cltmng.exe

Lenovo Browser Guard

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application cltmng.exe by ClientConnect has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This file is typically installed with the program Lenovo Browser Guard by ClientConnect LTD which is a potentially unwanted software program. While running, it connects to the Internet address offering.service.distributionengine.va.conduit-services.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

Product:
Lenovo Browser Guard

Version:
2.16.60.37

MD5:
102600758cb49f5aacd473b08c9c347f

SHA-1:
d307865e7484dac9e62df0b67b5bd1e69a23dc46

SHA-256:
cc2abb32f2258333f996ae8b8e09be4a437d01930fdc3178d46dede000dbb20e

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
4/24/2024 8:35:47 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Conduit (M)
17.1.30.21

File size:
4.8 MB (5,058,352 bytes)

Product version:
2.16.60.37

Original file name:
Lenovo Browser Guard

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\lenovobrowserguard\lenovobrowserguard\bin\cltmng.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/28/2014 2:00:00 AM

Valid to:
1/30/2016 1:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Lenovo Browser Guard, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
177310CAE60BB43B9E75B02DA2C1AC11

File PE Metadata
Compilation timestamp:
5/6/2015 3:12:56 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x2AE028

Entry point:
E8, BC, E0, 00, 00, E9, 7F, FE, FF, FF, 6A, 08, 68, 28, 03, 86, 00, E8, 62, A3, 00, 00, FF, 35, 10, 8B, 87, 00, FF, 15, 38, 12, 72, 00, 85, C0, 74, 16, 83, 65, FC, 00, FF, D0, EB, 07, 33, C0, 40, C3, 8B, 65, E8, C7, 45, FC, FE, FF, FF, FF, E8, 01, 00, 00, 00, CC, 6A, 08, 68, 08, 03, 86, 00, E8, 2A, A3, 00, 00, E8, 23, C6, 00, 00, 8B, 40, 78, 85, C0, 74, 16, 83, 65, FC, 00, FF, D0, EB, 07, 33, C0, 40, C3, 8B, 65, E8, C7, 45, FC, FE, FF, FF, FF, E8, 5E, 5E, 00, 00, CC, E8, FB, C5, 00, 00, 8B, 40, 7C, 85, C0...
 
[+]

Code size:
3.1 MB (3,273,728 bytes)

The file cltmng.exe has been discovered within the following programs.

Lenovo Browser Guard  by ClientConnect LTD
This is a branded version for Lenovo of the Conduit/Perion Search Protect software, a potentially unwanted program that maintains the partner or affiliate directed web page.
79% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ude.conduit-data.com  (54.197.244.95:80)

TCP (HTTP):

TCP (HTTP):
Connects to cms.distributionengine.conduit-services.com  (23.67.242.59:80)

 
http://cms.distributionengine.conduit-services.com//MainOffer/569076371/?CurrentStep=1&TotalSteps=5&DMVersion=1.6.8.4_Perion.569075248.04&Language=None

Remove cltmng.exe - Powered by Reason Core Security