Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

1. [ code ] always works for me. Tried it in Firefox and Chrome. Maybe you are using the standard editor instead of Notepad++?

2. New. Did the same for Chromium:

[Chromium (More)*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
ExcludeKey1=FILE|%LocalAppData%\Chromium\User Data\|First Run
ExcludeKey2=FILE|%LocalAppData%\Chromium\User Data\|Local State
FileKey1=%LocalAppData%\Chromium|*.lock|RECURSE
FileKey2=%LocalAppData%\Chromium|*.old|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data|*.*
FileKey4=%LocalAppData%\Chromium\User Data\Temp|*.*|RECURSE
FileKey5=%LocalAppData%\Chromium\User Data\Default|Extension Cookies
FileKey6=%LocalAppData%\Chromium\User Data\Default|Archived History
FileKey7=%LocalAppData%\Chromium\User Data\Default|Archived History-journal
FileKey8=%LocalAppData%\Chromium\User Data\Default|History
FileKey9=%LocalAppData%\Chromium\User Data\Default|History Index
FileKey10=%LocalAppData%\Chromium\User Data\Default|History Index *
FileKey11=%LocalAppData%\Chromium\User Data\Default|History-journal
FileKey12=%LocalAppData%\Chromium\User Data\Default|Network Action Predictor-journal
FileKey13=%LocalAppData%\Chromium\User Data\Default|Top Sites
FileKey14=%LocalAppData%\Chromium\User Data\Default|Top Sites-journal
FileKey15=%LocalAppData%\Chromium\User Data\Default|Visited Links
FileKey16=%LocalAppData%\Chromium\User Data\Default\Application Cache|*.*|RECURSE
FileKey17=%LocalAppData%\Chromium\User Data\Default\Extensions\Temp|*.*
FileKey18=%LocalAppData%\Chromium\User Data\Default\Extension Rules|*.*|RECURSE
FileKey19=%LocalAppData%\Chromium\User Data\Default\File System|*.*|RECURSE
FileKey20=%LocalAppData%\Chromium\User Data\Default\GPUCache|*.*|RECURSE
FileKey21=%LocalAppData%\Chromium\User Data\Default\Media Cache|*.*|RECURSE
FileKey22=%LocalAppData%\Chromium\User Data\Default\Session Storage|*.*|RECURSE
FileKey23=%LocalAppData%\Chromium\User Data\Default\Temp|*.*|RECURSE
FileKey24=%LocalAppData%\Chromium\User Data\Performance Monitor Databases|*.*|REMOVESELF
FileKey25=%LocalAppData%\Chromium\User Data\Default|Extension Cookies-journal
Link to comment
Share on other sites

1. [ code ] always works for me. Tried it in Firefox and Chrome. Maybe you are using the standard editor instead of Notepad++?

2. New. Did the same for Chromium:

 

I use the normal/standard MS Notepad.  I did not have "Word Wrap" selected.  Code works okay with Word Wrap selected.

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Question ?

 

Combine

[Malwarebytes Anti-Malware 2.0*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*

[MalwareBytes Anti Malware More*]
LangSecRef=3024
Detect=HKCU\Software\Malwarebytes' Anti-Malware
Default=False
FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

Into

[Malwarebytes Anti-Malware More*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey4=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

FileKey1 is for version 2.0 and FileKey 2 - 4 for pre version 2.0

 

 

New

[Malwarebytes Anti-Malware (Lng)*]
Section=Language Files
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
Warning=This will delete all language files excluding English.
FileKey1=%ProgramFiles%\Malwarebytes Anti-Malware\Languages|*.qm
FileKey2=%ProgramFiles%\Malwarebytes' Anti-Malware\Languages|*.lng
ExcludeKey1=FILE|%ProgramFiles%\Malwarebytes Anti-Malware\Languages|lang_en.qm
ExcludeKey2=FILE|%ProgramFiles%\Malwarebytes' Anti-Malware\Languages|english.lng


[Speccy (Lng)*]
Section=Language Files
Detect=HKLM\SOFTWARE\Piriform\Speccy
Default=False
Warning=This will delete all language files excluding the Default language.
FileKey1=%ProgramFiles%\Speccy\Lang|*.*|REMOVESELF


[Spybot - Search & Destroy 2 (lng)*]
Section=Language Files
Detect=HKCU\Software\Safer Networking Limited\Spybot - Search & Destroy 2
Default=False
Warning=This will delete all language files excluding the Default language.
FileKey1=%ProgramFiles%\Spybot - Search & Destroy 2\locale|*.*|REMOVESELF

Every line of code written by man can be undone by man

.

"A loser in the real world is still a loser in the net!" - .hack//SIGN

.
Getting old is inevitable,  growing up is optional !!

Link to comment
Share on other sites

 

Addition:

[skype More*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype|*.lck;*.lock;cookies.dat|RECURSE
FileKey2=%AppData%\Skype\*\*cache|*.*|RECURSE
New:
[skype Messages*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype|offline-storage.data;dc.db|RECURSE
FileKey2=%AppData%\Skype\*\chatsync|*.*|RECURSE

 

 

Your "NEW" [skype Messages*] entry is actually modification of existing [skype ChatSync*] entry below.

[skype ChatSync*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\*\chatsync|*.*|RECURSE

IMHO [skype Messages*] is clearer name for this entry. :) However, because

of bad experience for me personally (and many others as I recall) when clearing

of Skype "chatsync"/message history was first added as part of [skype More*] entry in
2011 version of Winapp2.ini, I would highly recommend that this replacement entry
for [skype ChatSync*] be modified as follows to also include a warning.

Further modified NEW [skype Messages*] entry to replace existing [skype ChatSync*] entry:

[skype Messages*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
Warning=This will delete your chat message history!
FileKey1=%AppData%\Skype|offline-storage.data;dc.db|RECURSE
FileKey2=%AppData%\Skype\*\chatsync|*.*|RECURSE

 

Link to comment
Share on other sites

 

Question ?

 

Combine

[Malwarebytes Anti-Malware 2.0*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*

[MalwareBytes Anti Malware More*]
LangSecRef=3024
Detect=HKCU\Software\Malwarebytes' Anti-Malware
Default=False
FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

Into

[Malwarebytes Anti-Malware More*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey4=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

FileKey1 is for version 2.0 and FileKey 2 - 4 for pre version 2.0

 

 

New

[Malwarebytes Anti-Malware (Lng)*]
Section=Language Files
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
Warning=This will delete all language files excluding English.
FileKey1=%ProgramFiles%\Malwarebytes Anti-Malware\Languages|*.qm
FileKey2=%ProgramFiles%\Malwarebytes' Anti-Malware\Languages|*.lng
ExcludeKey1=FILE|%ProgramFiles%\Malwarebytes Anti-Malware\Languages|lang_en.qm
ExcludeKey2=FILE|%ProgramFiles%\Malwarebytes' Anti-Malware\Languages|english.lng


[Speccy (Lng)*]
Section=Language Files
Detect=HKLM\SOFTWARE\Piriform\Speccy
Default=False
Warning=This will delete all language files excluding the Default language.
FileKey1=%ProgramFiles%\Speccy\Lang|*.*|REMOVESELF


[Spybot - Search & Destroy 2 (lng)*]
Section=Language Files
Detect=HKCU\Software\Safer Networking Limited\Spybot - Search & Destroy 2
Default=False
Warning=This will delete all language files excluding the Default language.
FileKey1=%ProgramFiles%\Spybot - Search & Destroy 2\locale|*.*|REMOVESELF

Winapp dont support lng files und other special things tere are risky/not good for noobs....

 

We could create a second version like winapp2 with these special entries????

 

https://www.dropbox.com/s/tu0yc4dt10hy6ds/Winsys2.ini

Link to comment
Share on other sites

Winapp dont support lng files und other special things tere are risky/not good for noobs....

 

We could create a second version like winapp2 with these special entries????

 

https://www.dropbox.com/s/tu0yc4dt10hy6ds/Winsys2.ini

 

I am aware of this and Winapp2.ini (the member) did indicate this a while back as well that he will not include them within the Winapp2.ini file.

 

It's more of a cherry pick anyway the lang entries.

 

That is why all my lng entries have warnings.

Every line of code written by man can be undone by man

.

"A loser in the real world is still a loser in the net!" - .hack//SIGN

.
Getting old is inevitable,  growing up is optional !!

Link to comment
Share on other sites

I think you will need the following Detect1 and Detect2 code to combine the older MBAM code with the new 2.0 code.  I don't think the old MBAM created an HKLM entry.   And I suggest that the name be [MalwareBytes Anti-Malware More*] with the hyphen if the combination is made.

Detect1=HKCU\Software\Malwarebytes' Anti-Malware
Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

 

I think you will need the following Detect1 and Detect2 code to combine the older MBAM code with the new 2.0 code.  I don't think the old MBAM created an HKLM entry. 

Detect1=HKCU\Software\Malwarebytes' Anti-Malware
Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe

 

I'm using v1.75.0.1300 this is my keys

 

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Malwarebytes' Anti-Malware

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe

 

Did testes a while back and found that Wow6432Node wasn't needed in most cases.

Every line of code written by man can be undone by man

.

"A loser in the real world is still a loser in the net!" - .hack//SIGN

.
Getting old is inevitable,  growing up is optional !!

Link to comment
Share on other sites

Revised Entries

Added: %Documents%\NewBlueFX\Logs|*.log

http://forum.piriform.com/index.php?showtopic=32310&p=248526

 

[Adobe Premiere Elements 11*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Premiere Elements\11.0
Default=False
RegKey1=HKCU\Software\Adobe\Premiere Elements\11.0\MRUDocuments
FileKey1=%Documents%\Adobe\Premiere Elements\11.0|*.log
FileKey2=%Documents%\NewBlueFX\Logs|*.log
FileKey3=%AppData%\Adobe\Common\Media Cache|*.*|RECURSE
FileKey4=%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE
FileKey5=%AppData%\Adobe\Common\Thumbnail Cache|*.*|RECURSE

[Adobe Premiere Elements 12*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Premiere Elements\12.0
Default=False
RegKey1=HKCU\Software\Adobe\Premiere Elements\12.0\MRUDocuments
FileKey1=%Documents%\Adobe\Premiere Elements\12.0|*.log
FileKey2=%Documents%\NewBlueFX\Logs|*.log
FileKey3=%AppData%\Adobe\Common\Media Cache|*.*|RECURSE
FileKey4=%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE
FileKey5=%AppData%\Adobe\Common\Thumbnail Cache|*.*|RECURSE

Link to comment
Share on other sites

Updated

 

 

 

 

What's new in winapp2.ini 4.13.140508

General:

62 New Entries
41 Modified Entries
4 Removed Entries

Verbose:

------------------------------------------------------------------------------

New Entries:

[Adobe Application Manager*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\CommonFiles\Usage\Adobe Application Manager
Default=False
FileKey1=%LocalAppData%\Adobe\AAMUpdater\*|aamul.log;aamun.log

