Moderators Nergal Posted April 2, 2012 Moderators Share Posted April 2, 2012 I thought this had been previously discussed, but yeah, MSSE only thinks it hasn't been run yet (and thus thinks it hasn't updated) however I think that the remove line Might be a little broad (yet another broad one IMHO) FileKey1=%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE maybe someone (dennis?) can post the contents of the folder (uncleaned by the entry) and we can probably see what doesn't need removal ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. Support at https://support.ccleaner.com/s/?language=en_US Pro users file a PRIORITY SUPPORT via email support@ccleaner.com Link to comment Share on other sites More sharing options...
Winapp2.ini Posted April 2, 2012 Author Share Posted April 2, 2012 New avatar, nergal? winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
Moderators Nergal Posted April 3, 2012 Moderators Share Posted April 3, 2012 jahjah something I whipped up in daz studio (3d art program) ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. Support at https://support.ccleaner.com/s/?language=en_US Pro users file a PRIORITY SUPPORT via email support@ccleaner.com Link to comment Share on other sites More sharing options...
Michael Griffin Posted April 4, 2012 Share Posted April 4, 2012 Hello, I'm new to this Winapp2.ini, so I don't know what to delete and what not to delete... Could you give any insites to this? Don't want to delete what shouldn't be deleted. Thx Michael :-) Link to comment Share on other sites More sharing options...
ProPaan Posted April 5, 2012 Share Posted April 5, 2012 Someone emailed me to tell me the MSSE entry is harmful. Apparently it removes the definition backups folder, leading MSSE to think it needs to be updated. Thoughts? Yes its deletes definition backup, but not definition itself, after cleaning with ccleaner and restart, my copy of MSSE remembers when was last update I thought this had been previously discussed, but yeah, MSSE only thinks it hasn't been run yet (and thus thinks it hasn't updated) however I think that the remove line Might be a little broad (yet another broad one IMHO) FileKey1=%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE maybe someone (dennis?) can post the contents of the folder (uncleaned by the entry) and we can probably see what doesn't need removal about localcopy, after reinstalling, or updating , or something else i dont find any files in it. so i find full [Microsoft Security Essentials*] entrie is pointless - at least for me and remove under [MS Security Client*] LangSecRef=3025 DetectFile=%ProgramFiles%\Microsoft Security Client\msseces.exe Default=False FileKey1=%ProgramFiles%\Microsoft Security Client\Backup|*.*|RECURSE FileKey2=%CommonAppData%\Microsoft\Microsoft Security Client\Support|*.log FileKey3=%CommonAppData%\Microsoft\Microsoft Antimalware\Support|*.log FileKey4=%CommonAppData%\Microsoft\Microsoft Antimalware\Definition Updates\Backup|*.*|RECURSE FileKey5=%CommonAppData%\Microsoft\Microsoft Antimalware\Scans\History|*.*|RECURSE cuz they are already in original winapp.ini Link to comment Share on other sites More sharing options...
MVE Posted April 5, 2012 Share Posted April 5, 2012 Add please: [uTorrent More*] LangSecRef=3022 Detect=HKCU\Software\BitTorrent\uTorrent Default=False FileKey1=%AppData%\utorrent|*.log FileKey2=%AppData%\utorrent|*.dmp FileKey3=%AppData%\uTorrent\ie|*.tmp FileKey4=%ProgramFiles%\uTorrent|*.tmp Link to comment Share on other sites More sharing options...
CSGalloway Posted April 5, 2012 Share Posted April 5, 2012 (edited) In reply to #1526 - here is my folder contents: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{2F86B55E-F8C4-473E-B284-B787D16DA8C2} C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{8B86B2F6-496F-24DB-C776-E1B5D6E7EEEE}-A0118016.exe Edited April 6, 2012 by CSGalloway conserving space Link to comment Share on other sites More sharing options...
