MoscaDotTo / Winapp2

A database of extended cleaning routines for popular Windows PC based maintenance software.
Creative Commons Attribution Share Alike 4.0 International
783 stars 87 forks source link

New and updated entries for winapp2.ini #725

Closed aquila-XP closed 4 years ago

aquila-XP commented 4 years ago

[A-PDF PDF Content Splitter *] LangSecRef=3021 Detect=HKCU\Software\A-PDF\PDFContentSplitter RegKey1=HKCU\Software\A-PDF\PDFContentSplitter\Setting|hloadpdfpath RegKey2=HKCU\Software\A-PDF\PDFContentSplitter\Setting|hSaveallpdfpath RegKey3=HKCU\Software\A-PDF\PDFContentSplitter\Setting|LastRulename

[A-PDF Watermark *] LangSecRef=3021 Detect=HKCU\Software\A-PDF\Watermark RegKey1=HKCU\Software\A-PDF\Watermark\Setting|hdIndir RegKey2=HKCU\Software\A-PDF\Watermark\Setting|hdoutDir RegKey3=HKCU\Software\A-PDF\Watermark\Setting|hloadpdfpath RegKey4=HKCU\Software\A-PDF\Watermark\Setting|hSaveallpdfpath RegKey5=HKCU\Software\A-PDF\Watermark\Setting|ptlastprinter

[Ableton Live *] ... FileKey4=%CommonAppData%\Ableton\*\Redist|vc*redist*.exe FileKey5=%ProgramFiles%\Ableton\*\Redist|vc*redist*.exe

[Ace Utilities *] ... FileKey1=%LocalAppData%\Acelogix\Ace Utilities\Backups|*.reg

[Adobe Acrobat DC *] ... RegKey11=HKCU\SOFTWARE\Adobe\Adobe Acrobat\DC\AVConnector\cIconCache

[Advanced Registry Doctor *] LangSecRef=3021 Detect=HKLM\Software\Elcor Software\Advanced Registry Doctor DetectFile=%ProgramFiles%\Advanced Registry Doctor\AdvRegDocPro.exe FileKey1=%ProgramFiles%\Advanced Registry Doctor|*.log;*.tmp FileKey2=%ProgramFiles%\Advanced Registry Doctor\Undo|history_*.dat

[Adware-Removal-Tool *] LangSecRef=3024 DetectFile=%ProgramFiles%\Adware-Removal-Tool\ARTP*.exe FileKey1=%ProgramFiles%\Adware-Removal-Tool\Quarantine|*.*|RECURSE FileKey2=%ProgramFiles%\Adware-Removal-Tool\Reports|*.txt FileKey3=%ProgramFiles%\Adware-Removal-Tool\scanlogs|*.txt

[Aimersoft Video Editor *] LangSecRef=3023 DetectFile1=%ProgramFiles%\Aimersoft\Video Editor\VideoEditor.exe DetectFile2=%CommonProgramFiles%\Aimersoft\Aimersoft Helper Compact\ASHelper.exe DetectFile3=%ProgramFiles%\Video Editor\Aimersoft Helper Compact.exe FileKey1=%ProgramFiles%\Aimersoft\Video Editor\Log|*.txt FileKey2=%CommonProgramFiles%\Aimersoft\Aimersoft Helper Compact\Log|*.*|RECURSE FileKey3=%CommonProgramFiles%\Aimersoft\Aimersoft Helper Compact\Temp|*.exe FileKey4=%ProgramFiles%\Video Editor\Log|*.log

[Aomei Dynamic Disk Manager *] LangSecRef=3024 DetectFile=%ProgramFiles%\AOMEI DDM Pro Edition\DDM.exe FileKey1=%ProgramFiles%\AOMEI DDM Pro Edition\log|*.*

[Atomic Cleaner 3] LangSecRef=3024 DetectFile=%ProgramFiles%\Atomicware\AtomicCleaner3\atomiccleaner3.exe FileKey1=%LocalAppData%\Atomicware\AtomicCleaner3|*.log;*.tmp;info_messages.txt FileKey2=%LocalAppData%\Atomicware\AtomicCleaner3\logs|*.txt

[Auslogics Duplicate File Finder *] LangSecRef=3024 Detect=HKLM\Software\Wow6432Node\Auslogics\Duplicate File Finder\7.x RegKey1=HKLM\Software\Wow6432Node\Auslogics\Duplicate File Finder\7.x\Settings|DuplicateFileFinder.CheckDrives

[Avast *] ... DetectFile=%ProgramFiles%\Alwil Software\Avast* FileKey7=%CommonAppData%\Alwil Software\Avast*\log|*.log;AshWebSv.ws.ori FileKey8=%CommonAppData%\Alwil Software\Avast*\report|*.txt FileKey9=%ProgramFiles%\Alwil Software\Avast*\Setup|*.log FileKey10=%ProgramFiles%\AVAST Software\Avast|*.tmp

