cltmngui.exe

Search Protect

Conduit Ltd.

The file belongs to the Conduit API platform, a utility that bundles and monetizes search toolbars and web browser extensions. The application cltmngui.exe, “Search Protect by Conduit” by Conduit has been detected as a potentially unwanted program by 16 anti-malware scanners.
Publisher:
Conduit  (signed by Conduit Ltd.)

Product:
Search Protect

Description:
Search Protect by Conduit

Version:
2.12.20.154

MD5:
efaae131121b7ad73cba0fecc0b5a277

SHA-1:
856e28d7768bb8c0cd7f1e4355a810d8db55f6b0

SHA-256:
55e2367eabaf8c69ae8b4fde5fe8816d3e9841917f1ba08911cbbbb0cc42edc3

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
11/5/2024 9:54:01 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Trash.Gen
7.11.139.166

avast!
Win32:SearchProtect-B [PUP]
2014.9-140413

Baidu Antivirus
Trojan.Win32.Conduit.SearchProtect
4.0.3.14413

Bkav FE
W32.Clodc51.Trojan
1.3.0.4613

Dr.Web
Trojan.Damaged.1
9.0.1.0219

Emsisoft Anti-Malware
Win32.Ramnit.L
8.14.04.13.10

ESET NOD32
Win32/Conduit.SearchProtect (variant)
8.9660

Fortinet FortiGate
Riskware/Toolbar_Conduit
4/13/2014

G Data
Win32.Application.ConduitBrothersoftTB
14.4.22

Malwarebytes
PUP.Optional.Conduit.A
v2014.04.13.10

Microsoft Security Essentials
VirTool:Win32/VBInject.gen!IK
1.165.247.01

Panda Antivirus
PUP/Conduit.A
14.04.13.10

Reason Heuristics
PUP.SearchProtect.Conduit.I
14.8.7.22

SUPERAntiSpyware
Trojan.Agent/Gen-Nullo[Short]
10435

Trend Micro House Call
TROJ_GEN.F47V0828
7.2.103

VIPRE Antivirus
Conduit
28194

File size:
2.9 MB (3,037,472 bytes)

Product version:
2.12.20.154

Copyright:
2012 (c) Conduit. All rights reserved.

Original file name:
SearchProtect (R)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\searchprotect\ui\bin\cltmngui.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/3/2013 1:00:00 AM

Valid to:
4/4/2016 1:59:59 AM

Subject:
CN=Conduit Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Conduit Ltd., L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3A82654719D8F75B59134F7B66465210

File PE Metadata
Compilation timestamp:
4/8/2014 3:03:19 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:ZRBSXgmSzpEl5eymxV/MIvBQOii0Gj73Hiu6Ojq5vocFF1GZy:ZR5mSzWlxmzMIvGLi0Gj7py

Entry address:
0xFEC33

Entry point:
E8, DB, 9E, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8D, 45, 14, 50, 6A, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 87, A2, 00, 00, 83, C4, 14, 5D, C3, 55, 8B, EC, 51, 51, 8D, 45, F8, 50, FF, 15, 00, 91, 5B, 00, 8B, 4D, F8, 8B, 45, FC, 6A, 00, 81, C1, 00, 80, C1, 2A, 68, 80, 96, 98, 00, 15, 21, 4E, 62, FE, 50, 51, E8, 39, 47, 00, 00, 83, FA, 07, 7C, 0E, 7F, 07, 3D, FF, 6F, 40, 93, 76, 05, 83, C8, FF, 8B, D0, 8B, 4D, 08, 85, C9, 74, 05, 89, 01, 89, 51, 04, C9, C3, 55, 8B, EC, 56, E8, BD, AE, 00, 00, 8B, F0...
 
[+]

Entropy:
6.1793

Code size:
1.7 MB (1,799,168 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to a23-50-179-152.deploy.static.akamaitechnologies.com  (23.50.179.152:443)

TCP (HTTP SSL):
Connects to ec2-23-23-100-240.compute-1.amazonaws.com  (23.23.100.240:443)

TCP (HTTP SSL):
Connects to a23-73-163-152.deploy.static.akamaitechnologies.com  (23.73.163.152:443)

TCP (HTTP SSL):
Connects to a23-209-163-152.deploy.static.akamaitechnologies.com  (23.209.163.152:443)

TCP (HTTP SSL):
Connects to a23-35-211-152.deploy.static.akamaitechnologies.com  (23.35.211.152:443)

TCP (HTTP SSL):
Connects to a23-212-227-152.deploy.static.akamaitechnologies.com  (23.212.227.152:443)

TCP (HTTP SSL):
Connects to ec2-54-243-118-76.compute-1.amazonaws.com  (54.243.118.76:443)

TCP (HTTP SSL):
Connects to ec2-54-235-66-89.compute-1.amazonaws.com  (54.235.66.89:443)

TCP (HTTP SSL):
Connects to ec2-50-16-210-106.compute-1.amazonaws.com  (50.16.210.106:443)

TCP (HTTP SSL):
Connects to a23-61-137-83.deploy.static.akamaitechnologies.com  (23.61.137.83:443)

TCP (HTTP SSL):
Connects to a23-50-195-152.deploy.static.akamaitechnologies.com  (23.50.195.152:443)

TCP (HTTP SSL):
Connects to a23-50-131-152.deploy.static.akamaitechnologies.com  (23.50.131.152:443)

TCP (HTTP SSL):
Connects to a23-41-3-152.deploy.static.akamaitechnologies.com  (23.41.3.152:443)

TCP (HTTP SSL):
Connects to a23-221-223-190.deploy.static.akamaitechnologies.com  (23.221.223.190:443)

TCP (HTTP SSL):
Connects to a23-203-227-152.deploy.static.akamaitechnologies.com  (23.203.227.152:443)

TCP (HTTP SSL):
Connects to ec2-184-72-217-85.compute-1.amazonaws.com  (184.72.217.85:443)

TCP (HTTP SSL):
Connects to a95-101-243-152.deploy.akamaitechnologies.com  (95.101.243.152:443)

TCP (HTTP SSL):
Connects to a23-78-19-152.deploy.static.akamaitechnologies.com  (23.78.19.152:443)

TCP (HTTP SSL):
Connects to a23-76-227-152.deploy.static.akamaitechnologies.com  (23.76.227.152:443)

TCP (HTTP SSL):
Connects to a23-75-83-152.deploy.static.akamaitechnologies.com  (23.75.83.152:443)

Remove cltmngui.exe - Powered by Reason Core Security