SMalik Posted December 20, 2014 Share Posted December 20, 2014 I'm super tired right now but this entry is in winapp2.ini at the moment [Windows Service Control Manager Logs*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%WinDir%\system32\LogFiles\Scm\|SCM.EVM*|RECURSE and it looks pretty similar My entry was better because I excluded the files that are locked. But now it does not matter because I think Microsoft has removed Scm logging from Windows in the latest update. Link to comment Share on other sites More sharing options...
SMalik Posted December 20, 2014 Share Posted December 20, 2014 Please correct the LangSecRef (from 3021 to 3023) of the programs listed below. [Adobe Photoshop Elements 11*] [Adobe Photoshop Elements 12 More*] [Adobe Photoshop Elements 13*] [Adobe Photoshop Elements Sync Agent*] [Adobe Premiere Elements 11*] [Adobe Premiere Elements 12 More*] [Adobe Premiere Elements 13*] [Adobe Premiere Elements 9.0*] [Adobe Premiere Pro CC More*] [PhotoZoom Pro 6*] Link to comment Share on other sites More sharing options...
SMalik Posted December 20, 2014 Share Posted December 20, 2014 Like I said before, the [iPhone Temporary Files*] should be removed. If we really want to keep it, then I think we should merge it with [iTunes Temp Files*]. [iTunes Temp Files*] LangSecRef=3023 Detect=HKLM\Software\Apple Computer, Inc.\iTunes Default=False FileKey1=%Music%\iTunes|*.tmp|RECURSE FileKey2=%CommonAppData%\Apple Computer\iTunes\iPhone Temporary Files|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\ProgramData\Apple Computer\iTunes\iPhone Temporary Files|*.*|RECURSE Link to comment Share on other sites More sharing options...
SMalik Posted December 20, 2014 Share Posted December 20, 2014 Revised Entry Changed the Detect [Registry First Aid 9*] LangSecRef=3024 Detect=HKCU\Software\KsL Software\RFA\9.0 Default=False FileKey1=%ProgramFiles%\RFA 9|*.diz;*.url FileKey2=%LocalAppData%\VirtualStore\Program Files*\RFA 9|*.diz;*.url New Entry [Registry First Aid 10*] LangSecRef=3024 Detect=HKCU\Software\KsL Software\RFA\10.0 Default=False FileKey1=%ProgramFiles%\RFA 10|*.diz;*.url FileKey2=%LocalAppData%\VirtualStore\Program Files*\RFA 10|*.diz;*.url Link to comment Share on other sites More sharing options...
CSGalloway Posted December 21, 2014 Share Posted December 21, 2014 I searched the %systemdrive% for both TMP and BAK files and would like suitable entries to be made - even if merged with the existing winapp2.ini ones.... 2011-02-11 12:00:42.742 8,192 C:\BOOTSECT.BAK 2014-12-21 01:37:29.552 544 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$IRAYQ8C.TMP 2014-12-20 23:58:12.675 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RDTQ5QN.TMP 2014-12-21 02:15:29.130 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RZ472UH.TMP 2014-09-28 17:06:26.579 64,306 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\Preferences.bak 2014-12-11 23:29:29.989 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83D6.tmp 2014-12-11 23:29:30.005 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E8.tmp 2014-12-11 23:29:30.006 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E9.tmp 2014-12-11 23:29:30.029 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83EA.tmp 2014-12-11 23:29:30.046 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\841A.tmp 2014-12-11 23:28:38.734 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BB90.tmp 2014-12-11 23:28:38.746 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA2.tmp 2014-12-11 23:28:38.748 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA3.tmp 2014-03-07 13:58:02.929 46,862 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak 2014-04-19 14:13:25.654 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp 2014-04-19 14:03:10.483 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp 2014-04-19 14:03:10.485 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp 2014-04-19 14:03:10.487 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp 2014-04-19 14:03:10.501 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp 2014-02-22 15:56:15.099 235,550 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp 2014-04-24 19:32:45.519 235,566 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp 2014-01-03 16:23:32.114 235,478 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp 2011-03-24 21:08:09.410 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp 2011-03-24 21:08:09.425 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp 2011-03-24 21:08:09.472 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp 2011-03-24 21:08:09.488 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp 2011-03-24 21:08:09.347 216,229 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp 2011-03-24 21:08:09.394 159,852 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp 2014-12-20 07:13:46.564 33,554,583 C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak 2002-10-17 20:23:16.000 8,200 C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK 2014-09-28 17:06:26.579 64,306 C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\Preferences.bak 