cltmng.exe

Search Protect

Conduit Ltd.

The file belongs to the Conduit API platform, a utility that bundles and monetizes search toolbars and web browser extensions. The application cltmng.exe, “Search Protect by Conduit” by Conduit has been detected as a potentially unwanted program by 17 anti-malware scanners. Additionally, the file is typically installed by a number of programs including Search Protect by Conduit Ltd. and SaveSense by savesense.com, both potentially unwanted software.
Publisher:
Conduit  (signed by Conduit Ltd.)

Product:
Search Protect

Description:
Search Protect by Conduit

Version:
2.12.11.11

MD5:
4d8b567286f302bca515cd13dd3925d0

SHA-1:
b8e13ba427ad7da77629a1d280a44f16564bba3f

SHA-256:
b8098508a4fae880d121ff2fdff16f86b130ee42d3b53564bd48935492e72f78

Scanner detections:
17 / 68

Status:
Potentially unwanted

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
4/16/2024 4:08:12 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:SearchProtect-B [PUP]
2014.9-140330

Baidu Antivirus
Trojan.Win32.Conduit.SearchProtect
4.0.3.14330

Bkav FE
W32.Clod444.Trojan
1.3.0.4562

Boost by Reason
Optional.Conduit.G
188838

Dr.Web
Adware.Conduit.21
9.0.1.089

Emsisoft Anti-Malware
Trojan.GenericKDZ.24806
8.14.03.30.05

ESET NOD32
Win32/Conduit.SearchProtect (variant)
8.9613

Fortinet FortiGate
Riskware/Conduit_SearchProtect
3/30/2014

G Data
Win32.Application.SearchProtect
14.3.24

Malwarebytes
PUP.Optional.Conduit.A
v2014.03.30.05

McAfee
Artemis!8DFBDE35A58E
5600.7175

Panda Antivirus
PUP/Conduit.A
14.03.30.05

Reason Heuristics
PUP.SearchProtect.Conduit.G
14.8.7.22

SUPERAntiSpyware
Trojan.Agent/Gen-Nullo[Short]
10435

Trend Micro House Call
TROJ_GEN.F47V0828
7.2.89

VIPRE Antivirus
Conduit
27860

XVirus List
Win.Detected
2.3.31

File size:
4.5 MB (4,672,288 bytes)

Product version:
2.12.11.11

Copyright:
2012 (c) Conduit. All rights reserved.

Original file name:
SearchProtect (R)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\searchprotect\searchprotect\bin\cltmng.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/2/2013 4:00:00 PM

Valid to:
4/3/2016 4:59:59 PM

Subject:
CN=Conduit Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Conduit Ltd., L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3A82654719D8F75B59134F7B66465210

File PE Metadata
Compilation timestamp:
3/30/2014 4:02:07 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
98304:Y6i4lQd3XL84z4E9NCb/Pk2lgrBD43yddl57X8D0l:YLHzNCb/MBD43x0l

Entry address:
0x20D369

Entry point:
E8, BE, BE, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 83, EC, 20, 53, 57, 33, DB, 6A, 07, 33, C0, 59, 8D, 7D, E4, 89, 5D, E0, F3, AB, 39, 45, 0C, 75, 15, E8, D3, 2F, 00, 00, C7, 00, 16, 00, 00, 00, E8, C5, 90, 00, 00, 83, C8, FF, EB, 4D, 8B, 45, 08, 85, C0, 74, E4, 56, 89, 45, E8, 89, 45, E0, 8D, 45, 10, 50, 53, FF, 75, 0C, 8D, 45, E0, 50, C7, 45, E4, FF, FF, FF, 7F, C7, 45, EC, 42, 00, 00, 00, E8, DA, C0, 00, 00, 83, C4, 10, FF, 4D, E4, 8B, F0, 78, 07, 8B, 4D, E0, 88, 19, EB, 0C, 8D, 45, E0, 50, 53, E8, B3...
 
[+]

Entropy:
6.4506

Code size:
3 MB (3,101,184 bytes)

The file cltmng.exe has been discovered within the following programs.

SaveSense  by savesense.com
From the EULA: "SaveSense provides you with services which are intended to enhance your online shopping experience, showing you same products or different stores with cheaper prices and exposing you to coupons allowing you to enjoy exclusive discounts when checking out products ("Offers").
support.savesense.com
62% remove it
Search Protect  by Conduit Ltd.
From the Terms of Service: "Search Protect is a separate piece of software installed on your hard-drive in connection with your installation of a Toolbar. It is designed to protect your Search settings from takeover by third parties.
84% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-83-197-43.compute-1.amazonaws.com  (54.83.197.43:80)

TCP (HTTP):
Connects to ec2-50-16-210-106.compute-1.amazonaws.com  (50.16.210.106:80)

TCP (HTTP):
Connects to ec2-184-72-217-85.compute-1.amazonaws.com  (184.72.217.85:80)

TCP (HTTP):
Connects to ec2-54-235-66-89.compute-1.amazonaws.com  (54.235.66.89:80)

TCP (HTTP):
Connects to ec2-23-23-100-240.compute-1.amazonaws.com  (23.23.100.240:80)

TCP (HTTP):
Connects to ec2-54-243-118-76.compute-1.amazonaws.com  (54.243.118.76:80)

TCP (HTTP SSL):
Connects to a23-212-227-152.deploy.static.akamaitechnologies.com  (23.212.227.152:443)

TCP (HTTP):
Connects to ec2-54-225-157-67.compute-1.amazonaws.com  (54.225.157.67:80)

TCP (HTTP SSL):
Connects to a96-7-67-152.deploy.akamaitechnologies.com  (96.7.67.152:443)

TCP (HTTP SSL):
Connects to a95-101-199-61.deploy.akamaitechnologies.com  (95.101.199.61:443)

TCP (HTTP SSL):
Connects to a95-101-195-152.deploy.akamaitechnologies.com  (95.101.195.152:443)

TCP (HTTP):
Connects to a95-100-98-207.deploy.akamaitechnologies.com  (95.100.98.207:80)

TCP (HTTP SSL):
Connects to a23-76-227-152.deploy.static.akamaitechnologies.com  (23.76.227.152:443)

TCP (HTTP SSL):
Connects to a23-73-163-152.deploy.static.akamaitechnologies.com  (23.73.163.152:443)

TCP (HTTP):

TCP (HTTP):
Connects to a23-67-250-138.deploy.static.akamaitechnologies.com  (23.67.250.138:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP SSL):
Connects to a23-50-179-152.deploy.static.akamaitechnologies.com  (23.50.179.152:443)

TCP (HTTP SSL):
Connects to a23-50-131-152.deploy.static.akamaitechnologies.com  (23.50.131.152:443)

Remove cltmng.exe - Powered by Reason Core Security