Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

The file just couldn't take it anymore, it gained so many bytes over the years (especially near the mid-section) it decided to finally deleted itself. :lol: That reminded me of an old bug that's now squashed in CCleaner that would cause it to axe itself, that however wasn't funny.

What with it being summer now, the pressure is on for the file to shape up for bikini season

Link to comment
Share on other sites

Search for <== to see my comments

 


(No, this email's not real, it's http://deadfake.com)

New Project

Ok Hi again,

[CCleaner*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\CCleaner
Default=False
FileKey1=%ProgramFiles%\CCleaner|*.log;CCleaner_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\CCleaner|*.log;CCleaner_log*.txt
FileKey3=%UserProfile%|CCleaner_log*.txt

On Old Systems the debug mode Logs were saved as "CCleaner_log*.txt". Therefore I have added it.
And it was probably even saved in Userprofile, therefore I added Filekey3.

Found these:
C:\Program Files\CCleaner\CCleaner64_v4.14.4707_2014-06-15_01-59-02.log

[Defraggler*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Defraggler
Default=False
FileKey1=%ProgramFiles%\Defraggler|*.dmp;*statistics*;*.log;Defraggler*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Defraggler|*.dmp;*statistics*;*.log;Defraggler*.txt
FileKey3=%UserProfile%|Defraggler*.txt

Improved Filekey 1 and 2. Added Filekey3

Found these:
C:\Program Files\Defraggler\Defraggler64.exe.[2_18_945][2014-06-16_19-40].txt

[Recuva*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Recuva
Default=False
FileKey1=%ProgramFiles%\Recuva|*.log;Recuva_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Recuva|*.log;Recuva_log*.txt
FileKey3=%UserProfile%|Recuva_log*.txt

[speccy*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Speccy
Default=False
FileKey1=%ProgramFiles%\Speccy|*.log;Speccy_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Speccy|*.log;Speccy_log*.txt
FileKey3=%UserProfile%|Speccy_log*.txt

[Logitech Setpoint 6 (Logs)*]
LangSecRef=3024
Detect=HKCU\Software\Logitech\Setpoint
Default=False
FileKey1=%AppData%\Logishrd\sp6_Log|*.*|REMOVESELF
FileKey2=%WinDir%\System32|lvcoinst.log
FileKey3=%CommonAppData%\LogiShrd|*.log|RECURSE
FileKey4=%ProgramFiles%\Common Files\logishrd|*.log|RECURSE

Found these:
C:\Windows\System32\lvcoinst.log 11 KB
C:\ProgramData\LogiShrd\Updater\LuUpdater.log 0 KB
C:\ProgramData\LogiShrd\Updater\LuUpdater.log 0 KB
C:\Program Files\Common Files\logishrd\LVMVFM\LVPrcSrv.log 29 KB
C:\Program Files\Common Files\logishrd\LVMVFM\LVPrcSrv.log 29 KB

[Windows Live Mail*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows Live Mail
Default=False
Warning=This will reset the read counts, which will be recalculated when WLMail is started.
FileKey1=%LocalAppData%\Microsoft\Windows*Mail|*.log;*.jrs;*.chk;*.rss|RECURSE
FileKey2=%LocalAppData%\Microsoft\Windows*Mail\Backup|*.*|REMOVESELF
FileKey3=%LocalAppData%\Microsoft\Windows*Mail\*\Backup|*.*|REMOVESELF
FileKey4=%LocalAppData%\Microsoft\Windows*Mail\Storage Folders|*.*|REMOVESELF
FileKey5=%LocalAppData%\Microsoft\Windows*Mail\*.tmp|*.*|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows*Mail\*|*.MSMessageStore|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion

[Windows Live Messenger More*]
LangSecRef=3022
Detect=HKLM\Software\Microsoft\Windows Live\Messenger
Default=False
FileKey1=%CommonProgramFiles%\Windows Live\.cache|*.*|RECURSE
FileKey2=%LocalAppData%\Microsoft\Messenger|*.uccapilog;*.bak;*.txt|RECURSE
FileKey3=%LocalAppData%\Microsoft\Windows Live|*.log;*.jrs;*.sqm|RECURSE
FileKey4=%LocalAppData%\Microsoft\Windows Live Contacts|*.log;*.jrs|RECURSE
FileKey5=%LocalAppData%\Microsoft\Windows Live Contacts\*\*\*\Backup|*.*|RECURSE
FileKey6=%ProgramFiles%\Windows Live\Messenger|*.bak|RECURSE
FileKey7=%WinDir%\System32\config\systemprofile\Documents|wlidsvctrace*.txt
FileKey8=%WinDir%\SysWOW64\config\systemprofile\Documents|wlidsvctrace*.txt
FileKey9=%LocalAppData%\VirtualStore\Program Files*\Windows Live\Messenger|*.bak|RECURSE
FileKey10=%LocalAppData%\VirtualStore\Program Files*\Common Files\Windows Live\.cache|*.*|RECURSE

Would you please add the below to the Winapp2.ini with entry I've send to you:

Found these:
C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA104.tmp 230 KB
C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA104.tmp 230 KB
C:\Program Files (x86)\Common Files\Windows Live\.cache\cache.ini 10 KB
C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp 231 KB
C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp 231 KB
C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp 230 KB

[symantec SymSilent Logs*]
LangSecRef=3024
DetectFile=%Public%\Symantec\SymSilent
Default=False
FileKey1=%Public%\Symantec\SymSilent\ccLog|*.*

Found these:
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0630.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x072C.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0A90.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0A98.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AA8.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AEC.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AF0.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B10.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B44.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B8C.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B90.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0DCC.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x1234.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x123C.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x12EC.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0630.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x072C.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0A90.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0A98.log 4 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AA8.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AEC.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0AF0.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B10.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B44.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B8C.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0B90.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x0DCC.log 3 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x1234.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x123C.log 2 KB
C:\Users\Public\Symantec\SymSilent\ccLog\SymSilent-0x12EC.log 2 KB
C:\Users\Public\Symantec\SymSilent\SymSilent.log 1 KB
C:\Users\Public\Symantec\SymSilent\SymSilent.log 1 KB

[Copernic DesktopSearch4 Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Copernic\DesktopSearch4
Detect2=HKLM\SOFTWARE\Wow6432Node\Copernic\DesktopSearch4
Default=False
FileKey1=%AppData%\Copernic\DesktopSearch4\Logs|*.*|REMOVESELF

Found these:
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\Cds4Install.log 23 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\Cds4Install.log 23 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\CdsApp.log4 44 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\CdsQueue.log4 243 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\SP.0.log4 2 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\SPP.0.log4 31 KB
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\CdsQueue.log4
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\Cds4Install.log
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\SP.0.log4
C:\Users\Boss\AppData\Local\Copernic\DesktopSearch4\Logs\SPP.0.log4

[Wallpaper Juggler*]
LangSecRef=3024
DetectFile=%ProgramFiles%\Wallpaper Juggler
Default=False
FileKey1=%ProgramFiles%\Wallpaper Juggler|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Wallpaper Juggler|*.log

Found these:
C:\Program Files (x86)\Wallpaper Juggler\INSTALL.LOG 8 KB
C:\Program Files (x86)\Wallpaper Juggler\INSTALL.LOG 8 KB

[serviio Logs*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Serviio
Default=False
FileKey1=%ProgramFiles%\Serviio\log|*.*
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Serviio\log|*.*

Found these:
C:\Program Files\Serviio\log\derby.log 1 KB
C:\Program Files\Serviio\log\serviio.log 2 KB
C:\Program Files\Serviio\log\derby.log 1 KB
C:\Program Files\Serviio\log\serviio.log 2 KB
C:\Program Files\Serviio\log\serviio.log
C:\Program Files\Serviio\log\derby.log

[JDownloader Logs*]
LangSecRef=3022
Detect=HKLM\Software\JDownloader
DetectFile=%ProgramFiles%\JDownloader
Default=False
FileKey1=%ProgramFiles%\JDownloader|*.log;updateLog.txt;*.lck|RECURSE
FileKey2=%UserProfile%\.jd_home|JDownloader.log
FileKey3=%UserProfile%\.jd_home\logs|*.0
FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader|*.log;updateLog.txt;*.lck

I've added RECURSE to Filekey1.

[JDownloader2 Logs*]
LangSecRef=3022
DetectFile1=%ProgramFiles%\JDownloader 2
DetectFile2=%ProgramFiles%\JDownloader2
Default=False
FileKey1=%ProgramFiles%\JDownloader 2|*.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE
FileKey2=%ProgramFiles%\JDownloader2|*.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE
FileKey3=%ProgramFiles%\JDownloader 2\logs|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader 2|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*
FileKey5=%LocalAppData%\VirtualStore\Program Files*\JDownloader2|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*
FileKey6=%LocalAppData%\VirtualStore\Program Files*\JDownloader 2\logs|*.*|RECURSE

I've added DetectFile2, because Filekey2 would be unimportant. And I've improved Filekey1 and 2, because I've added *.log
and added RECURSE. Now the files below should get deleted.

Found these:
C:\Program Files (x86)\JDownloader\.install4j\files.log 220 KB
C:\Program Files (x86)\JDownloader\.install4j\installation.log 336 KB
C:\Program Files (x86)\JDownloader\.install4j\files.log 220 KB
C:\Program Files (x86)\JDownloader\.install4j\installation.log 336 KB

[Multi-Edit Logs*]
LangSecRef=3024
Warning=Will remove ACI Addon Log files....
DetectFile1=%SystemDrive%\My Programs\Multi-Edit 2008 <== ME is installed into any other folder then ProgramFiles - I just chosed My Programs to make the contents obvious
DetectFile2=%AppData%\Multi Edit Software
Default=False
FileKey1=%SystemDrive%\My Programs\Multi-Edit 2008|*.log
FileKey2=%AppData%\Multi Edit Software|*.log|RECURSE
<== Added Warning and comment about My Programs folder...