[Adobe Photoshop Elements 11*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Photoshop Elements\11.0
Default=False
RegKey1=HKCU\Software\Adobe\Elements Organizer\11.0\CurrentMediaFilePath
RegKey2=HKCU\Software\Adobe\Photoshop Elements\11.0\common\settings\Elements MRU
RegKey3=HKCU\Software\Adobe\Photoshop Elements\11.0\CurrentMediaFilePath
RegKey4=HKCU\Software\Adobe\Photoshop Elements\11.0\VisitedDirs|STARTUPIMAGEDIRECTORY
FileKey1=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|face.thumb.9.cache
FileKey2=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|thumb.5.cache
FileKey3=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|WaldoData\waldo.cache
FileKey4=%CommonAppData%\Adobe\Photoshop Elements\File Agent|WatchFolder.3.cache
FileKey5=%AppData%\Adobe\Elements Organizer\11.0\Organizer|status.dat
FileKey6=%AppData%\Adobe\Elements Organizer\11.0\Organizer|*.txt

[Alwin 6 Logs*]
LangSecRef=3023
DetectFile=%SystemDrive%\alwin6
Default=False
FileKey1=%SystemDrive%\alwin6\postgresql\9.0\data\pg_log|*.*

[AMYUNI PDF Converter Logs*]
LangSecRef=3021
DetectFile=%CommonAppData%\Package Cache\3DBECED19CFC2819A7E0BE14463CF18FC8720D91\amyuni_pdfconverter_5_00
Default=False
FileKey1=%CommonAppData%\Package Cache\3DBECED19CFC2819A7E0BE14463CF18FC8720D91\amyuni_pdfconverter_5_00|*.log|RECURSE

[Broadcom Wireless LAN Driver Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\Drivers\Broadcom Wireless LAN Driver
Default=False
FileKey1=%SystemDrive%\Drivers\Broadcom Wireless LAN Driver|*.log|RECURSE

[Broforce*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\274190
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Broforce\*\Broforce Logs|*.csv

[CopyTransDriversInstaller Logs*]
LangSecRef=3023
DetectFile=%CommonAppData%\WindSolutions\CopyTransDriversInstaller
Default=False
FileKey1=%CommonAppData%\WindSolutions\CopyTransDriversInstaller\Logs|*.*|REMOVESELF

[CopyTransManager Logs*]
LangSecRef=3023
DetectFile=%CommonAppData%\WindSolutions\CopyTransManager
Default=False
FileKey1=%CommonAppData%\WindSolutions\CopyTransManager\Logs|*.*|REMOVESELF

[Dakota AG Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\dakotaag
Default=False
FileKey1=%SystemDrive%\dakotaag|*.log|RECURSE

[DayZ*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\221100
Default=False
FileKey1=%LocalAppData%\DayZ|DayZ.mdmp;DayZ.bidmp

[DC Universe Online*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\24200
Default=False
FileKey1=%Documents%\My Games\DC Universe Online\Logs|*.*
FileKey2=%ProgramFiles%\Steam\SteamApps\Common\DC Universe Online|.downloadInfo.txt;.downloadStats.txt

[DivX Logs*]
LangSecRef=3023
Detect=HKCU\Software\DivX
Default=False
FileKey1=%CommonAppData%\DivX|*log|RECURSE

[Evernote Skitch*]
LangSecRef=3021
Detect=HKCU\Software\Evernote\Skitch
Default=False
RegKey1=HKCU\Software\Evernote\Skitch|lastDoc
FileKey1=%LocalAppData%\Skitch|logfile.txt

[F-Secure Password Manager LocalStorage*]
LangSecRef=3021
Detect=HKCU\Software\F-Secure
Default=False
FileKey1=%LocalAppData%\F-Secure\Pwmgr|*.log

[F-Secure Password Manager Log*]
LangSecRef=3021
Detect=HKCU\Software\F-Secure
Default=False
FileKey1=%LocalAppData%\F-Secure\Pwmgr\LocalStorage|*.*|RECURSE

[Favicons*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Warning=Your browser will re-index favicons for frequently visited sites and bookmarks.
DetectFile1=%LocalAppData%\Torch
DetectFile1=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data|Favicons;Favicons-journal|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data|Favicons;Favicons-journal|RECURSE
FileKey3=%LocalAppData%\Flock\User Data|Favicons;Favicons-journal|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data|Favicons;Favicons-journal|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data|Favicons;Favicons-journal|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data|Favicons;Favicons-journal|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data|Favicons;Favicons-journal|RECURSE
FileKey8=%LocalAppData%\Torch\User Data|Favicons;Favicons-journal|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data|Favicons;Favicons-journal|RECURSE

[Firebird Project Logs*]
LangSecRef=3023
Detect=HKLM\Software\Firebird Project
Default=False
FileKey1=%ProgramFiles%\Firebird\Firebird_2_1|*.log

[G-Data Logs*]
LangSecRef=3023
Detect=HKCU\Software\G Data
Default=False
FileKey1=%ProgramFiles%\G Data\AntiVirus\AVK\UpdatePGM|*.log
FileKey2=%ProgramFiles%\Common Files\G Data\AVKScanP\G Data|*.log;*old
FileKey3=%CommonAppData%\G Data\AVK\Log|*.*|RECURSE
FileKey4=%AllUsersProfile%\G Data\AVK\Log\AVKLog|*.*

[Genymobile Logs*]
LangSecRef=3024
Detect=HKCU\Software\Genymobile
Default=False
FileKey1=%UserProfile%\VirtualBox VMs\*\|genymotion-player*.log;logcat*.txt
FileKey2=%LocalAppData%\Genymobile|*.log

[GMG Capsule*]
Section=Games
DetectFile=%LocalAppData%\Green Man Gaming\Capsule
Default=False
FileKey1=%LocalAppData%\Green Man Gaming\Capsule\Logfiles|*.*

[Gotham City Impostors*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\206210
Default=False
FileKey1=%Documents%\WB Games\Gotham City Impostors - Free To Play|*.log

[Handy Backup*]
LangSecRef=3024
Detect=HKCU\Software\Novosoft\Handy Backup
Default=False
FileKey1=%AppData%\Novosoft\Handy Backup\logs|*.*

[Helium Music Manager*]
LangSecRef=3023
Detect1=HKCU\Software\Intermedia Software\Helium 8
Detect2=HKCU\Software\Intermedia Software\Helium 9
Default=False
FileKey1=%AppData%\Intermedia Software\Helium 9\Logs|*.*

[HostsMan Backups*]
LangSecRef=3024
DetectFile=%CommonAppData%\abelhadigital.com\HostsMan
Default=False
FileKey1=%SystemDrive%\Users\Public\Documents\HostsMan Backups|*.*|RECURSE
FileKey2=%WinDir%\System32\drivers\etc|HOSTS.bak;HOSTS.tmp

[Huawei Modem Driver Logs*]
LangSecRef=3023
Detect=HKLM\Software\Huawei technologies
Default=False
FileKey1=%ProgramFiles%\HUAWEI Modem Driver|*.log

[Intel Rapid Storage Technology Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\Driver_allOS\MEI\Drivers\MEI\INTERNAL
Default=False
FileKey1=%SystemDrive%\Driver_allOS\MEI\Drivers\MEI\INTERNAL|*.log|RECURSE

[IObit ASCDownloader Logs*]
LangSecRef=3024
DetectFile=%CommonAppData%\IObit\ASCDownloader
Default=False
FileKey1=%CommonAppData%\IObit\ASCDownloader|*.log

[Leawo Video Converter*]
LangSecRef=3023
DetectFile=%AppData%\Leawo\Video Converter
Default=False
FileKey1=%AppData%\Leawo\Video Converter|*.log

[Loadout*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\208090
Default=False
FileKey1=%LocalAppData%\EdgeOfReality\Loudout\CrashReports|*.*

[The Mighty Quest for Epic Loot Crash Reports*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\239220
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\The Mighty Quest For Epic Loot\CrashReport|*.*

[The Mighty Quest for Epic Loot Logs*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\239220
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\The Mighty Quest For Epic Loot\Log|*.*

[MultiBit Logs*]
LangSecRef=3023
DetectFile=%AppData%\MultiBit
Default=False
FileKey1=%AppData%\MultiBit\log|*.*

[OEM Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\OEM
Default=False
FileKey1=%SystemDrive%\OEM|*.log|RECURSE

[Outlast Crash Dumps*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\238320
Default=False
FileKey1=%Documents%\My Games\Outlast\OLGame\Logs|*.dmp

[Outlast Logs*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\238320
Default=False
FileKey1=%Documents%\My Games\Outlast\OLGame\Logs|*.log

[PhrozenSoft Databases*]
LangSecRef=3024
DetectFile=%AppData%\PhrozenSoft
Default=False
FileKey1=%AppData%\PhrozenSoft\PVTUploader|phrzvtu.db

[PostBox Cache*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%LocalAppData%\PostBox\Profiles\*\Cache|*.*|REMOVESELF

[PostBox Crash Reports*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%AppData%\PostBox\Crash Reports|*.*|REMOVESELF

[PostBox Logs*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%AppData%\PostBox|*.log|RECURSE

[Pycharm Cache*]
LangSecRef=3021
Detect=HKCU\Software\JetBrains\PyCharm
Default=False
FileKey1=%UserProfile%\.PyCharm*\system\caches|*.*

[Pycharm Logs*]
LangSecRef=3021
Detect=HKCU\Software\JetBrains\PyCharm
Default=False
FileKey1=%UserProfile%\.PyCharm*\system\log|*.*

[Rust*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\252490
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Rust|debug_steamclient.txt

[SavingsBull Filter*]
LangSecRef=3022
DetectFile=%ProgramFiles%\SavingsBullFilter
Default=False
FileKey1=%WinDir%\System32|SavingsBullFilterService.log

[Sniper Art of Victory*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\271500
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Sniper Art of Victory\logs|*.*

[Software Informer Cache*]
LangSecRef=3023
DetectFile=%AppData%\Software Informer
Default=False
FileKey1=%AppData%\Software Informer\cache\icons|*.tmp

[SpaceEngineers*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\244850
Default=False
FileKey1=%AppData%\SpaceEngineers|*.log

[SporTV*]
LangSecRef=3021
DetectFile=%LocalAppData%\SporTV
Default=False
FileKey1=%LocalAppData%\SporTV\Logs|*.*

[Star Swarm Stress Test*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\267130
Default=False
FileKey1=%Documents%\Star Swarm|output*.txt

[Star Wars Battlefront II*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\6060
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Star Wars BattleFront II|update*.txt

[SuperBird - Cookies*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Cookies*

[SuperBird - Installer*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
Warning=Running this may remove the ability to automatically update to future versions on some computers.
FileKey1=%LocalAppData%\SuperBird\Application\*\Installer|*.7z

[SuperBird - Internet Cache*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*\Cache|*.*|RECURSE
FileKey2=%LocalAppData%\SuperBird\User Data\*|Favicons*

[SuperBird - Internet History*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Archived History*;History*;visited links
FileKey2=%LocalAppData%\SuperBird\User Data\*\JumpListIcons*|*.*|RECURSE

[SuperBird - Login Data*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Login Data

[SuperBird - Logs*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\Application|debug.log
FileKey2=%LocalAppData%\SuperBird\User Data\*\Extension State|LOG.*;*.log;Log
FileKey3=%LocalAppData%\SuperBird\User Data\*\Session Storage|LOG.*;*.log;Log

