Moderators Nergal Posted January 30, 2015 Moderators Share Posted January 30, 2015 I guess mentioning other party tools is against the rules? Sorry.I have no idea what tool you could be talking about. This site has no knowledge of any enhancing softwares which use the winapp2 template which also is only distributed as any example. [/mumstheword] I have heard people are having troubles downloading other files like Trim.bat - so I think it's a access rule that is not correct...No, .bat files are just fragged on the winnapp2 site. All of his text based files work fine. ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT https://support.piriform.com/hc/en-us and https://www.ccleaner.com/docs Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new link to WINAPP2.INI explanation Link to comment Share on other sites More sharing options...
siliconman01 Posted February 5, 2015 Share Posted February 5, 2015 Modified entry: [snagIt 12 More*] Removed *.sdf from FileKey1. This is causing CCleaner to remove a file named Snagit900.sdf which contains the address of where SnagIt stores pictures during the capture. See pic below [Snagit 12 More*] LangSecRef=3024 Detect=HKCU\Software\TechSmith\SnagIt\12 Default=False Warning=This will delete the backups of the captures that you have performed with SnagIt 12. ; FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.sdf;*.SNAG;*.SNAGundo;*.MP4 FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4 FileKey2=%Documents%\|SnagItDebug.log RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey2=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
ROCKNROLL Posted February 5, 2015 Share Posted February 5, 2015 I am getting these 2 entires on my system, even though I have never had these on my system before: [Google Chrome ART*]LangSecRef=3022SpecialDetect=DET_CHROMEFileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bakFileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE [Adblock Edge For Firefox*]LangSecRef=3026SpecialDetect=DET_MOZILLAFileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockedge|patterns-backup*.ini;*.tmp I am a maintainer for Winapp2. I also have a open-source group on Steam. http://steamcommunity.com/groups/opencommunity Link to comment Share on other sites More sharing options...
Moderators Nergal Posted February 5, 2015 Moderators Share Posted February 5, 2015 I am getting these 2 entires on my system, even though I have never had these on my system before: [Google Chrome ART*] LangSecRef=3022 SpecialDetect=DET_CHROME FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE [Adblock Edge For Firefox*] LangSecRef=3026 SpecialDetect=DET_MOZILLA FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblockedge|patterns-backup*.ini;*.tmp Do you have chrome and firefox installed at all? Both are detecting the existence of browsers ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT https://support.piriform.com/hc/en-us and https://www.ccleaner.com/docs Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new link to WINAPP2.INI explanation Link to comment Share on other sites More sharing options...
ROCKNROLL Posted February 6, 2015 Share Posted February 6, 2015 Yes, I have firefox. I have never had Chrome or Adblock Edge. I have Adblock Plus, though. I am a maintainer for Winapp2. I also have a open-source group on Steam. http://steamcommunity.com/groups/opencommunity Link to comment Share on other sites More sharing options...
dvdbane Posted February 6, 2015 Share Posted February 6, 2015 Yes, I have firefox. I have never had Chrome or Adblock Edge. I have Adblock Plus, though. did you mean you got no other chrome entries except [Google Chrome ART*]? the detect used in both entries make it to appear whenever ff or chrome installed and if any related folder or registry exist Link to comment Share on other sites More sharing options...
Moderators Nergal Posted February 6, 2015 Moderators Share Posted February 6, 2015 Yes the firefox will be discovered and will show all of the additional winapp2. If you don't want the entry remove it from your ini (like you're supposed to ;-) ) ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT https://support.piriform.com/hc/en-us and https://www.ccleaner.com/docs Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new link to WINAPP2.INI explanation Link to comment Share on other sites More sharing options...
Coffee4Joe Posted February 6, 2015 Share Posted February 6, 2015 rocknroll it may be a bug with the other program that uses winapp2. Chrome ART* being the only SpecialDetect=DET_CHROME not under LangSecRef=3029. Link to comment Share on other sites More sharing options...
