You should probably PM the official Piriform bug fixer MrT with this addition since Microsoft AntiMalware is already included in CCleaner by default and can be updated if he deems it safe.
Also that location to clean in WinXP would need this added as a FileKey2 path (albeit that LocalCopy folder is empty on my system and I haven't a clue what it's for):
In that folder located malware detected by MSE. I think only malware for transferring into Microsoft Malware Protection Center, cuz quarantine is located in %ProgramData%\Microsoft\Microsoft Antimalware\Quarantine. It's safe to delete.
The LocalCopy directory is a working directory that holds a local copy of detected threats. For instance when I downloaded the eicar.com test file, the detailed information for the detection specified:
file:C:\Documents and Settings\Greg\Desktop\eicar.com
filelocalcopy:C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\<GUID>-eicar.com
webfile:C:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\LocalCopy\<GUID>-eicar.com|http://www.eicar.org/download/eicar.com
webfile:C:\Documents and Settings\Greg\Desktop\eicar.com|http://www.eicar.org/download/eicar.com
The file specified as the local copy was present in the LocalCopy folder after the detection, but was removed upon cleaning the eicar.com file on the desktop. To test whether the local copy was an active copy of the file, I saved it in another folder, and then scanned it after the desktop file had been cleaned. The local copy was detected as eicar.com. So in this case it looks like some glitch or bug prevented the local copies from being removed along with the originals as they should have been.
I have several other files in this directory that I suspect might be local copies of heuristic detections that were saved for submission to the Dynamic Signature Service, but that?s only speculation on my part. The only detection I?ve had in this folder was by the Kaspersky Online Scanner, when I did some double-checking for things that Security Essentials might have missed. That detection would also tend to confirm that the local copies are active.
I use Windows XP and recently tried to remove Windows Live Essentials. The uninstall EXE could not be found. I usually run CCleaner with [Windows Live Messenger More*] selected. I looked in the registry and saw the pertinent files for the uninstall are in:
folders. Can a warning be added to he entry warning that if selected the user will no longer be able top remove any Windows Live Essential product? Or if not delete the two entries in the Winapp2.ini please?
Also can the revised file be posted soon - at least for4 the Secunia PSI modification I posted a few hours earlier? Thank you.