Jump to content

siliconman01

Experienced Members
  • Posts

    1,116
  • Joined

  • Last visited

Posts posted by siliconman01

  1. FileKey2 is equivalent to [wix Files*]

    FileKey3 is equivalent to [sourceHash Files*]

    FileKey5 should be enough, and it's safe. FileKey4+6 are not really needed. (And FileKey6 could be possibly dangerous.)

     

    so it should be:

    [Windows Installer Temps*]
    LangSecRef=3025
    Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Installer
    Default=False
    FileKey1=%WinDir%\Installer|*.tmp|RECURSE
    FileKey2=%WinDir%\Installer\MSI*.tmp-|*.*|REMOVESELF
    
  2. Please don't forget to include this modified entry:  [Windows Installer Temps*]

    [Windows Installer Temps*]
    LangSecRef=3025
    Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Installer
    Default=False
    FileKey1=%WinDir%\Installer|*.tmp|RECURSE
    FileKey2=%WinDir%\Installer|*.rmi|RECURSE
    FileKey3=%WinDir%\Installer|SourceHash{*.*|RECURSE
    FileKey4=%WinDir%\Installer\*.tmp-|*.*|REMOVESELF
    FileKey5=%WinDir%\Installer\MSI*.tmp-|*.*|REMOVESELF
    FileKey6=%WinDir%\Installer\MSI*|*.*|REMOVESELF
    
  3. New entry:   [Acrok Video Converter Ultimate*]

    [Acrok Video Converter Ultimate*]
    LangSecRef=3023
    Detect=HKCU\Software\Acrok Software\Acrok Video Converter Ultimate
    Default=False
    FileKey1=%UserProfile%\.BDAccess\|*.*|RECURSE|
    FileKey2=%AppData%\Acrok\Acrok Video Converter Ultimate\log|*.*
    
  4. I have resorted to using Malwarebytes' FileAssassin to clear out locked log files that keep growing.  I set up a FileAssassin task in the Task Scheduler to flag the log file to be deleted on reboot.  These tasks run at a specific time of day (ex: 3:00 a.m.).  Below are a couple of examples of the program scripts used in the Task Scheduler.  These "Run with highest privileges" as a scheduled task.

     

    "C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\Windows\debug\WIA\wiatrace.log
     
    "C:\Program Files (x86)\FileASSASSIN\FileASSASSIN.exe" /onreboot /silent c:\programdata\Western Digital\Logs\WD Backup\WD Backup.log
     
    This is a crude method but it works.  
  5. Modified entry:  [HostsMan Backups*]

     

    Changed |RECURSE to |REMOVESELF  on FileKey1

    
    [HostsMan Backups*]
    LangSecRef=3024
    DetectFile=%CommonAppData%\abelhadigital.com\HostsMan
    Default=False
    FileKey1=%SystemDrive%\Users\Public\Documents\HostsMan Backups|*.*|REMOVESELF
    FileKey2=%WinDir%\System32\drivers\etc|HOSTS.bak;HOSTS.tmp
    
  6. Modified entry:  [CyberLink Power2Go*]   

     