ROCKNROLL Posted February 6, 2015 Share Posted February 6, 2015 @Coffee4Jow: That could be it. I will have a look into it, although, I am not getting this issue with other chrome/firefox special entries. I am a maintainer for Winapp2. I also have a open-source group on Steam. http://steamcommunity.com/groups/opencommunity Link to comment Share on other sites More sharing options...
dvdbane Posted February 7, 2015 Share Posted February 7, 2015 [Adblock * For Firefox*] LangSecRef=3026 SpecialDetect=DET_MOZILLA Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblock*|patterns-backup*.ini;*.tmp - combine adblock plus and adblock edge entry [bookmark Backups*] LangSecRef=3026 SpecialDetect=DET_MOZILLA Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\bookmarkbackups|*.json* - change FileKey1 to detect *.jsonlz4 some changes to chrome entries require some comment regarding whether SpecialDetect=DET_CHROME can detect Chrome SxS, Chrome Plus, Chromium, Flock, RockMelt, SRWare Iron or maybe mod can help list all detection in DET_CHROME by asking the devmost of the entry got the same detect like this and i change almost all entry to follow it SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\Superbird [Application Cache*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\Superbird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Application Cache|*.*|REMOVESELF FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Application Cache|*.*|REMOVESELF FileKey3=%LocalAppData%\Chromium\User Data\*\Application Cache|*.*|REMOVESELF FileKey4=%LocalAppData%\Flock\User Data\*\Application Cache|*.*|REMOVESELF FileKey5=%LocalAppData%\Rockmelt\User Data\*\Application Cache|*.*|REMOVESELF FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Application Cache|*.*|REMOVESELF FileKey7=%LocalAppData%\Torch\User Data\*\Application Cache|*.*|REMOVESELF FileKey8=%LocalAppData%\SuperBird\User Data\*\Application Cache|*.*|REMOVESELF - remove FileKey5 and FileKey6 as FileKey1 should cover both Chrome and Chrome SxS [bookmark Backup*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*|*Bookmarks.bak FileKey2=%LocalAppData%\Chrome Plus\User Data\*|*Bookmarks.bak FileKey3=%LocalAppData%\Chromium\User Data\*|*Bookmarks.bak FileKey4=%LocalAppData%\Flock\User Data\*|*Bookmarks.bak FileKey5=%LocalAppData%\Rockmelt\User Data\*|*Bookmarks.bak FileKey6=%LocalAppData%\SRWare Iron\User Data\*|*Bookmarks.bak FileKey7=%LocalAppData%\Torch\User Data\*|*Bookmarks.bak FileKey8=%LocalAppData%\SuperBird\User Data\*|*Bookmarks.bak - use Chrome* to detect both Chrome and Chrome SxS [ART*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE - change to LangSecRef=3029 [backup*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome*\Application|old_chrome.exe FileKey2=%ProgramFiles%\Google\Chrome*\Application|old_chrome.exe [GPU Cache*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\GPUCache|*.* FileKey2=%LocalAppData%\Chrome Plus\User Data\*\GPUCache|*.* FileKey3=%LocalAppData%\Chromium\User Data\*\GPUCache|*.* FileKey4=%LocalAppData%\Flock\User Data\*\GPUCache|*.* FileKey5=%LocalAppData%\Rockmelt\User Data\*\GPUCache|*.* FileKey6=%LocalAppData%\SRWare Iron\User Data\*\GPUCache|*.* FileKey7=%LocalAppData%\Torch\User Data\*\GPUCache|*.* FileKey8=%LocalAppData%\SuperBird\User Data\*\GPUCache|*.* - use Chrome* to detect both Chrome and Chrome SxS [html5 Storage*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey7=%LocalAppData%\Torch\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\File System|*.log;*MANIFEST*;*.old|RECURSE - use Chrome* to detect both Chrome and Chrome SxS [indexedDB*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\IndexedDB|*.