Jump to content
CCleaner Community Forums

CSGalloway

Experienced Members
  • Posts

    384
  • Joined

  • Last visited

Everything posted by CSGalloway

  1. I did a search of %systemdisk% for both BAK and TMP files and would like modifications to winapp2.ini to included these or why each one won't be included please. C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK C:\Windows\System32\drivers\etc\hosts_PTBackup.bak C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak C:\Z_UserFiles\Unkn\BAK_000\settings.bak C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp C:\Users\Administrator\AppData\Local\Temp\DIOB0C9.tmp C:\Users\Administrator\AppData\Local\Temp\MAR8E98.tmp C:\Users\Administrator\AppData\Local\Temp\MAR9202.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8B.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8C.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8D.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8E.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIconsOld\3E6A.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIconsOld\3E6B.tmp C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp C:\Users\Galloway\AppData\Local\Temp\DIO5FA.tmp C:\Users\Galloway\AppData\Local\Temp\DIO7EC2.tmp C:\Users\Galloway\AppData\Local\Temp\DIO464A.tmp C:\Users\Galloway\AppData\Local\Temp\DIOAE4A.tmp C:\Users\Galloway\AppData\Local\Temp\DIOD98.tmp C:\Users\Galloway\AppData\Local\Temp\DIOD115.tmp C:\Users\Galloway\AppData\Local\Temp\MAR65B5.tmp C:\Users\Galloway\AppData\Local\Temp\MAR623B.tmp C:\Users\Galloway\AppData\Local\Temp\MAR973F.tmp C:\Users\Galloway\AppData\Local\Temp\MAR975F.tmp C:\Users\Galloway\AppData\Local\Temp\MAR3557.tmp C:\Users\Galloway\AppData\Local\Temp\MAR3597.tmp C:\Users\Galloway\AppData\Local\Temp\MARB7AA.tmp C:\Users\Galloway\AppData\Local\Temp\MARB866.tmp C:\Users\Galloway\AppData\Local\Temp\MARE9B2.tmp C:\Users\Galloway\AppData\Local\Temp\MARE9E2.tmp C:\Users\Galloway\AppData\Local\Temp\MARECBE.tmp C:\Users\Galloway\AppData\Local\Temp\MAREEA2.tmp C:\Users\Galloway\AppData\Local\Temp\~DFD841554722215779.TMP C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp C:\Users\Galloway\Music\91F61065-CF82.tmp C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\BIT2DD1.tmp Regards
  2. I searched the %systemdrive% for both TMP and BAK files and would like suitable entries to be made - even if merged with the existing winapp2.ini ones.... 2011-02-11 12:00:42.742 8,192 C:\BOOTSECT.BAK 2014-12-21 01:37:29.552 544 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$IRAYQ8C.TMP 2014-12-20 23:58:12.675 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RDTQ5QN.TMP 2014-12-21 02:15:29.130 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RZ472UH.TMP 2014-09-28 17:06:26.579 64,306 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\Preferences.bak 2014-12-11 23:29:29.989 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83D6.tmp 2014-12-11 23:29:30.005 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E8.tmp 2014-12-11 23:29:30.006 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E9.tmp 2014-12-11 23:29:30.029 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83EA.tmp 2014-12-11 23:29:30.046 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\841A.tmp 2014-12-11 23:28:38.734 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BB90.tmp 2014-12-11 23:28:38.746 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA2.tmp 2014-12-11 23:28:38.748 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA3.tmp 2014-03-07 13:58:02.929 46,862 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak 2014-04-19 14:13:25.654 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp 2014-04-19 14:03:10.483 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp 2014-04-19 14:03:10.485 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp 2014-04-19 14:03:10.487 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp 2014-04-19 14:03:10.501 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp 2014-02-22 15:56:15.099 235,550 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp 2014-04-24 19:32:45.519 235,566 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp 2014-01-03 16:23:32.114 235,478 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp 2011-03-24 21:08:09.410 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp 2011-03-24 21:08:09.425 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp 2011-03-24 21:08:09.472 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp 2011-03-24 21:08:09.488 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp 2011-03-24 21:08:09.347 216,229 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp 2011-03-24 21:08:09.394 159,852 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp 2014-12-20 07:13:46.564 33,554,583 C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak 2002-10-17 20:23:16.000 8,200 C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK 2014-09-28 17:06:26.579 64,306 C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\Preferences.bak 2014-12-20 22:11:45.504 524,288 C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp 2014-12-20 22:12:09.787 0 C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp 2014-10-31 19:29:25.067 5,540 C:\Users\Galloway\AppData\Roaming\Mozilla\Firefox\Profiles\y73yivh7.default-1408590376909\extensions.json.bak 2014-12-09 13:36:34.300 1,232 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\GeneralSettings.bak 2014-12-11 23:38:56.063 1,081 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\LiveUpdate.bak 2014-12-09 13:36:34.341 1,045 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RegistryCleaner.bak 2014-12-11 23:38:58.064 989 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RescueCenter.bak 2014-12-04 23:56:57.800 2,089 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\Statistics\REGISTRY_CLEANER.bak 2014-09-07 13:33:52.768 0 C:\Users\Galloway\Music\91F61065-CF82.tmp 2013-12-21 04:03:25.877 0 C:\Users\Public\Music\91F61065-CF82.tmp 2014-11-22 13:49:47.146 0 C:\Windows\System32\drivers\etc\hosts_PTBackup.bak 2014-11-22 13:33:54.594 837 C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak 2005-07-02 17:57:28.000 4,204 C:\Z_UserFiles\Unkn\BAK_000\settings.bak Thank you!
  3. Thank you for the clarification.....
  4. Edit needed. [Yahoo Messenger Logs*] Needs to exclude: %ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG as that file is used to remove Yahoo Messenger .....
  5. mklink /d \My Programs\JDownloader v2\ %ProgramFiles%\JDownloader v2\ Is what I would need?
  6. [JDownloader2 Logs*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 DetectFile=%ProgramFiles%\JDownloader 2\ Default=False FileKey1=%ProgramFiles%\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE FileKey2=%ProgramFiles%\JDownloader*2*\logs|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.* FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\logs|*.*|RECURSE FileKey5=C:\My Programs\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE FileKey6=C:\My Programs\JDownloader*2*\logs|*.*|RECURSE : added FileKey5 and 6 [JDownloader2 Temps*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 DetectFile=%ProgramFiles%\JDownloader 2\ Default=False FileKey1=%ProgramFiles%\JDownloader*2*\tmp|*.*|RECURSE FileKey2=%ProgramFiles%\JDownloader*2*\captchas|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\tmp|*.*|RECURSE FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\captchas|*.*|RECURSE FileKey5=%ProgramFiles%\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey6=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey7=C:\My Programs\JDownloader*2*\captchas|*.*|RECURSE FileKey8=C:\My Programs\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey9=C:\My Programs\JDownloader*2*\tmp|*.*|RECURSE ExcludeKey1=%ProgramFiles%\JDownloader*2*\cfg\subconf_*.ejs ExcludeKey2=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg\subconf_*.ejs ExcludeKey3=C:\My Programs\JDownloader*2*\cfg\subconf_*.ejs : added FileKeys 7-9 and ExcludeKey3
  7. I have JDownloader2 installed in C:\My Programs\JDownloader v2.0\ - I do however have the HKLM\... key. would it be possible to add the C:\My Programs\JDownloader v2.0 as additional filekeys to all the JDownloader2 entries? Or what is the best way to do it? I have it installed there instead of %ProgramFiles% sicne it does modify the contents of the folder.....
