client.exe

The application client.exe has been detected as a potentially unwanted program by 21 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49436 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software. According to AVG, this software downloads additional adware offers during setup.
MD5:
918ddae7653f7286831242fc6560e38e

SHA-1:
f23c18619d55062dc49d7600d663b805c2f4bafb

SHA-256:
50886ae770a4c1a0e3f12f0d61c80f57a0e14054afa5f12aa7ee94c574c5e611

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 6:20:39 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.126378
698

AhnLab V3 Security
Trojan/Win32.Gen
2015.02.19

Avira AntiVirus
Adware/iBryte.2020352.1
7.11.211.72

avast!
Win32:IBryte-JB [PUP]
2014.9-150309

AVG
Downloader
2016.0.3176

Baidu Antivirus
Adware.MSIL.iBryte
4.0.3.141220

Bitdefender
Gen:Variant.Zusy.126378
1.0.20.340

Dr.Web
Trojan.BrowseBan.603
9.0.1.068

Emsisoft Anti-Malware
Gen:Variant.Zusy.126378
8.15.03.09.01

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10906

Fortinet FortiGate
Adware/IBryte
3/9/2015

F-Secure
Gen:Variant.Zusy.126378
11.2015-09-03_2

G Data
Gen:Variant.Zusy.126378
15.3.25

K7 AntiVirus
Adware
13.196.15011

McAfee
Artemis!918DDAE7653F
5600.6911

MicroWorld eScan
Gen:Variant.Zusy.126378
16.0.0.204

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.3.9.1

Rising Antivirus
PE:Backdoor.Zegost!1.64DC
23.00.65.141218

VIPRE Antivirus
iBryte
37698

Zillya! Antivirus
Adware.iBryte.Win32.7475
2.0.0.2073

File size:
1.9 MB (2,020,352 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

File PE Metadata
Compilation timestamp:
12/19/2014 10:27:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:LDIi0qxGr8PBotSy3uex1a2TmubfwVvFHro9p2/scTEmJL2nJZzs2pMCBA40vg7V:nEqxGHFx17tT8ZkwCT4flpxWuCPxF

Entry address:
0x19B1

Entry point:
E8, F9, 18, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 8C, F7, 40, 00, FF, 15, 48, 80, 40, 00, 85, C0, 75, 18, 56, E8, AB, 19, 00, 00, 8B, F0, FF, 15, 44, 80, 40, 00, 50, E8, 5B, 19, 00, 00, 59, 89, 06, 5E, 5D, C3, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, E8, EC, 40, 00, 89, 0D, E4, EC, 40, 00, 89, 15, E0, EC, 40, 00, 89, 1D, DC, EC, 40, 00, 89, 35, D8, EC, 40, 00, 89, 3D, D4, EC, 40, 00, 66, 8C, 15, 00, ED, 40, 00, 66, 8C, 0D, F4, EC, 40, 00...
 
[+]

Entropy:
6.1547

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49436/

Local host port:
49436

Default credentials:
No


The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to msnbot-65-55-252-43.search.msn.com  (65.55.252.43:443)

TCP (HTTP):
Connects to li491-84.members.linode.com  (50.116.29.84:80)

TCP (HTTP):
Connects to ec2-54-83-201-51.compute-1.amazonaws.com  (54.83.201.51:80)

TCP (HTTP):
Connects to ec2-54-235-185-31.compute-1.amazonaws.com  (54.235.185.31:80)

TCP (HTTP):
Connects to ec2-54-221-254-214.compute-1.amazonaws.com  (54.221.254.214:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-06-mia1.fbcdn.net  (31.13.73.88:443)

TCP:
Connects to wg-in-f188.1e100.net  (173.194.78.188:5228)

TCP (HTTP SSL):
Connects to wg-in-f105.1e100.net  (173.194.78.105:443)

TCP (HTTP):
Connects to we-in-f95.1e100.net  (173.194.66.95:80)

TCP (HTTP):
Connects to video.sj2.vcmedia.com  (64.156.167.69:80)

TCP (HTTP):
Connects to snt-re4-9b.sjc.dropbox.com  (108.160.163.110:80)

TCP (HTTP):
Connects to server-54-230-7-59.dfw3.r.cloudfront.net  (54.230.7.59:80)

TCP (HTTP):
Connects to server-54-230-6-225.dfw3.r.cloudfront.net  (54.230.6.225:80)

TCP (HTTP):
Connects to server-54-230-6-143.dfw3.r.cloudfront.net  (54.230.6.143:80)

TCP (HTTP):
Connects to server-54-230-138-195.lax1.r.cloudfront.net  (54.230.138.195:80)

TCP (HTTP):
Connects to server-54-230-138-11.lax1.r.cloudfront.net  (54.230.138.11:80)

TCP (HTTP):
Connects to server-54-230-137-243.lax1.r.cloudfront.net  (54.230.137.243:80)

TCP (HTTP):
Connects to server-216-137-43-145.dfw3.r.cloudfront.net  (216.137.43.145:80)

TCP (HTTP):
Connects to segs.btrll.com  (162.208.20.166:80)

Remove client.exe - Powered by Reason Core Security