Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

I'm super tired right now but this entry is in winapp2.ini at the moment

[Windows Service Control Manager Logs*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
FileKey1=%WinDir%\system32\LogFiles\Scm\|SCM.EVM*|RECURSE

and it looks pretty similar

 

My entry was better because I excluded the files that are locked. But now it does not matter because I think Microsoft has removed Scm logging from Windows in the latest update.

Share this post


Link to post
Share on other sites
Please correct the LangSecRef (from 3021 to 3023) of the programs listed below.

 

[Adobe Photoshop Elements 11*]

[Adobe Photoshop Elements 12 More*]

[Adobe Photoshop Elements 13*]

[Adobe Photoshop Elements Sync Agent*]

[Adobe Premiere Elements 11*]

[Adobe Premiere Elements 12 More*]

[Adobe Premiere Elements 13*]

[Adobe Premiere Elements 9.0*]

[Adobe Premiere Pro CC More*]

[PhotoZoom Pro 6*]

Share this post


Link to post
Share on other sites

Like I said before, the [iPhone Temporary Files*] should be removed. If we really want to keep it, then I think we should merge it with [iTunes Temp Files*].

 

[iTunes Temp Files*]
LangSecRef=3023
Detect=HKLM\Software\Apple Computer, Inc.\iTunes
Default=False
FileKey1=%Music%\iTunes|*.tmp|RECURSE
FileKey2=%CommonAppData%\Apple Computer\iTunes\iPhone Temporary Files|*.*|RECURSE
FileKey3=%LocalAppData%\VirtualStore\ProgramData\Apple Computer\iTunes\iPhone Temporary Files|*.*|RECURSE

Share this post


Link to post
Share on other sites
Revised Entry

Changed the Detect

 

[Registry First Aid 9*]

LangSecRef=3024

Detect=HKCU\Software\KsL Software\RFA\9.0

Default=False

FileKey1=%ProgramFiles%\RFA 9|*.diz;*.url

FileKey2=%LocalAppData%\VirtualStore\Program Files*\RFA 9|*.diz;*.url

 

New Entry

 

[Registry First Aid 10*]

LangSecRef=3024

Detect=HKCU\Software\KsL Software\RFA\10.0

Default=False

FileKey1=%ProgramFiles%\RFA 10|*.diz;*.url

FileKey2=%LocalAppData%\VirtualStore\Program Files*\RFA 10|*.diz;*.url

Share this post


Link to post
Share on other sites

I searched the %systemdrive% for both TMP and BAK files and would like suitable entries to be made - even if merged with the existing winapp2.ini ones....

