82:
365:
files, and consequent confusion by the user of cleaner products. There is little competent information about this specific interaction, and no integration. In general, even if
Registry cleaners could be arguably considered safe in a normal end-user environment, they should be avoided in an application virtualisation environment.
155:
program to know whether any particular key is invalid or redundant. A poorly designed
Registry cleaner may not be equipped to know for sure whether a key is still being used by Windows or what detrimental effects removing it may have. This may lead to loss of functionality and/or system instability,
134:
Due to the sheer size and complexity of the
Registry database, manually cleaning up redundant and invalid entries may be impractical, so Registry cleaners try to automate the process of looking for invalid entries, missing file references or broken links within the Registry and resolving or removing
364:
since all
Registry entries in this scenario are written to an application-specific virtual Registry instead of the real one. Complications of detailed interactions of real-mode with virtual also leaves the potential for incorrect removal of shortcuts and Registry entries that point to "disappeared"
237:
filed a lawsuit against two Texas firms, Branch
Software and Alpha Red, producers of the "Registry Cleaner XP" scareware. The lawsuit alleges that the company sent incessant pop-ups resembling system warnings to consumers' personal computers stating "CRITICAL ERROR MESSAGE! - REGISTRY DAMAGED AND
204:
or free downloads that falsely report problems that can be "rectified" by purchasing or downloading a
Registry cleaner. The worst of the breed are products that advertise and encourage a "free" Registry scan; however, the user typically finds the product has to be purchased for a substantial sum,
147:
Some
Registry cleaners make no distinction as to the severity of the errors, and many that do may erroneously categorize errors as "critical" with little basis to support it. Removing or changing certain Registry data can prevent the system from starting, or cause application errors and crashes.
138:
The correction of an invalid
Registry key (such as one or more that remain after uninstallation of a program application) can provide some benefits; but the most voluminous will usually be quite harmless, obsolete records linked with COM-based applications whose associated files are no longer
52:
Registry cleaners seem to no longer be supported by
Microsoft, despite originally having made and distributed their own registry cleaner under the name of RegClean. Currently, vendors of registry cleaners claim that they are useful to repair inconsistencies arising from manual changes to
266:. Furthermore, versions of Windows prior to Server 2003 may fail to start up if the Registry and kernel files are unable to fit within the first 16 MB of memory. Slowdown due to Registry bloat is thus far less of an issue in modern versions of Windows.
171:
The use of any registry cleaner can be detrimental to a machine, and there is never a good reason to โcleanโ a registry. It is not a source of load or lag on a system in any way and can lead to additional problems such as software not working or even
328:
These tools are also difficult to manage in a non-boot situation, or during an infestation, compared to a full system restore from a backup. In the age of rapidly evolving malware, even a full system restore may be unable to remove a
442:
411:
292:
Most
Registry cleaners cannot repair scenarios such as undeletable Registry keys caused by embedded null characters in their names; only specialized tools such as the RegDelNull utility (part of the free
221:
Rogue Registry cleaners are often marketed with alarmist advertisements that falsely claim to have reanalysed your PC, displaying bogus warnings to take "corrective" action; hence the descriptive label
284:
The Windows Performance Toolkit is specifically designed to troubleshoot performance-related issues under Windows, and it does not include Registry cleaning as one of its optimizations.
450:
472:"The .NET Framework 2.0 SP1 installation fails on a computer that has the .NET Framework 2.0 installed and that is running Windows XP, Windows Server 2003, or Windows 2000"
418:
277:
tool), rather than attempting to clean the Registry's contents, has a measurable benefit and has therefore been recommended in the past by experts such as
840:
394:
320:). "Last known-good" restores the last system Registry hive (containing driver and service configuration) that successfully booted the system.
250:
computers, it was possible that a very large Registry could slow down the computer's start-up time. However, this is less of an issue with
161:
121:
99:
336:
Registry cleaners are likewise not designed for malware removal, although minor side-effects can be repaired, such as a turned-off
835:
103:
197:
213:" including Registry cleaners has been ranked as one of the most prevalent pieces of malware currently in circulation.
697:
361:
497:"OL2000: Error Message: "Outlook Caused an Invalid Page Fault in Module Msvcrt.dll" When Creating an Appointment"
313:
561:"How do I uninstall Office 2003, Office 2007 or Office 2010 suites if I cannot uninstall it from Control Panel?"
60:
The effectiveness of Registry cleaners is a controversial topic. The issue is further clouded by the fact that
238:
CORRUPTED", before instructing users to visit a web site to download Registry Cleaner XP at a cost of $ 39.95.
189:
546:
206:
92:
309:
that cannot be mounted by the system, making the repair via "slave mounting" of a system disk impossible.
54:
152:
630:
677:"Windows 2000 Registry: Latest Features and APIs Provide the Power to Customize and Extend Your Apps"
443:"Error: "Internet Explorer Script Error..." when scanning after running a Registry cleanup utility"
808:
786:
765:
609:
231:
581:
312:
A corrupt Registry can be recovered in a number of ways that are supported by Microsoft (e.g.
