Jump to content
CCleaner Community Forums

APMichael

Experienced Members
  • Content count

    629
  • Joined

  • Last visited

Posts posted by APMichael


  1. On 2.11.2017 at 22:07, ROCKNROLL said:

    I am a little confused. You say that CCleaner detects Wow6432Node automatically, however, StarCraft II is not being detected automatically for me. The only time it is being detected is if I add the Wow6432Node detect in it. Does anyone else have StarCraft II to confirm this or have any similar issue with any other entry? How exactly does CCleaner detect Wow6432Node automatically?

    That's very strange! All 32-bit applications write their data to the HKLM\SOFTWARE\Wow6432Node (on Windows 64-bit). But they all get detected by CCleaner. Good examples for that behavior:

    Acrobat Reader = HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Adobe\Acrobat Reader\DC
    ...works with Detect=HKLM\Software\Adobe\Acrobat Reader\DC

    Notepad++ = HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Notepad++
    ...works with Detect=HKLM\SOFTWARE\Notepad++

    If that wouldn't work, all entries would need an additional Detect with the Wow6432Node, because most of the applications are still 32-bit. But only 46 of 2,495 entries had it.

    BTW I didn't touch the StarCraft II entries, because they get detected by Detect=HKCU\Software\Blizzard Entertainment\StarCraft II.


  2. I guess the primary question is "Will the entries ALWAYS work without it?"...

     

    Yes, a ExcludeKey for "single" files would always work without it. Because CC accept that syntax. If a syntax works or not only relies on the syntax itself respectively how CC interpret it. It's absolutely not related to the excluded file or the application the entry is written for. But if a future CC version will check the syntax stricter, we should use the syntax from the official documentation.

     

    ...Also, do we need to play it safe- go back and change existing code to \| on the Excludes?

     

    I don't understand your concern. The syntax from the official documentation works always, is more accurate and future proof. CC uses the same syntax in the ccleaner.ini (and the "settings" registry). And some of the current ExcludeKeys are definitely wrong and won't work. The overhaul and a common syntax for all entries is important.


  3. My final words about the ExcludeKey syntax.

     

    I discovered the official documentation: http://www.piriform.com/docs/ccleaner/advanced-usage/ccleaner-ini-files/how-to-exclude-items-from-ccleaners-cleaning. I don't know since when this documentation exists, but somehow I missed it. :(

     

    The official documentation should always be the reference for the syntax. Therefore, I revised all the ExcludeKeys again and posted them on GitHub.

     

     

    @siliconman01: The "unnecessary" pipe symbol is back again! :) Even if the entries usually would work without it. (CCleaner seems to allow much tolerance in the syntax.)


  4. Modified entries:

    Sorted, and fixed (not working) ExcludeKeys.

    [360 Browser - Cache*]
    LangSecRef=3029
    Detect=HKCU\Software\360Browser\Browser
    Default=False
    FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|*-journal*
    FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default\Cache|*.*
    FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default\Local Storage|*.*
    ExcludeKey1=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\Login data-journal
    ExcludeKey2=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\switcher-journal
    ExcludeKey3=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\Web data-journal
    [HuluPlus*]
    LangSecRef=3031
    Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\HuluLLC.HuluPlus_fphbd361v8tya
    Default=False
    FileKey1=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCache|*.*|RECURSE
    FileKey2=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCookies|*.*|RECURSE
    FileKey3=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetHistory|*.*|RECURSE
    FileKey4=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Temp|*.*
    FileKey5=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Microsoft\CryptnetUrlCache\Content|*.*
    FileKey6=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*
    FileKey7=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\TempState|*.*|RECURSE
    FileKey8=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\LocalState|*.tmp|RECURSE
    ExcludeKey1=FILE|%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCache\container.dat
    [Internet Explorer More*]
    LangSecRef=3022
    Detect=HKCU\Software\Microsoft\Internet Explorer
    Default=False
    FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
    FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE
    FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak
    FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE
    FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp
    FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE
    FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE
    FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE
    FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE
    FileKey10=%LocalAppData%\Microsoft\Windows\INetCache\Content.Word|*.*
    FileKey11=%LocalAppData%\Microsoft\Windows\INetCache\IE|*.*|RECURSE
    FileKey12=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE
    FileKey13=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF
    FileKey14=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE
    FileKey15=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE
    FileKey16=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
    FileKey17=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE
    FileKey18=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE
    FileKey19=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE
    FileKey20=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE
    FileKey21=%WinDir%\System32\config\Systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE
    FileKey22=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
    FileKey23=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
    RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache
    RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache
    RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU
    RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore
    RegKey5=HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl
    RegKey6=HKCU\Software\Microsoft\Internet Explorer\PageSetup
    RegKey7=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete
    RegKey8=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime
    RegKey9=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
    ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE\container.dat
    I think all syntax mismatches should be fixed now.

