Jump to content

siliconman01

Experienced Members
  • Posts

    1,115
  • Joined

  • Last visited

Everything posted by siliconman01

  1. Please don't forget to include this modified entry: [Windows Installer Temps*] [Windows Installer Temps*] LangSecRef=3025 Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Installer Default=False FileKey1=%WinDir%\Installer|*.tmp|RECURSE FileKey2=%WinDir%\Installer|*.rmi|RECURSE FileKey3=%WinDir%\Installer|SourceHash{*.*|RECURSE FileKey4=%WinDir%\Installer\*.tmp-|*.*|REMOVESELF FileKey5=%WinDir%\Installer\MSI*.tmp-|*.*|REMOVESELF FileKey6=%WinDir%\Installer\MSI*|*.*|REMOVESELF
  2. Adding it is all right by me. I have been testing it and see nothing wrong.
  3. New entry: [Acrok Video Converter Ultimate*] [Acrok Video Converter Ultimate*] LangSecRef=3023 Detect=HKCU\Software\Acrok Software\Acrok Video Converter Ultimate Default=False FileKey1=%UserProfile%\.BDAccess\|*.*|RECURSE| FileKey2=%AppData%\Acrok\Acrok Video Converter Ultimate\log|*.*
  4. I also use RAPR (Driver Store Explorer) to keep my DriverStore folder size in check. https://github.com/lostindark/DriverStoreExplorer/releases
  5. I have resorted to using Malwarebytes' FileAssassin to clear out locked log files that keep growing. I set up a FileAssassin task in the Task Scheduler to flag the log file to be deleted on reboot. These tasks run at a specific time of day (ex: 3:00 a.m.). Below are a couple of examples of the program scripts used in the Task Scheduler. These "Run with highest privileges" as a scheduled task. "C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\Windows\debug\WIA\wiatrace.log "C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\programdata\Western Digital\Logs\WD Backup\WD Backup.log This is a crude method but it works.
  6. Modified entry: [HostsMan Backups*] Changed |RECURSE to |REMOVESELF on FileKey1 [HostsMan Backups*] LangSecRef=3024 DetectFile=%CommonAppData%\abelhadigital.com\HostsMan Default=False FileKey1=%SystemDrive%\Users\Public\Documents\HostsMan Backups|*.*|REMOVESELF FileKey2=%WinDir%\System32\drivers\etc|HOSTS.bak;HOSTS.tmp
  7. Modified entry: [CyberLink Power2Go*] Added FileKey13 [CyberLink Power2Go*] LangSecRef=3023 Detect1=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0 Detect2=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0 Detect3=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0 Default=False FileKey1=%Documents%\PDRMUSIC.TMP|*.*|REMOVESELF FileKey2=%LocalAppData%\Cyberlink\Power2Go9|DLDB.db FileKey3=%LocalAppData%\Cyberlink\Power2Go10|DLDB.db FileKey4=%LocalAppData%\Cyberlink\Power2Go11|DLDB.db FileKey5=%Music%|*.tmp FileKey6=%Pictures%|*.tmp FileKey7=%ProgramFiles%\Cyberlink\Power2Go9|*.tmp FileKey8=%ProgramFiles%\Cyberlink\Power2Go9|Thumbs.db|RECURSE FileKey9=%ProgramFiles%\Cyberlink\Power2Go10|*.tmp FileKey10=%ProgramFiles%\Cyberlink\Power2Go10|Thumbs.db|RECURSE FileKey11=%ProgramFiles%\Cyberlink\Power2Go11|*.tmp FileKey12=%ProgramFiles%\Cyberlink\Power2Go11|Thumbs.db|RECURSE FileKey13=%SystemDrive%\Users\Public\Documents\Cyberlink\Power2Go11|MP3Cache.log RegKey1=HKCU\SOFTWARE\CyberLink\LabelPrint\Recent File List RegKey2=HKCU\SOFTWARE\CyberLink\MediaCache\Data4 RegKey3=HKCU\SOFTWARE\CyberLink\MediaCache5\Data5 RegKey4=HKCU\SOFTWARE\CyberLink\MediaCache5\Thumbnail5 RegKey5=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CDRippingPath RegKey6=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEName RegKey7=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEPath RegKey8=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DestFolder RegKey9=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DVDFolderPath RegKey10=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|ImagePath RegKey11=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastBrowsePath RegKey12=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastSaveProjPath RegKey13=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|MonitorPaths RegKey14=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|OpenPrjFilePath RegKey15=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|SelectedFolderPath RegKey16=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Data5 RegKey17=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Thumbnail5 RegKey18=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CDRippingPath RegKey19=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEName RegKey20=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEPath RegKey21=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DestFolder RegKey22=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DVDFolderPath RegKey23=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|ImagePath RegKey24=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastBrowsePath RegKey25=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastSaveProjPath RegKey26=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|MonitorPaths RegKey27=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|OpenPrjFilePath RegKey28=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|SelectedFolderPath RegKey29=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Data5 RegKey30=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Thumbnail5 RegKey31=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CDRippingPath RegKey32=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEName RegKey33=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEPath RegKey34=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DestFolder RegKey35=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DVDFolderPath RegKey36=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|ImagePath RegKey37=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastBrowsePath RegKey38=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastSaveProjPath RegKey39=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|MonitorPaths RegKey40=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|OpenPrjFilePath RegKey41=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|SelectedFolderPath RegKey42=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Data5 RegKey43=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Thumbnail5 RegKey44=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|ImportDir RegKey45=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|TempFileDir RegKey46=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|WorkDir