2011-02-11 12:00:42.742           8,192 C:\BOOTSECT.BAK
2014-12-21 01:37:29.552             544 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$IRAYQ8C.TMP
2014-12-20 23:58:12.675          16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RDTQ5QN.TMP
2014-12-21 02:15:29.130          16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RZ472UH.TMP
2014-09-28 17:06:26.579          64,306 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\Preferences.bak
2014-12-11 23:29:29.989          28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83D6.tmp
2014-12-11 23:29:30.005               0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E8.tmp
2014-12-11 23:29:30.006               0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E9.tmp
2014-12-11 23:29:30.029          28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83EA.tmp
2014-12-11 23:29:30.046          28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\841A.tmp
2014-12-11 23:28:38.734          28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BB90.tmp
2014-12-11 23:28:38.746               0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA2.tmp
2014-12-11 23:28:38.748               0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA3.tmp
2014-03-07 13:58:02.929          46,862 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak
2014-04-19 14:13:25.654          28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp
2014-04-19 14:03:10.483               0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp
2014-04-19 14:03:10.485               0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp
2014-04-19 14:03:10.487               0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp
2014-04-19 14:03:10.501          28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp
2014-02-22 15:56:15.099         235,550 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp
2014-04-24 19:32:45.519         235,566 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp
2014-01-03 16:23:32.114         235,478 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp
2011-03-24 21:08:09.410         217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp
2011-03-24 21:08:09.425         131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp
2011-03-24 21:08:09.441         217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp
2011-03-24 21:08:09.441         217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp
2011-03-24 21:08:09.472         131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp
2011-03-24 21:08:09.488         131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp
2011-03-24 21:08:09.347         216,229 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp
2011-03-24 21:08:09.394         159,852 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp
2014-12-20 07:13:46.564      33,554,583 C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak
2002-10-17 20:23:16.000           8,200 C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK
2014-09-28 17:06:26.579          64,306 C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\Preferences.bak
2014-12-20 22:11:45.504         524,288 C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp
2014-12-20 22:12:09.787               0 C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp
2014-10-31 19:29:25.067           5,540 C:\Users\Galloway\AppData\Roaming\Mozilla\Firefox\Profiles\y73yivh7.default-1408590376909\extensions.json.bak
2014-12-09 13:36:34.300           1,232 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\GeneralSettings.bak
2014-12-11 23:38:56.063           1,081 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\LiveUpdate.bak
2014-12-09 13:36:34.341           1,045 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RegistryCleaner.bak
2014-12-11 23:38:58.064             989 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RescueCenter.bak
2014-12-04 23:56:57.800           2,089 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\Statistics\REGISTRY_CLEANER.bak
2014-09-07 13:33:52.768               0 C:\Users\Galloway\Music\91F61065-CF82.tmp
2013-12-21 04:03:25.877               0 C:\Users\Public\Music\91F61065-CF82.tmp
2014-11-22 13:49:47.146               0 C:\Windows\System32\drivers\etc\hosts_PTBackup.bak
2014-11-22 13:33:54.594             837 C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak
2005-07-02 17:57:28.000           4,204 C:\Z_UserFiles\Unkn\BAK_000\settings.bak

Thank you!

Share this post


Link to post
Share on other sites

My entry was better because I excluded the files that are locked. But now it does not matter because I think Microsoft has removed Scm logging from Windows in the latest update.

 

I am seeing newly created log entries in the Scm folder with Windows 8.1.1 x64 Professional with all the latest hotfixes for Windows 8.1 :blink:

Share this post


Link to post
Share on other sites

Install November 2014 update rollup for Windows and then check.

 

http://support.microsoft.com/kb/3000850

 

I have had that rollup installed since it was first issued...on all my Windows 8.1.1 x64 Pro machines.  All MS updates are current on my machines...Windows 8.1.1 x64 and Windows 10 x64 Technical Preview.

 

On a system startup, I get 131 log files entered into the Scm folder.

Share this post


Link to post
Share on other sites

Suggestion

 

replace [search Everything*] and [Everything (History)*] with [Everything (History and Log)*]

i don't like the name..people might think it will delete all history and logs inside windows..any suggestion?

[Everything Search Engine*] ?

[Everything (History and Log)*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\Everything
DetectFile2=%AppData%\Everything
Default=False
FileKey1=%AppData%\Everything|*.csv
FileKey2=%AppData%\Everything|*.txt
FileKey3=%ProgramFiles%\Everything|*.csv
FileKey4=%ProgramFiles%\Everything|*.txt
FileKey5=%LocalAppData%\VirtualStore\Program Files*\Everything|*.txt

ESET NOD32 Antivirus*]  combine with [ESET Smart Security*]
 

 

remove beta from entry name

[Malwarebytes Anti-Exploit*]
LangSecRef=3024
DetectFile=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit
Default=False
FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit|*.log
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes Anti-Exploit|*.log

combine [sUMo Database*] with [sUMo*]

[SUMo Database*]
LangSecRef=3024
Detect=HKCU\Software\KC Softwares\SUMo
Default=False
FileKey1=%AppData%\KC Softwares\SUMo|db.sumo
FileKey2=%AppData%\KC Softwares\SUMo|db.bak

need to exclude from Logs* because Adguard extension need to be reinstall to make it work again

