Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

10,5,3,4405 43.75%
10,5,2,4379 6.25%
10,5,1,4369 6.25%
10,5,0,4339 6.25%
10,4,49,4168 12.50%
10,4,47,4163 6.25%
10,2,21,3698 18.75%

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegOpenKeyExW, RegCreateKeyExW, RegDeleteKeyW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegDeleteValueW, RegisterEventSourceA, ReportEventA, DeregisterEventSource, RegCloseKey, RegSetValueExW, RegQueryInfoKeyW, CryptGetHashParam, CryptHashData, CryptReleaseContext, CryptDestroyKey, CryptEncrypt, CryptDecrypt, CryptAcquireContextW, CryptGenKey, CryptExportKey, CryptImportKey, InitiateSystemShutdownExW, OpenSCManagerW, OpenServiceW, CloseServiceHandle, CryptCreateHash, RegEnumKeyExW, SetSecurityInfo, RegQueryValueExW, QueryServiceStatusEx, AddAccessAllowedAce, InitializeAcl, GetLengthSid, MakeSelfRelativeSD, FreeSid, AllocateAndInitializeSid, CryptDestroyHash
comctl32.dll
ImageList_GetIconSize, ImageList_Draw
comdlg32.dll
GetOpenFileNameW
dbghelp.dll
MiniDumpWriteDump
gdi32.dll
CombineRgn, CreateRoundRectRgn, CreateRectRgn, CreateDCA, DeleteDC, GetBitmapBits, BitBlt, GetObjectA, SelectObject, CreateCompatibleBitmap, GetDeviceCaps, CreateCompatibleDC, DeleteObject
htmlayout.dll
HTMLayoutScrollToView, HTMLayoutSetCallback, HTMLayoutWindowAttachEventHandler, HTMLayoutLoadHtmlEx, HTMLayoutLoadFile, HTMLayoutFindElement, _HTMLayoutSetMediaVars@8, ValueSetValueToKey, HTMLayoutDataReady, HTMLayoutProcND, HTMLayoutGetMinHeight, HTMLayoutGetMinWidth, HTMLayoutUpdateWindow, HTMLayoutUpdateElement, HTMLayout_UnuseElement, HTMLayoutSelectParent, HTMLayoutGetElementState, ValueInit, ValueClear, ValueCopy, ValueIntDataSet, HTMLayoutControlGetValue, HTMLayoutControlSetValue, ValueFloatDataSet, ValueIntData, HTMLayoutGetAttributeByName, HTMLayoutSetElementState, ValueStringDataSet, ValueStringData, ValueToString, HTMLayoutGetElementInnerTextCB, ValueNthElementValue, HTMLayoutCallBehaviorMethod, HTMLayoutParseValue, ValueElementsCount, ValueNthElementValueSet, HTMLayoutGetElementHwnd, HTMLayoutGetElementByUID, HTMLayoutGetRootElement, HTMLayoutCloneElement, HTMLayoutGetParentElement, HTMLayoutGetElementIndex, HTMLayoutGetStyleAttribute, HTMLayoutGetChildrenCount, HTMLayoutGetNthChild, HTMLayoutPostEvent, HTMLayoutInsertElement, HTMLayoutDetachElement, ValueInt64DataSet, ValueInt64Data, HTMLayoutSetElementInnerText16, HTMLayoutSetElementHtml, HTMLayoutGetElementHtmlCB, HTMLayoutUpdateElementEx, HTMLayoutSetAttributeByName, HTMLayoutSetStyleAttribute, HTMLayoutCreateElement, HTMLayoutSelectElements, HTMLayoutTrackPopupAt, HTMLayout_UseElement