  5. When I said "just leave developed and tested code as is", I was referring ONLY to the \| that may be in other code segments.  And as always it's just my opinion based on things I have encountered over the years.  

     

    And the next time I encounter one that does not work as specified, I will definitely post it for your review.  It may be clear to all how things are suppose to work- but if they all worked as designed, then we would not have nearly as many bug fixes in CCleaner or for that matter Windows itself, eh?   :blink:

     

    Please don't take it personally! It wasn't my intention.

     

    Bugs in applications are something different. We are just talking about the syntax of the ExcludeKeys! And that syntax gets interpreted by CCleaner only and not by the application the entry is written for.

     

    I know the posts you mentioned about the ExcludeKeys. If you search them you will see that the syntax was wrong always, like "folder|file.txt" which doesn't work. You can correct that to "folder\file.txt" or "folder\|file.txt". The second one is correct and working, but simply not necessary.

     

    I just want to help to clean up winapp2.ini and to make sure that the syntax is common for all entries. (That's essential if e.g. somebody wants to code a tool for error checking the winapp2.ini file.)

     

    (BTW: We are talking about only 2 of 2,495 entries.)

     

     

    Edit: Please ignore it! :) More information: #6536


  6. [CBS Logs*] ...

     

    I never saw files with the .cab extension in that location. I think this was added into this entry mistakenly.

     

    There are .cab files if you wait long enough, until the .log file reaches his file size limit!

     

     

    Unnecessary pipe symbols ...

     

    I have found several situations where the code does not work if the pipe does not have the \ in front of it.  I cannot provide an example at the moment but it has occurred several times over the period that I've established cleaning code for winapp2.ini.  I urge you to just leave developed and tested code "as is" with the  "\|" .

     

    It's not necessary to leave them as is, because it's 100% clear how the ExcludeKey works: #4274.

     

    The revised [Jump Lists*] entry works flawless. All other entries don't have that unnecessary pipe symbol also.

     

    And we should use a common syntax for all the winapp2.ini entries! If we "just leave developed and tested code as is" then we have to stop overhauling of winapp2.ini completely.


  7. Modified entry:

    Removed unnecessary pipe symbols from ExcludeKeys.

    [FlashPlayer SharedObjects*]
    LangSecRef=3029
    SpecialDetect=DET_CHROME
    Detect1=HKCU\Software\Chromium
    Detect2=HKCU\Software\SuperBird
    Detect3=HKCU\Software\Torch
    Detect4=HKCU\Software\Vivaldi
    Default=False
    FileKey1=%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey5=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey9=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    FileKey10=%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
    ExcludeKey1=FILE|%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey2=FILE|%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey3=FILE|%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey4=FILE|%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey5=FILE|%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey6=FILE|%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey7=FILE|%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey8=FILE|%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey9=FILE|%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    ExcludeKey10=FILE|%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol
    
     

    Modified entry:

    Removed unnecessary pipe symbol from ExcludeKey.

