SMalik Posted May 28, 2019 Share Posted May 28, 2019 New Entry [Stored Explorer View *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey3=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey4=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey5=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0 RegKey6=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx Link to comment Share on other sites More sharing options...
APMichael Posted May 28, 2019 Share Posted May 28, 2019 13 hours ago, SMalik said: Changed name from [Internet Cache *] to [Network Persistence Statistics *] ... IMHO, the current name of the entry fits better because the *-journal files are typical cache and the *.ldb/*.log files caches download links, for example. 13 hours ago, SMalik said: I have CCleaner v5.57. Looks like the cookies cleaning issue has been fixed. So I think the [Cookies *] entry should be removed from Google Chrome. Also, [Internet History *] should be removed from Google Chrome. CCleaner does the job now. CCleaner has been cleaning these files for a long time. But such entries have been added because CCleaner does not delete the files itself, so traces may be left. There are also some other such entries under Chrome and Firefox. 11 hours ago, SMalik said: [Stored Explorer View *] ... This is already covered by the entry [Windows ShellBags *]. Is a separate entry necessary? Link to comment Share on other sites More sharing options...
SMalik Posted May 28, 2019 Share Posted May 28, 2019 17 hours ago, APMichael said: IMHO, the current name of the entry fits better because the *-journal files are typical cache and the *.ldb/*.log files caches download links, for example. CCleaner has been cleaning these files for a long time. But such entries have been added because CCleaner does not delete the files itself, so traces may be left. There are also some other such entries under Chrome and Firefox. This is already covered by the entry [Windows ShellBags *]. Is a separate entry necessary? %LocalAppData%\Google\Chrome*\User Data|*-journal %LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-*;Network Persistent State;Origin Bound Certs Safe Browsing Cookies-journal file is already in CCleaner's Internet Cache entry. *.ldb;*.log;CURRENT;LOCK;MANIFEST-* files keep download history. There should be a new Download History entry. Network Persistent State file should have its own entry. There should be a new TLS Certificates entry for Origin Bound Certs files. [Download History *] %LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-* [Network Persistence Statistics *] %LocalAppData%\Google\Chrome*\User Data\*|Network Persistent State [TLS Certificates *] %LocalAppData%\Google\Chrome*\User Data\*|Origin Bound Certs Previously, CCleaner was not wiping all of the Google Chrome cookies and that is why I presented that [Cookies *] entry. Now, CCleaner is able to wipe all of the cookies. Also, deleting Cookies file over rides CCleaner's Cookies to keep option. I usually don't use [Windows ShellBags *] all the time as it required Explorer to be refreshed or sign out from the user. So I think it is OK to keep [Stored Explorer View *] entry. Link to comment Share on other sites More sharing options...
APMichael Posted May 29, 2019 Share Posted May 29, 2019 Thank you for your quick reply and clarification. Okay, then we will split the entry. 13 hours ago, SMalik said: %LocalAppData%\Google\Chrome*\User Data|*-journal ... Safe Browsing Cookies-journal file is already in CCleaner's Internet Cache entry. ... Unfortunately, CCleaner only deletes this file for the few Chromium-based browsers that CCleaner directly supports. If you need to use "CustomLocation", CCleaner does not delete the file. Therefore, we should keep these FileKeys. Link to comment Share on other sites More sharing options...
APMichael Posted May 29, 2019 Share Posted May 29, 2019 Many thanks to all for the new and revised entries. Winapp2.ini update:https://github.com/MoscaDotTo/Winapp2/commit/496f3191fe63d674ca3f3365294f885b307c3fdf Link to comment Share on other sites More sharing options...
SMalik Posted May 29, 2019 Share Posted May 29, 2019 Revised Entry I suggest changing the entry name from [Internet Cache *] to [Rollback Journals *] [Rollback Journals *] LangSecRef=3029 Detect1=HKCU\Software\7Star\7Star Detect2=HKCU\Software\360Browser\Browser Detect3=HKCU\Software\Amigo Detect4=HKCU\Software\BraveSoftware Detect5=HKCU\Software\CentBrowser Detect6=HKCU\Software\ChromePlus Detect7=HKCU\Software\Chromium\PreferenceMACs Detect8=HKCU\Software\CocCoc\Browser Detect9=HKCU\Software\Comodo\Dragon Detect10=HKCU\Software\Coowon\Coowon Detect11=HKCU\Software\Epic Privacy Browser Detect12=HKCU\Software\Flock Detect13=HKCU\Software\Iridium Detect14=HKCU\Software\RockMelt Detect15=HKCU\Software\Slimjet Detect16=HKCU\Software\Superbird Detect17=HKCU\Software\Torch Detect18=HKCU\Software\Vivaldi Detect19=HKCU\Software\Yandex\YandexBrowser DetectFile=%LocalAppData%\Google\Chrome* Default=False FileKey1=%LocalAppData%\7Star\7Star\User Data|*-journal FileKey2=%LocalAppData%\360Browser\Browser\User Data|*-journal FileKey3=%LocalAppData%\Amigo\User Data|*-journal FileKey4=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data|*-journal FileKey5=%LocalAppData%\CentBrowser\User Data|*-journal FileKey6=%LocalAppData%\Chromium\User Data|*-journal FileKey7=%LocalAppData%\CocCoc\Browser\User Data|*-journal FileKey8=%LocalAppData%\Comodo\Dragon\User Data|*-journal FileKey9=%LocalAppData%\Coowon\Coowon\User Data|*-journal FileKey10=%LocalAppData%\Epic Privacy Browser\User Data|*-journal FileKey11=%LocalAppData%\Flock\User Data|*-journal FileKey12=%LocalAppData%\Google\Chrome*\User Data|*-journal FileKey13=%LocalAppData%\Iridium\User Data|*-journal FileKey14=%LocalAppData%\MapleStudio\ChromePlus\User Data|*-journal FileKey15=%LocalAppData%\RockMelt\User Data|*-journal FileKey16=%LocalAppData%\Slimjet\User Data|*-journal FileKey17=%LocalAppData%\Superbird\User Data|*-journal FileKey18=%LocalAppData%\Torch\User Data|*-journal FileKey19=%LocalAppData%\Vivaldi\User Data|*-journal FileKey20=%LocalAppData%\Yandex\YandexBrowser\User Data|*-journal Link to comment Share on other sites More sharing options...
