client.exe

The application client.exe has been detected as a potentially unwanted program by 14 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49933 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
MD5:
8f2d4acdb16f4cb261861bf112393e51

SHA-1:
fc91c85623ebf9ac61573363c6e22c23daaa869c

SHA-256:
a4901a21a44605fee6e3818cb90e0bf431b81c2a5ddc28145db6c5016ba08f9e

Scanner detections:
14 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 9:52:44 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.164387
805

avast!
Win32:Adware-CBG [PUP]
2014.9-141130

Bitdefender
Gen:Variant.Adware.Graftor.164387
1.0.20.1630

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.164387
8.14.11.22.09

F-Secure
Gen:Variant.Adware.Graftor.164387
11.2014-22-11_7

G Data
Gen:Variant.Adware.Graftor.164387
14.11.24

McAfee
Artemis!45804C006E6C
5600.6931

MicroWorld eScan
Gen:Variant.Adware.Graftor.164387
15.0.0.978

Panda Antivirus
Trj/Genetic.gen
14.11.30.12

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.11.30.0

Sophos
iBryte Desktop
4.98

Trend Micro House Call
TROJ_GEN.R047H09KS14
7.2.334

VIPRE Antivirus
Trojan.Win32.Generic
35260

File size:
5.5 MB (5,812,224 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

File PE Metadata
Compilation timestamp:
11/21/2014 11:03:06 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:0M12m9dYYzJ3mk81k362idR12Wim1TnH9hYyVdXAbqZQFIGsOTqdaLcG4323BJX/:Ltzz3jwDvACQ/Aa1Tw0kE6r4de7

Entry address:
0x1E9F

Entry point:
E8, 3B, 27, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 87, 98, 00, FF, 15, 3C, 80, 40, 00, 85, C0, 75, 18, 56, E8, ED, 27, 00, 00, 8B, F0, FF, 15, 38, 80, 40, 00, 50, E8, 9D, 27, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, B0, A4, 40, 00, E8, 01, 25, 00, 00, 6A, 0E, E8, ED, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 7C, 98, 00, BA, FC, 7B, 98, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.5129

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49933/

Local host port:
49933

Default credentials:
No


The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-221-254-214.compute-1.amazonaws.com  (54.221.254.214:80)

TCP (HTTP SSL):
Connects to server-54-230-81-11.mia50.r.cloudfront.net  (54.230.81.11:443)

TCP (HTTP):
Connects to ec2-23-23-122-91.compute-1.amazonaws.com  (23.23.122.91:80)

TCP (HTTP SSL):
Connects to a23-1-25-93.deploy.static.akamaitechnologies.com  (23.1.25.93:443)

TCP (HTTP):
Connects to ec2-50-17-224-168.compute-1.amazonaws.com  (50.17.224.168:80)

TCP (HTTP):
Connects to ec2-54-204-8-133.compute-1.amazonaws.com  (54.204.8.133:80)

TCP (HTTP SSL):
Connects to a173-222-34-55.deploy.static.akamaitechnologies.com  (173.222.34.55:443)

TCP (HTTP):
Connects to vip080.ssl.hwcdn.net  (205.185.208.80:80)

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP):
Connects to ec2-50-17-217-59.compute-1.amazonaws.com  (50.17.217.59:80)

TCP (HTTP SSL):
Connects to server-54-230-82-151.mia50.r.cloudfront.net  (54.230.82.151:443)

TCP (HTTP SSL):
Connects to ec2-54-85-118-203.compute-1.amazonaws.com  (54.85.118.203:443)

TCP (HTTP):
Connects to ec2-54-83-200-155.compute-1.amazonaws.com  (54.83.200.155:80)

TCP (HTTP):
Connects to a72-247-184-16.deploy.akamaitechnologies.com  (72.247.184.16:80)

TCP (HTTP):
Connects to waws-prod-bay-003.cloudapp.net  (137.117.17.70:80)

TCP (HTTP):
Connects to server-54-230-201-133.fra50.r.cloudfront.net  (54.230.201.133:80)

TCP (HTTP):
Connects to i2-h0-s1211.p11-fra.cdngp.net  (174.35.61.220:80)

TCP (HTTP):
Connects to ec2-54-210-36-181.compute-1.amazonaws.com  (54.210.36.181:80)

TCP (HTTP):
Connects to ec2-52-71-87-48.compute-1.amazonaws.com  (52.71.87.48:80)

TCP (HTTP):
Connects to ec2-52-21-74-28.compute-1.amazonaws.com  (52.21.74.28:80)

Remove client.exe - Powered by Reason Core Security