Client.exe

Inertware

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Inertware has been detected as adware by 4 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 49204 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and RocketTab: by Adknowledge, Inc., both potentially unwanted software.
Publisher:
Inertware  (signed and verified)

Version:
1.0.5366.14566

MD5:
f7f79d61acb9c3cbce94c0ddd3a3dfa7

SHA-1:
fca09fa7b6f0485e5e5d6b49146e24454301e7fc

SHA-256:
aaefaf950d5ae2cd8ef34ba00abd260deb313bc1046d2c9e58c74c895f23fdb1

Scanner detections:
4 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/16/2024 8:48:23 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:IBryte-EP [PUP]
2014.9-140910

ESET NOD32
MSIL/Adware.iBryte.F application
7.0.302.0

Reason Heuristics
Adware.RocketTab.Adknowledge
15.2.10.11

VIPRE Antivirus
Threat.4798837
32938

File size:
1.4 MB (1,420,512 bytes)

Product version:
1.0.5366.14566

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\Program Files\rockettab\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/14/2014 2:00:00 AM

Valid to:
7/15/2015 1:59:59 AM

Subject:
CN=Inertware, O=Inertware, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00B17D2DC81A4AB47B03A1531303433731

File PE Metadata
Compilation timestamp:
9/10/2014 11:06:16 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:Igxa6JMqsD3FKBGGf6SSliO9aXXJ9JOyXNE0bGLGr0ue:lXQo76SSWHJ39/7r0ue

Entry address:
0x15135E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,373,184 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49204/

Local host port:
49204

Default credentials:
No


The file Client.exe has been discovered within the following programs.

Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
RocketTab:  by Adknowledge, Inc.
RocketTab is an advertising supported browser extension also known as adware and is designed to deliver ads to the user's Internet browser as banners, context text-links and transitionals ads. The injected ads are not affiliated with the underlying website on which they appear.
www.adknowledge.com
87% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to yv-in-f19.1e100.net  (74.125.21.19:443)

TCP:
Connects to yv-in-f188.1e100.net  (74.125.21.188:5228)

TCP (HTTP SSL):
Connects to yv-in-f113.1e100.net  (74.125.21.113:443)

TCP (HTTP SSL):
Connects to yv-in-f101.1e100.net  (74.125.21.101:443)

TCP (HTTP SSL):
Connects to yv-in-f100.1e100.net  (74.125.21.100:443)

TCP (HTTP SSL):
Connects to yk-in-f19.1e100.net  (74.125.196.19:443)

TCP (HTTP SSL):
Connects to yk-in-f17.1e100.net  (74.125.196.17:443)

TCP (HTTP SSL):
Connects to yk-in-f139.1e100.net  (74.125.196.139:443)

TCP (HTTP SSL):
Connects to yk-in-f120.1e100.net  (74.125.196.120:443)

TCP (HTTP SSL):
Connects to yh-in-f83.1e100.net  (74.125.137.83:443)

TCP (HTTP SSL):
Connects to yh-in-f113.1e100.net  (74.125.137.113:443)

TCP (HTTP SSL):
Connects to vip1.g.cachefly.net  (205.234.175.175:443)

TCP (HTTP):
Connects to static.5.69.4.46.clients.your-server.de  (46.4.69.5:80)

TCP (HTTP):
Connects to static.134.85.40.188.clients.your-server.de  (188.40.85.134:80)

TCP (HTTP):
Connects to srv15.readserver.net  (95.211.218.221:80)

TCP (HTTP):
Connects to server-54-230-46-84.fra6.r.cloudfront.net  (54.230.46.84:80)

TCP (HTTP):
Connects to server-54-230-207-170.atl50.r.cloudfront.net  (54.230.207.170:80)

TCP (HTTP SSL):
Connects to script2.ioam.de  (91.215.101.35:443)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.0.89:80)

TCP (HTTP):
Connects to s05.gcdn.eu  (78.46.96.210:80)

Remove Client.exe - Powered by Reason Core Security