    [Jump Lists*]
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%AppData%\Microsoft\windows\recent\Automaticdestinations|*.*|RECURSE
    FileKey2=%AppData%\Microsoft\windows\recent\CustomDestinations|*.*|RECURSE
    ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
    

  8. *Revised entry, added all ExcludeKeys...

    [Multi-Edit 2008 Logs*]

    ...

     

    Modified entry:

    Changed Detect and removed unnecessary pipe symbols from ExcludeKeys.

    [Multi-Edit 2008 Logs*]
    LangSecRef=3024
    Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0
    Default=False
    FileKey1=%AppData%\Multi Edit Software|*.log|RECURSE
    ExcludeKey1=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\EVOLVE.LOG
    ExcludeKey2=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\FILEPANE.LOG
    ExcludeKey3=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\INSTALL.LOG
    ExcludeKey4=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\POLYSTYLE.LOG
    ExcludeKey5=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\TMPLPANE.LOG
    ExcludeKey6=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\WINLIST.LOG
    
     

    Modified entry:

    Changed name from [Multi-Edit 2008 11.04*] to [Multi-Edit 2008 Temps*] and corrected LangSecRef.

    [Multi-Edit 2008 Temps*]
    LangSecRef=3024
    Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0
    Default=False
    FileKey1=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\Tmp|*.TMP
    
    Edit: Fixed entry.

  9. I found many entries with an unnecessary "Wow6432Node" Detect, using the following regular expression:

    ^Detect.+\\Wow6432Node\\.+

     

    Modified entries:

    Revised those Detect lines.

    [Active Setup Temp Folder*]
    LangSecRef=3025
    Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders
    
    [Age of Empires*]
    Section=Games
    Detect1=HKLM\Software\Microsoft\Games\Age of Empires
    Detect2=HKLM\Software\Microsoft\Microsoft Games\Age of Empires
    Detect3=HKLM\Software\Microsoft\microsoft games\age of empires 3
    
    [Auslogics Registry Cleaner*]
    LangSecRef=3024
    Detect1=HKCU\Software\Auslogics\Registry Cleaner
    Detect2=HKLM\Software\Auslogics\Registry Cleaner\3.x
    Detect3=HKLM\Software\Auslogics\Registry Cleaner\4.x
    Detect4=HKLM\Software\Auslogics\Registry Cleaner\5.X
    
    [Bitcoin*]
    LangSecRef=3022
    Detect1=HKCU\Software\Bitcoin
    Detect2=HKCU\Software\Bitcoin Core
    Detect3=HKLM\SOFTWARE\Bitcoin Core
    
    [Copernic DesktopSearch4 Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\Copernic\DesktopSearch4
    
    [Crysis 3*]
    Section=Games
    Detect=HKLM\Software\Crytek\Crysis 3
    
    [CyberLink PhotoDirector*]
    LangSecRef=3023
    Detect1=HKCU\Software\CyberLink\PhotoDirector3
    Detect2=HKLM\Software\CyberLink\PhotoDirector4
    Detect3=HKLM\SOFTWARE\CyberLink\PhotoDirector6
    Detect4=HKCU\Software\Cyberlink\PowerDirector7
    Detect5=HKCU\Software\CyberLink\PowerDirector10
    Detect6=HKCU\Software\CyberLink\PowerDirector11
    Detect7=HKCU\Software\CyberLink\PowerDirector12
    Detect8=HKCU\Software\CyberLink\PowerDirector13
    
    [Dragon Age: Origins*]
    Section=Games
    Detect1=HKCU\Software\BioWare\Dragon Age
    Detect2=HKLM\Software\BioWare\Dragon Age
    