Moderators Nergal Posted April 5, 2012 Moderators Share Posted April 5, 2012 @CSGalloway Thanks but (for winapp2 purposes we only need the contents of the folder I referred to. Can you edit your post down to just =%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy I've placed the entire thing in a spoiler tag as it's huge but if the end result is small enough feel free to change the word Spoiller to the word code (in both the opening and closing tags) Though this raises a huge question: Is it the Winapp2 entry that's causing this issue; are we sure it isn't MS Malware entry in Default CCleaner?. . . Really I'm starting to believe the issue that they are getting is that one (which is widly reported already). Since they aren't a poster here @Winapp2.ini can you contact them and have them make sure they test with ONLY your entry checked. See if it kills then check with ONLY "MS Antimalware" from default checked. ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. Support at https://support.ccleaner.com/s/?language=en_US Pro users file a PRIORITY SUPPORT via email support@ccleaner.com Link to comment Share on other sites More sharing options...
Winapp2.ini Posted April 5, 2012 Author Share Posted April 5, 2012 This image they sent me indicates that it is MS Security Client* winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
Moderators Nergal Posted April 6, 2012 Moderators Share Posted April 6, 2012 looks like they're I'm using an old Winapp2.ini ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. Support at https://support.ccleaner.com/s/?language=en_US Pro users file a PRIORITY SUPPORT via email support@ccleaner.com Link to comment Share on other sites More sharing options...
CSGalloway Posted April 7, 2012 Share Posted April 7, 2012 I am using Win XP Pro sp3 and ran a difference report between MSE beiong ok, running CCleaner, and MSE not being ok. It appears as an attachment File compare: 04/07/12 05:10:49PM File 1: D:\MSE_ok.txt File 2: D:\MSE_not_ok.txt Difference: File 1, lines 3 to 2 File 2, lines 3 to 3 File 1 detail: File 2 detail: 3: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Support Difference: File 1, lines 21 to 25 File 2, lines 22 to 21 File 1 detail: 21: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Quick 22: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource 23: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Quick\{D8F0D524-A4F6-43B9-909A-6839C971D4CD} 24: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{94DBA5FD-A8B1-4A42-AE87-12CA86D19F91} 25: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{16968BCD-4803-4FCB-A6E2-44A869AEB3D5} File 2 detail: Difference: File 1, lines 30 to 30 File 2, lines 26 to 25 File 1 detail: 30: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Service\DetectionHistory\14\9EABEE93-13A3-4A17-AE43-F94B6F162CD5 File 2 detail: Seems to have something with the Scans folder - not localcopy....? Link to comment Share on other sites More sharing options...
Moderators Nergal Posted April 7, 2012 Moderators Share Posted April 7, 2012 the "localcopy" was a misdirection caused by my incorrect version of winapp2 (see post above) ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. Support at https://support.ccleaner.com/s/?language=en_US Pro users file a PRIORITY SUPPORT via email support@ccleaner.com Link to comment Share on other sites More sharing options...
ProPaan Posted April 10, 2012 Share Posted April 10, 2012 [AIMP 3 More*] LangSecRef=3023 DetectFile=%AppData%\AIMP3 Default=True FileKey1=%AppData%\AIMP3|AIMP3ac.bak FileKey2=%AppData%\AIMP3|UpdateInstaller.exe FileKey3=%ProgramFiles%\AIMP3\!Backup|*.zip|REMOVESELF Link to comment Share on other sites More sharing options...