    Added FileKey13

    [CyberLink Power2Go*]
    LangSecRef=3023
    Detect1=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0
    Detect2=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0
    Detect3=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0
    Default=False
    FileKey1=%Documents%\PDRMUSIC.TMP|*.*|REMOVESELF
    FileKey2=%LocalAppData%\Cyberlink\Power2Go9|DLDB.db
    FileKey3=%LocalAppData%\Cyberlink\Power2Go10|DLDB.db
    FileKey4=%LocalAppData%\Cyberlink\Power2Go11|DLDB.db
    FileKey5=%Music%|*.tmp
    FileKey6=%Pictures%|*.tmp
    FileKey7=%ProgramFiles%\Cyberlink\Power2Go9|*.tmp
    FileKey8=%ProgramFiles%\Cyberlink\Power2Go9|Thumbs.db|RECURSE
    FileKey9=%ProgramFiles%\Cyberlink\Power2Go10|*.tmp
    FileKey10=%ProgramFiles%\Cyberlink\Power2Go10|Thumbs.db|RECURSE
    FileKey11=%ProgramFiles%\Cyberlink\Power2Go11|*.tmp
    FileKey12=%ProgramFiles%\Cyberlink\Power2Go11|Thumbs.db|RECURSE
    FileKey13=%SystemDrive%\Users\Public\Documents\Cyberlink\Power2Go11|MP3Cache.log
    RegKey1=HKCU\SOFTWARE\CyberLink\LabelPrint\Recent File List
    RegKey2=HKCU\SOFTWARE\CyberLink\MediaCache\Data4
    RegKey3=HKCU\SOFTWARE\CyberLink\MediaCache5\Data5
    RegKey4=HKCU\SOFTWARE\CyberLink\MediaCache5\Thumbnail5
    RegKey5=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CDRippingPath
    RegKey6=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEName
    RegKey7=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|CUEPath
    RegKey8=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DestFolder
    RegKey9=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|DVDFolderPath
    RegKey10=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|ImagePath
    RegKey11=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastBrowsePath
    RegKey12=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|LastSaveProjPath
    RegKey13=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|MonitorPaths
    RegKey14=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|OpenPrjFilePath
    RegKey15=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0|SelectedFolderPath
    RegKey16=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Data5
    RegKey17=HKCU\SOFTWARE\CyberLink\Power2Go9\9.0\MediaObj\MediaCache5\Thumbnail5
    RegKey18=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CDRippingPath
    RegKey19=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEName
    RegKey20=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|CUEPath
    RegKey21=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DestFolder
    RegKey22=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|DVDFolderPath
    RegKey23=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|ImagePath
    RegKey24=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastBrowsePath
    RegKey25=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|LastSaveProjPath
    RegKey26=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|MonitorPaths
    RegKey27=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|OpenPrjFilePath
    RegKey28=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0|SelectedFolderPath
    RegKey29=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Data5
    RegKey30=HKCU\SOFTWARE\CyberLink\Power2Go10\10.0\MediaObj\MediaCache5\Thumbnail5
    RegKey31=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CDRippingPath
    RegKey32=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEName
    RegKey33=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|CUEPath
    RegKey34=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DestFolder
    RegKey35=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|DVDFolderPath
    RegKey36=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|ImagePath
    RegKey37=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastBrowsePath
    RegKey38=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|LastSaveProjPath
    RegKey39=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|MonitorPaths
    RegKey40=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|OpenPrjFilePath
    RegKey41=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0|SelectedFolderPath
    RegKey42=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Data5
    RegKey43=HKCU\SOFTWARE\CyberLink\Power2Go11\11.0\MediaObj\MediaCache5\Thumbnail5
    RegKey44=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|ImportDir
    RegKey45=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|TempFileDir
    RegKey46=HKCU\SOFTWARE\CyberLink\WaveEditor\2.0|WorkDir
    
  7. [Diagnostics Logs*] seems to be a bit useless because Windows has wiatrace.log locked and it cannot be deleted.  Suggest that this code be removed; however, am speaking only from experience with Windows 10x64.  

    [Diagnostics Logs*]
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%WinDir%\debug\WIA|*.log
    
  8. Detect=HKLM\SOFTWARE\AVG will make the code show up on systems that are not running the AVG antivirus software but are running AVG PC TuneUp. The pic below shows what is in the directory for AVG PC TuneUp.  Can something unique be provided for AVG antivirus?

