Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

  • Moderators

 

I guess mentioning other party tools is against the rules?  Sorry.
I have no idea what tool you could be talking about. This site has no knowledge of any enhancing softwares which use the winapp2 template which also is only distributed as any example. [/mumstheword]

 

I have heard people are having troubles downloading other files like Trim.bat - so I think it's a access rule that is not correct...
No, .bat files are just fragged on the winnapp2 site. All of his text based files work fine.

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Modified entry:  [snagIt 12 More*]  Removed *.sdf from FileKey1.  This is causing CCleaner to remove a file named Snagit900.sdf which contains the address of where SnagIt stores pictures during the capture.   See pic below

[Snagit 12 More*]
LangSecRef=3024
Detect=HKCU\Software\TechSmith\SnagIt\12
Default=False
Warning=This will delete the backups of the captures that you have performed with SnagIt 12.
; FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.sdf;*.SNAG;*.SNAGundo;*.MP4
FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4
FileKey2=%Documents%\|SnagItDebug.log
RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount
RegKey2=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

I am getting these 2 entires on my system, even though I have never had these on my system before:

 

[Google Chrome ART*]
LangSecRef=3022
SpecialDetect=DET_CHROME
FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak
FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE

 

[Adblock Edge For Firefox*]
LangSecRef=3026
SpecialDetect=DET_MOZILLA
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockedge|patterns-backup*.ini;*.tmp

I am a maintainer for Winapp2. I also have a open-source group on Steam.

http://steamcommunity.com/groups/opencommunity

Link to comment
Share on other sites

  • Moderators
I am getting these 2 entires on my system, even though I have never had these on my system before:

 

[Google Chrome ART*]

LangSecRef=3022

SpecialDetect=DET_CHROME

FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak

FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE

 

[Adblock Edge For Firefox*]

LangSecRef=3026

SpecialDetect=DET_MOZILLA

FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockedge|patterns-backup*.ini;*.tmp

Do you have chrome and firefox installed at all? Both are detecting the existence of browsers

 

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Yes, I have firefox. I have never had Chrome or Adblock Edge. I have Adblock Plus, though.

did you mean you got no other chrome entries except [Google Chrome ART*]?

the detect used in both entries make it to appear whenever ff or chrome installed and if any related folder or registry exist

Link to comment
Share on other sites

  • Moderators

Yes the firefox will be discovered and will show all of the additional winapp2. If you don't want the entry remove it from your ini (like you're supposed to ;-) )

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

[Adblock * For Firefox*]
LangSecRef=3026
SpecialDetect=DET_MOZILLA
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblock*|patterns-backup*.ini;*.tmp
 - combine adblock plus and adblock edge entry
 
[bookmark Backups*]
LangSecRef=3026
SpecialDetect=DET_MOZILLA
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\bookmarkbackups|*.json* 
 - change FileKey1 to detect *.jsonlz4
 
some changes to chrome entries
require some comment regarding whether SpecialDetect=DET_CHROME can detect Chrome SxS, Chrome Plus, Chromium, Flock, RockMelt, SRWare Iron
or maybe mod can help list all detection in DET_CHROME by asking the dev
most of the entry got the same detect like this and i change almost all entry to follow it
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\Superbird

[Application Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\Superbird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Application Cache|*.*|REMOVESELF
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Application Cache|*.*|REMOVESELF
FileKey3=%LocalAppData%\Chromium\User Data\*\Application Cache|*.*|REMOVESELF
FileKey4=%LocalAppData%\Flock\User Data\*\Application Cache|*.*|REMOVESELF
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Application Cache|*.*|REMOVESELF
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Application Cache|*.*|REMOVESELF
FileKey7=%LocalAppData%\Torch\User Data\*\Application Cache|*.*|REMOVESELF
FileKey8=%LocalAppData%\SuperBird\User Data\*\Application Cache|*.*|REMOVESELF
 - remove FileKey5 and FileKey6 as FileKey1 should cover both Chrome and Chrome SxS
 