[AVS Audio Editor *] LangSecRef=3023 DetectFile=%AppData%\AVS4YOU\AVSAudioEditor FileKey1=%AppData%\AVS4YOU\AVSAudioEditor|Recent*.txt

[Corel Wordperfect Presentations *] LangSecRef=3021 Detect=HKCU\Software\Corel\User Assistant RegKey1=HKCU\Software\Corel\User Assistant\11\Recent Work\Presentations RegKey2=HKCU\Software\Corel\User Assistant\12\Recent Work\Presentations RegKey3=HKCU\Software\Corel\User Assistant\13\Recent Work\Presentations RegKey4=HKCU\Software\Corel\User Assistant\14\Recent Work\Presentations RegKey5=HKCU\Software\Corel\User Assistant\X3\Recent Work\Presentations RegKey6=HKCU\Software\Corel\User Assistant\X4\Recent Work\Presentations

[Counter-Strike *] Section=Games DetectFile=%ProgramFiles%\Counter-Strike* FileKey1=%ProgramFiles%\Counter-Strike *|*.log FileKey2=%ProgramFiles%\Counter-Strike *\cstrike\addons\amxmodx\logs|*.log FileKey3=%ProgramFiles%\Counter-Strike *\cstrike\lhdoc\Demo Player\SK Player|history.txt

Note: Counter-Strike 1.6 LH 2013

[DataNumen Outlook Repair *] LangSecRef=3024 Detect1=HKCU\Software\DOLKR Detect2=HKCU\Software\DOLKR64 RegKey1=HKCU\Software\DOLKR\Misc|OpenDirectory RegKey2=HKCU\Software\DOLKR64\Misc|OpenDirectory

[DataNumen Outlook Password Recovery *] LangSecRef=3024 Detect=HKCU\Software\DOPR RegKey1=HKCU\Software\DOPR\Misc|OpenDirectory

[Dup Detector *] ... RegKey5=HKCU\Software\Prismatic Software\PhotoBatch\Dialogs|LastBatchFile RegKey6=HKCU\Software\Prismatic Software\PhotoBatch\Dialogs|LastBatchFolder RegKey7=HKCU\Software\Prismatic Software\PhotoBatch\MRU

[Duplicate Photo Finder *] LangSecRef=3024 Detect=HKCU\Software\Duplicate Photo Finder RegKey1=HKCU\Software\Duplicate Photo Finder|AddFolderWiz RegKey2=HKCU\Software\Duplicate Photo Finder|last1 RegKey3=HKCU\Software\Duplicate Photo Finder|lastR1

[Eudora *] LangSecRef=3022 DetectFile=%AppData%\Qualcomm\Eudora FileKey1=%AppData%\Qualcomm\Eudora|*.log

[Finders Keepers *] LangSecRef=3021 Detect=HKCU\Software\Yadu Digital\Finders Keepers RegKey1=HKCU\Software\Yadu Digital\Finders Keepers\Options\General|Last file

[herdProtect Anti-Malware Scanner *] ... FileKey3=%ProgramFiles%\Reason\herdProtect\Scanner*\Logs|*.*

[idoo Video Editor *] LangSecRef=3023 DetectFile=%ProgramFiles%\idoo\Video Editor\videoeditor.exe FileKey1=%ProgramFiles%\idoo\Video Editor|*.log

[IObit Advanced SystemCare *] ... FileKey7=%ProgramFiles%\IObit\Advanced SystemCare *|*.log;*.tmp;*.txt|RECURSE ... FileKey13=%CommonAppData%\IObit\ASCDownloader|*.log FileKey14=%AppData%\IObit\Advanced SystemCare *\ClonedFilesScanner|*_log.txt

[IObit Driver Booster *] ... DetectFile2=%ProgramFiles%\IObit\Driver Booster\DriverBooster.exe ... FileKey3=%ProgramFiles%\IObit\Driver Booster\Update|*.tmp

[IObit Malware Fighter *] ... FileKey2=%ProgramFiles%\IObit\IObit Malware Fighter\adsremoval\IE|*.log

[IObit Smart Defrag *] LangSecRef=3024 DetectFile=%ProgramFiles%\IObit\Smart Defrag* FileKey1=%ProgramFiles%\IObit\Smart Defrag *|*.log FileKey2=%ProgramFiles%\IObit\Smart Defrag *\Log|*.* FileKey3=%ProgramFiles%\IObit\Smart Defrag *\Temp|*.*|RECURSE FileKey4=%ProgramFiles%\IObit\Smart Defrag *\Update|*.tmp

Note: Please remove [IObit Smart Defrag 3 *] entry.