     

     

    post-15707-0-40296000-1496037448_thumb.png

  9. Revised Entry

    Added: HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl

     

    [internet Explorer More*]

    LangSecRef=3022

    Detect=HKCU\Software\Microsoft\Internet Explorer

    Default=False

    FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt

    FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE

    FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak

    FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

    FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp

    FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE

    FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE

    FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE

    FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE

    FileKey10=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE

    FileKey11=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF

    FileKey12=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE

    FileKey13=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE

    FileKey14=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt

    FileKey15=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE

    FileKey16=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE

    FileKey17=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE

    FileKey18=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE

    FileKey19=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE

    FileKey20=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt

    FileKey21=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt

    FileKey22=%LocalAppData%\Microsoft\Windows\INetCache\IE\|*.*|RECURSE

    FileKey23=%LocalAppData%\Microsoft\Windows\INetCache\Content.Word\|*.*

    RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache

    RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache

    RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU

    RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

    RegKey5=HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl

    RegKey6=HKCU\Software\Microsoft\Internet Explorer\PageSetup

    RegKey7=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

    RegKey8=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime

    RegKey9=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats

    ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE|container.dat

     

    By clearing "FeatureControl" entirely/completely, the question in my mind is what about those entries that are there for programs that are currently installed?  Does it cause IE to no longer use or recognize them?

     

    Below is what is in my "FeatureControl" and all of the programs are presently installed on my Windows 10x64 Pro systems.

     

    Windows Registry Editor Version 5.00
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl]
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION]
    "stpass.exe"=dword:00002af8
    "DisplayFusionSettings.exe"=dword:00002af9
    "DisplayFusionSettings.vshost.exe"=dword:00002af9
    "burningstudio18.exe"=dword:00002af9
    "Trial.exe"=dword:000022b8
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_MODE]
    "iexplore.exe"=dword:00000008
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CrossDomain_Fix_KB867801]
    "burningstudio18.exe"=dword:00000001
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation]
    "burningstudio18.exe"=dword:00000001
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING]
    "burningstudio18.exe"=dword:00000001
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN]
    "iexplore.exe"=dword:00000001
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings]
    "LOCALMACHINE_CD_UNLOCK"=dword:00000000
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER]
    "burningstudio18.exe"=dword:0000000a
    "iexplore.exe"=dword:00000008
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER]
    "burningstudio18.exe"=dword:0000000a
    "iexplore.exe"=dword:00000004
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE]
    "clview.exe"=dword:00000000
     
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION]
    "burningstudio18.exe"=dword:00000001
  10.  

    Should we add: "ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\|f01b4d95cf55d32a.automaticDestinations-ms" ?

    This protects user made changes to "Quick access".

     

     

     

    
    

     

     

    Yes, please change the [Jump Lists*} to:

    [Jump Lists*]
    LangSecRef=3025
    Detect=HKCU\Software\Microsoft\Windows
    Default=False
    FileKey1=%AppData%\Microsoft\windows\recent\Automaticdestinations|*.*|RECURSE
    FileKey2=%AppData%\Microsoft\windows\recent\CustomDestinations|*.*|RECURSE
    ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\|f01b4d95cf55d32a.automaticDestinations-ms
    
  11. Modified entry:   [Avira System Speedup Logs*]

     

    Added FileKey3

    [Avira System Speedup Logs*]
    LangSecRef=3024
    Detect1=HKLM\Software\AviraSpeedup
    Detect2=HKLM\Software\Avira\Speedup
    Default=False
    FileKey1=%CommonAppData%\Avira\SystemSpeedup\Logs|*.*
    FileKey2=%LocalAppData%\AviraSpeedup\logs|*.*
    FileKey3=%CommonAppData%\Avira\Launcher\Logfiles|*.log
    
  12. Modified entry: [snagit 12/13 More*]

     

    Removed *.sdf from FileKey2 to prevent Snagit from loosing its data storage file location.

