Jump to content
CCleaner Community Forums

Winapp2.ini additions


Recommended Posts

Windows XP MUI cache is already in winapp2. Are the BagMRUs the same as the 'Window size/location cache' that CCleaner already cleans?

 

 

hi

 

sorry for delay, was pretty busy with life ;)

 

i can not exactly say what's ccleaner already doing there, because everything is internal. so i can not compare. have to do some regshots first. may take one or two days. bbl

Link to post
Share on other sites

[internet Explorer More*]

LangSecRef=3022

DetectFile=%ProgramFiles%\Internet Explorer\iexplore.exe

Default=False

RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache

RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache

RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU

RegKey4=HKCU\Software\Microsoft\Internet Explorer\PageSetup

RegKey5=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

RegKey6=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats

RegKey7=HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached

FileKey1=%LocalAppData%\Microsoft\Internet Explorer|brndlog.*

FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*iconcache.dat

FileKey3=%LocalAppData%\Microsoft\Internet Explorer\iconcache|*.*|REMOVESELF

FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

FileKey5=%LocalLowAppData%\Microsoft\CryptnetUrlCache\Content|*.*

FileKey6=%LocalLowAppData%\Microsoft\CryptnetUrlCache\MetaData|*.*

FileKey7=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE

FileKey8=%AppData%\Microsoft\Windows\PrivacIE|*.*|RECURSE

 

Please remove: FileKey8=%AppData%\Microsoft\Windows\PrivacIE|*.*|RECURSE

Now it is included in CCleaner v3.10

Link to post
Share on other sites

I guess FileKey paths are not correct.

 

[Windows System Profile*]

LangSecRef=3025

DetectFile=%WinDir%\system32\config\systemprofile

Default=False

FileKey1=%WinDir%\system32\config\systemprofile\Local Settings\Temp|*.*|RECURSE

FileKey2=%WinDir%\system32\config\systemprofile\Local Settings\Temporary Internet Files|*.*|RECURSE

FileKey3=%WinDir%\system32\config\systemprofile\Cookies|*.*|RECURSE

Link to post
Share on other sites

MODIFIED ENTRIES

 

[Reg Organizer (Backups)*]

LangSecRef=3024

DetectFile=%ProgramFiles%\Reg Organizer\RegOrganizer.exe

Default=False

FileKey1=%LocalAppData%\ChemTable Software\Reg Organizer\BackupHives|*.*|RECURSE

FileKey2=%LocalAppData%\ChemTable Software\Reg Organizer\backups|*.*|RECURSE

FileKey3=%LocalAppData%\ChemTable Software\Reg Organizer\RegHives|*.*|RECURSE

FileKey4=%Appdata%\ChemTable Software\Reg Organizer|ListsHistory.bin

 

[Tipard Total Media Converter*]

LangSecRef=3023

Detect=HKCU\Software\Tipard Studio\Tipard Total Media Converter

Default=False

RegKey1=HKCU\Software\Tipard Studio\Tipard Total Media Converter\Edit|LastVideoFilePath

FileKey1=%LocalAppData%\Tipard Studio\Tipard Total Media Converter|*.*

 

 

NEW ENTRY

 

[Glary Utilities (Backups)*]

LangSecRef=3024

DetectFile=%ProgramFiles%\Glary Utilities\Integrator.exe

Default=False

FileKey1=%AppData%\GlarySoft\Glary Utilities\Backups|*.*

FileKey2=%UserProfile%|*.gbck

FileKey3=%LocalAppData%\Microsoft\Windows|*.gbck

FileKey4=%WinDir%\System32\config|*.gbck

Link to post
Share on other sites

Wiping the prefetch has been show (AFAIK) to have a negative impact on performance.

That may be true under most circumstances, unless there are items loaded into prefetch that a user deletes (malware, etc?) during a currently logged in session, causing Windows to attempt to load some of those now non-existent entries on re-boot.

 

Guess it can go both ways.

 

I personally, would love a prefetch cleaner, as it would be more of a privacy concern to me. I would love to know that were I to choose to do so, I could zap all those entries.

 

Even more troubling, I have no way of knowing, if Windows tries to create a prefetch entry, how well it does when a program is updated.

 

Example:

 

I install Defraggler. Windows creates a prefetch entry for it. Later, I download a newer version that drastically changes the way the program operates, rendering the old pre-fetch entry invalid.

 

How likely is Windows to update with a "newer" prefetch entry to update to the newer version changes? Not very!

Link to post
Share on other sites
Example:

 

I install Defraggler. Windows creates a prefetch entry for it. Later, I download a newer version that drastically changes the way the program operates, rendering the old pre-fetch entry invalid.

 

How likely is Windows to update with a "newer" prefetch entry to update to the newer version changes? Not very!

No, it'll just create a new prefetch file for the new version and delete the old one when its not been used for a set time. No problem caused. And windows won't try to load anything if the related program (or malware) has been removed and its pf file will also be removed after a certain time.

