Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

On 26.7.2019 at 15:48, CSGalloway said:

I would assume that if there were multiple "%userprofile%\Desktop\Old Firefox Data\" that it would be okay to just have

"%userprofile%\Desktop\Old Firefox Data *\" ...

New Winapp3.ini entry:

[Firefox Old Data *]
Section=Dangerous Firefox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
Warning=The folders are created as part of the "Refresh Firefox" process and can contain important data.
FileKey1=%UserProfile%\Desktop\Old Firefox Data*|*.*|REMOVESELF

Link to comment
Share on other sites

6 hours ago, APMichael said:

New Winapp3.ini entry:

[Firefox Old Data *]
Section=Dangerous Firefox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
Warning=The folders are created as part of the "Refresh Firefox" process and can contain important data.
FileKey1=%UserProfile%\Desktop\Old Firefox Data *|*.*|REMOVESELF

If Firefox Old Data is basically the same structure as %appdata%\mozilla\profiles then why not have copies of all the firefox entries and just do

    Detectfile=%UserProfile%\Desktop\Old Firefox Data *

and for instance have the new rule for the old

  [Bookmark Backups *]

be

[OFD Bookmark Backups *]

??

Link to comment
Share on other sites

53 minutes ago, CSGalloway said:

If Firefox Old Data is basically the same structure as %appdata%\mozilla\profiles then why not have copies of all the firefox entries and just do ...

IMHO that's too much for a simple backup folder. The folder only exists if Firefox had serious problems or if you manually clicked on "Refresh Firefox". Since the content does not change after creation, the entries would only clean the folder once. The folder is used to transfer your profile data to a new Firefox profile. After that you can usually delete the folder.

Link to comment
Share on other sites

New entries:

CCleaner's built-in entry "Cookies" tries to clean up the LevelDB, but leaves many traces. The main LevelDB file *.log will be cleaned, but the clean-up process unfortunately creates new *.ldb files with all the previous data of the *.log file. The MANIFEST file also contains traces of visited websites.

A request: Could someone please test if this affects installed extensions? Thank you very much!

[Local Storage *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Iridium
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Superbird
Detect17=HKCU\Software\Torch
Detect18=HKCU\Software\Vivaldi
Detect19=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave\Local Storage\leveldb|*.*
FileKey2=%LocalAppData%\7Star\7Star\User Data\*\Local Storage\leveldb|*.*
FileKey3=%LocalAppData%\360Browser\Browser\User Data\*\Local Storage\leveldb|*.*
FileKey4=%LocalAppData%\Amigo\User Data\*\Local Storage\leveldb|*.*
FileKey5=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data\*\Local Storage\leveldb|*.*
FileKey6=%LocalAppData%\CentBrowser\User Data\*\Local Storage\leveldb|*.*
FileKey7=%LocalAppData%\Chromium\User Data\*\Local Storage\leveldb|*.*
FileKey8=%LocalAppData%\CocCoc\Browser\User Data\*\Local Storage\leveldb|*.*
FileKey9=%LocalAppData%\Comodo\Dragon\User Data\*\Local Storage\leveldb|*.*
FileKey10=%LocalAppData%\Coowon\Coowon\User Data\*\Local Storage\leveldb|*.*
FileKey11=%LocalAppData%\Epic Privacy Browser\User Data\*\Local Storage\leveldb|*.*
FileKey12=%LocalAppData%\Flock\User Data\*\Local Storage\leveldb|*.*
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Local Storage\leveldb|*.*
FileKey14=%LocalAppData%\Iridium\User Data\*\Local Storage\leveldb|*.*
FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*\Local Storage\leveldb|*.*
FileKey16=%LocalAppData%\RockMelt\User Data\*\Local Storage\leveldb|*.*
FileKey17=%LocalAppData%\Slimjet\User Data\*\Local Storage\leveldb|*.*
FileKey18=%LocalAppData%\Superbird\User Data\*\Local Storage\leveldb|*.*
FileKey19=%LocalAppData%\Torch\User Data\*\Local Storage\leveldb|*.*
FileKey20=%LocalAppData%\Vivaldi\User Data\*\Local Storage\leveldb|*.*
FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*\Local Storage\leveldb|*.*

[Edge Local Storage *]
Section=Microsoft Edge Insider
DetectFile=%LocalAppData%\Microsoft\Edge*
Default=False
FileKey1=%LocalAppData%\Microsoft\Edge*\User Data\*\Local Storage\leveldb|*.*

[Opera Local Storage *]
LangSecRef=3027
Detect=HKCU\Software\Opera Software
Default=False
FileKey1=%AppData%\Opera Software\Opera*\Local Storage\leveldb|*.*

Link to comment
Share on other sites

Sticky Password does not like [Local Storage *] for Chrome.

