Jump to content
Piriform Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

How's this for wmdb?

 

[Windows Media Player (Databases)*]

LangSecRef=3023

Detect1=HKCR\Windows.Movie.Maker

Detect2=HKCU\Software\Microsoft\MediaPlayer

Default=False

Warning=This will remove ratings, play counts, last played, etc.

FileKey1=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Media Player|*.*|REMOVESELF

FileKey2=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Microsoft\Media Player|*.*|REMOVESELF

FileKey3=%WinDir%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Media Player|*.*|RECURSE

FileKey4=%LocalAppData%\Microsoft\Media Player|*.wmdb;wmdbexport.xml

FileKey5=%WinDir%\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

FileKey6=%SystemDrive%\Documents and Settings\Default User\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

FileKey7=%SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

ExcludeKey1=%LocalAppData%\Microsoft\Media Player|CurrentDatabase*.wmdb

ExcludeKey2=%SystemDrive%\Documents and Settings\*\Local Settings\Microsoft\Media Player|CurrentDatabase*.wmdb

 

I'm not experiencing any problems with the code above and Windows Media Player 12 on Windows 8.1 x64 Professional.

Share this post


Link to post
Share on other sites

How's this for wmdb?

 

[Windows Media Player (Databases)*]

LangSecRef=3023

Detect1=HKCR\Windows.Movie.Maker

Detect2=HKCU\Software\Microsoft\MediaPlayer

Default=False

Warning=This will remove ratings, play counts, last played, etc.

FileKey1=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Media Player|*.*|REMOVESELF

FileKey2=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Microsoft\Media Player|*.*|REMOVESELF

FileKey3=%WinDir%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Media Player|*.*|RECURSE

FileKey4=%LocalAppData%\Microsoft\Media Player|*.wmdb;wmdbexport.xml

FileKey5=%WinDir%\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

FileKey6=%SystemDrive%\Documents and Settings\Default User\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

FileKey7=%SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Media Player|*.wmdb

ExcludeKey1=%LocalAppData%\Microsoft\Media Player|CurrentDatabase*.wmdb

ExcludeKey2=%SystemDrive%\Documents and Settings\*\Local Settings\Microsoft\Media Player|CurrentDatabase*.wmdb

for me, exclude key doesn't work

 

did some test

delete wmdb file except currentdatabase file = nothing happen

delete currentdatabase only = other wmdb file seem useless and will be replace with new one when wmplayer closed

delete currentdatabase = reset play count,last played etc

Share this post


Link to post
Share on other sites

New entries:

[Aegisub*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Aegisub
Default=False
FileKey1=%AppData%\Aegisub|mru.json
FileKey2=%AppData%\Aegisub\log|*.*|REMOVESELF
FileKey3=%AppData%\Aegisub\recovered|*.*|REMOVESELF
FileKey4=%LocalAppData%\Aegisub\ffms2cache|*.*|REMOVESELF
FileKey5=%ProgramFiles%\Aegisub|*.txt

[Aegisub (Autosaves)*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Aegisub
Default=False
Warning=Aegisub automatically saves a copy of each script you are working on. This will delete them.
FileKey1=%AppData%\Aegisub\autosave|*.*|REMOVESELF

[Aegisub (Auto Backups)*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Aegisub
Default=False
Warning=Aegisub automatically saves a backup copy of each script you open. This will delete them.
FileKey1=%AppData%\Aegisub\autoback|*.*|REMOVESELF

[DVD-Cloner*]
LangSecRef=3023
Detect1=HKCU\Software\Dvd-cloner
Detect2=HKCU\Software\DVD-Cloner Gold
Detect3=HKCU\Software\iPod-Cloner
Default=False
FileKey1=%AppData%\DVD-Cloner*|*.log
FileKey2=%CommonAppData%\DVD-Cloner*|*.log
FileKey3=%Documents%|Smart.log;Smart_result.log
FileKey4=%ProgramFiles%\DVD-Cloner*|*.log|RECURSE
FileKey5=%ProgramFiles%\DVD-Cloner Platinum\*\readcache|*.*
FileKey6=%SystemDrive%|dtdlog.txt
FileKey7=%WinDir%\system32|dvdtest10024.dat

[WinToUSB*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinToUSB_is1
Default=False
FileKey1=%ProgramFiles%\WinToUSB\bin|*.log

Share this post


Link to post
Share on other sites

Interim updates resume tonight! I'll update either late tonight (est) or sometime tomorrow afternoon. It's going to be a pretty sizable update too. Seems like a good way to ring in the new year

Share this post


Link to post
Share on other sites

I don't have Adblock and FlashGot Firefox extensions on my system, but they still show up in CCleaner. Is it possible that we can change the Firefox extensions "Detect" path to some other?