    [Snagit 12/13 More*]
    LangSecRef=3024
    Detect1=HKCU\Software\TechSmith\SnagIt\12
    Detect2=HKCU\Software\TechSmith\SnagIt\13
    Default=False
    Warning=This will delete the backups of the captures that you have performed with SnagIt 12/13.
    FileKey1=%Documents%|SnagItDebug.log
    FileKey2=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4
    FileKey3=%LocalAppData%\TechSmith\Logs|*.log
    RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount
    RegKey2=HKCU\Software\TechSmith\Snagit\13|CaptureCount
    RegKey3=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount
    RegKey4=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder
    
  13. Modified entry:  [NVIDIA Logs*]

     

    Added FileKey19

    [NVIDIA Logs*]
    LangSecRef=3024
    Detect=HKLM\Software\NVIDIA Corporation
    Default=False
    FileKey1=%CommonAppData%\NVIDIA|*.log;*.log_backup1|RECURSE
    FileKey2=%CommonAppData%\NVIDIA\NvBackend|*.log|RECURSE
    FileKey3=%CommonAppData%\NVIDIA Corporation|*.log
    FileKey4=%CommonAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak
    FileKey5=%CommonAppData%\NVIDIA Corporation\Nvstapisvr|*.log;*.old
    FileKey6=%LocalAppData%\NVIDIA\NvBackend|*.log;*.bak
    FileKey7=%LocalAppData%\NVIDIA Corporation\NvNode|*.log;*.bak
    FileKey8=%LocalAppData%\NVIDIA Corporation\NvProfileUpdater|*.log;*.bak
    FileKey9=%LocalAppData%\NVIDIA Corporation\NvTelemetry|*.log;*.bak
    FileKey10=%LocalAppData%\NVIDIA Corporation\NvTmMon|*.log;*.bak
    FileKey11=%LocalAppData%\NVIDIA Corporation\NvTmRep|*.log;*.bak
    FileKey12=%LocalAppData%\NVIDIA Corporation\NvVAD|*.log;*.bak
    FileKey13=%LocalAppData%\NVIDIA Corporation\NVIDIA Share\CefCache|*.log;*.bak
    FileKey14=%LocalAppData%\VirtualStore\Program Files*\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.*
    FileKey15=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA|*.log;*.log_backup1|RECURSE
    FileKey16=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA\NvBackend|*.log|RECURSE
    FileKey17=%LocalAppData%\VirtualStore\ProgramData*\NVIDIA Corporation\NvTelemetry|*.log;*.bak
    FileKey18=%ProgramFiles%\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\logs|*.*
    FileKey19=%CommonAppData%\NVIDIA Corporation\nvStereoInstaller|*.log;*.old
    
  14. New Entry:  ​[MS Office 2013/16 ClickToRun Update Files*]

     

    NOTE:  This code might also work for MS Office 2010; however, I do not have a MS Office 2010 installation to test...so I cannot confirm.  If someone has MS Office 2010 locally installed on their system to test it, that would be great.  You would need to change the Detects to:

     

    Detect1=HKCU\Software\Microsoft\Office\14.0
    Detect2=HKCU\Software\Microsoft\Office\15.0

    Detect3=HKCU\Software\Microsoft\Office\16.0

     

    This code ONLY applies to locally installed MS Office.  There are many megabytes of files in the ProductRelease folder following each Office update.  So this will clean a large volume of files on the user's first run of CCleaner with this code active.  

    [MS Office 2013/16 ClickToRun Update Files*]
    LangSecRef=3021
    Detect1=HKCU\Software\Microsoft\Office\15.0
    Detect2=HKCU\Software\Microsoft\Office\16.0
    Default=False
    FileKey1=%CommonAppData%\Microsoft\ClickToRun\ProductReleases\|*.*|RECURSE|
    
  15. Modified entry:  [Malwarebytes Anti-Malware*]

     

    Added FileKey8

    [Malwarebytes Anti-Malware*]
    LangSecRef=3024
    Detect=HKCU\Software\Malwarebytes
    DetectFile=%ProgramFiles%\Malwarebytes Anti-Malware\mbam.exe
    Default=False
    Warning=You must manually and temporarily turn off Malwarebytes "self-protection" to remove the logs.
    FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
    FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
    FileKey3=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe
    FileKey4=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
    FileKey5=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe
    FileKey6=%CommonAppData%\Malwarebytes\MBAMService|*.log;*.bak
    FileKey7=%CommonAppData%\Malwarebytes\MBAMService\logs|*.*
    FileKey8=%CommonAppData%\Malwarebytes\MBAMService\ScanResults|*.*
    