*|RECURSE - change [Extensions Databases*] to [Chrome IndexedDB*] [installer*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False Warning=Running this may remove Chrome's ability to automatically update to future versions on some computers. FileKey1=%LocalAppData%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE FileKey2=%ProgramFiles%\Google\Chrome*\Application\*\Installer|*.7z|RECURSE FileKey3=%LocalAppData%\Google\Update\*\*\Installer|*.7z|RECURSE FileKey4=%ProgramFiles%\Google\Update\*\*\Installer|*.7z|RECURSE FileKey5=%ProgramFiles%\|GUT*tmp [Logs*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\Application|debug.log FileKey2=%LocalAppData%\Google\Chrome*\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey3=%LocalAppData%\Chrome Plus\Application|debug.log FileKey4=%LocalAppData%\Chrome Plus\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey5=%LocalAppData%\Chromium\Application|debug.log FileKey6=%LocalAppData%\Chromium\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey7=%LocalAppData%\Flock\Application|debug.log FileKey8=%LocalAppData%\Flock\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey9=%LocalAppData%\Rockmelt\Application|debug.log FileKey10=%LocalAppData%\Rockmelt\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey11=%LocalAppData%\SRWare Iron\Application|debug.log FileKey12=%LocalAppData%\SRWare Iron\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey13=%LocalAppData%\Torch\Application|debug.log FileKey14=%LocalAppData%\Torch\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey15=%LocalAppData%\SuperBird\Application|debug.log FileKey16=%LocalAppData%\SuperBird\User Data\*|*LOG.*;Log;*.log|RECURSE FileKey17=%LocalAppData%\VirtualStore\Program Files*\Google\Chrome\Application|debug.log ExcludeKey1=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local Extension Settings\|*.* ExcludeKey2=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Local App Settings\|*.* ExcludeKey3=PATH|%LocalAppData%\Google\Chrome*\User Data\*\Extension\|*.* ExcludeKey4=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local Extension Settings\|*.* ExcludeKey5=PATH|%LocalAppData%\Chrome Plus\User Data\*\Local App Settings\|*.* ExcludeKey6=PATH|%LocalAppData%\Chrome Plus\User Data\*\Extension\|*.* ExcludeKey7=PATH|%LocalAppData%\Chromium\User Data\*\Local Extension Settings\|*.* ExcludeKey8=PATH|%LocalAppData%\Chromium\User Data\*\Local App Settings\|*.* ExcludeKey9=PATH|%LocalAppData%\Chromium\User Data\*\Extension\|*.* ExcludeKey10=PATH|%LocalAppData%\Flock\User Data\*\Local Extension Settings\|*.* ExcludeKey11=PATH|%LocalAppData%\Flock\User Data\*\Local App Settings\|*.* ExcludeKey12=PATH|%LocalAppData%\Flock\User Data\*\Extension\|*.* ExcludeKey13=PATH|%LocalAppData%\Rockmelt\User Data\*\Local Extension Settings\|*.* ExcludeKey14=PATH|%LocalAppData%\Rockmelt\User Data\*\Local App Settings\|*.* ExcludeKey15=PATH|%LocalAppData%\Rockmelt\User Data\*\Extension\|*.* ExcludeKey16=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local Extension Settings\|*.* ExcludeKey17=PATH|%LocalAppData%\SRWare Iron\User Data\*\Local App Settings\|*.* ExcludeKey18=PATH|%LocalAppData%\SRWare Iron\User Data\*\Extension\|*.* ExcludeKey19=PATH|%LocalAppData%\Torch\User Data\*\Local Extension Settings\|*.* ExcludeKey20=PATH|%LocalAppData%\Torch\User Data\*\Local App Settings\|*.* ExcludeKey21=PATH|%LocalAppData%\Torch\User Data\*\Extension\|*.* ExcludeKey22=PATH|%LocalAppData%\Superbird\User Data\*\Local Extension Settings\|*.* ExcludeKey23=PATH|%LocalAppData%\Superbird\User Data\*\Local App Settings\|*.* ExcludeKey24=PATH|%LocalAppData%\Superbird\User Data\*\Extension\|*.* - add ExcludeKey3, 6, 9, 12, 15, 18, 21 and 24 to prevent problem with uBlock and other extension that might use "log" for the naming of their file - use Chrome* to detect both Chrome and Chrome SxS - correct filekey numbering %LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\devtool-log.html %LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\css\devtool-log.css %LocalAppData%\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm\0.8.6.0_0\js\devtool-log.js [Extensions State*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\Extension State|*.