PastaLeadsService.exe

PastaLeadsService

One Call Ltd

The application PastaLeadsService.exe by One Call has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This executable runs as a local area network (LAN) Internet proxy server listening on port 8800 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. This file is typically installed with the program PastaQuotes by One Call Ltd which is a potentially unwanted software program. While running, it connects to the Internet address mq-api-b2b-dtc-mapquest-a.evip.aol.com on port 80 using the HTTP protocol.
Publisher:
One Call Ltd  (signed and verified)

Product:
PastaLeadsService

Version:
1.2.1.0

MD5:
ec930faa49d6e95a2e9436a5b91bb385

SHA-1:
71322a403c2f3aec99202cbf3e1c207f780a8242

SHA-256:
94d7e3b56665dbfc11bc2ddf92465221183163df56f595503e73e7a6987c6e52

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/28/2024 2:52:02 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.OneCall.R
14.6.24.10

File size:
375.4 KB (384,408 bytes)

Product version:
1.2.1.0

Copyright:
Onecall LTD © 2014

Original file name:
PastaLeadsService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\pastaleads\pastaleadsservice.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
12/30/2013 7:00:00 PM

Valid to:
12/31/2014 6:59:59 PM

Subject:
CN=One Call Ltd, O=One Call Ltd, STREET=Zarhin 10, L=Raanana, S=IL, PostalCode=12345, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3319A851B8E5EE29CCF776BCF148B091

File PE Metadata
Compilation timestamp:
6/18/2014 3:43:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:3AAK2x8gHVg8potIzAGtLbNQdEHEtouRyV+BNWnz:w48gHVh2tIzAGBbNzwbEz

Entry address:
0x5DBBE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7677

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
367 KB (375,808 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:8800/

Local host port:
8800

Default credentials:
No


The file PastaLeadsService.exe has been discovered within the following program.

PastaQuotes  by One Call Ltd
PastaQuotes/PastaLeads is an web browser advertisement extension that delivers ads to the user's web browser. Ads are in the form of traditional banners as well as context-hyper links.
84% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to yts2.yql.vip.bf1.yahoo.com  (98.137.201.232:443)

TCP (HTTP):
Connects to server-216-137-43-246.dfw3.r.cloudfront.net  (216.137.43.246:80)

TCP (HTTP):
Connects to server-216-137-43-159.dfw3.r.cloudfront.net  (216.137.43.159:80)

TCP (HTTP):
Connects to phx2-dw-cbsi-xw-lb.cnet.com  (216.239.120.246:80)

TCP (HTTP):
Connects to mq-api-b2b-dtc-mapquest-a.evip.aol.com  (205.188.201.198:80)

TCP (HTTP):
Connects to gamespot-www-vip1.phx2.cbsig.net  (64.30.228.81:80)

TCP (HTTP):
Connects to ec2-54-241-191-238.us-west-1.compute.amazonaws.com  (54.241.191.238:80)

TCP (HTTP):
Connects to ec2-54-241-191-237.us-west-1.compute.amazonaws.com  (54.241.191.237:80)

TCP (HTTP):
Connects to ec2-54-236-3-172.compute-1.amazonaws.com  (54.236.3.172:80)

TCP (HTTP):
Connects to ec2-54-236-3-169.compute-1.amazonaws.com  (54.236.3.169:80)

TCP (HTTP):
Connects to ec2-54-236-131-101.compute-1.amazonaws.com  (54.236.131.101:80)

TCP (HTTP):
Connects to ec2-54-191-226-112.us-west-2.compute.amazonaws.com  (54.191.226.112:80)

TCP (HTTP):
Connects to ec2-50-19-244-191.compute-1.amazonaws.com  (50.19.244.191:80)

TCP (HTTP):
Connects to ec2-50-17-196-36.compute-1.amazonaws.com  (50.17.196.36:80)

TCP (HTTP):
Connects to ec2-184-73-221-34.compute-1.amazonaws.com  (184.73.221.34:80)

TCP (HTTP SSL):
Connects to dfw06s27-in-f6.1e100.net  (173.194.46.6:443)

TCP (HTTP):
Connects to dfw06s27-in-f0.1e100.net  (173.194.46.0:80)

TCP (HTTP SSL):
Connects to den03s06-in-f9.1e100.net  (74.125.225.201:443)

TCP (HTTP SSL):
Connects to den03s06-in-f8.1e100.net  (74.125.225.200:443)

TCP (HTTP SSL):
Connects to den03s06-in-f5.1e100.net  (74.125.225.197:443)

Remove PastaLeadsService.exe - Powered by Reason Core Security