Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

[Yahoo Messenger Logs*]

LangSecRef=3022

Detect=HKCU\Software\Yahoo\pager

Default=False

FileKey1=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\logs|*.log

FileKey2=%ProgramFiles%\Yahoo!\Messenger|*.log

FileKey3=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp

FileKey4=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\logs|*.log|RECURSE

ExcludeKey1=%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG

 

- Added FileKey4 - and tested...

FileKey1 and new FileKey4 almost same..the different only RECURSE

if you have YM installed, you should check for FileKey2 also if its need RECURSE too

Link to comment
Share on other sites

  • Moderators

 

Whatever happened to "CCleaner ini clean.bat"? I've still got it in my CC folder, and run once in a blue moon, not one for the winapp site? Or is it just pointless (can't say I've ever noticed CC launch quicker after running it but my OCD side likes it ^_^ )
Do you mean trim.bat?

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Modified entry:

[Dyn Updater*]
LangSecRef=3022
Detect=HKCU\Software\Dyn\Dyn Updater
Default=False
FileKey1=%CommonAppData%\Dyn\Updater|*.log;*.msi

FileKey2=%LocalAppData%\VirtualStore\ProgramData\Dyn\Updater|*.log;*.msi

 

Modified entry:

[ElsterFormular*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Landesfinanzdirektion Thüringen\ElsterFormular
Default=False
FileKey1=%AppData%\elsterformular\*\log|*.log;*.log.*
FileKey2=%AppData%\elsterformular\*\tmp|*.*|RECURSE
FileKey3=%AppData%\elsterformular\pluginmanager\data|*_cpy.zip
FileKey4=%LocalAppData%\.elfohilfe|*.*|REMOVESELF
FileKey5=%LocalAppData%\elfopatch|*.*|REMOVESELF
FileKey6=%CommonAppData%\elsterformular|*.log
FileKey7=%LocalAppData%\VirtualStore\ProgramData\elsterformular|*.log

 

New entry:

[devolo Cockpit*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\devolo\dLAN
Default=False
FileKey1=%ProgramFiles%\devolo\dlan|dlanhistory.*txt;dlanstats.*xml;support.html;support.zip
FileKey2=%ProgramFiles%\devolo\dlan\updates|*.*|RECURSE

 

New entry:

[FreeCommander XE*]
LangSecRef=3021
DetectFile=%LocalAppData%\FreeCommanderXE
Default=False
FileKey1=%LocalAppData%\FreeCommanderXE\Settings\Bkp_Settings_*|*.*|REMOVESELF
FileKey2=%ProgramFiles%\FreeCommander XE\backup|*.*|REMOVESELF

 

New entry:

[inSSIDer Home*]
LangSecRef=3024
Detect=HKCU\Software\MetaGeek, LLC\inSSIDer Home
Default=False
FileKey1=%LocalAppData%\MetaGeek,_LLC|ConnectionErrorLog;MetaGeek-OUI.backup
 

New entry:

[Notepad++ More*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Notepad++
Default=False
FileKey1=%AppData%\Notepad++\backup|*.*|REMOVESELF
FileKey2=%AppData%\Notepad++\plugins\config|PluginManagerGpup.xml;PluginManagerPlugins.xml;PluginManagerPlugins.zip
FileKey3=%AppData%\Notepad++\plugins\config\plugin_install_temp|*.*|REMOVESELF

 

 

Link to comment
Share on other sites

New Entry

 

[Tipard Video Converter Ultimate*]
LangSecRef=3023
Detect=HKCU\Software\Tipard Studio\Tipard Video Converter Ultimate
Default=False
FileKey1=%LocalAppData%\Tipard Studio\Tipard Video Converter Ultimate|*.txt
RegKey1=HKCU\Software\Tipard Studio\Tipard Video Converter Ultimate\Edit|LastVideoFilePath

Link to comment
Share on other sites

[VoidTools Search Everything*]

LangSecRef=3024

DetectFile1=%ProgramFiles%\Everything

DetectFile2=%AppData%\Everything

Default=False

FileKey1=%AppData%\Everything|*.csv;*.txt

FileKey2=%ProgramFiles%\Everything|*.csv;*.txt

FileKey3=%LocalAppData%\VirtualStore\Program Files*\Everything|*.txt;*.csv


ExcludeKey1=FILE|%AppData%\Everything|Filters.csv

ExcludeKey2=FILE|%ProgramFiles%\Everything|Filters.csv

ExcludeKey3=FILE|%LocalAppData%\VirtualStore\Program Files*\Everything|Filters.csv


 - add exclude for Filters.csv

 

remove [Extensions Databases*] 

 - included in Cookies

Link to comment
Share on other sites

Kaspersky has changed the Kaspersky Pure name to Total Security. Please replace the [Kaspersky & Kaspersky Pure x.x*] entry with the one listed below.