------------------------------------------------------------------------------------------
Google Chrome - Logs*    13 KB    14 files    
------------------------------------------------------------------------------------------
C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\lib\pages\log.js    2 KB
C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\lib\utils\log.js    1 KB
C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\pages\log.html    2 KB

change LangSecRef=3029 to LangSecRef=3021

[DataTron 7*]
LangSecRef=3021
DetectFile=%ProgramFiles%\DataTron7
Default=False
FileKey1=%ProgramFiles%\DataTron7|*.GID;*.BAK
FileKey2=%LocalAppData%\VirtualStore\Program Files*\DataTron7|*.GID;*.BAK

Share this post


Link to post
Share on other sites

[Windows Live OneCare*]
LangSecRef=3022
Detect=HKLM\Software\Microsoft\OneCare Protection
FileKey1=%LocalAppData%\Microsoft\Windows Live OneCare Saftey Scanner|*.sqm|RECURSE

 

I know I recommended this in the past, but is it really worth keeping Windows Live OneCare in here? The program was a paid for app that has been discontinued for a long time.

 

Also, I think we can remove Windows ME entry, as well, since CCleaner hasn't supported Windows ME for many years now (did it ever?).

 

[Windows ME*]
LangSecRef=3025
DetectFile=%WinDir%\WINFILE.EXE
FileKey1=%SystemDrive%|SCANDISK.LOG
FileKey2=%WinDir%|*.tmp
FileKey3=%WinDir%\Application Data|dw.log
FileKey4=%WinDir%\All Users\Application Data\Spybot - Search & Destroy\Logs|*.*
FileKey5=%WinDir%\APPLOG|*.LGC
FileKey6=%WinDir%\Windows Update Setup Files|*.*

Share this post


Link to post
Share on other sites

Also, I think we can remove Windows ME entry, as well, since CCleaner hasn't supported Windows ME for many years now (did it ever?).

 

It did support it although I can't remember if winapp2.ini support was around back then. I remember using CCleaner on Win98, in particular v2.36.1233 (the last version that supported Win98).

Share this post


Link to post
Share on other sites

Revised Entries

Changed the 'Detect' from HKCU to HKLM

 

Adobe Reader XI creates a registry key (HKEY_CURRENT_USER\Software\Adobe\Adobe Acrobat\11.0) and CCleaner detects Acrobat even though there is no Acrobat installed on this system. I also changed the name from [Adobe Reader 11.0 More*] to [Adobe Reader XI More*]

 

Can you please ask Piriform to correct [Adobe Acrobat XI] and [Adobe Reader 11.0] in CCleaner?

 

[Adobe Acrobat XI More*]
LangSecRef=3021
Detect=HKLM\Software\Adobe\Adobe Acrobat\11.0
Default=False
FileKey1=%LocalAppData%\Adobe\Acrobat|*.idx|RECURSE
FileKey2=%LocalAppData%\Adobe\Acrobat\11.0|UserCache.bin
FileKey3=%LocalAppData%\Adobe\Acrobat\11.0\Cache|*.*
 
[Adobe Reader XI More*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Adobe\Acrobat Reader\11.0
Default=False
RegKey1=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionFromPDF
RegKey2=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionToPDF
RegKey3=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cDockables
RegKey4=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cToolbars
RegKey5=HKCU\Software\Adobe\Acrobat Reader\11.0\RememberedViews\cNoCategoryFiles
RegKey6=HKCU\Software\Adobe\Adobe Synchronizer\11.0

Share this post


Link to post
Share on other sites

It did support it although I can't remember if winapp2.ini support was around back then. I remember using CCleaner on Win98, in particular v2.36.1233 (the last version that supported Win98).

The first version of CCleaner with winapp2.ini support was 2.06.567 released March 25, 2008! (You'll note that I registered my name on the forums a bit more than two months later ;) )

Share this post


Link to post
Share on other sites
Revised Entries

Changed entries names. Current names look unprofessional.