Found these:
C:\My Programs\Multi-Edit 2008\INSTALL.LOG 293 KB
C:\My Programs\Multi-Edit 2008\INSTALL.LOG 293 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\EVOLVE.LOG 16 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\FILEPANE.LOG 2 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\INSTALL.LOG 309 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\POLYSTYLE.LOG 25 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\TMPLPANE.LOG 1 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\WINLIST.LOG 1 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\EVOLVE.LOG 16 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\FILEPANE.LOG 2 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\INSTALL.LOG 309 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\POLYSTYLE.LOG 25 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\TMPLPANE.LOG 1 KB
C:\Users\UserName\AppData\Roaming\Multi Edit Software\Multi-Edit\11\Config.04\WINLIST.LOG 1 KB

[WRAL Desktop Alert Logs*]
LangSecRef=3024
DetectFile=%ProgramFiles%\WRAL Desktop Alert
Default=False
FileKey1=%ProgramFiles%\WRAL Desktop Alert|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\WRAL Desktop Alert|*.log

Found these:
C:\Users\UserName\AppData\Local\VirtualStore\Program Files (x86)\WRAL Desktop Alert\Installer.log 1 KB
C:\Users\UserName\AppData\Local\VirtualStore\Program Files (x86)\WRAL Desktop Alert\Installer.log 1 KB
C:\Program Files (x86)\WRAL Desktop Alert\Installer.log 2 KB
C:\Program Files (x86)\WRAL Desktop Alert\Installer.log 2 KB

[360 Internet Security Logs*]
LangSecRef=3024
Detect=HKCU\Software\360Safe
Default=False
FileKey1=%AppData%\360safe\360ScanLog|*.*
FileKey2=%ProgramFiles%\360\360 Internet Security\Log|*.log|RECURSE
FileKey3=%SystemDrive%\360SANDBOX|*.log*|RECURSE
FileKey2=%ProgramFiles%\360\360 Internet Security|*.log*|RECURSE

Found these:
C:\Users\Boss\AppData\Roaming\360safe\360ScanLog\360rp.exe.DEEPSCAN.2014-06-14.log 1 KB
C:\Users\Boss\AppData\Roaming\360safe\360ScanLog\360rp.exe.DEEPSCAN.2014-06-14.log 1 KB
C:\Program Files (x86)\360\360 Internet Security\Log (within this folder are two other folders.)
C:\360SANDBOX\360SandBox.sav.LOG1
C:\360SANDBOX\360SandBox.sav.LOG2
C:\Program Files\360\360 Internet Security\ipc\filecache\FileCache.dat.LOG1
C:\Program Files\360\360 Internet Security\ipc\filecache\FileCache.dat.LOG2

[A58-Easytune6 Logs*]
LangSecRef=3024
DetectFile=%ProgramFiles%\A58-Easytune6
Default=False
FileKey1=%ProgramFiles%\A58-Easytune6|*.log

Found these:
C:\Program Files (x86)\A58-Easytune6\setup.log 1 KB
C:\Program Files (x86)\A58-Easytune6\setup.log 1 KB
C:\Program Files (x86)\A58-Easytune6\setup.log 1 KB
C:\Program Files (x86)\A58-Easytune6\setup.log 1 KB

[CleanUp! Logs*]
LangSecRef=3024
Detect=HKCU\Software\stevengould.org\CleanUp!
Default=False
FileKey1=%AppData%|CleanUp!.log

Found these:
HKEY_CURRENT_USER\Software\stevengould.org\CleanUp!
C:\Users\UserName\AppData\Roaming\CleanUp!.log 994 KB
C:\Users\UserName\AppData\Roaming\CleanUp!.log 994 KB

[Cyberduck Logs*]
LangSecRef=3024
Detect=HKCR\.cyberducklicense
Default=False
FileKey1=%AppData%\Cyberduck|*.log

Found these:
HKEY_CLASSES_ROOT\Cyberduck Bookmark
HKEY_CLASSES_ROOT\.cyberducklicense
C:\Users\Boss\AppData\Roaming\Cyberduck\cyberduck.log 0 KB
C:\Users\Boss\AppData\Roaming\Cyberduck\cyberduck.log 0 KB

[TweetDeck Logs*]
LangSecRef=3024
DetectFile=%ProgramFiles%\Twitter\TweetDeck
Default=False
FileKey1=%ProgramFiles%\Twitter\TweetDeck|*.log

Found these:
C:\Program Files (x86)\Twitter\TweetDeck\console.log 16 KB
C:\Program Files (x86)\Twitter\TweetDeck\console.log 16 KB

[Windows Live Writer Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Microsoft\Windows Live Writer
Detect2=HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Live Writer
Default=False
FileKey1=%LocalAppData%\Windows Live Writer|*.log

Found these:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Live Writer
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Live Writer
C:\Users\UserName\AppData\Local\Windows Live Writer\Windows Live Mail.log 1 KB
C:\Users\UserName\AppData\Local\Windows Live Writer\Windows Live Mail.log 1 KB
C:\Users\Boss\AppData\Local\Windows Live Writer\Windows Live Writer.log

[Google Earth More*]
LangSecRef=3021
Detect1=HKLM\Software\Google\Google Earth Plus
Detect2=HKLM\Software\Google\Google Earth Pro
Detect3=HKCU\Software\Google\Google Earth Plus
Detect4=HKCU\Software\Google\Google Earth Pro
Default=False
FileKey1=%LocalLowAppData%\Google\GoogleEarth|*.tmp;*.log|RECURSE
FileKey2=%LocalLowAppData%\Google\GoogleEarth\unified_cache_leveldb_*|*.*|REMOVESELF
FileKey2=%ProgramFiles%\Google\GoogleEarth\client|*.log

Improved Filekey1

Found these:
HKEY_CURRENT_USER\Software\Google\Google Earth Plus
C:\Users\UserName\AppData\LocalLow\Google\GoogleEarth\unified_cache_leveldb_leveldb2.0\000101.log 123 KB
C:\Users\UserName\AppData\LocalLow\Google\GoogleEarth\unified_cache_leveldb_leveldb2.0\000101.log 123 KB
C:\Program Files (x86)\Google\Google Earth\client\debug.log (If you start in Debug mode.)

[Logitech Desktop Messenger*]
LangSecRef=3024
Detect1=HKCU\Software\Logitech\DesktopMessenger
Detect2=HKLM\SOFTWARE\Wow6432Node\Logitech\Logitech Desktop Messenger
Detect3=HKLM\SOFTWARE\Wow6432Node\Logitech\DesktopMessenger
Detect4=HKLM\SOFTWARE\Logitech\DesktopMessenger
Detect5=HKLM\SOFTWARE\Logitech\DesktopMessenger
Default=False
FileKey1=%ProgramFiles%\Logitech\Desktop Messenger|*.log;*.bak

Found these:
HKEY_CURRENT_USER\Software\Logitech\DesktopMessenger
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Logitech\Logitech Desktop Messenger
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Logitech\DesktopMessenger
C:\Program Files (x86)\Logitech\Desktop Messenger\8876480\clasid.bak
C:\Program Files (x86)\Logitech\Desktop Messenger\8876480\Users\Boss\Data\main.log
C:\Program Files (x86)\Logitech\Desktop Messenger\8876480\clasid.bak 2 KB

[PKWARE PKZIP Logs*]
LangSecRef=3024
Detect1=HKCU\Software\PKWARE\PKZIP for Windows
Detect2=HKCU\Software\PKWARE\ZIPReader 0
Detect3=HKCU\Software\PKWARE\PKZIP70
Default=False
FileKey1=%ProgramFiles%\PKWARE\PKZIPW|*.log

Found these:
HKEY_CURRENT_USER\Software\PKWARE\PKZIP for Windows
HKEY_CURRENT_USER\Software\PKWARE\ZIPReader 0
HKEY_CURRENT_USER\Software\PKWARE\PKZIP70
C:\Program Files (x86)\PKWARE\PKZIPW\pkware.log 0 KB
C:\Program Files (x86)\PKWARE\PKZIPW\pkware.log 0 KB
C:\Program Files\PKWARE\PKZIPW\pkware.log 0 KB
C:\Program Files\PKWARE\PKZIPW\pkware.log 0 KB

[Geek Unistaller*]
LangSecRef=3024
Detect=HKCU\Software\Geek Uninstaller
Default=False
FileKey1=%AppData%\Geek Uninstaller|*.log;*cache.dat

Found these:
HKEY_CURRENT_USER\Software\Geek Uninstaller
C:\Users\Boss\AppData\Roaming\Geek Uninstaller\cache.dat 51 KB
C:\Users\Boss\AppData\Roaming\Geek Uninstaller\cache.dat 51 KB

[Hex Chat Logs*]
LangSecRef=3024
DetectFile=%AppData%\HexChat
Default=False
FileKey1=%AppData%\HexChat\logs|*.*|REMOVESELF

Found these:
C:\Users\Boss\AppData\Roaming\HexChat\logs\NETWORK\.log

[Dexpot Logs*]
LangSecRef=3024
Detect=HKCU\Software\Dexpot
Default=False
FileKey1=%AppData%\Dexpot|*.log

Found these:
HKEY_CURRENT_USER\Software\Dexpot
C:\Users\Boss\AppData\Roaming\Dexpot\dexpot.log

[AllDup Logs*]
LangSecRef=3024
DetectFile=%AppData%\AllDup
Default=False
FileKey1=%AppData%\AllDup|*.log

Found these:
C:\Users\Boss\AppData\Roaming\AllDup\AllDup.log

[seagate SeaTools for Windows Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Wow6432Node\SeaToolsforWindows
Detect2=HKLM\SOFTWARE\SeaToolsforWindows
Default=False
FileKey1=%AppData%\Dexpot|*.log

Found these:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\SeaToolsforWindows
C:\Program Files (x86)\Seagate\SeaTools for Windows\98TIT4GMT.log

[GhostMouse*]
LangSecRef=3024
DetectFile=%ProgramFiles%\GhostMouse
Default=False
FileKey1=%Documents%\AutomaticSolution Software\GhostMouse\conf\temp|*.tmp

Found these:
C:\Program Files (x86)\GhostMouse
C:\Users\Boss\Documents\AutomaticSolution Software\GhostMouse\conf\temp\file.temp 1 KB
C:\Users\Boss\Documents\AutomaticSolution Software\GhostMouse\conf\temp\file.temp 1 KB

[TrendMicro RUBotted Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Wow6432Node\TrendMicro\RUBotted
Detect2=HKLM\SOFTWARE\TrendMicro\RUBotted
Default=False
FileKey1=%ProgramFiles%\Trend Micro\RUBotted\DebugLogs|*.*|REMOVESELF

Probably this software has more log folders, but I don't have malware on my pc to find, if this
is true.