 

[Kaspersky*]
LangSecRef=3024
Detect=HKCU\Software\KasperskyLab
Default=False
Warning=Make sure to disable “Self Defense” before cleaning.
FileKey1=%CommonAppData%\Kaspersky Lab\*\Bases\Cache|*.*|RECURSE
FileKey2=%CommonAppData%\Kaspersky Lab\*\Data\Updater\Temporary Files|*.*|RECURSE
FileKey3=%CommonAppData%\Kaspersky Lab\*\Temp|*.*
FileKey4=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Bases\Cache|*.*|RECURSE
FileKey5=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Data\Updater\Temporary Files|*.*|RECURSE
FileKey6=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Temp|*.*

Link to comment
Share on other sites

almost all chrome entries use Detect instead of DetectFile except these two

[GPU Cache*]

[html5 Storage*]

SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
( but missing Detect for chromium )

[Logs*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\Application|debug.log
FileKey2=%LocalAppData%\Google\Chrome*\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey3=%LocalAppData%\Chrome Plus\Application|debug.log
FileKey4=%LocalAppData%\Chrome Plus\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey5=%LocalAppData%\Chromium\Application|debug.log
FileKey6=%LocalAppData%\Chromium\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey7=%LocalAppData%\Flock\Application|debug.log
FileKey8=%LocalAppData%\Flock\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey9=%LocalAppData%\Rockmelt\Application|debug.log
FileKey10=%LocalAppData%\Rockmelt\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey11=%LocalAppData%\SRWare Iron\Application|debug.log
FileKey12=%LocalAppData%\SRWare Iron\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey13=%LocalAppData%\Torch\Application|debug.log
FileKey14=%LocalAppData%\Torch\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey15=%LocalAppData%\SuperBird\Application|debug.log
FileKey16=%LocalAppData%\SuperBird\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey17=%LocalAppData%\VirtualStore\Program Files*\Google\Chrome\Application|debug.log
ExcludeKey1=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local Extension Settings\|*.*
ExcludeKey2=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local App Settings\|*.*
ExcludeKey3=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Extensions\|*.*
ExcludeKey4=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local Extension Settings\|*.*
ExcludeKey5=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local App Settings\|*.*
ExcludeKey6=PATH|%LocalAppData%\Chrome Plus\User Data\*\Extensions\|*.*
ExcludeKey7=PATH|%LocalAppData%\Chromium\User Data\*\Local Extension Settings\|*.*
ExcludeKey8=PATH|%LocalAppData%\Chromium\User Data\*\Local App Settings\|*.*
ExcludeKey9=PATH|%LocalAppData%\Chromium\User Data\*\Extensions\|*.*
ExcludeKey10=PATH|%LocalAppData%\Flock\User Data\*\Local Extension Settings\|*.*
ExcludeKey11=PATH|%LocalAppData%\Flock\User Data\*\Local App Settings\|*.*
ExcludeKey12=PATH|%LocalAppData%\Flock\User Data\*\Extensions\|*.*
ExcludeKey13=PATH|%LocalAppData%\Rockmelt\User Data\*\Local Extension Settings\|*.*
ExcludeKey14=PATH|%LocalAppData%\Rockmelt\User Data\*\Local App Settings\|*.*
ExcludeKey15=PATH|%LocalAppData%\Rockmelt\User Data\*\Extensions\|*.*
ExcludeKey16=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local Extension Settings\|*.*
ExcludeKey17=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local App Settings\|*.*
ExcludeKey18=PATH|%LocalAppData%\SRWare Iron\User Data\*\Extensions\|*.*
ExcludeKey19=PATH|%LocalAppData%\Torch\User Data\*\Local Extension Settings\|*.*
ExcludeKey20=PATH|%LocalAppData%\Torch\User Data\*\Local App Settings\|*.*
ExcludeKey21=PATH|%LocalAppData%\Torch\User Data\*\Extensions\|*.*
ExcludeKey22=PATH|%LocalAppData%\Superbird\User Data\*\Local Extension Settings\|*.*
ExcludeKey23=PATH|%LocalAppData%\Superbird\User Data\*\Local App Settings\|*.*
ExcludeKey24=PATH|%LocalAppData%\Superbird\User Data\*\Extensions\|*.*

