-
Posts
1,116 -
Joined
-
Last visited
Posts posted by siliconman01
-
-
Please don't forget to include this modified entry: [Windows Installer Temps*]
[Windows Installer Temps*] LangSecRef=3025 Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Installer Default=False FileKey1=%WinDir%\Installer|*.tmp|RECURSE FileKey2=%WinDir%\Installer|*.rmi|RECURSE FileKey3=%WinDir%\Installer|SourceHash{*.*|RECURSE FileKey4=%WinDir%\Installer\*.tmp-|*.*|REMOVESELF FileKey5=%WinDir%\Installer\MSI*.tmp-|*.*|REMOVESELF FileKey6=%WinDir%\Installer\MSI*|*.*|REMOVESELF
-
I am alright with adding these if everyone else agrees?
Updated the others: https://github.com/MoscaDotTo/Winapp2/commit/14ec735a28a9a71c66f41f5a8aa9ff3cd003cdf3
Adding it is all right by me. I have been testing it and see nothing wrong.
-
New entry: [Acrok Video Converter Ultimate*]
[Acrok Video Converter Ultimate*] LangSecRef=3023 Detect=HKCU\Software\Acrok Software\Acrok Video Converter Ultimate Default=False FileKey1=%UserProfile%\.BDAccess\|*.*|RECURSE| FileKey2=%AppData%\Acrok\Acrok Video Converter Ultimate\log|*.*
-
I also use RAPR (Driver Store Explorer) to keep my DriverStore folder size in check. https://github.com/lostindark/DriverStoreExplorer/releases
-
I have resorted to using Malwarebytes' FileAssassin to clear out locked log files that keep growing. I set up a FileAssassin task in the Task Scheduler to flag the log file to be deleted on reboot. These tasks run at a specific time of day (ex: 3:00 a.m.). Below are a couple of examples of the program scripts used in the Task Scheduler. These "Run with highest privileges" as a scheduled task.
"C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\Windows\debug\WIA\wiatrace.log"C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\programdata\Western Digital\Logs\WD Backup\WD Backup.logThis is a crude method but it works. -
Modified entry: [HostsMan Backups*]
Changed |RECURSE to |REMOVESELF on FileKey1
[HostsMan Backups*] LangSecRef=3024 DetectFile=%CommonAppData%\abelhadigital.com\HostsMan Default=False FileKey1=%SystemDrive%\Users\Public\Documents\HostsMan Backups|*.*|REMOVESELF FileKey2=%WinDir%\System32\drivers\etc|HOSTS.bak;HOSTS.tmp
-
Modified entry: [CyberLink Power2Go*]
Added FileKey13
[CyberLink Power2Go*] LangSecRef=3023 Detect1=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0 Detect2=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0 Detect3=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0 Default=False FileKey1=%Documents%\PDRMUSIC.TMP|*.*|REMOVESELF FileKey2=%LocalAppData%\Cyberlink\Power2Go9|DLDB.db FileKey3=%LocalAppData%\Cyberlink\Power2Go10|DLDB.db FileKey4=%LocalAppData%\Cyberlink\Power2Go11|DLDB.db FileKey5=%Music%|*.tmp FileKey6=%Pictures%|*.tmp FileKey7=%ProgramFiles%\Cyberlink\Power2Go9|*.tmp FileKey8=%ProgramFiles%\Cyberlink\Power2Go9|Thumbs.db|RECURSE FileKey9=%ProgramFiles%\Cyberlink\Power2Go10|*.tmp FileKey10=%ProgramFiles%\Cyberlink\Power2Go10|Thumbs.db|RECURSE FileKey11=%ProgramFiles%\Cyberlink\Power2Go11|*.tmp FileKey12=%ProgramFiles%\Cyberlink\Power2Go11|Thumbs.db|RECURSE FileKey13=%SystemDrive%\Users\Public\Documents\Cyberlink\Power2Go11|MP3Cache.log RegKey1=HKCU\SOFTWARE\CyberLink\LabelPrint\Recent File List RegKey2=HKCU\SOFTWARE\CyberLink\MediaCache\Data4 RegKey3=HKCU\SOFTWARE\CyberLink\MediaCache5\Data5 RegKey4=HKCU\SOFTWARE\CyberLink\MediaCache5\Thumbnail5 RegKey5=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CDRippingPath RegKey6=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEName RegKey7=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEPath RegKey8=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DestFolder RegKey9=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DVDFolderPath RegKey10=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|ImagePath RegKey11=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastBrowsePath RegKey12=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastSaveProjPath RegKey13=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|MonitorPaths RegKey14=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|OpenPrjFilePath RegKey15=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|SelectedFolderPath RegKey16=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Data5 RegKey17=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Thumbnail5 RegKey18=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CDRippingPath RegKey19=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEName RegKey20=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEPath RegKey21=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DestFolder RegKey22=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DVDFolderPath RegKey23=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|ImagePath RegKey24=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastBrowsePath RegKey25=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastSaveProjPath RegKey26=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|MonitorPaths RegKey27=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|OpenPrjFilePath RegKey28=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|SelectedFolderPath RegKey29=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Data5 RegKey30=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Thumbnail5 RegKey31=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CDRippingPath RegKey32=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEName RegKey33=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEPath RegKey34=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DestFolder RegKey35=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DVDFolderPath RegKey36=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|ImagePath RegKey37=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastBrowsePath RegKey38=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastSaveProjPath RegKey39=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|MonitorPaths RegKey40=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|OpenPrjFilePath RegKey41=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|SelectedFolderPath RegKey42=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Data5 RegKey43=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Thumbnail5 RegKey44=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|ImportDir RegKey45=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|TempFileDir RegKey46=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|WorkDir
-
[Diagnostics Logs*] seems to be a bit useless because Windows has wiatrace.log locked and it cannot be deleted. Suggest that this code be removed; however, am speaking only from experience with Windows 10x64.
[Diagnostics Logs*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%WinDir%\debug\WIA|*.log
-
-
Revised Entry
Added: HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl
[internet Explorer More*]
LangSecRef=3022
Detect=HKCU\Software\Microsoft\Internet Explorer
Default=False
FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE
FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak
FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE
FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp
FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE
FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE
FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE
FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey10=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE
FileKey11=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF
FileKey12=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE
FileKey13=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE
FileKey14=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
FileKey15=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE
FileKey16=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE
FileKey17=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE
FileKey18=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE
FileKey19=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey20=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
FileKey21=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt
FileKey22=%LocalAppData%\Microsoft\Windows\INetCache\IE\|*.*|RECURSE
FileKey23=%LocalAppData%\Microsoft\Windows\INetCache\Content.Word\|*.*
RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache
RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache
RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU
RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore
RegKey5=HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl
RegKey6=HKCU\Software\Microsoft\Internet Explorer\PageSetup
RegKey7=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete
RegKey8=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime
RegKey9=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats
ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE|container.dat
By clearing "FeatureControl" entirely/completely, the question in my mind is what about those entries that are there for programs that are currently installed? Does it cause IE to no longer use or recognize them?
Below is what is in my "FeatureControl" and all of the programs are presently installed on my Windows 10x64 Pro systems.
Windows Registry Editor Version 5.00[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl][HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION]"stpass.exe"=dword:00002af8"DisplayFusionSettings.exe"=dword:00002af9"DisplayFusionSettings.vshost.exe"=dword:00002af9"burningstudio18.exe"=dword:00002af9"Trial.exe"=dword:000022b8[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_MODE]"iexplore.exe"=dword:00000008[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CrossDomain_Fix_KB867801]"burningstudio18.exe"=dword:00000001[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation]"burningstudio18.exe"=dword:00000001[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING]"burningstudio18.exe"=dword:00000001[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN]"iexplore.exe"=dword:00000001[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings]"LOCALMACHINE_CD_UNLOCK"=dword:00000000[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER]"burningstudio18.exe"=dword:0000000a"iexplore.exe"=dword:00000008[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER]"burningstudio18.exe"=dword:0000000a"iexplore.exe"=dword:00000004[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE]"clview.exe"=dword:00000000[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION]"burningstudio18.exe"=dword:00000001 -
Updated: https://github.com/MoscaDotTo/Winapp2/commit/b8e9ab193d78715cba4e8d76b6fd6d6ae8eabb1e
We could probably just take out the [Recent Items More*] entry.
Yep, let's just remove [Recent Items More*]
-
Should we add: "ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\|f01b4d95cf55d32a.automaticDestinations-ms" ?
This protects user made changes to "Quick access".
Yes, please change the [Jump Lists*} to:
[Jump Lists*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%AppData%\Microsoft\windows\recent\Automaticdestinations|*.*|RECURSE FileKey2=%AppData%\Microsoft\windows\recent\CustomDestinations|*.*|RECURSE ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\|f01b4d95cf55d32a.automaticDestinations-ms
-
Modified entry: [Avira System Speedup Logs*]
Added FileKey3
[Avira System Speedup Logs*] LangSecRef=3024 Detect1=HKLM\Software\AviraSpeedup Detect2=HKLM\Software\Avira\Speedup Default=False FileKey1=%CommonAppData%\Avira\SystemSpeedup\Logs|*.* FileKey2=%LocalAppData%\AviraSpeedup\logs|*.* FileKey3=%CommonAppData%\Avira\Launcher\Logfiles|*.log
-
Modified entry: [snagit 12/13 More*]
Removed *.sdf from FileKey2 to prevent Snagit from loosing its data storage file location.
[Snagit 12/13 More*] LangSecRef=3024 Detect1=HKCU\Software\TechSmith\SnagIt\12 Detect2=HKCU\Software\TechSmith\SnagIt\13 Default=False Warning=This will delete the backups of the captures that you have performed with SnagIt 12/13. FileKey1=%Documents%|SnagItDebug.log FileKey2=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4 FileKey3=%LocalAppData%\TechSmith\Logs|*.log RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey2=HKCU\Software\TechSmith\Snagit\13|CaptureCount RegKey3=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount RegKey4=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder
-
Modified entry: [NVIDIA Logs*]
Added FileKey19
[NVIDIA Logs*] LangSecRef=3024 Detect=HKLM\Software\NVIDIA Corporation Default=False FileKey1=%CommonAppData%\NVIDIA|*.log;*.log_backup1|RECURSE FileKey2=%CommonAppData%\NVIDIA\NvBackend|*.log|RECURSE FileKey3=%CommonAppData%\NVIDIA Corporation|*.log FileKey4=%CommonAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey5=%CommonAppData%\NVIDIA Corporation\Nvstapisvr|*.log;*.old FileKey6=%LocalAppData%\NVIDIA\NvBackend|*.log;*.bak FileKey7=%LocalAppData%\NVIDIA Corporation\NvNode|*.log;*.bak FileKey8=%LocalAppData%\NVIDIA Corporation\NvProfileUpdater|*.log;*.bak FileKey9=%LocalAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey10=%LocalAppData%\NVIDIA Corporation\NvTmMon|*.log;*.bak FileKey11=%LocalAppData%\NVIDIA Corporation\NvTmRep|*.log;*.bak FileKey12=%LocalAppData%\NVIDIA Corporation\NvVAD|*.log;*.bak FileKey13=%LocalAppData%\NVIDIA Corporation\NVIDIA Share\CefCache|*.log;*.bak FileKey14=%LocalAppData%\VirtualStore\Program Files*\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.* FileKey15=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA|*.log;*.log_backup1|RECURSE FileKey16=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA\NvBackend|*.log|RECURSE FileKey17=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA Corporation\NvTelemetry|*.log;*.bak FileKey18=%ProgramFiles%\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.* FileKey19=%CommonAppData%\NVIDIA Corporation\nvStereoInstaller|*.log;*.old
-
ClickToRun only came out for Office 365, which would mean only Office 2013 and later are effected.
The MS article below implies differently.
-
New Entry: [MS Office 2013/16 ClickToRun Update Files*]
NOTE: This code might also work for MS Office 2010; however, I do not have a MS Office 2010 installation to test...so I cannot confirm. If someone has MS Office 2010 locally installed on their system to test it, that would be great. You would need to change the Detects to:
Detect1=HKCU\Software\Microsoft\Office\14.0
Detect2=HKCU\Software\Microsoft\Office\15.0Detect3=HKCU\Software\Microsoft\Office\16.0
This code ONLY applies to locally installed MS Office. There are many megabytes of files in the ProductRelease folder following each Office update. So this will clean a large volume of files on the user's first run of CCleaner with this code active.
