client.exe

The application client.exe has been detected as a potentially unwanted program by 14 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49224 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software. While running, it connects to the Internet address ieonlinews.microsoft.com on port 443.
MD5:
b595a9b10c5ae02dc93d4ffd3ba0be8b

SHA-1:
bbfa885900b4b3116a6e71b712c17cc73d061ffb

SHA-256:
e9fdac8667eccdb9d633babf11f7f474ca6c8fd6ef2e609df51c1e525d4678ab

Scanner detections:
14 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 9:03:23 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.164387
5821796

avast!
Win32:Adware-CBG [PUP]
2014.9-141130

Bitdefender
Gen:Variant.Adware.Graftor.164387
1.0.20.1625

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.164387
9.0.0.4570

F-Secure
Gen:Variant.Adware.Graftor.164387
11.2014-21-11_6

G Data
Gen:Variant.Adware.Graftor.164387
14.11.24

McAfee
Artemis!45804C006E6C
5600.6931

MicroWorld eScan
Gen:Variant.Adware.Graftor.164387
15.0.0.975

Panda Antivirus
Trj/Genetic.gen
14.11.30.12

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.11.30.0

Sophos
iBryte Desktop
4.98

Trend Micro House Call
TROJ_GEN.R047H09KS14
7.2.334

VIPRE Antivirus
Trojan.Win32.Generic
35260

File size:
5.5 MB (5,812,224 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

File PE Metadata
Compilation timestamp:
11/21/2014 5:00:42 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:nc1XzLeef/ta6fxfd1UbfyShX8VITQ9prKv0DtsTWJCx2iSmrzEqFGt+ucuTUYcl:

Entry address:
0x1E9F

Entry point:
E8, 3B, 27, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 87, 98, 00, FF, 15, 3C, 80, 40, 00, 85, C0, 75, 18, 56, E8, ED, 27, 00, 00, 8B, F0, FF, 15, 38, 80, 40, 00, 50, E8, 9D, 27, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, B0, A4, 40, 00, E8, 01, 25, 00, 00, 6A, 0E, E8, ED, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 7C, 98, 00, BA, FC, 7B, 98, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.5884

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49224/

Local host port:
49224

Default credentials:
No


The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-lga3.fbcdn.net  (31.13.71.7:443)

TCP (HTTP):
Connects to ec2-23-21-77-170.compute-1.amazonaws.com  (23.21.77.170:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-iad3.fbcdn.net  (31.13.69.203:443)

TCP (HTTP):
Connects to ec2-54-221-254-214.compute-1.amazonaws.com  (54.221.254.214:80)

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP):
Connects to a23-215-105-10.deploy.static.akamaitechnologies.com  (23.215.105.10:80)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-lga3.facebook.com  (31.13.71.36:443)

TCP (HTTP):
Connects to ec2-54-225-145-152.compute-1.amazonaws.com  (54.225.145.152:80)

TCP (HTTP SSL):
Connects to edge-video-shv-01-iad3.fbcdn.net  (31.13.69.202:443)

TCP (HTTP SSL):
Connects to a23-209-86-161.deploy.static.akamaitechnologies.com  (23.209.86.161:443)

TCP (HTTP SSL):
Connects to ieonlinews.microsoft.com  (131.253.34.240:443)

TCP (HTTP SSL):
Connects to edge-star-shv-01-lga3.facebook.com  (31.13.71.1:443)

TCP (HTTP):
Connects to ec2-50-17-224-168.compute-1.amazonaws.com  (50.17.224.168:80)

TCP (HTTP):
Connects to ec2-50-17-217-59.compute-1.amazonaws.com  (50.17.217.59:80)

TCP (HTTP):
Connects to ec2-23-23-122-91.compute-1.amazonaws.com  (23.23.122.91:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-ort2.fbcdn.net  (157.240.2.25:443)

TCP (HTTP):
Connects to ec2-54-204-8-133.compute-1.amazonaws.com  (54.204.8.133:80)

TCP (HTTP):
Connects to ec2-23-23-102-70.compute-1.amazonaws.com  (23.23.102.70:80)

TCP (HTTP SSL):
Connects to bn2b-cor004.api.p001.1drv.com  (131.253.14.229:443)

TCP (HTTP SSL):
Connects to qt-in-f189.1e100.net  (209.85.232.189:443)

Remove client.exe - Powered by Reason Core Security