- add missing "s" to \User Data\*\Extensions

Link to comment
Share on other sites

New Entry:  [jv16 PowerTools X Backup Files*]

[jv16 PowerTools X Backup Files*]
LangSecRef=3024
DetectFile=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe
Default=False
FileKey1=%ProgramFiles%\jv16 PowerTools X\Backups|*.*|RECURSE
FileKey2=%ProgramFiles%\jv16 PowerTools X\Settings|UserActionLog.txt
FileKey3=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Backups|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Settings|UserActionLog.txt
ExcludeKey1=FILE|%ProgramFiles%\jv16 PowerTools X\Backups\License.xbin_backup

Revised Entry to incorporate jv16 PowerTools X.  Plus shortened name a bit.

[jv16 PowerTools Reg Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
DetectFile5=%ProgramFiles%\jv16 PowerTools 2013\jv16PT.exe
DetectFile6=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe
DetectFile7=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt*
FileKey2=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT.jv16pt*
FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT.jv16pt*
FileKey4=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT.jv16pt*
FileKey5=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT.jv16pt*
FileKey6=%UserProfile%|NTUSER.DAT.jv16pt*
FileKey7=%WinDir%\System32\config|Default.jv16pt*;software.jv16pt*;system.jv16pt*;SAM.jv16pt*;COMPONENTS.jv16pt*
FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt*
FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

  • Moderators

Longest warning EVER in the previous post, most users "too long" = "don't read and just press ok"

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Longest warning EVER in the previous post, most users "too long" = "don't read and just press ok"

I think it can safely be reduced to "Removes registry backups created during a registry compaction. Requires reboot before deletion is possible"

Link to comment
Share on other sites

  • Moderators

Better

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Third party tool to the game League of Legends.
http://leaguelsi.com/

[LoL Summonerinfo Logs*]
Section=Games
DetectFile=%ProgramFiles%\LSI\logs\
Default=False
FileKey1=%ProgramFiles%\LSI\logs|*.*

[LoL Summonerinfo Replays*]
Section=Games
DetectFile=%ProgramFiles%\LSI\replays\
Default=False
FileKey1=%ProgramFiles%\LSI\replays|*.*
Warning=This will delete all your saved replays.
Link to comment
Share on other sites

About to look at [steam Installers*] again..

 

I just bought 3 4TB harddrives, so I threw two of them into a RAID0 array and I'm currently downloading all of my steam games. I'll be away for the next week but they should hopefully maybe finish over that period of time? Not sure. It's a few terabytes (close to 3.5 I think) and my network is terribad in the dorm. We'll see.

 

Either way, eventually I'm going to improve it as much as I can with the steam games I have access to

Link to comment
Share on other sites


[Omnibox Shortcut*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|Shortcuts
- new

[WebRTCIdentityStore*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|WebRTCIdentityStore
- new

[Web Data*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Warning=This will remove Autofill, Autocomplete, Search Engines keyword, Sign-in and Credit Card info
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|Web Data
- rename from [Search Engines Data*] to [Web Data*]

[Local Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Detect3=HKCU\Software\Chromium
Default=False
FileKey1=%LocalAppData%\Google\Chrome SxS\User Data\*\Local Storage|http*.*|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Local Storage|http*.*|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\Local Storage|http*.*|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\Local Storage|http*.*|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Local Storage|http*.*|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Local Storage|http*.*|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\Local Storage|http*.*|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\Local Storage|http*.*|RECURSE
- change filekey1 to only detect Chrome SxS
- remove chrome from [Local Storage*]
- *.localstorage-journal -- included in Internet Cache
- *.localstorage -- included in Cookies

[GPU Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Detect3=HKCU\Software\Chromium
Default=False
FileKey1=%LocalAppData%\Google\Chrome SxS\User Data\*\GPUCache|*.*
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\GPUCache|*.*
FileKey3=%LocalAppData%\Chromium\User Data\*\GPUCache|*.*
FileKey4=%LocalAppData%\Flock\User Data\*\GPUCache|*.*
FileKey6=%LocalAppData%\Rockmelt\User Data\*\GPUCache|*.*
FileKey7=%LocalAppData%\SRWare Iron\User Data\*\GPUCache|*.*
FileKey8=%LocalAppData%\Torch\User Data\*\GPUCache|*.*
FileKey9=%LocalAppData%\SuperBird\User Data\*\GPUCache|*.*
- change detect
- remove filekey 5 and 6
- filekey1 changed to only detect Chrome SxS as Internet Cache already include chrome's GPUCache
if chrome SxS included in internet cache, probably no need for filekey1