Found these:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TrendMicro\RUBotted
C:\Program Files (x86)\Trend Micro\RUBotted\DebugLogs
--------------------------------------------------------------------------------------------
The rest:
[FossaMail Corrupt SQLites*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles|*.corrupt|RECURSE

[FossaMail Crash Reports*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Crash Reports|*.*|REMOVESELF

[FossaMail Extensions Log*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|extensions.log

[FossaMail Log*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%ProgramFiles%\FossaMail|*.log

[FossaMail Maintenance Service*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%CommonAppData%\Mozilla*\logs|*.*|REMOVESELF
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Mozilla*\logs|*.*|REMOVESELF

[FossaMail Minidumps*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*\Minidumps|*.*

[FossaMail Net Predictions*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|seer.sqlite;netpredictions.sqlite

[FossaMail Startup Cache*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%LocalAppData%\FossaMail\Profiles\*\startupCache|*.*

[FossaMail TestPilot Error Logs*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|TestPilotErrorLog.*|RECURSE

[FossaMail Update Logs*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%LocalAppData%\FossaMail\Mozilla\*\Updates|*.log|RECURSE

[FossaMail webappsstore.sqlite*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|webappsstore.sqlite

Found these:
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\FossaMail
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Mozilla\FossaMail
C:\Program Files (x86)\FossaMail\freebl3.chk 1 KB
C:\Program Files (x86)\FossaMail\nssdbm3.chk 1 KB
C:\Program Files (x86)\FossaMail\softokn3.chk 1 KB
C:\Program Files (x86)\FossaMail\install.log 22 KB
C:\Program Files (x86)\FossaMail\freebl3.chk 1 KB
C:\Program Files (x86)\FossaMail\nssdbm3.chk 1 KB
C:\Program Files (x86)\FossaMail\softokn3.chk 1 KB
C:\Program Files (x86)\FossaMail\install.log 22 KB
C:\Users\Boss\AppData\Local\FossaMail\Profiles\x834gg7n.default\startupCache\startupCache.4.little 1.178 KB
C:\Users\Boss\AppData\Local\FossaMail\Profiles\x834gg7n.default\startupCache\startupCache.4.little 1.178 KB

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\BIT97BD.tmp 79 KB
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\BIT9ABA.tmp 935 KB
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\BIT9B47.tmp 2,205 KB

C:\Windows\SysWOW64\DOErrors.log 1 KB
C:\Windows\SysWOW64\DOErrors.log 1 KB

C:\Users\UserName\AppData\Roaming\ACD Systems\ACDSee\Cache\TNCB1E8.tmp 0 KB <== ACDSee Cache - can be combined with any of the ACDSee 6.o0 winapp2.ini entries...
C:\Users\Boss\AppData\Local\Microsoft\VisualStudio\10.0\ComponentModelCache\Microsoft.VisualStudio.Default.cache 336 KB
C:\Users\Administrator\AppData\Local\Microsoft\Messenger\ContactsLog.txt 4 KB
C:\Users\UserName\AppData\Roaming\V\V.log 2 KB <== [V FileViewer log] - (http://www.fileviewer.com/) used with JPSOft Take command
C:\Users\UserName\Documents\log.txt 436 KB <== CCleaner Log file -

C:\Windows\System32\InstallPackage_ETW.Log 30 KB
C:\Windows\System32\PT_OTP_Install_Error.log 1 KB
C:\Windows\security\database\tmp.edb 1.032 KB
C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform\Cache\cache.dat 96 KB
C:\Windows\System32\lpremove.exe.bak 70 KB
C:\Windows\System32\CodeIntegrity\bootcat.cache 6.076 KB

C:\Program Files (x86)\Copernic Agent\INSTALL.LOG 7 KB <== http://www.copernic.com/en/products/agent/
C:\Program Files (x86)\Copernic Agent\INSTALL2.LOG 3 KB http://www.copernic.com/en/products/agent/
C:\Program Files (x86)\ToniArts\EasyCleaner\File_id.diz 1 KB <== http://www.copernic.com/en/products/agent/
C:\Program Files (x86)\Fliptoast\lib\base\Cacher.js 21 KB

C:\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\cache.dat 45 KB
C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK 9 KB

C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak 32,769 KB

C:\Program Files (x86)\WallPaperChanger\File_id.diz 2 KB <== used to be www.wallpaperchanger.de but site is not valid now? Just descriptions of files installed...

C:\PMAIL\Programs\WPMSETUP.LOG 13 KB

C:\Users\UserName\AppData\Roaming\CBS Interactive\Download App\console.log 1 KB <== http://download.cnet.com/Download-App/3000-18513_4-75864009.html
C:\Users\UserName\AppData\Roaming\CBS Interactive\Download App\console.log 1 KB

C:\Users\UserName\AppData\Roaming\IMVUClient\GeckoBin\freebl3.chk 1 KB <== http://www.imvu.com/about/ - not sure if these can be removed?
C:\Users\UserName\AppData\Roaming\IMVUClient\GeckoBin\nssdbm3.chk 1 KB
C:\Users\UserName\AppData\Roaming\IMVUClient\GeckoBin\softokn3.chk 1 KB

C:\Mercury\Mercury DDK\readme.bak 5 KB
C:\Mercury\Mercury DDK\DDK Samples\DDK Samples.ncb 163 KB

C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\Default\History Provider Cache 2 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\Default\Session Storage\LOG.old 1 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\Default\Session Storage\000063.log 1 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\Default\Session Storage\000063.log 1 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\Default\Session Storage\000066.log
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\v3update\download\~114.cab0.~p2s 0 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\v3update\download\~91CF.cab.~p2s 0 KB
C:\Users\Boss\AppData\Local\360Browser\Browser\User Data\v3update\download\~91EE.cab.~p2s 0 KB

C:\Program Files (x86)\Postbox\freebl3.chk 1 KB
C:\Program Files (x86)\Postbox\nssdbm3.chk 1 KB
C:\Program Files (x86)\Postbox\softokn3.chk 1 KB
C:\Program Files (x86)\Postbox\install.log 22 KB
C:\Users\Boss\AppData\Local\Postbox\Profiles\7xd5cwy0.default\startupCache\startupCache.4.little 1.032 KB

C:\Users\UserName\AppData\Local\GCC\Chrome-bin\debug.log 3 KB
C:\Users\UserName\AppData\Local\GCC\Chrome-bin\debug.log 3 KB

C:\Program Files (x86)\HTMASC\File_id.diz 1 KB <== FreeDownloadsCenter.com HTMASC... can't copy and paste URL ....
C:\Program Files (x86)\HTMASC\INSTALL.LOG 2 KB <== .................

C:\Program Files (x86)\Postbox\freebl3.chk 1 KB
C:\Program Files (x86)\Postbox\nssdbm3.chk 1 KB
C:\Program Files (x86)\Postbox\softokn3.chk 1 KB
C:\Program Files (x86)\Postbox\install.log 22 KB
C:\Program Files (x86)\Postbox\uninstall\uninstall.log 3 KB

C:\Users\Boss\AppData\LocalLow\EmailTray\sokODS.log 13 KB

C:\Users\Boss\AppData\Local\Mailbird\Log.log 1 KB
-------------------------------------------------------------------------------------------
1.)
[Amazon Cloud Player Logs*]
LangSecRef=3024
Detect1=HKCU\Software\
Default=False
FileKey1=%LocalAppData%\Amazon Cloud Player\Logs|*.*

<== Found at HKCU\Software\Amazon\Amazon Cloud Player
<== Amazon recently changed it to Amazon Music so same entry as above - just S&R Amazon Cloud Player with Amazon Music

Found these:
C:\Users\UserName\AppData\Local\Amazon Cloud Player\Logs\cef_log.txt 2 KB
C:\Users\UserName\AppData\Local\Amazon Cloud Player\Logs\AmazonCloudPlayer.log 280 KB
C:\Users\UserName\AppData\Local\Amazon Cloud Player\Logs\AmazonCloudPlayer.log 280 KB

Could some please check, what is the registry key for this Software.

2.) Please check the program "Amazon Cloud Drive" and "Amazon MP3 Downloader".

3.) Please check the Program FRST, which is deleting viruses. It leaves a few logs.
(I can't check it, because my internet is very slow to download it all and install the programs)

4.) Shouldn't we add all other Mailprograms based on Thunderbird or Browser based on Chrome like 360 Browser?

 

Link to comment
Share on other sites

  • Moderators
New:

 

Note: This does not delete the process monitor logs or the virus scanning logs.

 


[Panda Cloud Antivirus (Other Logs)*]
LangSecRef=3024
Detect=HKLM\Software\Panda Security
Default=False
FileKey1=%CommonAppData%\Panda Security\PSLogs|*.log
FileKey2=%CommonAppData%\Panda Security\Panda Devices Agent\Logs|*.*

Link to comment
Share on other sites

New entry:

 

[spiral Knights*]

Section=Games

Default=False

Detect=HKCU\Software\Valve\Steam\Apps\99900

FileKey1=%ProgramFiles%\Steam\SteamApps\common\Spiral Knights|*.log

 

 

red marked are lost ...

 

but it shoud work with

[Steam Games*] entry ?
Link to comment
Share on other sites

 

New:
 
Note: This does not delete the process monitor logs or the virus scanning logs.
 
[Panda Cloud Antivirus (Other Logs)*]
LangSecRef=3024
Detect=HKLM\Software\Panda Security
Default=False
FileKey1=%CommonAppData%\Panda Security\PSLogs|*.log
FileKey2=%CommonAppData%\Panda Security\Panda Devices Agent\Logs|*.*

 

Why "Other logs"? There aren't any currently cleaned by CCleaner or winapp2 are there?

Link to comment
Share on other sites

  • Moderators

Why "Other logs"? There aren't any currently cleaned by CCleaner or winapp2 are there?

 

Then re-name yourself, it's just two words.

 

On my system I personally clean more than those, and "(Other Logs)" which I could've just as easily named "(Safe Logs)" isn't to be confused with something as generic as just plain "(Logs)" where people could potentially start adding stuff into it such as perhaps unsafe logs to clean like; Virus Scanning logs, Process Monitor logs, etc., which would make tracking down what it may have automatically blocked, cleaned, etc., without any user interaction impossible to know - especially if more than one person uses the computer.

Link to comment
Share on other sites

Then re-name yourself, it's just two words.

It wasn't a dig, just thought I must've missed an entry somewhere (and giving it that name could cause stupid people other than this one to also go hunting for a Panda entry that doesn't exist ^_^ ). So perhaps "Safe logs" would be better for the winapp2 entry itself :)

Link to comment
Share on other sites

It wasn't a dig, just thought I must've missed an entry somewhere (and giving it that name could cause stupid people other than this one to also go hunting for a Panda entry that doesn't exist ^_^ ). So perhaps "Safe logs" would be better for the winapp2 entry itself :)

Safe logs would indicate that removal would permit danger.

 

Why not "Useless Logs".

Link to comment
Share on other sites

  • Moderators

Why not "Useless Logs".

 

They wouldn't be "useless" because if someone were experiencing bugs/issues in Panda Cloud Antivirus, I'd think they'd ask for those logs on their forum to see where errors occurred.

Edited by Andavari
typo
Link to comment
Share on other sites

  • Moderators

Support Logs?