  8. you didn't notice that one had \VirtualStore\ - but I do agree at least one path is entirely wrong.... I have found these on my PC: C:\ProgramData\Mozilla\logs That is the only one that has "*\Mozilla\logs"
  9. Need to add entry for Yahoo Messenger Photo Sharing cache: [Yahoo Messenger Photo Sharing cache] LangSecRef=3022 Detect1=HKCU\Software\Yahoo\pager Warning=Selecting this will remove all your Yahoo Messenger Photo Sharing photos. Default=False FileKey1=%CommonAppData%\Yahoo!\Messenger\PhotoSharing|*.*|RECURSE current Winapp2.ini has: [Yahoo Messenger Cache*] LangSecRef=3022 DetectFile=%ProgramFiles%\Yahoo!\Messenger\YahooMessenger.exe Detect1=HKCU\Software\Yahoo Detect2=HKCU\Software\Yahoo\pager Default=False FileKey1=%AppData%\Yahoo!\Messenger|*.*|RECURSE FileKey2=%LocalAppData%\VirtualStore\*\Yahoo!\Messenger\Cache|*.*|RECURSE Suggest removing DetectFile and Detect1 and rename Detect2 to Detect1
  10. When I installed JDownloader2 I accepted the defaults for the install path. The JDownloader2 entries have not been showing up. Can a Detect2 be added for: C:\Users\[username]\AppData\Local\JDownloader v2.0\ please? Also there is NO JDownloader* sub-folder in %LocalAppData%\VirtualStore\
  11. I suggest you look at this thread - a newer 4.18 has been released. http://forum.piriform.com/index.php?showtopic=41860
  12. I contacted JDownloader support and sent the rules for comment; this is what he replied: ProgramFiles%\JDownloader\.junique <<--- do not remove as it will destroy *instance* detection. can lead to starting jdownloader twice Program Files*\JDownloader\captchas <<<-- should be clean, no need to remove (only in case when jd crashes, files might be left) log folder does clean itself (only keeps last x items) and no logs -> hard to help in case of problems tmp folder -> will cause longer start times as jdownloader needs to create plugin cache again and again
  13. Be nice if http://board.jdownloader.org/showthread.php?p=308146#post308146 could be translated.... LOL.....
  14. It depends what version of JDownloader you have - if JDownloader1 there will bw no %LocalAppData%\JDownloader*2*\ folder but if you have JDownloader 2 you wil have %LocalAppData%\JDownloader*2*\ ..... I don't think OS version even matters here... just program version....
  15. Looking over the entries closer - the JDownloader2 install forces into %LocalAppData% so I have made the necessary modifications and have contacted support to verify if this is all the cleaning that can be done. so far it's just: [JDownloader2 Logs*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 Default=False FileKey1=%LocalAppData%\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE FileKey2=%LocalAppData%\JDownloader*2*\logs|*.*|RECURSE [JDownloader2 Temps*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 Default=False FileKey1=%LocalAppData%\JDownloader*2*\tmp|*.*|RECURSE FileKey2=%LocalAppData%\JDownloader*2*\captchas|*.*|RECURSE ; ; Be carefull to add files from the cfg folder!!! User settings! ; Please exclude subconf_*.ejs ; files ; FileKey3=%LocalAppData%\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json
  16. There seems to still be a lot of old files (Yahoo Messenger, for example) in %LocalAppStore%\VirtualStore\ so I have done an enhanced listing of the files - to be added to a winapp2.ini entry or modified to be included in other rules. VirtualStore.txt
  17. Forgot the entries at http://forum.piriform.com/index.php?showtopic=32310&page=226&do=findComment&comment=253384
  18. Do you have JDownloader2 installed? Have you used Regedit to search for JDownloader2 ?
  19. HKEY_CLASSES_ROOT\JDownloader2 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\JDownloader2 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\jdownloader2 Pick your poison....
  20. What does the program say it's cleaning when it's stuck at 14% ?
  21. I also made a list of the folders under %appdata% that were empty. After the deletions were done I could not use Internet Explorer - so I am not sure which would be safe to remove. Anyway here is the list attached.... a.txt
×
×
  • Create New...