2014-12-20 22:11:45.504 524,288 C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp 2014-12-20 22:12:09.787 0 C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp 2014-10-31 19:29:25.067 5,540 C:\Users\Galloway\AppData\Roaming\Mozilla\Firefox\Profiles\y73yivh7.default-1408590376909\extensions.json.bak 2014-12-09 13:36:34.300 1,232 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\GeneralSettings.bak 2014-12-11 23:38:56.063 1,081 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\LiveUpdate.bak 2014-12-09 13:36:34.341 1,045 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RegistryCleaner.bak 2014-12-11 23:38:58.064 989 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RescueCenter.bak 2014-12-04 23:56:57.800 2,089 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\Statistics\REGISTRY_CLEANER.bak 2014-09-07 13:33:52.768 0 C:\Users\Galloway\Music\91F61065-CF82.tmp 2013-12-21 04:03:25.877 0 C:\Users\Public\Music\91F61065-CF82.tmp 2014-11-22 13:49:47.146 0 C:\Windows\System32\drivers\etc\hosts_PTBackup.bak 2014-11-22 13:33:54.594 837 C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak 2005-07-02 17:57:28.000 4,204 C:\Z_UserFiles\Unkn\BAK_000\settings.bak Thank you! Link to comment Share on other sites More sharing options...
siliconman01 Posted December 21, 2014 Share Posted December 21, 2014 My entry was better because I excluded the files that are locked. But now it does not matter because I think Microsoft has removed Scm logging from Windows in the latest update. I am seeing newly created log entries in the Scm folder with Windows 8.1.1 x64 Professional with all the latest hotfixes for Windows 8.1 Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
Winapp2.ini Posted December 21, 2014 Author Share Posted December 21, 2014 Maybe he means Windows 10? winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
SMalik Posted December 21, 2014 Share Posted December 21, 2014 Maybe he means Windows 10? I'm talking about Windows 8.1. Link to comment Share on other sites More sharing options...
SMalik Posted December 21, 2014 Share Posted December 21, 2014 I am seeing newly created log entries in the Scm folder with Windows 8.1.1 x64 Professional with all the latest hotfixes for Windows 8.1 Install November 2014 update rollup for Windows and then check. http://support.microsoft.com/kb/3000850 Link to comment Share on other sites More sharing options...
siliconman01 Posted December 21, 2014 Share Posted December 21, 2014 Install November 2014 update rollup for Windows and then check. http://support.microsoft.com/kb/3000850 I have had that rollup installed since it was first issued...on all my Windows 8.1.1 x64 Pro machines. All MS updates are current on my machines...Windows 8.1.1 x64 and Windows 10 x64 Technical Preview. On a system startup, I get 131 log files entered into the Scm folder. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
dvdbane Posted December 22, 2014 Share Posted December 22, 2014 Suggestion replace [search Everything*] and [Everything (History)*] with [Everything (History and Log)*] i don't like the name..people might think it will delete all history and logs inside windows..any suggestion? [Everything Search Engine*] ? [Everything (History and Log)*] LangSecRef=3024 DetectFile1=%ProgramFiles%\Everything DetectFile2=%AppData%\Everything Default=False FileKey1=%AppData%\Everything|*.csv FileKey2=%AppData%\Everything|*.txt FileKey3=%ProgramFiles%\Everything|*.csv FileKey4=%ProgramFiles%\Everything|*.txt FileKey5=%LocalAppData%\VirtualStore\Program Files*\Everything|*.txt ESET NOD32 Antivirus*] combine with [ESET Smart Security*] remove beta from entry name [Malwarebytes Anti-Exploit*] LangSecRef=3024 DetectFile=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit Default=False FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit|*.log FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes Anti-Exploit|*.log combine [sUMo Database*] with [sUMo*] [SUMo Database*] LangSecRef=3024 Detect=HKCU\Software\KC Softwares\SUMo Default=False FileKey1=%AppData%\KC Softwares\SUMo|db.sumo FileKey2=%AppData%\KC Softwares\SUMo|db.bak need to exclude from Logs* because Adguard extension need to be reinstall to make it work again ------------------------------------------------------------------------------------------ Google Chrome - Logs* 13 KB 14 files ------------------------------------------------------------------------------------------ C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\lib\pages\log.js 2 KB C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\lib\utils\log.js 1 KB C:\Users\user\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\bgnkhhnnamicmpeenaelnjfhikgbkllg\1.0.3.6_0\pages\log.html 2 KB change LangSecRef=3029 to LangSecRef=3021 [DataTron 7*] LangSecRef=3021 DetectFile=%ProgramFiles%\DataTron7 Default=False FileKey1=%ProgramFiles%\DataTron7|*.GID;*.BAK FileKey2=%LocalAppData%\VirtualStore\Program Files*\DataTron7|*.GID;*.BAK Link to comment Share on other sites More sharing options...