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

  • Moderators
I don't understand why so much fuss is about the wording of it. If anyone would like I can very easily delete my submission and be done with it.
y5e4utyn.jpgsorry couldn't resist. I don't think anybody's against your entry; we're just idly discussing what to call it in the template ;)I understand your concern with just calling it logs and possibly encouraging the logs you specifically avoided in making your entry.my suggestion was based on your comment regarding the usefulness, of the removed logs, in support cases.

 

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Revised Entry

Changed the entry name from [belarc*] to [belarc Advisor*]

 

[belarc Advisor*]
LangSecRef=3024
Detect=HKCU\Software\Belarc
Default=False
FileKey1=%ProgramFiles%\Belarc\Advisor\System|Progress.Log
FileKey2=%ProgramFiles%\Belarc\Advisor\System\Security\BelNotify|BelNotify.log;History.log;HistoryHF.log
FileKey3=%ProgramFiles%\Belarc\Advisor\System\Tmp|*.*
FileKey4=%ProgramFiles%\Belarc\BelArcAdvisor\System|Progress.Log
FileKey5=%ProgramFiles%\Belarc\BelArcAdvisor\System\Security\BelNotify|BelNotify.log;History.log;HistoryHF.log
FileKey6=%ProgramFiles%\Belarc\BelArcAdvisor\System\Tmp|*.*
FileKey7=%LocalAppData%\VirtualStore\Program Files*\Belarc\Advisor\System|Progress.Log
FileKey8=%LocalAppData%\VirtualStore\Program Files*\Belarc\Advisor\System\Security\BelNotify|BelNotify.log;History.log;HistoryHF.log
FileKey9=%LocalAppData%\VirtualStore\Program Files*\Belarc\Advisor\System\Tmp|*.*
FileKey10=%LocalAppData%\VirtualStore\Program Files*\Belarc\BelArcAdvisor\System|Progress.Log
FileKey11=%LocalAppData%\VirtualStore\Program Files*\Belarc\BelArcAdvisor\System\Security\BelNotify|BelNotify.log;History.log;HistoryHF.log
FileKey12=%LocalAppData%\VirtualStore\Program Files*\Belarc\BelArcAdvisor\System\Tmp|*.*

Link to comment
Share on other sites

updated

 

 

 

 

What's new in winapp2.ini 4.15.140625

General:

 

69 New Entries
35 Modified Entries
06 Removed Entries

Verbose:

------------------------------------------------------------------------------

New Entries:

[360 Internet Security Logs*]
LangSecRef=3024
Detect=HKCU\Software\360Safe
Default=False
FileKey1=%AppData%\360safe\360ScanLog|*.*
FileKey2=%ProgramFiles%\360\360 Internet Security|*.log*|RECURSE
FileKey3=%SystemDrive%\360SANDBOX|*.log*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Program Files*\360\360 Internet Security|*.log*|RECURSE

[A58-Easytune6 Logs*]
LangSecRef=3024
DetectFile=%ProgramFiles%\A58-Easytune6
Default=False
FileKey1=%ProgramFiles%\A58-Easytune6|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\A58-Easytune6|*.log

[Adobe Acrobat Reader 7.0 More*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Acrobat Reader\7.0\AVGeneral
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Adobe\Acrobat 7.0\Reader|*.bak
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Adobe\Acrobat 7.0\ActiveX|*.bak
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Adobe\Acrobat 7.0\Reader\plug_ins|*.bak
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Adobe\Acrobat 7.0\Reader\Updater|*.bak

[Adobe Air More*]
LangSecRef=3024
DetectFile=%LocalAppData%\Adobe\Air
Default=True
FileKey1=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Adobe\AIR\logs|*.*
FileKey2=%WinDir%\System32\config\systemprofile\AppData\Local\Adobe\AIR\logs|*.*

[Adobe Premiere Pro CC More*]
LangSecRef=3021
Detect1=HKLM\SOFTWARE\Adobe\Premiere Pro\7.0
Detect2=HKCU\Software\Adobe\Premiere Pro\7.0
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Adobe\Adobe Premiere Pro CC\cache|*-*-*.cache
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Adobe\Adobe Premiere Pro CC\Required\data\cache|*.pcache

[Advanced Searchbar More*]
LangSecRef=3022
DetectFile=%ProgramFiles%\AdvancedSearchbar\advancedsearchbar.dll
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\AdvancedSearchbar\Cache|*.*

[Aiseesoft Studio Logs*]
LangSecRef=3023
Detect=HKCU\Software\Aiseesoft Studio
Default=False
FileKey1=%AppData%\log|*.*|REMOVESELF
FileKey2=%AppData%\Aiseesoft Studio|fileinfolog.txt;*.log|RECURSE
FileKey3=%SystemDrive%\log|*.*|REMOVESELF

[AllDup Logs*]
LangSecRef=3024
DetectFile=%AppData%\AllDup
Default=False
FileKey1=%AppData%\AllDup|*.log

[Amazon Cloud Player Logs*]
LangSecRef=3024
DetectFile=%LocalAppData%\Amazon Cloud Player
Default=False
FileKey1=%LocalAppData%\Amazon Cloud Player\Logs|*.*

[AutoPlay Devices*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Warning=This will clear out all default autoplay options for devices and drives you've connected to your computer!
Default=False
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\KnownDevices

[bad Piggies*]
Section=Games
DetectFile=%ProgramFiles%\Rovio\Bad Piggies
Default=False
FileKey1=%ProgramFiles%\Rovio\Bad Piggies\BadPiggies_Data|output_log.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Rovio\Bad Piggies\BadPiggies_Data|output_log.txt

[bitcoin*]
LangSecRef=3022
Detect1=HKLM\SOFTWARE\Wow6432Node\Bitcoin Core
Detect2=HKCU\Software\Bitcoin
Detect3=HKCU\Software\Bitcoin Core
Default=False
FileKey1=%AppData%\Bitcoin|*.log;*.old

[CCleaner*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\CCleaner
Default=False
FileKey1=%ProgramFiles%\CCleaner|*.log;CCleaner_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\CCleaner|*.log;CCleaner_log*.txt
FileKey3=%UserProfile%|CCleaner_log*.txt

[CleanUp! Logs*]
LangSecRef=3024
Detect=HKCU\Software\stevengould.org\CleanUp!
Default=False
FileKey1=%AppData%|CleanUp!.log

[Copernic DesktopSearch4 Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Copernic\DesktopSearch4
Detect2=HKLM\SOFTWARE\Wow6432Node\Copernic\DesktopSearch4
Default=False
FileKey1=%AppData%\Copernic\DesktopSearch4\Logs|*.*|REMOVESELF

[Cyberduck Logs*]
LangSecRef=3024
Detect=HKCR\.cyberducklicense
Default=False
FileKey1=%AppData%\Cyberduck|*.log

[Delfix*]
LangSecRef=3024
DetectFile=%SystemDrive%\DelFix.txt
Default=False
FileKey1=%SystemDrive%|DelFix.txt

[Dell Backup and Recovery Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Dell
Detect2=HKLM\SOFTWARE\Wow6432Node\Dell
Default=False
FileKey1=%ProgramFiles%\Dell Backup and Recovery|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Dell Backup and Recovery|*.log

[Dexpot Logs*]
LangSecRef=3024
Detect=HKCU\Software\Dexpot
Default=False
FileKey1=%AppData%\Dexpot|*.log

[Dr. Despicable’s Dastardly Deeds*]
Section=Games
DetectFile=%AppData%\HitPoint Studios\DrD
Default=False
FileKey1=%AppData%\HitPoint Studios\DrD|logfile.txt

[Driver Magician*]
LangSecRef=3021
Detect=HKCU\Software\Driver Magician
Default=False
FileKey1=%AppData%\Driver Magician|HiddenUpdate.txt

[DVBDream*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\DVBDream
Detect2=HKLM\SOFTWARE\Wow6432Node\DVBDream
Default=False
FileKey1=%SystemDrive%\dvbdream\Logs|*.*
FileKey2=%SystemDrive%\dvbdream|*.log;*.bak;*levellog*|RECURSE
FileKey3=%ProgramFiles%\dvbdream\Logs|*.*
FileKey4=%ProgramFiles%\dvbdream|*.log;*.bak;*levellog*|RECURSE
FileKey5=%LocalAppData%\VirtualStore\Program Files*\dvbdream\Logs|*.*
FileKey6=%LocalAppData%\VirtualStore\Program Files*\dvbdream|*.log;*.bak;*levellog*|RECURSE

[Forte*]
LangSecRef=3025
Detect1=HKLM\SOFTWARE\Forte
Detect2=HKLM\SOFTWARE\Wow6432Node\Forte
Default=False
FileKey1=%SystemDrive%\My Data\ForteAgent|*.bak;*.log
FileKey2=%AppData%\Forte\Agent|errorlog.xml;*.log|RECURSE

[FossaMail Corrupt SQLites*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles|*.corrupt|RECURSE

[FossaMail Crash Reports*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Crash Reports|*.*|REMOVESELF

[FossaMail Extensions Log*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|extensions.log

[FossaMail Log*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%ProgramFiles%\FossaMail|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\FossaMail|*.log

[FossaMail Maintenance Service*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%CommonAppData%\Mozilla*\logs|*.*|REMOVESELF
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Mozilla*\logs|*.*|REMOVESELF

[FossaMail Minidumps*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*\Minidumps|*.*

[FossaMail Net Predictions*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|seer.sqlite;netpredictions.sqlite

[FossaMail Startup Cache*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%LocalAppData%\FossaMail\Profiles\*\startupCache|*.*

[FossaMail TestPilot Error Logs*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|TestPilotErrorLog.*|RECURSE

[FossaMail Update Logs*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%LocalAppData%\FossaMail\Mozilla\*\Updates|*.log|RECURSE

[FossaMail webappsstore.sqlite*]
LangSecRef=3030
Detect1=HKLM\SOFTWARE\Mozilla\FossaMail
Detect2=HKLM\SOFTWARE\Wow6432Node\Mozilla\FossaMail
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|webappsstore.sqlite

[Geek Unistaller*]
LangSecRef=3024
Detect=HKCU\Software\Geek Uninstaller
Default=False
FileKey1=%AppData%\Geek Uninstaller|*.log;*cache.dat

[GhostMouse*]
LangSecRef=3024
DetectFile=%ProgramFiles%\GhostMouse
Default=False
FileKey1=%Documents%\AutomaticSolution Software\GhostMouse\conf\temp|*.tmp

[Google Apps Sync*]
LangSecRef=3022
DetectFile=%LocalAppData%\Google\Google Apps Sync
Default=False
FileKey1=%LocalAppData%\Google\Google Apps Sync|*.log|RECURSE

[Google Apps Migration*]
LangSecRef=3022
DetectFile=%LocalAppData%\Google\Google Apps Migration
Default=False
FileKey1=%LocalAppData%\Google\Google Apps Migration|*.log|RECURSE

[Google Calendar Sync*]
LangSecRef=3022
DetectFile=%LocalAppData%\Google\Google Calendar Sync
Default=False
FileKey1=%LocalAppData%\Google\Google Calendar Sync|*.log|RECURSE

[HDD Health*]
LangSecRef=3022
Detect=HKLM\SYSTEM\CurrentControlSet\services\HDDHealth
Default=False
FileKey1=%ProgramFiles%\HDD Health|*.tmp
FileKey2=%LocalAppData%\VirtualStore\Program Files*\HDD Health|*.tmp

[Hex Chat Logs*]
LangSecRef=3024
DetectFile=%AppData%\HexChat
Default=False
FileKey1=%AppData%\HexChat\logs|*.*|REMOVESELF

[iMobie PhoneTrans Pro*]
LangSecRef=3024
Detect=HKCU\Software\Imobie\PhoneTrans Pro
Default=False
FileKey1=%AppData%\iMobie\Backup|*.*|RECURSE
FileKey2=%AppData%\iMobie\PhoneTrans\AutoUpdate|*.*|RECURSE
FileKey3=%AppData%\iMobie\PhoneTrans\ErrorLog|*.*|RECURSE
FileKey4=%AppData%\iMobie\PhoneTrans\iMobieConfig|*.*|RECURSE
ExcludeKey1=PATH|%AppData%\iMobie\PhoneTrans\iMobieConfig\ConfigReg.ini

[Kate's Video Toolkit Logs*]
LangSecRef=3023
Detect=HKCU\Software\Web Solution Mart\Kate's Video Toolkit
Default=False
FileKey1=%CommonAppData%\Web Solution Mart\*|*.log|RECURSE

[Logitech Desktop Messenger*]
LangSecRef=3024
Detect1=HKCU\Software\Logitech\DesktopMessenger
Detect2=HKLM\SOFTWARE\Wow6432Node\Logitech\Logitech Desktop Messenger
Detect3=HKLM\SOFTWARE\Wow6432Node\Logitech\DesktopMessenger
Detect4=HKLM\SOFTWARE\Logitech\DesktopMessenger
Detect5=HKLM\SOFTWARE\Logitech\DesktopMessenger
Default=False
FileKey1=%ProgramFiles%\Logitech\Desktop Messenger|*.log;*.bak
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Logitech\Desktop Messenger|*.log;*.bak

[Malwarebytes Anti-Exploit Logs*]
LangSecRef=3024
Detect1=HKLM\SYSTEM\CurrentControlSet\Services\MbaeSvc
Default=False
FileKey1=%CommonAppData%\\Malwarebytes Anti-Exploit\|*.Log

[Mixxx*]
LangSecRef=3023
DetectFile=%LocalAppData%\Mixxx
Default=False
FileKey1=%LocalAppData%\Mixxx|*.log

[MS Office OneDrive*]
LangSecRef=3021
Detect=HKCU\Software\Microsoft\SkyDrive
Default=False
FileKey1=%LocalAppData%\Microsoft\SkyDrive\logs|*.*

[MSI Afterburner Hardware Monitoring*]
LangSecRef=3024
Detect=HKCU\Software\MSI
Default=False
FileKey1=%ProgramFiles%\MSI Afterburner|HardwareMonitoring.hml
FileKey2=%LocalAppData%\VirtualStore\Program Files*\MSI Afterburner|HardwareMonitoring.hml

[Multi-Edit 2008 Logs*]
LangSecRef=3024
DetectFile2=%AppData%\Multi Edit Software
Default=False
FileKey1=%AppData%\Multi Edit Software|*.log|RECURSE

[MyDefrag Logs*]
LangSecRef=3021
Detect=HKCU\Software\MyDefrag
Default=False
FileKey1=%ProgramFiles%\MyDefrag *|*.log
FileKey2=%ProgramFiles%\MyDefrag *\LOGs|*.*
FileKey3=%LocalAppData%\VirtualStore\Program Files*\MyDefrag *|*.log
FileKey4=%LocalAppData%\VirtualStore\Program Files*\MyDefrag *\LOGs|*.*

[Nimbuzz Logs*]
LangSecRef=3022
Detect=HKCU\Software\Nimbuzz
Default=False
FileKey1=%AppData%\nimbuzz|*.log

[NirSoft AddrView LastUrlAddr*]
LangSecRef=3024
Detect=HKCU\Software\NirSoft\AddrView\
Default=False
RegKey1=HKCU\Software\NirSoft\AddrView|LastUrlAddr

[NVIDIA GLCache*]
LangSecRef=3023
Detect=HKLM\Software\NVIDIA Corporation
Default=False
FileKey1=%AppData%\NVIDIA\GLCache|*.*|RECURSE

[Panda Cloud Antivirus (Other Logs)*]
LangSecRef=3024
Detect=HKLM\Software\Panda Security
Default=False
FileKey1=%CommonAppData%\Panda Security\PSLogs|*.log
FileKey2=%CommonAppData%\Panda Security\Panda Devices Agent\Logs|*.*

[PKWARE PKZIP Logs*]
LangSecRef=3024
Detect1=HKCU\Software\PKWARE\PKZIP for Windows
Detect2=HKCU\Software\PKWARE\ZIPReader 0
Detect3=HKCU\Software\PKWARE\PKZIP70
Default=False
FileKey1=%ProgramFiles%\PKWARE\PKZIPW|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\PKWARE\PKZIPW|*.log

[ProFantasy Software CC3 View More*]
LangSecRef=3023
Detect=HKCU\Software\EvolutionComputing
Default=False
RegKey1=HKCU\Software\EvolutionComputing\CC3View|1
RegKey2=HKCU\Software\EvolutionComputing\CC3View|2
RegKey3=HKCU\Software\EvolutionComputing\CC3View|3
RegKey4=HKCU\Software\EvolutionComputing\CC3View|4
RegKey5=HKCU\Software\EvolutionComputing\CC3View|WorkingDrawing

[Recuva*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Recuva
Default=False
FileKey1=%ProgramFiles%\Recuva|*.log;Recuva_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Recuva|*.log;Recuva_log*.txt
FileKey3=%UserProfile%|Recuva_log*.txt

[RegEditX More*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\DCSoft\RegEditX
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\DCSoft\RegEditX\x86|RegEditX.sav;RegEditX.bak
FileKey2=%LocalAppData%\VirtualStore\Program Files*\DCSoft\RegEditX\x64|RegEditX.sav;RegEditX.bak

[seagate SeaTools for Windows Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Wow6432Node\SeaToolsforWindows
Detect2=HKLM\SOFTWARE\SeaToolsforWindows
Default=False
FileKey1=%AppData%\Dexpot|*.log

[serviio Logs*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Serviio
Default=False
FileKey1=%ProgramFiles%\Serviio\log|*.*
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Serviio\log|*.*

[spiral Knights]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\99900
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\common\Spiral Knights|*.log

[symantec SymSilent Logs*]
LangSecRef=3024
DetectFile=%Public%\Symantec\SymSilent
Default=False
FileKey1=%Public%\Symantec\SymSilent\ccLog|*.*

[TeamViewer Temporary Files*]
LangSecRef=3024
Detect=HKCU\Software\TeamViewer
Default=False
FileKey1=%ProgramFiles%\TeamViewer\*|*.tmp|RECURSE
FileKey2=%LocalAppData%\VirtualStore\Program Files*\TeamViewer\*|*.tmp|RECURSE

[TrendMicro RUBotted Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Wow6432Node\TrendMicro\RUBotted
Detect2=HKLM\SOFTWARE\TrendMicro\RUBotted
Default=False
FileKey1=%ProgramFiles%\Trend Micro\RUBotted\DebugLogs|*.*|REMOVESELF
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Trend Micro\RUBotted\DebugLogs|*.*|REMOVESELF

[TuneUp Utilities Installation/Update Logs*]
LangSecRef=3024
Detect=HKCU\Software\TuneUp
Default=False
FileKey1=%CommonAppData%\TuneUp Software\TuneUp Utilities *\|*.log

[Wallpaper Juggler*]
LangSecRef=3024
DetectFile=%ProgramFiles%\Wallpaper Juggler
Default=False
FileKey1=%ProgramFiles%\Wallpaper Juggler|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Wallpaper Juggler|*.log

[Windows Live Writer Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Microsoft\Windows Live Writer
Detect2=HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Live Writer
Default=False
FileKey1=%LocalAppData%\Windows Live Writer|*.log

[Wistron Corp Launch Manager Logs*]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Wistron Corp\Launch Manager
Detect2=HKLM\SOFTWARE\Wow6432Node\Wistron Corp\Launch Manager
Default=False
FileKey1=%ProgramFiles%\Launch Manager|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Launch Manager|*.log

[WRAL Desktop Alert Logs*]
LangSecRef=3024
DetectFile=%ProgramFiles%\WRAL Desktop Alert
Default=False
FileKey1=%ProgramFiles%\WRAL Desktop Alert|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\WRAL Desktop Alert|*.log




------------------------------------------------------------------------------

Modified Entries:

[Adblock Backups*]
LangSecRef=3026
SpecialDetect=DET_MOZILLA
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblock*|patterns-backup*.ini;*.tmp

    - Improved FileKey1
    
[AI Roboform*]
LangSecRef=3022
Detect=HKCU\Software\Siber Systems
Default=False
FileKey1=%AppData%\RoboForm\_gsdata_mirrors_|*.*|RECURSE
FileKey2=%AppData%\RoboForm\_mirrors_|*.*|RECURSE
FileKey3=%Documents%\My RoboForm Data\_gsdata_|*.log;*.gss;*.gsl|RECURSE
FileKey4=%Documents%\My RoboForm Data|mru.rfo;cache.rfo|RECURSE
FileKey5=%Documents%\My RoboForm Data\*|mru.rfo;cache.rfo|RECURSE
RegKey1=HKCU\Software\Siber Systems|_InstallerDir
RegKey2=HKCU\Software\Siber Systems\RoboForm\Query-MRU
ExcludeKey1=FILE|%ProgramFiles%\Siber Systems\AI RoboForm\affid.txt