I strongly suspect that Edge Chromium will have to have the Leveldb key removed as well when it is released in final form and Sticky Password recognizes it as a valid browser.  In test mode, Sticky Password is duped into thinking it is running in a valid browser.

 

Chrome.png

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

  • Moderators

Really, an entry to delete "old Firefox data" stored on the desktop of all places.:lol: Are we that lazy? Surely that's not a difficult thing to see and delete.

It's not like it's deeply hidden on the system unbeknownst to end-users, and since it has to be selected during uninstall of Firefox for it to even be created it could easily backfire having CCleaner delete it.

Link to comment
Share on other sites

Modified entry:  [Internet Download Manager *]

Added FileKey4

[Internet Download Manager *]
LangSecRef=3022
Detect=HKCU\Software\DownloadManager
Warning=This will delete unfinished downloads.
Default=False
FileKey1=%AppData%\IDM|*.Log;*.txt
FileKey2=%AppData%\IDM\DwnlData|*.*|REMOVESELF
FileKey3=%ProgramFiles%\Internet Download Manager|*.log
FileKey4=%SystemDrive%|IDMSetup2.log
RegKey1=HKCU\Software\DownloadManager\1
RegKey2=HKCU\Software\DownloadManager\2
RegKey3=HKCU\Software\DownloadManager\3
RegKey4=HKCU\Software\DownloadManager\4
RegKey5=HKCU\Software\DownloadManager\5
RegKey6=HKCU\Software\DownloadManager\6
RegKey7=HKCU\Software\DownloadManager\7
RegKey8=HKCU\Software\DownloadManager\8
RegKey9=HKCU\Software\DownloadManager\9
RegKey10=HKCU\Software\DownloadManager\10
RegKey11=HKCU\Software\DownloadManager\11
RegKey12=HKCU\Software\DownloadManager\12
RegKey13=HKCU\Software\DownloadManager\13
RegKey14=HKCU\Software\DownloadManager\14
RegKey15=HKCU\Software\DownloadManager\15
RegKey16=HKCU\Software\DownloadManager\16
RegKey17=HKCU\Software\DownloadManager\17
RegKey18=HKCU\Software\DownloadManager\18
RegKey19=HKCU\Software\DownloadManager\19
RegKey20=HKCU\Software\DownloadManager\20
RegKey21=HKCU\Software\DownloadManager\21
RegKey22=HKCU\Software\DownloadManager\22
RegKey23=HKCU\Software\DownloadManager\23
RegKey24=HKCU\Software\DownloadManager\24
RegKey25=HKCU\Software\DownloadManager\25
RegKey26=HKCU\Software\DownloadManager\26
RegKey27=HKCU\Software\DownloadManager\27
RegKey28=HKCU\Software\DownloadManager\28
RegKey29=HKCU\Software\DownloadManager\29
RegKey30=HKCU\Software\DownloadManager\30
RegKey31=HKCU\Software\DownloadManager\31
RegKey32=HKCU\Software\DownloadManager\32
RegKey33=HKCU\Software\DownloadManager\33
RegKey34=HKCU\Software\DownloadManager\34
RegKey35=HKCU\Software\DownloadManager\35
RegKey36=HKCU\Software\DownloadManager\36
RegKey37=HKCU\Software\DownloadManager\37
RegKey38=HKCU\Software\DownloadManager\38
RegKey39=HKCU\Software\DownloadManager\39
RegKey40=HKCU\Software\DownloadManager\40
RegKey41=HKCU\Software\DownloadManager\41
RegKey42=HKCU\Software\DownloadManager\42
RegKey43=HKCU\Software\DownloadManager\43
RegKey44=HKCU\Software\DownloadManager\44
RegKey45=HKCU\Software\DownloadManager\45
RegKey46=HKCU\Software\DownloadManager\46
RegKey47=HKCU\Software\DownloadManager\47
RegKey48=HKCU\Software\DownloadManager\48
RegKey49=HKCU\Software\DownloadManager\49
RegKey50=HKCU\Software\DownloadManager\50
RegKey51=HKCU\Software\DownloadManager\51
RegKey52=HKCU\Software\DownloadManager\52
RegKey53=HKCU\Software\DownloadManager\53
RegKey54=HKCU\Software\DownloadManager\54
RegKey55=HKCU\Software\DownloadManager\55
RegKey56=HKCU\Software\DownloadManager\56
RegKey57=HKCU\Software\DownloadManager\57
RegKey58=HKCU\Software\DownloadManager\58
RegKey59=HKCU\Software\DownloadManager\59
RegKey60=HKCU\Software\DownloadManager\60
RegKey61=HKCU\Software\DownloadManager\61
RegKey62=HKCU\Software\DownloadManager\62
RegKey63=HKCU\Software\DownloadManager\63
RegKey64=HKCU\Software\DownloadManager\64
RegKey65=HKCU\Software\DownloadManager\65
RegKey66=HKCU\Software\DownloadManager\66
RegKey67=HKCU\Software\DownloadManager\67
RegKey68=HKCU\Software\DownloadManager\68
RegKey69=HKCU\Software\DownloadManager\69
RegKey70=HKCU\Software\DownloadManager\70
RegKey71=HKCU\Software\DownloadManager\71
RegKey72=HKCU\Software\DownloadManager\72
RegKey73=HKCU\Software\DownloadManager\73
RegKey74=HKCU\Software\DownloadManager\74
RegKey75=HKCU\Software\DownloadManager\75
RegKey76=HKCU\Software\DownloadManager\maxID

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

  • Moderators

Update: Added Detect1, Detect2, and FileKey2

[Acer Care Center *]
Detect1=HKCU\Software\Acer\Live Updater
Detect2=HKLM\SOFTWARE\OEM\AcerCareCenter
Detect3=HKLM\SOFTWARE\OEM\CareCenter
Default=False
FileKey1=%CommonAppData%\Acer\CareCenter\DebugLog\SurfaceCheck|log*.txt
FileKey2=%ProgramFiles%\Acer\Care Center\DebugLog|*.log
Link to comment
Share on other sites

14 hours ago, siliconman01 said:

Sticky Password does not like [Local Storage *] for Chrome.

I strongly suspect that Edge Chromium will have to have the Leveldb key removed as well when it is released in final form and Sticky Password recognizes it as a valid browser.  In test mode, Sticky Password is duped into thinking it is running in a valid browser.

Thank you very much for your quick reply and the information.

Too bad it's still affecting extensions. Then we should better not include the entries in Winapp2.ini.

 

2 hours ago, Andavari said:

Really, an entry to delete "old Firefox data" stored on the desktop of all places.:lol: Are we that lazy? Surely that's not a difficult thing to see and delete.

It's not like it's deeply hidden on the system unbeknownst to end-users, and since it has to be selected during uninstall of Firefox for it to even be created it could easily backfire having CCleaner delete it.

I guess he requested the entry because many people just overlook the folder because of the many icons on their desktop. It will also be a Winapp3.ini entry, as it deletes a potentially important backup folder.

Link to comment
Share on other sites

New Entries

[Store Policy Check Cache *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\PolicyCache

[UWP PRI Files Scan Cache *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
RegKey1=HKU\.DEFAULT\Software\Classes\Local Settings\MrtCache

Link to comment
Share on other sites

  • Moderators

RegKey2 for this cleaning routine can't remove anything! It also doesn't matter if CCleaner is ran as admin, or if the registry location is modified with full priveleges it still doesn't work. What does however work is manually deleting old junk from that registry location.

[Compatibility Assistant *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant
Default=False
RegKey1=HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
RegKey2=HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store
RegKey3=HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
RegKey4=HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store

Link to comment
Share on other sites

Revised Entry

Added FK4 = =

[Auslogics Registry Defrag *]
LangSecRef=3024
Detect1=HKCU\Software\Auslogics\Registry Defrag
Detect2=HKLM\Software\Auslogics\Registry Defrag
Default=False
FileKey1=%AppData%\Auslogics\Registry Defrag\Logs|*.*
FileKey2=%AppData%\Auslogics\Registry Defrag\Reports|*.*
FileKey3=%CommonAppData%\Auslogics\Registry Defrag\*.x\Reports|*.*
FileKey4=%CommonAppData%\Auslogics\Registry Defrag\*.x\DeliveredAction\*.tmp

 

Link to comment
Share on other sites

On 2.8.2019 at 11:56, Andavari said:

RegKey2 for this cleaning routine can't remove anything! It also doesn't matter if CCleaner is ran as admin, or if the registry location is modified with full priveleges it still doesn't work. What does however work is manually deleting old junk from that registry location.