nodles Posted April 11, 2012 Share Posted April 11, 2012 NEW ENTRIES: [AdblockPlus Backups*] LangSecRef=3026 DetectFile=%AppData%\Mozilla\Firefox\Profiles Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockplus|patterns-backup*.ini [battlefield 3*] LangSecRef=3021 DetectFile=%ProgramFiles%\Origin Games\Battlefield 3 Default=False FileKey1=%ProgramFiles%\Origin Games\Battlefield 3\__Installer|InstallLog.txt [bookmark Backups*] LangSecRef=3026 DetectFile=%AppData%\Mozilla\Firefox\Profiles Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\bookmarkbackups|*.json [Windows Log Files More*] LangSecRef=3025 DetectFile=%WinDir%\Panther Default=False FileKey1=%WinDir%\Panther|cbs.log FileKey2=%WinDir%\Panther|DDACLSys.log Filekey3=%WinDir%\inf|setupapi.offline.log Difficult to find a suitable DetectFile for AdblockPlus (Firefox addon). If anyone knows better than the above, please post. MODIFIED ENTRIES: [EA Core Logs*] LangSecRef=3021 Detect=HKCU\Software\EA Games\EA Core Default=False FileKey1=%CommonAppData%\Electronic Arts\EA Core\logs|*.* FileKey2=%CommonAppData%\EA Logs|*.* <-Added FK2 [LogMeIn Hamatchi More*] LangSecRef=3022 Detect=HKLM\SOFTWARE\LogMeIn, Inc. Default=False FileKey1=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|h2-engine.log FileKey2=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\LogMeIn Hamachi|h2-ui.log FileKey3=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|*.old FileKey4=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|*.bak <-Added FK1+FK2, also there was only FileKey3 & FileKey4 entries before (should've been FK1+FK2, not FK3+FK4) [Windows System Profile*] LangSecRef=3025 DetectFile=%WinDir%\system32\config\systemprofile Default=False FileKey1=%WinDir%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files|*.*|RECURSE FileKey2=%WinDir%\system32\config\systemprofile\AppData\Local\Temp|*.*|RECURSE FileKey3=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies|*.*|RECURSE FileKey4=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey5=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files|*.*|RECURSE FileKey6=%WinDir%\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies|*.*|RECURSE FileKey7=%WinDir%\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE <-Added FK5+FK6+FK7 [Windows SCM Logs*] LangSecRef=3025 DetectFile=%WinDir%\System32\LogFiles\Scm Default=False FileKey1=%WinDir%\System32\LogFiles\Scm|*.* <--Changed "%HomeDrive%\Windows" to "%WinDir%" [Windows Live Messenger More*] LangSecRef=3022 DetectFile=%ProgramFiles%\Windows live\messenger\msnmsgr.exe Warning=After running this, you will not be able to uninstall Windows Live Essentials components without downloading the installer again. Default=False FileKey1=%LocalAppData%\Microsoft\Messenger|*.uccapilog|RECURSE FileKey2=%LocalAppData%\Microsoft\Messenger|*.bak|RECURSE FileKey3=%LocalAppData%\Microsoft\Messenger|*.txt|RECURSE FileKey4=%LocalAppData%\Microsoft\Windows Live Contacts|*.log|RECURSE FileKey5=%LocalAppData%\Microsoft\Windows Live Contacts|*.jrs|RECURSE FileKey6=%LocalAppData%\Microsoft\Windows Live|*.log|RECURSE FileKey7=%LocalAppData%\Microsoft\Windows Live|*.jrs|RECURSE FileKey8=%CommonProgramFiles%\Windows Live\.cache|*.*|RECURSE FileKey9=%LocalLowAppData%\Microsoft\Windows Live\Setup|*.*|REMOVESELF FileKey10=%LocalAppData%\Microsoft\Windows Live|*.sqm|RECURSE FileKey11=%LocalAppData%\Microsoft\Windows Live Contacts\*\*\*\Backup|*.*|RECURSE FileKey12=%ProgramFiles%\Windows Live\Messenger|*.bak|RECURSE FileKey13=%WinDir%\System32\config\systemprofile\Documents|wlidsvctrace*.txt <-Added FK13 Link to comment Share on other sites More sharing options...