[MS Office 2013/16 ClickToRun Update Files*] LangSecRef=3021 Detect1=HKCU\Software\Microsoft\Office\15.0 Detect2=HKCU\Software\Microsoft\Office\16.0 Default=False FileKey1=%CommonAppData%\Microsoft\ClickToRun\ProductReleases\|*.*|RECURSE|
-
Modified entry: [Malwarebytes Anti-Malware*]
Added FileKey8
[Malwarebytes Anti-Malware*] LangSecRef=3024 Detect=HKCU\Software\Malwarebytes DetectFile=%ProgramFiles%\Malwarebytes Anti-Malware\mbam.exe Default=False Warning=You must manually and temporarily turn off Malwarebytes "self-protection" to remove the logs. FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.* FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.* FileKey3=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe FileKey4=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.* FileKey5=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe FileKey6=%CommonAppData%\Malwarebytes\MBAMService|*.log;*.bak FileKey7=%CommonAppData%\Malwarebytes\MBAMService\logs|*.* FileKey8=%CommonAppData%\Malwarebytes\MBAMService\ScanResults|*.*
-
Modified Entry: [DriverMax*]
Added FileKey8
[DriverMax*] LangSecRef=3024 Detect=HKCU\Software\Innovative Solutions\DriverMax Default=False FileKey1=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Downloded Drivers|*.* FileKey2=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Uploads|*.*|RECURSE FileKey3=%LocalAppData%\Innovative Solutions\DriverMax\Backup|*.* FileKey4=%LocalAppData%\Innovative Solutions\DriverMax\LastScan|*.* FileKey5=%LocalAppData%\Innovative Solutions\DriverMax\Temp|*.* FileKey6=%LocalAppData%\Innovative Solutions\DriverMax\TempBackup|*.* FileKey7=%LocalAppData%\Innovative Solutions\DriverMax\Agent|dmxlog.txt FileKey8=%LocalAppData%\Innovative Solutions\DriverMax\Agent\|*.tmp
-
Modified entry: [Cyberlink PowerDVD 16/17*]
Added FileKey7
[CyberLink PowerDVD 16/17*] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PowerDVD16 Detect2=HKCU\Software\CyberLink\PowerDVD17 Default=False FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.* FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE FileKey7=%CommonAppData%\install_backup\*\|*.log
-
Do we need 2 detects on the Windows Shellbags? The first detect covers the whole Windows registry section, including the ShellNoRoam entry that is in the 2nd detect. Maybe just one or the other is fine.
One detect works for me.
-
I added HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders to the CCleaner Exclude option and that prevents this cleaning code from deleting File Explorer's view settings and user added columns. And it allows cleaning all the other keys that you rightfully are concerned about.
How about modifying [Windows Shellbags*] to
Added ExcludeKey1/2 and eliminated the warning
[Windows ShellBags*] LangSecRef=3025 Detect1=HKCU\Software\Microsoft\Windows Detect2=HKCU\Software\Microsoft\Windows\ShellNoRoam Default=False RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags RegKey3=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU RegKey4=HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags ExcludeKey1=REG|HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell ExcludeKey2=REG|HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags\AllFolders\Shell
-
If people would leave certain warnings in, then people would know what it does instead of having a very long name for the cleaner. In particular the MS Notepad cleaner originally had this warning in that explained what it does when I made it, although I realize it would rarely need to be used:
[MS Notepad*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Notepad
Default=False
Warning=If Notepad stops remembering your window size settings using this cleaner will reset it back to the original Windows default size.
RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX
RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY
RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX
RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY
But is that the real purpose/function of CCleaner? I've always felt that CCleaner's purpose for the general public is to remove junk files (and registry keys) that are no longer used/needed by the user's system.
-
The [Windows Shellbags*] re-addition is another one of those irritating "Why is my File Explorer not maintaining the view settings I set up for it?" items that filter into Winapp2.ini. It causes the view size of File Explorer to go back to the default and also removes any user added columns from a user's File Explorer. I know there is a warning message in the code; however, I do not think registry key cleaning benefits warrant the potential user irritation factor from having to spend time figuring out why view settings are not be retained....particularly if a user is not really computer savvy.
My vote is to take [Windows Shellbags*] back out.
And I would like to see [MS Notepad*] for the same reason.
JMO.
Winapp2.ini additions
in CCleaner
Posted
so it should be: