Client.exe

Software Jockey

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Software Jockey has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 49317 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
Publisher:
Software Jockey  (signed and verified)

Version:
1.0.5403.14403

MD5:
17d2a4ee9f4b6c5ab54aa1d0b21e3252

SHA-1:
2270a19271764c4252098ed8402791dbf1b663b2

SHA-256:
e284ebc1491a76a9a38fe0f05930335822a658841a3874be7ec3149185a9e29b

Scanner detections:
5 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/5/2024 9:49:38 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10579

F-Prot
W32/A-425915ce
v6.4.7.1.166

McAfee
Adware-RocketTab
5600.6974

Reason Heuristics
PUP.SoftwareJockey.G
14.10.17.12

VIPRE Antivirus
AdKnowledge
34004

File size:
1.4 MB (1,425,128 bytes)

Product version:
1.0.5403.14403

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\Program Files\search extensions\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 7:00:00 PM

Valid to:
3/24/2015 6:59:59 PM

Subject:
CN=Software Jockey, O=Software Jockey, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3481FC293A085AD3BA94D30DC9CC2E95

File PE Metadata
Compilation timestamp:
10/17/2014 4:00:24 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:pDDtv9wCpvxQNPp6JS+7gLIguc/0V9Rjtw2X9YJwD:z3w6JSBMgutltw2X9YJwD

Entry address:
0x152536

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.1001

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,377,792 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49317/

Local host port:
49317

Default credentials:
No


The file Client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to zulu1177.server4you.de  (188.138.115.120:80)

TCP (HTTP):
Connects to yk-in-f99.1e100.net  (74.125.196.99:80)

TCP (HTTP SSL):
Connects to yk-in-f157.1e100.net  (74.125.196.157:443)

TCP (HTTP):
Connects to yk-in-f155.1e100.net  (74.125.196.155:80)

TCP (HTTP):
Connects to yk-in-f149.1e100.net  (74.125.196.149:80)

TCP (HTTP):
Connects to yk-in-f113.1e100.net  (74.125.196.113:80)

TCP (HTTP):
Connects to server-54-230-205-122.atl50.r.cloudfront.net  (54.230.205.122:80)

TCP (HTTP):
Connects to server-54-230-204-221.atl50.r.cloudfront.net  (54.230.204.221:80)

TCP (HTTP SSL):
Connects to ns3356641.ip-37-187-56.eu  (37.187.56.42:443)

TCP (HTTP SSL):
Connects to muc03s14-in-f31.1e100.net  (74.125.232.95:443)

TCP (HTTP SSL):
Connects to muc03s14-in-f28.1e100.net  (74.125.232.92:443)

TCP (HTTP SSL):
Connects to muc03s14-in-f26.1e100.net  (74.125.232.90:443)

TCP (HTTP SSL):
Connects to muc03s14-in-f25.1e100.net  (74.125.232.89:443)

TCP (HTTP SSL):
Connects to muc03s14-in-f13.1e100.net  (74.125.232.77:443)

TCP (HTTP SSL):
Connects to muc03s08-in-f4.1e100.net  (173.194.44.36:443)

TCP (HTTP SSL):
Connects to muc03s08-in-f13.1e100.net  (173.194.44.45:443)

TCP (HTTP SSL):
Connects to muc03s08-in-f12.1e100.net  (173.194.44.44:443)

TCP (HTTP):
Connects to h162.155.30.69.static.ip.windstream.net  (69.30.155.162:80)

TCP (HTTP):
Connects to h154.155.30.69.static.ip.windstream.net  (69.30.155.154:80)

Remove Client.exe - Powered by Reason Core Security