*|RECURSE - add missing Default=False [Favicons*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False Warning=Your browser will re-index favicons for frequently visited sites and bookmarks. FileKey1=%LocalAppData%\Google\Chrome*\User Data|Favicons;Favicons-journal|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data|Favicons;Favicons-journal|RECURSE FileKey3=%LocalAppData%\Chromium\User Data|Favicons;Favicons-journal|RECURSE FileKey4=%LocalAppData%\Flock\User Data|Favicons;Favicons-journal|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data|Favicons;Favicons-journal|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data|Favicons;Favicons-journal|RECURSE FileKey7=%LocalAppData%\Torch\User Data|Favicons;Favicons-journal|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data|Favicons;Favicons-journal|RECURSE - use Chrome* to detect both Chrome and Chrome SxS [FlashPlayer AssetCache*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\CacheWritableAdobeRoot\AssetCache|*.*|RECURSE [FlashPlayer Settings*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\macromedia.com|*.*|RECURSE - use Chrome* to detect both Chrome and Chrome SxS [FlashPlayer SharedObjects*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey7=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE [History*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|History - add missing Default=False [Local Storage*] LangSecRef=3029 SpecialDetect=DET_CHROME DetectFile1=%LocalAppData%\Torch DetectFile2=%LocalAppData%\SuperBird Default=False FileKey1=%LocalAppData%\Google\Chrome*\User Data\*\Local Storage|http*.*|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Local Storage|http*.*|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\Local Storage|http*.*|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\Local Storage|http*.*|RECURSE FileKey5=%LocalAppData%\Rockmelt\User Data\*\Local Storage|http*.*|RECURSE FileKey6=%LocalAppData%\SRWare Iron\User Data\*\Local Storage|http*.*|RECURSE FileKey7=%LocalAppData%\Torch\User Data\*\Local Storage|http*.*|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\Local Storage|http*.*|RECURSE [Quota Manager Data*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|QuotaManager - add missing Default=False [search Engines Data*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default|Web Data - add missing Default=False [session Storage*] LangSecRef=3029 SpecialDetect=DET_CHROME Default=False FileKey1=%LocalAppData%\Google\Chrome\User Data\Default\Session Storage|*.*|RECURSE - add missing Default=False [HP Install Logs*] LangSecRef=3021 Detect=HKCU\Software\HP DetectFile=%CommonAppData%\HP Default=False FileKey1=%CommonAppData%|hpzinstall.log FileKey2=%SystemDrive%\Users\All Users|hpzinstall.log FileKey3=%LocalAppData%\VirtualStore\ProgramData|hpzinstall.log FileKey4=%AppData%\HP\WebRegLogs|WebRegLog.txt FileKey5=%SystemDrive%\hp\bin\logs|*.log FileKey6=%CommonAppData%\Hewlett-Packard|*.log*.*;*Log.txt|RECURSE - change from %UserProfile%\All Users|hpzinstall.log [HP Install Temps*] LangSecRef=3021 Detect=HKCU\Software\HP DetectFile=%CommonAppData%\HP Default=False FileKey1=%CommonAppData%\HP\Installer\Temp|*.* FileKey2=%CommonAppData%\HP\Temp|*.* FileKey3=%ProgramFiles%\HP\Temp|*.*|RECURSE FileKey4=%SystemDrive%\Users\All Users\HP\Installer\Temp|*.* FileKey5=%LocalAppData%\VirtualStore\Program Files*\HP\Temp|*.*|RECURSE FileKey6=%LocalAppData%\VirtualStore\ProgramData\HP\Installer\Temp|*.* FileKey7=%LocalAppData%\VirtualStore\ProgramData\HP\Temp|*.* FileKey8=%WinDir%|*.dat.temp - change from %UserProfile%\All Users\HP\Installer\Temp|*.* remove double ** from the entry name [360 Browser - Cache*] LangSecRef=3029 Detect=HKCU\Software\360Browser\Browser Default=False FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default\Cache|*.* FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|*-journal* ExcludeKey1=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|switcher-journal ExcludeKey2=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|Web data-journal ExcludeKey3=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\|Login data-journal FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default\Local Storage|*.