[SuperBird - Session*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Current Tabs;Current session;Last Tabs;Last Session

[Syberfix Helpdesk Client*]
LangSecRef=3021
DetectFile=%LocalAppData%\Syberfix\UserSaved\Helpdesk Client
Default=False
FileKey1=%LocalAppData%\SyberFix\UserSaved\Helpdesk Client|*.log

[TAudio Converter*]
LangSecRef=3023
DetectFile=%AppData%\TAC
Default=False
FileKey1=%AppData%\TAC|log_main.txt

[Torrent Search Log*]
LangSecRef=3022
DetectFile=%ProgramFiles%\Torrent Search
Default=False
FileKey1=%ProgramFiles%\Torrent Search|*.log

[Ubisoft Game Launcher Installers*]
Section=Games
Warning=Make sure to launch all of your installed UPlay games at least once before running this, or they may not launch properly.
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\Installers

[WeFi Logfiles*]
LangSecRef=3024
DetectFile=%ProgramFiles%\WeFi
Default=False
FileKey1=%CommonAppData%\WeFi\LogFiles|*.*|REMOVESELF

[XPressUpdate Logs*]
LangSecRef=3023
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\XPressUpdate.exe
Default=False
FileKey1=%ProgramFiles%\Common Files\XpressUpdate|*.log;*old

------------------------------------------------------------------------------

Modified Entries:

[AMD/ATI*]
LangSecRef=3024
Detect1=HKLM\Software\AMD
Detect2=HKLM\Software\ATI
Detect3=HKLM\Software\ATI Technologies
DetectFile=%ProgramFiles%\ATI Technologies\ATI.ACE
Default=False
FileKey1=%CommonAppData%\AMD\Fuel|*.txt
FileKey2=%CommonAppData%\AMD\KDB|*.log
FileKey3=%LocalAppData%\AMD\Fuel|ClientProxyLog*.*
FileKey4=%LocalAppData%\ATI\ACE|*.txt
FileKey5=%ProgramFiles%\AMD\OverDrive|*.log
FileKey6=%ProgramFiles%\AMD\amdkmpfd|*.*|REMOVESELF
FileKey7=%ProgramFiles%\ATI\CIM\Reports|*.*
FileKey8=%ProgramFiles%\ATI Technologies|*.log|RECURSE
FileKey9=%ProgramFiles%\ATI Technologies|cccutil64.txt
FileKey10=%SystemDrive%\ATI|*.*|REMOVESELF
FileKey11=%SystemDrive%\AMD|*.*|REMOVESELF
FileKey12=%WinDir%\System32|CCCInstall*.log
FileKey13=%WinDir%\SysWOW64|CCCInstall*.log

    - Added FileKey6

[AnvSoft Any Video Converter Logs*]
LangSecRef=3023
Detect=HKCU\Software\AnvSoft\Any Video Converter\
Default=False
FileKey1=%AppData%\AnvSoft\Any Video Converter|*.log|RECURSE

    - Renamed
    - Added wildcard and recurse to FileKey1
        
[Application Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\Superbird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Application Cache|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Application Cache|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\Application Cache|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\Application Cache|*.*|REMOVESELF
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\Application Cache|*.*|REMOVESELF
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\Application Cache|*.*|REMOVESELF
FileKey7=%LocalAppData%\Rockmelt\User Data\*\Application Cache|*.*|REMOVESELF
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\Application Cache|*.*|REMOVESELF
FileKey9=%LocalAppData%\Torch\User Data\*\Application Cache|*.*|REMOVESELF
FileKey10=%LocalAppData%\SuperBird\User Data\*\Application Cache|*.*|REMOVESELF

    - Added DetectFile6 and 7
    - Added FileKeys2 through 10

[Appupdater Log*]
LangSecRef=3024
DetectFile=%AppData%\Appupdater
Default=False
FileKey1=%AppData%\Appupdater|appupdaterw.log
FileKey2=%CommonAppData%\Appupdater|*.log

    - Added FileKey2
    
[Avidemux log*]
LangSecRef=3023
Detect1=HKLM\Software\Avidemux 2.4
Detect2=HKLM\Software\Avidemux 2.5
Detect3=HKLM\Software\Avidemux 2.6
Default=False
FileKey1=%AppData%\avidemux|admlog.txt
FileKey2=%AppData%\avidemux\VirtualStore\Program Files (x86)\Avidemux*|admlog.txt

    - Added FileKey2
    
[Bookmark Backup*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*|*Bookmarks.bak
FileKey2=%LocalAppData%\Chromium\User Data\*|*Bookmarks.bak
FileKey3=%LocalAppData%\Flock\User Data\*|*Bookmarks.bak
FileKey4=%LocalAppData%\Google\Chrome\User Data\*|*Bookmarks.bak
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*|*Bookmarks.bak
FileKey6=%LocalAppData%\Rockmelt\User Data\*|*Bookmarks.bak
FileKey7=%LocalAppData%\SRWare Iron\User Data\*|*Bookmarks.bak
FileKey8=%LocalAppData%\Torch\User Data\*|*Bookmarks.bak
FileKey9=%LocalAppData%\SuperBird\User Data\*|*Bookmarks.bak

    - Added DetectFile2 and FileKey9
    
[Chivalry: Medieval Warfare*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\219640
Default=False
FileKey1=%Documents%\My Games\Chivalry Medieval Warfare\UDKGame\Logs|*.*
FileKey2=%Documents%\My Games\Chivalry Medieval Warfare Beta\UDKGame\Logs|*.*

    - Added FileKey2
    
[Chrome GPU Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\GPUCache|*.*
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\GPUCache|*.*
FileKey3=%LocalAppData%\Chromium\User Data\*\GPUCache|*.*
FileKey4=%LocalAppData%\Flock\User Data\*\GPUCache|*.*
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\GPUCache|*.*
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\GPUCache|*.*
FileKey7=%LocalAppData%\Rockmelt\User Data\*\GPUCache|*.*
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\GPUCache|*.*
FileKey9=%LocalAppData%\Torch\User Data\*\GPUCache|*.*
FileKey10=%LocalAppData%\SuperBird\User Data\*\GPUCache|*.*

    - Added DetectFiles6 and 7
    - Added FileKeys 4 through 10
    
[Chrome HTML5 Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\File System|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\File System|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\File System|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\File System|*.*|REMOVESELF
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\File System|*.*|REMOVESELF
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\File System|*.*|REMOVESELF
FileKey7=%LocalAppData%\Rockmelt\User Data\*\File System|*.*|REMOVESELF
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\File System|*.*|REMOVESELF
FileKey9=%LocalAppData%\Torch\User Data\*\File System|*.*|REMOVESELF
FileKey10=%LocalAppData%\SuperBird\User Data\*\File System|*.*|REMOVESELF

    - Added DetectFiles6 and 7
    - Added FileKeys 3 through 10
    
[Conduit Cache*]
LangSecRef=3021
Detect=HKCU\Software\Conduit
Default=False
FileKey1=%LocalLowAppData%\ConduitEngine\CacheIcons|*.*
FileKey2=%WinDir%\System32|ConduitEngine.tmp

    - Added FileKey2

[Curse Client*]
Section=Games
Detect=HKCU\Software\Classes\Curse
Default=False
FileKey1=%LocalAppData%\Apps\2.0|*.Log|RECURSE
FileKey2=%AppData%\Curse Client|*.log
FileKey3=%AppData%\Curse Client\Logs|*.*

    - Added FileKeys2 and 3
    
[Defraggler*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Defraggler
Default=False
FileKey1=%ProgramFiles%\Defraggler|*.dmp;*statistics*

    - Tweaked FileKey1
    
[Don't Starve*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\219740
Default=False
FileKey1=%ProgramFiles%\Steam\steamapps\common\dont_starve\bin|log.txt
FileKey2=%Documents%\Klei\DoNotStarve|log.txt

    - Added FileKey2

[Wondershare Dr.Fone for Android*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Wondershare\Dr.Fone for Android
Default=False
FileKey1=%SystemDrive%\DrFoneForAndroid|*.*|REMOVESELF
FileKey2=%ProgramFiles%\Wondershare\Dr.Fone for Android\log|*.*|RECURSE
FileKey3=%AppData%\Wondershare\DrFoneAndroid\DBCache|*.*|RECURSE
FileKey4=%AppData%\Wondershare\DrFoneAndroid\log|*.*|RECURSE

    - Added FileKeys1 and 3
    
[Wondershare Dr.Fone for iOS*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Wondershare\Dr.Fone for iOS
Default=False
FileKey1=%SystemDrive%\Wondershare_DrFone_Backup|*.*|REMOVESELF
FileKey2=%CommonAppData%\Wondershare\Dr.Fone\log|*.*|RECURSE

    - Made FileKey1 REMOVESELF
    
[DVDVideoSoft Logs*]
LangSecRef=3023
Detect=HKCU\Software\DVDVideoSoft
Default=False
FileKey1=%AppData%\DVDVideoSoft\installation_logs|*.*|RECURSE
FileKey2=%AppData%\DVDVideoSoft\Logs|*.*|RECURSE
FileKey3=%Documents%\DVDVideoSoft|*log.txt|RECURSE

    - Added FileKey3
    
[Fast Clean Pro*]
LangSecRef=3024
DetectFile=%LocalAppData%\Fastcleanpro
Default=False
FileKey1=%LocalAppData%\Fastcleanpro\logs|*.*

    - Removed Extraneous default line
    
[FlashPlayer AssetCache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE

    - Added FileKey9
    
[FlashPlayer Settings*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE

    - Added FileKey9
    
[FlashPlayer SharedObjects*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE

    - Added FileKey9
    
[GEAR DIFx Installers*]
LangSecRef=3023
Detect1=HKCR\Installer\Products\CACFC38969C58104B8CE6D8561446C45
Detect2=HKLM\SOFTWARE\GEAR Software\DIFx
Detect3=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3EC13FCAF38E85F44B0F1137C7FB5037
Default=False
FileKey1=%AppData%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey2=%AppData%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey3=%AppData%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey4=%AppData%\Downloaded Installations|*.*|REMOVESELF
FileKey5=%CommonAppData%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey6=%CommonAppData%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey7=%CommonAppData%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey8=%CommonAppData%\9727E41D-AD6A-47cd-B9BC-CF630B6013FD|*.*|REMOVESELF
FileKey9=%CommonAppData%\A73B37F8-7A4D-41f4-98A8-7F608CE8B98F|*.*|REMOVESELF
FileKey10=%CommonAppData%\{755AC846-7372-4AC8-8550-C52491DAA8BD}|*.*|REMOVESELF
FileKey11=%LocalAppData%\Downloaded Installations|*.*|REMOVESELF
FileKey12=%ProgramFiles%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey13=%ProgramFiles%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey14=%ProgramFiles%\38FDB89C-1EBD-4366-84B2-336D12CC3209|*.*|REMOVESELF
FileKey15=%ProgramFiles%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey16=%ProgramFiles%\93E26451-CD9A-43A5-A2FA-C42392EA4001|*.*|REMOVESELF
FileKey17=%ProgramFiles%\9727E41D-AD6A-47cd-B9BC-CF630B6013FD|*.*|REMOVESELF

