Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

I thought this had been previously discussed, but yeah, MSSE only thinks it hasn't been run yet (and thus thinks it hasn't updated)

 

however I think that the remove line Might be a little broad (yet another broad one IMHO)

FileKey1=%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE

 

maybe someone (dennis?) can post the contents of the folder (uncleaned by the entry) and we can probably see what doesn't need removal

Share this post


Link to post
Share on other sites

jahjah something I whipped up in daz studio (3d art program)

Share this post


Link to post
Share on other sites

Someone emailed me to tell me the MSSE entry is harmful. Apparently it removes the definition backups folder, leading MSSE to think it needs to be updated. Thoughts?

 

Yes its deletes definition backup, but not definition itself, after cleaning with ccleaner and restart, my copy of MSSE remembers when was last update

I thought this had been previously discussed, but yeah, MSSE only thinks it hasn't been run yet (and thus thinks it hasn't updated)

 

however I think that the remove line Might be a little broad (yet another broad one IMHO)

FileKey1=%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE

 

maybe someone (dennis?) can post the contents of the folder (uncleaned by the entry) and we can probably see what doesn't need removal

 

about localcopy, after reinstalling, or updating , or something else i dont find any files in it.

 

so i find full [Microsoft Security Essentials*] entrie is pointless - at least for me

 

and remove under

 

[MS Security Client*]

LangSecRef=3025

DetectFile=%ProgramFiles%\Microsoft Security Client\msseces.exe

Default=False

FileKey1=%ProgramFiles%\Microsoft Security Client\Backup|*.*|RECURSE

FileKey2=%CommonAppData%\Microsoft\Microsoft Security Client\Support|*.log

FileKey3=%CommonAppData%\Microsoft\Microsoft Antimalware\Support|*.log

FileKey4=%CommonAppData%\Microsoft\Microsoft Antimalware\Definition Updates\Backup|*.*|RECURSE

FileKey5=%CommonAppData%\Microsoft\Microsoft Antimalware\Scans\History|*.*|RECURSE

 

cuz they are already in original winapp.ini

Share this post


Link to post
Share on other sites

Add please:

 

[uTorrent More*]

LangSecRef=3022

Detect=HKCU\Software\BitTorrent\uTorrent

Default=False

FileKey1=%AppData%\utorrent|*.log

FileKey2=%AppData%\utorrent|*.dmp

FileKey3=%AppData%\uTorrent\ie|*.tmp

FileKey4=%ProgramFiles%\uTorrent|*.tmp

Share this post


Link to post
Share on other sites

In reply to #1526 - here is my folder contents:

 

 

C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy

C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{2F86B55E-F8C4-473E-B284-B787D16DA8C2}

C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\{8B86B2F6-496F-24DB-C776-E1B5D6E7EEEE}-A0118016.exe

Edited by CSGalloway
conserving space

Share this post


Link to post
Share on other sites

@CSGalloway Thanks but (for winapp2 purposes we only need the contents of the folder I referred to.

Can you edit your post down to just =%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy

I've placed the entire thing in a spoiler tag as it's huge but if the end result is small enough feel free to change the word Spoiller to the word code (in both the opening and closing tags)

 

Though this raises a huge question:

Is it the Winapp2 entry that's causing this issue; are we sure it isn't MS Malware entry in Default CCleaner?. . . Really I'm starting to believe the issue that they are getting is that one (which is widly reported already). Since they aren't a poster here @Winapp2.ini can you contact them and have them make sure they test with ONLY your entry checked. See if it kills then check with ONLY "MS Antimalware" from default checked.

Share this post


Link to post
Share on other sites

looks like they're I'm using an old Winapp2.ini

 

Share this post


Link to post
Share on other sites

I am using Win XP Pro sp3 and ran a difference report between MSE beiong ok, running CCleaner, and MSE not being ok. It appears as an attachment

 

File compare: 04/07/12 05:10:49PM
File 1: D:\MSE_ok.txt
File 2: D:\MSE_not_ok.txt
Difference: File 1, lines 3 to 2
	    File 2, lines 3 to 3
 File 1 detail:
 File 2 detail:
  3: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Support

Difference: File 1, lines 21 to 25
	    File 2, lines 22 to 21
 File 1 detail:
  21: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Quick
  22: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource
  23: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Quick\{D8F0D524-A4F6-43B9-909A-6839C971D4CD}
  24: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{94DBA5FD-A8B1-4A42-AE87-12CA86D19F91}
  25: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Results\Resource\{16968BCD-4803-4FCB-A6E2-44A869AEB3D5}
 File 2 detail:

Difference: File 1, lines 30 to 30
	    File 2, lines 26 to 25
 File 1 detail:
  30: C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Scans\History\Service\DetectionHistory\14\9EABEE93-13A3-4A17-AE43-F94B6F162CD5
 File 2 detail:

 

Seems to have something with the Scans folder - not localcopy....?