 

[Adblock Plus*]

LangSecRef=3026

SpecialDetect=DET_MOZILLA

Default=False

FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockplus|patterns-backup*.ini;*.tmp

 

[Adblock Plus for IE*]

LangSecRef=3022

Detect=HKLM\Software\Adblock Plus for IE

DetectFile=%LocalAppData%\Adblock Plus for IE

Default=False

FileKey1=%LocalAppData%\Adblock Plus for IE|patterns-backup*.ini

FileKey2=%LocalLowAppData%\Adblock Plus for IE|patterns-backup*.ini

FileKey3=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Adblock Plus for IE|patterns-backup*.ini

Share this post


Link to post
Share on other sites
Revised Entry

Now it removes leftover empty folders of the installers.

 

[Apple Installer Cache*]

LangSecRef=3023

Detect=HKCU\Software\Apple Computer, Inc.

Default=False

Warning=You have to reinstall iTunes after adding a new windows user account.

FileKey1=%CommonAppData%\Apple\Installer Cache|*.*|REMOVESELF

FileKey2=%CommonAppData%\Apple Computer\Installer Cache|*.*|REMOVESELF

Share this post


Link to post
Share on other sites
I think [Adobe Updater ARM*] & [Adobe Updater Logs*] should be merged into one entry as both are part of the Adobe Updater service.

 

Added: %ProgramFiles%\Common Files\Adobe\Installers|*.*|RECURSE

This location holds Adobe patch logs.


 

[Adobe Updater*]

LangSecRef=3021

Detect=HKCU\Software\Adobe

Default=False

FileKey1=%ProgramFiles%\Common Files\Adobe\Installers|*.*|RECURSE

FileKey2=%CommonAppData%\Adobe\ARM|*.*|RECURSE

FileKey3=%LocalAppData%\Adobe\AAMUpdater|*.Log|RECURSE

FileKey4=%LocalAppData%\Adobe\Updater*|*.log|RECURSE

FileKey5=%LocalAppData%\Adobe\Acrobat\*\Updater|*.log

FileKey6=%AppData%\Adobe\LogTransport*\Logs|ulog_*.tmp

FileKey7=%AppData%\Adobe\Acrobat\*\Updater|*.log

Share this post


Link to post
Share on other sites

Revised Entry

Changed LangSecRef from 3021 to 3023

 
[CyberLink Install Temps*]
LangSecRef=3023
DetectFile=%CommonAppData%\install_clap
Default=False
FileKey1=%CommonAppData%\install_clap|*.*|REMOVESELF

Share this post


Link to post
Share on other sites

Microsoft Deployment Toolkit

 

Is a Deployment Solution (The little Brother of the System Center Config Manager) and Downloads some files (Setup files) to its Installation Directory.

[Microsoft Deployment Toolkit*]
LangSecRef=3024
DetectFile="%ProgramFiles%\Microsoft Deployment Toolkit"
Default=False
FileKey1=%ProgramFiles%\Microsoft Deployment Toolkit\Downloads|*.*|RECURSE
Warning=To Get a new Component list, check for Updates in the Management Console!

Dr. Kaiser - DKS

 

DKS can protect System on Hardware area ... (PCI Cards can Freez a state of the System) and reset it on System Boot. Some Log files will also written.

It is used on Schools. Also Software Testers are using this Technicals to test Software :).

[Dr. Kaiser - (DKS) PC Wächter*]
LangSecRef=3024
DetectFile=%windir%\DKSService.exe
Default=False
FileKey1=%windir%|DksSystem.log

Microsoft Message Analyzer

 

- Logs

- Traces

- App configuration - otherwise we get an error when we click on recent Traces!

[Microsoft Message Analyzer*]
LangSecRef=3024
DetectFile=%LocalAppData%\Microsoft\MessageAnalyzer
Default=False
FileKey1=%Documents%\MessageAnalyzer\Traces|*.*|RECURSE
FileKey2=%LocalAppData%\Microsoft\MessageAnalyzer|*.log
FileKey3=%AppData%\Microsoft\MessageAnalyzer|*.cfg
Warning=This will remove Traces, Logs and remove the Configuration!

