client.exe

The application client.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49409 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. This file is typically installed with the program Rockettab by Rich River Media, LLC which is a potentially unwanted software program. While running, it connects to the Internet address server-54-192-44-85.fra6.r.cloudfront.net on port 443.
MD5:
4ebf3f3c57953fa80f2f78b4553947fc

SHA-1:
0ffc0311f6926f0af4a8b6606545faf5772b8951

SHA-256:
b475f4b737cdb8705ebda308cef5b18a4a84b4ad9321c1e395e865c6c549964f

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
11/24/2024 1:39:12 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.164387
773

avast!
Win32:Adware-CBG [PUP]
2014.9-141223

Baidu Antivirus
Adware.Win32.RocketTab
4.0.3.141223

Bitdefender
Gen:Variant.Adware.Graftor.164387
1.0.20.1785

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.164387
8.14.12.23.05

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10906

Fortinet FortiGate
Adware/RocketTab
12/23/2014

F-Secure
Gen:Variant.Adware.Graftor.164387
11.2014-23-12_3

G Data
Gen:Variant.Adware.Graftor.164387
14.12.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.8.5.0

K7 AntiVirus
Riskware
13.188.14395

MicroWorld eScan
Gen:Variant.Adware.Graftor.164387
15.0.0.1071

Panda Antivirus
Trj/CI.A
14.12.23.05

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Quick Heal
AdWare.MSIL.g5 (Not a Virus)
12.14.14.00

Reason Heuristics
Threat.Win.Reputation.IMP
14.12.23.17

Sophos
iBryte Desktop
4.98

Trend Micro House Call
TROJ_GEN.R047H09KS14
7.2.357

Vba32 AntiVirus
AdWare.MSIL.RocketTab
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
35908

File size:
5.5 MB (5,812,224 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

File PE Metadata
Compilation timestamp:
11/27/2014 6:32:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:pogHEjCwqhJPaAS5ItTc4M+VuJ5VbWadX4R1ya27yAG3zDhURFeCAPPcGFjih+KK:poEEuS8c4JVGfVyR1HN1nOwCERNilRk

Entry address:
0x1E8F

Entry point:
E8, 3B, 27, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 87, 98, 00, FF, 15, 3C, 80, 40, 00, 85, C0, 75, 18, 56, E8, ED, 27, 00, 00, 8B, F0, FF, 15, 38, 80, 40, 00, 50, E8, 9D, 27, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, B0, A4, 40, 00, E8, 01, 25, 00, 00, 6A, 0E, E8, ED, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 7C, 98, 00, BA, FC, 7B, 98, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.6497

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49409/

Local host port:
49409

Default credentials:
No


The file client.exe has been discovered within the following program.

Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP):
Connects to ec2-54-236-140-38.compute-1.amazonaws.com  (54.236.140.38:80)

TCP (HTTP):
Connects to ec2-54-204-8-133.compute-1.amazonaws.com  (54.204.8.133:80)

TCP (HTTP):
Connects to ec2-54-174-84-183.compute-1.amazonaws.com  (54.174.84.183:80)

TCP (HTTP):
Connects to ec2-23-23-122-91.compute-1.amazonaws.com  (23.23.122.91:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-vie1.fbcdn.net  (31.13.84.4:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-frt3.fbcdn.net  (31.13.92.14:443)

TCP (HTTP):
Connects to xx-fbcdn-shv-01-fra3.fbcdn.net  (31.13.93.7:80)

TCP (HTTP SSL):
Connects to ssl.sc.opera.com  (82.145.223.176:443)

TCP (HTTP):
Connects to server-54-230-202-142.fra50.r.cloudfront.net  (54.230.202.142:80)

TCP (HTTP SSL):
Connects to server-54-192-44-85.fra6.r.cloudfront.net  (54.192.44.85:443)

TCP (HTTP):
Connects to server-54-192-44-84.fra6.r.cloudfront.net  (54.192.44.84:80)

TCP (HTTP):
Connects to server-54-192-44-27.fra6.r.cloudfront.net  (54.192.44.27:80)

TCP (HTTP):
Connects to server-54-192-44-168.fra6.r.cloudfront.net  (54.192.44.168:80)

TCP (HTTP):
Connects to server-52-85-184-201.fra2.r.cloudfront.net  (52.85.184.201:80)

TCP (HTTP):
Connects to server-52-85-178-120.fra50.r.cloudfront.net  (52.85.178.120:80)

TCP (HTTP):
Connects to server-52-85-173-237.fra6.r.cloudfront.net  (52.85.173.237:80)

TCP (HTTP):
Connects to s3.eu-central-1.amazonaws.com  (52.219.73.8:80)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.ir2.yahoo.com  (217.12.15.96:443)

TCP (HTTP):
Connects to povar.t-online.de  (80.156.86.232:80)

Remove client.exe - Powered by Reason Core Security