Share this post


Link to post
Share on other sites

the "localcopy" was a misdirection caused by my incorrect version of winapp2 (see post above)

Share this post


Link to post
Share on other sites

[AIMP 3 More*]

LangSecRef=3023

DetectFile=%AppData%\AIMP3

Default=True

FileKey1=%AppData%\AIMP3|AIMP3ac.bak

FileKey2=%AppData%\AIMP3|UpdateInstaller.exe

FileKey3=%ProgramFiles%\AIMP3\!Backup|*.zip|REMOVESELF

Share this post


Link to post
Share on other sites

NEW ENTRIES:

[AdblockPlus Backups*]
LangSecRef=3026
DetectFile=%AppData%\Mozilla\Firefox\Profiles
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockplus|patterns-backup*.ini

[battlefield 3*]
LangSecRef=3021
DetectFile=%ProgramFiles%\Origin Games\Battlefield 3
Default=False
FileKey1=%ProgramFiles%\Origin Games\Battlefield 3\__Installer|InstallLog.txt

[bookmark Backups*]
LangSecRef=3026
DetectFile=%AppData%\Mozilla\Firefox\Profiles
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\bookmarkbackups|*.json

[Windows Log Files More*]
LangSecRef=3025
DetectFile=%WinDir%\Panther
Default=False
FileKey1=%WinDir%\Panther|cbs.log
FileKey2=%WinDir%\Panther|DDACLSys.log
Filekey3=%WinDir%\inf|setupapi.offline.log

Difficult to find a suitable DetectFile for AdblockPlus (Firefox addon). If anyone knows better than the above, please post.

 

MODIFIED ENTRIES:

[EA Core Logs*]
LangSecRef=3021
Detect=HKCU\Software\EA Games\EA Core
Default=False
FileKey1=%CommonAppData%\Electronic Arts\EA Core\logs|*.*
FileKey2=%CommonAppData%\EA Logs|*.*

<-Added FK2

[LogMeIn Hamatchi More*]
LangSecRef=3022
Detect=HKLM\SOFTWARE\LogMeIn, Inc.
Default=False
FileKey1=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|h2-engine.log
FileKey2=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\LogMeIn Hamachi|h2-ui.log
FileKey3=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|*.old
FileKey4=%WinDir%\System32\config\systemprofile\AppData\Local\LogMeIn Hamachi|*.bak

<-Added FK1+FK2, also there was only FileKey3 & FileKey4 entries before (should've been FK1+FK2, not FK3+FK4)

[Windows System Profile*]
LangSecRef=3025
DetectFile=%WinDir%\system32\config\systemprofile
Default=False
FileKey1=%WinDir%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files|*.*|RECURSE
FileKey2=%WinDir%\system32\config\systemprofile\AppData\Local\Temp|*.*|RECURSE
FileKey3=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies|*.*|RECURSE
FileKey4=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE
FileKey5=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files|*.*|RECURSE
FileKey6=%WinDir%\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies|*.*|RECURSE
FileKey7=%WinDir%\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE

<-Added FK5+FK6+FK7

[Windows SCM Logs*]
LangSecRef=3025
DetectFile=%WinDir%\System32\LogFiles\Scm
Default=False
FileKey1=%WinDir%\System32\LogFiles\Scm|*.*

<--Changed "%HomeDrive%\Windows" to "%WinDir%"