[HTML5 Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Detect3=HKCU\Software\Chromium
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
- change detect
- combine filekey 5 and 6

[Application Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Detect3=HKCU\Software\Chromium
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Application Cache|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Application Cache|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\Application Cache|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\Application Cache|*.*|REMOVESELF
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Application Cache|*.*|REMOVESELF
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Application Cache|*.*|REMOVESELF
FileKey7=%LocalAppData%\Torch\User Data\*\Application Cache|*.*|REMOVESELF
FileKey8=%LocalAppData%\SuperBird\User Data\*\Application Cache|*.*|REMOVESELF
- combine filekey 5 and 6

[Bookmark Backup*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Detect1=HKCU\Software\Torch
Detect2=HKCU\Software\SuperBird
Detect3=HKCU\Software\Chromium
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*|*Bookmarks.bak
FileKey2=%LocalAppData%\Chrome Plus\User Data\*|*Bookmarks.bak
FileKey3=%LocalAppData%\Chromium\User Data\*|*Bookmarks.bak
FileKey4=%LocalAppData%\Flock\User Data\*|*Bookmarks.bak
FileKey5=%LocalAppData%\Rockmelt\User Data\*|*Bookmarks.bak
FileKey6=%LocalAppData%\SRWare Iron\User Data\*|*Bookmarks.bak
FileKey7=%LocalAppData%\Torch\User Data\*|*Bookmarks.bak
FileKey8=%LocalAppData%\SuperBird\User Data\*|*Bookmarks.bak
- combine filekey 5 and 6

 

Edited by dvdbane
Link to comment
Share on other sites

New Entry

 

[Camtasia Studio 8*]
LangSecRef=3024
Detect=HKCU\Software\TechSmith\Camtasia Studio\8.0
Default=False
RegKey1=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Recorder\8.0\General|lstLastSaveDir

RegKey2=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|ExportAsZipMru
RegKey3=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|FileSaveAsMru

RegKey4=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|MRUImportFolder
RegKey5=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|MRUOpenProjectFolder
RegKey6=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|RecentRecordingsMru

Link to comment
Share on other sites

remove certain entries from my previous post

 
[Comodo Dragon (More)*]
LangSecRef=3029
Detect=HKLM\Software\ComodoGroup\Dragon
Default=False
ExcludeKey1=PATH|%LocalAppData%\COMODO\Dragon\User Data\First Run
ExcludeKey2=PATH|%LocalAppData%\COMODO\Dragon\User Data\Local State
FileKey1=%LocalAppData%\COMODO|*.lock|RECURSE
FileKey2=%LocalAppData%\COMODO|*.old|RECURSE
FileKey3=%LocalAppData%\COMODO\Dragon\User Data|*.*
FileKey4=%LocalAppData%\COMODO\Dragon\User Data\Temp|*.*|RECURSE
FileKey5=%LocalAppData%\COMODO\Dragon\User Data\Default|Extension Cookies
FileKey6=%LocalAppData%\COMODO\Dragon\User Data\Default|Archived History
FileKey7=%LocalAppData%\COMODO\Dragon\User Data\Default|Archived History-journal
FileKey8=%LocalAppData%\COMODO\Dragon\User Data\Default|History
FileKey9=%LocalAppData%\COMODO\Dragon\User Data\Default|History Index
FileKey10=%LocalAppData%\COMODO\Dragon\User Data\Default|History Index *
FileKey11=%LocalAppData%\COMODO\Dragon\User Data\Default|History-journal
FileKey12=%LocalAppData%\COMODO\Dragon\User Data\Default|Network Action Predictor-journal
FileKey13=%LocalAppData%\COMODO\Dragon\User Data\Default|Top Sites
FileKey14=%LocalAppData%\COMODO\Dragon\User Data\Default|Top Sites-journal
FileKey15=%LocalAppData%\COMODO\Dragon\User Data\Default|Visited Links
FileKey16=%LocalAppData%\COMODO\Dragon\User Data\Default\Application Cache|*.*|RECURSE
FileKey17=%LocalAppData%\COMODO\Dragon\User Data\Default\Extensions\Temp|*.*
FileKey18=%LocalAppData%\COMODO\Dragon\User Data\Default\Extension Rules|*.*|RECURSE
FileKey19=%LocalAppData%\COMODO\Dragon\User Data\Default\File System|*.*|RECURSE
FileKey20=%LocalAppData%\COMODO\Dragon\User Data\Default\GPUCache|*.*|RECURSE
FileKey21=%LocalAppData%\COMODO\Dragon\User Data\Default\Media Cache|*.*|RECURSE
FileKey22=%LocalAppData%\COMODO\Dragon\User Data\Default\Session Storage|*.*|RECURSE
FileKey23=%LocalAppData%\COMODO\Dragon\User Data\Default\Temp|*.*|RECURSE
FileKey24=%LocalAppData%\COMODO\Dragon\User Data\Performance Monitor Databases|*.*|REMOVESELF
FileKey25=%SystemDrive%\first_launch|*.*|REMOVESELF
- fix excludekey