iphlpapi.dll
GetNumberOfInterfaces, GetAdaptersInfo, GetIfEntry, GetIfTable
kernel32.dll
DllMain
ole32.dll
CoCreateInstance, CoResumeClassObjects, CoAddRefServerProcess, StringFromGUID2, CoInitialize, OleRun, CoCreateGuid, CoTaskMemFree, CoRegisterClassObject, CoRevokeClassObject, CoTaskMemRealloc, CoTaskMemAlloc, CoUninitialize, CoReleaseServerProcess, CoInitializeEx
rpcrt4.dll
NdrOleAllocate, NdrStubCall2, NdrDllUnregisterProxy, NdrDllRegisterProxy, NdrCStdStubBuffer2_Release, NdrCStdStubBuffer_Release, NdrDllCanUnloadNow, NdrDllGetClassObject, NdrOleFree, IUnknown_QueryInterface_Proxy, IUnknown_Release_Proxy, NdrStubForwardingFunction, IUnknown_AddRef_Proxy
secur32.dll
GetUserNameExW
shell32.dll
SHGetSpecialFolderPathW, ShellExecuteW, SHGetFileInfoW, Shell_NotifyIconW, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHGetPathFromIDListW, SHBrowseForFolderW
shlwapi.dll
PathFileExistsW, StrRetToStrW
user32.dll
DefWindowProcW, GetWindowLongW, SetWindowLongW, DispatchMessageW, TranslateMessage, GetMessageW, CreateWindowExW, RegisterClassW, GetClientRect, MapWindowPoints, PeekMessageW, CreatePopupMenu, LoadStringW, LoadStringA, AppendMenuW, PostQuitMessage, DestroyMenu, GetSystemMenu, ScreenToClient, IntersectRect, EnumDisplayMonitors, SetWindowPlacement, GetWindowPlacement, InflateRect, PtInRect, SetWindowRgn, RegisterDeviceNotificationW, DestroyWindow, RegisterClassExW, GetClassInfoExW, SendMessageW, ExitWindowsEx, IsWindowVisible, CharNextW, CharUpperW, PostThreadMessageW, GetMonitorInfoW, LoadIconW, GetSystemMetrics, SetWindowPos, ShowWindowAsync, IsWindow, PostMessageW, GetWindowThreadProcessId, GetWindow, GetParent, SetWindowTextW, SetParent, EndDialog, DialogBoxIndirectParamW, RegisterWindowMessageW, GetUserObjectInformationW, GetProcessWindowStation, MessageBoxA, DestroyIcon, LoadImageW, UpdateWindow, TrackPopupMenu, MonitorFromWindow, wsprintfW, IsZoomed, GetCursorPos, SystemParametersInfoW, GetDesktopWindow, GetWindowRect, IsIconic, ShowWindow, SetForegroundWindow
wininet.dll
InternetCheckConnectionW, HttpOpenRequestW, HttpSendRequestW, InternetOpenW, InternetSetOptionW, InternetConnectW, InternetReadFile, HttpQueryInfoW, InternetCloseHandle
ws2_32.dll
freeaddrinfo, getaddrinfo