nodles Posted April 11, 2012 Share Posted April 11, 2012 MODIFIED ENTRIES: [GradeKeeper Recent Files/Assignments*] LangSecRef=3021 Detect=HKCU\Software\Gradekeeper Default=False FileKey1=%AppData%\Gradekeeper|*.* <-Changed "%UserProfile%\AppData\Roaming" to %AppData% [OpenDNS Updater Logs*] LangSecRef=3021 Detect=HKCU\Software\OpenDNS Updater Warning=You must exit OpenDNS Updater in the System Tray to clear log files Default=False FileKey1=%AppData%\OpenDNS Updater|*.txt <-Changed "%UserProfile%\AppData\Roaming" to %AppData% [X-Chat 2*] LangSecRef=3022 DetectFile=%AppData%\X-Chat 2 Default=False FileKey1=%AppData%\X-Chat 2\xchatlogs|*.*|REMOVESELF FileKey2=%AppData%\X-Chat 2\scrollback|*.*|REMOVESELF <-Changed "%UserProfile%\AppData\Roaming" to %AppData% Link to comment Share on other sites More sharing options...
Coffee4Joe Posted April 13, 2012 Share Posted April 13, 2012 New Entry [GIMP 2.8*] LangSecRef=3021 Default=False DetectFile=%UserProfile%\.gimp-2.8 FileKey1=%UserProfile%\.thumbnails\normal|*.* Link to comment Share on other sites More sharing options...
Winapp2.ini Posted April 14, 2012 Author Share Posted April 14, 2012 Thanks for the new/modified entries guys : ) I'll fix up a few other entries that use %UserProfile%\AppData instead of %AppData% winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
nodles Posted April 14, 2012 Share Posted April 14, 2012 MODIFIED ENTRY: [Juniper Networks*] LangSecRef=3021 Detect=HKLM\Software\Juniper Networks Detect2=HKCU\Software\Juniper Networks DetectFile=%AppData%\Juniper Networks Default=False FileKey1=%AppData%\Juniper Networks|*.old|RECURSE FileKey2=%AppData%\Juniper Networks|*.log|RECURSE RegKey1=HKLM\Software\Juniper Networks\Default <-Added DetectFile Link to comment Share on other sites More sharing options...
siliconman01 Posted April 19, 2012 Share Posted April 19, 2012 jv16 PowerTools* needs to be changed from the existing code to this new code in order to cover all Windows OS versions. [jv16 PowerTools*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False FileKey1=%UserProfile%|NTUSER.DAT.bak_* FileKey2=%UserProfile%|NTUSER.DAT.bak_*.* FileKey4=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_* FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*.* FileKey7=%WinDir%\system32\config|Default.bak_* FileKey8=%WinDir%\system32\config|Default.bak_*.* FileKey10=%WinDir%\system32\config|software.bak_*.* FileKey12=%WinDir%\system32\config|software.bak_* FileKey13=%WinDir%\system32\config|system.bak_* FileKey14=%WinDir%\system32\config|system.bak_*.* FileKey16=%WinDir%\System32\config|SAM.bak_* FileKey17=%WinDir%\System32\config|SAM.bak_*.* FileKey19=%WinDir%\System32\config|COMPONENTS.bak_* FileKey20=%WinDir%\System32\config|COMPONENTS.bak_*.* FileKey22=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_* FileKey23=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*.* FileKey25=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_* FileKey26=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*.* CHANGE TO: [jv16 PowerTools Registry Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%UserProfile%|NTUSER.DAT.jv16pt_bak2 FileKey2=%UserProfile%|NTUSER.DAT.jv16pt_bak FileKey3=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG1 FileKey4=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG2 FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak2 FileKey6=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak FileKey7=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG1 FileKey8=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG2 FileKey9=%windir%\system32\config|Default.jv16pt_bak FileKey10=%windir%\system32\config|Default.jv16pt_bak2 FileKey11=%windir%\system32\config|Default.jv16pt_bak.LOG1 FileKey12=%windir%\system32\config|Default.jv16pt_bak.LOG2 FileKey13=%windir%\system32\config|software.jv16pt_bak.LOG1 FileKey14=%windir%\system32\config|software.jv16pt_bak.LOG2 FileKey15=%windir%\system32\config|software.jv16pt_bak2 FileKey16=%windir%\system32\config|software.jv16pt_bak FileKey17=%windir%\system32\config|system.jv16pt_bak2 FileKey18=%windir%\system32\config|system.jv16pt_bak