Client.exe

Secureencoded

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Secureencoded has been detected as adware by 3 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 49247 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
Publisher:
Secureencoded  (signed and verified)

Version:
1.0.5388.12645

MD5:
05dcc192159dc98798056d12993750dd

SHA-1:
e3898948dc845471e3857b80ec1d14bbb6f8e13e

SHA-256:
63e11c1da24ab76ce4fa0dca29dc17a97a72f8e4cdd8ccb972954f57085ff06d

Scanner detections:
3 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/7/2024 8:39:30 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10499

Reason Heuristics
PUP.Secureencoded.G
14.10.2.14

VIPRE Antivirus
AdKnowledge
33602

File size:
1.4 MB (1,424,104 bytes)

Product version:
1.0.5388.12645

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\Program Files\search extensions\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/14/2014 2:00:00 AM

Valid to:
7/15/2015 1:59:59 AM

Subject:
CN=Secureencoded, O=Secureencoded, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008A9DE5BF6D7E4070873AB08E9304F7FA

File PE Metadata
Compilation timestamp:
10/2/2014 10:02:21 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:Y4sUiQXFwE51n6JSHn7/yjR5kTcsPRp7zK79N8LE6:16At6JSH7qWz7zITX6

Entry address:
0x1520F2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,376,768 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49247/

Local host port:
49247

Default credentials:
No


The file Client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to a23-217-198-42.deploy.static.akamaitechnologies.com  (23.217.198.42:443)

TCP (HTTP SSL):
Connects to a104-121-99-27.deploy.static.akamaitechnologies.com  (104.121.99.27:443)

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to a23-218-75-53.deploy.static.akamaitechnologies.com  (23.218.75.53:443)

TCP (HTTP SSL):
Connects to msnbot-65-55-252-43.search.msn.com  (65.55.252.43:443)

TCP (HTTP SSL):
Connects to ec2-52-203-182-217.compute-1.amazonaws.com  (52.203.182.217:443)

TCP (HTTP):
Connects to ec2-23-21-129-1.compute-1.amazonaws.com  (23.21.129.1:80)

TCP (HTTP SSL):
Connects to channel-proxy-shv-13-prn1.facebook.com  (69.171.235.19:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-03-mia1.fbcdn.net  (31.13.73.40:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-02-mia1.fbcdn.net  (31.13.73.23:443)

TCP (HTTP SSL):
Connects to webmailer.hosteurope.de  (80.237.128.167:443)

TCP (HTTP SSL):
Connects to usera587.uk.uudial.com  (193.149.68.79:443)

TCP (HTTP):
Connects to track-eu.adform.net  (86.58.179.98:80)

TCP (HTTP):
Connects to static.88-198-19-136.clients.your-server.de  (88.198.19.136:80)

TCP (HTTP):
Connects to static.216.84.4.46.clients.your-server.de  (46.4.84.216:80)

TCP (HTTP):
Connects to static.14.8.9.176.clients.your-server.de  (176.9.8.14:80)

TCP (HTTP):
Connects to static.135.22.63.178.clients.your-server.de  (178.63.22.135:80)

TCP (HTTP):
Connects to snt-re3-7d.sjc.dropbox.com  (108.160.162.104:80)

TCP (HTTP):
Connects to sjd-rf15-3c.sjc.dropbox.com  (108.160.167.51:80)

TCP (HTTP):
Connects to sjd-rd12-5a.sjc.dropbox.com  (108.160.167.165:80)

Remove Client.exe - Powered by Reason Core Security