    - Added FileKey10
    
[HP Installation Files*]
LangSecRef=3024
DetectFile1=%SystemDrive%\swsetup
DetectFile2=%SystemDrive%\HP Universal Print Driver
Default=False
Warning=This will delete your HP installation files.
FileKey1=%SystemDrive%\swsetup|*.*|REMOVESELF
FileKey2=%SystemDrive%\HP Universal Print Driver|*.*|REMOVESELF

    - Added DetectFile2 and FileKey2
    
[Java More*]
LangSecRef=3022
Detect=HKLM\SOFTWARE\JavaSoft\Java Runtime Environment
Default=False
FileKey1=%AppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey2=%LocalAppData%\Sun\Java\Deployment\cache|*.*|RECURSE
FileKey3=%LocalAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey4=%LocalLowAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey5=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE
FileKey6=%WinDir%\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE
FileKey7=%ProgramFiles%\Java\jre*|*PATCH.ERR
FileKey8=%ProgramFiles%\Java\jre*\lib\security|*.bak

    - Added FileKeys7 and 8
    
[Lexware Logs*]
LangSecRef=3021
DetectFile=%LocalAppData%\Lexware
Default=False
FileKey1=%CommonAppData%\Lexware\logs|*.*|REMOVESELF
FileKey2=%CommonAppData%\Lexware\elster\Log|*.*|REMOVESELF
FileKey3=%CommonAppData%\Lexware|*.log;logx|RECURSE
FileKey4=%LocalAppData%\Lexware|*.log;*logx|RECURSE
FileKey5=%SystemDrive%|LxDasi.Log
FileKey6=%ProgramFiles%\Common Files\Lexware|*.log|RECURSE

    - Tweaked DetectFile
    - Added FileKeys 2 3 and 6

[Local Storage*]
Warning=This will completely clear all local storage items.
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Local Storage|http*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Local Storage|http*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Local Storage|http*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Local Storage|http*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Local Storage|http*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Local Storage|http*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Local Storage|http*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Local Storage|http*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Local Storage|http*.*|RECURSE

    - Added FileKey9 and DetectFile2
    
[Logs*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\Application|debug.log
FileKey2=%LocalAppData%\Chrome Plus\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey3=%LocalAppData%\Chromium\Application|debug.log
FileKey4=%LocalAppData%\Chromium\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey5=%LocalAppData%\Flock\Application|debug.log
FileKey6=%LocalAppData%\Flock\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey7=%LocalAppData%\Google\Chrome\Application|debug.log
FileKey8=%LocalAppData%\Google\Chrome\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey9=%LocalAppData%\Google\Chrome SxS\Application|debug.log
FileKey10=%LocalAppData%\Google\Chrome SxS\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey16=%LocalAppData%\Rockmelt\Application|debug.log
FileKey17=%LocalAppData%\Rockmelt\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey19=%LocalAppData%\SRWare Iron\Application|debug.log
FileKey20=%LocalAppData%\SRWare Iron\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey21=%ProgramFiles%\Google\Chrome\Application|debug.log
FileKey22=%LocalAppData%\Torch\Application|debug.log
FileKey23=%LocalAppData%\Torch\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey24=%LocalAppData%\SuperBird\Application|debug.log
FileKey25=%LocalAppData%\SuperBird\User Data\*|*LOG.*;Log;*.log|RECURSE

    - Added Detectfile 2, FileKeys 24 and 25

[MalwareBytes Anti Malware More*]
LangSecRef=3024
Detect1=HKCU\Software\Malwarebytes' Anti-Malware
Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

    - Added Detect2
    
[MS SQL Server*]
LangSecRef=3021
Detect1=HKCU\Software\Microsoft\Microsoft SQL Server
Detect2=HKLM\Software\Microsoft\Microsoft SQL Server
Default=False
FileKey1=%ProgramFiles%\Microsoft SQL Server\*\Setup Bootstrap\LOG|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\FileMRUList
RegKey2=HKCU\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\ProjectMRUList
RegKey3=HKCU\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\FileMRUList
RegKey4=HKCU\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\ProjectMRUList
RegKey5=HKCU\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\FileMRUList
RegKey6=HKCU\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\ProjectMRUList
RegKey7=HKCU\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\ProjectMRUList
RegKey8=HKCU\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\FileMRUList
RegKey9=HKLM\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\FileMRUList
RegKey10=HKLM\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\ProjectMRUList
RegKey11=HKLM\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\FileMRUList
RegKey12=HKLM\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\ProjectMRUList
RegKey13=HKLM\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\FileMRUList
RegKey14=HKLM\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\ProjectMRUList
RegKey15=HKLM\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\FileMRUList
RegKey16=HKLM\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\ProjectMRUList

    - Added Detect2

[Revo Uninstaller Backups*]
LangSecRef=3024
DetectFile=%LocalAppData%\VS Revo group
Default=False
FileKey1=%LocalAppData%\VS Revo Group\Revo Uninstaller Free\BackupsData|*.*|RECURSE
FileKey2=%LocalAppData%\VS Revo Group\Revo Uninstaller Free\RegBackup\Last|*.*
FileKey3=%LocalAppData%\VS Revo Group\Revo Uninstaller Pro\BackupsData|*.*|RECURSE
FileKey4=%LocalAppData%\VS Revo Group\Revo Uninstaller Pro\RegBackup\Last|*.*
FileKey5=%ProgramFiles%\VS Revo Group\Revo Uninstaller Pro|*.bak
FileKey6=%ProgramFiles%\VS Revo Group\Revo Uninstaller Pro|rupilogs.rupldb

    - Added FileKeys5 and 6
    
[Rkill*]
LangSecRef=3024
DetectFile1=%UserProfile%\Desktop\Rkill
DetectFile2=%UserProfile%\Desktop\Rkill.txt
Default=False
Warning=This will delete your Rkill Log, make sure you've reviewed it first.
FileKey1=%UserProfile%\Desktop\Rkill|*.*|REMOVESELF
FileKey2=%UserProfile%\Desktop|*rkill*.*

    - Added DetectFile2
    
[Skype Messages*]
LangSecRef=3022
Warning=This will delete your chat message history!
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\*\chatsync|*.*|RECURSE
FileKey2=%AppData%\Skype|offline-storage.data;dc.db|RECURSE
 
    - Renamed from Skype ChatSync
    - Added Warning
    - Added FileKey2
    
[Skype More*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype|*.lck;*.lock;cookies.dat|RECURSE
FileKey2=%AppData%\Skype\*\*cache|*.*|RECURSE

    - Improved FileKey1
    - Added FileKey2
    
[Skype Temporary Files*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\DbTemp|*.*|RECURSE
FileKey2=%AppData%\Skype|*.tmp|RECURSE

    - Renamed
    - Added FileKey2
    
[StarMoney*]
LangSecRef=3021
DetectFile1=%CommonAppData%\StarMoney 8.0\
DetectFile2=%CommonAppData%\StarMoney 9.0\
Default=False
FileKey1=%CommonAppData%\StarMoney *|*.log|RECURSE

    -  Renamed
    -  Added DetectFile2
    - Tweaked FileKey1
    
[Steam Installers*]
Section=Games
Detect=HKCU\Software\Valve\Steam
Warning=Only run this entry AFTER you have launched all of your steam games at least once, as they will not be able to properly load for the first time without these files. After the first launch, however, these files become useless.
Default=False
FileKey1=%ProgramFiles%\Steam\Steamapps\common|*.msu;bitmap2substance_installer.exe;perforce*.exe;p4vinst*.exe;EasyAntiCheat_Setup*.*;xliveredist*.msi;mcpp*.*;UnSetup.exe;firewallinstallhelper.dll;gameuxinstallhelper.dll;eadm-installer.exe;wmpappcompat.exe;umdf.exe;Microsoft .NET Framework*.*;NDP*.exe;WMFDist*.exe;Social Club*Setup.exe;PhysX*.msi;PhysX*.exe;*d3dx11*.*;setup_BattlEyeARMA2*.exe;prompt.bat;GDFInstall.exe;DSInstaller.exe;directx_jun2010_redist.exe;Windows*-KB*.exe;cmp.bat;AMD_DCOptSetup.exe;PVRTexTool.exe;wmp11-windowsxp-x86-enu.exe;*.vdk;RGB9RAST*.msi;WIC*.exe;XPSEPC*.exe;msxml6.msi;AdbeRdr*.*;*inst*.vdf;UE3Redist*.exe;*.cab;*.msp;ac3filter*.exe;wmv*VCMsetup.exe;vc_red.*;gfwlivesetup.exe;GamesExplorerIntegrationTool.exe;install.ini;globdata.ini;vc*redist*.*;install.exe;install.res.*.dll;eula.*.*;DSETUP.DLL;oalinst.exe;DXSETUP.EXE;dsetup32.dll;D3D*Install*.*;dxwebsetup.exe;xnafx*.msi;WindowsInstaller*.exe;amdcpusetup.exe;locdata.*.ini;setupres.*.dll;setup.exe;wapres.*.dll;*NetFx*.*|RECURSE

    - Imrpoved FileKey1
    
[Ubisoft Game Launcher Cache*]
Section=Games
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\http*|*.*|RECURSE
FileKey2=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\assets|*.*

    - Tweaked FileKey1
    - Added FileKey2
    
[Ubisoft Game Launcher Logs*]
Section=Games
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Logs|*.*
FileKey2=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher|*.log

    - Added FileKey2
    
[VSO Batcher*]
LangSecRef=3023
Detect=HKCU\Software\VSO\VSO Batcher
Default=False
RegKey1=HKCU\Software\VSO\VSO Batcher\1|VideoFilesLastFlder
FileKey1=%AppData%\Vso\VSO Batcher\1|*.*|RECURSE

    - Shifted FileKeys2 and 3 into other entries
    
[VSO Media Player 1*]
LangSecRef=3023
Detect=HKCU\Software\VSO\VSO Media Player\1
Default=False
RegKey1=HKCU\Software\VSO\VSO Media Player\1\RecentlyOpenedFiles
FileKey1=%AppData%\VSO\VSO Media Player\1|autoresume.xml
FileKey2=%CommonAppData%\VSO\VSO Media Player\1\log|*.log;*.crashlist
FileKey3=%CommonAppData%\VSO\vsothumbs|*.*|RECURSE
FileKey4=%CommonAppData%\VSO|font.cache

    - Added FileKeys1,3, and 4
    
[Windows Live Mail*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows Live Mail
Default=False
Warning=This will reset the read counts, which will be recalculated when WLMail is started.
FileKey1=%LocalAppData%\Microsoft\Windows*Mail|*.log;*.jrs;*.chk;*.rss|RECURSE
FileKey2=%LocalAppData%\Microsoft\Windows*Mail\Backup|*.*|REMOVESELF
FileKey3=%LocalAppData%\Microsoft\Windows*Mail\*\Backup|*.*|REMOVESELF
FileKey4=%LocalAppData%\Microsoft\Windows*Mail\Storage Folders|*.*|REMOVESELF
FileKey5=%LocalAppData%\Microsoft\Windows*Mail\*.tmp|*.*|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows*Mail\*|*.MSMessageStore|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion

    - Added FileKeys3 through 6
    
[XnView*]
LangSecRef=3023
Detect1=HKCU\Software\XnView
Detect2=HKLM\SOFTWARE\Wow6432Node\XnView
Default=False
FileKey1=%AppData%\XnView|XnView.db;category.bak
FileKey2=%AppData%\XnView\cache|*.db
FileKey3=%ProgramFiles%\XnView|category.bak
FileKey4=%ProgramFiles%\XnView\cache|*.db

    - Added Detect2
    
------------------------------------------------------------------------------
Removed Entries:

[AppUpdater*]
LangSecRef=3024
DetectFile=%AppData%\AppUpdater
Default=False
FileKey1=%AppData%\AppUpdater|*.log

    - Duplicate

[Motherboard Monitor 5*]
LangSecRef=3024
Detect=HKCU\Software\Alexander van Kaam\MBM 5
Default=False
FileKey1=%ProgramFiles%\Motherboard Monitor 5\Log|*.*|RECURSE

    - Duplicate
    
[Adobe Photoshop Album Starter Edition Logs*]
LangSecRef=3021
Detect=HKCU\SOFTWARE\Adobe\Photoshop Album
Default=False
FileKey1=%AppData%\Adobe\Photoshop Album\*.*|Logse*.txt

    - Duplicate

[Malwarebytes Anti-Malware 2.0*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*

    - Merged into MalwareBytes Anti Malware More

------------------------------------------------------------------------------
 

 

 

Link to comment
Share on other sites

Updated

 

 

Thanks for the mid-term update.  :D

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Thanks for the huge update! :)

 

Missing dots:

 

[DivX Logs*]
LangSecRef=3023
Detect=HKCU\Software\DivX
Default=False
FileKey1=%CommonAppData%\DivX|*.log|RECURSE

 

[Lexware Logs*]
LangSecRef=3021
DetectFile=%LocalAppData%\Lexware
Default=False
FileKey1=%CommonAppData%\Lexware\logs|*.*|REMOVESELF
FileKey2=%CommonAppData%\Lexware\elster\Log|*.*|REMOVESELF
FileKey3=%CommonAppData%\Lexware|*.log;*.logx|RECURSE
FileKey4=%LocalAppData%\Lexware|*.log;*.logx|RECURSE
FileKey5=%SystemDrive%|LxDasi.Log
FileKey6=%ProgramFiles%\Common Files\Lexware|*.log|RECURSE

 

Modified FileKey2 - should work with version 1 and 2 now:

 

[MalwareBytes Anti Malware More*]
LangSecRef=3024
Detect1=HKCU\Software\Malwarebytes' Anti-Malware
Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

Link to comment
Share on other sites

Updated

 

 

 

What's new in winapp2.ini 4.13.140508

General:

62 New Entries
41 Modified Entries
4 Removed Entries

Verbose:

------------------------------------------------------------------------------

New Entries:

[Adobe Application Manager*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\CommonFiles\Usage\Adobe Application Manager
Default=False
FileKey1=%LocalAppData%\Adobe\AAMUpdater\*|aamul.log;aamun.log

[Adobe Photoshop Elements 11*]
LangSecRef=3021
Detect=HKCU\Software\Adobe\Photoshop Elements\11.0
Default=False
RegKey1=HKCU\Software\Adobe\Elements Organizer\11.0\CurrentMediaFilePath
RegKey2=HKCU\Software\Adobe\Photoshop Elements\11.0\common\settings\Elements MRU
RegKey3=HKCU\Software\Adobe\Photoshop Elements\11.0\CurrentMediaFilePath
RegKey4=HKCU\Software\Adobe\Photoshop Elements\11.0\VisitedDirs|STARTUPIMAGEDIRECTORY
FileKey1=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|face.thumb.9.cache
FileKey2=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|thumb.5.cache
FileKey3=%CommonAppData%\Adobe\Elements Organizer\Catalogs\My Catalog|WaldoData\waldo.cache
FileKey4=%CommonAppData%\Adobe\Photoshop Elements\File Agent|WatchFolder.3.cache
FileKey5=%AppData%\Adobe\Elements Organizer\11.0\Organizer|status.dat
FileKey6=%AppData%\Adobe\Elements Organizer\11.0\Organizer|*.txt

[Alwin 6 Logs*]
LangSecRef=3023
DetectFile=%SystemDrive%\alwin6
Default=False
FileKey1=%SystemDrive%\alwin6\postgresql\9.0\data\pg_log|*.*

[AMYUNI PDF Converter Logs*]
LangSecRef=3021
DetectFile=%CommonAppData%\Package Cache\3DBECED19CFC2819A7E0BE14463CF18FC8720D91\amyuni_pdfconverter_5_00
Default=False
FileKey1=%CommonAppData%\Package Cache\3DBECED19CFC2819A7E0BE14463CF18FC8720D91\amyuni_pdfconverter_5_00|*.log|RECURSE

[Broadcom Wireless LAN Driver Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\Drivers\Broadcom Wireless LAN Driver
Default=False
FileKey1=%SystemDrive%\Drivers\Broadcom Wireless LAN Driver|*.log|RECURSE

[Broforce*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\274190
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Broforce\*\Broforce Logs|*.csv

[CopyTransDriversInstaller Logs*]
LangSecRef=3023
DetectFile=%CommonAppData%\WindSolutions\CopyTransDriversInstaller
Default=False
FileKey1=%CommonAppData%\WindSolutions\CopyTransDriversInstaller\Logs|*.*|REMOVESELF

[CopyTransManager Logs*]
LangSecRef=3023
DetectFile=%CommonAppData%\WindSolutions\CopyTransManager
Default=False
FileKey1=%CommonAppData%\WindSolutions\CopyTransManager\Logs|*.*|REMOVESELF

[Dakota AG Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\dakotaag
Default=False
FileKey1=%SystemDrive%\dakotaag|*.log|RECURSE

[DayZ*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\221100
Default=False
FileKey1=%LocalAppData%\DayZ|DayZ.mdmp;DayZ.bidmp

[DC Universe Online*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\24200
Default=False
FileKey1=%Documents%\My Games\DC Universe Online\Logs|*.*
FileKey2=%ProgramFiles%\Steam\SteamApps\Common\DC Universe Online|.downloadInfo.txt;.downloadStats.txt

[DivX Logs*]
LangSecRef=3023
Detect=HKCU\Software\DivX
Default=False
FileKey1=%CommonAppData%\DivX|*log|RECURSE

[Evernote Skitch*]
LangSecRef=3021
Detect=HKCU\Software\Evernote\Skitch
Default=False
RegKey1=HKCU\Software\Evernote\Skitch|lastDoc
FileKey1=%LocalAppData%\Skitch|logfile.txt

[F-Secure Password Manager LocalStorage*]
LangSecRef=3021
Detect=HKCU\Software\F-Secure
Default=False
FileKey1=%LocalAppData%\F-Secure\Pwmgr|*.log

[F-Secure Password Manager Log*]
LangSecRef=3021
Detect=HKCU\Software\F-Secure
Default=False
FileKey1=%LocalAppData%\F-Secure\Pwmgr\LocalStorage|*.*|RECURSE

[Favicons*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Warning=Your browser will re-index favicons for frequently visited sites and bookmarks.
DetectFile1=%LocalAppData%\Torch
DetectFile1=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data|Favicons;Favicons-journal|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data|Favicons;Favicons-journal|RECURSE
FileKey3=%LocalAppData%\Flock\User Data|Favicons;Favicons-journal|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data|Favicons;Favicons-journal|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data|Favicons;Favicons-journal|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data|Favicons;Favicons-journal|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data|Favicons;Favicons-journal|RECURSE
FileKey8=%LocalAppData%\Torch\User Data|Favicons;Favicons-journal|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data|Favicons;Favicons-journal|RECURSE

[Firebird Project Logs*]
LangSecRef=3023
Detect=HKLM\Software\Firebird Project
Default=False
FileKey1=%ProgramFiles%\Firebird\Firebird_2_1|*.log

[G-Data Logs*]
LangSecRef=3023
Detect=HKCU\Software\G Data
Default=False
FileKey1=%ProgramFiles%\G Data\AntiVirus\AVK\UpdatePGM|*.log
FileKey2=%ProgramFiles%\Common Files\G Data\AVKScanP\G Data|*.log;*old
FileKey3=%CommonAppData%\G Data\AVK\Log|*.*|RECURSE
FileKey4=%AllUsersProfile%\G Data\AVK\Log\AVKLog|*.*

[Genymobile Logs*]
LangSecRef=3024
Detect=HKCU\Software\Genymobile
Default=False
FileKey1=%UserProfile%\VirtualBox VMs\*\|genymotion-player*.log;logcat*.txt
FileKey2=%LocalAppData%\Genymobile|*.log

[GMG Capsule*]
Section=Games
DetectFile=%LocalAppData%\Green Man Gaming\Capsule
Default=False
FileKey1=%LocalAppData%\Green Man Gaming\Capsule\Logfiles|*.*

[Gotham City Impostors*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\206210
Default=False
FileKey1=%Documents%\WB Games\Gotham City Impostors - Free To Play|*.log

[Handy Backup*]
LangSecRef=3024
Detect=HKCU\Software\Novosoft\Handy Backup
Default=False
FileKey1=%AppData%\Novosoft\Handy Backup\logs|*.*

[Helium Music Manager*]
LangSecRef=3023
Detect1=HKCU\Software\Intermedia Software\Helium 8
Detect2=HKCU\Software\Intermedia Software\Helium 9
Default=False
FileKey1=%AppData%\Intermedia Software\Helium 9\Logs|*.*

[HostsMan Backups*]
LangSecRef=3024
DetectFile=%CommonAppData%\abelhadigital.com\HostsMan
Default=False
FileKey1=%SystemDrive%\Users\Public\Documents\HostsMan Backups|*.*|RECURSE
FileKey2=%WinDir%\System32\drivers\etc|HOSTS.bak;HOSTS.tmp

[Huawei Modem Driver Logs*]
LangSecRef=3023
Detect=HKLM\Software\Huawei technologies
Default=False
FileKey1=%ProgramFiles%\HUAWEI Modem Driver|*.log

[Intel Rapid Storage Technology Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\Driver_allOS\MEI\Drivers\MEI\INTERNAL
Default=False
FileKey1=%SystemDrive%\Driver_allOS\MEI\Drivers\MEI\INTERNAL|*.log|RECURSE

[IObit ASCDownloader Logs*]
LangSecRef=3024
DetectFile=%CommonAppData%\IObit\ASCDownloader
Default=False
FileKey1=%CommonAppData%\IObit\ASCDownloader|*.log

[Leawo Video Converter*]
LangSecRef=3023
DetectFile=%AppData%\Leawo\Video Converter
Default=False
FileKey1=%AppData%\Leawo\Video Converter|*.log

[Loadout*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\208090
Default=False
FileKey1=%LocalAppData%\EdgeOfReality\Loudout\CrashReports|*.*

[The Mighty Quest for Epic Loot Crash Reports*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\239220
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\The Mighty Quest For Epic Loot\CrashReport|*.*