AdAware.exe

Ad-Aware Antivirus by Lavasoft Limited (Signed)

Remove AdAware.exe
Version:   10,5,0,4339
MD5:   50261b6ada5427aed214bddd3780f28b
SHA1:   4b4a4b255e3c877215ac98b6045e53f40bd664cd
SHA256:   a97a65e1d43137b53dc5fc8e3ea4e71e7090a6c19de13fa9af02dbe87c28208a

What is AdAware.exe?

Ad-Aware Antivirus is part of Ad-Aware, an anti-spyware and anti-virus program developed by Lavasoft that detects and removes malware, spyware and adware on a user's computer. According to Lavasoft, Ad-Aware detects spyware, computer viruses, dialers, Trojans, bots, rootkits, data miners, aggressive advertising, parasites, browser hijackers, and tracking components.

About AdAware.exe (from Lavasoft Limited)

Built upon our legendary anti-spyware and antivirus protection, Ad-Aware real-time web-filtering technology safeguards your PC against phishing attacks and online scams, allowing you to stay protected

DetailsDetails

File name:AdAware.exe
Publisher:Lavasoft Limited
Product name:Ad-Aware Antivirus
Typical file path:C:\Program Files\Ad-Aware Antivirus\AdAware.exe
Original name:Ad-Aware Antivirus.exe
File version:10,5,0,4339
Size:17.94 MB (18,814,304 bytes)
Certificate
Issued to:Lavasoft Limited
Authority (CA):VeriSign
Digital DNA
File packed:No
.NET CLR:No
More details
Network connections
  • [TCP] 50.56.48.215:80

  • ResourcesResource utilization

    (Note: statistics below are averages based on a minimum sample size of 200 unique participants)
    Averages
     
    CPU
    Total CPU:0.00063606%
    0.028634%
    Kernel CPU:0.00029056%
    0.013761%
    User CPU:0.00034550%
    0.014873%
    Kernel CPU time:14,789 ms/min
    100,923,805ms/min
    CPU cycles:4,597,016/sec
    17,470,203/sec
    Memory
    Private memory:32.64 MB
    21.59 MB
    Private (maximum):50.34 MB
    Private (minimum):48.67 MB
    Non-paged memory:32.64 MB
    21.59 MB
    Virtual memory:181.9 MB
    140.96 MB
    Virtual memory (peak):200.52 MB
    169.69 MB
    Working set:49.8 MB
    18.61 MB
    Working set (peak):50.73 MB
    37.95 MB
    Page faults:19,761/min
    2,039/min
    I/O
    I/O read transfer:551 Bytes/sec
    1.02 MB/min
    I/O read operations:1/sec
    343/min
    I/O write transfer:24 Bytes/sec
    274.99 KB/min
    I/O write operations:1/sec
    227/min
    I/O other transfer:526 Bytes/sec
    448.09 KB/min
    I/O other operations:2/sec
    1,671/min
    Resource allocations
    Threads:13
    12
    Handles:323
    600
    GUI GDI count:487
    103
    GUI GDI peak:491
    142
    GUI USER count:99
    49
    GUI USER peak:171
    71

    BehaviorsProcess properties

    Tray notification:Yes
    Integrety level:Medium
    Platform:64-bit
    Command line:C:\progra~2\ad-awa~1\adaware.exe --run-from-service --silent
    Owner:User
    Parent process:adawareservice.exe (Ad-Aware Antivirus Service by Lavasoft Limited)

    ResourcesThreads

    Averages
     
    AdAware.exe (main module)
    Total CPU:0.00558573%
    0.272967%
    Kernel CPU:0.00151806%
    0.107585%
    User CPU:0.00406766%
    0.165382%
    CPU cycles:653,464/sec
    5,741,424/sec
    Context switches:28/sec
    79/sec
    Memory:18 MB
    1.16 MB
    ntdll.dll
    Total CPU:0.00004600%
    Kernel CPU:0.00003450%
    User CPU:0.00001150%
    CPU cycles:387/sec
    Memory:1.66 MB
    wow64.dll (Win32 Emulation on NT64 by Microsoft)
    Total CPU:0.00001151%
    Kernel CPU:0.00001151%
    User CPU:0.00000000%
    CPU cycles:576/sec
    Memory:252 KB

    Common loaded modules

    These are modules that are typiclaly loaded within the context of this process.

    Windows OS versionsDistribution by Windows OS

    OS versiondistribution
    Windows 7 Ultimate 31.25%
    Windows 7 Professional 25.00%
    Windows 7 Home Premium 18.75%
    Windows 8 Pro 12.50%
    Microsoft Windows XP 12.50%

    Distribution by countryDistribution by country

    United States installs about 81.25% of Ad-Aware Antivirus.

    OEM distributionDistribution by PC manufacturer

    PC Manufacturerdistribution
    Hewlett-Packard 33.33%
    Dell 33.33%
    Acer 16.67%
    GIGABYTE 16.67%
    Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

    Download it for FREE