[Windows Live Messenger More*]
LangSecRef=3022
DetectFile=%ProgramFiles%\Windows live\messenger\msnmsgr.exe
Warning=After running this, you will not be able to uninstall Windows Live Essentials components without downloading the installer again.
Default=False
FileKey1=%LocalAppData%\Microsoft\Messenger|*.uccapilog|RECURSE
FileKey2=%LocalAppData%\Microsoft\Messenger|*.bak|RECURSE
FileKey3=%LocalAppData%\Microsoft\Messenger|*.txt|RECURSE
FileKey4=%LocalAppData%\Microsoft\Windows Live Contacts|*.log|RECURSE
FileKey5=%LocalAppData%\Microsoft\Windows Live Contacts|*.jrs|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows Live|*.log|RECURSE
FileKey7=%LocalAppData%\Microsoft\Windows Live|*.jrs|RECURSE
FileKey8=%CommonProgramFiles%\Windows Live\.cache|*.*|RECURSE
FileKey9=%LocalLowAppData%\Microsoft\Windows Live\Setup|*.*|REMOVESELF
FileKey10=%LocalAppData%\Microsoft\Windows Live|*.sqm|RECURSE
FileKey11=%LocalAppData%\Microsoft\Windows Live Contacts\*\*\*\Backup|*.*|RECURSE
FileKey12=%ProgramFiles%\Windows Live\Messenger|*.bak|RECURSE
FileKey13=%WinDir%\System32\config\systemprofile\Documents|wlidsvctrace*.txt

<-Added FK13

Share this post


Link to post
Share on other sites

MODIFIED ENTRIES:

[GradeKeeper Recent Files/Assignments*]
LangSecRef=3021
Detect=HKCU\Software\Gradekeeper
Default=False
FileKey1=%AppData%\Gradekeeper|*.*

<-Changed "%UserProfile%\AppData\Roaming" to %AppData%

[OpenDNS Updater Logs*]
LangSecRef=3021
Detect=HKCU\Software\OpenDNS Updater
Warning=You must exit OpenDNS Updater in the System Tray to clear log files
Default=False
FileKey1=%AppData%\OpenDNS Updater|*.txt

<-Changed "%UserProfile%\AppData\Roaming" to %AppData%

[X-Chat 2*]
LangSecRef=3022
DetectFile=%AppData%\X-Chat 2
Default=False
FileKey1=%AppData%\X-Chat 2\xchatlogs|*.*|REMOVESELF
FileKey2=%AppData%\X-Chat 2\scrollback|*.*|REMOVESELF

<-Changed "%UserProfile%\AppData\Roaming" to %AppData%

Share this post


Link to post
Share on other sites

New Entry

[GIMP 2.8*]
LangSecRef=3021
Default=False
DetectFile=%UserProfile%\.gimp-2.8
FileKey1=%UserProfile%\.thumbnails\normal|*.*

Share this post


Link to post
Share on other sites

Thanks for the new/modified entries guys : )

 

I'll fix up a few other entries that use %UserProfile%\AppData instead of %AppData%

Share this post


Link to post
Share on other sites

MODIFIED ENTRY:

[Juniper Networks*]
LangSecRef=3021
Detect=HKLM\Software\Juniper Networks
Detect2=HKCU\Software\Juniper Networks
DetectFile=%AppData%\Juniper Networks
Default=False
FileKey1=%AppData%\Juniper Networks|*.old|RECURSE
FileKey2=%AppData%\Juniper Networks|*.log|RECURSE
RegKey1=HKLM\Software\Juniper Networks\Default

<-Added DetectFile

Share this post


Link to post
Share on other sites

jv16 PowerTools* needs to be changed from the existing code to this new code in order to cover all Windows OS versions.

 

[jv16 PowerTools*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
FileKey1=%UserProfile%|NTUSER.DAT.bak_*
FileKey2=%UserProfile%|NTUSER.DAT.bak_*.*
FileKey4=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*
FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*.*
FileKey7=%WinDir%\system32\config|Default.bak_*
FileKey8=%WinDir%\system32\config|Default.bak_*.*
FileKey10=%WinDir%\system32\config|software.bak_*.*
FileKey12=%WinDir%\system32\config|software.bak_*
FileKey13=%WinDir%\system32\config|system.bak_*
FileKey14=%WinDir%\system32\config|system.bak_*.*
FileKey16=%WinDir%\System32\config|SAM.bak_*
FileKey17=%WinDir%\System32\config|SAM.bak_*.*
FileKey19=%WinDir%\System32\config|COMPONENTS.bak_*
FileKey20=%WinDir%\System32\config|COMPONENTS.bak_*.*
FileKey22=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*
FileKey23=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*.*
FileKey25=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*
FileKey26=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*.*

 

CHANGE TO:

