panda_url_filtering.exe

Anti-phishing Domain Advisor (Powered by Panda Security)

Visicom Media Inc.

This is part of the Visicom VMN web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application panda_url_filtering.exe by Visicom Media has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘Panda Security URL Filtering’. This file is typically installed with the program Panda Security URL Filtering by Panda Security.
Publisher:
Visicom Media Inc.  (signed and verified)

Product:
Anti-phishing Domain Advisor (Powered by Panda Security)

Version:
1, 0, 0, 0

MD5:
1f9670cfb8c3dc3bda53778051a9075e

SHA-1:
92ba6a62995274b48b1592d01ab0d4978cfd42d0

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/25/2024 12:21:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Startup.VisicomMedia.T
14.10.1.11

File size:
229.6 KB (235,072 bytes)

Product version:
1.0

Copyright:
Copyright (C) 2014 Visicom Media Inc.

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\Application data\panda security url filtering\panda_url_filtering.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
4/18/2012 4:00:00 AM

Valid to:
6/22/2014 3:59:59 AM

Subject:
CN=Visicom Media Inc., OU=SECURE APPLICATION DEVELOPMENT, O=Visicom Media Inc., L=Brossard, S=Quebec, C=CA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
2B19B54BB7ABEE1A2623111C029AF449

File PE Metadata
Compilation timestamp:
6/14/2013 10:29:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:0E2zcKmMEiki96f7vXBMEiaQ4lHKJ8sYEUY6GlP6TwTlxnBj51UWMCpwkk8FvLtO:N23XEgC+EiaQ8HK5YlzkVj6Mwk0RDr

Entry address:
0x12B02

Entry point:
E8, D8, 7E, 00, 00, E9, 78, FE, FF, FF, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C...
 
[+]

Code size:
129.5 KB (132,608 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Panda Security URL Filtering

Command:
"C:\Documents and Settings\{user}\Application data\panda security url filtering\panda_url_filtering.exe"


The file panda_url_filtering.exe has been discovered within the following programs.

Panda Security URL Filtering  by Panda Security
The Panda Security Toolbar is a free optional toolbar that comes with Panda Cloud. The toolbar provides web filtering along with some features that may come in handy for users. The toolbar works on Internet Explorer and Firefox only.
60% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to visicom-101.nationalnet.com  (69.50.130.31:80)

TCP (HTTP):
Connects to visicom-102.nationalnet.com  (69.50.130.33:80)

TCP (HTTP):
Connects to bto-04-082.bto.ras.cantv.net  (200.44.23.210:80)

TCP (HTTP):
Connects to TIG-Net17-20.trueintergateway.com  (27.123.17.20:80)

TCP (HTTP):
Connects to TIG-Net17-102.trueintergateway.com  (27.123.17.102:80)

TCP (HTTP):
Connects to cpe-181-47-248-237.telecentro-reversos.com.ar  (181.47.248.237:80)

TCP (HTTP):
Connects to cpe-181-47-248-216.telecentro-reversos.com.ar  (181.47.248.216:80)

TCP (HTTP):
Connects to cpe-181-44-74-168.telecentro-reversos.com.ar  (181.44.74.168:80)

TCP (HTTP):
Connects to a72-247-210-34.deploy.akamaitechnologies.com  (72.247.210.34:80)

TCP (HTTP):
Connects to 61-91-166-62.static.asianet.co.th  (61.91.166.62:80)

TCP (HTTP):
Connects to dh-in-f94.1e100.net  (209.85.203.94:80)

TCP (HTTP):
Connects to dg-in-f94.1e100.net  (209.85.202.94:80)

TCP (HTTP):
Connects to dg-in-f106.1e100.net  (209.85.202.106:80)

TCP (HTTP):
Connects to cpe-181-47-248-88.telecentro-reversos.com.ar  (181.47.248.88:80)

TCP (HTTP):
Connects to cpe-181-47-248-221.telecentro-reversos.com.ar  (181.47.248.221:80)

TCP (HTTP):
Connects to cpe-181-44-74-153.telecentro-reversos.com.ar  (181.44.74.153:80)

TCP (HTTP):
Connects to a84-53-132-11.deploy.akamaitechnologies.com  (84.53.132.11:80)

TCP (HTTP):

Remove panda_url_filtering.exe - Powered by Reason Core Security