[bookmark Backup*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*|*Bookmarks.bak
FileKey2=%LocalAppData%\Chrome Plus\User Data\*|*Bookmarks.bak
FileKey3=%LocalAppData%\Chromium\User Data\*|*Bookmarks.bak
FileKey4=%LocalAppData%\Flock\User Data\*|*Bookmarks.bak
FileKey5=%LocalAppData%\Rockmelt\User Data\*|*Bookmarks.bak
FileKey6=%LocalAppData%\SRWare Iron\User Data\*|*Bookmarks.bak
FileKey7=%LocalAppData%\Torch\User Data\*|*Bookmarks.bak
FileKey8=%LocalAppData%\SuperBird\User Data\*|*Bookmarks.bak
 - use Chrome* to detect both Chrome and Chrome SxS
 
[ART*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak
FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE
 - change to LangSecRef=3029
 
[backup*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\Application|old_chrome.exe
FileKey2=%ProgramFiles%\Google\Chrome*\Application|old_chrome.exe
 
[GPU Cache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\GPUCache|*.*
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\GPUCache|*.*
FileKey3=%LocalAppData%\Chromium\User Data\*\GPUCache|*.*
FileKey4=%LocalAppData%\Flock\User Data\*\GPUCache|*.*
FileKey5=%LocalAppData%\Rockmelt\User Data\*\GPUCache|*.*
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\GPUCache|*.*
FileKey7=%LocalAppData%\Torch\User Data\*\GPUCache|*.*
FileKey8=%LocalAppData%\SuperBird\User Data\*\GPUCache|*.*
 - use Chrome* to detect both Chrome and Chrome SxS
 
[html5 Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE
 - use Chrome* to detect both Chrome and Chrome SxS
 
[indexedDB*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\IndexedDB|*.*|RECURSE
 - change [Extensions Databases*] to [Chrome IndexedDB*]
 
[installer*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
Warning=Running this may remove Chrome's ability to automatically update to future versions on some computers.
FileKey1=%LocalAppData%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE
FileKey2=%ProgramFiles%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE
FileKey3=%LocalAppData%\Google\Update\*\*\Installer|*.7z|RECURSE
FileKey4=%ProgramFiles%\Google\Update\*\*\Installer|*.7z|RECURSE
FileKey5=%ProgramFiles%\|GUT*tmp
 