ROCKNROLL Posted December 23, 2014 Share Posted December 23, 2014 [Windows Live OneCare*]LangSecRef=3022Detect=HKLM\Software\Microsoft\OneCare ProtectionFileKey1=%LocalAppData%\Microsoft\Windows Live OneCare Saftey Scanner|*.sqm|RECURSE I know I recommended this in the past, but is it really worth keeping Windows Live OneCare in here? The program was a paid for app that has been discontinued for a long time. Also, I think we can remove Windows ME entry, as well, since CCleaner hasn't supported Windows ME for many years now (did it ever?). [Windows ME*]LangSecRef=3025DetectFile=%WinDir%\WINFILE.EXEFileKey1=%SystemDrive%|SCANDISK.LOGFileKey2=%WinDir%|*.tmpFileKey3=%WinDir%\Application Data|dw.logFileKey4=%WinDir%\All Users\Application Data\Spybot - Search & Destroy\Logs|*.*FileKey5=%WinDir%\APPLOG|*.LGCFileKey6=%WinDir%\Windows Update Setup Files|*.* I am a maintainer for Winapp2. I also have a open-source group on Steam. http://steamcommunity.com/groups/opencommunity Link to comment Share on other sites More sharing options...
Moderators Andavari Posted December 23, 2014 Moderators Share Posted December 23, 2014 Also, I think we can remove Windows ME entry, as well, since CCleaner hasn't supported Windows ME for many years now (did it ever?). It did support it although I can't remember if winapp2.ini support was around back then. I remember using CCleaner on Win98, in particular v2.36.1233 (the last version that supported Win98). Link to comment Share on other sites More sharing options...
SMalik Posted December 24, 2014 Share Posted December 24, 2014 Revised Entries Changed the 'Detect' from HKCU to HKLM Adobe Reader XI creates a registry key (HKEY_CURRENT_USER\Software\Adobe\Adobe Acrobat\11.0) and CCleaner detects Acrobat even though there is no Acrobat installed on this system. I also changed the name from [Adobe Reader 11.0 More*] to [Adobe Reader XI More*] Can you please ask Piriform to correct [Adobe Acrobat XI] and [Adobe Reader 11.0] in CCleaner? [Adobe Acrobat XI More*] LangSecRef=3021 Detect=HKLM\Software\Adobe\Adobe Acrobat\11.0 Default=False FileKey1=%LocalAppData%\Adobe\Acrobat|*.idx|RECURSE FileKey2=%LocalAppData%\Adobe\Acrobat\11.0|UserCache.bin FileKey3=%LocalAppData%\Adobe\Acrobat\11.0\Cache|*.* [Adobe Reader XI More*] LangSecRef=3021 Detect=HKLM\SOFTWARE\Adobe\Acrobat Reader\11.0 Default=False RegKey1=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionFromPDF RegKey2=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionToPDF RegKey3=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cDockables RegKey4=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cToolbars RegKey5=HKCU\Software\Adobe\Acrobat Reader\11.0\RememberedViews\cNoCategoryFiles RegKey6=HKCU\Software\Adobe\Adobe Synchronizer\11.0 Link to comment Share on other sites More sharing options...
Winapp2.ini Posted December 24, 2014 Author Share Posted December 24, 2014 It did support it although I can't remember if winapp2.ini support was around back then. I remember using CCleaner on Win98, in particular v2.36.1233 (the last version that supported Win98). The first version of CCleaner with winapp2.ini support was 2.06.567 released March 25, 2008! (You'll note that I registered my name on the forums a bit more than two months later ) winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
SMalik Posted December 25, 2014 Share Posted December 25, 2014 Revised Entries Changed entries names. Current names look unprofessional. [Adblock Plus*] LangSecRef=3026 SpecialDetect=DET_MOZILLA Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockplus|patterns-backup*.ini;*.tmp [Adblock Plus for IE*] LangSecRef=3022 Detect=HKLM\Software\Adblock Plus for IE DetectFile=%LocalAppData%\Adblock Plus for IE Default=False FileKey1=%LocalAppData%\Adblock Plus for IE|patterns-backup*.ini FileKey2=%LocalLowAppData%\Adblock Plus for IE|patterns-backup*.ini FileKey3=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Adblock Plus for IE|patterns-backup*.ini Link to comment Share on other sites More sharing options...
SMalik Posted December 25, 2014 Share Posted December 25, 2014 Revised Entry Now it removes leftover empty folders of the installers. [Apple Installer Cache*] LangSecRef=3023 Detect=HKCU\Software\Apple Computer, Inc. Default=False Warning=You have to reinstall iTunes after adding a new windows user account. FileKey1=%CommonAppData%\Apple\Installer Cache|*.*|REMOVESELF FileKey2=%CommonAppData%\Apple Computer\Installer Cache|*.*|REMOVESELF Link to comment Share on other sites More sharing options...
SMalik Posted December 25, 2014 Share Posted December 25, 2014 I think [Adobe Updater ARM*] & [Adobe Updater Logs*] should be merged into one entry as both are part of the Adobe Updater service. Added: %ProgramFiles%\Common Files\Adobe\Installers|*.*|RECURSE This location holds Adobe patch logs. http://pho.to/8SQfV [Adobe Updater*] LangSecRef=3021 Detect=HKCU\Software\Adobe Default=False FileKey1=%ProgramFiles%\Common Files\Adobe\Installers|*.*|RECURSE FileKey2=%CommonAppData%\Adobe\ARM|*.*|RECURSE FileKey3=%LocalAppData%\Adobe\AAMUpdater|*.Log|RECURSE FileKey4=%LocalAppData%\Adobe\Updater*|*.log|RECURSE FileKey5=%LocalAppData%\Adobe\Acrobat\*\Updater|*.log FileKey6=%AppData%\Adobe\LogTransport*\Logs|ulog_*.tmp FileKey7=%AppData%\Adobe\Acrobat\*\Updater|*.log Link to comment Share on other sites More sharing options...
SMalik Posted December 26, 2014 Share Posted December 26, 2014 Revised Entry Changed LangSecRef from 3021 to 3023 [CyberLink Install Temps*] LangSecRef=3023 DetectFile=%CommonAppData%\install_clap Default=False FileKey1=%CommonAppData%\install_clap|*.*|REMOVESELF Link to comment Share on other sites More sharing options...
LipkeGu Posted December 27, 2014 Share Posted December 27, 2014 Microsoft Deployment Toolkit Is a Deployment Solution (The little Brother of the System Center Config Manager) and Downloads some files (Setup files) to its Installation Directory. [Microsoft Deployment Toolkit*] LangSecRef=3024 DetectFile="%ProgramFiles%\Microsoft Deployment Toolkit" Default=False FileKey1=%ProgramFiles%\Microsoft Deployment Toolkit\Downloads|*.*|RECURSE Warning=To Get a new Component list, check for Updates in the Management Console! Dr. Kaiser - DKS DKS can protect System on Hardware area ... (PCI Cards can Freez a state of the System) and reset it on System Boot. Some Log files will also written. It is used on Schools. Also Software Testers are using this Technicals to test Software . [Dr. Kaiser - (DKS) PC Wächter*] LangSecRef=3024 DetectFile=%windir%\DKSService.exe Default=False FileKey1=%windir%|DksSystem.log Microsoft Message Analyzer - Logs - Traces - App configuration - otherwise we get an error when we click on recent Traces! [Microsoft Message Analyzer*] LangSecRef=3024 DetectFile=%LocalAppData%\Microsoft\MessageAnalyzer Default=False FileKey1=%Documents%\MessageAnalyzer\Traces|*.*|RECURSE FileKey2=%LocalAppData%\Microsoft\MessageAnalyzer|*.log FileKey3=%AppData%\Microsoft\MessageAnalyzer|*.cfg Warning=This will remove Traces, Logs and remove the Configuration! OpenRA Please Replace "[OpenRA*]" with this ... Logs is atm useless they will created each time when you run the Game :/ Replays makes a little bit more sense [OpenRA*] Section=Games DetectFile=%Documents%\OpenRA Default=False FileKey1=%Documents%\OpenRA\Replays|*.*|RECURSE FileKey2=%Documents%\OpenRA\Logs|*.* Warning=This will also remove your Replays! Link to comment Share on other sites More sharing options...
