panda_url_filtering.exe

Anti-phishing Domain Advisor (Powered by Panda Security)

Visicom Media Inc.

This is part of the Visicom VMN web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application panda_url_filtering.exe by Visicom Media has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘Panda Security URL Filtering’. This file is typically installed with the program Panda Security URL Filtering by Panda Security.
Publisher:
Visicom Media Inc.  (signed and verified)

Product:
Anti-phishing Domain Advisor (Powered by Panda Security)

Version:
1, 0, 0, 0

MD5:
5c8f360bb6eac9e5aaa0b52be2009c33

SHA-1:
c5c42de9d18087ffa17ed6debe347c08deeb76bf

SHA-256:
fcbf8464c4b5aa61732a0ea964b630f7e3753088120f18680f7067125cdecd26

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/29/2024 12:18:50 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Startup.VisicomMedia.T
14.10.1.11

File size:
229.6 KB (235,072 bytes)

Product version:
1.0

Copyright:
Copyright (C) 2013 Visicom Media Inc.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\panda security url filtering\panda_url_filtering.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
4/18/2012 2:00:00 AM

Valid to:
6/22/2014 1:59:59 AM

Subject:
CN=Visicom Media Inc., OU=SECURE APPLICATION DEVELOPMENT, O=Visicom Media Inc., L=Brossard, S=Quebec, C=CA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
2B19B54BB7ABEE1A2623111C029AF449

File PE Metadata
Compilation timestamp:
6/14/2013 8:29:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:4E2zcKmMEiki96f7vXBMEiaQ4lHKJ8sYEUY6GlP6TwTlxnBj51UWMCpwkk8FvLtJ:p23XEgC+EiaQ8HK5YlzkVj6MwkvRDJ

Entry address:
0x12B02

Entry point:
E8, D8, 7E, 00, 00, E9, 78, FE, FF, FF, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C...
 
[+]

Entropy:
6.3213

Code size:
129.5 KB (132,608 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Panda Security URL Filtering

Command:
"C:\ProgramData\panda security url filtering\panda_url_filtering.exe"


The file panda_url_filtering.exe has been discovered within the following programs.

Panda Security URL Filtering  by Panda Security
The Panda Security Toolbar is a free optional toolbar that comes with Panda Cloud. The toolbar provides web filtering along with some features that may come in handy for users. The toolbar works on Internet Explorer and Firefox only.
60% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to visicom-102.nationalnet.com  (69.50.130.33:80)

TCP (HTTP):
Connects to visicom-101.nationalnet.com  (69.50.130.31:80)

TCP (HTTP):
Connects to a96-6-123-80.deploy.akamaitechnologies.com  (96.6.123.80:80)

TCP (HTTP):

TCP (HTTP):
Connects to a72-247-182-114.deploy.akamaitechnologies.com  (72.247.182.114:80)

TCP (HTTP):
Connects to 5-226-127-174.static.ip.netia.com.pl  (5.226.127.174:80)

TCP (HTTP):
Connects to 213-241-87-18.static.ip.netia.com.pl  (213.241.87.18:80)

TCP (HTTP):
Connects to cpe-181-47-248-236.telecentro-reversos.com.ar  (181.47.248.236:80)

TCP (HTTP):
Connects to cpe-181-47-248-109.telecentro-reversos.com.ar  (181.47.248.109:80)

TCP (HTTP):
Connects to cpe-181-44-74-168.telecentro-reversos.com.ar  (181.44.74.168:80)

TCP (HTTP):
Connects to BHE200150004223.redeinfovias.net.br  (200.150.4.223:80)

TCP (HTTP):
Connects to BHE200150004217.redeinfovias.net.br  (200.150.4.217:80)

TCP (HTTP):
Connects to a96-6-123-64.deploy.akamaitechnologies.com  (96.6.123.64:80)

TCP (HTTP):
Connects to a96-17-196-146.deploy.akamaitechnologies.com  (96.17.196.146:80)

TCP (HTTP):
Connects to a84-53-132-11.deploy.akamaitechnologies.com  (84.53.132.11:80)

TCP (HTTP):
Connects to a190-111-79-240.deploy.akamaitechnologies.com  (190.111.79.240:80)

TCP (HTTP):

TCP (HTTP):
Connects to a173-223-52-34.deploy.static.akamaitechnologies.com  (173.223.52.34:80)

TCP (HTTP):
Connects to a173-223-52-25.deploy.static.akamaitechnologies.com  (173.223.52.25:80)

TCP (HTTP):
Connects to a104-86-189-19.deploy.static.akamaitechnologies.com  (104.86.189.19:80)

Remove panda_url_filtering.exe - Powered by Reason Core Security