165:
39:
720:
742:
374:
306:
278:
234:
157:
46:
42:
35:
606:"Fright Fight: Washington Attorney General leading battle against scareware with Microsoft"
676:
270:
262:), due to a different on-disk structure of the Registry, improved memory management, and
605:
446:
349:
337:
317:
263:
829:
259:
652:
522:"August 2009 Windows Vista and Windows Server 2008 Application Compatibility Update"
294:
698:"System may not start when creating a large number of logical units and volumes"
360:
A Registry cleaner is of no use for cleaning Registry entries associated with a
81:
17:
274:
255:
251:
247:
525:
500:
475:
227:
223:
201:
65:
705:
656:
560:
521:
496:
471:
210:
341:
330:
273:
the underlying Registry files (e.g. using the free Microsoft-supported
193:
173:
106: in this section. Unsourced material may be challenged and removed.
61:
395:"Microsoft now detects CCleaner as a Potentially Unwanted Application"
316:, from a "last known-good" boot menu, by re-running setup or by using
345:
177:
352:
are involved, the removal of system-critical files may result.
75:
188:
Registry cleaners have been used as a vehicle by a number of
205:
before it will effect any of the anticipated "repairs". The
809:"Getting Started with Microsoft Application Virtualization"
160:
from Microsoft to block problematic Registry cleaners. The
27:
Third-party utility to clean up Microsoft Windows Registry
340:. However, in complex scenarios where malware such as
45:, whose purpose is to remove redundant items from the
785:Bryce Cogswell and Mark Russinovich (2006-11-01).
68:are often associated with utilities of this type.
547:"Free Utility: Windows Installer CleanUp Utility"
164:was a Microsoft-supported utility for addressing
8:
412:"Symantec Report on Rogue Security Software"
406:
404:
122:Learn how and when to remove this message
386:
417:. Symantec. 2009-10-28. Archived from
7:
743:"Windows Performance Analysis Tools"
254:-based operating systems (including
104:adding citations to reliable sources
653:"Fighting the scourge of scareware"
608:(Press release). Attorney General,
305:A Registry cleaner cannot repair a
25:
841:Windows-only proprietary software
449:. October 2, 2002. Archived from
162:Windows Installer CleanUp Utility
158:application compatibility updates
719:Lance Whitney (September 2007).
151:It is not always possible for a
80:
764:Mark Russinovich (2006-11-01).
301:Recovery capability limitations
297:software) are able to do this.
176:failing to work, if a registry
91:needs additional citations for
721:"Utility Spotlight PageDefrag"
242:Metrics of performance benefit
1:
651:Shiels, Maggie (2008-10-01).
72:Advantages and disadvantages
857:
356:Application virtualisation
314:Automated System Recovery
288:Undeletable registry keys
200:attacks that use website
53:applications, especially
192:applications to install
180:has not been performed.
787:"RootkitRevealer v1.71"
563:. Microsoft. 2010-06-29
362:virtualised application
207:rogue security software
836:Utility software types
702:support.microsoft.com
582:"Windows Maintenance"
217:Scanners as scareware
226:". In October 2008,
196:, typically through
100:improve this article
453:on December 7, 2008
333:from a hard drive.
586:r/TechSupport Wiki
503:. November 5, 2003
198:social engineering
766:"RegDelNull v1.1"
633:. StopBadware.Org
166:Windows Installer
132:
131:
124:
57:-based programs.
40:Microsoft Windows
38:designed for the
16:(Redirected from
848:
820:
819:
817:
816:
807:Anthony Kinney.
804:
798:
797:
795:
794:
782:
776:
775:
773:
772:
761:
755:
754:
752:
750:
739:
733:
732:
730:
728:
716:
710:
709:
704:. Archived from
694:
688:
687:
685:
683:
673:
667:
666:
664:
663:
648:
642:
641:
639:
638:
627:
621:
620:
618:
617:
602:
596:
595:
593:
592:
578:
572:
571:
569:
568:
557:
551:
550:
543:
537:
536:
534:
533:
518:
512:
511:
509:
508:
493:
487:
486:
484:
483:
478:. April 24, 2008
468:
462:
461:
459:
458:
439:
433:
432:
430:
429:
423:
416:
408:
399:
398:
391:
375:Utility software
279:Mark Russinovich
235:attorney general
184:Malware payloads
168:related issues.