[Logs*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\Application|debug.log
FileKey2=%LocalAppData%\Google\Chrome*\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey3=%LocalAppData%\Chrome Plus\Application|debug.log
FileKey4=%LocalAppData%\Chrome Plus\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey5=%LocalAppData%\Chromium\Application|debug.log
FileKey6=%LocalAppData%\Chromium\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey7=%LocalAppData%\Flock\Application|debug.log
FileKey8=%LocalAppData%\Flock\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey9=%LocalAppData%\Rockmelt\Application|debug.log
FileKey10=%LocalAppData%\Rockmelt\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey11=%LocalAppData%\SRWare Iron\Application|debug.log
FileKey12=%LocalAppData%\SRWare Iron\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey13=%LocalAppData%\Torch\Application|debug.log
FileKey14=%LocalAppData%\Torch\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey15=%LocalAppData%\SuperBird\Application|debug.log
FileKey16=%LocalAppData%\SuperBird\User Data\*|*LOG.*;Log;*.log|RECURSE
FileKey17=%LocalAppData%\VirtualStore\Program Files*\Google\Chrome\Application|debug.log
ExcludeKey1=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local Extension Settings\|*.*
ExcludeKey2=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local App Settings\|*.*
ExcludeKey3=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Extension\|*.*
ExcludeKey4=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local Extension Settings\|*.*
ExcludeKey5=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local App Settings\|*.*
ExcludeKey6=PATH|%LocalAppData%\Chrome Plus\User Data\*\Extension\|*.*
ExcludeKey7=PATH|%LocalAppData%\Chromium\User Data\*\Local Extension Settings\|*.*
ExcludeKey8=PATH|%LocalAppData%\Chromium\User Data\*\Local App Settings\|*.*
ExcludeKey9=PATH|%LocalAppData%\Chromium\User Data\*\Extension\|*.*
ExcludeKey10=PATH|%LocalAppData%\Flock\User Data\*\Local Extension Settings\|*.*
ExcludeKey11=PATH|%LocalAppData%\Flock\User Data\*\Local App Settings\|*.*
ExcludeKey12=PATH|%LocalAppData%\Flock\User Data\*\Extension\|*.*
ExcludeKey13=PATH|%LocalAppData%\Rockmelt\User Data\*\Local Extension Settings\|*.*
ExcludeKey14=PATH|%LocalAppData%\Rockmelt\User Data\*\Local App Settings\|*.*
ExcludeKey15=PATH|%LocalAppData%\Rockmelt\User Data\*\Extension\|*.*
ExcludeKey16=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local Extension Settings\|*.*
ExcludeKey17=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local App Settings\|*.*
ExcludeKey18=PATH|%LocalAppData%\SRWare Iron\User Data\*\Extension\|*.*
ExcludeKey19=PATH|%LocalAppData%\Torch\User Data\*\Local Extension Settings\|*.*
ExcludeKey20=PATH|%LocalAppData%\Torch\User Data\*\Local App Settings\|*.*
ExcludeKey21=PATH|%LocalAppData%\Torch\User Data\*\Extension\|*.*
ExcludeKey22=PATH|%LocalAppData%\Superbird\User Data\*\Local Extension Settings\|*.*
ExcludeKey23=PATH|%LocalAppData%\Superbird\User Data\*\Local App Settings\|*.*
ExcludeKey24=PATH|%LocalAppData%\Superbird\User Data\*\Extension\|*.*
 - add ExcludeKey3, 6, 9, 12, 15, 18, 21 and 24 to prevent problem with uBlock and other extension that might use "log" for the naming of their file
 - use Chrome* to detect both Chrome and Chrome SxS
 - correct filekey numbering
%LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\devtool-log.html
%LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\css\devtool-log.css
%LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\js\devtool-log.js
 
[Extensions State*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\Extension State|*.*|RECURSE
 - add missing Default=False
 
[Favicons*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
Warning=Your browser will re-index favicons for frequently visited sites and bookmarks.
FileKey1=%LocalAppData%\Google\Chrome*\User Data|Favicons;Favicons-journal|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data|Favicons;Favicons-journal|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data|Favicons;Favicons-journal|RECURSE
FileKey4=%LocalAppData%\Flock\User Data|Favicons;Favicons-journal|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data|Favicons;Favicons-journal|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data|Favicons;Favicons-journal|RECURSE
FileKey7=%LocalAppData%\Torch\User Data|Favicons;Favicons-journal|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data|Favicons;Favicons-journal|RECURSE
 - use Chrome* to detect both Chrome and Chrome SxS
 
[FlashPlayer AssetCache*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE
 
[FlashPlayer Settings*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE
 - use Chrome* to detect both Chrome and Chrome SxS
 
[FlashPlayer SharedObjects*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE
 
[History*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|History
 - add missing Default=False
 
[Local Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
DetectFile1=%LocalAppData%\Torch
DetectFile2=%LocalAppData%\SuperBird
Default=False
FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Local Storage|http*.*|RECURSE
FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Local Storage|http*.*|RECURSE
FileKey3=%LocalAppData%\Chromium\User Data\*\Local Storage|http*.*|RECURSE
FileKey4=%LocalAppData%\Flock\User Data\*\Local Storage|http*.*|RECURSE
FileKey5=%LocalAppData%\Rockmelt\User Data\*\Local Storage|http*.*|RECURSE
FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Local Storage|http*.*|RECURSE
FileKey7=%LocalAppData%\Torch\User Data\*\Local Storage|http*.*|RECURSE
FileKey8=%LocalAppData%\SuperBird\User Data\*\Local Storage|http*.*|RECURSE
 
[Quota Manager Data*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|QuotaManager
 - add missing Default=False
 
