screenglazeministub.exe

ScreenGlazeMiniStub

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application screenglazeministub.exe by ClientConnect has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
Client Connect Ltd.  (signed by ClientConnect LTD)

Product:
ScreenGlazeMiniStub

Version:
1.0.0.3

MD5:
9735a332355848874c41ddcfb09c8941

SHA-1:
bb9b80c6c9aed8986f80aa7697703f8f27ff8a80

SHA-256:
b0ef73e2dbabf193b141b64950b87f54258b64db160f78307d89456f753ee8c1

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
4/24/2024 2:44:19 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.15327

Bkav FE
W32.FamVT.ClientconnectB.TTc
1.3.0.6379

ESET NOD32
Win32/ClientConnect.A potentially unwanted (variant)
9.11323

Fortinet FortiGate
Riskware/Agent
3/27/2015

G Data
Win32.Application.SearchProtect.AJ
15.3.25

K7 AntiVirus
Trojan
13.200.15263

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
14.0.0.2280

Malwarebytes
PUP.Optional.ClientConnect
v2015.03.27.09

McAfee
Artemis!9735A3323558
5600.6813

Panda Antivirus
Generic Suspicious
15.03.27.09

Qihoo 360 Security
Win32/Virus.WebToolbar.48f
1.0.0.1015

Reason Heuristics
PUP.Installer.Conduit
15.3.27.21

Trend Micro House Call
TROJ_GEN.R03EH07BF15
7.2.86

VIPRE Antivirus
Conduit
38446

File size:
221.7 KB (226,992 bytes)

Product version:
1.0.0.3

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
ScreenGlazeMiniStub

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\secondoffer3\screenglazeministub.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/23/2014 7:00:00 PM

Valid to:
11/23/2016 6:59:59 PM

Subject:
CN=ClientConnect LTD, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
07A465C6BD7A554BCBAC4E39D5889DAF

File PE Metadata
Compilation timestamp:
2/24/2012 2:19:59 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:TEUXd6lMqHRkXrT66bvDvQSn/xPvjdqhg:TEOxqHRk/v9xPvjdqhg

Entry address:
0x39E3

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 91, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, C0, 82, 40, 00, 6A, 08, A3, B8, 2E, 47, 00, E8, 37, 2A, 00, 00, 55, 68, B4, 02, 00, 00, A3, D0, 2D, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 93, 40, 00, FF, 15, 84, 81, 40, 00, 68, 04, 93, 40, 00, 68, C0, AD, 46, 00, E8, 19, 27, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 30, 4C, 00, 57, E8, 07, 27, 00, 00...
 
[+]

Entropy:
7.8021

Packer / compiler:
Nullsoft install system v2.x

Code size:
28 KB (28,672 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/19538627/19559750/?mainofferId=19535193&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.9.95.19558616.01&Language=US-EN

Remove screenglazeministub.exe - Powered by Reason Core Security