Client.exe

Software Jockey

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Software Jockey has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 56962 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and RocketTab: by Adknowledge, Inc., both potentially unwanted software.
Publisher:
Software Jockey  (signed and verified)

Version:
1.0.5354.23631

MD5:
f18c81236903f7a67b2d48d627423b12

SHA-1:
dfcd2e6574f9a816e365c1be4c82473433a74e9d

SHA-256:
dacf8cb856ee31552c9ac27c7c124cafb6cafa67c93f8f46133c744c9f19c647

Scanner detections:
5 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/18/2018 3:57:55 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.MSIL.iBryte
4.0.3.1499

Comodo Security
ApplicUnwnt
19406

ESET NOD32
MSIL/Adware.iBryte.F application
7.0.302.0

Reason Heuristics
Adware.RocketTab.SoftwareJockey.G
14.9.10.17

VIPRE Antivirus
Threat.4778314
32210

File size:
1.4 MB (1,420,520 bytes)

Product version:
1.0.5354.23631

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\Program Files\rockettab\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=Software Jockey, O=Software Jockey, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3481FC293A085AD3BA94D30DC9CC2E95

File PE Metadata
Compilation timestamp:
8/29/2014 10:08:01 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:xGAe6OxV5Ejy5rNs06SS8itaMo5C5++HGxh26ftpF8XnjZpIO:dEh02P6SSzb5+4Gf1/FEYO

Entry address:
0x15134A

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.1035

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,373,184 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:56962/

Local host port:
56962

Default credentials:
No


The file Client.exe has been discovered within the following programs.

Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
RocketTab:  by Adknowledge, Inc.
RocketTab is an advertising supported browser extension also known as adware and is designed to deliver ads to the user's Internet browser as banners, context text-links and transitionals ads. The injected ads are not affiliated with the underlying website on which they appear.
www.adknowledge.com
87% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to cf-199-27-134-48.cloudflare.com  (199.27.134.48:8080)

TCP (HTTP):
Connects to vip1.g.cachefly.net  (205.234.175.175:80)

TCP (HTTP SSL):
Connects to syd01s13-in-f7.1e100.net  (74.125.237.135:443)

TCP (HTTP):
Connects to snt-re4-6d.sjc.dropbox.com  (108.160.163.100:80)

TCP (HTTP):
Connects to server-54-239-172-193.atl50.r.cloudfront.net  (54.239.172.193:80)

TCP (HTTP):
Connects to server-54-230-38-228.jfk1.r.cloudfront.net  (54.230.38.228:80)

TCP (HTTP):
Connects to server-54-230-142-130.sfo5.r.cloudfront.net  (54.230.142.130:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.12.73:80)

TCP (HTTP):
Connects to r-079-062-045-005.ff.avast.com  (5.45.62.79:80)

TCP (HTTP SSL):
Connects to ord08s11-in-f19.1e100.net  (173.194.46.83:443)

TCP (HTTP):
Connects to ord08s08-in-f20.1e100.net  (74.125.225.116:80)

TCP (HTTP SSL):
Connects to nuq05s02-in-f20.1e100.net  (74.125.239.148:443)

TCP (HTTP SSL):
Connects to lax02s20-in-f5.1e100.net  (74.125.224.133:443)

TCP (HTTP SSL):
Connects to lax02s20-in-f1.1e100.net  (74.125.224.129:443)

TCP (HTTP):
Connects to lax02s01-in-f25.1e100.net  (74.125.224.185:80)

TCP (HTTP SSL):
Connects to lax02s01-in-f1.1e100.net  (74.125.224.161:443)

TCP (HTTP SSL):
Connects to h211.155.30.69.static.ip.windstream.net  (69.30.155.211:443)

TCP (HTTP SSL):
Connects to h177.155.30.69.static.ip.windstream.net  (69.30.155.177:443)

TCP (HTTP):
Connects to gum.gingersoftware.com  (173.231.146.227:80)

Remove Client.exe - Powered by Reason Core Security