[search Engines Data*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|Web Data
 - add missing Default=False
 
[session Storage*]
LangSecRef=3029
SpecialDetect=DET_CHROME
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\Session Storage|*.*|RECURSE
 - add missing Default=False

 
[HP Install Logs*]
LangSecRef=3021
Detect=HKCU\Software\HP
DetectFile=%CommonAppData%\HP
Default=False
FileKey1=%CommonAppData%|hpzinstall.log
FileKey2=%SystemDrive%\Users\All Users|hpzinstall.log
FileKey3=%LocalAppData%\VirtualStore\ProgramData|hpzinstall.log
FileKey4=%AppData%\HP\WebRegLogs|WebRegLog.txt
FileKey5=%SystemDrive%\hp\bin\logs|*.log
FileKey6=%CommonAppData%\Hewlett-Packard|*.log*.*;*Log.txt|RECURSE
 - change from %UserProfile%\All Users|hpzinstall.log
 
[HP Install Temps*]
LangSecRef=3021
Detect=HKCU\Software\HP
DetectFile=%CommonAppData%\HP
Default=False
FileKey1=%CommonAppData%\HP\Installer\Temp|*.*
FileKey2=%CommonAppData%\HP\Temp|*.*
FileKey3=%ProgramFiles%\HP\Temp|*.*|RECURSE
FileKey4=%SystemDrive%\Users\All Users\HP\Installer\Temp|*.*
FileKey5=%LocalAppData%\VirtualStore\Program Files*\HP\Temp|*.*|RECURSE
FileKey6=%LocalAppData%\VirtualStore\ProgramData\HP\Installer\Temp|*.*
FileKey7=%LocalAppData%\VirtualStore\ProgramData\HP\Temp|*.*
FileKey8=%WinDir%|*.dat.temp
 - change from %UserProfile%\All Users\HP\Installer\Temp|*.*
 
remove double ** from the entry name

[360 Browser - Cache*]
LangSecRef=3029
Detect=HKCU\Software\360Browser\Browser
Default=False
FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default\Cache|*.*
FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|*-journal*
ExcludeKey1=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|switcher-journal
ExcludeKey2=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|Web data-journal
ExcludeKey3=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|Login data-journal
FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default\Local Storage|*.*
 
[360 Browser - Cookies*]
LangSecRef=3029
Detect=HKCU\Software\360Browser\Browser
Default=False
FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Cookies
 
[360 Browser - History*]
LangSecRef=3029
Detect=HKCU\Software\360Browser\Browser
Default=False
FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Archived History
FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|Visited Links
FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default|Current Tabs
FileKey4=%LocalAppData%\360Browser\Browser\User Data\Default|Top Sites
FileKey5=%LocalAppData%\360Browser\Browser\User Data\Default|History Provider Cache
FileKey6=%LocalAppData%\360Browser\Browser\User Data\Default|Network Action Predictor
 
[360 Browser - Session*]
LangSecRef=3029
Detect=HKCU\Software\360Browser\Browser
Default=False
FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Current*
FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|Last*

 
what about changing the winapp2.ini entries naming for browser entries to follow ccleaner internal rules naming
i already do the changes to chrome entries above

BJHNXxd.jpg

Link to comment
Share on other sites

 

Modified entry:  [snagIt 12 More*]  Removed *.sdf from FileKey1.  This is causing CCleaner to remove a file named Snagit900.sdf which contains the address of where SnagIt stores pictures during the capture.   See pic below

[Snagit 12 More*]
LangSecRef=3024
Detect=HKCU\Software\TechSmith\SnagIt\12
Default=False
Warning=This will delete the backups of the captures that you have performed with SnagIt 12.
; FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.sdf;*.SNAG;*.SNAGundo;*.MP4
FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4
FileKey2=%Documents%\|SnagItDebug.log
RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount
RegKey2=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder

 

The .sdf file holds 'Recents' and information about the saved location. All known privacy eraser programs wipe this file.

Link to comment
Share on other sites

Can we remove 'Chrome', 'Google Chrome', 'Firefox' and 'Mozilla' names from these entry names?

