comment

on AdwCleaner's page

from ****, (16 august 2016)

version 6.0 .
Adwcleaner finds a threat in file web data located in C:\Users\User Name\AppData\Local\Google\Chrome\User Data\Default . The value is Search Provider and data is search.babylon.com.
I deleted it several times and it still can't be removed, even I deleted the whole Web data file.

comment

on AdwCleaner's page

from langere, (15 august 2016)

Version 6.0. After scanning, Adwcleaner finds in the Chrome tab: Value: "startup_url" and data "hxxp://search.conduit.com/...". Although I select the Clean button, this value and data remain after the cleaning process and reboot.

comment

on AdwCleaner's page

from Dypsis, (09 may 2016)

I have a couple of false positives to report that keep getting flagged, but shouldn't be.

1. Under Scheduled Tasks, RunAsStdUser Task is C:\Program Files\GPSoftware\Directory Opus\dopus.exe
This is a legit Directory Opus entry.

2. Under Shortcuts, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TeraByte Unlimited\TeraByte OSD Tool Suite Pro\Ready To Run Scripts\INISTART - Reset Windows Startup.lnk
This is a legit Terabyte Image for Windows shortcut.

comment

on AdwCleaner's page

from ****, (20 april 2016)

AdwCleaner 5.112 reports the database is corrupt. I've downloaded multiple times directly from https://toolslib.net/downloads/finish/1/
Please check the posted file and advise.

comment

on AdwCleaner's page

from UncleSam, (08 april 2016)

Добрый день, большое спасибо за замечательную программу AdwCleaner. И просьба сделать в программе проверку *.lnk файлов браузеров (не только Internet Explorer) по пути c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu\, c:\Users\***\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\, c:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\, поскольку в свойствах *.lnk после вирусов часто подменяется путь на другой. Спасибо за внимание.

comment

on AdwCleaner's page

from RiiNeYScOo, (14 march 2016)

bonjour adwcleaner détecte tout le dossier comme étant un fichier malveillant ==> C:\Users\**********\AppData\Local\Steam\htmlcache <== c un bug ?

comment

on AdwCleaner's page

from ****, (17 february 2016)

# AdwCleaner v5.034 - Logfile created 16/02/2016 at 16:13:56
# Database : 2016-02-16.2 [Server]
# Operating system : Windows 7 Professional Service Pack 1 (x64)

Still issue with generic detections... autoIT error

comment

on AdwCleaner's page

from ****, (09 february 2016)

Let me hear!!!!!!!! ....the right way is.......

***** [ Internetbrowser ] *****

[-] [C:\Users\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Startup_URLs] Gelöscht : hxxp://www.palikan.com/?f=7&a=plk_bimmed_15_53&cd=2XzuyEtN2Y1L1Qzu0CyE0EzyzzyEtDyByByC0F0DtBtD0DyDtN0D0Tzu0StCyEyCtAtN1L2XzutAtFtCyDtFtAtFtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StD0FtCtCtA0DtAtBtGyB0AyDyCtG0B0EtDzytGtB0CzytAtG0FtCzztByEyByB0FtDtCzz0C2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0AtAyD0CtB0C0DyCtGtAzzyBtCtGyEtD0ByCtGzyyD0B0DtGyBzy0E0A0CtAyByD0F0CtB0E2QtN0A0LzuyE&cr=1289375483&ir=
[-] [C:\Users\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Gelöscht : ljmibnagodajacnnbifpamhggcohblip

*************************

comment

on AdwCleaner's page

from renald02, (27 january 2016)

Depuis un bon bout de temps, quand j'utilise ADWCLEANER, j'ai des messages qui veulent me supprimer l'extension ZOOM de GOOGLE, est-ce normale. Je n'en ai jamais fais de cas, mais à la longue c'est tannant. Voici les messages:

Dossier Trouvé : C:\Documents and Settings\raynald\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\lajondecmobodlejlcjllhojikagldgd

Fichier Trouvé : C:\Documents and Settings\raynald\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_lajondecmobodlejlcjllhojikagldgd_0.localstorage

Fichier Trouvé : C:\Documents and Settings\raynald\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_lajondecmobodlejlcjllhojikagldgd_0.localstorage-journal

Fichier Trouvé : C:\Documents and Settings\raynald\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Extension Settings\lajondecmobodlejlcjllhojikagldgd

C:\Documents and Settings\raynald\Local Settings\Application Data\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Trouvée : lajondecmobodlejlcjllhojikagldgd


C'est en supprimant ces demandes que je me suis rendu compte que ça parlait de ZOOM de GOOGLE, car à chaque fois que je les ai supprimés, j'ai du réinstaller ZOOM ??????????

comment

on AdwCleaner's page

from killallvirus, (22 january 2016)

the last version 5030 unable to find pricefountain like malwarebytes:
C:\Users\user\AppData\Local\SceptresAlveoli\griefweighmen.dll