PastaLeadsService.exe

PastaLeadsService

One Call Ltd

The application PastaLeadsService.exe by One Call has been detected as adware by 4 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 8800 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. This file is typically installed with the program PastaQuotes by One Call Ltd which is a potentially unwanted software program. While running, it connects to the Internet address 91.220.197.104.bc.googleusercontent.com on port 80 using the HTTP protocol.
Publisher:
One Call Ltd  (signed and verified)

Product:
PastaLeadsService

Version:
1.2.1.1

MD5:
85797106d72f6277cfbd6d6222b2a480

SHA-1:
290657dcc4bd4d353bd7c84289bdd92e73321c35

SHA-256:
a97043fa920a3fd2f240080feb207d8a7bd8d1ace94c88ea4198b623e4a875e0

Scanner detections:
4 / 68

Status:
Adware

Analysis date:
4/24/2024 7:21:38 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Pasta.5
9.0.1.05190

Malwarebytes
PUP.Optional.PastaLeads.A
v2014.09.16.09

Reason Heuristics
PUP.OneCall.R
14.9.16.21

Trend Micro House Call
Suspicious_GEN.F47V0821
7.2.322

File size:
375.9 KB (384,920 bytes)

Product version:
1.2.1.1

Copyright:
Onecall LTD © 2014

Original file name:
PastaLeadsService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\pastaleads\pastaleadsservice.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
12/30/2013 7:00:00 PM

Valid to:
12/31/2014 6:59:59 PM

Subject:
CN=One Call Ltd, O=One Call Ltd, STREET=Zarhin 10, L=Raanana, S=IL, PostalCode=12345, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3319A851B8E5EE29CCF776BCF148B091

File PE Metadata
Compilation timestamp:
9/1/2014 2:59:49 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:QY9bNMYpVPqCK70MwP5oXBf8Ni6IQtY8+dx7RPhdbDjTyVvBdAnQ:lLtpVPFo0MwPGxf8I6IQtXUjvIiQ

Entry address:
0x5DCBE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7658

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
367.5 KB (376,320 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:8800/

Local host port:
8800

Default credentials:
No


The file PastaLeadsService.exe has been discovered within the following program.

PastaQuotes  by One Call Ltd
PastaQuotes/PastaLeads is an web browser advertisement extension that delivers ads to the user's web browser. Ads are in the form of traditional banners as well as context-hyper links.
84% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to msnbot-65-55-252-43.search.msn.com  (65.55.252.43:443)

TCP (HTTP):
Connects to 94.31.29.8.IPYX-077437-ZYO.above.net  (94.31.29.8:80)

TCP (HTTP SSL):
Connects to yv-in-f95.1e100.net  (74.125.21.95:443)

TCP (HTTP SSL):
Connects to yv-in-f94.1e100.net  (74.125.21.94:443)

TCP (HTTP SSL):
Connects to yv-in-f139.1e100.net  (74.125.21.139:443)

TCP (HTTP SSL):
Connects to yv-in-f138.1e100.net  (74.125.21.138:443)

TCP (HTTP SSL):
Connects to yk-in-f132.1e100.net  (74.125.196.132:443)

TCP (HTTP SSL):
Connects to ya-in-f101.1e100.net  (173.194.219.101:443)

TCP (HTTP):
Connects to www.dailymotion.com  (195.8.215.136:80)

TCP (HTTP):
Connects to video.sj2.vcmedia.com  (64.156.167.69:80)

TCP (HTTP):
Connects to track-eu.adform.net  (37.157.6.226:80)

TCP (HTTP):
Connects to server-54-230-7-59.dfw3.r.cloudfront.net  (54.230.7.59:80)

TCP (HTTP):
Connects to server-54-230-6-92.dfw3.r.cloudfront.net  (54.230.6.92:80)

TCP (HTTP):
Connects to server-54-230-122-81.dfw50.r.cloudfront.net  (54.230.122.81:80)

TCP (HTTP):
Connects to server-54-230-122-80.dfw50.r.cloudfront.net  (54.230.122.80:80)

TCP (HTTP):
Connects to server-54-192-6-154.dfw3.r.cloudfront.net  (54.192.6.154:80)

TCP (HTTP):
Connects to server-54-192-6-114.dfw3.r.cloudfront.net  (54.192.6.114:80)

TCP (HTTP):
Connects to server-52-85-202-245.dfw50.r.cloudfront.net  (52.85.202.245:80)

TCP (HTTP):
Connects to server-216-137-43-7.dfw3.r.cloudfront.net  (216.137.43.7:80)

Remove PastaLeadsService.exe - Powered by Reason Core Security