 

[Chrome Backup*]
[Chrome GPU Cache*]
[Chrome HTML5 Storage*]
[Chrome Installer*]
[Chrome Logs*]
[Google Chrome ART*]
[Firefox Corrupt SQLites*]
[Firefox HTML5 Storage*]
[Firefox Logs*]
[Firefox Minidumps*]
[Firefox Net Predictions*]
[Firefox Session Backups*]
[Firefox Startup Cache*]
[Firefox Telemetry*]
[Firefox TestPilot Error Logs*]
[Firefox Update Logs*]
[Firefox urlclassifier3.sqlite*]
[Firefox webappsstore.sqlite*]
[Mozilla Maintenance Service Logs*]
[Mozilla Nightly Backups*]
[Mozilla Temps*]
[Mozilla Updates*]

Link to comment
Share on other sites

Most of the ones that are prefixed with a browser like that are for reduced ambiguity when reading the file, and to avoid any naming conflicts (eg. Chrome Logs and Firefox Logs cannot both be named Logs or CCleaner displays both of them in the same LangSecRef)

Link to comment
Share on other sites

  • Moderators
I think we should have seperate Detects for Firefox and Chrome extensions.

If you can figure out how and to still have it detect every covered browser flavor and support customlocation Ccleaner.ini option go right ahead. In other words, and you can find all of this in this very thread, no we can't because it needs to support both those things.

 

#NotDevelopersRemember

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Most of the ones that are prefixed with a browser like that are for reduced ambiguity when reading the file, and to avoid any naming conflicts (eg. Chrome Logs and Firefox Logs cannot both be named Logs or CCleaner displays both of them in the same LangSecRef)

then keep it that way for entries like Chrome Logs and Firefox Logs

for others, i think that can be done

Link to comment
Share on other sites

Modified entry:  [Recent items*]  Modified warning message to show undesirable affect to the Windows 10 File Explorer Quick Access list.

[Recent Items More*]
LangSecRef=3025
DetectFile=%AppData%\Microsoft\windows\recent\customdestinations
Default=False
Warning=Running this will remove task lists from the start menu (the expandable triangle next to some applications. It also removes user pinned items to the Quick Access list of Windows 10 File Explorer.  
FileKey1=%AppData%\Microsoft\windows\recent\automaticdestinations|*.*|RECURSE
FileKey2=%AppData%\Microsoft\windows\recent\customdestinations|*.*|RECURSE

With the main program CCleaner starting to incorporate Windows 10, it seems appropriate to start modified Winapp2.ini to show Windows 10 items as well.

 

New entry:  [Cortana*]

[Cortana*]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Cortana_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\Microsoft.Cortana_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.Cortana_*\TempState|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\CryptnetUrlCache\Content|*.*
FileKey4=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*
FileKey5=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetCache|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetCookies|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetHistory|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Temp|*.*
FileKey9=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

New entry:  [Panther*]

 

Everything I read states the %Windir%\Panther directory can be safely removed.

 

http://answers.microsoft.com/en-us/windows/forum/windows_8-files/what-is-panther-file/b72d559a-7732-4d74-b361-397905c1e9b2

 

http://answers.microsoft.com/en-us/windows/forum/windows_7-files/what-is-panther-directory/424ed2df-ce11-4967-8f59-42ab9d6c9757

[Panther*]
LangSecRef=3025
DetectFile=%Windir%\Panther
Default=False
Warning=The Windows\Panther directory is created/used during a Windows version upgrade.  Following the upgrade, this directory can be safely removed.
FileKey1=%Windir%\Panther\|*.*|REMOVESELF

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Windows Live Mail WARNING!