[ImageRanger *] LangSecRef=3023 DetectFile=%ProgramFiles%\ImageRanger\imageranger.exe FileKey1=%ProgramFiles%\ImageRanger\licenses|*.txt FileKey2=%ProgramFiles%\ImageRanger|vc*redist*x*.exe

[iSkysoft Video Editor *] LangSecRef=3023 DetectFile=%ProgramFiles%\iSkysoft\Video Editor\VideoEditor.exe FileKey1=%ProgramFiles%\iSkysoft\Video Editor\Log|*.txt

[Kingsoft Office *] ... FileKey5=%ProgramFiles%\Kingsoft\Kingsoft Office\*|*.log RegKey1=HKCU\Software\Kingsoft\Office\6.0\et\RecentFiles\files RegKey2=HKCU\Software\Kingsoft\Office\6.0\wpp\RecentFiles\files RegKey3=HKCU\Software\Kingsoft\Office\6.0\wps\RecentFiles\files

[L0phtCrack *] ... DetectFile=%ProgramFiles%\L0phtCrack* FileKey1=%ProgramFiles%\L0phtCrack *|vc*redist*x*.exe

[Log Files *] LangSecRef=3026 ... DetectFile2=%ProgramFiles%\Mozilla Maintenance Service\maintenanceservice.exe

[Machete *] ... RegKey4=HKCU\Software\Microsoft\Multimedia\ActiveMovie\Filter Cache64

[MagicTweak Magic Utilities *] LangSecRef=3021 DetectFile=%ProgramFiles%\Mgutil\mgutil.exe FileKey1=%ProgramFiles%\Mgutil|*_log.txt

[MATLAB *] Detect=HKLM\SOFTWARE\MathWorks\R2014a\MATLAB DetectFile=%ProgramFiles%\MATLAB\R20* FileKey1=%AppData%\MathWorks\MATLAB\R20*|*.prev;cwdhistory.m;History.xml;matlab.prf;MATLABDesktop.xml FileKey2=%AppData%\MathWorks\MATLAB\R20*\HtmlPanel\cache|*.*|RECURSE FileKey3=%ProgramFiles%\MATLAB\R20*\polyspace\examples\cxx\*|*.log|RECURSE FileKey4=%ProgramFiles%\MATLAB\R20*\sys\jxbrowser-chromium\win32\chromium|*.log FileKey2=%ProgramFiles%\MATLAB\R20*\sys\tex\latex\base|*.log FileKey2=%ProgramFiles%\MATLAB\R20*\sys\tomcat\temp|*.tmp FileKey2=%ProgramFiles%\MATLAB\R20*\toolbox\rtw\rtwdemos\tlctutorial\tlcdebug\solutions|*.log

Note: MATLAB version R2014a (8.3)

[Metin2 *] Section=Games DetectFile=%ProgramFiles%\Metin2\metin2.exe FileKey1=%ProgramFiles%\Metin2|*.log FileKey2=%ProgramFiles%\Metin2\hshield|*.log FileKey3=%ProgramFiles%\Metin2\hshield\Update|*.log FileKey4=%ProgramFiles%\Metin2\temp|*.log

[My Movies Collection *] ... FileKey1=%CommonAppData%\My Movies|vc*redist*.*;installerlog.txt;log.txt

[My Singing Monsters *] ... FileKey1=%ProgramFiles%\*\My Singing Monsters|dotnetfx35setup.exe;*.html;*.PNG;vc*redist*.exe;*.log;*.txt|RECURSE FileKey2=%ProgramFiles%\My Singing Monsters|dotnetfx35setup.exe;vc*redist*x*.exe;*.log;*.txt|RECURSE

[Nero *] ... Detect5=HKCU\Software\Nero\Nero 9 FileKey12=%AppData%\Nero|NeroHistory.log FileKey13=%CommonAppData%\Nero\Nero BackItUp*\Cache|*.*

[Nicotine+ *] LangSecRef=3022 DetectFile=%ProgramFiles%\Nicotine+\Nicotine+.exe FileKey1=%AppData%\nicotine|*.backup;*.bak;*.old|RECURSE FileKey2=%LocalAppData%|recently-used.xbel

[NVIDIA *] ... FileKey20=%CommonAppData%\NVIDIA\Updatus|*.bak;*.log

[Origin Installers *] ... FileKey2=%ProgramFiles%\Origin Games|*.cab;dotnetfx3setup;dotNetFx*.exe;dsetup*.dll;DXSETUP.EXE;dxwebsetup.exe;eula.*.txt;GamesExplorerIntegrationTool.exe;gfwlivesetup.exe;globdata.ini;install.exe;install.ini;install.res.*.dll;oalinst.exe;vc_red.exe;vc_red.msi;vcredist.bmp;vc*redist*x*.exe;xnafx*_redist.msi|RECURSE

[Passware Search Index Examiner *] LangSecRef=3024 DetectFile=%ProgramFiles%\Passware\Search Index Examiner* FileKey1=%AppData%\Passware\SearchIndexExaminer|Settings.bin

Note: Settings.bin stores recently used files and no settings.