* [360 Browser - Cookies*] LangSecRef=3029 Detect=HKCU\Software\360Browser\Browser Default=False FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Cookies [360 Browser - History*] LangSecRef=3029 Detect=HKCU\Software\360Browser\Browser Default=False FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Archived History FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|Visited Links FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default|Current Tabs FileKey4=%LocalAppData%\360Browser\Browser\User Data\Default|Top Sites FileKey5=%LocalAppData%\360Browser\Browser\User Data\Default|History Provider Cache FileKey6=%LocalAppData%\360Browser\Browser\User Data\Default|Network Action Predictor [360 Browser - Session*] LangSecRef=3029 Detect=HKCU\Software\360Browser\Browser Default=False FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|Current* FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default|Last* what about changing the winapp2.ini entries naming for browser entries to follow ccleaner internal rules naming i already do the changes to chrome entries above Link to comment Share on other sites More sharing options...
SMalik Posted February 9, 2015 Share Posted February 9, 2015 Modified entry: [snagIt 12 More*] Removed *.sdf from FileKey1. This is causing CCleaner to remove a file named Snagit900.sdf which contains the address of where SnagIt stores pictures during the capture. See pic below [Snagit 12 More*] LangSecRef=3024 Detect=HKCU\Software\TechSmith\SnagIt\12 Default=False Warning=This will delete the backups of the captures that you have performed with SnagIt 12. ; FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.sdf;*.SNAG;*.SNAGundo;*.MP4 FileKey1=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4 FileKey2=%Documents%\|SnagItDebug.log RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey2=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder The .sdf file holds 'Recents' and information about the saved location. All known privacy eraser programs wipe this file. Link to comment Share on other sites More sharing options...
SMalik Posted February 9, 2015 Share Posted February 9, 2015 I think we should have seperate Detects for Firefox and Chrome extensions. Link to comment Share on other sites More sharing options...
SMalik Posted February 9, 2015 Share Posted February 9, 2015 Can we remove 'Chrome', 'Google Chrome', 'Firefox' and 'Mozilla' names from these entry names? [Chrome Backup*][Chrome GPU Cache*][Chrome HTML5 Storage*][Chrome Installer*][Chrome Logs*][Google Chrome ART*][Firefox Corrupt SQLites*][Firefox HTML5 Storage*][Firefox Logs*][Firefox Minidumps*][Firefox Net Predictions*][Firefox Session Backups*][Firefox Startup Cache*][Firefox Telemetry*][Firefox TestPilot Error Logs*][Firefox Update Logs*][Firefox urlclassifier3.sqlite*][Firefox webappsstore.sqlite*][Mozilla Maintenance Service Logs*][Mozilla Nightly Backups*][Mozilla Temps*][Mozilla Updates*] Link to comment Share on other sites More sharing options...
Winapp2.ini Posted February 9, 2015 Author Share Posted February 9, 2015 Most of the ones that are prefixed with a browser like that are for reduced ambiguity when reading the file, and to avoid any naming conflicts (eg. Chrome Logs and Firefox Logs cannot both be named Logs or CCleaner displays both of them in the same LangSecRef) winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
Moderators Nergal Posted February 9, 2015 Moderators Share Posted February 9, 2015 I think we should have seperate Detects for Firefox and Chrome extensions. If you can figure out how and to still have it detect every covered browser flavor and support customlocation Ccleaner.ini option go right ahead. In other words, and you can find all of this in this very thread, no we can't because it needs to support both those things. #NotDevelopersRemember ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT https://support.piriform.com/hc/en-us and https://www.ccleaner.com/docs Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new link to WINAPP2.INI explanation Link to comment Share on other sites More sharing options...