    [DVBDream*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\DVBDream
    
    [Forte Agent*]
    LangSecRef=3025
    Detect=HKLM\SOFTWARE\Forte
    
    [FossaMail Corrupt SQLites*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Crash Reports*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Extensions Log*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Log*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Maintenance Service*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Minidumps*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Net Predictions*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Startup Cache*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail TestPilot Error Logs*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail Update Logs*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [FossaMail webappsstore.sqlite*]
    LangSecRef=3030
    Detect=HKLM\SOFTWARE\Mozilla\FossaMail
    
    [Hedgewars VideoTemp*]
    Section=Games
    Detect=HKLM\SOFTWARE\Hedgewars
    
    [HitmanPro*]
    LangSecRef=3024
    Detect1=HKCU\Software\HitMan Pro
    Detect2=HKCU\Software\HitMan Pro 2
    Detect3=HKCU\Software\HitMan Pro 3
    Detect4=HKLM\SOFTWARE\HitmanPro
    
    [League of Legends*]
    Section=Games
    Detect1=HKCU\Software\Bugsplat\lol_beta_riotgames_com
    Detect2=HKCU\Software\Riot Games
    Detect3=HKLM\Software\Riot Games
    
    [Logitech Desktop Messenger*]
    LangSecRef=3024
    Detect1=HKCU\Software\Logitech\DesktopMessenger
    Detect2=HKLM\SOFTWARE\Logitech\DesktopMessenger
    Detect3=HKLM\SOFTWARE\Logitech\Logitech Desktop Messenger
    
    [Microsoft XNA Game Studio*]
    Section=Games
    Detect=HKLM\Software\Microsoft\XNA
    
    [Midori - Cache*]
    LangSecRef=3022
    Detect=HKLM\Software\Midori
    
    [Midori - Cookies*]
    LangSecRef=3022
    Detect=HKLM\Software\Midori
    
    [Midori - History*]
    LangSecRef=3022
    Detect=HKLM\Software\Midori
    
    [Midori - Session*]
    LangSecRef=3022
    Detect=HKLM\Software\Midori
    
    [Neostar CMS Station Client Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\company\Neostar CMS
    
    [Nero*]
    LangSecRef=3021
    Detect1=HKLM\Software\Nero\Nero 11\Nero11Suite
    Detect2=HKLM\Software\Nero\Nero 12\Nero12Suite
    
    [OpenOffice.org Setup Files*]
    LangSecRef=3021
    Detect1=HKLM\Software\OpenOffice
    Detect2=HKLM\Software\OpenOffice.org
    
    [OpenOffice.org*]
    LangSecRef=3021
    Detect1=HKLM\Software\OpenOffice
    Detect2=HKLM\Software\OpenOffice.org
    
    [Samsung Magician Logs*]
    LangSecRef=3021
    Detect=HKLM\Software\Samsung Magician
    
    [Seagate SeaTools for Windows Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\SeaToolsforWindows
    
    [TrendMicro RUBotted Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\TrendMicro\RUBotted
    
    [UltraDefrag Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UltraDefrag
    DetectFile=%WinDir%\UltraDefrag\ultradefrag.exe
    
    [Windows Live Writer Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\Microsoft\Windows Live Writer
    
    [Wistron Corp Launch Manager Logs*]
    LangSecRef=3024
    Detect=HKLM\SOFTWARE\Wistron Corp\Launch Manager
    
    [Wondershare PDF Editor*]
    LangSecRef=3021
    Detect=HKLM\Software\Wondershare\Wondershare PDF Editor
    
    [Wondershare Video Converter Ultimate More*]
    LangSecRef=3023
    Detect=HKLM\SOFTWARE\Wondershare\Wondershare Video Converter Ultimate
    
    [XnView More*]
    LangSecRef=3023
    Detect1=HKCU\Software\XnView
    Detect2=HKLM\Software\XnView
    

  10. I wonder if the "Windows Log Files" in winapp.ini also removes the .cab files that are part of [CBS Logs*] ??

     

    No, CC doesn't remove the .cab files! (winsys.ini: FileKey15=%windir%\Logs|*.log|RECURSE)

     

    Modified entry:

    [CBS Logs*]
    LangSecRef=3025
    Detect=HKLM\Software\Microsoft\Windows
    Default=False
    FileKey1=%WinDir%\Logs\CBS|*.cab
    

  11. [My Horse and Me*]

    ...

