For some reason after the last update it's detecting 2 Registry entries and one of them is related to Windows Defender, so I suppose it is a false positive.
Key Found : HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Key Found : HKLM\SOFTWARE\microsoft\windows nt\currentversion\Image File Execution Options\MsMpEng.exe
Developer Xplode.
THANK YOU VERY MUCH for providing one of the most effective anti-malware tools in the world.
THANK YOU VERY MUCH for continuing to support Windows XP. Without AdWare,
I could not safely use the Internet with XP...since so many 'paid' anti-malware software stopped supporting XP.
If you had a Donate Now button, I would click it immediately.
I've run this software on even very heavily infected systems and its amazing how quickly and effective AdwCleaner removes even the worst adware. Even adware that could not be removed with other software got cleaned by this.
This software is godlish. Even AVG or other antiviruses couldn't find that what ADWCleaner found. And im not getting anymore random shutdowns and my computer is not so laggy.
adwcleaner is a great software and it works! But from time to time I encounter a severe problem: adwcleaner says “adwcleaner_5.027.exe (or _5.030) has encounted a problem and needs to close”. And the file adwcleaner_x.xxx.exe disappears from its location!! When opened from ERD commander, it says “can't load SQLite3.dll, although that SQLite3.dll resides in WINDOWS directory!
Xplode, thanks for this software. Wish I could buy you a beer
There are a few ads inserted into the machine where you run the software still can not redirect website all phenomenon of some adware
Hey Xplode, been using this to nuke malware for a LONG time, and I'd like to thank you for the time and energy you put into this. Is there any chance you can whitelist Kaseya software in your process killer so that remote techs don't lose connection while running this? "%programfiles(x86)%\Kaseya Remote Control" and "%programfiles%\KaseyaAgent\{AGENTGUID}\" on 64-bit machines (no x86 on 32-bit) are the root directories used. I could send you specific information via PM if you'd like :)