Jump to content

ricktendo64

Experienced Members
  • Posts

    153
  • Joined

  • Last visited

Posts posted by ricktendo64

  1. Ah okay, so something like this:

    NEW ENTRY

    [MS PlayReady Logs*]
    LangSecRef=3025
    DetectFile1=%WinDir%\ehome
    Default=False
    FileKey1=%WinDir%\ehome|PRDMOWrapper.log
    FileKey2=%WinDir%\system32|PRDMOWrapper.log
    

    I think it would be better to add this to the already existing playready entry...reason being is not everybody with ehome (media center) will get playready installed, it only installs if you have a TV tunver

  2. %USERPROFILE%\AppData\Local is best changed back to %LocalAppData%

     

    [TuneUp Utilities 2011/2012 Reg Defrag Cleanup*]
    LangSecRef=3024
    Detect=HKCU\Software\TuneUp\Utilities\10.0
    Detect2=HKCU\Software\TuneUp\Utilities\12.0
    Default=False
    FileKey1=%WinDir%\System32\config|SECURITY_tureg_old
    FileKey2=%WinDir%\System32\config|SOFTWARE_tureg_old
    FileKey3=%WinDir%\System32\config|SYSTEM_tureg_old
    FileKey4=%WinDir%\System32\config|DEFAULT_tureg_new.LOG1
    FileKey5=%WinDir%\System32\config|DEFAULT_tureg_new.LOG2
    FileKey6=%WinDir%\System32\config|SAM_tureg_new.LOG1
    FileKey7=%WinDir%\System32\config|SAM_tureg_new.LOG2
    FileKey8=%WinDir%\System32\config|SECURITY_tureg_new.LOG1
    FileKey9=%WinDir%\System32\config|SECURITY_tureg_new.LOG2
    FileKey10=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG1
    FileKey11=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG2
    FileKey12=%WinDir%\System32\config|SYSTEM_tureg_new.LOG1
    FileKey13=%WinDir%\System32\config|SYSTEM_tureg_new.LOG2
    FileKey14=%WinDir%\System32\config|DEFAULT_tureg_old
    FileKey15=%WinDir%\System32\config|SAM_tureg_old
    FileKey16=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_old
    FileKey17=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG1
    FileKey18=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG2
    FileKey19=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_old
    FileKey20=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG1
    FileKey21=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG2
    Filekey22=%WinDir%\System32\config|COMPONENTS_tureg_old
    Filekey23=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG1
    Filekey24=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG2
    FileKey25=%LocalAppData%\Microsoft\Windows|USRCLASS.DAT_tureg_old
    FileKey26=%UserProfile%|NTUSER.DAT_tureg_new.LOG1
    FileKey27=%UserProfile%|NTUSER.DAT_tureg_new.LOG2
    FileKey28=%UserProfile%|NTUSER.DAT_tureg_old
    FileKey29=%SystemDrive%\Boot|BCD_tureg_new.LOG1
    FileKey30=%SystemDrive%\Boot|BCD_tureg_new.LOG2
    FileKey31=%SystemDrive%\Boot|BCD_tureg_old

  3. Built in auto update feature for winapp2.ini would be nice, you could put the version+update url in the ini so ccleaner could compare the version of the on disk to the version of the one on the other end of the url

  4. New version of cc is out hopefully we will get a update to the ini with the skype db fix that erroneously deletes contacts list

     

    BTW what happened to my post about the use of "%programfiles%\common files" instead of "%commonprogramfiles%", it seems to have been deleted

     

    [Windows Live Messenger More*]
    ...
    FileKey8=%ProgramFiles%\Common Files\Windows Live\.cache|*.*|RECURSE

  5. I use IDA (Internet Download Accelerator) and I can tell you it does not have/need these files cleaned

     

    [internet Download Accelerator]
    ...
    DetectFile=%CommonAppData%\Speedbit\DAP
    ...
    FileKey7=%CommonAppData%\Speedbit\DAP\Log|*.*
    FileKey8=%CommonAppData%\Speedbit\DAP\temp|*.tmp
    FileKey9=%CommonAppData%\Speedbit\DAP\History|*.dat|RECURSE

     

    Speeddbit\DAP I think is for Download Accelerator Plus (completely different program)

  6. Plese read here, these are not needed because they are in embedded INI

     

    [Remote Desktop Connection More*]
    ; NOT NEEDED
    RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0
    RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1
    RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2
    RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3
    RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4
    RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5
    RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6
    RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7
    RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8
    RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9

  7. [MAL Updater Image Cache*]
    LangSecRef=3023
    DetectFile=%ProgramFiles%\Mal Updater 2\MalUpdater.exe
    Default=False
    FileKey1=%AppData%\Mal Updater\AnimePics|*.*
    FileKey2=%AppData%\Mal Updater\MangaPics|*.*
    FileKey3=%AppData%\Mal Updater\SeasonData|*.*
    
    [MAL Updater Logs*]
    LangSecRef=3023
    DetectFile=%ProgramFiles%\Mal Updater 2\MalUpdater.exe
    Default=False
    FileKey1=%AppData%\Mal Updater\Users|*.log|RECURSE

     

    The logs rule was a bit tricky, because the logs actually are in %AppData%\Mal Updater\Users\USERNAME\ (for example: Users\rctgamer3\AnimeLogNotes.log).

    Is using RECURSE the best way to do it? No other files should be deleted other than the .log files.

    Try it with %username% variable

  8. @CSGalloway

     

    I found your previous post painfully obscure.

    It was NOT immediately obvious what you were on about.

    Yes, I notice you speak and have no clue what you are talking about

     

    Always gotta get your two cents in, even if its wrong

  9. Is this missing a backslash after %CommonAppData%?

     

    [AOL 9.6*]
    Default=False
    DetectFile=%CommonAppData%AOL\C_AOL Desktop 9.6
    LangSecRef=3022
    FileKey1=%CommonAppData%AOL\C_AOL Desktop 9.6\spool|*.tmp
    FileKey2=%CommonAppData%AOL\C_AOL Desktop 9.6\bart|*.*|RECURSE

     

    BTW I just checked in official CCleaner INI and the new registry entries I added to Remote Desktop Connection are not needed :rolleyes:

     

    [Remote Desktop]

    ID=2063

    LangSecRef=3025

    Detect=HKCU\Software\Microsoft\Terminal Server Client

    Default=True

    FileKey1=%localappdata%\Microsoft\Terminal Server Client\Cache|*.*

    RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default

    ExcludeKey1=REG|HKCU\Software\Microsoft\Terminal Server Client\Default\AddIns

  10. I was referring to editing INI files [sections]

     

    Now that you mention it wildcard registry support would also be nice (like in the case of the MRU* I found/added to Remote Desktop Connection)

  11. Anyway of NOT deleting the .INI file to preserve settings, only editing it to remove MRU stuff example

     

    UniExtract.ini

    [uniExtract Preferences]
    globalprefs=1
    history=1
    appendext=1
    removetemp=1
    removedupe=1
    warnexecute=1
    debugdir=%temp%
    [File History]
    0=C:\Users\Ricardo\Desktop\wpi.msi
    3=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.1.1014_PV.exe
    5=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1008_PV.exe
    6=C:\Users\Ricardo\Downloads\wintv7setup.exe
    7=C:\Users\Ricardo\Documents\Projects\dotNETMaker\dotNETfx\DNF11\netfx.msi
    8=C:\Users\Ricardo\Desktop\Seven Remix XP 2.41.exe
    9=C:\Users\Ricardo\Downloads\EP0000156866.exe
    2=F:\Microsoft\Drivers\Se7en\INF_allOS_9.2.0.1021_PV.exe
    1=F:\wpi\Install\SkypeSetup.msi
    4=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1007_PV.exe
    [Directory History]
    0=C:\Users\Ricardo\Desktop\wpi
    3=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.1.1014_PV
    5=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1008_PV
    6=C:\Users\Ricardo\Downloads\wintv7setup
    7=C:\Users\Ricardo\Documents\Projects\dotNETMaker\dotNETfx\DNF11\netfx
    8=C:\Users\Ricardo\Desktop\Seven Remix XP 2.41
    9=C:\Users\Ricardo\Downloads\EP0000156866
    2=F:\Microsoft\Drivers\Se7en\INF_allOS_9.2.0.1021_PV
    1=F:\wpi\Install\SkypeSetup
    4=F:\Microsoft\Drivers\Se7en\INF_allOS_9.1.2.1007_PV

     

    Code could go something like

     

    [universal Extractor*]
    LangSecRef=3021
    DetectFile=%ProgramFiles%\Universal Extractor\UniExtract.exe
    Default=False
    ; This will delete all that is present under a ini section
    FileKey1=%ProgramFiles%\Universal Extractor|UniExtract.ini|File History,*
    ; This will delete only a specified value (8=*)
    FileKey2=%ProgramFiles%\Universal Extractor|UniExtract.ini|Directory History,8

     

    Its just a rough example to show you what I mean, you guys may know better how to code winapp2.ini

     

     

    We are working on adding support to clean various types of document/content. INI files will be one of them! Coming soon! :)

    Any progress on this front?