[The Mighty Quest for Epic Loot Logs*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\239220
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\The Mighty Quest For Epic Loot\Log|*.*

[MultiBit Logs*]
LangSecRef=3023
DetectFile=%AppData%\MultiBit
Default=False
FileKey1=%AppData%\MultiBit\log|*.*

[OEM Logs*]
LangSecRef=3021
DetectFile=%SystemDrive%\OEM
Default=False
FileKey1=%SystemDrive%\OEM|*.log|RECURSE

[Outlast Crash Dumps*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\238320
Default=False
FileKey1=%Documents%\My Games\Outlast\OLGame\Logs|*.dmp

[Outlast Logs*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\238320
Default=False
FileKey1=%Documents%\My Games\Outlast\OLGame\Logs|*.log

[PhrozenSoft Databases*]
LangSecRef=3024
DetectFile=%AppData%\PhrozenSoft
Default=False
FileKey1=%AppData%\PhrozenSoft\PVTUploader|phrzvtu.db

[PostBox Cache*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%LocalAppData%\PostBox\Profiles\*\Cache|*.*|REMOVESELF

[PostBox Crash Reports*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%AppData%\PostBox\Crash Reports|*.*|REMOVESELF

[PostBox Logs*]
LangSecRef=3021
DetectFile=%LocalAppData%\PostBox
Default=False
FileKey1=%AppData%\PostBox|*.log|RECURSE

[Pycharm Cache*]
LangSecRef=3021
Detect=HKCU\Software\JetBrains\PyCharm
Default=False
FileKey1=%UserProfile%\.PyCharm*\system\caches|*.*

[Pycharm Logs*]
LangSecRef=3021
Detect=HKCU\Software\JetBrains\PyCharm
Default=False
FileKey1=%UserProfile%\.PyCharm*\system\log|*.*

[Rust*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\252490
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Rust|debug_steamclient.txt

[SavingsBull Filter*]
LangSecRef=3022
DetectFile=%ProgramFiles%\SavingsBullFilter
Default=False
FileKey1=%WinDir%\System32|SavingsBullFilterService.log

[Sniper Art of Victory*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\271500
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Sniper Art of Victory\logs|*.*

[Software Informer Cache*]
LangSecRef=3023
DetectFile=%AppData%\Software Informer
Default=False
FileKey1=%AppData%\Software Informer\cache\icons|*.tmp

[SpaceEngineers*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\244850
Default=False
FileKey1=%AppData%\SpaceEngineers|*.log

[SporTV*]
LangSecRef=3021
DetectFile=%LocalAppData%\SporTV
Default=False
FileKey1=%LocalAppData%\SporTV\Logs|*.*

[Star Swarm Stress Test*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\267130
Default=False
FileKey1=%Documents%\Star Swarm|output*.txt

[Star Wars Battlefront II*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\6060
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\Common\Star Wars BattleFront II|update*.txt

[SuperBird - Cookies*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Cookies*

[SuperBird - Installer*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
Warning=Running this may remove the ability to automatically update to future versions on some computers.
FileKey1=%LocalAppData%\SuperBird\Application\*\Installer|*.7z

[SuperBird - Internet Cache*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*\Cache|*.*|RECURSE
FileKey2=%LocalAppData%\SuperBird\User Data\*|Favicons*

[SuperBird - Internet History*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Archived History*;History*;visited links
FileKey2=%LocalAppData%\SuperBird\User Data\*\JumpListIcons*|*.*|RECURSE

[SuperBird - Login Data*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Login Data

[SuperBird - Logs*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\Application|debug.log
FileKey2=%LocalAppData%\SuperBird\User Data\*\Extension State|LOG.*;*.log;Log
FileKey3=%LocalAppData%\SuperBird\User Data\*\Session Storage|LOG.*;*.log;Log

[SuperBird - Session*]
LangSecRef=3029
Detect=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\SuperBird\User Data\*|Current Tabs;Current session;Last Tabs;Last Session

[Syberfix Helpdesk Client*]
LangSecRef=3021
DetectFile=%LocalAppData%\Syberfix\UserSaved\Helpdesk Client
Default=False
FileKey1=%LocalAppData%\SyberFix\UserSaved\Helpdesk Client|*.log

[TAudio Converter*]
LangSecRef=3023
DetectFile=%AppData%\TAC
Default=False
FileKey1=%AppData%\TAC|log_main.txt

[Torrent Search Log*]
LangSecRef=3022
DetectFile=%ProgramFiles%\Torrent Search
Default=False
FileKey1=%ProgramFiles%\Torrent Search|*.log

[Ubisoft Game Launcher Installers*]
Section=Games
Warning=Make sure to launch all of your installed UPlay games at least once before running this, or they may not launch properly.
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\Installers

[WeFi Logfiles*]
LangSecRef=3024
DetectFile=%ProgramFiles%\WeFi
Default=False
FileKey1=%CommonAppData%\WeFi\LogFiles|*.*|REMOVESELF

[XPressUpdate Logs*]
LangSecRef=3023
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\XPressUpdate.exe
Default=False
FileKey1=%ProgramFiles%\Common Files\XpressUpdate|*.log;*old

------------------------------------------------------------------------------

Modified Entries:

[AMD/ATI*]
LangSecRef=3024
Detect1=HKLM\Software\AMD
Detect2=HKLM\Software\ATI
Detect3=HKLM\Software\ATI Technologies
DetectFile=%ProgramFiles%\ATI Technologies\ATI.ACE
Default=False
FileKey1=%CommonAppData%\AMD\Fuel|*.txt
FileKey2=%CommonAppData%\AMD\KDB|*.log
FileKey3=%LocalAppData%\AMD\Fuel|ClientProxyLog*.*
FileKey4=%LocalAppData%\ATI\ACE|*.txt
FileKey5=%ProgramFiles%\AMD\OverDrive|*.log
FileKey6=%ProgramFiles%\AMD\amdkmpfd|*.*|REMOVESELF
FileKey7=%ProgramFiles%\ATI\CIM\Reports|*.*
FileKey8=%ProgramFiles%\ATI Technologies|*.log|RECURSE
FileKey9=%ProgramFiles%\ATI Technologies|cccutil64.txt
FileKey10=%SystemDrive%\ATI|*.*|REMOVESELF
FileKey11=%SystemDrive%\AMD|*.*|REMOVESELF
FileKey12=%WinDir%\System32|CCCInstall*.log
FileKey13=%WinDir%\SysWOW64|CCCInstall*.log

    - Added FileKey6

[AnvSoft Any Video Converter Logs*]
LangSecRef=3023
Detect=HKCU\Software\AnvSoft\Any Video Converter\
Default=False
FileKey1=%AppData%\AnvSoft\Any Video Converter|*.log|RECURSE

    - Renamed
    - Added wildcard and recurse to FileKey1
        
[Application Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\Superbird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Application Cache|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Application Cache|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\Application Cache|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\Application Cache|*.*|REMOVESELF
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\Application Cache|*.*|REMOVESELF
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\Application Cache|*.*|REMOVESELF
FileKey7=%LocalAppData%\Rockmelt\User Data\*\Application Cache|*.*|REMOVESELF
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\Application Cache|*.*|REMOVESELF
FileKey9=%LocalAppData%\Torch\User Data\*\Application Cache|*.*|REMOVESELF
FileKey10=%LocalAppData%\SuperBird\User Data\*\Application Cache|*.*|REMOVESELF

    - Added DetectFile6 and 7
    - Added FileKeys2 through 10

[Appupdater Log*]
LangSecRef=3024
DetectFile=%AppData%\Appupdater
Default=False
FileKey1=%AppData%\Appupdater|appupdaterw.log
FileKey2=%CommonAppData%\Appupdater|*.log

    - Added FileKey2
    
[Avidemux log*]
LangSecRef=3023
Detect1=HKLM\Software\Avidemux 2.4
Detect2=HKLM\Software\Avidemux 2.5
Detect3=HKLM\Software\Avidemux 2.6
Default=False
FileKey1=%AppData%\avidemux|admlog.txt
FileKey2=%AppData%\avidemux\VirtualStore\Program Files (x86)\Avidemux*|admlog.txt

    - Added FileKey2
    
[Bookmark Backup*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*|*Bookmarks.bak
FileKey2=%LocalAppData%\Chromium\User Data\*|*Bookmarks.bak
FileKey3=%LocalAppData%\Flock\User Data\*|*Bookmarks.bak
FileKey4=%LocalAppData%\Google\Chrome\User Data\*|*Bookmarks.bak
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*|*Bookmarks.bak
FileKey6=%LocalAppData%\Rockmelt\User Data\*|*Bookmarks.bak
FileKey7=%LocalAppData%\SRWare Iron\User Data\*|*Bookmarks.bak
FileKey8=%LocalAppData%\Torch\User Data\*|*Bookmarks.bak
FileKey9=%LocalAppData%\SuperBird\User Data\*|*Bookmarks.bak

    - Added DetectFile2 and FileKey9
    
[Chivalry: Medieval Warfare*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\219640
Default=False
FileKey1=%Documents%\My Games\Chivalry Medieval Warfare\UDKGame\Logs|*.*
FileKey2=%Documents%\My Games\Chivalry Medieval Warfare Beta\UDKGame\Logs|*.*

    - Added FileKey2
    
[Chrome GPU Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\GPUCache|*.*
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\GPUCache|*.*
FileKey3=%LocalAppData%\Chromium\User Data\*\GPUCache|*.*
FileKey4=%LocalAppData%\Flock\User Data\*\GPUCache|*.*
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\GPUCache|*.*
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\GPUCache|*.*
FileKey7=%LocalAppData%\Rockmelt\User Data\*\GPUCache|*.*
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\GPUCache|*.*
FileKey9=%LocalAppData%\Torch\User Data\*\GPUCache|*.*
FileKey10=%LocalAppData%\SuperBird\User Data\*\GPUCache|*.*

    - Added DetectFiles6 and 7
    - Added FileKeys 4 through 10
    
[Chrome HTML5 Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Chromium
DetectFile2=%LocalAppData%\Google\Chrome
DetectFile3=%LocalAppData%\Google\Chrome SxS
DetectFile4=%ProgramFiles%\Google\Chrome
DetectFile5=%ProgramFiles%\Google\Chrome SxS
DetectFile6=%LocalAppData%\Torch
DetectFile7=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\File System|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\File System|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\File System|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\File System|*.*|REMOVESELF
FileKey5=%LocalAppData%\Google\Chrome\User Data\*\File System|*.*|REMOVESELF
FileKey6=%LocalAppData%\Google\Chrome SxS\User Data\*\File System|*.*|REMOVESELF
FileKey7=%LocalAppData%\Rockmelt\User Data\*\File System|*.*|REMOVESELF
FileKey8=%LocalAppData%\SRWare Iron\User Data\*\File System|*.*|REMOVESELF
FileKey9=%LocalAppData%\Torch\User Data\*\File System|*.*|REMOVESELF
FileKey10=%LocalAppData%\SuperBird\User Data\*\File System|*.*|REMOVESELF