[EaseUS Data Recovery Wizard*]
LangSecRef=3024
DetectFile=%ProgramFiles%\EaseUS\EaseUS Data Recovery Wizard
Default=False
FileKey1=%ProgramFiles%\EaseUS\EaseUS Data Recovery Wizard|*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\EaseUS\EaseUS Data Recovery Wizard|*.log
ExcludeKey1=FILE|%ProgramFiles%\EaseUS\EaseUS Data Recovery Wizard\install.log
- fix excludekey

[JDownloader2 Temps*]
LangSecRef=3022
Detect=HKLM\SOFTWARE\Classes\JDownloader2
DetectFile=%ProgramFiles%\JDownloader 2\
Default=False
FileKey1=%ProgramFiles%\JDownloader*2*\tmp|*.*|RECURSE
FileKey2=%ProgramFiles%\JDownloader*2*\captchas|*.*|RECURSE
FileKey3=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\tmp|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\captchas|*.*|RECURSE
FileKey5=%ProgramFiles%\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json
FileKey6=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json
ExcludeKey1=FILE|%ProgramFiles%\JDownloader*2*\cfg\subconf_*.ejs
ExcludeKey2=FILE|%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg\subconf_*.ejs
- fix excludekey

[Proteus*]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\219680
Default=False
FileKey1=%Documents%\Proteus\logs|*.*
ExcludeKey1=FILE|%Documents%\Proteus\logs\rng.txt
- fix excludekey

[Raptr Logs*]
LangSecRef=3021
Detect=HKCU\Software\Raptr
DetectFile=%ProgramFiles%\Raptr
Default=False
FileKey1=%AppData%\Raptr|*.log|RECURSE
FileKey2=%ProgramFiles%\Raptr|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Raptr|*.log
ExcludeKey1=FILE|%ProgramFiles%\Raptr\install.log
- fix excludekey

[TVersity*]
LangSecRef=3023
Detect=HKLM\Software\TVersity\Media Server
Default=False
FileKey1=%ProgramFiles%\TVersity\Media Server|*.rtf;*.url;*TVersityCodecPackSetup*
FileKey2=%ProgramFiles%\TVersity\Media Server\logs|*.log;*.txt;*.xml;*.zip|RECURSE
FileKey3=%ProgramFiles%\TVersity Codec Pack|*.exe;*.url
FileKey5=%WinDir%\System32\config\systemprofile\AppData\Local\Temp\TVersity Media Server|*.*|REMOVESELF
FileKey6=%WinDir%\System32\config\systemprofile\Local Settings\Application Data\Temp\TVersity Media Server|*.*|REMOVESELF
FileKey7=%WinDir%\System32|tversity.cookies;TVersityMediaServer.log;*.1;*.2;*.3
FileKey8=%LocalAppData%\VirtualStore\Program Files*\TVersity\Media Server\logs|*.log;*.txt;*.xml;*.zip|RECURSE
FileKey9=%LocalAppData%\VirtualStore\Program Files*\TVersity Codec Pack|*.exe;*.url
ExcludeKey1=FILE|%ProgramFiles%\TVersity\Media Server\|version.txt;*HOWTO Share Media.txt
ExcludeKey2=FILE|%ProgramFiles%\TVersity Codec Pack\uninst.exe
- fix excludekey

[Yahoo Messenger Logs*]
LangSecRef=3022
Detect=HKCU\Software\Yahoo\pager
Default=False
FileKey1=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\logs|*.log
FileKey2=%ProgramFiles%\Yahoo!\Messenger|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp
ExcludeKey1=FILE|%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG
- fix excludekey

the tutorial on how to create winapp2.ini on the first page missing ExcludeKey info

this is what i found can be use for excludekey

seem almost no difference between FILE and PATH

ExcludeKey1=FILE|%AppData%\Microsoft\Word\listgal.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word\|listgal.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word\|listgal.dat;*test.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word*|listgal.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word|*listgal.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word\*.dat
ExcludeKey1=FILE|%AppData%\Microsoft\Word|*.*
ExcludeKey1=FILE|%AppData%\Microsoft\Word\|*.*
ExcludeKey1=PATH|%AppData%\Microsoft\Word\STARTUP
ExcludeKey1=PATH|%LocalAppData%\Superbird\User Data\*\Extensions\|*.*
ExcludeKey1=PATH|%LocalAppData%\Superbird\User Data\*\Extensions|*.*
ExcludeKey1=PATH|%AppData%\Microsoft\Word\listgal.dat
ExcludeKey1=PATH|%AppData%\Microsoft\Word\*.dat
Link to comment
Share on other sites

  • Moderators

the tutorial on how to create winapp2.ini on the first page missing ExcludeKey info

this is what i found can be use for excludekey

seem almost no difference between FILE and PATH

 

Don't forget excluding registry data, example:

ExcludeKey1=REG|HKCR\DoNotDelete

ExcludeKey2=REG|HKCR\DoNotDelete2

ExcludeKey3=REG|HKCR\DoNotDelete3

Link to comment
Share on other sites

updated

 

 

 

What's new in winapp2.ini 5.04.150325

General:

11 New Entries
06 Modified Entries
01 Removed Entries

Note:

 Change log excludes minor changes (mild pathing changes, key reordering, non-major key tweaks, etc)

Verbose:

------------------------------------------------------------------------------

New Entries:

[Camtasia Studio 8*]
LangSecRef=3024
Detect=HKCU\Software\TechSmith\Camtasia Studio\8.0
Default=False
RegKey1=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Recorder\8.0\General|lstLastSaveDir
RegKey2=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|ExportAsZipMru
RegKey3=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|FileSaveAsMru
RegKey4=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|MRUImportFolder
RegKey5=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|MRUOpenProjectFolder
RegKey6=HKCU\Software\TechSmith\Camtasia Studio\8.0\Camtasia Studio\8.0|RecentRecordingsMru

[devolo Cockpit*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\devolo\dLAN
Default=False
FileKey1=%ProgramFiles%\devolo\dlan|dlanhistory.*txt;dlanstats.*xml;support.html;support.zip
FileKey2=%ProgramFiles%\devolo\dlan\updates|*.*|RECURSE

[FreeCommander XE*]
LangSecRef=3021
DetectFile=%LocalAppData%\FreeCommanderXE
Default=False
FileKey1=%LocalAppData%\FreeCommanderXE\Settings\Bkp_Settings_*|*.*|REMOVESELF
FileKey2=%ProgramFiles%\FreeCommander XE\backup|*.*|REMOVESELF

[inSSIDer Home*]
LangSecRef=3024
Detect=HKCU\Software\MetaGeek, LLC\inSSIDer Home
Default=False
FileKey1=%LocalAppData%\MetaGeek,_LLC|ConnectionErrorLog;MetaGeek-OUI.backup

[jv16 PowerTools X Backup Files*]
LangSecRef=3024
DetectFile=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe
Default=False
FileKey1=%ProgramFiles%\jv16 PowerTools X\Backups|*.*|RECURSE
FileKey2=%ProgramFiles%\jv16 PowerTools X\Settings|UserActionLog.txt
FileKey3=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Backups|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\Program Files*\jv16 PowerTools X\Settings|UserActionLog.txt
ExcludeKey1=FILE|%ProgramFiles%\jv16 PowerTools X\Backups\License.xbin_backup

[LoL Summonerinfo Logs*]
Section=Games
DetectFile=%ProgramFiles%\LSI\logs\
Default=False
FileKey1=%ProgramFiles%\LSI\logs|*.*

[LoL Summonerinfo Replays*]
Section=Games
DetectFile=%ProgramFiles%\LSI\replays\
Default=False
FileKey1=%ProgramFiles%\LSI\replays|*.*
Warning=This will delete all your saved replays.

[Notepad++ More*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Notepad++
Default=False
FileKey1=%AppData%\Notepad++\backup|*.*|REMOVESELF
FileKey2=%AppData%\Notepad++\plugins\config|PluginManagerGpup.xml;PluginManagerPlugins.xml;PluginManagerPlugins.zip
FileKey3=%AppData%\Notepad++\plugins\config\plugin_install_temp|*.*|REMOVESELF

[Omnibox Shortcut*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|Shortcuts

[Tipard Video Converter Ultimate*]
LangSecRef=3023
Detect=HKCU\Software\Tipard Studio\Tipard Video Converter Ultimate
Default=False
FileKey1=%LocalAppData%\Tipard Studio\Tipard Video Converter Ultimate|*.txt
RegKey1=HKCU\Software\Tipard Studio\Tipard Video Converter Ultimate\Edit|LastVideoFilePath

[WebRTCIdentityStore*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|WebRTCIdentityStore


------------------------------------------------------------------------------

Modified Entries:

[ElsterFormular*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Landesfinanzdirektion Thüringen\ElsterFormular
Default=False
FileKey1=%AppData%\elsterformular\*\log|*.log;*.log.*
FileKey2=%AppData%\elsterformular\*\tmp|*.*|RECURSE
FileKey3=%AppData%\elsterformular\pluginmanager\data|*_cpy.zip
FileKey4=%LocalAppData%\.elfohilfe|*.*|REMOVESELF
FileKey5=%LocalAppData%\elfopatch|*.*|REMOVESELF
FileKey6=%CommonAppData%\elsterformular|*.log
FileKey7=%LocalAppData%\VirtualStore\ProgramData\elsterformular|*.log

    - Added FileKeys3,5,6,7
    
[jv16 PowerTools Reg Compact Backups*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\jv16 PowerTools 2009\jv16PT.exe
DetectFile2=%ProgramFiles%\jv16 PowerTools 2010\jv16PT.exe
DetectFile3=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
DetectFile4=%ProgramFiles%\jv16 PowerTools 2012\jv16PT.exe
DetectFile5=%ProgramFiles%\jv16 PowerTools 2013\jv16PT.exe
DetectFile6=%ProgramFiles%\jv16 PowerTools 2014\jv16PT.exe
DetectFile7=%ProgramFiles%\jv16 PowerTools X\jv16PT.exe
Default=False
Warning=This removes the registry hive backup files generated by jv16 PowerTools during a registry compaction. These files are not needed once the compaction is successfully completed. They can be safely deleted. NOTE that the system must be rebooted following a registry compaction completion in order for jv16 to release these files for deletion.
FileKey1=%LocalAppData%\Microsoft\Windows|UsrClass.dat.jv16pt*
FileKey2=%SystemDrive%\Documents and Settings\NetworkService|NTUSER.DAT.jv16pt*
FileKey3=%SystemDrive%\Documents and Settings\LocalService|NTUSER.DAT.jv16pt*
FileKey4=%SystemDrive%\Documents and Settings\NetworkService.NT*|NTUSER.DAT.jv16pt*
FileKey5=%SystemDrive%\Documents and Settings\LocalService.NT*|NTUSER.DAT.jv16pt*
FileKey6=%UserProfile%|NTUSER.DAT.jv16pt*
FileKey7=%WinDir%\System32\config|Default.jv16pt*;software.jv16pt*;system.jv16pt*;SAM.jv16pt*;COMPONENTS.jv16pt*
FileKey8=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT.jv16pt*
FileKey9=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT.jv16pt*

    - Shortened Registry to Reg
    - Added support for PowerTools X
    
[Kaspersky*]
LangSecRef=3024
Detect=HKCU\Software\KasperskyLab
Default=False
Warning=Make sure to disable “Self Defense” before cleaning.
FileKey1=%CommonAppData%\Kaspersky Lab\*\Bases\Cache|*.*|RECURSE
FileKey2=%CommonAppData%\Kaspersky Lab\*\Data\Updater\Temporary Files|*.*|RECURSE
FileKey3=%CommonAppData%\Kaspersky Lab\*\Temp|*.*
FileKey4=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Bases\Cache|*.*|RECURSE
FileKey5=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Data\Updater\Temporary Files|*.*|RECURSE
FileKey6=%LocalAppData%\VirtualStore\ProgramData\Kaspersky Lab\*\Temp|*.*