Thanks for the information. However, I cannot confirm it. RegKey2 completely removes the registry key "Store" from my system.

Link to comment
Share on other sites

Modified entry: [AdwCleaner *]

Added FileKey3

 

[AdwCleaner *]
LangSecRef=3024
Detect=HKLM\Software\AdwCleaner
DetectFile=%SystemDrive%\AdwCleaner
Default=False
FileKey1=%SystemDrive%|AdwCleaner*.txt
FileKey2=%SystemDrive%\AdwCleaner|*.txt
FileKey3=%SystemDrive%\AdwCleaner\logs|*.txt
RegKey1=HKLM\Software\AdwCleaner|DeleteCount
RegKey2=HKLM\Software\AdwCleaner|SearchCount
RegKey3=HKLM\Software\Wow6432Node\AdwCleaner|DeleteCount
RegKey4=HKLM\Software\Wow6432Node\AdwCleaner|SearchCount

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

4 hours ago, APMichael said:

I checked AdwCleaner and think we can merge FileKey2 and 3:

FileKey2=%SystemDrive%\AdwCleaner|*.txt|RECURSE

Tested it on my systems and the merge works fine.  

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Revised Entry

Added:
%AppData%\Adobe\Acrobat\DC\Security\CRLCache|*.*|RECURSE
%LocalLowAppData%\Adobe\Acrobat\DC\ConnectorIcons|*.*|RECURSE

[Adobe Acrobat DC *]
LangSecRef=3021
Detect=HKLM\Software\Adobe\Adobe Acrobat\DC
Default=False
FileKey1=%AppData%\Adobe\Acrobat\DC\Security\CRLCache|*.*|RECURSE
FileKey2=%LocalAppData%\Adobe\Acrobat\DC|*.lst;UserCache.bin
FileKey3=%LocalAppData%\Adobe\Acrobat\DC\Cache|*.lst
FileKey4=%LocalAppData%\Adobe\Acrobat\DC\ToolsSearchCacheAcro|*.*|RECURSE
FileKey5=%LocalLowAppData%\Adobe\Acrobat\DC\Search|*.*|RECURSE
FileKey6=%LocalLowAppData%\Adobe\AcroCef\DC\Acrobat\Cache|*.*|RECURSE
FileKey7=%LocalLowAppData%\Adobe\Acrobat\DC\ConnectorIcons|*.*|RECURSE
RegKey1=HKCU\Software\Adobe\Adobe Acrobat\DC\AVConversionFromPDF\cSettings
RegKey2=HKCU\Software\Adobe\Adobe Acrobat\DC\AVConversionToPDF\cSettings
RegKey3=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cDockables
RegKey4=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles
RegKey5=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFolders
RegKey6=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentToolsList
RegKey7=HKCU\Software\Adobe\Adobe Acrobat\DC\AVGeneral\cToolbars
RegKey8=HKCU\Software\Adobe\Adobe Acrobat\DC\RememberedViews\cNoCategoryFiles
RegKey9=HKCU\Software\Adobe\Adobe Acrobat\DC\ShareIdentity
RegKey10=HKCU\Software\Adobe\Adobe Synchronizer\DC

Link to comment
Share on other sites

Revised Entry

Added:
%LocalAppData%\Adobe\Acrobat\DC|IconCacheRdr65536.dat
%LocalAppData%\Adobe\Acrobat\DC\Cache|*.lst
%LocalAppData%\Adobe\Acrobat\DC\ToolsSearchCacheAcro|*.*|RECURSE
%LocalLowAppData%\Adobe\Acrobat\DC\Search|*.*|RECURSE
%LocalLowAppData%\Adobe\Acrobat\DC\ConnectorIcons|*.*|RECURSE
%LocalLowAppData%\Adobe\Acrobat\DC|ReaderMessages