    - Imrpoved FileKeys1 through 4
    
[Apple Application Logs*]
LangSecRef=3021
Detect=HKCU\Software\Apple Computer, Inc.
Default=False
FileKey1=%AppData%\Apple Computer\logs|*.log
FileKey2=%UserProfile%\Apple Computer\logs|*.log
FileKey3=%WinDir%\System32\config\systemprofile\AppData\Roaming\Apple Computer\Logs|*.log
FileKey4=%WinDir%\SysWOW64\config\systemprofile\AppData\Roaming\Apple Computer\Logs|*.log

    - Added FileKey2

[AQQ Cache*]
LangSecRef=3022
Detect1=HKCU\Software\Wapster\AQQ
Detect2=HKCU\Software\MyPortal\AQQ
Default=False
FileKey1=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\Cache|*.*
FileKey2=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\PrivateCache|*.*
FileKey3=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\Avatars|*.*
FileKey4=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\LocalAvatars|*.*
FileKey5=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\Cache|*.*
FileKey6=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\PrivateCache|*.*
FileKey7=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\Avatars|*.*
FileKey8=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\LocalAvatars|*.*

    - Added Detect2
    - Added FileKeys5 through 8

[AQQ Chat History*]
LangSecRef=3022
Warning=This will delete your chat history.
Detect1=HKCU\Software\Wapster\AQQ
Detect2=HKCU\Software\MyPortal\AQQ
Default=False
FileKey1=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\Archive|*.DC2
FileKey2=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\Archive|*.DC2

    - Added Detect2
    - Added FileKey2

[AQQ Temps*]
LangSecRef=3022
Warning=This will delete your chat history.
Detect1=HKCU\Software\Wapster\AQQ
Detect2=HKCU\Software\MyPortal\AQQ
Default=False
FileKey1=%UserProfile%\WapSter\AQQ Folder\Profiles\*\Data\Temp|*.*
FileKey2=%LocalAppData%\MyPortal\AQQ Folder\Profiles\*\Data\Temp|*.*

    - Added Detect2
    - Added FileKey2
    
[AVG AntiVirus 2013 More*]
LangSecRef=3024
Detect=HKLM\Software\AVG\AVG2013
Default=False
FileKey1=%CommonAppData%\AVG2013\IDS\config|*List.zip.bak
FileKey2=%CommonAppData%\AVG2013\IDS\profile|globalLoadable.bak
FileKey3=%CommonAppData%\AVG2013\Log|history.xml
FileKey4=%CommonAppData%\AVG2013\SetupBackup|*.*
FileKey5=%CommonAppData%\MFAData\Logs|*.*
FileKey6=%LocalAppData%\AVG2013\log|*.log;*.log.*
FileKey7=%LocalAppData%\AVG2013\temp|*.tmp
FileKey8=%ProgramFiles%\AVG\AVG2013|updatecomps.bak;*.old
FileKey9=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\dumps|*.*
FileKey10=%WinDir%\System32\config\systemprofile\Local Settings\Application Data\Avg2013\dumps|*.*
FileKey11=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\log|*.*
FileKey12=%WinDir%\System32\config\systemprofile\Local Settings\Application Data\Avg2013\log|*.*
FileKey13=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\dumps|*.*
FileKey14=%WinDir%\SysWOW64\config\systemprofile\Local Settings\Application Data\Avg2013\dumps|*.*
FileKey15=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\log|*.*
FileKey16=%WinDir%\SysWOW64\config\systemprofile\Local Settings\Application Data\Avg2013\log|*.*
FileKey17=%LocalAppData%\VirtualStore\Program Files*\AVG\AVG2013|updatecomps.bak;*.old
FileKey18=%LocalAppData%\VirtualStore\ProgramData\AVG2013\IDS\config|*List.zip.bak
FileKey19=%LocalAppData%\VirtualStore\ProgramData\AVG2013\IDS\profile|globalLoadable.bak
FileKey20=%LocalAppData%\VirtualStore\ProgramData\AVG2013\Log|history.xml
FileKey21=%LocalAppData%\VirtualStore\ProgramData\AVG2013\SetupBackup|*.*
FileKey22=%LocalAppData%\VirtualStore\ProgramData\MFAData\Logs|*.*
FileKey23=%WinDir%\System32\config\systemprofile\AppData\Local\MFAData\logs|*.*
FileKey24=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\MFAData\logs|*.*
FileKey25=%LocalAppData%\MFAData\logs|*.log;*.log.*

    - Changed FileKey25 from duplicate

[AVG AntiVirus 2014*]
LangSecRef=3024
Detect=HKLM\Software\AVG\AVG2014
Default=False
FileKey1=%CommonAppData%\AVG2014\Log|*.log;history.xml
FileKey2=%CommonAppData%\AVG2014\scanlogs|*.log
FileKey3=%CommonAppData%\AVG2014\update\backup|*.*
FileKey4=%CommonAppData%\AVG2014\Emc\Log|*.log
FileKey5=%CommonAppData%\AVG2014\IDS\config|*List.zip.bak
FileKey6=%CommonAppData%\AVG2014\IDS\profile|globalLoadable.bak
FileKey7=%CommonAppData%\AVG2014\Temp|*.tmp
FileKey8=%CommonAppData%\AVG2014\SetupBackup|*.*
FileKey9=%CommonAppData%\MFAData\Logs|*.*
FileKey10=%LocalAppData%\AVG2014\log|*.log;*.log.*
FileKey11=%LocalAppData%\AVG2014\temp|*.tmp
FileKey12=%ProgramFiles%\AVG\AVG2014|updatecomps.bak;*.old
FileKey13=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\dumps|*.*
FileKey14=%WinDir%\System32\config\systemprofile\Local Settings\Application Data\Avg2014\dumps|*.*
FileKey15=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\log|*.*
FileKey16=%WinDir%\System32\config\systemprofile\Local Settings\Application Data\log|*.*
FileKey17=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\dumps|*.*
FileKey18=%WinDir%\SysWOW64\config\systemprofile\Local Settings\Application Data\dumps|*.*
FileKey19=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\log|*.*
FileKey20=%WinDir%\SysWOW64\config\systemprofile\Local Settings\Application Data\log|*.*
FileKey21=%LocalAppData%\VirtualStore\Program Files*\AVG\AVG2014|updatecomps.bak;*.old
FileKey22=%LocalAppData%\VirtualStore\ProgramData\AVG2014\Log|*.log;history.xml
FileKey23=%LocalAppData%\VirtualStore\ProgramData\AVG2014\scanlogs|*.log
FileKey23=%LocalAppData%\VirtualStore\ProgramData\AVG2014\update\backup|*.*
FileKey24=%LocalAppData%\VirtualStore\ProgramData\AVG2014\Emc\Log|*.log
FileKey25=%LocalAppData%\VirtualStore\ProgramData\AVG2014\IDS\config|*List.zip.bak
FileKey26=%LocalAppData%\VirtualStore\ProgramData\AVG2014\IDS\profile|globalLoadable.bak
FileKey27=%LocalAppData%\VirtualStore\ProgramData\AVG2014\Temp|*.tmp
FileKey28=%LocalAppData%\VirtualStore\ProgramData\AVG2014\SetupBackup|*.*
FileKey29=%LocalAppData%\VirtualStore\ProgramData\MFAData\Logs|*.*
FileKey30=%WinDir%\System32\config\systemprofile\AppData\Local\MFAData\logs|*.*
FileKey31=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\MFAData\logs|*.*
FileKey32=%LocalAppData%\MFAData\logs|*.log;*.log.*

    - Changed FileKey32 from duplicate
    
[blackBerry Desktop Software*]
LangSecRef=3023
Detect=HKCU\Software\Research In Motion\BlackBerry
Default=False
FileKey1=%AppData%|Rim*.log
FileKey2=%LocalAppData%\Research In Motion\BlackBerry Desktop\*\*|*.backup
FileKey3=%LocalAppData%\Research In Motion\BlackBerry Desktop\*\*\Log|*.html
FileKey4=%LocalAppData%\Research In Motion\BlackBerry Desktop\Logs|*.*|REMOVESELF
FileKey5=%AppData%\Research In Motion\BlackBerry Desktop|*.dmp

    - Added FileKey5
    
[blueStacks Setup*]
Warning=You will have to redownload these files in order to reinstall the application.
LangSecRef=3021
Detect1=HKCU\Software\Bluestacks
Detect2=HKLM\Software\Bluestacks
DetectFile=%CommonAppData%\BlueStacks
Default=False
FileKey1=%CommonAppData%\BlueStacksSetup\Images\|*.*|REMOVESELF
FileKey2=%CommonAppData%\BlueStacksSetup|runtimedata_*.zip;runtimedata_*.zip.manifest
FileKey3=%LocalAppData%\VirtualStore\ProgramData\BlueStacksSetup\Images\|*.*|REMOVESELF
FileKey4=%LocalAppData%\VirtualStore\ProgramData\BlueStacksSetup|runtimedata_*.zip;runtimedata_*.zip.manifest

    - Improved FileKeys2 and 4
    
[Chrome Installer*]
LangSecRef=3029
DetectFile1=%LocalAppData%\Google\Chrome
DetectFile2=%LocalAppData%\Google\Chrome SxS
DetectFile3=%ProgramFiles%\Google\Chrome
DetectFile4=%ProgramFiles%\Google\Chrome SxS
Default=False
Warning=Running this may remove Chrome's ability to automatically update to future versions on some computers.
FileKey1=%LocalAppData%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE
FileKey2=%ProgramFiles%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE
FileKey3=%LocalAppData%\Google\Update\*\*\Installer|*.7z|RECURSE
FileKey4=%ProgramFiles%\Google\Update\*\*\Installer|*.7z|RECURSE
FileKey5=%ProgramFiles%|GUT*tmp

    - Added FileKey5
    
[Defraggler*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Defraggler
Default=False
FileKey1=%ProgramFiles%\Defraggler|*.dmp;*statistics*;*.log;Defraggler*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Defraggler|*.dmp;*statistics*;*.log;Defraggler*.txt
FileKey3=%UserProfile%|Defraggler*.txt

    - Improved FileKeys1 and 2
    - Added FileKey3

[Google Earth More*]
LangSecRef=3021
Detect1=HKLM\Software\Google\Google Earth Plus
Detect2=HKLM\Software\Google\Google Earth Pro
Detect3=HKCU\Software\Google\Google Earth Plus
Detect4=HKCU\Software\Google\Google Earth Pro
Default=False
FileKey1=%LocalLowAppData%\Google\GoogleEarth|*.tmp;*.log|RECURSE
FileKey2=%LocalLowAppData%\Google\GoogleEarth\unified_cache_leveldb_*|*.*|REMOVESELF
FileKey3=%ProgramFiles%\Google\GoogleEarth\client|*.log
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Google\GoogleEarth\client|*.log

