Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

0.2.21 11.11%
0.2.21 66.67%
0.2.21 11.11%
0.2.20 11.11%

PE structurePE file structure

Show functions
Import table
advapi32.dll
CryptAcquireContextA, CryptGenRandom, RegCloseKey, RegCreateKeyExA, RegDeleteValueA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA
kernel32.dll
CloseHandle, CreateSemaphoreA, DeleteCriticalSection, EnterCriticalSection, ExitProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, InitializeCriticalSection, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, OpenProcess, ReleaseSemaphore, SetLastError, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
libgcc_s_dw2-1.dll
_Unwind_DeleteException, _Unwind_GetDataRelBase, _Unwind_GetIPInfo, _Unwind_GetLanguageSpecificData, _Unwind_GetRegionStart, _Unwind_GetTextRelBase, _Unwind_RaiseException, _Unwind_Resume, _Unwind_Resume_or_Rethrow, _Unwind_SetGR, _Unwind_SetIP, __deregister_frame_info, __emutls_get_address, __register_frame_info, __udivdi3, __umoddi3
msvcrt.dll
DllMain
qtcore4.dll
DllMain
qtgui4.dll
DllMain
qtnetwork4.dll
_ZN10QTcpSocketC1EP7QObject, _ZN10QTcpSocketD1Ev, _ZN12QHostAddress10setAddressERK7QString, _ZN12QHostAddressC1ENS_14SpecialAddressE, _ZN12QHostAddressC1ERK7QString, _ZN12QHostAddressC1ERKS_, _ZN12QHostAddressC1Ev, _ZN12QHostAddressD1Ev, _ZN12QHostAddressaSERKS_, _ZN12QLocalSocket15connectToServerERK7QString6QFlagsIN9QIODevice12OpenModeFlagEE, _ZN12QLocalSocket16waitForConnectedEi, _ZN12QLocalSocket20disconnectFromServerEv, _ZN12QLocalSocket5flushEv, _ZN12QLocalSocketC1EP7QObject, _ZN12QLocalSocketD1Ev, _ZN15QAbstractSocket13connectToHostERK12QHostAddresst6QFlagsIN9QIODevice12OpenModeFlagEE, _ZN15QAbstractSocket16waitForConnectedEi, _ZN15QAbstractSocket18disconnectFromHostEv, _ZN15QAbstractSocket5flushEv, _ZNK12QHostAddress6isNullEv, _ZNK12QHostAddress8toStringEv, _ZNK12QHostAddresseqENS_14SpecialAddressE, _ZNK12QHostAddresseqERKS_, _ZNK12QLocalSocket5stateEv, _ZNK12QLocalSocket7isValidEv, _ZNK15QAbstractSocket5stateEv, _ZNK15QAbstractSocket7isValidEv
qtxml4.dll
_ZN11QDomElementC1ERKS_, _ZN11QDomElementaSERKS_, _ZN12QDomDocument10setContentEP9QIODevicebP7QStringPiS4_, _ZN12QDomDocumentC1Ev, _ZN12QDomDocumentD1Ev, _ZN8QDomNodeD2Ev, _ZNK11QDomElement12hasAttributeERK7QString, _ZNK11QDomElement7tagNameEv, _ZNK11QDomElement9attributeERK7QStringS2_, _ZNK12QDomDocument15documentElementEv, _ZNK8QDomNode17firstChildElementERK7QString, _ZNK8QDomNode18nextSiblingElementERK7QString, _ZNK8QDomNode6isNullEv
shell32.dll
SHGetMalloc, SHGetPathFromIDListA, SHGetSpecialFolderLocation
user32.dll
EnumWindows, GetWindowThreadProcessId, PostMessageA
ws2_32.dll
WSACleanup, WSAGetLastError, WSAStartup, bind, closesocket, connect, freeaddrinfo, getaddrinfo, getnameinfo, getsockname, htons, inet_addr, recv, select, send, sendto, setsockopt, socket

vidalia.exe

Vidalia by vidalia-project.net

Remove vidalia.exe
Version:   0.2.20
MD5:   91830ee95ecec87de9366ae7cfd6566a
SHA1:   555d9c1e9b9099a8a23e2c5569020ab4a04cded8
SHA256:   189e229bf9fb24ea6c9545e73edb3da6af3f3b6048595fc2ff169990c841d7fa

Overview

vidalia.exe executes as a process with the local user's privileges. It is set to be run when the PC boots and the user logs into Windows (added to the Run registry key for the current user). It is installed with a couple of know programs including Java 7 Update 10 published by Oracle Corporation and Polipo 1.0.4.1 published by Juliusz Chroboczek.

DetailsDetails

File name:vidalia.exe
Publisher:vidalia-project.net
Product name:Vidalia
Typical file path:C:\Program Files\vidalia relay bundle\vidalia\vidalia.exe
File version:0.2.20
Size:5.89 MB (6,172,985 bytes)
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

ResourcesPrograms

The following programs will install this file
Juliusz Chroboczek
12% remove
Polipo is a lightweight forwarding and caching web proxy server. Polipo is HTTP 1.1-compliant, supports IPv4, IPv6, traffic filtering and privacy-enhancement. To minimize latency, Polipo both pipelines multiple resource requests and multiplexes multiple transactions onto the same TCP/IP connection. Polipo can be configured to use on-disk cache and serve cached content when offline, perform various forms of content filtering and serve as...

BehaviorsBehaviors

Startup files (user) run
Runs under the registry key 'HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'
  • 'Vidalia' → "C:\Program Files\Vidalia Relay Bundle\Vidalia\vidalia.exe"

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.00109916%
0.028634%
Kernel CPU:0.00089796%
0.013761%
User CPU:0.00020120%
0.014873%
Kernel CPU time:790,625 ms/min
100,923,805ms/min
Memory
Private memory:4.75 MB
21.59 MB
Private (maximum):14.34 MB
Private (minimum):3.91 MB
Non-paged memory:4.75 MB
21.59 MB
Virtual memory:62.99 MB
140.96 MB
Virtual memory (peak):63 MB
169.69 MB
Working set:3.92 MB
18.61 MB
Working set (peak):15.28 MB
37.95 MB
Resource allocations
Threads:3
12
Handles:275
600
GUI GDI count:25
103
GUI USER count:15
49

BehaviorsProcess properties

Tray notification:Yes
Integrety level:Undefined
Platform:32-bit
Command line:"C:\Program Files\start tor browser.exe\tor browser\app\vidalia.exe"
Owner:User

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 44.44%
Microsoft Windows XP 22.22%
Windows 7 Professional 22.22%
Windows 8.1 Pro 11.11%

Distribution by countryDistribution by country

Ireland installs about 22.22% of Vidalia.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 66.67%
American Megatrends 16.67%
Hewlett-Packard 16.67%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE