Jump to content

CSGalloway

Experienced Members
  • Posts

    414
  • Joined

  • Last visited

Everything posted by CSGalloway

  1. I was just posting that CCleaner had found some items when I had the 2nd scan donw, immediately after the first.... and had removed the items found on the first scan.......
  2. I ran the registry cleaner, the results are in registry.txt, and I cleaned all of the entries. Then I reran the registry cleaner and the results are in registry2.txt. I seem to remember that there were other CCleaner users had similar problems with other software being cleaned omn the first pass. Please get this fixed. registry.txt registry2.txt
  3. Please add a warning to [Copernic] saying it will remove your search items and the search results.
  4. hen it might be worth having CCleaner havea way of removing empty folders. Maybe trying to delete a file known not to exist anywhere and use the RECURSE verb
  5. [GNU Cache*] Appears but I don't have any of the FileKey folders.... ========================================================== [McAfee AntiVirus] I have three empty folders in C:\Documents and Settings\All Users\Application Data\McAfee\MCLOGS\Common They all look to be Java nstall folder named. ==========================================================
  6. Hi. So the problem is everytime you must login to forum.piriform.com every time. And is it just this forum / site or any others?
  7. Maybe just changing the detect livne to catch HKEY_CURRENT_USER\Software\Bugsplat\UserCredentials would be enough? Is it in all the games you think there are out there?
  8. What is Bugsplat used for in those games? Bugsplat could be short for killing software progrsmming bugs but I searched my %programfiles% folder and didn't find a match. Maybe it would be beneficial to have someone who uses those games you mention to export the HKCU\Software\Bugsplat registry tree and compare it with the ne I posted above.
  9. Hi topicalgal, Are you still expering your initial problem? You might want to run a disk check first then see if the problem exists. Are you aware of how to do this ?
  10. Games section, Bugsplat always shows up for me - but I never have installed Bugsplat or any other game. Seems that the detect or detectfile line needs modifing but to what I have no idea. Here is the export of HKCU\Software\Bugsplat REGEDIT4 [HKEY_CURRENT_USER\Software\Bugsplat] [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks] [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando] [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\1.6.1.0] "TotalUptime"=dword:000256ff [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\1.8.1.2] "TotalUptime"=dword:0000f249 [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\1.9.0.1] "TotalUptime"=dword:00000146 [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\1.9.1.0] "TotalUptime"=dword:00000bc6 [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\1.9.5.1] "TotalUptime"=dword:0000015b [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\2.0.0.4] "TotalUptime"=dword:00000155 [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\2.0.3.0] "TotalUptime"=dword:000001eb [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\2.1.0.1] "TotalUptime"=dword:000001b3 [HKEY_CURRENT_USER\Software\Bugsplat\pandonetworks\Pando\2.2.1.1] "TotalUptime"=dword:0000a6ad [HKEY_CURRENT_USER\Software\Bugsplat\Pando_Win] So it seems I also have had Pando (www.pando.com) installed.
  11. YOu might have to add the verizon cookie to the list to be excluded. In the current version of CCleaner please: 1) Open CCleaner 2) Click Options 3) Click Cookies 4) In the left pane - search for "Verizon". For each match - highlight and then click the right arrow between the two windows. 5) Close CCleaner then reopen and click Analyse. 6) post what happens..
  12. You can find out what version of CCleaner you are running by opening CCLeaner and the version will appear in the upper left of the program. ============ I would recommend un-installing CCleaner first. Then restart the computer. The currnt slim version of CCleaner can be retried from: http://www.piriform....ccleaner/builds it's the last thing on the page, look for: CCleaner - Slim Installer, no toolbar 2,936 kb - ccsetup323_slim.exe
  13. Combine [sUMo Log*] and [sUMo*] to [sUMo BAKs/LOGs*] LangSecRef=3024 Detect=HKCU\Software\KC Softwares\SUMo Default=False FileKey1=%AppData%\KC Softwares\SUMo|*.log FileKey2=%AppData%\KC Softwares\SUMo|db.bak ================== Change the LangSecRef in [ACDSee 6.0 Standard Database*] [ACDSee 6.0 Standard Registry*] to be 3021 so it matches [ACDSee Pro*]
  14. I have come up with close to good entries for my BAK and TMP file posts. I'll post the ones I am not sure of at the bottom: New Entry [Google Toolbar Notifier*] LangSecRef=3022 Detect=HKCU\Software\Google\GoogleToolbarNotifier Default=False FileKey1=%ProgramFiles%\Google\GoogleToolbarNotifier|*.tmp|RECURSE [TuneUp XP*] LangSecRef=3021 DetectFile=%ProgramFiles%\TuneXP Default=False FileKey1=%ProgramFiles%\TuneXP\docs\*.bak [Windows Assembly*] LangSecRef=???? DetectFile=%WinDir%\assemply Default=False FileKey1=%WinDir%\assemply|*.tmp|Recurse [Misc Windows Tmp/Bak's *] LangSecRef=3022 <== Not sure ? DetectFile=%WinDir%\system32 Default=False FileKey1=%WinDir%\system32|*.bak FileKey2=%WinDir%\system32|*.tmp [Registry Backup Files] LangSecRef=3024 DetectFile1=%UserProfile%\..\LocalService DetectFile2=%UserProfile%\..\NetworkService Default=False Warning=This removes additional registry hive bakcup files FileKey1=%UserProfile%\..\LocalService\Local Settings\Application Data\Microsoft\Windows|UsrClass.dat.tmp FileKey2=%UserProfile%\..\NetworkService\Local Settings\Application Data\Microsoft\Windows|UsrClass.dat.tmp [File Transfer Manager] LangSecRef=3022 <== ???? DetectFile=%appdata%\Microsoft\File Transfer Manager Default=False FileKey1=%appdata%\Microsoft\File Transfer Manager|*.bak ;===================================================================== Revise Entry [secunia PSI*] LangSecRef=3021 Detect1=HKLM\SOFTWARE\Secunia\PSI Detect2=HKCU\Software\Secunia\PSI Default=False FileKey1=%ProgramFiles%\secunia\PSI|sualog.txt FileKey2=%ProgramFiles%\Secunia\PSI|psialog.txt* FileKey3=%ProgramFiles%\Secunia\PSI|*.tmp <== ADD The ones I am not sure of are: C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK Thank you.
  15. For users of Yahoo Messenger it would be nice if someone would make an winapp2.ini enry to set the chat window size and location back tpo the "just installed" state. Not sure what key it would be but at least HKCU\Software\Yahoo!\pager would be a good start.
  16. I just ran CCleaner with the least program open and then did the same DIR as above and got this: C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK C:\Documents and Settings\Charles\Application Data\Microsoft\File Transfer Manager\ftmTransferList.txt.bak C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp C:\Program Files\Google\GoogleToolbarNotifier\GooA32.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gthA2B.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gtnA2A.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swgA29.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gthA2E.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gtnA2D.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\swgA2C.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gthA31.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gtnA30.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\swgA2F.tmp C:\Program Files\Secunia\PSI\RCX3CA.tmp C:\Program Files\TuneXP\docs\hardware.html.bak C:\Program Files\TuneXP\docs\memoryfs.html.bak C:\WINDOWS\msdownld.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2A.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6B.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP14.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP74D.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP80.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP113A.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP229.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP349.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDB.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF21.tmp C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak C:\WINDOWS\system32\REN72.tmp C:\WINDOWS\system32\wuapi.dll.wusetup.139324421.bak C:\WINDOWS\system32\wuauclt.exe.wusetup.139325171.bak C:\WINDOWS\system32\wuaueng.dll.wusetup.139325937.bak C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK so one can see there are some BAK files from Google... and other places that could be cleaned.
  17. re: OPA11.BAK I have Microsfot Ofice Standard Edition 2003 - not sure if this file can be removed or not. re: NTMSDATA.BAK look at http://www.google.com/search?sourceid=navclient&aq=f&oq=NTMSDATA.BAK&ie=UTF-8&rlz=1T4GGHP_enUS442US442&q=NTMSDATA.BAK&gs_upl=0l0l0l2000lllllllllll0&aqi=g-K1
  18. I search my hard drive for *.bak and *.tmp files and would like help in creating Winapp2.ini entries to remove them please. C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK C:\Documents and Settings\Charles\Application Data\Microsoft\File Transfer Manager\ftmTransferList.txt.bak C:\Documents and Settings\Charles\Local Settings\jv16PT_temp.tmp C:\Documents and Settings\Charles\Local Settings\Temp\DIO4.tmp C:\Documents and Settings\Charles\Local Settings\Temp\DIO9.tmp C:\Documents and Settings\Charles\Local Settings\Temp\MAR1.tmp C:\Documents and Settings\Charles\Local Settings\Temp\MAR2.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG1A0.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG1A1.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG19A.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG19B.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG19C.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG19E.tmp C:\Documents and Settings\Charles\Local Settings\Temp\REG19F.tmp C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp C:\Program Files\Google\GoogleToolbarNotifier\GooA32.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gthA2B.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gtnA2A.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swgA29.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gthA2E.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gtnA2D.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\swgA2C.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gthA31.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gtnA30.tmp C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\swgA2F.tmp C:\Program Files\Secunia\PSI\RCX3CA.tmp C:\Program Files\TuneXP\docs\hardware.html.bak C:\Program Files\TuneXP\docs\memoryfs.html.bak C:\Program Files\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp C:\RECYCLER\S-1-5-21-1202660629-854245398-1801674531-1003\Dc1.bak C:\RECYCLER\S-1-5-21-1202660629-854245398-1801674531-1003\Dc2.bak C:\WINDOWS\msdownld.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2A.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6B.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP14.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP74D.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP80.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP113A.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP229.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP349.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDB.tmp C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF21.tmp C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak C:\WINDOWS\system32\REN72.tmp C:\WINDOWS\system32\wuapi.dll.wusetup.139324421.bak C:\WINDOWS\system32\wuauclt.exe.wusetup.139325171.bak C:\WINDOWS\system32\wuaueng.dll.wusetup.139325937.bak C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK Thanks in advance
  19. The updated version works except it still shows Firefox Logs* Firefox Updates* Install Log*
  20. Wonder when the new winapp2.ini will be released? So many false detections for Mozolla / Firefox it would be nice to have the fix in the orginal...
  21. So to use this would I remove the Detect and Detectfile lines for the Mozolla/Firefox sections? ?What other SpecialDetect lines are available?
  22. Thanks Nergal. Wondered if there is another regkey that could be used to detect Firefox? As the one I have is used by HP printing online.... which I would like to lkeave aloine
  23. The current winapp2.ini now shows Mozolla/FireFox even though I don't have either installed. I exported the HKCU\Software\Mozolla key and here it is. REGEDIT4 [HKEY_CURRENT_USER\Software\Mozilla] [HKEY_CURRENT_USER\Software\Mozilla\Firefox] [HKEY_CURRENT_USER\Software\Mozilla\Firefox\Extensions] "smartwebprinting@hp.com"="C:\\Program Files\\HP\\Digital Imaging\\Smart Web Printing\\MozillaAddOn3" Not sure how else CCleaner is identifing Mozilla/Firefox but willing to help track this down...
  24. Modify the entry please.... [AI Roboform Search*] LangSecRef=3022 Detect=HKCU\Software\Siber Systems Default=False RegKey1=HKCU\Software\Siber Systems\RoboForm\Query-MRU ; clears the MRU data. Will be reset when RF is restarted. FileKey1=%Documents%\My RoboForm Data\**|mru.rfo|RECURSE
  25. They are not replacement registry files so they are ok to remove.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.