Share this post


Link to post
Share on other sites
Using Firefox Portable (don't have the install version), Adblock Plus could be detected two ways:

* %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\adblockplus

* %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi

Share this post


Link to post
Share on other sites

New entries:

[Blue-Cloner*]
LangSecRef=3023
Detect=HKCU\Software\Blue-cloner
Default=False
FileKey1=%AppData%\Blue-Cloner|*.log
FileKey2=%AppData%\Blue-Cloner\ReadCache|*.*|REMOVESELF
FileKey3=%ProgramFiles%\Blue-Cloner|*.log;*.txt

[iPod-Cloner*]
LangSecRef=3023
Detect=HKCU\Software\iPod-Cloner
Default=False
FileKey1=%ProgramFiles%\iPod-Cloner|*.log
FileKey2=%ProgramFiles%\iPod-Cloner\ReadCache|*.*
FileKey3=%SystemDrive%|dtdlog.txt

[MusicBee*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MusicBee
Default=False
FileKey1=%AppData%\MusicBee|*.dat
FileKey2=%AppData%\MusicBee\InternalCache|*.*|REMOVESELF

[Open Blu-ray Ripper*]
LangSecRef=3023
Detect=HKCU\Software\OpenCloner\BDRipper
Default=False
FileKey1=%AppData%\Open Blu-ray Ripper|OBR_LOG_FILE.txt
FileKey2=%AppData%\Open Blu-ray Ripper\ReadCache|*.*|REMOVESELF

[Open Blu-ray to DVD*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Blu-ray to DVD Pro_is1
Default=False
FileKey1=%ProgramFiles%\Blu-ray to DVD*|*.log;*.txt
FileKey2=%ProgramFiles%\Blu-ray to DVD*\ReadCache|*.*

[Open DVD Ripper*]
LangSecRef=3023
Detect=HKCU\Software\OpenCloner\DVDRipper
Default=False
FileKey1=%AppData%\Open DVD Ripper|ODR_LOG_FILE.txt
FileKey2=%AppData%\Open DVD Ripper\ReadCache|*.*|REMOVESELF

[Trojan Remover*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Simply Super Software\Trojan Remover
Default=False
FileKey1=%CommonAppData%\Logs|*.*|REMOVESELF
FileKey2=%Documents%\Simply Super Software|*.*|REMOVESELF

Modified:

[dvdcss*]
LangSecRef=3023
DetectFile=%AppData%\dvdcss
Default=False
FileKey1=%AppData%\dvdcss|*.*|REMOVESELF
FileKey2=%UserProfile%\.dvdcss|*.*|REMOVESELF

- Edited FileKey1 and 2 to REMOVESELF from RECURSE. Folder regenerates when utilized.

[Stream-Cloner*]
LangSecRef=3023
Detect=HKCU\Software\Stream-Cloner
Default=False
FileKey1=%AppData%\Stream-Cloner|*.log;IeRecentVisit.txt
FileKey2=%AppData%\Stream-Cloner\Cap_images|*.*|REMOVESELF
FileKey3=%AppData%\Stream-Cloner\thumbs|*.*|REMOVESELF

- Improved FileKey1
- Added FileKey2 and 3

Share this post


Link to post
Share on other sites

 

Using Firefox Portable (don't have the install version), Adblock Plus could be detected two ways:
* %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\adblockplus
* %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi

 

When I use the original Firefox profile path (rs3s1h3p.default), CCleaner detects the entry. However, when I use an Asterisk (*) instead of the profile path, CCleaner does not detect the entry. May be you guys can help.
 
[Adblock Backups*]
LangSecRef=3026
DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblock*|patterns-backup*.ini
 
[FlashGot*]
LangSecRef=3026
DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*|FlashGot.log;FlashGot.log.bak*

Share this post


Link to post
Share on other sites

DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi

 
DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi

 

 

I don't know if this will work (replaces the profile name with an asterick):

DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi
 
----------------------------------
 
Off topic:
 
Too bad CCleaner can't do something like detect a file/folder using recurse (just a wishlist thing I suppose):
DetectFileRecurse=%AppData%\Mozilla\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
DetectFileRecurse=%AppData%\Mozilla\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi

Share this post


Link to post
Share on other sites

 

I don't know if this will work (replaces the profile name with an asterick):

DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi
 
----------------------------------
 
Off topic:
 
Too bad CCleaner can't do something like detect a file/folder using recurse (just a wishlist thing I suppose):
DetectFileRecurse=%AppData%\Mozilla\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
DetectFileRecurse=%AppData%\Mozilla\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi

 

I tried lots of different ways, but none of them worked.