127:
120:
116:
113:
107:
84:
76:
47:Windows Registry
43:operating system
36:utility software
32:registry cleaner
21:
18:Registry Cleaner
856:
855:
851:
850:
849:
847:
846:
845:
826:
825:
824:
823:
814:
812:
806:
805:
801:
792:
790:
784:
783:
779:
770:
768:
763:
762:
758:
748:
746:
741:
740:
736:
726:
724:
718:
717:
713:
696:
695:
691:
681:
679:
675:
674:
670:
661:
659:
650:
649:
645:
636:
634:
629:
628:
624:
615:
613:
604:
603:
599:
590:
588:
580:
579:
575:
566:
564:
559:
558:
554:
545:
544:
540:
531:
529:
520:
519:
515:
506:
504:
495:
494:
490:
481:
479:
470:
469:
465:
456:
454:
441:
440:
436:
427:
425:
421:
414:
410:
409:
402:
393:
392:
388:
383:
371:
358:
326:
324:Malware removal
303:
290:
244:
219:
186:
145:
143:Registry damage
128:
117:
111:
108:
97:
85:
74:
28:
23:
22:
15:
12:
11:
5:
854:
852:
844:
843:
838:
828:
827:
822:
821:
799:
777:
756:
734:
711:
708:on 2007-02-27.
689:
668:
643:
622:
597:
573:
552:
538:
513:
488:
463:
434:
400:
385:
384:
382:
379:
378:
377:
370:
367:
357:
354:
338:System Restore
325:
322:
318:System Restore
302:
299:
289:
286:
243:
240:
218:
215:
185:
182:
144:
141:
130:
129:
88:
86:
79:
73:
70:
34:is a class of
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
853:
842:
839:
837:
834:
833:
831:
810:
803:
800:
788:
781:
778:
767:
760:
757:
744:
738:
735:
722:
715:
712:
707:
703:
699:
693:
690:
678:
672:
669:
658:
654:
647:
644:
632:
626:
623:
611:
607:
601:
598:
587:
583:
577:
574:
562:
556:
553:
548:
542:
539:
527:
523:
517:
514:
502:
498:
492:
489:
477:
473:
467:
464:
452:
448:
444:
438:
435:
424:on 2012-05-15
420:
413:
407:
405:
401:
396:
390:
387:
380:
376:
373:
372:
368:
366:
363:
355:
353:
351:
347:
343:
339:
334:
332:
323:
321:
319:
315:
310:
308:
307:Registry hive
300:
298:
296:
287:
285:
282:
280:
276:
272:
271:defragmenting
267:
265:
261:
257:
253:
249:
241:
239:
236:
233:
229:
225:
216:
214:
212:
208:
203:
199:
195:
191:
183:
181:
179:
175:
169:
167:
163:
159:
154:
149:
142:
140:
136:
126:
123:
115:
112:December 2014
105:
101:
95:
94:
89:This section
87:
83:
78:
77:
71:
69:
67:
63:
58:
56:
50:
48:
44:
41:
37:
33:
19:
813:. Retrieved
802:
791:. Retrieved
780:
769:. Retrieved
759:
747:. Retrieved
737:
725:. Retrieved
714:
706:the original
701:
692:
680:. Retrieved
671:
660:. Retrieved
646:
635:. Retrieved
625:
614:. Retrieved
612:. 2008-09-29
600:
589:. Retrieved
585:
576:
565:. Retrieved
555:
549:. Microsoft.
541:
530:. Retrieved
528:. 2009-09-01
516:
505:. Retrieved
491:
480:. Retrieved
466:
455:. Retrieved
451:the original
437:
426:. Retrieved
419:the original
389:
359:
335:
327:
311:
304:
295:Sysinternals
291:
283:
269:Conversely,
268:
245:
220:
187:
170:
150:
146:
137:
133:
118:
109:
98:Please help
93:verification
90:
59:
51:
31:
29:
811:. Microsoft
789:. Microsoft
745:. Microsoft
723:. Microsoft
156:As well as
153:third-party
830:Categories
815:2009-01-06
793:2008-12-08
771:2008-12-08
727:August 29,
662:2008-10-02
637:2008-06-21
631:"WinFixer"
616:2010-04-01
610:Washington
591:2024-04-24
567:2010-09-23
532:2009-09-25
507:2008-05-19
482:2008-05-19
457:2008-05-19
428:2010-04-15
381:References
275:PageDefrag
256:Windows XP
248:Windows 9x
232:Washington
202:pop-up ads
749:August 8,
526:Microsoft
501:Microsoft
476:Microsoft
228:Microsoft
224:scareware
139:present.
66:scareware
682:July 19,
657:BBC News
447:Symantec
369:See also
264:indexing
230:and the
211:WinFixer
350:viruses
342:spyware
331:rootkit
194:malware
174:Windows
62:malware
348:, and
346:adware
190:trojan
178:backup
135:them.
422:(PDF)
415:(PDF)
260:Vista
751:2010
729:2008
684:2007
258:and
64:and
246:On
102:by
55:COM
832::
700:.
655:.
584:.
524:.
499:.
474:.
445:.
403:^
344:,
281:.
252:NT
49:.
30:A
818:.
796:.
774:.
753:.
731:.
686:.
665:.
640:.
619:.
594:.
570:.
535:.
510:.
485:.
460:.
431:.
397:.
222:"
209:"
125:)
119:(
114:)
110:(
96:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.