    - Improved FileKey1
    - Added FileKeys3 and 4
    
[Helium Music Manager*]
LangSecRef=3023
Detect1=HKCU\Software\Intermedia Software\Helium 8
Detect2=HKCU\Software\Intermedia Software\Helium 9
Detect3=HKCU\Software\Intermedia Software\Helium 10
Default=False
FileKey1=%AppData%\Intermedia Software\Helium *\Logs|*.*

    - Added Detect3
    
[HitManPro*]
LangSecRef=3024
Detect1=HKCU\Software\HitMan Pro
Detect2=HKCU\Software\HitMan Pro 2
Detect3=HKCU\Software\HitMan Pro 3
Detect4=HKLM\SOFTWARE\Wow6432Node\HitmanPro
Default=False
FileKey1=%ProgramFiles%\Hitman Pro*\downloads|*.*
FileKey2=%ProgramFiles%\Hitman Pro*\logs|*.htm
FileKey3=%ProgramFiles%\Hitman Pro*\updates|*.*
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Hitman Pro*\downloads|*.*
FileKey5=%LocalAppData%\VirtualStore\Program Files*\Hitman Pro*\logs|*.htm
FileKey6=%LocalAppData%\VirtualStore\Program Files*\Hitman Pro*\updates|*.*
FileKey7=%CommonAppData%\HitmanPro\Logs|*.*
FileKey8=%LocalAppData%\VirtualStore\ProgramData\HitmanPro\Logs|*.*

    - Added Detect4
    
[HP Install Logs*]
LangSecRef=3021
Detect=HKCU\Software\HP
DetectFile=%CommonAppData%\HP
Default=False
FileKey1=%CommonAppData%|hpzinstall.log
FileKey2=%UserProfile%\All Users|hpzinstall.log
FileKey3=%LocalAppData%\VirtualStore\ProgramData|hpzinstall.log
FileKey4=%AppData%\HP\WebRegLogs|WebRegLog.txt
FileKey5=%SystemDrive%\hp\bin\logs|*.log
FileKey6=%CommonAppData%\Hewlett-Packard|*.log;*Log.txt|RECURSE

    - Added FileKeys4 through 6
    
[HP Install Temps*]
LangSecRef=3021
Detect=HKCU\Software\HP
DetectFile=%CommonAppData%\HP
Default=False
FileKey1=%CommonAppData%\HP\Installer\Temp|*.*
FileKey2=%CommonAppData%\HP\Temp|*.*
FileKey3=%ProgramFiles%\HP\Temp|*.*|RECURSE
FileKey4=%UserProfile%\All Users\HP\Installer\Temp|*.*
FileKey5=%LocalAppData%\VirtualStore\Program Files*\HP\Temp|*.*|RECURSE
FileKey6=%LocalAppData%\VirtualStore\ProgramData\HP\Installer\Temp|*.*
FileKey7=%LocalAppData%\VirtualStore\ProgramData\HP\Temp|*.*
FileKey8=%WinDir%|*.dat.temp

    - Added FileKey8
    
[iMobie PhoneClean*]
LangSecRef=3024
Detect=HKCU\Software\Imobie\PhoneClean
Default=False
FileKey1=%AppData%\iMobie\PhoneClean\AutoUpdate|*.*|RECURSE
FileKey2=%AppData%\iMobie\PhoneClean\DeviceBackup\Backup|*.*|RECURSE
FileKey3=%AppData%\iMobie\PhoneClean\DeviceBackup\Restore|*.*|RECURSE
FileKey4=%AppData%\iMobie\PhoneClean\EasyLoseFiles|*.*|RECURSE
FileKey5=%AppData%\iMobie\PhoneClean\ErrorLog|*.*|RECURSE
FileKey6=%AppData%\iMobie\PhoneClean\iMobieConfig|*.*|RECURSE
ExcludeKey1=PATH|%AppData%\iMobie\PhoneClean\iMobieConfig\ConfigReg.ini

    - Added FileKey1
    
[intel Installation Logs*]
LangSecRef=3024
Detect1=HKCU\Software\Intel
Detect2=HKLM\Software\Intel
Default=False
FileKey1=%SystemDrive%\Intel*|*.*|REMOVESELF
FileKey2=%UserProfile%\Intel\Logs|*log
FileKey3=%ProgramFiles%\Intel\InfInst|*.*|REMOVESELF
FileKey4=%WinDir%\debug\intel\logs|*.*|REMOVESELF
FileKey5=%WinDir%\SysWOW64\config\systemprofile\Intel\Logs|*.*|REMOVESELF
FileKey6=%WinDir%\System32\config\systemprofile\Intel\Logs|*.*|REMOVESELF
FileKey7=%LocalAppData%\VirtualStore\Program Files*\Intel\InfInst|*.*|REMOVESELF
FileKey8=%CommonAppData%\intel|*.log|REMOVESELF

    - Added FileKey8
    
[JDownloader Logs*]
LangSecRef=3022
Detect=HKLM\Software\JDownloader
DetectFile=%ProgramFiles%\JDownloader
Default=False
FileKey1=%ProgramFiles%\JDownloader|*.log;updateLog.txt;*.lck;*.log.*
FileKey2=%UserProfile%\.jd_home|JDownloader.log
FileKey3=%UserProfile%\.jd_home\logs|*.0
FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader|*.log;updateLog.txt;*.lck;*.log.*
FileKey5=%ProgramFiles%\JDownloader\logs|*.log
FileKey6=%LocalAppData%\VirtualStore\Program Files*\JDownloader\logs|*.log

    - Improved FileKeys1 and 4
    - Added FileKeys5 and 6
    
[K-Lite Codec Pack*]
LangSecRef=3023
Detect=HKLM\Software\KLCodecPack
Default=False
FileKey1=%ProgramFiles%\K-Lite|*.log;*.txt|RECURSE
FileKey2=%ProgramFiles%\K-Lite Codec Pack|*.log;*.txt|RECURSE
FileKey3=%SystemDrive%|*klcp_itp_*.tmp;*klcp_iph_*.tmp;
FileKey4=%UserProfile%\Desktop|klcp_codec_log.txt
FileKey5=%LocalAppData%\VirtualStore\Program Files*\K-Lite|*.log;*.txt|RECURSE
FileKey6=%LocalAppData%\VirtualStore\Program Files*\K-Lite Codec Pack|*.log;*.txt|RECURSE
RegKey1=HKU\S-1-5-21-1409082233-152049171-725345543-500\Software\Gabest\vsfilter\DefTextPathes|Path0
RegKey2=HKU\S-1-5-21-1409082233-152049171-725345543-500\Software\Gabest\vsfilter\DefTextPathes|Path1
RegKey3=HKU\S-1-5-21-1409082233-152049171-725345543-500\Software\Gabest\vsfilter\DefTextPathes|Path2

    - Improved FileKey3
    
[Logitech Setpoint 6 (Logs)*]
LangSecRef=3024
Detect=HKCU\Software\Logitech\Setpoint
Default=False
FileKey1=%AppData%\Logishrd\sp6_Log|*.*|REMOVESELF
FileKey2=%WinDir%\System32|lvcoinst.log
FileKey3=%CommonAppData%\LogiShrd|*.log|RECURSE
FileKey4=%ProgramFiles%\Common Files\logishrd|*.log|RECURSE
FileKey5=%LocalAppData%\VirtualStore\Program Files*\Common Files\logishrd|*.log|RECURSE

    - Added FileKeys2 through 5

[My Horse and Me*]
Section=Games
Detect1=HKLM\Software\My Horse and Me 2
Detect2=HKLM\SOFTWARE\Atari\Mein Pferd und ich Demo
Detect3=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich Demo
Detect4=HKLM\SOFTWARE\Atari\Mein Pferd und ich
Detect5=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich
Default=False
FileKey1=%ProgramFiles%\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
FileKey3=%ProgramFiles%\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
FileKey5=%ProgramFiles%\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
FileKey6=%LocalAppData%\VirtualStore\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE

    - Added FileKeys3 through 6
    - Added Detects2 through 5
    
[Paint.NET More*]
LangSecRef=3021
Detect=HKCU\Software\Paint.NET
Default=False
FileKey1=%LocalAppData%\Paint.NET|*.*|RECURSE
RegKey1=HKCU\Software\Paint.NET|LastFileDialogDirectory
RegKey2=HKCU\Software\Paint.NET|File/MostRecent/Path0
RegKey3=HKCU\Software\Paint.NET|File/MostRecent/Path1
RegKey4=HKCU\Software\Paint.NET|File/MostRecent/Path2
RegKey5=HKCU\Software\Paint.NET|File/MostRecent/Path3
RegKey6=HKCU\Software\Paint.NET|File/MostRecent/Path4
RegKey7=HKCU\Software\Paint.NET|File/MostRecent/Path5
RegKey8=HKCU\Software\Paint.NET|File/MostRecent/Path6
RegKey9=HKCU\Software\Paint.NET|File/MostRecent/Path7
RegKey10=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail0
RegKey11=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail1
RegKey12=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail2
RegKey13=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail3
RegKey14=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail4
RegKey15=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail5
RegKey16=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail6
RegKey17=HKCU\Software\Paint.NET|File/MostRecent/Thumbnail7


    - Added RegKeys 2 through 17
    
[Realtek (Logs)*]
LangSecRef=3021
Detect=HKLM\Software\Realtek
Default=False
FileKey1=%ProgramFiles%\Realtek*|*.log;*.txt|RECURSE
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Realtek*|*.log;*.txt|RECURSE
FileKey3=%SystemDrive%|RHDSetup.log|RECURSE
ExcludeKey1=FILE|%ProgramFiles%\Realtek\*\InstCtrl.txt
ExcludeKey2=FILE|%ProgramFiles%\Realtek\*\setupctrl.txt

    - Added FileKey3
    
[sonic Visualiser*]
LangSecRef=3023
Detect=HKCU\Software\sonic-visualiser\
DetectFile=%UserProfile%\.Sonic Visualiser
Default=False
FileKey1=%UserProfile%\.Sonic Visualiser\cache|*.*

    - Added Detect

[speccy*]
LangSecRef=3024
Detect=HKLM\Software\Piriform\Speccy
Default=False
Warning=If you have run Debug Mode at the request of support, do not clean this unless told the dump is unneeded.
FileKey1=%ProgramFiles%\Speccy|*.dmp;*.log;Speccy_log*.txt
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Speccy|*.dmp;*.log;Speccy_log*.txt
FileKey3=%UserProfile%|Speccy_log*.txt

    - Improved FileKeys1 and 3
    - Added FileKey3
    
[starMoney*]
LangSecRef=3021
DetectFile1=%CommonAppData%\StarMoney 7.0
DetectFile2=%CommonAppData%\StarMoney 8.0
DetectFile3=%CommonAppData%\StarMoney 9.0
DetectFile4=%CommonAppData%\StarMoney Business 4.0
DetectFile5=%CommonAppData%\StarMoney Business 5.0
Default=False
FileKey1=%CommonAppData%\StarMoney *|*.log|RECURSE
FileKey2=%LocalAppData%\VirtualStore\ProgramData\StarMoney *|*.log|RECURSE

    - Added DetectFiles1, 4, and 5
    
[Tag&Rename*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename\Config
Default=False
RegKey1=HKCU\Software\Softpointer\Tag&Rename\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename2\Config|FCurrentFolder
RegKey4=HKCU\Software\Softpointer\Tag&Rename2\Config|FHistoryList
RegKey5=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder
RegKey6=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList
RegKey7=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader
RegKey8=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder
RegKey9=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList
RegKey10=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader
RegKey11=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

    - Merged all Tag and Rename entries into one
    
[Trend Micro Logs*]
LangSecRef=3023
Detect=HKCU\Software\Trend Micro
DetectFile=%CommonAppData%\Trend Micro
Default=False
FileKey1=%CommonAppData%\Trend Micro|*.log
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Trend Micro|*.log

    - Added DetectFile
    
[TuneUp Utilities Logs*]
LangSecRef=3024
Detect=HKCU\Software\TuneUp
Default=False
FileKey1=%LocalAppData%\TuneUp Software|*.log|RECURSE
FileKey2=%CommonAppData%\TuneUp Software\TuneUp Utilities *|*.log|RECURSE

    - Added FileKey2
    
[TweetDeck*]
LangSecRef=3022
Detect=HKCU\Software\Twitter\TweetDeck
Default=False
Warning=May delete your password and require you to log in again.
FileKey1=%LocalAppData%\Twitter\TweetDeck\localStorage|*.*
FileKey2=%ProgramFiles%\Twitter\TweetDeck|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Twitter\TweetDeck|*.log

    - Added FileKeys2 and 3
    
[VNCViewer 5*]
LangSecRef=3024
Detect=HKCU\Software\RealVNC\vncviewer\
Default=False
RegKey1=HKCU\Software\RealVNC\vncviewer\MRU
FileKey1=%LocalAppData%\RealVNC|*.log

    - Added FileKey1
    
[Yahoo Messenger Logs*]
LangSecRef=3022
Detect=HKCU\Software\Yahoo\pager
Default=False
FileKey1=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\logs|*.log
FileKey2=%ProgramFiles%\Yahoo!\Messenger|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp

    - Added FileKeys2 and 3
    
[Windows Live Setup Logs*]
LangSecRef=3022
Detect1=HKLM\Software\Microsoft\Windows Live
Detect2=HKCU\Software\Microsoft\Windows Live Mail
Default=False
FileKey1=%CommonAppData%\Microsoft\WLSetup\Cablogs|*.*|RECURSE
FileKey2=%CommonAppData%\Microsoft\WLSetup\Logs|*.*|RECURSE
FileKey3=%LocalAppData%\Microsoft\WLSetup\Cablogs|*.*|RECURSE
FileKey4=%LocalAppData%\Microsoft\WLSetup\Logs|*.*|RECURSE
FileKey5=%CommonAppData%\WLInstaller|*.log
FileKey6=%LocalAppData%\VirtualStore\ProgramData\Microsoft\WLSetup\Cablogs|*.*|RECURSE
FileKey7=%LocalAppData%\VirtualStore\ProgramData\Microsoft\WLSetup\Logs|*.*|RECURSE
FileKey8=%LocalAppData%\VirtualStore\ProgramData\WLInstaller|*.log

    - Added Detect2
    
------------------------------------------------------------------------------
Removed Entries:

[Agent NewsReader*]
LangSecRef=3021
DetectFile=%ProgramFiles%\Agent
Default=False
FileKey1=%ProgramFiles%\Agent\Data|*.IDX;*.DAT;*.BAK
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Agent\Data|*.IDX;*.DAT;*.BAK

    - Removed for being invasive (submit a post on the forum with a revision)

[snagit 12*]
LangSecRef=3024
Detect=HKCU\Software\TechSmith\SnagIt\12
Default=False
RegKey1=HKCU\Software\TechSmith\SnagIt\12\Recent Captures
RegKey2=HKCU\Software\TechSmith\SnagIt\12\SnagItEditor\Recent File List
FileKey1=%LocalAppData%\TechSmith\SnagIt|Tray.bin
FileKey2=%LocalAppData%\TechSmith\SnagIt\DataStore\AppIcons|*.*
FileKey3=%LocalAppData%\TechSmith\SnagIt\DataStore\WebSiteIcons|*.*
FileKey4=%LocalAppData%\TechSmith\SnagIt\Thumbnails|*.*

    - Included in CCleaner v4.15
    
[Tag&Rename 2*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename2\Config
Default=False
RegKey1=HKCU\Software\Softpointer\Tag&Rename2\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename2\Config|FHistoryList

    - Merged into Tag and Rename
    
[Tag&Rename 3*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename3\Config
Default=False
FileKey1=%Music%|*.jpg
RegKey1=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader

    - Merged into Tag and Rename
    
[Tag&Rename 3.7*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename3.7\Config
Default=False
FileKey1=%Music%|*.jpg
RegKey1=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader
RegKey4=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

    - Merged into Tag and Rename
    
[Zimbra Desktop Logs*]
LangSecRef=3022
Detect=HKCU\Software\Zimbra
Default=False
FileKey1=%LocalAppData%\Zimbra\Zimbra Desktop\log|*.*

    - Duplicate entry

 

 

 

Link to comment
Share on other sites

re: Realtek (logs)*

 

Can this entry be edited to be faster please?

 

re: Yahoo Messenger Icon & Plugin cache*

 

Can this entry be split into Icon cache and plugin cache

 

re: Forte

 

rename to [Forte Agent*] please

 

new entry:

 

[Amazon Music Logs*]
LangSecRef=3024
Detect=HKCU\Software\Amazon\Amazon Music
Default=False
FileKey1=%LocalAppData%\Amazon Music\Logs|*.*

 

re: Amazon Cloud Player

revise entry - change detectfile to detect=HKCU\Software\Amazon\Amazon Cloud Player

 

 

Link to comment
Share on other sites

  • Moderators

Oh shoot, realtek (logs) does a recursive scan from %SystemDrive%, that's just horrid.

do I see the same in DVBDream and 360 Internet Security ?

Backup now & backup often.
It's your digital life - protect it with a backup.
Three things are certain; Birth, Death and loss of data. You control the last.

Link to comment
Share on other sites

There is an extra letter at the end of FileKey2=%Documents%\NewBlueFX\Logs|*.logE

 

[Adobe Premiere Elements 11*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Premiere Elements\11.0
Default=False
RegKey1=HKCU\Software\Adobe\Premiere Elements\11.0\MRUDocuments
FileKey1=%Documents%\Adobe\Premiere Elements\11.0|*.log
FileKey2=%Documents%\NewBlueFX\Logs|*.logE
FileKey3=%AppData%\Adobe\Common\Thumbnail Cache|*.*|RECURSE

Link to comment
Share on other sites

This entry is not working, you need to change the Detect to HKCU\Software\Softpointer or sometrhing else.

 

[Tag&Rename*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename\Config
Default=False
RegKey1=HKCU\Software\Softpointer\Tag&Rename\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename2\Config|FCurrentFolder
RegKey4=HKCU\Software\Softpointer\Tag&Rename2\Config|FHistoryList
RegKey5=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder
RegKey6=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList
RegKey7=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader
RegKey8=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder
RegKey9=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList
RegKey10=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader
RegKey11=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

 

Program's versions 1 & 2 are obsolete.

How about this?

 

[Tag&Rename 3*]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename3\Config
Detect2=HKCU\Software\Softpointer\Tag&Rename3.7\Config
Default=False
RegKey1=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader
RegKey4=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder
RegKey5=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList
RegKey6=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader
RegKey7=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

Link to comment
Share on other sites

This entry is not working, you need to change the Detect to HKCU\Software\Softpointer or sometrhing else.

 

[Tag&Rename*]

LangSecRef=3024

Detect=HKCU\Software\Softpointer\Tag&Rename\Config

Default=False

RegKey1=HKCU\Software\Softpointer\Tag&Rename\Config|FCurrentFolder

RegKey2=HKCU\Software\Softpointer\Tag&Rename\Config|FHistoryList

RegKey3=HKCU\Software\Softpointer\Tag&Rename2\Config|FCurrentFolder

RegKey4=HKCU\Software\Softpointer\Tag&Rename2\Config|FHistoryList

RegKey5=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder

RegKey6=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList

RegKey7=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader

RegKey8=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder

RegKey9=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList

RegKey10=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader

RegKey11=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

 

Program's versions 1 & 2 are obsolete.

How about this?

 

[Tag&Rename 3*]

LangSecRef=3024

Detect=HKCU\Software\Softpointer\Tag&Rename3\Config

Detect2=HKCU\Software\Softpointer\Tag&Rename3.7\Config

Default=False

RegKey1=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder

RegKey2=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList

RegKey3=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader

RegKey4=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder

RegKey5=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList

RegKey6=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader

RegKey7=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList

 

what is to merge that entries:

[Tag&Rename *]
LangSecRef=3024
Detect=HKCU\Software\Softpointer\Tag&Rename
Detect2=HKCU\Software\Softpointer\Tag&Rename2
Detect3=HKCU\Software\Softpointer\Tag&Rename3
Detect4=HKCU\Software\Softpointer\Tag&Rename3.7
Default=False
RegKey1=HKCU\Software\Softpointer\Tag&Rename\Config|FCurrentFolder
RegKey2=HKCU\Software\Softpointer\Tag&Rename\Config|FHistoryList
RegKey3=HKCU\Software\Softpointer\Tag&Rename2\Config|FCurrentFolder
RegKey4=HKCU\Software\Softpointer\Tag&Rename2\Config|FHistoryList
RegKey5=HKCU\Software\Softpointer\Tag&Rename3\Config|FCurrentFolder
RegKey6=HKCU\Software\Softpointer\Tag&Rename3\Config|FHistoryList
RegKey7=HKCU\Software\Softpointer\Tag&Rename3\Config|FileListHeader
RegKey8=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FCurrentFolder
RegKey9=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FHistoryList
RegKey10=HKCU\Software\Softpointer\Tag&Rename3.7\Config|FileListHeader
RegKey11=HKCU\Software\Softpointer\Tag&Rename3.7\Config|HistoryList
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.