Home Malware Programs Adware Adanak

Adanak

Posted: June 26, 2014

Threat Metric

Ranking: 9,002
Threat Level: 2/10
Infected PCs: 4,586
First Seen: June 26, 2014
Last Seen: October 7, 2023
OS(es) Affected: Windows


Adanak is an adware program that may come from various sources over the internet. In some cases Adanak may be loaded by means of installing a freeware program or random bundled software applications. The ads that come from Adanak can be annoying. Many of the Adanak ads will redirect you to unwanted sites or pages that attempt to offer other products and services over the internet. Web browser applications may also suffer from reduced performance when Adanak has loaded and potentially installed various related plugins or add-on components. Removing the Adanak adware and its related files may require the use of an antimalware tool capable of detecting and deleting adware threats.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: 151d6719db8f5905389e9169aa4c99f4
Detection count: 92
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
Adanak.FirstRun.exe File name: Adanak.FirstRun.exe
Size: 1.12 MB (1123096 bytes)
MD5: 24c1d511714e1120169127611c91614f
Detection count: 70
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 1, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: 7a9d78c08b97d5d7c2123e1972ee6fe6
Detection count: 16
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: 8b0b43aeb4de6125cf809459f63e9cc0
Detection count: 9
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: e6b9a4227e73bb134cb77895f3dc58b7
Detection count: 7
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: 9109f51d5a3f91ff380cc2038ce8388a
Detection count: 7
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: d28767d2233f9b90d9b2b8cf35e31a50
Detection count: 5
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014
system32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys File name: {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w64.sys
Size: 48.82 KB (48824 bytes)
MD5: 0176cfbcc90569acff962be83898acca
Detection count: 5
File type: System file
Mime Type: unknown/sys
Path: system32\drivers
Group: Malware file
Last Updated: October 6, 2014

Registry Modifications

The following newly produced Registry Values are:

CLSID{1FCAE50B-6A27-4134-B2B8-77F920B07E00}{38c42ef3-c969-4ff5-863d-2f4dc37a6e02}{46CD79AD-2448-4EC6-A2A6-34B53EAF6A15}{4F06612C-E31A-422B-816A-0BE6A6A23C28}{8F79BA4B-6A53-4B70-8338-393C30D195F6}{AC8BD9BC-FD95-4546-B4A2-40B96306B323}{ef05f09c-9b2a-43a0-8155-fab1d641215a}HKEY..\..\..\..{RegistryKeys}SOFTWARE\AdanakSoftware\Microsoft\Internet Explorer\Approved Extensions\{96E35390-0867-4E4F-AE15-D755F40C7F59}SOFTWARE\Microsoft\Tracing\Adanak_RASAPI32SOFTWARE\Microsoft\Tracing\Adanak_RASMANCSSOFTWARE\Microsoft\Tracing\updateAdanak_RASAPI32SOFTWARE\Microsoft\Tracing\updateAdanak_RASMANCSSOFTWARE\Microsoft\Tracing\utilAdanak_RASAPI32SOFTWARE\Microsoft\Tracing\utilAdanak_RASMANCSSOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{ef05f09c-9b2a-43a0-8155-fab1d641215a}Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{96E35390-0867-4E4F-AE15-D755F40C7F59}SOFTWARE\Wow6432Node\AdanakSOFTWARE\Wow6432Node\Microsoft\Tracing\Adanak_RASAPI32SOFTWARE\Wow6432Node\Microsoft\Tracing\Adanak_RASMANCSSOFTWARE\Wow6432Node\Microsoft\Tracing\updateAdanak_RASAPI32SOFTWARE\Wow6432Node\Microsoft\Tracing\updateAdanak_RASMANCSSOFTWARE\Wow6432Node\Microsoft\Tracing\utilAdanak_RASAPI32SOFTWARE\Wow6432Node\Microsoft\Tracing\utilAdanak_RASMANCSSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{96E35390-0867-4E4F-AE15-D755F40C7F59}SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{ef05f09c-9b2a-43a0-8155-fab1d641215a}SYSTEM\ControlSet001\services\eventlog\Application\Update AdanakSYSTEM\ControlSet001\services\eventlog\Application\Util AdanakSYSTEM\ControlSet001\services\Update AdanakSYSTEM\ControlSet001\services\Util AdanakSYSTEM\ControlSet002\services\eventlog\Application\Util AdanakSYSTEM\ControlSet002\services\Util AdanakSYSTEM\CurrentControlSet\services\eventlog\Application\Update AdanakSYSTEM\CurrentControlSet\services\eventlog\Application\Util AdanakSYSTEM\CurrentControlSet\services\Update AdanakSYSTEM\CurrentControlSet\services\Util AdanakHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Adanak

Additional Information

The following directories were created:
%PROGRAMFILES%\Adanak%PROGRAMFILES(x86)%\Adanak%temp%\Adanak
The following URL's were detected:
Adanak
Loading...