    - Added DetectFiles6 and 7
    - Added FileKeys 3 through 10
    
[Conduit Cache*]
LangSecRef=3021
Detect=HKCU\Software\Conduit
Default=False
FileKey1=%LocalLowAppData%\ConduitEngine\CacheIcons|*.*
FileKey2=%WinDir%\System32|ConduitEngine.tmp

    - Added FileKey2

[Curse Client*]
Section=Games
Detect=HKCU\Software\Classes\Curse
Default=False
FileKey1=%LocalAppData%\Apps\2.0|*.Log|RECURSE
FileKey2=%AppData%\Curse Client|*.log
FileKey3=%AppData%\Curse Client\Logs|*.*

    - Added FileKeys2 and 3
    
[Defraggler*]
LangSecRef=3024
Detect=HKCU\Software\Piriform\Defraggler
Default=False
FileKey1=%ProgramFiles%\Defraggler|*.dmp;*statistics*

    - Tweaked FileKey1
    
[Don't Starve*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\219740
Default=False
FileKey1=%ProgramFiles%\Steam\steamapps\common\dont_starve\bin|log.txt
FileKey2=%Documents%\Klei\DoNotStarve|log.txt

    - Added FileKey2

[Wondershare Dr.Fone for Android*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Wondershare\Dr.Fone for Android
Default=False
FileKey1=%SystemDrive%\DrFoneForAndroid|*.*|REMOVESELF
FileKey2=%ProgramFiles%\Wondershare\Dr.Fone for Android\log|*.*|RECURSE
FileKey3=%AppData%\Wondershare\DrFoneAndroid\DBCache|*.*|RECURSE
FileKey4=%AppData%\Wondershare\DrFoneAndroid\log|*.*|RECURSE

    - Added FileKeys1 and 3
    
[Wondershare Dr.Fone for iOS*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Wondershare\Dr.Fone for iOS
Default=False
FileKey1=%SystemDrive%\Wondershare_DrFone_Backup|*.*|REMOVESELF
FileKey2=%CommonAppData%\Wondershare\Dr.Fone\log|*.*|RECURSE

    - Made FileKey1 REMOVESELF
    
[DVDVideoSoft Logs*]
LangSecRef=3023
Detect=HKCU\Software\DVDVideoSoft
Default=False
FileKey1=%AppData%\DVDVideoSoft\installation_logs|*.*|RECURSE
FileKey2=%AppData%\DVDVideoSoft\Logs|*.*|RECURSE
FileKey3=%Documents%\DVDVideoSoft|*log.txt|RECURSE

    - Added FileKey3
    
[Fast Clean Pro*]
LangSecRef=3024
DetectFile=%LocalAppData%\Fastcleanpro
Default=False
FileKey1=%LocalAppData%\Fastcleanpro\logs|*.*

    - Removed Extraneous default line
    
[FlashPlayer AssetCache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE

    - Added FileKey9
    
[FlashPlayer Settings*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE

    - Added FileKey9
    
[FlashPlayer SharedObjects*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE

    - Added FileKey9
    
[GEAR DIFx Installers*]
LangSecRef=3023
Detect1=HKCR\Installer\Products\CACFC38969C58104B8CE6D8561446C45
Detect2=HKLM\SOFTWARE\GEAR Software\DIFx
Detect3=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3EC13FCAF38E85F44B0F1137C7FB5037
Default=False
FileKey1=%AppData%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey2=%AppData%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey3=%AppData%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey4=%AppData%\Downloaded Installations|*.*|REMOVESELF
FileKey5=%CommonAppData%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey6=%CommonAppData%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey7=%CommonAppData%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey8=%CommonAppData%\9727E41D-AD6A-47cd-B9BC-CF630B6013FD|*.*|REMOVESELF
FileKey9=%CommonAppData%\A73B37F8-7A4D-41f4-98A8-7F608CE8B98F|*.*|REMOVESELF
FileKey10=%CommonAppData%\{755AC846-7372-4AC8-8550-C52491DAA8BD}|*.*|REMOVESELF
FileKey11=%LocalAppData%\Downloaded Installations|*.*|REMOVESELF
FileKey12=%ProgramFiles%\188F1432-103A-4ffb-80F1-36B633C5C9E1|*.*|REMOVESELF
FileKey13=%ProgramFiles%\34BE82C4-E596-4e99-A191-52C6199EBF69|*.*|REMOVESELF
FileKey14=%ProgramFiles%\38FDB89C-1EBD-4366-84B2-336D12CC3209|*.*|REMOVESELF
FileKey15=%ProgramFiles%\9223B3E6-70DD-4e2f-965B-DD8E02D2E20B|*.*|REMOVESELF
FileKey16=%ProgramFiles%\93E26451-CD9A-43A5-A2FA-C42392EA4001|*.*|REMOVESELF
FileKey17=%ProgramFiles%\9727E41D-AD6A-47cd-B9BC-CF630B6013FD|*.*|REMOVESELF

    - Added FileKey10
    
[HP Installation Files*]
LangSecRef=3024
DetectFile1=%SystemDrive%\swsetup
DetectFile2=%SystemDrive%\HP Universal Print Driver
Default=False
Warning=This will delete your HP installation files.
FileKey1=%SystemDrive%\swsetup|*.*|REMOVESELF
FileKey2=%SystemDrive%\HP Universal Print Driver|*.*|REMOVESELF

    - Added DetectFile2 and FileKey2
    
[Java More*]
LangSecRef=3022
Detect=HKLM\SOFTWARE\JavaSoft\Java Runtime Environment
Default=False
FileKey1=%AppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey2=%LocalAppData%\Sun\Java\Deployment\cache|*.*|RECURSE
FileKey3=%LocalAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey4=%LocalLowAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE
FileKey5=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE
FileKey6=%WinDir%\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE
FileKey7=%ProgramFiles%\Java\jre*|*PATCH.ERR
FileKey8=%ProgramFiles%\Java\jre*\lib\security|*.bak

    - Added FileKeys7 and 8
    
[Lexware Logs*]
LangSecRef=3021
DetectFile=%LocalAppData%\Lexware
Default=False
FileKey1=%CommonAppData%\Lexware\logs|*.*|REMOVESELF
FileKey2=%CommonAppData%\Lexware\elster\Log|*.*|REMOVESELF
FileKey3=%CommonAppData%\Lexware|*.log;logx|RECURSE
FileKey4=%LocalAppData%\Lexware|*.log;*logx|RECURSE
FileKey5=%SystemDrive%|LxDasi.Log
FileKey6=%ProgramFiles%\Common Files\Lexware|*.log|RECURSE

    - Tweaked DetectFile
    - Added FileKeys 2 3 and 6

[Local Storage*]
Warning=This will completely clear all local storage items.
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\User Data\*\Local Storage|http*.*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\*\Local Storage|http*.*|RECURSE
FileKey3=%LocalAppData%\Flock\User Data\*\Local Storage|http*.*|RECURSE
FileKey4=%LocalAppData%\Google\Chrome\User Data\*\Local Storage|http*.*|RECURSE
FileKey5=%LocalAppData%\Google\Chrome SxS\User Data\*\Local Storage|http*.*|RECURSE
FileKey6=%LocalAppData%\Rockmelt\User Data\*\Local Storage|http*.*|RECURSE
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Local Storage|http*.*|RECURSE
FileKey8=%LocalAppData%\Torch\User Data\*\Local Storage|http*.*|RECURSE
FileKey9=%LocalAppData%\SuperBird\User Data\*\Local Storage|http*.*|RECURSE

    - Added FileKey9 and DetectFile2
    
[Logs*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Chrome Plus\Application|debug.log
FileKey2=%LocalAppData%\Chrome Plus\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey3=%LocalAppData%\Chromium\Application|debug.log
FileKey4=%LocalAppData%\Chromium\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey5=%LocalAppData%\Flock\Application|debug.log
FileKey6=%LocalAppData%\Flock\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey7=%LocalAppData%\Google\Chrome\Application|debug.log
FileKey8=%LocalAppData%\Google\Chrome\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey9=%LocalAppData%\Google\Chrome SxS\Application|debug.log
FileKey10=%LocalAppData%\Google\Chrome SxS\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey16=%LocalAppData%\Rockmelt\Application|debug.log
FileKey17=%LocalAppData%\Rockmelt\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey19=%LocalAppData%\SRWare Iron\Application|debug.log
FileKey20=%LocalAppData%\SRWare Iron\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey21=%ProgramFiles%\Google\Chrome\Application|debug.log
FileKey22=%LocalAppData%\Torch\Application|debug.log
FileKey23=%LocalAppData%\Torch\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey24=%LocalAppData%\SuperBird\Application|debug.log
FileKey25=%LocalAppData%\SuperBird\User Data\*|*LOG.*;Log;*.log|RECURSE

    - Added Detectfile 2, FileKeys 24 and 25

[MalwareBytes Anti Malware More*]
LangSecRef=3024
Detect1=HKCU\Software\Malwarebytes' Anti-Malware
Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

    - Added Detect2
    
[MS SQL Server*]
LangSecRef=3021
Detect1=HKCU\Software\Microsoft\Microsoft SQL Server
Detect2=HKLM\Software\Microsoft\Microsoft SQL Server
Default=False
FileKey1=%ProgramFiles%\Microsoft SQL Server\*\Setup Bootstrap\LOG|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\FileMRUList
RegKey2=HKCU\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\ProjectMRUList
RegKey3=HKCU\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\FileMRUList
RegKey4=HKCU\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\ProjectMRUList
RegKey5=HKCU\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\FileMRUList
RegKey6=HKCU\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\ProjectMRUList
RegKey7=HKCU\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\ProjectMRUList
RegKey8=HKCU\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\FileMRUList
RegKey9=HKLM\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\FileMRUList
RegKey10=HKLM\Software\Microsoft\Microsoft SQL Server\80\Tools\Shell\ProjectMRUList
RegKey11=HKLM\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\FileMRUList
RegKey12=HKLM\Software\Microsoft\Microsoft SQL Server\90\Tools\Shell\ProjectMRUList
RegKey13=HKLM\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\FileMRUList
RegKey14=HKLM\Software\Microsoft\Microsoft SQL Server\100\Tools\Shell\ProjectMRUList
RegKey15=HKLM\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\FileMRUList
RegKey16=HKLM\Software\Microsoft\Microsoft SQL Server\110\Tools\Shell\ProjectMRUList

    - Added Detect2

[Revo Uninstaller Backups*]
LangSecRef=3024
DetectFile=%LocalAppData%\VS Revo group
Default=False
FileKey1=%LocalAppData%\VS Revo Group\Revo Uninstaller Free\BackupsData|*.*|RECURSE
FileKey2=%LocalAppData%\VS Revo Group\Revo Uninstaller Free\RegBackup\Last|*.*
FileKey3=%LocalAppData%\VS Revo Group\Revo Uninstaller Pro\BackupsData|*.*|RECURSE
FileKey4=%LocalAppData%\VS Revo Group\Revo Uninstaller Pro\RegBackup\Last|*.*
FileKey5=%ProgramFiles%\VS Revo Group\Revo Uninstaller Pro|*.bak
FileKey6=%ProgramFiles%\VS Revo Group\Revo Uninstaller Pro|rupilogs.rupldb