  12. Remote Desktop Connection (more cleaning entries)

     

    http://support.microsoft.com/kb/312169

     

    rdcmru.th.png

     

    [Remote Desktop Connection*]
    LangSecRef=3025
    DetectFile=%WinDir%\System32\mstsc.exe
    Default=False
    FileKey1=%Documents%|*.rdp
    RegKey1=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU0
    RegKey2=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU1
    RegKey3=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU2
    RegKey4=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU3
    RegKey5=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU4
    RegKey6=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU5
    RegKey7=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU6
    RegKey8=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU7
    RegKey9=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU8
    RegKey10=HKCU\Software\Microsoft\Terminal Server Client\Default|MRU9

     

    I extracted the VBS from the MSI "Fix it" installer, this is what it does/looks like

     

    Option Explicit
    On Error Resume Next
    
    Const HKEY_CURRENT_USER  = &H80000001
    Const strKeyPath = "Software\Microsoft\Terminal Server Client\Default"
    Const strComputer = "."
    Const REG_SZ = 1
    
    Dim objReg , arrValueNames , arrValueTypes
    Dim i
    Set objReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & strComputer & "\root\default:StdRegProv")
    objReg.EnumValues HKEY_CURRENT_USER, strKeyPath , arrValueNames, arrValueTypes
    
    If Not IsNull(arrValueNames) Then  
    For i=0 To UBound(arrValueNames)
    	If arrValueTypes(i) = REG_SZ And InStr(arrValueNames(i),"MRU") = 1 Then 
        	objReg.DeleteValue HKEY_CURRENT_USER,strKeyPath,arrValueNames(i)
        End If
    Next
    End If
    
    Dim objShell : Set objShell = CreateObject("WScript.Shell")
    Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject")
    Dim strPathDefault
    strPathDefault = objShell.ExpandEnvironmentStrings("%USERPROFILE%")
    
    If Not IsNull(strPathDefault) Then 
    
    If objFSO.FileExists(strPathDefault & "\Documents\Default.rdp") Then 
    	objFSO.DeleteFile(strPathDefault & "\Documents\Default.rdp")
    End If
    
    If objFSO.FileExists(strPathDefault & "\My Documents\Default.rdp") Then 
    	objFSO.DeleteFile(strPathDefault & "\My Documents\Default.rdp")
    End If
    End If
    
    Function MyVBScriptCA()
       If (Err.Number=0) Then
           'return success
           MyVBScriptCA = 1
       Else
           'return cancel
           MyVBScriptCA = 2
       End If
    End Function

  13. Thanks...heres one

     

    Resource Hacker (setup) the .GID file is created if you launch the HLP file

     

    [Resource Hacker*]
    LangSecRef=3024
    DetectFile="%ProgramFiles%\Resource Hacker\ResHacker.exe"
    Default=False
    FileKey1=%ProgramFiles%\Resource Hacker|ResHacker.ini
    FileKey2=%ProgramFiles%\Resource Hacker|reshacker.GID

  14. CAT files that sign other files are officially stored (and you can find the duplicate files I mentioned installed) in %WinDir%\system32\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}, you can then compare them with any MD5 file verifier on ANY language edition of XP and you will get the same results (MD5's will differ from language to language)

     

    You can also rename the TMP files to CAT and open them to see they are indeed CAT files (you can also right click them and see a digital signature tab)

     

    These catalog files are applied/installed during XP setup via the syssetup.inf ProductCatalogsToInstall section but for some reason they are not deleted after

     

    [ProductCatalogsToInstall]
    NT5INF.CAT, 1   
    NT5.CAT
    SP3.CAT
    NTPRINT.CAT
    NT5IIS.CAT
    MAPIMIG.CAT 
    FP4.CAT    
    IMS.CAT
    MSMSGS.CAT  
    
    
    HPCRDP.CAT
    
    MW770.CAT
    
    wmerrenu.cat   
    
    IASNT4.CAT
    MSTSWEB.CAT 
    OEMBIOS.CAT
    tabletpc.cat
    mediactr.cat
    
    
    
    
    netfx.cat

    If you are still unsure they are junk then you can delete them, then run sigverif.exe to scan your entire HDD and see that many/most of the XP system files are still signed by the CAT's I list (SP3.CAT, NTPRINT.CAT, IMS.CAT)

     

    Your .net error is irrelevant to this subject

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.