 

There is NO purpose for cleaning pf data at all, windows does a perfectly adequate job of that itself.

Link to post
Share on other sites

Suggested to add for cleaning XBMC cachefiles (it does it by itself most of the time, not all however)

Also suggested to add cleaning of the packages directory, (storage location for all addons with all updates can get real big)

 

 

 

[XBMC cache*]

LangSecRef=3023

DetectFile=%AppData%\xbmc\cache

FileKey1=%AppData%\Xbmc\cache|*.*|RECURSE

 

[XBMC packages*]

LangSecRef=3023

Default=False

DetectFile=%AppData%\xbmc\addons\packages

FileKey1=%AppData%\Xbmc\addons\packages|*.*|RECURSE

Link to post
Share on other sites

Hi everyone, I'm pretty new here, but I would like to propose a couple of new entries.

 

I use SlimDrivers to keep my computer's drivers updated. It doesn't always work, but it does leave behind a fair amount of crap on my C drive.

 

I propose we split the current SlimDrivers entry into three separate entries as follows:

 

[slimDrivers Backups*]

LangSecRef=3024

DetectFile=%LocalAppData%\Slimware Utilities Inc\SlimDrivers\

Default=false

FileKey1=%LocalAppData%\SlimWare Utilities Inc\SlimDrivers\Backups|*.*|RECURSE

 

[slimDrivers Downloads*]

LangSecRef=3024

DetectFile=%LocalAppData%\Slimware Utilities Inc\SlimDrivers\

Default=false

FileKey1=%LocalAppData%\SlimWare Utilities Inc\SlimDrivers\Downloads|*.*|RECURSE

FileKey2=%LocalAppData%\SlimWare Utilities Inc\SlimDrivers\Images|*.*|RECURSE

 

[slimDrivers Logs*]

LangSecRef=3024

DetectFile=%LocalAppData%\Slimware Utilities Inc\SlimDrivers\

Default=false

FileKey1=%LocalAppData%\SlimWare Utilities Inc\SlimDrivers\Logs|*.*|RECURSE

 

Also, I use the Vizzed Retro Game Room and its required browser plugin to play video games online.

 

I propose the following new entry to clean after this plugin:

 

[Vizzed Retro Game Room*]

LangSecRef=3023

DetectFile=%LocalLowAppData%\VizzedRgr\

Default=False

FileKey1=%LocalLowAppData%\VizzedRgr\Downloads|*.*|RECURSE

FileKey2=%LocalLowAppData%\VizzedRgr\Roms|*.*|RECURSE

Link to post
Share on other sites

For the older, but still functional clipboard extension "ClipX" (tested with the 2008 x64 beta version and on Win7x64); it removes temp files which appear over time due to a bug, I guess (e.g. over 1 GB when I deleted the files today):

 

[ClipX*]

LangSecRef=3024

DetectFile=%LocalAppData%\ClipX\

Default=False

FileKey1=%LocalAppData%\ClipX\Storage|*.*

Link to post
Share on other sites
  • 2 weeks later...

new update of ccleaner doesn't have the updated entries for AVG2012

so here they are.

 

 

[AVG AntiVirus 2012*]

LangSecRef=3024

Detect=HKLM\SOFTWARE\AVG\AVG2012

Default=False

FileKey1=%CommonAppData%\AVG2012\Log|*.log

FileKey2=%CommonAppData%\AVG2012\scanlogs|*.log

FileKey3=%CommonAppData%\AVG2012\Log|*.xml

FileKey4=%CommonAppData%\AVG2012\update\backup|*.*

FileKey5=%CommonAppData%\AVG2012\Emc\Log|*.log

FileKey6=%CommonAppData%\AVG2012\IDS\config|*List.zip.bak

FileKey7=%CommonAppData%\AVG2012\IDS\profile|globalLoadable.bak

FileKey8=%CommonAppData%\AVG2012\Temp|*.tmp

Link to post
Share on other sites
  • Moderators

A new entry:

[Freemake Audio Converter (Logs)*]
LangSecRef=3023
Detect=HKCU\Software\Freemake\FreemakeAudioConverter
Detect2=HKLM\Software\Freemake\FreemakeAudioConverter
DetectFile=%ProgramFiles%\Freemake\Freemake Audio Converter\FreemakeAudioConverter.exe
Default=False
FileKey1=%CommonAppData%\Freemake\FreemakeAudioConverter|*.txt

Link to post
Share on other sites

I added the COMPONENTS element to this code for cleanup of TuneUp Utilities defrag.

