MoscaDotTo / Winapp2

A database of extended cleaning routines for popular Windows PC based maintenance software.
Creative Commons Attribution Share Alike 4.0 International
768 stars 86 forks source link

New and modified entries for winapp2.ini (part 2) #837

Closed aquila-XP closed 2 years ago

aquila-XP commented 2 years ago

[ABBYY FineReader *] ... FileKey14=%SystemDrive%\temp\FR*|*.*|REMOVESELF

[Ankama Dofus *] Section=Games DetectFile=%LocalAppData%\Ankama\Dofus* FileKey1=%LocalAppData%\Ankama\Dofus*\Logs|*.*

[Ankama Wakfu *] Section=Games DetectFile=%LocalAppData%\Ankama\Wakfu FileKey1=%LocalAppData%\Ankama\Wakfu\Game\logs|*.* FileKey2=%LocalAppData%\Ankama\Wakfu\Logs|*.* FileKey3=%LocalAppData%\Ankama\Wakfu\user_data\Game\Logs|*.* FileKey4=%LocalAppData%\Ankama\Wakfu\user_data\Logs|*.*

[AnyDesk *] ... FileKey1=%AppData%\AnyDesk|ad.trace;connection_trace.txt

[Avast TuneUp *] LangSecRef=3024 Detect=HKCU\Software\AVAST Software\Tuneup FileKey1=HKCU\Software\AVAST Software\Tuneup\FixProblems FileKey2=HKLM\Software\AVAST Software\Tuneup\FixProblems

[AVS Audio Converter *] LangSecRef=3023 DetectFile=%AppData%\AVS4YOU\AVSAudioConverter* FileKey1=%AppData%\AVS4YOU\AVSAudioConverter*|*.log;RecentFiles.*

Note: Please remove [AVS Audio Converter 6 *] entry.

[Brave Logs *] ... RegKey1=HKCU\Software\BraveSoftware\Promo|StubInstallerPath

Note: I didn't know under what section/entry for Brave to submit the Registry Key above.

[Bulk Image Downloader *] LangSecRef=3022 DetectFile=%LocalAppData%\Bulk Image Downloader FileKey1=%AppData%\BID\cef\cache|*.* FileKey2=%AppData%\BID\Log|*.log FileKey3=%LocalAppData%\Bulk Image Downloader\BID_CEF|*.7z FileKey4=%LocalAppData%\Bulk Image Downloader\BID_Chilkat|*.7z RegKey1=HKCU\Software\Antibody Software\Bulk Image Downloader\frmBIM|edDir.Text RegKey2=HKCU\Software\Antibody Software\Bulk Image Downloader\frmBIM|OpenDialog1.InitialDir RegKey3=HKCU\Software\Antibody Software\Bulk Image Downloader\frmBIM|SaveDialog1.InitialDir

[CCleaner *] ... RegKey11=HKLM\Software\Piriform\CCleaner|(Cfg)ABTestingNames RegKey12=HKLM\Software\Piriform\CCleaner|(Cfg)DTNP RegKey13=HKLM\Software\Piriform\CCleaner|(Cfg)DUNP

[Crash Reports *] LangSecRef=3029 ... FileKey57=%LocalAppData%\Epic Privacy Browser\CrashReports|*.*

[Doremi *] LangSecRef=3023 DetectFile=%LocalAppData%\Doremi FileKey1=%LocalAppData%\Doremi\Cache\QtWebEngine\Default\Cache|*.* FileKey2=%LocalAppData%\Doremi\QtWebEngine\Default|*-journal;*.old;LOG|RECURSE FileKey3=%LocalAppData%\Doremi\QtWebEngine\Default|NetWork Persistent State;Visited Links FileKey4=%LocalAppData%\Doremi\QtWebEngine\Default\blob_storage|*.*|RECURSE FileKey5=%LocalAppData%\Doremi\QtWebEngine\Default\GPUCache|*.*

[Google Update *] ... RegKey1=HKLM\Software\Google\Update|LastCodeRedCheck RegKey2=HKLM\Software\Google\Update|LastStartedAU

[Imo Messenger *] LangSecRef=3022 DetectFile=%AppData%\Imo Messenger FileKey1=%AppData%\Imo Messenger\Data\*\images|*.* FileKey2=%AppData%\Imo Messenger\Logs|*.* FileKey3=%AppData%\Imo Messenger\updates|*.*

[Inpaint *] ... RegKey3=HKCU\Software\Teorex\Inpaint\Settings|Folder

[KMS Emulator *] ... DetectFile1=%CommonAppData%\KMSAuto* FileKey1=%CommonAppData%\KMSAuto*\bin|*.log

[LINE Messenger *] LangSecRef=3022 DetectFile=%LocalAppData%\LINE\bin\LineLauncher.exe FileKey1=%LocalAppData%\LINE\bin|update_log*.txt FileKey2=%LocalAppData%\LINE\bin\current|*_CrashLog.txt FileKey3=%LocalAppData%\LINE\Cache|*.*|RECURSE FileKey4=%LocalAppData%\LINE\QtWebEngine\Default|Visited Links

[Microsoft Support and Recovery Assistant *] LangSecRef=3024 DetectFile=%LocalAppData%\SaRALogs FileKey1=%LocalAppData%\SaRALogs|*.*|RECURSE FileKey2=%LocalAppData%\SaraResults|SaraResult_*.xml

[MS Office *] ... FileKey19=%LocalAppData%\TempOffice*|*.*|REMOVESELF

[ProcessLasso *] ... FileKey3=%LocalAppData%\ProcessLasso\Logs|*.*

[Signal Desktop *] LangSecRef=3022 DetectFile=%AppData%\Signal FileKey1=%AppData%\Signal|*-journal;*.old;LOG|RECURSE FileKey2=%AppData%\Signal|Network Persistent State;QuotaManager FileKey3=%AppData%\Signal\*Cache|*.*|RECURSE FileKey4=%AppData%\Signal\blob_storage|*.*|RECURSE FileKey5=%AppData%\Signal\Logs|*.* FileKey6=%AppData%\Signal\temp|*.* FileKey7=%LocalAppData%\Signal-Desktop-Updater|installer.exe

[Skype *] ... RegKey1=HKLM\Software\Skype\Installer|DonwloadLastModified

[Telerik Fiddler Everywhere *] LangSecRef=3024 DetectFile=%AppData%\Fiddler Everywhere FileKey1=%AppData%\Fiddler Everywhere\Logs|*.*

MoscaDotTo commented 2 years ago

included in the latest update