[Adobe Reader DC *]
LangSecRef=3021
Detect=HKLM\Software\Adobe\Acrobat Reader\DC
Default=False
FileKey1=%AppData%\Adobe\Acrobat\DC\Security\CRLCache|*.*|RECURSE
FileKey2=%LocalAppData%\Adobe\Acrobat\DC|IconCacheRdr65536.dat
FileKey3=%LocalAppData%\Adobe\Acrobat\DC|*.lst;UserCache.bin
FileKey4=%LocalAppData%\Adobe\Acrobat\DC\Cache|*.lst
FileKey5=%LocalAppData%\Adobe\Acrobat\DC\ToolsSearchCacheAcro|*.*|RECURSE
FileKey6=%LocalLowAppData%\Adobe\Acrobat\DC\Search|*.*|RECURSE
FileKey7=%LocalLowAppData%\Adobe\AcroCef\DC\Acrobat\Cache|*.*|RECURSE
FileKey8=%LocalLowAppData%\Adobe\Acrobat\DC\ConnectorIcons|*.*|RECURSE
FileKey9=%LocalLowAppData%\Adobe\Acrobat\DC|ReaderMessages
RegKey1=HKCU\Software\Adobe\Acrobat Reader\DC\AVConversionFromPDF
RegKey2=HKCU\Software\Adobe\Acrobat Reader\DC\AVConversionToPDF
RegKey3=HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cDockables
RegKey4=HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentToolsList
RegKey5=HKCU\Software\Adobe\Acrobat Reader\DC\AVGeneral\cToolbars
RegKey6=HKCU\Software\Adobe\Acrobat Reader\DC\RememberedViews\cNoCategoryFiles
RegKey7=HKCU\Software\Adobe\Acrobat Reader\DC\ShareIdentity
RegKey8=HKCU\Software\Adobe\Adobe Synchronizer\DC

Link to comment
Share on other sites

  • Moderators

Update:
* Removed: Detect1 because if Acer Care Center is uninstalled it causes it to incorrectly still display in CCleaner. Live Updater is for something else that runs from the C:\OEM folder as a task.
* Added: Section=OEM (if that's alright for it to display in there). Also included the one with LangSecRef. Whatever the preference may be.

Old/Obsolete:
[Acer Care Center *]
LangSecRef=3024
Detect1=HKCU\Software\Acer\Live Updater
Detect2=HKLM\Software\OEM\AcerCareCenter
Detect3=HKLM\Software\OEM\CareCenter
Default=False
FileKey1=%CommonAppData%\Acer\CareCenter\DebugLog\SurfaceCheck|log*.txt
FileKey2=%ProgramFiles%\Acer\Care Center\DebugLog|*.log

Updated (if you prefer OEM):
[Acer Care Center *]
Section=OEM
Detect1=HKLM\SOFTWARE\OEM\AcerCareCenter
Detect2=HKLM\SOFTWARE\OEM\CareCenter
Default=False
FileKey1=%CommonAppData%\Acer\CareCenter\DebugLog\SurfaceCheck|log*.txt
FileKey2=%ProgramFiles%\Acer\Care Center\DebugLog|*.log

Updated (If you prefer LangSecRef):
[Acer Care Center *]
LangSecRef=3024
Detect1=HKLM\Software\OEM\AcerCareCenter
Detect2=HKLM\Software\OEM\CareCenter
Default=False
FileKey1=%CommonAppData%\Acer\CareCenter\DebugLog\SurfaceCheck|log*.txt
FileKey2=%ProgramFiles%\Acer\Care Center\DebugLog|*.log

Link to comment
Share on other sites

Modified entry: [CyberLink PowerDVD *]

Added Filekey 6 & 7

 

[CyberLink PowerDVD *]
LangSecRef=3023
Detect1=HKCU\Software\CyberLink\PowerDVD14
Detect2=HKCU\Software\CyberLink\PowerDVD15
Detect3=HKCU\Software\CyberLink\PowerDVD16
Detect4=HKCU\Software\CyberLink\PowerDVD17
Detect5=HKCU\Software\CyberLink\PowerDVD18
Detect6=HKCU\Software\CyberLink\PowerDVD19
Default=False
FileKey1=%CommonAppData%\Cyberlink\Evoparser|*.xml
FileKey2=%LocalAppData%\Cyberlink\DigitalHome|*.log|RECURSE
FileKey3=%LocalAppData%\Cyberlink\PowerDVD*|*.log|RECURSE
FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\cache*|*.*|RECURSE
FileKey5=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser|*.*|RECURSE
FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\DefaultMember|*.*|RECURSE
FileKey7=%LocalAppData%\Cyberlink\PowerDVD*\DB1050\computer|*.db|RECURSE
RegKey1=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey2=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey3=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey4=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey5=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey6=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey7=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey8=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey9=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey10=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey11=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey12=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey13=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey14=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey15=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Thumbnail5

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.