FileKey19=%windir%\system32\config|system.jv16pt_bak.LOG1 FileKey20=%windir%\system32\config|system.jv16pt_bak.LOG2 FileKey21=%windir%\System32\config|SAM.jv16pt_bak FileKey22=%windir%\System32\config|SAM.jv16pt_bak2 FileKey23=%windir%\System32\config|SAM.jv16pt_bak.LOG1 FileKey24=%windir%\System32\config|SAM.jv16pt_bak.LOG2 FileKey25=%windir%\System32\config|COMPONENTS.jv16pt_bak FileKey26=%windir%\System32\config|COMPONENTS.jv16pt_bak2 FileKey27=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG1 FileKey28=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG2 FileKey29=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak FileKey30=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak2 FileKey31=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG1 FileKey32=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG2 FileKey33=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak FileKey34=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak2 FileKey35=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG1 FileKey36=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG2 Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
nodles Posted April 19, 2012 Share Posted April 19, 2012 jv16 PowerTools* needs to be changed from the existing code to this new code in order to cover all Windows OS versions. What do you mean excactly? Which Windows versions? Why not just use wildcards eg. .LOG* instead of multiple entries .LOG1 .LOG2 etc..? Link to comment Share on other sites More sharing options...
siliconman01 Posted April 20, 2012 Share Posted April 20, 2012 What do you mean excactly? Which Windows versions? Why not just use wildcards eg. .LOG* instead of multiple entries .LOG1 .LOG2 etc..? Ah jeez....the wildcard implementation did not registry in my brain....sorry. At least let's change the name as suggested and add the warning message, eh?. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
siliconman01 Posted April 22, 2012 Share Posted April 22, 2012 After finally getting a version of jv16 PowerTools 2012 in which the registry compactor component works properly, I am able to test "jv16 PowerTools*" as included in the latest released WinApp2.ini. The wild card implementation does NOT work. In this specific compact run, it should find 15 files to clear. It finds 0 files. This is on Windows 7 SP1 x86 and x64 Professional. Current non-functional code of jv16 PowerTools* [jv16 PowerTools*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False FileKey1=%UserProfile%|NTUSER.DAT.bak_* FileKey2=%UserProfile%|NTUSER.DAT.bak_*.* FileKey4=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_* FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*.* FileKey7=%WinDir%\system32\config|Default.bak_* FileKey8=%WinDir%\system32\config|Default.bak_*.* FileKey10=%WinDir%\system32\config|software.bak_*.* FileKey12=%WinDir%\system32\config|software.bak_* FileKey13=%WinDir%\system32\config|system.bak_* FileKey14=%WinDir%\system32\config|system.bak_*.* FileKey16=%WinDir%\System32\config|SAM.bak_* FileKey17=%WinDir%\System32\config|SAM.bak_*.* FileKey19=%WinDir%\System32\config|COMPONENTS.bak_* FileKey20=%WinDir%\System32\config|COMPONENTS.bak_*.* FileKey22=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_* FileKey23=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*.* FileKey25=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_* FileKey26=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*.* Code that works and finds the 15 files to clear. [jv16 PowerTools Registry Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%UserProfile%|NTUSER.DAT.jv16pt_bak2 FileKey2=%UserProfile%|NTUSER.DAT.jv16pt_bak FileKey3=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG1 FileKey4=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG2 FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak2 FileKey6=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak FileKey7=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG1 FileKey8=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG2 FileKey9=%windir%\system32\config|Default.jv16pt_bak FileKey10=%windir%\system32\config|Default.jv16pt_bak2 