 

Addition (removes backups and stuff that will be redownloaded):

[Windows Live Mail*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows Live Mail
Default=False
Warning=This will reset the read counts, which will be recalculated when WLMail is started.
FileKey1=%LocalAppData%\Microsoft\Windows*Mail|*.log;*.jrs;*.chk;*.rss|RECURSE
FileKey2=%LocalAppData%\Microsoft\Windows*Mail\Backup|*.*|REMOVESELF
FileKey3=%LocalAppData%\Microsoft\Windows*Mail\*\Backup|*.*|REMOVESELF
FileKey4=%LocalAppData%\Microsoft\Windows*Mail\Storage Folders|*.*|REMOVESELF
FileKey5=%LocalAppData%\Microsoft\Windows*Mail\*.tmp|*.*|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows*Mail\*|*.MSMessageStore|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion

 

Finally tracked this one down - recovered and imported Windows Live emails are routinely stored as *.eml files in various folders under "Storage Folders" - and the FileKey4 entry obliterates them completely leaving behind only an email header entry.

 

After almost a year of hearing friends and coworkers complain from time to time that their older emails were no longer readable, I finally tracked it down to this entry added in April 2014.  Since no one noticed it at the time (new emails don't go into this folder), any backups made since April are useless in efforts to recover the lost data.  Some people have lost years of email correspondence (a few lucky ones still had backups from before April).

 

Either remove the offending FileKey4 entry entirely or add an appropriate warning about the potential (I'd say almost certain) loss of emails!

Link to comment
Share on other sites

  • Moderators

I vote for removal if it causes this issue

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

New addition:  [The Weather Channel*]

[The Weather Channel*]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\TheWeatherChannel_t3yemqpq4kp7p
DetectFile=%LocalAppData%\Packages\Weather.TheWeatherChannel_t3yemqpq4kp7p
Default=False
FileKey1=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetCookies|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetHistory|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.log|RECURSE
FileKey5=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\Temp|*.*
FileKey6=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\LocalState|*.tmp
FileKey7=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\TempState\Bing.Maps\Cache|*.*|RECURSE

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Revised Entry

 

[iMobie PhoneClean*]
LangSecRef=3024
DetectFile=%AppData%\iMobie\PhoneClean
Default=False
FileKey1=%AppData%\iMobie\PhoneClean\AutoUpdate|*.*|RECURSE
FileKey2=%AppData%\iMobie\PhoneClean\DeviceBackup\Backup|*.*|RECURSE
FileKey3=%AppData%\iMobie\PhoneClean\DeviceBackup\Restore|*.*|RECURSE
FileKey4=%AppData%\iMobie\PhoneClean\EasyLoseFiles|*.*|RECURSE
FileKey5=%AppData%\iMobie\PhoneClean\ErrorLog|*.*|RECURSE
FileKey6=%AppData%\iMobie\PhoneClean\iMobieConfig|*.*|RECURSE
FileKey7=%AppData%\iMobie\PhoneClean\TempFiles|*.*|RECURSE
ExcludeKey1=PATH|%AppData%\iMobie\PhoneClean\iMobieConfig\ConfigReg.ini

 

Added: FileKey7

Link to comment
Share on other sites

Revised Entry

Added: FileKey1=%ProgramFiles%\Adobe\Reader 11.0\Setup Files|*.*|REMOVESELF

 

[Adobe Reader XI More*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Adobe\Acrobat Reader\11.0
Default=False
FileKey1=%ProgramFiles%\Adobe\Reader 11.0\Setup Files|*.*|REMOVESELF
RegKey1=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionFromPDF
RegKey2=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionToPDF
RegKey3=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cDockables
RegKey4=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cToolbars
RegKey5=HKCU\Software\Adobe\Acrobat Reader\11.0\RememberedViews\cNoCategoryFiles
RegKey6=HKCU\Software\Adobe\Adobe Synchronizer\11.0

Link to comment
Share on other sites

New Entry

 

[Adobe Patch Files*]

LangSecRef=3021

Detect=HKCU\Software\Adobe

Default=False

FileKey1=%ProgramFiles%\Adobe\Adobe|*.*|REMOVESELF

 

attachicon.gifadobepatchfiles.jpg

I'd suggest using the full filepath of %ProgramFiles%\Adobe\Adobe\AdobePatchFiles, just in case Adobe choose to put anything else in the Adobe folder

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.