cltmngui.exe

Search Protect

Conduit Ltd.

The file belongs to the Conduit API platform, a utility that bundles and monetizes search toolbars and web browser extensions. The application cltmngui.exe, “Search Protect by Conduit” by Conduit has been detected as a potentially unwanted program by 13 anti-malware scanners.
Publisher:
Conduit  (signed by Conduit Ltd.)

Product:
Search Protect

Description:
Search Protect by Conduit

Version:
2.10.20.64

MD5:
b5f5cd5f42fe580f5d925bbd0db4aed7

SHA-1:
6f1a5ecdfb7eec7c358befb0fb3d77cd7f21310d

SHA-256:
3df88421a988d867c00e9e549db0b9e86c5cfb59af04c6d7448d752359080dc8

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
11/5/2024 9:40:46 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:SearchProtect-B [PUP]
2014.9-140213

Baidu Antivirus
Trojan.Win32.Conduit.SearchProtect
4.0.3.1487

Bkav FE
W32.Clodc51.Trojan
1.3.0.4613

Emsisoft Anti-Malware
Win32.Ramnit.L
8.14.02.13.03

ESET NOD32
Win32/Conduit.SearchProtect (variant)
8.9372

Fortinet FortiGate
Riskware/Toolbar_Conduit
8/7/2014

G Data
Win32.Application.ConduitBrothersoftTB
14.2.22

Malwarebytes
PUP.Optional.Conduit.A
v2014.02.13.03

Microsoft Security Essentials
VirTool:Win32/VBInject.gen!IK
1.165.247.01

Panda Antivirus
Adware/Conduit
14.02.13.03

Reason Heuristics
PUP.SearchProtect.Conduit.I
14.8.7.22

Trend Micro House Call
TROJ_GEN.F47V0828
7.2.44

VIPRE Antivirus
Conduit
26074

File size:
2.8 MB (2,981,152 bytes)

Product version:
2.10.20.64

Copyright:
2012 (c) Conduit. All rights reserved.

Original file name:
SearchProtect (R)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\searchprotect\ui\bin\cltmngui.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/3/2013 1:00:00 AM

Valid to:
4/4/2016 1:59:59 AM

Subject:
CN=Conduit Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Conduit Ltd., L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3A82654719D8F75B59134F7B66465210

File PE Metadata
Compilation timestamp:
2/6/2014 2:25:06 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:EX2w4aLuj6kyoy4ekPxrBf09HRRtfJzauNyzS+jMeZjXON9GvCD7Cv:EX2z1jRyAeUrBfKxLfMuNXcv

Entry address:
0xF9AF3

Entry point:
E8, EB, 9E, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8D, 45, 14, 50, 6A, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 97, A2, 00, 00, 83, C4, 14, 5D, C3, 55, 8B, EC, 51, 51, 8D, 45, F8, 50, FF, 15, 04, 31, 5B, 00, 8B, 4D, F8, 8B, 45, FC, 6A, 00, 81, C1, 00, 80, C1, 2A, 68, 80, 96, 98, 00, 15, 21, 4E, 62, FE, 50, 51, E8, 49, 47, 00, 00, 83, FA, 07, 7C, 0E, 7F, 07, 3D, FF, 6F, 40, 93, 76, 05, 83, C8, FF, 8B, D0, 8B, 4D, 08, 85, C9, 74, 05, 89, 01, 89, 51, 04, C9, C3, 55, 8B, EC, 56, E8, CD, AE, 00, 00, 8B, F0...
 
[+]

Entropy:
6.1954

Code size:
1.7 MB (1,775,104 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to a23-58-211-152.deploy.static.akamaitechnologies.com  (23.58.211.152:443)

TCP (HTTP SSL):
Connects to a184-31-131-152.deploy.static.akamaitechnologies.com  (184.31.131.152:443)

TCP (HTTP SSL):
Connects to a96-7-99-152.deploy.akamaitechnologies.com  (96.7.99.152:443)

TCP (HTTP SSL):
Connects to a23-9-83-152.deploy.static.akamaitechnologies.com  (23.9.83.152:443)

TCP (HTTP SSL):
Connects to a23-78-19-152.deploy.static.akamaitechnologies.com  (23.78.19.152:443)

TCP (HTTP SSL):
Connects to a23-77-19-152.deploy.static.akamaitechnologies.com  (23.77.19.152:443)

TCP (HTTP SSL):
Connects to a23-74-195-152.deploy.static.akamaitechnologies.com  (23.74.195.152:443)

TCP (HTTP SSL):
Connects to a23-72-19-152.deploy.static.akamaitechnologies.com  (23.72.19.152:443)

TCP (HTTP SSL):
Connects to a23-67-214-170.deploy.static.akamaitechnologies.com  (23.67.214.170:443)

TCP (HTTP SSL):
Connects to a23-66-99-152.deploy.static.akamaitechnologies.com  (23.66.99.152:443)

TCP (HTTP SSL):
Connects to a23-52-211-152.deploy.static.akamaitechnologies.com  (23.52.211.152:443)

TCP (HTTP SSL):
Connects to a23-51-51-152.deploy.static.akamaitechnologies.com  (23.51.51.152:443)

TCP (HTTP SSL):
Connects to a23-51-163-152.deploy.static.akamaitechnologies.com  (23.51.163.152:443)

TCP (HTTP SSL):
Connects to a23-51-131-152.deploy.static.akamaitechnologies.com  (23.51.131.152:443)

TCP (HTTP SSL):
Connects to a23-49-115-152.deploy.static.akamaitechnologies.com  (23.49.115.152:443)

TCP (HTTP SSL):
Connects to a23-46-161-149.deploy.static.akamaitechnologies.com  (23.46.161.149:443)

TCP (HTTP SSL):
Connects to a23-45-99-152.deploy.static.akamaitechnologies.com  (23.45.99.152:443)

TCP (HTTP SSL):
Connects to a23-43-99-152.deploy.static.akamaitechnologies.com  (23.43.99.152:443)

TCP (HTTP SSL):
Connects to a23-37-243-152.deploy.static.akamaitechnologies.com  (23.37.243.152:443)

TCP (HTTP SSL):
Connects to a23-37-147-152.deploy.static.akamaitechnologies.com  (23.37.147.152:443)

Remove cltmngui.exe - Powered by Reason Core Security