[PDF Explorer *] LangSecRef=3021 Detect=HKCU\Software\PDFExplorer RegKey1=HKCU\Software\PDFExplorer\Options|LastDiskTreeFolder RegKey2=HKCU\Software\PDFExplorer\Options|ScanGridStartupFolder

[Popcorn Time *] ... DetectFile=%LocalAppData%\Popcorn-Time* FileKey4=%LocalAppData%\Popcorn Time\node_modules\peerflix\node_modules\torrent-stream\node_modules\parse-torrent\node_modules\magnet-uri|*log.txt FileKey5=%LocalAppData%\Popcorn-Time\Cache|*.* FileKey6=%LocalAppData%\Popcorn-Time-CE\*Cache|*.*

Note: Added support for Popcorn Time Community (Popcorn-Time-CE).

[Perfect Registry *] LangSecRef=3024 Detect=HKCU\Software\Raxco\PerfectRegistry DetectFile=%ProgramFiles%\Raxco\PerfectRegistry\PerfectRegistry.exe FileKey1=%AppData%\Raxco\PerfectRegistry|*.log;TempHLList.rcp

[RegVac Registry Cleaner *] LangSecRef=3024 DetectFile=%ProgramFiles%\RegVac Registry Cleaner\regvac.exe FileKey1=%ProgramFiles%\RegVac Registry Cleaner|*.xml;cantremove.txt;Undo*.reg FileKey2=%WinDir%\System32\RegVac|*.*|REMOVESELF

Note: Please update this entry.

[Softros Process Blocker *] LangSecRef=3024 Detect=HKLM\Software\Policies\Softros\Process Blocker FileKey1=%ProgramFiles%\Softros Systems\Process Blocker|*Log.txt

[SopCast *] LangSecRef=3022 DetectFile=%ProgramFiles%\SopCast\SopCast.exe FileKey1=%ProgramFiles%\SopCast\adv|sopadver.dat FileKey2=%LocalAppData%\VirtualStore\Program Files (x86)\SopCast\adv|sopadver.dat

[TeamViewer *] ... DetectFile2=%ProgramFiles%\TeamViewer\Version* FileKey5=%ProgramFiles%\TeamViewer\Version*|*.log

[Telegram Desktop *] LangSecRef=3022 DetectFile=%AppData%\Telegram Desktop\Telegram.exe FileKey1=%AppData%\Telegram Desktop|log*.txt FileKey2=%AppData%\Telegram Desktop\tdata\dumps|*.dmp FileKey3=%AppData%\Telegram Desktop\tdata\User_Data\*Cache|*.*|RECURSE

[uTorrent *] .... FileKey1=%AppData%\uTorrent|*.log;*.dmp;*.bad;*.older;*.benc;updates.dat ... FileKey5=%LocalAppData%\BitTorrentHelper|*.log FileKey6=%LocalAppData%\BitTorrentHelper\crashdumps|*.*|RECURSE FileKey7=%LocalLowAppData%\uTorrent|uTorrent_* RegKey1=HKCU\Software\BitTorrent|computerID

Note: updates.dat file keeps track of all updates made.

[VeryPDF OCR to Any Converter *] LangSecRef=3021 Detect=HKCU\Software\VietUnicode\VeryPDF OCR to Any Converter3 RegKey1=HKCU\Software\VietUnicode\VeryPDF OCR to Any Converter3|MruList

[Wanted Weapons of Fate *] Section=Games DetectFile=%LocalAppData%\wanted FileKey1=%LocalAppData%\wanted|crash*.txt

[Wipe *] LangSecRef=3024 Detect=HKLM\SOFTWARE\privacyroot.com\wipe RegFile1=HKLM\SOFTWARE\privacyroot.com\wipe|SETUP-EXE

APMichael commented 4 years ago

Please use the correct environment variables:

%ProgramFiles%\Common Files = %CommonProgramFiles%

%AllUsersProfile% = %CommonAppData% (I know there are a few programs that use the wrong folder in Windows XP, but Windows XP has been EOL for a very long time, so unnecessary duplicate FileKeys make no sense.)

[Raxco PerfectXXX *] We always adapt to the names in CCleaner, so these entry names are without "Raxco".

Thanks!


Notes:

[Kingsoft Office *] - RegKeys already covered by CCleaner.

[Log Files *] - Is an entry for the "Firefox" section, so it should only be detected if a Firefox browser is installed.

[SopCast *] - File/RegKeys with "VirtualStore" are not necessary, because the Trim function of Winapp2ool adds them on demand.

aquila-XP commented 4 years ago

I hoped this submitted issue would be with no errors. :(