Share this post


Link to post
Share on other sites

THX for the update :)

 

From the last winapp2.ini

[XnView MP*]
LangSecRef=3024
Detect=HKCU\Software\XnView\XnViewMP
Default=False
FileKey1=%AppData%\XnViewMP|*.db;category.bak
FileKey2=%ProgramFiles%\XnViewMP|category.bak;*.db

[XnView*]
LangSecRef=3023
Detect=HKCU\Software\XnView
Default=False
FileKey1=%AppData%\XnView|XnView.db;category.bak
FileKey2=%AppData%\XnView\cache|*.db
FileKey3=%ProgramFiles%\XnView|category.bak
FileKey4=%ProgramFiles%\XnView\cache|*.db

I would say they have the same LangSecRef=3023 ....

 

--->

 

[XnView MP*]
LangSecRef=3023
Detect=HKCU\Software\XnView\XnViewMP
Default=False
FileKey1=%AppData%\XnViewMP|*.db;category.bak
FileKey2=%ProgramFiles%\XnViewMP|category.bak;*.db

Share this post


Link to post
Share on other sites

Modified:

[AnyDVD*]
LangSecRef=3023
Detect=HKCU\Software\SlySoft\AnyDVD
Default=False
FileKey1=%Documents%\AnyDVD_logs|*.*|REMOVESELF

- Renamed to AnyDVD. Detect line detects AnyDVD classic and AnyDVDHD
- Changed LangSecRef to 3023 to group with other decryption, disc ripper software.

[DVD-Cloner*]
LangSecRef=3023
Detect1=HKCU\Software\Dvd-cloner
Detect2=HKCU\Software\DVD-Cloner Gold
Detect3=HKCU\Software\iPod-Cloner
Default=False
FileKey1=%AppData%\DVD-Cloner*|*.log
FileKey2=%CommonAppData%\DVD-Cloner*|*.log
FileKey3=%Documents%|Smart.log;Smart_result.log
FileKey4=%ProgramFiles%\DVD-Cloner*|*.log|RECURSE
FileKey5=%ProgramFiles%\DVD-Cloner Platinum\*\readcache|*.*
FileKey6=%SystemDrive%|dtdlog.txt
FileKey7=%WinDir%\system32|dvdtest10024.dat

- Added FileKey5

[Listary*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Listary_is1
Default=False
FileKey1=%AppData%\Listary\CrashRpt|*.*|REMOVESELF
FileKey2=%ProgramFiles%\Listary|*.log

- Corrected FileKey2 directory

Share this post


Link to post
Share on other sites

Sorry, forgot to change the version number in the post. The link went to the right place though :)

 

I've been playing with the firefox thing myself and haven't had any success either. Kind of a bummer.

Share this post


Link to post
Share on other sites

 

Revised Entry

Corrected the FileKey12

 

[Windows Communications Apps*]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCache|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCookies|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetHistory|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\Content|*.*
FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*
FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\PRICache|*.*
FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.*
FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\LiveComm\*\*\DBStore\LogFiles|*.log
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory

 

FileKey12 like that makes mail accounts forget settings like when it retrives mail & what it shows notifacations for, also passwords.

 

edit: the files in there don't go above 512kb & are recreated anyways

Edited by Coffee4Joe

Share this post


Link to post
Share on other sites

FileKey12 like that makes mail accounts forget settings like when it retrives mail & what it shows notifacations for, also passwords.

 

edit: the files in there don't go above 512kb & are recreated anyways

 

I just corrected the paths because "nouser0000000000000001\120712-0049" was not a valid path. Please look at the posts listed below.

 

http://forum.piriform.com/index.php?showtopic=32310&page=176&do=findComment&comment=241756

 

http://forum.piriform.com/index.php?showtopic=32310&page=185&do=findComment&comment=243364

Share this post


Link to post
Share on other sites

New:


[ANNO 2070 Logs*]
Section=Games
DetectFile=%AppData%\Ubisoft\ANNO 2070\
Default=False
FileKey1=%AppData%\Ubisoft\ANNO 2070\Logs|*.log;*.dmp
FileKey2=%AppData%\Ubisoft\ANNO 2070\Logs\netlogs|*.log

[ANNO 2070 Cache*]
Section=Games
DetectFile=%AppData%\Ubisoft\ANNO 2070\
Default=False
FileKey1=%AppData%\Ubisoft\ANNO 2070\Cache|*.*|REMOVESELF

Share this post


Link to post
Share on other sites

I just corrected the paths because "nouser0000000000000001\120712-0049" was not a valid path.

