Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

9, 4, 0, 0 16.67%
9, 2, 0, 0 83.33%

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
GetUserNameA, RegQueryValueExA, RegQueryValueExW, RegOpenKeyExA, DuplicateToken, ImpersonateLoggedOnUser, GetSecurityDescriptorSacl, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetSecurityDescriptorSacl, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExW, RegCloseKey
icl_trf.dll
ICL_TRF_InicializarProtocolosCorreo
kernel32.dll
GetStartupInfoA, WaitNamedPipeA, CreateNamedPipeA, InterlockedIncrement, PeekNamedPipe, CancelIo, FlushFileBuffers, DisconnectNamedPipe, ReadFile, WriteFile, GetOverlappedResult, ResetEvent, WaitForMultipleObjects, LeaveCriticalSection, EnterCriticalSection, LoadLibraryExA, OpenEventA, GetACP, WaitForSingleObject, ReleaseMutex, GetTickCount, FreeLibrary, CloseHandle, GetLastError, OpenProcess, GetProcAddress, LoadLibraryA, SetLastError, GetCurrentProcess, GetCurrentThread, GetVersionExA, LocalFree, InitializeCriticalSection, DeleteCriticalSection, CreateMutexA, CreateSemaphoreA, Sleep, SetThreadPriority, CreateThread, SetEvent, TerminateProcess, TerminateThread, CreateEventA, GetCurrentProcessId, GetModuleHandleA, lstrlenA, lstrcpynA, GetShortPathNameA, GetModuleFileNameA, DeleteFileA, CreateFileA, WideCharToMultiByte, MultiByteToWideChar, ConnectNamedPipe
msvcp71.dll
DllMain
msvcr71.dll
DllMain
pskas.dll
MFS_SetConfigInt, MFS_InitializeMsgFilteringSubsystem, AVS_InitializeAntiviralSubsystem, MDFS_InitializeMalwareDefinitionFileSubsystem, ADS_SetConfigInt, ADS_GetLastError, ADS_InitializeAnomalyDetectionSubsystem, AVS_GetLastError, UFTS_InitializeURLFilteringSubsystem, FSS_InitializeFileScanningSubsystem, AS_InitializeAnalysisSystem, AS_FreeAnalysisSystem
shell32.dll
SHGetFolderPathW, SHCreateDirectoryExW
user32.dll
CharUpperA, CharPrevA
wpapi.dll
ICL_CFG_CrearMemoriaCompartida, ICL_CFG_SetCfg, ICL_CFG_GetCfg
ws2_32.dll
WSAIoctl, WSASocketA

webproxy.exe

Panda residents by Panda Security S.L (Signed)

Remove webproxy.exe
Version:   9, 4, 0, 0
MD5:   e196df9b4da221a263b6ec7f0cfcd542
SHA1:   e74a4396a56ea74425b343187b61b8fa328cb27c

Overview

webproxy.exe executes as a process under the SYSTEM account with extensive privileges (the system and the administrator accounts have the same file privileges) typically within the context of its parent tpsrvwow.exe (Panda Technologies by Panda Security S.L). The file is digitally signed by Panda Security S.L which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:webproxy.exe
Publisher:Panda Security
Product name:Panda residents
Description:Internet resident proxy
Typical file path:C:\Program Files\panda security\panda global protection 2013\webproxy.exe
File version:9, 4, 0, 0
Size:105.97 KB (108,512 bytes)
Build date:7/4/2013 8:35 AM
Certificate
Issued to:Panda Security S.L
Authority (CA):VeriSign
Effective date:Thursday, May 5, 2011
Expiration date:Thursday, July 5, 2012
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 7.1
.NET CLR:No
More details
Network connections
  • [TCP] 84.39.152.33:80
  • [UDP] listens on port 18002

  • ResourcesResource utilization

    (Note: statistics below are averages based on a minimum sample size of 200 unique participants)
    Averages
     
    CPU
    Total CPU:0.00232530%
    0.028634%
    Kernel CPU:0.00124105%
    0.013761%
    User CPU:0.00108425%
    0.014873%
    Kernel CPU time:4,056,494,003 ms/min
    100,923,805ms/min
    Memory
    Private memory:75.98 MB
    21.59 MB
    Private (maximum):91.84 MB
    Private (minimum):828 KB
    Non-paged memory:75.98 MB
    21.59 MB
    Virtual memory:330.07 MB
    140.96 MB
    Virtual memory (peak):677.83 MB
    169.69 MB
    Working set:3.98 MB
    18.61 MB
    Working set (peak):125.16 MB
    37.95 MB
    Resource allocations
    Threads:54
    12
    Handles:695
    600

    BehaviorsProcess properties

    Integrety level:System
    Platform:64-bit
    Command line:"C:\Program Files\panda security\panda internet security 2014\webproxy.exe" oso_xgcglr
    Owner:SYSTEM
    Parent process:tpsrvwow.exe (Panda Technologies by Panda Security S.L)

    Windows OS versionsDistribution by Windows OS

    OS versiondistribution
    Windows 7 Ultimate 33.33%
    Windows 7 Home Premium 16.67%
    Windows 7 Professional 16.67%
    Microsoft Windows XP 16.67%
    Windows 8 16.67%

    Distribution by countryDistribution by country

    Italy installs about 16.67% of Panda residents.

    OEM distributionDistribution by PC manufacturer

    PC Manufacturerdistribution
    Hewlett-Packard 28.57%
    Dell 28.57%
    Sony 28.57%
    GIGABYTE 14.29%
    Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

    Download it for FREE