APMichael Posted December 27, 2014 Share Posted December 27, 2014 (edited) Revised Entry Now it removes leftover empty folders of the installers. [Apple Installer Cache*] LangSecRef=3023 Detect=HKCU\Software\Apple Computer, Inc. Default=False Warning=You have to reinstall iTunes after adding a new windows user account. FileKey1=%CommonAppData%\Apple\Installer Cache|*.*|REMOVESELF FileKey2=%CommonAppData%\Apple Computer\Installer Cache|*.*|REMOVESELF Please do not modify this entry! If you delete the (latest) folders also, QuickTime (and probably iTunes) recognizes this and wants to start a repair installation. Last post about that issue: #3556. @Winapp2.ini: Please ignore my post. REMOVESELF works flawless now. Edited December 28, 2014 by APMichael Link to comment Share on other sites More sharing options...
SMalik Posted December 27, 2014 Share Posted December 27, 2014 Please do not modify this entry! If you delete the (latest) folders also, QuickTime (and probably iTunes) recognizes this and wants to start a repair installation. Last post about that issue: #3556. I have the latest versions of QuickTime and iTunes on my system (Win 8.1 64-bit). I am not seeing any issue after removing the left over empty installer folders. Link to comment Share on other sites More sharing options...
bawldiggle Posted December 27, 2014 Share Posted December 27, 2014 LaunchCC.bat Link Click here for LaunchCC.bat in "Advanced Usage and Trimming" (spoiler) in OP #1 presents as Error 403 - same result using mozilla browser (Palemoon) and MS IE - and at http://www.winapp2.com/downloads.html Forbidden You don't have permission to access /LaunchCC.bat on this server. Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request. I am logged into Piriform forum ? --------------- Have been using CCleaner for years but only discovered Winapp2.ini to day Link to comment Share on other sites More sharing options...
SMalik Posted December 28, 2014 Share Posted December 28, 2014 New Entries [Corel PaintShop Pro X7*] LangSecRef=3023 Detect=HKCU\Software\Corel\PaintShop Pro\X7 Default=False FileKey1=%LocalAppData%\Corel PaintShop Pro\17.0\Cache|*.* FileKey2=%LocalAppData%\Corel PaintShop Pro\17.0\Database|*.db RegKey1=HKCU\Software\Corel\PaintShop Pro\X7\CoreMemoryManager\0 [Corel PaintShop Pro X7 (AutoPreserve)*] LangSecRef=3023 Detect=HKCU\Software\Corel\PaintShop Pro\X7 Default=False FileKey1=%Pictures%\Corel Auto-Preserve|*.* [Corel VideoStudio Pro X7*] LangSecRef=3023 Detect=HKCU\Software\Ulead Systems\Corel VideoStudio Pro\17.0 Default=False FileKey1=%Documents%\Corel VideoStudio Pro\17.0\AudioTmp|*.* FileKey2=%Documents%\Corel VideoStudio Pro\17.0\SmartProxy|*.* RegKey1=HKCU\Software\Ulead Systems\Corel VideoStudio Pro\17.0\HerRFL Link to comment Share on other sites More sharing options...
SMalik Posted December 28, 2014 Share Posted December 28, 2014 I think we should change these entries names. From: [MS Word 2007/10/13 Document Building Blocks*] To: [MS Document Building Blocks*] LangSecRef=3021 DetectFile=%AppData%\Microsoft\Document Building Blocks Default=False FileKey1=%AppData%\Microsoft\Document Building Blocks|*.*|RECURSE From: [Norton Security & Norton Internet Security 2012/13/14 Dumps*] To: [Norton Dumps*] LangSecRef=3024 DetectFile=%CommonAppData%\Norton\LocalDumps Default=False FileKey1=%CommonAppData%\Norton\LocalDumps|*.dmp FileKey2=%LocalAppData%\VirtualStore\ProgramData\Norton\LocalDumps|*.dmp Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now