FileKey11=%windir%\system32\config|Default.jv16pt_bak.LOG1 FileKey12=%windir%\system32\config|Default.jv16pt_bak.LOG2 FileKey13=%windir%\system32\config|software.jv16pt_bak.LOG1 FileKey14=%windir%\system32\config|software.jv16pt_bak.LOG2 FileKey15=%windir%\system32\config|software.jv16pt_bak2 FileKey16=%windir%\system32\config|software.jv16pt_bak FileKey17=%windir%\system32\config|system.jv16pt_bak2 FileKey18=%windir%\system32\config|system.jv16pt_bak FileKey19=%windir%\system32\config|system.jv16pt_bak.LOG1 FileKey20=%windir%\system32\config|system.jv16pt_bak.LOG2 FileKey21=%windir%\System32\config|SAM.jv16pt_bak FileKey22=%windir%\System32\config|SAM.jv16pt_bak2 FileKey23=%windir%\System32\config|SAM.jv16pt_bak.LOG1 FileKey24=%windir%\System32\config|SAM.jv16pt_bak.LOG2 FileKey25=%windir%\System32\config|COMPONENTS.jv16pt_bak FileKey26=%windir%\System32\config|COMPONENTS.jv16pt_bak2 FileKey27=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG1 FileKey28=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG2 FileKey29=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak FileKey30=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak2 FileKey31=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG1 FileKey32=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG2 FileKey33=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak FileKey34=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak2 FileKey35=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG1 FileKey36=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG2 Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
nodles Posted April 22, 2012 Share Posted April 22, 2012 How about this, should work: [jv16 PowerTools Registry Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%UserProfile%|NTUSER.DAT.jv16pt* FileKey2=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt* FileKey3=%WinDir%\system32\config|Default.jv16pt* FileKey4=%WinDir%\system32\config|software.jv16pt* FileKey5=%WinDir%\system32\config|system.jv16pt* FileKey6=%WinDir%\System32\config|SAM.jv16pt* FileKey7=%WinDir%\System32\config|COMPONENTS.jv16pt* FileKey8=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt* FileKey9=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt* Link to comment Share on other sites More sharing options...
nodles Posted April 22, 2012 Share Posted April 22, 2012 MODIFIED ENTRY: [star Wars: The Old Republic*] LangSecRef=3021 DetectFile1=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic Default=False FileKey1=%Documents%|Install STAR WARS The Old Republic.log FileKey2=%LocalAppData%\SWTOR\CrashDump\swtor|*.* FileKey3=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\betatest\retailclient \Temp|*.log FileKey4=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\logs|*.log FileKey5=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\swtor\retailclient \swtor\logs|*.log FileKey6=%Documents%|Uninstall STAR WARS The Old Republic.log FileKey7=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\swtor\retailclient\swtor\logs| *.* FileKey8=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\logs|*.* FileKey9=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\__Installer|InstallLog.txt <- Added FK7, FK8, FK9. Link to comment Share on other sites More sharing options...
siliconman01 Posted April 23, 2012 Share Posted April 23, 2012 How about this, should work: [jv16 PowerTools Registry Compact Backups*] LangSecRef=3024 DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe Default=False Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion. FileKey1=%UserProfile%|NTUSER.DAT.jv16pt* FileKey2=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt* FileKey3=%WinDir%\system32\config|Default.jv16pt* FileKey4=%WinDir%\system32\config|software.jv16pt* FileKey5=%WinDir%\system32\config|system.jv16pt* FileKey6=%WinDir%\System32\config|SAM.jv16pt* FileKey7=%WinDir%\System32\config|COMPONENTS.jv16pt* FileKey8=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt* FileKey9=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt* Yes, the above code does work. Thanks. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now