  8. [Diagnostics Logs*] seems to be a bit useless because Windows has wiatrace.log locked and it cannot be deleted. Suggest that this code be removed; however, am speaking only from experience with Windows 10x64. [Diagnostics Logs*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%WinDir%\debug\WIA|*.log
  9. Detect=HKLM\SOFTWARE\AVG will make the code show up on systems that are not running the AVG antivirus software but are running AVG PC TuneUp. The pic below shows what is in the directory for AVG PC TuneUp. Can something unique be provided for AVG antivirus?
  10. By clearing "FeatureControl" entirely/completely, the question in my mind is what about those entries that are there for programs that are currently installed? Does it cause IE to no longer use or recognize them? Below is what is in my "FeatureControl" and all of the programs are presently installed on my Windows 10x64 Pro systems. Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl] [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION] "stpass.exe"=dword:00002af8 "DisplayFusionSettings.exe"=dword:00002af9 "DisplayFusionSettings.vshost.exe"=dword:00002af9 "burningstudio18.exe"=dword:00002af9 "Trial.exe"=dword:000022b8 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_MODE] "iexplore.exe"=dword:00000008 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CrossDomain_Fix_KB867801] "burningstudio18.exe"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation] "burningstudio18.exe"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING] "burningstudio18.exe"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN] "iexplore.exe"=dword:00000001 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings] "LOCALMACHINE_CD_UNLOCK"=dword:00000000 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER] "burningstudio18.exe"=dword:0000000a "iexplore.exe"=dword:00000008 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER] "burningstudio18.exe"=dword:0000000a "iexplore.exe"=dword:00000004 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE] "clview.exe"=dword:00000000 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION] "burningstudio18.exe"=dword:00000001
  11. Yep, let's just remove [Recent Items More*]
  12. Yes, please change the [Jump Lists*} to: [Jump Lists*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%AppData%\Microsoft\windows\recent\Automaticdestinations|*.*|RECURSE FileKey2=%AppData%\Microsoft\windows\recent\CustomDestinations|*.*|RECURSE ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\|f01b4d95cf55d32a.automaticDestinations-ms
  13. Modified entry: [Avira System Speedup Logs*] Added FileKey3 [Avira System Speedup Logs*] LangSecRef=3024 Detect1=HKLM\Software\AviraSpeedup Detect2=HKLM\Software\Avira\Speedup Default=False FileKey1=%CommonAppData%\Avira\SystemSpeedup\Logs|*.* FileKey2=%LocalAppData%\AviraSpeedup\logs|*.* FileKey3=%CommonAppData%\Avira\Launcher\Logfiles|*.log
  14. Modified entry: [snagit 12/13 More*] Removed *.sdf from FileKey2 to prevent Snagit from loosing its data storage file location. [Snagit 12/13 More*] LangSecRef=3024 Detect1=HKCU\Software\TechSmith\SnagIt\12 Detect2=HKCU\Software\TechSmith\SnagIt\13 Default=False Warning=This will delete the backups of the captures that you have performed with SnagIt 12/13. FileKey1=%Documents%|SnagItDebug.log FileKey2=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4 FileKey3=%LocalAppData%\TechSmith\Logs|*.log RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey2=HKCU\Software\TechSmith\Snagit\13|CaptureCount RegKey3=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount RegKey4=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder
  15. Modified entry: [NVIDIA Logs*] Added FileKey19 [NVIDIA Logs*] LangSecRef=3024 Detect=HKLM\Software\NVIDIA Corporation Default=False FileKey1=%CommonAppData%\NVIDIA|*.log;*.log_backup1|RECURSE FileKey2=%CommonAppData%\NVIDIA\NvBackend|*.log|RECURSE FileKey3=%CommonAppData%\NVIDIA Corporation|*.log FileKey4=%CommonAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey5=%CommonAppData%\NVIDIA Corporation\Nvstapisvr|*.log;*.old FileKey6=%LocalAppData%\NVIDIA\NvBackend|*.log;*.bak FileKey7=%LocalAppData%\NVIDIA Corporation\NvNode|*.log;*.bak FileKey8=%LocalAppData%\NVIDIA Corporation\NvProfileUpdater|*.log;*.bak FileKey9=%LocalAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey10=%LocalAppData%\NVIDIA Corporation\NvTmMon|*.log;*.bak FileKey11=%LocalAppData%\NVIDIA Corporation\NvTmRep|*.log;*.bak FileKey12=%LocalAppData%\NVIDIA Corporation\NvVAD|*.log;*.bak FileKey13=%LocalAppData%\NVIDIA Corporation\NVIDIA Share\CefCache|*.log;*.bak FileKey14=%LocalAppData%\VirtualStore\Program Files*\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.* FileKey15=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA|*.log;*.log_backup1|RECURSE FileKey16=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA\NvBackend|*.log|RECURSE FileKey17=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey18=%ProgramFiles%\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.* FileKey19=%CommonAppData%\NVIDIA Corporation\nvStereoInstaller|*.log;*.old