[jv16 PowerTools Registry Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction.  These files are not needed once the compaction is successfully completed.  They can be safely deleted.   NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%UserProfile%|NTUSER.DAT.jv16pt_bak2
FileKey2=%UserProfile%|NTUSER.DAT.jv16pt_bak
FileKey3=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG1
FileKey4=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG2
FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak2
FileKey6=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak
FileKey7=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG1
FileKey8=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG2
FileKey9=%windir%\system32\config|Default.jv16pt_bak
FileKey10=%windir%\system32\config|Default.jv16pt_bak2
FileKey11=%windir%\system32\config|Default.jv16pt_bak.LOG1
FileKey12=%windir%\system32\config|Default.jv16pt_bak.LOG2
FileKey13=%windir%\system32\config|software.jv16pt_bak.LOG1
FileKey14=%windir%\system32\config|software.jv16pt_bak.LOG2
FileKey15=%windir%\system32\config|software.jv16pt_bak2
FileKey16=%windir%\system32\config|software.jv16pt_bak
FileKey17=%windir%\system32\config|system.jv16pt_bak2
FileKey18=%windir%\system32\config|system.jv16pt_bak
FileKey19=%windir%\system32\config|system.jv16pt_bak.LOG1
FileKey20=%windir%\system32\config|system.jv16pt_bak.LOG2
FileKey21=%windir%\System32\config|SAM.jv16pt_bak
FileKey22=%windir%\System32\config|SAM.jv16pt_bak2
FileKey23=%windir%\System32\config|SAM.jv16pt_bak.LOG1
FileKey24=%windir%\System32\config|SAM.jv16pt_bak.LOG2
FileKey25=%windir%\System32\config|COMPONENTS.jv16pt_bak
FileKey26=%windir%\System32\config|COMPONENTS.jv16pt_bak2
FileKey27=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG1
FileKey28=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG2
FileKey29=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak
FileKey30=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak2
FileKey31=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG1
FileKey32=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG2
FileKey33=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak
FileKey34=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak2
FileKey35=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG1
FileKey36=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG2

Share this post


Link to post
Share on other sites

jv16 PowerTools* needs to be changed from the existing code to this new code in order to cover all Windows OS versions.

What do you mean excactly? Which Windows versions? Why not just use wildcards eg. .LOG* instead of multiple entries .LOG1 .LOG2 etc..?

Share this post


Link to post
Share on other sites

What do you mean excactly? Which Windows versions? Why not just use wildcards eg. .LOG* instead of multiple entries .LOG1 .LOG2 etc..?

 

Ah jeez....the wildcard implementation did not registry in my brain....sorry. :( At least let's change the name as suggested and add the warning message, eh?. :rolleyes:

Share this post


Link to post
Share on other sites

After finally getting a version of jv16 PowerTools 2012 in which the registry compactor component works properly, I am able to test "jv16 PowerTools*" as included in the latest released WinApp2.ini. The wild card implementation does NOT work. In this specific compact run, it should find 15 files to clear. It finds 0 files. This is on Windows 7 SP1 x86 and x64 Professional.

 

Current non-functional code of jv16 PowerTools*

 

[jv16 PowerTools*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
FileKey1=%UserProfile%|NTUSER.DAT.bak_*
FileKey2=%UserProfile%|NTUSER.DAT.bak_*.*
FileKey4=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*
FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.bak_*.*
FileKey7=%WinDir%\system32\config|Default.bak_*
FileKey8=%WinDir%\system32\config|Default.bak_*.*
FileKey10=%WinDir%\system32\config|software.bak_*.*
FileKey12=%WinDir%\system32\config|software.bak_*
FileKey13=%WinDir%\system32\config|system.bak_*
FileKey14=%WinDir%\system32\config|system.bak_*.*
FileKey16=%WinDir%\System32\config|SAM.bak_*
FileKey17=%WinDir%\System32\config|SAM.bak_*.*
FileKey19=%WinDir%\System32\config|COMPONENTS.bak_*
FileKey20=%WinDir%\System32\config|COMPONENTS.bak_*.*
FileKey22=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*
FileKey23=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.bak_*.*
FileKey25=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*
FileKey26=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.bak_*.*

 

Code that works and finds the 15 files to clear.