dvdbane Posted February 9, 2015 Share Posted February 9, 2015 Most of the ones that are prefixed with a browser like that are for reduced ambiguity when reading the file, and to avoid any naming conflicts (eg. Chrome Logs and Firefox Logs cannot both be named Logs or CCleaner displays both of them in the same LangSecRef) then keep it that way for entries like Chrome Logs and Firefox Logs for others, i think that can be done Link to comment Share on other sites More sharing options...
siliconman01 Posted February 11, 2015 Share Posted February 11, 2015 Modified entry: [Recent items*] Modified warning message to show undesirable affect to the Windows 10 File Explorer Quick Access list. [Recent Items More*] LangSecRef=3025 DetectFile=%AppData%\Microsoft\windows\recent\customdestinations Default=False Warning=Running this will remove task lists from the start menu (the expandable triangle next to some applications. It also removes user pinned items to the Quick Access list of Windows 10 File Explorer. FileKey1=%AppData%\Microsoft\windows\recent\automaticdestinations|*.*|RECURSE FileKey2=%AppData%\Microsoft\windows\recent\customdestinations|*.*|RECURSE With the main program CCleaner starting to incorporate Windows 10, it seems appropriate to start modified Winapp2.ini to show Windows 10 items as well. New entry: [Cortana*] [Cortana*] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Cortana_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\Microsoft.Cortana_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.Cortana_*\TempState|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\CryptnetUrlCache\Content|*.* FileKey4=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.* FileKey5=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetCache|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetCookies|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\INetHistory|*.*|RECURSE FileKey8=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Temp|*.* FileKey9=%LocalAppData%\Packages\Microsoft.Cortana_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
siliconman01 Posted February 13, 2015 Share Posted February 13, 2015 New entry: [Panther*] Everything I read states the %Windir%\Panther directory can be safely removed. http://answers.microsoft.com/en-us/windows/forum/windows_8-files/what-is-panther-file/b72d559a-7732-4d74-b361-397905c1e9b2 http://answers.microsoft.com/en-us/windows/forum/windows_7-files/what-is-panther-directory/424ed2df-ce11-4967-8f59-42ab9d6c9757 [Panther*] LangSecRef=3025 DetectFile=%Windir%\Panther Default=False Warning=The Windows\Panther directory is created/used during a Windows version upgrade. Following the upgrade, this directory can be safely removed. FileKey1=%Windir%\Panther\|*.*|REMOVESELF Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
magicfrizbees Posted February 15, 2015 Share Posted February 15, 2015 Windows Live Mail WARNING! Addition (removes backups and stuff that will be redownloaded): [Windows Live Mail*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Live Mail Default=False Warning=This will reset the read counts, which will be recalculated when WLMail is started. FileKey1=%LocalAppData%\Microsoft\Windows*Mail|*.log;*.jrs;*.chk;*.rss|RECURSE FileKey2=%LocalAppData%\Microsoft\Windows*Mail\Backup|*.*|REMOVESELF FileKey3=%LocalAppData%\Microsoft\Windows*Mail\*\Backup|*.*|REMOVESELF FileKey4=%LocalAppData%\Microsoft\Windows*Mail\Storage Folders|*.*|REMOVESELF FileKey5=%LocalAppData%\Microsoft\Windows*Mail\*.tmp|*.*|RECURSE FileKey6=%LocalAppData%\Microsoft\Windows*Mail\*|*.MSMessageStore|RECURSE RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion Finally tracked this one down - recovered and imported Windows Live emails are routinely stored as *.eml files in various folders under "Storage Folders" - and the FileKey4 entry obliterates them completely leaving behind only an email header entry. After almost a year of hearing friends and coworkers complain from time to time that their older emails were no longer readable, I finally tracked it down to this entry added in April 2014. Since no one noticed it at the time (new emails don't go into this folder), any backups made since April are useless in efforts to recover the lost data. Some people have lost years of email correspondence (a few lucky ones still had backups from before April). Either remove the offending FileKey4 entry entirely or add an appropriate warning about the potential (I'd say almost certain) loss of emails! Link to comment Share on other sites More sharing options...