    - Renamed from [Kaspersky & Kaspersky Pure x.x*]
    - Removed many filekeys
    
[VoidTools Search Everything*]
LangSecRef=3024
DetectFile1=%ProgramFiles%\Everything
DetectFile2=%AppData%\Everything
Default=False
FileKey1=%AppData%\Everything|*.csv;*.txt
FileKey2=%ProgramFiles%\Everything|*.csv;*.txt
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Everything|*.txt;*.csv
ExcludeKey1=FILE|%AppData%\Everything|Filters.csv
ExcludeKey2=FILE|%ProgramFiles%\Everything|Filters.csv
ExcludeKey3=FILE|%LocalAppData%\VirtualStore\Program Files*\Everything|Filters.csv

    - Added ExcludeKeys

[Web Data*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Warning=This will remove Autofill, Autocomplete, Search Engines keyword, Sign-in and Credit Card info
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\*|Web Data
    -Renamed from Search Engines Data    
    
[Yahoo Messenger Logs*]
LangSecRef=3022
Detect=HKCU\Software\Yahoo\pager
Default=False
FileKey1=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\logs|*.log
FileKey2=%ProgramFiles%\Yahoo!\Messenger|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\logs|*.log|RECURSE
ExcludeKey1=%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG

    - Added FileKey4
    
    
------------------------------------------------------------------------------
Removed Entries:

[Extensions Databases*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile=%LocalAppData%\Google\Chrome
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\IndexedDB|*.*|RECURSE

    - Included in Cookies*

------------------------------------------------------------------------------
 

 

 

Link to comment
Share on other sites

Thanks for the update!

Missed changes:

[Dyn Updater*]
LangSecRef=3022
Detect=HKCU\Software\Dyn\Dyn Updater
Default=False
FileKey1=%CommonAppData%\Dyn\Updater|*.log;*.msi
FileKey2=%LocalAppData%\VirtualStore\ProgramData\Dyn\Updater|*.log;*.msi

Edited by APMichael
Link to comment
Share on other sites

New Entry

 

[Action Center*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows\CurrentVersion\Action Center
Default=False
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Action Center\Providers\EventLog

 

 

Link to comment
Share on other sites

Revised Entry

Changed from: FileKey2=%LocalAppData%\Microsoft\Windows\Burn\Burn|*.*|RECURSE

Changed to: FileKey2=%LocalAppData%\Microsoft\Windows\Burn|*.*|RECURSE

 

Do we really need FileKey1=%LocalAppData%\Microsoft\CD Burning|*.* ?

I don't see this location anywhere on Win 7 or 8.1. I don't remember if it was on Vista.

 

[Windows Burn Cache*]

LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning
Default=False
Warning=This option will wipe all files that are waiting to be burned to a CD/DVD/BRD
FileKey1=%LocalAppData%\Microsoft\CD Burning|*.*
FileKey2=%LocalAppData%\Microsoft\Windows\Burn|*.*|RECURSE

 

From Win 8.1

 

Link to comment
Share on other sites

Added FileKey13

[Skype Temporary Files*]
LangSecRef=3022
Detect=HKCU\Software\Skype
Default=False
FileKey1=%AppData%\Skype\DbTemp|*.*|RECURSE
FileKey2=%AppData%\Skype|*.tmp|RECURSE
FileKey3=%AppData%\Skype\|*.db-journal|RECURSE
FileKey4=%AppData%\Skype\*\simcache|*.*
FileKey5=%AppData%\Skype\*\httpfe|*.*
FileKey6=%AppData%\Skype\*\ecache|*.*
FileKey7=%AppData%\Skype\DataRv|*.*
FileKey8=%AppData%\Skype\*\media_messaging\media_cache|*.*
FileKey9=%AppData%\Skype\*\media_messaging\storage_db\asyncdb\tmp|*.*
FileKey10=%AppData%\Skype\*\media_messaging\media_cache\asyncdb\tmp|*.*
FileKey11=%AppData%\Skype\*\qikdb\tmp|*.*
FileKey12=%AppData%\Skype\*\logs|*.*
FileKey13=%UserProfile%\Tracing\WPPMedia\*.*|RECURSE

Latest skype 7.3.0.101 seems to have lync logs now (probably from them moving lync to skype for business).

 

http://tomtalks.uk/2013/08/lync-2013-and-lync-2010-client-log-file-paths/
http://blogs.technet.com/b/nexthop/archive/2013/01/14/lync-2013-the-new-lync-web-app.aspx

I've only noticed the %UserProfile%\Tracing path added, none of the others.

 

"If the user is experiencing issues with audio/video when using Lync web App, collect the Lync Web App MediaStack logs at %userprofile%\tracing\WPPMedia\."

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.