client.exe

Software Jockey

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application client.exe by Software Jockey has been detected as adware by 14 anti-malware scanners. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
Publisher:
Software Jockey  (signed and verified)

MD5:
6d5581a9ae27e722609f74ccccb68be9

SHA-1:
92e4b53380a81eea70b2dd5a15442db3a0b8221b

SHA-256:
7ef5dba254ec6431c07b80a4fb65b55826574adab1a2716d1153861d3d36d259

Scanner detections:
14 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Analysis date:
12/24/2024 3:23:40 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.164387
797

avast!
Win32:Adware-CBG [PUP]
2014.9-141130

Bitdefender
Gen:Variant.Adware.Graftor.164387
1.0.20.1670

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.164387
8.14.11.30.12

F-Secure
Gen:Variant.Adware.Graftor.164387
11.2014-30-11_1

G Data
Gen:Variant.Adware.Graftor.164387
14.11.24

McAfee
Artemis!45804C006E6C
5600.6931

MicroWorld eScan
Gen:Variant.Adware.Graftor.164387
15.0.0.1002

Panda Antivirus
Trj/Genetic.gen
14.11.30.12

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.SoftwareJockey.G
14.10.31.13

Sophos
iBryte Desktop
4.98

Trend Micro House Call
TROJ_GEN.R047H09KS14
7.2.334

VIPRE Antivirus
Threat.4798837
34232

File size:
5.5 MB (5,751,528 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=Software Jockey, O=Software Jockey, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3481FC293A085AD3BA94D30DC9CC2E95

File PE Metadata
Compilation timestamp:
10/31/2014 10:20:29 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:V2iTaB61fIUqJgPNV6JeCyDV6mqEPES6ElEnyLVd5w9AHZg:PYmb6SlfEs+

Entry address:
0x1E8F

Entry point:
E8, 3B, 27, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 8F, 97, 00, FF, 15, 3C, 80, 40, 00, 85, C0, 75, 18, 56, E8, ED, 27, 00, 00, 8B, F0, FF, 15, 38, 80, 40, 00, 50, E8, 9D, 27, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, B0, A4, 40, 00, E8, 01, 25, 00, 00, 6A, 0E, E8, ED, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 84, 97, 00, BA, FC, 83, 97, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.5297

Code size:
25.5 KB (26,112 bytes)

The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to ec2-23-21-92-252.compute-1.amazonaws.com  (23.21.92.252:80)

TCP (HTTP):
Connects to cdn-68-142-101-7.mia1.llnw.net  (68.142.101.7:80)

TCP (HTTP):
Connects to ec2-50-17-217-59.compute-1.amazonaws.com  (50.17.217.59:80)

TCP (HTTP SSL):
Connects to server-52-84-117-10.iad16.r.cloudfront.net  (52.84.117.10:443)

TCP (HTTP):
Connects to ec2-54-235-149-64.compute-1.amazonaws.com  (54.235.149.64:80)

TCP (HTTP SSL):
Connects to e2.ycpi.vip.bra.yahoo.com  (200.152.162.161:443)

TCP (HTTP):

TCP (HTTP):
Connects to ec2-54-232-235-7.sa-east-1.compute.amazonaws.com  (54.232.235.7:80)

TCP (HTTP):
Connects to dl3.clickmein.com  (199.189.107.164:80)

TCP (HTTP SSL):
Connects to yh-in-f102.1e100.net  (74.125.137.102:443)

TCP (HTTP SSL):
Connects to server-54-230-161-193.jax1.r.cloudfront.net  (54.230.161.193:443)

TCP (HTTP SSL):
Connects to server-52-84-178-120.gru50.r.cloudfront.net  (52.84.178.120:443)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.49.19:443)

TCP (HTTP):
Connects to lga15s44-in-f13.1e100.net  (74.125.226.77:80)

TCP (HTTP):
Connects to ec2-54-243-102-68.compute-1.amazonaws.com  (54.243.102.68:80)

TCP (HTTP):
Connects to ec2-54-235-185-31.compute-1.amazonaws.com  (54.235.185.31:80)

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP SSL):
Connects to ec2-23-21-93-145.compute-1.amazonaws.com  (23.21.93.145:443)

TCP (HTTP SSL):
Connects to ec2-23-21-139-158.compute-1.amazonaws.com  (23.21.139.158:443)

Remove client.exe - Powered by Reason Core Security