client.exe

The application client.exe has been detected as a potentially unwanted program by 14 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 50486 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
MD5:
1406d6ae233a0932063abc6c75467d5f

SHA-1:
30ae45e3cbed6e27195c35b00440de1e98c0043b

SHA-256:
3bf550e0f907d04fcb8348fd72e96b81a03d94d3024a4b263784059747f3eb86

Scanner detections:
14 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 2:46:12 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.164387
809

avast!
Win32:Adware-CBG [PUP]
2014.9-141130

Bitdefender
Gen:Variant.Adware.Graftor.164387
1.0.20.1610

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.164387
8.14.11.18.08

F-Secure
Gen:Variant.Adware.Graftor.164387
11.2014-18-11_3

G Data
Gen:Variant.Adware.Graftor.164387
14.11.24

McAfee
Artemis!45804C006E6C
5600.6931

MicroWorld eScan
Gen:Variant.Adware.Graftor.164387
15.0.0.966

Panda Antivirus
Trj/Genetic.gen
14.11.30.12

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.11.30.0

Sophos
iBryte Desktop
4.98

Trend Micro House Call
TROJ_GEN.R047H09KS14
7.2.334

VIPRE Antivirus
Trojan.Win32.Generic
35260

File size:
5.5 MB (5,812,224 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

File PE Metadata
Compilation timestamp:
11/17/2014 1:33:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:o+Wb1i0XOMDyTvmdjMTAebGs3p0LZ1jT1+8YmrQxWtt5ARFHe3CuHur8OtjIMAXo:PTAMUEmQvtZIb2J1RKXJsYHrw98g

Entry address:
0x1E8F

Entry point:
E8, 3B, 27, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 87, 98, 00, FF, 15, 3C, 80, 40, 00, 85, C0, 75, 18, 56, E8, ED, 27, 00, 00, 8B, F0, FF, 15, 38, 80, 40, 00, 50, E8, 9D, 27, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, B0, A4, 40, 00, E8, 01, 25, 00, 00, 6A, 0E, E8, ED, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 7C, 98, 00, BA, FC, 7B, 98, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.1889

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:50486/

Local host port:
50486

Default credentials:
No


The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to mx-ll-110.164.6-231.static.3bb.co.th  (110.164.6.231:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.16-50.static.3bb.co.th  (110.164.16.50:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.16-20.static.3bb.co.th  (110.164.16.20:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:443)

TCP (HTTP):
Connects to a103-16-206-27.deploy.akamaitechnologies.com  (103.16.206.27:80)

TCP (HTTP SSL):
Connects to t4-ha.ycpi.sgb.yahoo.com  (119.161.10.151:443)

TCP (HTTP):
Connects to server-54-230-150-240.sin2.r.cloudfront.net  (54.230.150.240:80)

TCP (HTTP):
Connects to server-54-230-150-238.sin2.r.cloudfront.net  (54.230.150.238:80)

TCP (HTTP SSL):
Connects to mx-ll-110.164.10-104.static.3bb.co.th  (110.164.10.104:443)

TCP (HTTP):
Connects to lb1.forsetup.com  (108.163.213.235:80)

TCP (HTTP):
Connects to ec2-54-225-75-84.compute-1.amazonaws.com  (54.225.75.84:80)

TCP (HTTP):
Connects to ec2-54-225-184-218.compute-1.amazonaws.com  (54.225.184.218:80)

TCP (HTTP):
Connects to ec2-54-197-250-127.compute-1.amazonaws.com  (54.197.250.127:80)

TCP (HTTP):
Connects to ec2-54-154-109-8.eu-west-1.compute.amazonaws.com  (54.154.109.8:80)

TCP (HTTP):
Connects to ec2-50-17-224-168.compute-1.amazonaws.com  (50.17.224.168:80)

TCP (HTTP):
Connects to 149-210-169-43.colo.transip.net  (149.210.169.43:80)

TCP (HTTP):
Connects to 123-125-232-198.static.unitasglobal.net  (198.232.125.123:80)

TCP (HTTP SSL):
Connects to yk-in-f132.1e100.net  (74.125.196.132:443)

TCP (HTTP SSL):
Connects to wj-in-f95.1e100.net  (74.125.195.95:443)

TCP (HTTP SSL):
Connects to server-54-240-166-174.lhr5.r.cloudfront.net  (54.240.166.174:443)

Remove client.exe - Powered by Reason Core Security