    - Added FileKeys5 and 6
    
[Rkill*]
LangSecRef=3024
DetectFile1=%UserProfile%\Desktop\Rkill
DetectFile2=%UserProfile%\Desktop\Rkill.txt
Default=False
Warning=This will delete your Rkill Log, make sure you've reviewed it first.
FileKey1=%UserProfile%\Desktop\Rkill|*.*|REMOVESELF
FileKey2=%UserProfile%\Desktop|*rkill*.*

    - Added DetectFile2
    
[Skype Messages*]
LangSecRef=3022
Warning=This will delete your chat message history!
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\*\chatsync|*.*|RECURSE
FileKey2=%AppData%\Skype|offline-storage.data;dc.db|RECURSE
 
    - Renamed from Skype ChatSync
    - Added Warning
    - Added FileKey2
    
[Skype More*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype|*.lck;*.lock;cookies.dat|RECURSE
FileKey2=%AppData%\Skype\*\*cache|*.*|RECURSE

    - Improved FileKey1
    - Added FileKey2
    
[Skype Temporary Files*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\DbTemp|*.*|RECURSE
FileKey2=%AppData%\Skype|*.tmp|RECURSE

    - Renamed
    - Added FileKey2
    
[StarMoney*]
LangSecRef=3021
DetectFile1=%CommonAppData%\StarMoney 8.0\
DetectFile2=%CommonAppData%\StarMoney 9.0\
Default=False
FileKey1=%CommonAppData%\StarMoney *|*.log|RECURSE

    -  Renamed
    -  Added DetectFile2
    - Tweaked FileKey1
    
[Steam Installers*]
Section=Games
Detect=HKCU\Software\Valve\Steam
Warning=Only run this entry AFTER you have launched all of your steam games at least once, as they will not be able to properly load for the first time without these files. After the first launch, however, these files become useless.
Default=False
FileKey1=%ProgramFiles%\Steam\Steamapps\common|*.msu;bitmap2substance_installer.exe;perforce*.exe;p4vinst*.exe;EasyAntiCheat_Setup*.*;xliveredist*.msi;mcpp*.*;UnSetup.exe;firewallinstallhelper.dll;gameuxinstallhelper.dll;eadm-installer.exe;wmpappcompat.exe;umdf.exe;Microsoft .NET Framework*.*;NDP*.exe;WMFDist*.exe;Social Club*Setup.exe;PhysX*.msi;PhysX*.exe;*d3dx11*.*;setup_BattlEyeARMA2*.exe;prompt.bat;GDFInstall.exe;DSInstaller.exe;directx_jun2010_redist.exe;Windows*-KB*.exe;cmp.bat;AMD_DCOptSetup.exe;PVRTexTool.exe;wmp11-windowsxp-x86-enu.exe;*.vdk;RGB9RAST*.msi;WIC*.exe;XPSEPC*.exe;msxml6.msi;AdbeRdr*.*;*inst*.vdf;UE3Redist*.exe;*.cab;*.msp;ac3filter*.exe;wmv*VCMsetup.exe;vc_red.*;gfwlivesetup.exe;GamesExplorerIntegrationTool.exe;install.ini;globdata.ini;vc*redist*.*;install.exe;install.res.*.dll;eula.*.*;DSETUP.DLL;oalinst.exe;DXSETUP.EXE;dsetup32.dll;D3D*Install*.*;dxwebsetup.exe;xnafx*.msi;WindowsInstaller*.exe;amdcpusetup.exe;locdata.*.ini;setupres.*.dll;setup.exe;wapres.*.dll;*NetFx*.*|RECURSE

    - Imrpoved FileKey1
    
[Ubisoft Game Launcher Cache*]
Section=Games
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\http*|*.*|RECURSE
FileKey2=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Cache\assets|*.*

    - Tweaked FileKey1
    - Added FileKey2
    
[Ubisoft Game Launcher Logs*]
Section=Games
DetectFile=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher
Default=False
FileKey1=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher\Logs|*.*
FileKey2=%ProgramFiles%\Ubisoft\Ubisoft Game Launcher|*.log

    - Added FileKey2
    
[VSO Batcher*]
LangSecRef=3023
Detect=HKCU\Software\VSO\VSO Batcher
Default=False
RegKey1=HKCU\Software\VSO\VSO Batcher\1|VideoFilesLastFlder
FileKey1=%AppData%\Vso\VSO Batcher\1|*.*|RECURSE

    - Shifted FileKeys2 and 3 into other entries
    
[VSO Media Player 1*]
LangSecRef=3023
Detect=HKCU\Software\VSO\VSO Media Player\1
Default=False
RegKey1=HKCU\Software\VSO\VSO Media Player\1\RecentlyOpenedFiles
FileKey1=%AppData%\VSO\VSO Media Player\1|autoresume.xml
FileKey2=%CommonAppData%\VSO\VSO Media Player\1\log|*.log;*.crashlist
FileKey3=%CommonAppData%\VSO\vsothumbs|*.*|RECURSE
FileKey4=%CommonAppData%\VSO|font.cache

    - Added FileKeys1,3, and 4
    
[Windows Live Mail*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows Live Mail
Default=False
Warning=This will reset the read counts, which will be recalculated when WLMail is started.
FileKey1=%LocalAppData%\Microsoft\Windows*Mail|*.log;*.jrs;*.chk;*.rss|RECURSE
FileKey2=%LocalAppData%\Microsoft\Windows*Mail\Backup|*.*|REMOVESELF
FileKey3=%LocalAppData%\Microsoft\Windows*Mail\*\Backup|*.*|REMOVESELF
FileKey4=%LocalAppData%\Microsoft\Windows*Mail\Storage Folders|*.*|REMOVESELF
FileKey5=%LocalAppData%\Microsoft\Windows*Mail\*.tmp|*.*|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows*Mail\*|*.MSMessageStore|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion

    - Added FileKeys3 through 6
    
[XnView*]
LangSecRef=3023
Detect1=HKCU\Software\XnView
Detect2=HKLM\SOFTWARE\Wow6432Node\XnView
Default=False
FileKey1=%AppData%\XnView|XnView.db;category.bak
FileKey2=%AppData%\XnView\cache|*.db
FileKey3=%ProgramFiles%\XnView|category.bak
FileKey4=%ProgramFiles%\XnView\cache|*.db

    - Added Detect2
    
------------------------------------------------------------------------------
Removed Entries:

[AppUpdater*]
LangSecRef=3024
DetectFile=%AppData%\AppUpdater
Default=False
FileKey1=%AppData%\AppUpdater|*.log

    - Duplicate

[Motherboard Monitor 5*]
LangSecRef=3024
Detect=HKCU\Software\Alexander van Kaam\MBM 5
Default=False
FileKey1=%ProgramFiles%\Motherboard Monitor 5\Log|*.*|RECURSE

    - Duplicate
    
[Adobe Photoshop Album Starter Edition Logs*]
LangSecRef=3021
Detect=HKCU\SOFTWARE\Adobe\Photoshop Album
Default=False
FileKey1=%AppData%\Adobe\Photoshop Album\*.*|Logse*.txt

    - Duplicate

[Malwarebytes Anti-Malware 2.0*]
LangSecRef=3024
Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Malware\Logs|*.*

    - Merged into MalwareBytes Anti Malware More

------------------------------------------------------------------------------

 

 

 

 

 

 Thank you.

Link to comment
Share on other sites

Revised Entry

 

[iMobie PhoneClean*]
LangSecRef=3024
Detect=HKCU\Software\Imobie\PhoneClean
Default=False
FileKey1=%AppData%\iMobie\PhoneClean\DeviceBackup\Backup|*.*|RECURSE
FileKey2=%AppData%\iMobie\PhoneClean\DeviceBackup\Restore|*.*|RECURSE
FileKey3=%AppData%\iMobie\PhoneClean\EasyLoseFiles|*.*|RECURSE
FileKey4=%AppData%\iMobie\PhoneClean\ErrorLog|*.*|RECURSE
FileKey5=%AppData%\iMobie\PhoneClean\iMobieConfig|*.*|RECURSE
ExcludeKey1=PATH|%AppData%\iMobie\PhoneClean\iMobieConfig\ConfigReg.ini

Added:
%AppData%\iMobie\PhoneClean\EasyLoseFiles|*.*|RECURSE
%AppData%\iMobie\PhoneClean\iMobieConfig|*.*|RECURSE
ExcludeKey1=PATH|%AppData%\iMobie\PhoneClean\iMobieConfig\ConfigReg.ini

Link to comment
Share on other sites

You forgot to remove:

 

[Adobe Media Cache*]

LangSecRef=3023

Detect=HKCU\Software\Adobe\Common

Default=False

FileKey1=%AppData%\Adobe\Common\Media Cache|*.*|RECURSE

FileKey2=%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE

 

http://forum.piriform.com/index.php?showtopic=32310&p=248526

Your reasoning for removing it is that it's part of Premiere Elements? Well both those locations exist on my system and I'm a Photoshop user, have never used or installed Elements, so you might want to rethink merging the media cache entry into the Elements entry.

Link to comment
Share on other sites

Media Cache isn't exclusively part of premiere, it's also part of photoshop and I think after effects

 

I think [Adobe Media Cache*] entry paths are part of Elements Organizer and Elements Organizer is part of both, Photoshop and Premiere Elements or may be After Effects. My mistake.

 

Revised Entries

 

[Adobe Premiere Elements 11*]

LangSecRef=3021

Detect=HKCU\Software\Adobe\Premiere Elements\11.0

Default=False

RegKey1=HKCU\Software\Adobe\Premiere Elements\11.0\MRUDocuments

FileKey1=%Documents%\Adobe\Premiere Elements\11.0|*.log

FileKey2=%Documents%\NewBlueFX\Logs|*.logE

FileKey3=%AppData%\Adobe\Common\Thumbnail Cache|*.*|RECURSE

 

[Adobe Premiere Elements 12*]

LangSecRef=3021

Detect=HKCU\Software\Adobe\Premiere Elements\12.0

Default=False

RegKey1=HKCU\Software\Adobe\Premiere Elements\12.0\MRUDocuments

FileKey1=%Documents%\Adobe\Premiere Elements\12.0|*.log

FileKey2=%Documents%\NewBlueFX\Logs|*.log

FileKey3=%AppData%\Adobe\Common\Thumbnail Cache|*.*|RECURSE

 

Removed as these are already in [Adobe Media Cache*] entry.

%AppData%\Adobe\Common\Media Cache|*.*|RECURSE

%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE

Link to comment
Share on other sites

[Adobe Media Cache*] "Detect" path should be corrected.

 

[Adobe Media Cache*]
LangSecRef=3023
DetectFile=%AppData%\Adobe\Common\Media Cache
Default=False
FileKey1=%AppData%\Adobe\Common\Media Cache|*.*|RECURSE
FileKey2=%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE

 

OR

[Adobe Media Cache*]
LangSecRef=3023
Detect=HKCU\Software\Adobe\Common CS6\Media Cache
Default=False
FileKey1=%AppData%\Adobe\Common\Media Cache|*.*|RECURSE
FileKey2=%AppData%\Adobe\Common\Media Cache Files|*.*|RECURSE

 

I think the first one is better.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.