OpenRA

 

Please Replace "[OpenRA*]" with this ... Logs is atm useless they will created each time when you run the Game :/

Replays makes a little bit more sense :)

[OpenRA*]
Section=Games
DetectFile=%Documents%\OpenRA
Default=False
FileKey1=%Documents%\OpenRA\Replays|*.*|RECURSE
FileKey2=%Documents%\OpenRA\Logs|*.*
Warning=This will also remove your Replays!

Share this post


Link to post
Share on other sites
Revised Entry
Now it removes leftover empty folders of the installers.
 
[Apple Installer Cache*]
LangSecRef=3023
Detect=HKCU\Software\Apple Computer, Inc.
Default=False
Warning=You have to reinstall iTunes after adding a new windows user account.
FileKey1=%CommonAppData%\Apple\Installer Cache|*.*|REMOVESELF
FileKey2=%CommonAppData%\Apple Computer\Installer Cache|*.*|REMOVESELF

 

 

Please do not modify this entry! If you delete the (latest) folders also, QuickTime (and probably iTunes) recognizes this and wants to start a repair installation. Last post about that issue: #3556.

 

@Winapp2.ini: Please ignore my post. REMOVESELF works flawless now.

Edited by APMichael

Share this post


Link to post
Share on other sites

Please do not modify this entry! If you delete the (latest) folders also, QuickTime (and probably iTunes) recognizes this and wants to start a repair installation. Last post about that issue: #3556.

I have the latest versions of QuickTime and iTunes on my system (Win 8.1 64-bit). I am not seeing any issue after removing the left over empty installer folders.

Share this post


Link to post
Share on other sites

LaunchCC.bat

 

Link Click here for LaunchCC.bat in "Advanced Usage and Trimming" (spoiler) in OP #1 presents as Error 403

- same result using mozilla browser (Palemoon) and MS IE

- and at http://www.winapp2.com/downloads.html

 

 

 

 

Forbidden

You don't have permission to access /LaunchCC.bat on this server.

Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.

I am logged into Piriform forum ?

 

---------------

Have been using CCleaner for years but only discovered Winapp2.ini to day :)

Share this post


Link to post
Share on other sites

New Entries

 

[Corel PaintShop Pro X7*]
LangSecRef=3023
Detect=HKCU\Software\Corel\PaintShop Pro\X7
Default=False
FileKey1=%LocalAppData%\Corel PaintShop Pro\17.0\Cache|*.*
FileKey2=%LocalAppData%\Corel PaintShop Pro\17.0\Database|*.db
RegKey1=HKCU\Software\Corel\PaintShop Pro\X7\CoreMemoryManager\0
 
[Corel PaintShop Pro X7 (AutoPreserve)*]
LangSecRef=3023
Detect=HKCU\Software\Corel\PaintShop Pro\X7
Default=False
FileKey1=%Pictures%\Corel Auto-Preserve|*.*
 
[Corel VideoStudio Pro X7*]
LangSecRef=3023
Detect=HKCU\Software\Ulead Systems\Corel VideoStudio Pro\17.0
Default=False
FileKey1=%Documents%\Corel VideoStudio Pro\17.0\AudioTmp|*.*
FileKey2=%Documents%\Corel VideoStudio Pro\17.0\SmartProxy|*.*
RegKey1=HKCU\Software\Ulead Systems\Corel VideoStudio Pro\17.0\HerRFL

Share this post


Link to post
Share on other sites
I think we should change these entries names.

 

From:

[MS Word 2007/10/13 Document Building Blocks*]

 

To:

[MS Document Building Blocks*]

LangSecRef=3021

DetectFile=%AppData%\Microsoft\Document Building Blocks

Default=False

FileKey1=%AppData%\Microsoft\Document Building Blocks|*.*|RECURSE

 

From:

[Norton Security & Norton Internet Security 2012/13/14 Dumps*]

 

To:

[Norton Dumps*]

LangSecRef=3024

DetectFile=%CommonAppData%\Norton\LocalDumps

Default=False

FileKey1=%CommonAppData%\Norton\LocalDumps|*.dmp

FileKey2=%LocalAppData%\VirtualStore\ProgramData\Norton\LocalDumps|*.dmp

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×