    Does anyone know what Detect 2-5 in this entry is suppose to be? I don't think these are suppose to be here. They seem like custom german entries to me.

    I don't know the game. It looks like there's a special German version available.

     

    But Detect4 and 5 are not necessary, because CC checks "Wow6432Node" automatically.

     

     

    I found many entries with an unnecessary "Wow6432Node" Detect, using the following regular expression:

    ^Detect.+\\Wow6432Node\\.+
    

  12. Updated the file, but no change log this time as I removed and replaced the file so it didn't show any changes. Fixed all the trailing backslashes and updated with all the suggestions above.

     

    Thanks for the update!

     

    Missed post: #6485

     

    I found some more entries with a wrong or inconsistent VirtualStore path. And fixed them:

    [Multi-Edit 2008 11.04*]
    LangSecRef=3021
    Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0
    Default=False
    FileKey1=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04|*.bak
    FileKey2=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\Tmp|*.*
    FileKey3=%LocalAppData%\VirtualStore\Program Files*\Multi-Edit 2008\Config|*.tmp
    FileKey4=%ProgramFiles%\Multi-Edit 2008\Config|*.tmp
    
    [My Horse and Me*]
    Section=Games
    Detect1=HKLM\SOFTWARE\My Horse and Me 2
    Detect2=HKLM\SOFTWARE\Atari\Mein Pferd und ich Demo
    Detect3=HKLM\SOFTWARE\Atari\Mein Pferd und ich
    Detect4=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich Demo
    Detect5=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich
    Default=False
    FileKey1=%LocalAppData%\VirtualStore\Program Files*\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    FileKey2=%LocalAppData%\VirtualStore\Program Files*\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    FileKey3=%LocalAppData%\VirtualStore\Program Files*\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    FileKey4=%ProgramFiles%\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    FileKey5=%ProgramFiles%\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    FileKey6=%ProgramFiles%\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE
    
    [Warcraft III*]
    Section=Games
    Detect=HKLM\Software\Blizzard Entertainment\Warcraft III
    DetectFile=%ProgramFiles%\Warcraft III\Warcraft III.exe
    Default=False
    FileKey1=%LocalAppData%\VirtualStore\Program Files*\Warcraft III|*.log;*.html
    FileKey2=%LocalAppData%\VirtualStore\Program Files*\Warcraft III\Errors|*.dmp;*.txt
    FileKey3=%ProgramFiles%\Warcraft III|*.log;*.html
    FileKey4=%ProgramFiles%\Warcraft III\Errors|*.dmp;*.txt
    ExcludeKey1=FILE|%ProgramFiles%\Warcraft III|*CustomKeyInfo.txt;*CustomKeysSample.txt
    
    [Yahoo Messenger Cache*]
    LangSecRef=3022
    Detect=HKCU\Software\Yahoo\pager
    Default=False
    FileKey1=%AppData%\Yahoo!\Messenger|*.*|RECURSE
    FileKey2=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.*|RECURSE
    
    [Yahoo Messenger Logs*]
    LangSecRef=3022
    Detect=HKCU\Software\Yahoo\pager
    Default=False
    FileKey1=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp
    FileKey2=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\logs|*.log|RECURSE
    FileKey3=%ProgramFiles%\Yahoo!\Messenger|*.log
    ExcludeKey1=FILE|%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG
    
    [Yahoo Messenger Profiles*]
    LangSecRef=3022
    Detect=HKCU\Software\Yahoo\pager
    Default=False
    Warning=This will also delete your saved chat histories.
    FileKey1=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Profiles|*.*|RECURSE
    FileKey2=%ProgramFiles%\Yahoo!\Messenger\Profiles|*.*|RECURSE
    

  13. I think there was a little misunderstanding about the trailing pipe symbols |. (But the trailing backslashes \ were also unnecessary.)

