed with the program Search Protect by Client Connect LTD which is a potentially unwanted software program.
Publisher:
Client Connect LTD  (signed by ClientConnect LTD)

Product:
Search Protect

Version:
2.19.10.160

MD5:
1c8964cbd8cede4e88a0032d67a9747f

SHA-1:
3dc8650abe045bd0fd2229b1922bc28d6a7e0ba4

SHA-256:
8fa874a3f0b16caabec9ac25578683f86720860e8b103f9419cb843633733303

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
4/27/2024 3:53:11 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.SearchProtect
2014.12.12

avast!
Win32:Conduit-B [PUP]
2014.9-141214

AVG
SearchProtect
2015.0.3261

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.141214

ESET NOD32
Win32/ClientConnect (variant)
8.10864

G Data
Win32.Application.SearchProtect.AA@gen
14.12.24

Malwarebytes
PUP.Optional.SearchProtect.A
v2014.12.14.08

Reason Heuristics
PUP.ClientConnect.G
14.12.14.8

Sophos
Conduit Search Protect
4.98

VIPRE Antivirus
Conduit
35640

File size:
5.6 MB (5,853,848 bytes)

Product version:
2.19.10.160

Original file name:
Search Protect Search (R)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\searchprotect\searchprotect\bin\cltmng.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/3/2014 12:00:00 AM

Valid to:
2/4/2016 11:59:59 PM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Search Protect, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
173D1F00E27A9D60265B3AB0B87F2ED8

File PE Metadata
Compilation timestamp:
12/10/2014 2:52:59 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
98304:ac3IEwCtmkscfK16HVhk5so+256WJAtH1Ak7qaakEXetOY1pGR:UmccfLPwlPJAtH1Ak7g+HHGR

Entry address:
0x30E8A8

Entry point:
E8, FB, F5, 00, 00, E9, 7F, FE, FF, FF, 6A, 08, 68, F8, 5B, 92, 00, E8, 32, B8, 00, 00, FF, 35, 58, 02, 94, 00, FF, 15, 68, 52, 79, 00, 85, C0, 74, 16, 83, 65, FC, 00, FF, D0, EB, 07, 33, C0, 40, C3, 8B, 65, E8, C7, 45, FC, FE, FF, FF, FF, E8, 01, 00, 00, 00, CC, 6A, 08, 68, D8, 5B, 92, 00, E8, FA, B7, 00, 00, E8, 6C, DB, 00, 00, 8B, 40, 78, 85, C0, 74, 16, 83, 65, FC, 00, FF, D0, EB, 07, 33, C0, 40, C3, 8B, 65, E8, C7, 45, FC, FE, FF, FF, FF, E8, B9, 83, 00, 00, CC, E8, 44, DB, 00, 00, 8B, 40, 7C, 85, C0...
 
[+]

Entropy:
6.8341

Code size:
3.6 MB (3,749,376 bytes)

The file cltmng.exe has been discovered within the following programs.

Search Protect  by Client Connect LTD
Search Protect from Client Connect (formally Conduit, now a venture of Perion) is a homepage and search provider modifier that when installed will change the default web browser's home page and search pages to a partner portal such as Trovi.
www.conduit.com/searchprotect
79% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-243-171-53.compute-1.amazonaws.com  (54.243.171.53:80)

TCP (HTTP):
Connects to ec2-23-21-214-196.compute-1.amazonaws.com  (23.21.214.196:80)

TCP (HTTP):
Connects to ec2-54-243-179-23.compute-1.amazonaws.com  (54.243.179.23:80)

TCP (HTTP SSL):
Connects to a88-221-71-34.deploy.akamaitechnologies.com  (88.221.71.34:443)

TCP (HTTP SSL):
Connects to a23-78-208-11.deploy.static.akamaitechnologies.com  (23.78.208.11:443)

TCP (HTTP SSL):
Connects to a23-67-7-61.deploy.static.akamaitechnologies.com  (23.67.7.61:443)

TCP (HTTP SSL):
Connects to a23-220-251-53.deploy.static.akamaitechnologies.com  (23.220.251.53:443)

TCP (HTTP SSL):
Connects to a23-220-132-39.deploy.static.akamaitechnologies.com  (23.220.132.39:443)

TCP (HTTP):
Connects to a23-220-100-186.deploy.static.akamaitechnologies.com  (23.220.100.186:80)

TCP (HTTP SSL):
Connects to a23-218-42-243.deploy.static.akamaitechnologies.com  (23.218.42.243:443)

TCP (HTTP SSL):
Connects to a23-209-68-11.deploy.static.akamaitechnologies.com  (23.209.68.11:443)

TCP (HTTP SSL):
Connects to a23-195-225-184.deploy.static.akamaitechnologies.com  (23.195.225.184:443)

TCP (HTTP SSL):
Connects to a173-222-152-49.deploy.static.akamaitechnologies.com  (173.222.152.49:443)

TCP (HTTP SSL):
Connects to a172-233-52-189.deploy.static.akamaitechnologies.com  (172.233.52.189:443)

TCP (HTTP SSL):
Connects to a172-233-160-8.deploy.static.akamaitechnologies.com  (172.233.160.8:443)

Remove cltmng.exe - Powered by Reason Core Security