  16. The MS article below implies differently. https://support.microsoft.com/en-us/help/982434/an-overview-of-microsoft-office-click-to-run-for-office-2010
  17. New Entry: ​[MS Office 2013/16 ClickToRun Update Files*] NOTE: This code might also work for MS Office 2010; however, I do not have a MS Office 2010 installation to test...so I cannot confirm. If someone has MS Office 2010 locally installed on their system to test it, that would be great. You would need to change the Detects to: Detect1=HKCU\Software\Microsoft\Office\14.0 Detect2=HKCU\Software\Microsoft\Office\15.0 Detect3=HKCU\Software\Microsoft\Office\16.0 This code ONLY applies to locally installed MS Office. There are many megabytes of files in the ProductRelease folder following each Office update. So this will clean a large volume of files on the user's first run of CCleaner with this code active. [MS Office 2013/16 ClickToRun Update Files*] LangSecRef=3021 Detect1=HKCU\Software\Microsoft\Office\15.0 Detect2=HKCU\Software\Microsoft\Office\16.0 Default=False FileKey1=%CommonAppData%\Microsoft\ClickToRun\ProductReleases\|*.*|RECURSE|
  18. Modified entry: [Malwarebytes Anti-Malware*] Added FileKey8 [Malwarebytes Anti-Malware*] LangSecRef=3024 Detect=HKCU\Software\Malwarebytes DetectFile=%ProgramFiles%\Malwarebytes Anti-Malware\mbam.exe Default=False Warning=You must manually and temporarily turn off Malwarebytes "self-protection" to remove the logs. FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.* FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.* FileKey3=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe FileKey4=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.* FileKey5=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe FileKey6=%CommonAppData%\Malwarebytes\MBAMService|*.log;*.bak FileKey7=%CommonAppData%\Malwarebytes\MBAMService\logs|*.* FileKey8=%CommonAppData%\Malwarebytes\MBAMService\ScanResults|*.*
  19. Modified Entry: [DriverMax*] Added FileKey8 [DriverMax*] LangSecRef=3024 Detect=HKCU\Software\Innovative Solutions\DriverMax Default=False FileKey1=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Downloded Drivers|*.* FileKey2=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Uploads|*.*|RECURSE FileKey3=%LocalAppData%\Innovative Solutions\DriverMax\Backup|*.* FileKey4=%LocalAppData%\Innovative Solutions\DriverMax\LastScan|*.* FileKey5=%LocalAppData%\Innovative Solutions\DriverMax\Temp|*.* FileKey6=%LocalAppData%\Innovative Solutions\DriverMax\TempBackup|*.* FileKey7=%LocalAppData%\Innovative Solutions\DriverMax\Agent|dmxlog.txt FileKey8=%LocalAppData%\Innovative Solutions\DriverMax\Agent\|*.tmp
  20. Modified entry: [Cyberlink PowerDVD 16/17*] Added FileKey7 [CyberLink PowerDVD 16/17*] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PowerDVD16 Detect2=HKCU\Software\CyberLink\PowerDVD17 Default=False FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.* FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE FileKey7=%CommonAppData%\install_backup\*\|*.log
  21. I added HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders to the CCleaner Exclude option and that prevents this cleaning code from deleting File Explorer's view settings and user added columns. And it allows cleaning all the other keys that you rightfully are concerned about. How about modifying [Windows Shellbags*] to Added ExcludeKey1/2 and eliminated the warning [Windows ShellBags*] LangSecRef=3025 Detect1=HKCU\Software\Microsoft\Windows Detect2=HKCU\Software\Microsoft\Windows\ShellNoRoam Default=False RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags RegKey3=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU RegKey4=HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags ExcludeKey1=REG|HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell ExcludeKey2=REG|HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags\AllFolders\Shell
  22. But is that the real purpose/function of CCleaner? I've always felt that CCleaner's purpose for the general public is to remove junk files (and registry keys) that are no longer used/needed by the user's system.
  23. The [Windows Shellbags*] re-addition is another one of those irritating "Why is my File Explorer not maintaining the view settings I set up for it?" items that filter into Winapp2.ini. It causes the view size of File Explorer to go back to the default and also removes any user added columns from a user's File Explorer. I know there is a warning message in the code; however, I do not think registry key cleaning benefits warrant the potential user irritation factor from having to spend time figuring out why view settings are not be retained....particularly if a user is not really computer savvy. My vote is to take [Windows Shellbags*] back out. And I would like to see [MS Notepad*] for the same reason. JMO.
  24. Modified Entry: [Cyberlink PowerDVD 16*] changed to [Cyberlink PowerDVD 16/17*] - Changed Detect to Detect1 - Added Detect2 [CyberLink PowerDVD 16/17*] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PowerDVD16 Detect2=HKCU\Software\CyberLink\PowerDVD17 Default=False FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.* FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.