 

[TuneUp Utilities 2011 Reg Defrag Cleanup**]
LangSecRef=3024
Detect=HKCU\Software\TuneUp\Utilities\10.0
Default=False
FileKey1=%WinDir%\System32\config\|SECURITY_tureg_old
FileKey2=%WinDir%\System32\config\|SOFTWARE_tureg_old
FileKey3=%WinDir%\System32\config\|SYSTEM_tureg_old
FileKey4=%WinDir%\System32\config\|DEFAULT_tureg_new.LOG1
FileKey5=%WinDir%\System32\config\|DEFAULT_tureg_new.LOG2
FileKey6=%WinDir%\System32\config\|SAM_tureg_new.LOG1
FileKey7=%WinDir%\System32\config\|SAM_tureg_new.LOG2
FileKey8=%WinDir%\System32\config\|SECURITY_tureg_new.LOG1
FileKey9=%WinDir%\System32\config\|SECURITY_tureg_new.LOG2
FileKey10=%WinDir%\System32\config\|SOFTWARE_tureg_new.LOG1
FileKey11=%WinDir%\System32\config\|SOFTWARE_tureg_new.LOG2
FileKey12=%WinDir%\System32\config\|SYSTEM_tureg_new.LOG1
FileKey13=%WinDir%\System32\config\|SYSTEM_tureg_new.LOG2
FileKey14=%WinDir%\System32\config\|DEFAULT_tureg_old
FileKey15=%WinDir%\System32\config\|SAM_tureg_old
FileKey16=%WinDir%\ServiceProfiles\LocalService\|NTUSER.DAT_tureg_old
FileKey17=%WinDir%\ServiceProfiles\LocalService\|NTUSER.DAT_tureg_new.LOG1
FileKey18=%WinDir%\ServiceProfiles\LocalService\|NTUSER.DAT_tureg_new.LOG2
FileKey19=%WinDir%\ServiceProfiles\NetworkService\|NTUSER.DAT_tureg_old
FileKey20=%WinDir%\ServiceProfiles\NetworkService\|NTUSER.DAT_tureg_new.LOG1
FileKey21=%WinDir%\ServiceProfiles\NetworkService\|NTUSER.DAT_tureg_new.LOG2
Filekey22=%WinDir%\System32\config\|COMPONENTS_tureg_old
Filekey23=%WinDir%\System32\config\|COMPONENTS_tureg_new.LOG1
Filekey24=%WinDir%\System32\config\|COMPONENTS_tureg_new.LOG2
FileKey25=%USERPROFILE%\AppData\Local\Microsoft\Windows|USRCLASS.DAT_tureg_old
FileKey26=%USERPROFILE%\|NTUSER.DAT_tureg_new.LOG1
FileKey27=%USERPROFILE%\|NTUSER.DAT_tureg_new.LOG2
FileKey28=%USERPROFILE%\|NTUSER.DAT_tureg_old
FileKey29=C:\Boot\|BCD_tureg_new.LOG1
FileKey30=C:\Boot\|BCD_tureg_new.LOG2
FileKey31=C:\Boot\|BCD_tureg_old

Link to post
Share on other sites

MODIFIED ENTRY

 

[Windows System Profile*]

LangSecRef=3025

DetectFile=%WinDir%\system32\config\systemprofile

Default=False

FileKey1=%WinDir%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files|*.*|RECURSE

FileKey2=%WinDir%\system32\config\systemprofile\AppData\Local\Temp|*.*|RECURSE

FileKey3=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies|*.*|RECURSE

FileKey4=%WinDir%\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE

Link to post
Share on other sites
  • Moderators

[Windows Explorer More*]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\
Default=False
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU

cleaned by ccleaner default via this entry in WinSYS.ini

[Window Size/Location Cache]
ID=1022
LangSecRef=3004
LangRef=3127
WarningRef=3205
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams

____________________________________________________________________________________________________________________________

[secunia PSI*]
LangSecRef=3021
DetectFile=%ProgramFiles%\Secunia\PSIsua.exe
Detect=HKCU\Software\Secunia\PSI
Default=False
FileKey1=%ProgramFiles%SecuniaPSI|sualog.txt
FileKey2=%ProgramFiles%SecuniaPSI|psialog.txt
FileKey3=%ProgramFiles%\Secunia\PSI|psialog.txt2 

FileKey1 and 2 are missing 2 \ (Each) should be

FileKey1=%ProgramFiles%\Secunia\PSI|sualog.txt
FileKey2=%ProgramFiles%\Secunia\PSI|psialog.txt

____________________________________________________________________________________________________________________________

[Windows Defender More*]
LangSecRef=3024
DetectFile=%CommonAppData%\Microsoft\Windows Defender\
Default=False
FileKey1=%CommonAppData%\Microsoft\Windows Defender\Support|*.log [/Code]

is redundant now
Default Windows Defender entry cleans it
[Code][Windows Defender]
ID=2132
LangSecRef=3024
Detect=HKLM\SOFTWARE\Microsoft\Windows Defender
Default=True
FileKey1=%commonappdata%\Microsoft\Windows Defender\Scans\History\Results\Quick|*.*
FileKey2=%commonappdata%\Microsoft\Windows Defender\Scans\History\Results\Resource|*.*
FileKey3=%CommonAppData%\Microsoft\Windows Defender\Support|*.log

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...