 

[jv16 PowerTools Registry Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction.  These files are not needed once the compaction is successfully completed.  They can be safely deleted.   NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%UserProfile%|NTUSER.DAT.jv16pt_bak2
FileKey2=%UserProfile%|NTUSER.DAT.jv16pt_bak
FileKey3=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG1
FileKey4=%UserProfile%|NTUSER.DAT.jv16pt_bak.LOG2
FileKey5=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak2
FileKey6=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak
FileKey7=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG1
FileKey8=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt_bak.LOG2
FileKey9=%windir%\system32\config|Default.jv16pt_bak
FileKey10=%windir%\system32\config|Default.jv16pt_bak2
FileKey11=%windir%\system32\config|Default.jv16pt_bak.LOG1
FileKey12=%windir%\system32\config|Default.jv16pt_bak.LOG2
FileKey13=%windir%\system32\config|software.jv16pt_bak.LOG1
FileKey14=%windir%\system32\config|software.jv16pt_bak.LOG2
FileKey15=%windir%\system32\config|software.jv16pt_bak2
FileKey16=%windir%\system32\config|software.jv16pt_bak
FileKey17=%windir%\system32\config|system.jv16pt_bak2
FileKey18=%windir%\system32\config|system.jv16pt_bak
FileKey19=%windir%\system32\config|system.jv16pt_bak.LOG1
FileKey20=%windir%\system32\config|system.jv16pt_bak.LOG2
FileKey21=%windir%\System32\config|SAM.jv16pt_bak
FileKey22=%windir%\System32\config|SAM.jv16pt_bak2
FileKey23=%windir%\System32\config|SAM.jv16pt_bak.LOG1
FileKey24=%windir%\System32\config|SAM.jv16pt_bak.LOG2
FileKey25=%windir%\System32\config|COMPONENTS.jv16pt_bak
FileKey26=%windir%\System32\config|COMPONENTS.jv16pt_bak2
FileKey27=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG1
FileKey28=%windir%\System32\config|COMPONENTS.jv16pt_bak.LOG2
FileKey29=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak
FileKey30=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak2
FileKey31=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG1
FileKey32=%windir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt_bak.LOG2
FileKey33=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak
FileKey34=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak2
FileKey35=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG1
FileKey36=%windir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt_bak.LOG2

Share this post


Link to post
Share on other sites

How about this, should work:

[jv16 PowerTools Registry Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction.  These files are not needed once the compaction is successfully completed.  They can be safely deleted.   NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%UserProfile%|NTUSER.DAT.jv16pt*
FileKey2=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt*
FileKey3=%WinDir%\system32\config|Default.jv16pt*
FileKey4=%WinDir%\system32\config|software.jv16pt*
FileKey5=%WinDir%\system32\config|system.jv16pt*
FileKey6=%WinDir%\System32\config|SAM.jv16pt*
FileKey7=%WinDir%\System32\config|COMPONENTS.jv16pt*
FileKey8=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*
FileKey9=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt*

Share this post


Link to post
Share on other sites

MODIFIED ENTRY:

[star Wars: The Old Republic*]
LangSecRef=3021
DetectFile1=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic
Default=False
FileKey1=%Documents%|Install STAR WARS The Old Republic.log
FileKey2=%LocalAppData%\SWTOR\CrashDump\swtor|*.*
FileKey3=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\betatest\retailclient
\Temp|*.log
FileKey4=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\logs|*.log
FileKey5=%ProgramFiles%\Electronic Arts\BioWare\Star Wars-The Old Republic\swtor\retailclient
\swtor\logs|*.log
FileKey6=%Documents%|Uninstall STAR WARS The Old Republic.log
FileKey7=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\swtor\retailclient\swtor\logs|
*.*
FileKey8=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\logs|*.*
FileKey9=%ProgramFiles%\Origin Games\Star Wars - The Old Republic\__Installer|InstallLog.txt

<- Added FK7, FK8, FK9.

Share this post


Link to post
Share on other sites

How about this, should work:

[jv16 PowerTools Registry Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction.  These files are not needed once the compaction is successfully completed.  They can be safely deleted.   NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%UserProfile%|NTUSER.DAT.jv16pt*
FileKey2=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt*
FileKey3=%WinDir%\system32\config|Default.jv16pt*
FileKey4=%WinDir%\system32\config|software.jv16pt*
FileKey5=%WinDir%\system32\config|system.jv16pt*
FileKey6=%WinDir%\System32\config|SAM.jv16pt*
FileKey7=%WinDir%\System32\config|COMPONENTS.jv16pt*
FileKey8=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*
FileKey9=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt*

 

Yes, the above code does work. Thanks. :)

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...