     

    Modified entry:

    Removed trailing pipe symbol | from RECURSE.

    [Acrok Video Converter Ultimate*]
    LangSecRef=3023
    Detect=HKCU\Software\Acrok Software\Acrok Video Converter Ultimate
    Default=False
    FileKey1=%AppData%\Acrok\Acrok Video Converter Ultimate|*.dmp
    FileKey2=%AppData%\Acrok\Acrok Video Converter Ultimate\log|*.*
    FileKey3=%UserProfile%\.BDAccess|*.*|RECURSE
    Modified entry:

    Removed trailing pipe symbol | from RECURSE.

    [MS Office 2013/16 ClickToRun Update Files*]
    LangSecRef=3021
    Detect1=HKCU\Software\Microsoft\Office\15.0
    Detect2=HKCU\Software\Microsoft\Office\16.0
    Default=False
    FileKey1=%CommonAppData%\Microsoft\ClickToRun\ProductReleases|*.*|RECURSE

    And with the following regular expression you can find 38 unnecessary trailing backslashes:

    ^(FileKey[^\|]+)\\\|
    You can use Search and Replace:

    \1\|

  14. [Java More*]
    ...
    

    - fix filekey12 position

     

    ROCKNROLL sorts the FileKeys alphabetical. I think he just forgot to correct the numbers:

    [Java More*]
    LangSecRef=3022
    Detect1=HKLM\SOFTWARE\JavaSoft\Java Plug-in
    Detect2=HKLM\SOFTWARE\JavaSoft\Java Runtime Environment
    Detect3=HKLM\SOFTWARE\JavaSoft\Java Web Start
    Default=False
    FileKey1=%AppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
    FileKey2=%CommonAppData%\Oracle\Java\.oracle_jre_usage|*.*
    FileKey3=%LocalAppData%\Sun\Java\Deployment\cache|*.*|RECURSE
    FileKey4=%LocalAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
    FileKey5=%LocalAppData%\VirtualStore\Program Files*\Java\jre*|*PATCH.ERR
    FileKey6=%LocalAppData%\VirtualStore\Program Files*\Java\jre*\lib\security|*.bak
    FileKey7=%LocalLowAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
    FileKey8=%ProgramFiles%\Java\jre*|*PATCH.ERR
    FileKey9=%ProgramFiles%\Java\jre*\lib\security|*.bak
    FileKey10=%SystemDrive%\Users\*\.oracle_jre_usage|*.*|REMOVESELF
    FileKey11=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\Cache|*.*|RECURSE
    FileKey12=%WinDir%\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\Cache|*.*|RECURSE
    

  15. I don't see a Flash Player section and I don't know where best to put this

    "C:\Windows\System32\Macromed\Flash\FlashInstall64.log"

     

    Modified entry (FileKey 5+6):

    [Adobe Flash Player More*]
    LangSecRef=3023
    Detect=HKCU\Software\Macromedia\FlashPlayer
    DetectFile=%AppData%\Adobe\Flash Player
    Default=False
    FileKey1=%AppData%\Adobe\Flash Player\AFCache|*.*|RECURSE
    FileKey2=%AppData%\Adobe\Flash Player\AssetCache|*.*|RECURSE
    FileKey3=%AppData%\Adobe\Flash Player\Icon Cache|*.*|RECURSE
    FileKey4=%AppData%\Adobe\Flash Player\NativeCache|*.*|RECURSE
    FileKey5=%WinDir%\System32\Macromed\Flash|FlashInstall*.log;install.log
    FileKey6=%WinDir%\SysWOW64\Macromed\Flash|FlashInstall*.log;install.log
    
×