plsapp.exe

plsapp.exe

Sendori, LLC

This is part of the Sendori web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application plsapp.exe by Sendori has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “plsapp”. This file is typically installed with the program PureLeads by Sendori, LLC which is a potentially unwanted software program.
Publisher:
Sendori  (signed by Sendori, LLC)

Product:
plsapp.exe

Version:
2.2.7.6

MD5:
f3a511e63bb04ec243bc80f3c8633bf4

SHA-1:
d0aa9c701934b9542ecf42b6a4bc8fb34eb16d7b

SHA-256:
bf966e21352779a2f3333344446f4ada9dbec65d149707f15bb62262afbe7ed6

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
10/24/2017 7:01:25 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Service.Sendori.G
14.8.7.19

File size:
3.5 MB (3,690,784 bytes)

Product version:
2.2.7.6

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\pureleads\plsapp.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/9/2013 4:00:00 PM

Valid to:
12/10/2014 3:59:59 PM

Subject:
CN="Sendori, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Sendori, LLC", L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
310642A25A6D9FB4A7E88E32D87A345F

File PE Metadata
Compilation timestamp:
11/13/2013 4:39:39 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:/Nbg1mPrW5AjWGFdjNjMvSMu2jv3FhHhZ6ITTVf1i6Fgn5JTIzp/Vp6I+:/NU3uWvSx2jv1hHf6ITJfjVVAp

Entry address:
0x14654D

Entry point:
E8, F5, 2F, 01, 00, E9, 78, FE, FF, FF, 6A, 10, 68, 88, 8F, 75, 00, E8, C5, 12, 00, 00, 8B, 5D, 08, 85, DB, 75, 0E, FF, 75, 0C, E8, 0C, D0, FF, FF, 59, E9, CC, 01, 00, 00, 8B, 75, 0C, 85, F6, 75, 0C, 53, E8, C3, D0, FF, FF, 59, E9, B7, 01, 00, 00, 83, 3D, 80, 56, 77, 00, 03, 0F, 85, 93, 01, 00, 00, 33, FF, 89, 7D, E4, 83, FE, E0, 0F, 87, 8A, 01, 00, 00, 6A, 04, E8, 37, 5F, 00, 00, 59, 89, 7D, FC, 53, E8, 5B, 60, 00, 00, 59, 89, 45, E0, 3B, C7, 0F, 84, 9E, 00, 00, 00, 3B, 35, A8, 56, 77, 00, 77, 49, 56, 53...
 
[+]

Entropy:
5.9004

Code size:
2.8 MB (2,943,488 bytes)

Service
Display name:
plsapp

Description:
Sets and maintains plsapp LSP protection on this computer.

Type:
Win32OwnProcess

Depends on:
RPCSS


The file plsapp.exe has been discovered within the following program.

PureLeads  by Sendori, LLC
This adware program injects advertisements with its affiliate ad providers in order to serve a number of ad types including banner, inline text links and popups.
pureleads.com
72% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-192-7-222.dfw3.r.cloudfront.net  (54.192.7.222:443)

TCP (HTTP):
Connects to server-54-192-123-23.dfw50.r.cloudfront.net  (54.192.123.23:80)

TCP (HTTP SSL):
Connects to ec2-54-88-5-98.compute-1.amazonaws.com  (54.88.5.98:443)

TCP (HTTP):
Connects to ec2-184-72-59-219.us-west-1.compute.amazonaws.com  (184.72.59.219:80)

TCP (HTTP):
Connects to ec2-52-203-71-254.compute-1.amazonaws.com  (52.203.71.254:80)

TCP (HTTP SSL):
Connects to af.e0.559e.ip4.static.sl-reverse.com  (158.85.224.175:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-mxp1.fbcdn.net  (31.13.86.4:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-yyz1.facebook.com  (31.13.80.36:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-iad3.fbcdn.net  (31.13.69.203:443)

TCP (HTTP):
Connects to server-54-230-5-161.dfw3.r.cloudfront.net  (54.230.5.161:80)

TCP (HTTP):
Connects to get-du1.adobe.com  (193.104.215.66:80)

TCP (HTTP SSL):
Connects to edge-star-shv-01-yyz1.facebook.com  (31.13.80.8:443)

TCP (HTTP SSL):
Connects to edge-star-shv-01-mxp1.facebook.com  (31.13.86.8:443)

TCP (HTTP):
Connects to ec2-50-18-171-118.us-west-1.compute.amazonaws.com  (50.18.171.118:80)

TCP (HTTP SSL):
Connects to a23-221-38-17.deploy.static.akamaitechnologies.com  (23.221.38.17:443)

TCP (HTTP SSL):
Connects to a184-87-192-134.deploy.static.akamaitechnologies.com  (184.87.192.134:443)

TCP (HTTP):
Connects to 67-204-184-210.bendbroadband.com  (67.204.184.210:80)

TCP:
Connects to wb-in-f188.1e100.net  (66.102.1.188:5228)

TCP (HTTP SSL):
Connects to vip078.ssl.hwcdn.net  (205.185.208.78:443)

TCP (HTTP):
Connects to server-54-230-5-35.dfw3.r.cloudfront.net  (54.230.5.35:80)

Remove plsapp.exe - Powered by Reason Core Security