  16. Modified Entry:  [DriverMax*]

     

    Added FileKey8

    [DriverMax*]
    LangSecRef=3024
    Detect=HKCU\Software\Innovative Solutions\DriverMax
    Default=False
    FileKey1=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Downloded Drivers|*.*
    FileKey2=%LocalAppData%\Innovative Solutions\DriverMax\Agent\Uploads|*.*|RECURSE
    FileKey3=%LocalAppData%\Innovative Solutions\DriverMax\Backup|*.*
    FileKey4=%LocalAppData%\Innovative Solutions\DriverMax\LastScan|*.*
    FileKey5=%LocalAppData%\Innovative Solutions\DriverMax\Temp|*.*
    FileKey6=%LocalAppData%\Innovative Solutions\DriverMax\TempBackup|*.*
    FileKey7=%LocalAppData%\Innovative Solutions\DriverMax\Agent|dmxlog.txt
    FileKey8=%LocalAppData%\Innovative Solutions\DriverMax\Agent\|*.tmp
    
  17. Modified entry:  [Cyberlink PowerDVD 16/17*]

     

    Added FileKey7

    [CyberLink PowerDVD 16/17*]
    LangSecRef=3023
    Detect1=HKCU\Software\CyberLink\PowerDVD16
    Detect2=HKCU\Software\CyberLink\PowerDVD17
    Default=False
    FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.*
    FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml
    FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE
    FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE
    FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE
    FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE
    FileKey7=%CommonAppData%\install_backup\*\|*.log
    
  18. Do we need 2 detects on the Windows Shellbags? The first detect covers the whole Windows registry section, including the ShellNoRoam entry that is in the 2nd detect. Maybe just one or the other is fine.

     

    One detect works for me.  ;)

  19. I added HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders to the CCleaner Exclude option and that prevents this cleaning code from deleting File Explorer's view settings and user added columns.  And it allows cleaning all the other keys that you rightfully are concerned about.   :)

     

    How about modifying [Windows Shellbags*] to 

     

    Added ExcludeKey1/2 and eliminated the warning

    [Windows ShellBags*]
    LangSecRef=3025
    Detect1=HKCU\Software\Microsoft\Windows
    Detect2=HKCU\Software\Microsoft\Windows\ShellNoRoam
    Default=False
    RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
    RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags
    RegKey3=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU
    RegKey4=HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags
    ExcludeKey1=REG|HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell
    ExcludeKey2=REG|HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags\AllFolders\Shell
    
  20. If people would leave certain warnings in, then people would know what it does instead of having a very long name for the cleaner. In particular the MS Notepad cleaner originally had this warning in that explained what it does when I made it, although I realize it would rarely need to be used:

    [MS Notepad*]

    LangSecRef=3025

    Detect=HKCU\Software\Microsoft\Notepad

    Default=False

    Warning=If Notepad stops remembering your window size settings using this cleaner will reset it back to the original Windows default size.

    RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX

    RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY

    RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX

    RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY

     

    But is that the real purpose/function of CCleaner?  I've always felt that CCleaner's purpose for the general public is to remove junk files (and registry keys) that are no longer used/needed by the user's system.  

  21. The [Windows Shellbags*] re-addition is another one of those irritating "Why is my File Explorer not maintaining the view settings I set up for it?" items that filter into Winapp2.ini.  It causes the view size of File Explorer to go back to the default and also removes any user added columns from a user's File Explorer.  I know there is a warning message in the code; however, I do not think registry key cleaning benefits warrant the potential user irritation factor from having to spend time figuring out why view settings are not be retained....particularly if a user is not really computer savvy.  

     

    My vote is to take [Windows Shellbags*] back out.  

     

    And I would like to see [MS Notepad*] for the same reason.  

     

    JMO.  <_<

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.