 

How about this for FileKey12? Removing any other .log files in there seem to cause settings to be lost for me. My mail app must of been still open in task manager when I tested and posted http://forum.piriform.com/index.php?showtopic=32310&page=185&do=findComment&comment=243364 at that time it was just passwords being cleared

 

[Windows Communications Apps*]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCache|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCookies|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetHistory|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\Content|*.*
FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*
FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\PRICache|*.*
FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.*
FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\LiveComm\*\*\DBStore\LogFiles|edbtmp.log
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory

Share this post


Link to post
Share on other sites

New entries:

[Anvisoft Cloud System Booster*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Anvisoft\Cloud System Booster
Default=False
FileKey1=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\FFToobar\tmp|*.*|REMOVESELF
FileKey2=%ProgramFiles%\Anvisoft\Cloud System Booster|*.log;*.txt
FileKey3=%ProgramFiles%\Anvisoft\Cloud System Booster\logs|*.*
FileKey4=%ProgramFiles%\Anvisoft\Cloud System Booster\reports|*.*
FileKey5=%ProgramFiles%\Anvisoft\Cloud System Booster\VLog|*.*

[Anvisoft Cloud System Booster (Backups)*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Anvisoft\Cloud System Booster
Default=False
Warning=This will delete your backups. You will be unable to undo any changes made with Cloud System Booster.
FileKey1=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\IEToobar|*.*|REMOVESELF
FileKey2=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\FFToobar|*.*|REMOVESELF
FileKey3=%ProgramFiles%\Anvisoft\Cloud System Booster\bak|*.*

[BB FlashBack 4*]
LangSecRef=3023
Detect1=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Express
Detect2=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Pro 4
Detect3=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Standard 4
Default=False
FileKey1=%AppData%\Blueberry|ExportToAVIStat.txt;ExportToQTStat.txt;ExportToSWFStat.txt;ExportToWMVStat.txt;FBExpress2 CrashTracking.xml;FlashBack4 CrashTracking.xml;FBStandard4 CrashTracking.xml;FBExpress2 UsageTracking.xml;FlashBack4 UsageTracking.xml;FBStandard4 UsageTracking.xml;RecorderStat.txt;RecorderStaticStat.txt
FileKey2=%AppData%\LogSys|*.*|REMOVESELF
FileKey3=%CommonProgramFiles%\Blueberry Software|*.log
FileKey4=%ProgramFiles%\Blueberry Software\*|drvinstlog.txt;*.log
FileKey5=%WinDir%\system32\MTSLog|*.*|REMOVESELF

[Blumentals Easy GIF Animator*]
LangSecRef=3023
Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Easy GIF Animator_is1
Default=False
FileKey1=%ProgramFiles%\Easy GIF Animator|*.txt|RECURSE

Share this post


Link to post
Share on other sites

The [AVG AntiVirus Installer*] should be removed. The FileKey1 is alreday in [AVG AntiVirus 2013 More*] and [AVG AntiVirus 2014*].

I also suggest changing the names to [AVG 2013 More*] and [AVG 2014*].

 

[AVG AntiVirus Installer*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\AVG
Default=False
FileKey1=%CommonAppData%\AVG*\SetupBackup|*.*

 

=========================================

 

[AVG AntiVirus 2013 More*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\AVG\AVG2013
Default=False
FileKey1=%CommonAppData%\AVG2013\IDS\config|*List.zip.bak
FileKey2=%CommonAppData%\AVG2013\IDS\profile|globalLoadable.bak
FileKey3=%CommonAppData%\AVG2013\Log|history.xml
FileKey4=%CommonAppData%\AVG2013\SetupBackup|*.*
FileKey5=%CommonAppData%\MFAData\Logs|*.*
FileKey6=%LocalAppData%\AVG2013\log|*.log;*.log.*
FileKey7=%LocalAppData%\AVG2013\temp|*.tmp
FileKey8=%ProgramFiles%\AVG\AVG2013|updatecomps.bak;*.old
FileKey9=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\dumps|*.*
FileKey10=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\log|*.*
FileKey11=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\dumps|*.*
FileKey12=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\log|*.*

[AVG AntiVirus 2014*]
ID=2313
LangSecRef=3024
Detect=HKLM\SOFTWARE\AVG\AVG2014
Default=False
FileKey1=%CommonAppData%\AVG2014\Log|*.log;history.xml
FileKey2=%CommonAppData%\AVG2014\scanlogs|*.log
FileKey3=%CommonAppData%\AVG2014\update\backup|*.*
FileKey4=%CommonAppData%\AVG2014\Emc\Log|*.log
FileKey5=%CommonAppData%\AVG2014\IDS\config|*List.zip.bak
FileKey6=%CommonAppData%\AVG2014\IDS\profile|globalLoadable.bak
FileKey7=%CommonAppData%\AVG2014\Temp|*.tmp
FileKey8=%CommonAppData%\AVG2014\SetupBackup|*.*
FileKey9=%CommonAppData%\MFAData\Logs|*.*
FileKey10=%LocalAppData%\AVG2014\log|*.log;*.log.*
FileKey11=%LocalAppData%\AVG2014\temp|*.tmp
FileKey12=%ProgramFiles%\AVG\AVG2014|updatecomps.bak;*.old
FileKey13=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\dumps|*.*
FileKey14=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\log|*.*
FileKey15=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\dumps|*.*
FileKey16=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\log|*.*

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×