comment

on AdwCleaner's page

from GEGEPING, (19 august 2016)

Plein de faux positifs surement car non nettoyés au reboot avec cette nouvelle version.

La précédente version ne montrait rien.

Attendons une prochaine MAJ de la database ou du logiciel?

En tout cas, il m'a bien aidé, donc soyons indulgent pour la résolution du pb.

comment

on AdwCleaner's page

from 3ogdy, (17 august 2016)

I really appreciate what you do with this program. It's one hell of a program. I do have a suggestion, though:
I've noticed that, the more up-to-date it is, the slower it becomes...it takes quite some time for it to scan a system, despite using SSDs.
Could you split the scanning process among 4+ cores of the CPU so that the scanning speed is improved? Could you give the software 4 instances with Affinity specifically set to a CPU core? I believe doing that may improve its scanning time, especially on SSDs (which are usually the ones holding the entire Windows installation -> and this last one is what most infection target (Users folder, Windows, Program Data...)

Thank you again for your work on this great tool! No wonder it has so many millions of downloads

comment

on AdwCleaner's page

from ****, (16 august 2016)

version 6.0 .
Adwcleaner finds a threat in file web data located in C:\Users\User Name\AppData\Local\Google\Chrome\User Data\Default . The value is Search Provider and data is search.babylon.com.
I deleted it several times and it still can't be removed, even I deleted the whole Web data file.

comment

on AdwCleaner's page

from langere, (15 august 2016)

Version 6.0. After scanning, Adwcleaner finds in the Chrome tab: Value: "startup_url" and data "hxxp://search.conduit.com/...". Although I select the Clean button, this value and data remain after the cleaning process and reboot.

comment

on AdwCleaner's page

from Dypsis, (09 may 2016)

I have a couple of false positives to report that keep getting flagged, but shouldn't be.

1. Under Scheduled Tasks, RunAsStdUser Task is C:\Program Files\GPSoftware\Directory Opus\dopus.exe
This is a legit Directory Opus entry.

2. Under Shortcuts, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TeraByte Unlimited\TeraByte OSD Tool Suite Pro\Ready To Run Scripts\INISTART - Reset Windows Startup.lnk
This is a legit Terabyte Image for Windows shortcut.

comment

on AdwCleaner's page

from ****, (20 april 2016)

AdwCleaner 5.112 reports the database is corrupt. I've downloaded multiple times directly from https://toolslib.net/downloads/finish/1/
Please check the posted file and advise.

comment

on AdwCleaner's page

from UncleSam, (08 april 2016)

Добрый день, большое спасибо за замечательную программу AdwCleaner. И просьба сделать в программе проверку *.lnk файлов браузеров (не только Internet Explorer) по пути c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\, c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\, поскольку в свойствах *.lnk после вирусов часто подменяется путь на другой. Спасибо за внимание.

comment

on AdwCleaner's page

from RiiNeYScOo, (14 march 2016)

bonjour adwcleaner détecte tout le dossier comme étant un fichier malveillant ==> C:\Users\**********\AppData\Local\Steam\htmlcache <== c un bug ?

comment

on AdwCleaner's page

from ****, (17 february 2016)

# AdwCleaner v5.034 - Logfile created 16/02/2016 at 16:13:56
# Database : 2016-02-16.2 [Server]
# Operating system : Windows 7 Professional Service Pack 1 (x64)

Still issue with generic detections... autoIT error

comment

on AdwCleaner's page

from ****, (09 february 2016)

Let me hear!!!!!!!! ....the right way is.......

***** [ Internetbrowser ] *****

[-] [C:\Users\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Startup_URLs] Gelöscht : hxxp://www.palikan.com/?f=7&a=plk_bimmed_15_53&cd=2XzuyEtN2Y1L1Qzu0CyE0EzyzzyEtDyByByC0F0DtBtD0DyDtN0D0Tzu0StCyEyCtAtN1L2XzutAtFtCyDtFtAtFtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StD0FtCtCtA0DtAtBtGyB0AyDyCtG0B0EtDzytGtB0CzytAtG0FtCzztByEyByB0FtDtCzz0C2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AtAyD0CtB0C0DyCtGtAzzyBtCtGyEtD0ByCtGzyyD0B0DtGyBzy0E0A0CtAyByD0F0CtB0E2QtN0A0LzuyE&cr=1289375483&ir=
[-] [C:\Users\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Gelöscht : ljmibnagodajacnnbifpamhggcohblip

*************************