Moderators Nergal Posted February 16, 2015 Moderators Share Posted February 16, 2015 I vote for removal if it causes this issue ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF. Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark) ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T. CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT https://support.piriform.com/hc/en-us and https://www.ccleaner.com/docs Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new link to WINAPP2.INI explanation Link to comment Share on other sites More sharing options...
siliconman01 Posted February 16, 2015 Share Posted February 16, 2015 New addition: [The Weather Channel*] [The Weather Channel*] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\TheWeatherChannel_t3yemqpq4kp7p DetectFile=%LocalAppData%\Packages\Weather.TheWeatherChannel_t3yemqpq4kp7p Default=False FileKey1=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetCookies|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\INetHistory|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.log|RECURSE FileKey5=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\AC\Temp|*.* FileKey6=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\LocalState|*.tmp FileKey7=%LocalAppData%\Packages\Weather.TheWeatherChannel_*\TempState\Bing.Maps\Cache|*.*|RECURSE Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
citana Posted February 19, 2015 Share Posted February 19, 2015 Revised Entry [iMobie PhoneClean*]LangSecRef=3024DetectFile=%AppData%\iMobie\PhoneCleanDefault=FalseFileKey1=%AppData%\iMobie\PhoneClean\AutoUpdate|*.*|RECURSEFileKey2=%AppData%\iMobie\PhoneClean\DeviceBackup\Backup|*.*|RECURSEFileKey3=%AppData%\iMobie\PhoneClean\DeviceBackup\Restore|*.*|RECURSEFileKey4=%AppData%\iMobie\PhoneClean\EasyLoseFiles|*.*|RECURSEFileKey5=%AppData%\iMobie\PhoneClean\ErrorLog|*.*|RECURSEFileKey6=%AppData%\iMobie\PhoneClean\iMobieConfig|*.*|RECURSEFileKey7=%AppData%\iMobie\PhoneClean\TempFiles|*.*|RECURSEExcludeKey1=PATH|%AppData%\iMobie\PhoneClean\iMobieConfig\ConfigReg.ini Added: FileKey7 метални врати блиндирани врати метални решетки Link to comment Share on other sites More sharing options...
SMalik Posted February 22, 2015 Share Posted February 22, 2015 Revised Entry Added: FileKey1=%ProgramFiles%\Adobe\Reader 11.0\Setup Files|*.*|REMOVESELF [Adobe Reader XI More*]LangSecRef=3021Detect=HKLM\SOFTWARE\Adobe\Acrobat Reader\11.0Default=FalseFileKey1=%ProgramFiles%\Adobe\Reader 11.0\Setup Files|*.*|REMOVESELFRegKey1=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionFromPDFRegKey2=HKCU\Software\Adobe\Acrobat Reader\11.0\AVConversionToPDFRegKey3=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cDockablesRegKey4=HKCU\Software\Adobe\Acrobat Reader\11.0\AVGeneral\cToolbarsRegKey5=HKCU\Software\Adobe\Acrobat Reader\11.0\RememberedViews\cNoCategoryFilesRegKey6=HKCU\Software\Adobe\Adobe Synchronizer\11.0 Link to comment Share on other sites More sharing options...
SMalik Posted February 22, 2015 Share Posted February 22, 2015 New Entry [Adobe Patch Files*]LangSecRef=3021Detect=HKCU\Software\AdobeDefault=FalseFileKey1=%ProgramFiles%\Adobe\Adobe|*.*|REMOVESELF Link to comment Share on other sites More sharing options...
JDPower Posted February 22, 2015 Share Posted February 22, 2015 New Entry [Adobe Patch Files*] LangSecRef=3021 Detect=HKCU\Software\Adobe Default=False FileKey1=%ProgramFiles%\Adobe\Adobe|*.*|REMOVESELF adobepatchfiles.jpg I'd suggest using the full filepath of %ProgramFiles%\Adobe\Adobe\AdobePatchFiles, just in case Adobe choose to put anything else in the Adobe folder Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now