cltmngui.exe

Search Protect

Conduit Ltd.

The file belongs to the Conduit API platform, a utility that bundles and monetizes search toolbars and web browser extensions. The application cltmngui.exe, “Search Protect by Conduit” by Conduit has been detected as a potentially unwanted program by 16 anti-malware scanners.
Publisher:
Conduit  (signed by Conduit Ltd.)

Product:
Search Protect

Description:
Search Protect by Conduit

Version:
2.12.11.11

MD5:
b9910731290a9a63c1e71e9949969d79

SHA-1:
15b12ae8233a6e3b4806c081d34159e76c92c67d

SHA-256:
9ff9db02e5640677a965459366bd4e5e71762a96e3fddb35e417e16d9211db70

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
4/19/2024 9:46:47 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Trash.Gen
7.11.139.166

avast!
Win32:SearchProtect-B [PUP]
2014.9-140330

Baidu Antivirus
Trojan.Win32.Conduit.SearchProtect
4.0.3.14330

Bkav FE
W32.Clodc51.Trojan
1.3.0.4613

Dr.Web
Trojan.Damaged.1
9.0.1.0219

Emsisoft Anti-Malware
Win32.Ramnit.L
8.14.03.30.05

ESET NOD32
Win32/Conduit.SearchProtect (variant)
8.9613

Fortinet FortiGate
Riskware/Toolbar_Conduit
3/30/2014

G Data
Win32.Application.ConduitBrothersoftTB
14.3.22

Malwarebytes
PUP.Optional.Conduit.A
v2014.03.30.05

Microsoft Security Essentials
VirTool:Win32/VBInject.gen!IK
1.165.247.01

Panda Antivirus
PUP/Conduit.A
14.03.30.05

Reason Heuristics
PUP.SearchProtect.Conduit.I
14.8.7.22

SUPERAntiSpyware
Trojan.Agent/Gen-Nullo[Short]
10435

Trend Micro House Call
TROJ_GEN.F47V0828
7.2.89

VIPRE Antivirus
Conduit
27860

File size:
2.9 MB (3,027,232 bytes)

Product version:
2.12.11.11

Copyright:
2012 (c) Conduit. All rights reserved.

Original file name:
SearchProtect (R)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\searchprotect\ui\bin\cltmngui.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/2/2013 4:00:00 PM

Valid to:
4/3/2016 4:59:59 PM

Subject:
CN=Conduit Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Conduit Ltd., L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3A82654719D8F75B59134F7B66465210

File PE Metadata
Compilation timestamp:
3/30/2014 4:01:53 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:YALvt5tAXLu8BhV5PjnMUv7Vo6yTR+Ywe6k/OHWDesX+9+joYFclPIZBHpa+zF8m:YIvjtgLNhrzMUvRVERCp9Vgyir

Entry address:
0xFDEF3

Entry point:
E8, DB, 9E, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8D, 45, 14, 50, 6A, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 87, A2, 00, 00, 83, C4, 14, 5D, C3, 55, 8B, EC, 83, EC, 20, 53, 57, 33, DB, 6A, 07, 33, C0, 59, 8D, 7D, E4, 89, 5D, E0, F3, AB, 39, 45, 0C, 75, 15, E8, 71, 22, 00, 00, C7, 00, 16, 00, 00, 00, E8, 72, 88, 00, 00, 83, C8, FF, EB, 4D, 8B, 45, 08, 85, C0, 74, E4, 56, 89, 45, E8, 89, 45, E0, 8D, 45, 10, 50, 53, FF, 75, 0C, 8D, 45, E0, 50, C7, 45, E4, FF, FF, FF, 7F, C7, 45, EC, 42, 00, 00, 00, E8...
 
[+]

Entropy:
6.1811

Code size:
1.7 MB (1,795,072 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to a23-50-179-152.deploy.static.akamaitechnologies.com  (23.50.179.152:443)

TCP (HTTP SSL):
Connects to ec2-50-16-210-106.compute-1.amazonaws.com  (50.16.210.106:443)

TCP (HTTP SSL):
Connects to a23-212-227-152.deploy.static.akamaitechnologies.com  (23.212.227.152:443)

TCP (HTTP SSL):
Connects to a184-31-211-152.deploy.static.akamaitechnologies.com  (184.31.211.152:443)

TCP (HTTP SSL):
Connects to ec2-54-243-118-76.compute-1.amazonaws.com  (54.243.118.76:443)

TCP (HTTP SSL):
Connects to ec2-23-23-100-240.compute-1.amazonaws.com  (23.23.100.240:443)

TCP (HTTP SSL):
Connects to a95-101-195-152.deploy.akamaitechnologies.com  (95.101.195.152:443)

TCP (HTTP SSL):
Connects to a23-76-227-152.deploy.static.akamaitechnologies.com  (23.76.227.152:443)

TCP (HTTP SSL):
Connects to a23-73-99-152.deploy.static.akamaitechnologies.com  (23.73.99.152:443)

TCP (HTTP SSL):
Connects to a23-59-195-152.deploy.static.akamaitechnologies.com  (23.59.195.152:443)

TCP (HTTP SSL):
Connects to a23-50-131-152.deploy.static.akamaitechnologies.com  (23.50.131.152:443)

TCP (HTTP SSL):
Connects to a23-46-99-152.deploy.static.akamaitechnologies.com  (23.46.99.152:443)

TCP (HTTP SSL):
Connects to a23-43-179-152.deploy.static.akamaitechnologies.com  (23.43.179.152:443)

TCP (HTTP SSL):
Connects to a23-43-115-152.deploy.static.akamaitechnologies.com  (23.43.115.152:443)

TCP (HTTP SSL):
Connects to a23-41-3-152.deploy.static.akamaitechnologies.com  (23.41.3.152:443)

TCP (HTTP SSL):
Connects to a23-41-131-152.deploy.static.akamaitechnologies.com  (23.41.131.152:443)

TCP (HTTP SSL):
Connects to a23-34-179-152.deploy.static.akamaitechnologies.com  (23.34.179.152:443)

TCP (HTTP SSL):
Connects to a23-3-222-186.deploy.static.akamaitechnologies.com  (23.3.222.186:443)

TCP (HTTP SSL):
Connects to a23-222-7-237.deploy.static.akamaitechnologies.com  (23.222.7.237:443)

TCP (HTTP SSL):
Connects to a23-214-51-103.deploy.static.akamaitechnologies.com  (23.214.51.103:443)

Remove cltmngui.exe - Powered by Reason Core Security