SMalik Posted May 31, 2019 Share Posted May 31, 2019 Revised Entry Removed unnecessary Detect's Removed: %AppData%\Auslogics\Disk*Defrag*\Logs|*.*|RECURSE %AppData%\Auslogics\Disk Defrag\*\Reports|*.*|RECURSE Added: %CommonAppData%\Auslogics\Disk Defrag\*\BootTimeReports|*.*|RECURSE %CommonAppData%\Auslogics\Disk Defrag Portable\*\BootTimeReports|*.*|RECURSE %CommonAppData%\Auslogics\Disk Defrag Portable\*\Reports|*.*|RECURSE [Auslogics Disk Defrag *] LangSecRef=3024 Detect1=HKLM\SOFTWARE\Auslogics\Disk Defrag Detect2=HKLM\SOFTWARE\Auslogics\Disk Defrag Portable Default=False FileKey1=%CommonAppData%\Auslogics\Disk Defrag\*\BootTimeReports|*.*|RECURSE FileKey2=%CommonAppData%\Auslogics\Disk Defrag\*\Reports|*.*|RECURSE FileKey3=%CommonAppData%\Auslogics\Disk Defrag Portable\*\BootTimeReports|*.*|RECURSE FileKey4=%CommonAppData%\Auslogics\Disk Defrag Portable\*\Reports|*.*|RECURSE Link to comment Share on other sites More sharing options...
SMalik Posted May 31, 2019 Share Posted May 31, 2019 New Entry [Auslogics Disk Defrag Professional *] LangSecRef=3024 Detect=HKLM\Software\Auslogics\Disk Defrag Professional Default=False FileKey1=%CommonAppData%\Auslogics\Disk Defrag Professional\*\BootTimeReports|*.*|RECURSE FileKey2=%CommonAppData%\Auslogics\Disk Defrag Professional\*\Reports|*.*|RECURSE FileKey3=%ProgramFiles%\Auslogics\Disk Defrag Professional|ndefrg.log Link to comment Share on other sites More sharing options...
SMalik Posted June 1, 2019 Share Posted June 1, 2019 Revised Entries Added: %LocalAppData%\Packages\Microsoft.*Cortana_*\AC\TokenBroker\Cache|*.*|RECURSE [Cortana *] LangSecRef=3031 Detect1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Cortana_8wekyb3d8bbwe Detect2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Cortana_cw5n1h2txyewy Default=False FileKey1=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\INet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey5=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Temp|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\TokenBroker\Cache|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.*Cortana_*\TempState|*.*|RECURSE FileKey8=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalCache|*.*|RECURSE FileKey9=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\AppIconCache|*.*|RECURSE FileKey10=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\DeviceSearchCache|*.txt ExcludeKey1=FILE|%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\DeviceSearchCache\|SettingsCache.txt Added: %LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\TempState|*.*|RECURSE [Start Menu Experience Host *] DetectOS=10.0| LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy Default=False FileKey1=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\INet*|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\NVIDIA Corporation\NV_Cache|*.* FileKey3=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\Temp|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\TempState|*.*|RECURSE Link to comment Share on other sites More sharing options...
siliconman01 Posted June 1, 2019 Share Posted June 1, 2019 New entry: [Chrome Sandbox *] [Chrome Sandbox *] DetectOS=10.0| LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\chrome.sandbox.mfcdmec0b66bbd70f841470aa70f965aa4fb831f77b7f Default=False FileKey1=%LocalAppData%\Packages\chrome.sandbox.*\AC\INet*|*.*|RECURSE FileKey2=%LocalAppData%\Packages\chrome.sandbox.*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\chrome.sandbox.*\AC\Temp|*.*|RECURSE Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 8940 PC and Dell XPS 16 9640 Laptop. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
APMichael Posted June 1, 2019 Share Posted June 1, 2019 Question to all: The files of the following entries are also cleaned by CCleaner. Since I don't have Chrome in my daily use, I can't tell if CCleaner deletes the contents completely or only partially. It would be great if you could share your experiences and recommend which entries possibly could be removed. Many thanks in advance. Chrome/Chromium: [FlashPlayer SharedObjects *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE ... The built-in entry "Cookies" cleans this location. [Local Storage *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Local Storage|http*.*|RECURSE ... In my tests, this entry never deletes a single file. It seems that "Local Storage" has been switched to Level-DB and the entry is outdated.Edit: The built-in entry "Cookies" cleans the "http*.*" files. [Omnibox Shortcuts *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Shortcuts ... The built-in entry "Internet History" cleans this file. [Quota Manager Data *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|QuotaManager ... The built-in entry "Cookies" cleans this file. [Web Data *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Web Data ... The built-in entries "Internet History" and "Saved Form Information" clean this file. Firefox: [Anti-Phishing Data *] ... FileKey2=%LocalAppData%\Mozilla\Firefox\Profiles\*|urlclassifier3.sqlite ... Mozilla stopped using and supporting this file a long time ago. It seems that the entry is outdated. [DOM Store *] ... FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite ... The built-in entry "Cookies" cleans this file. Link to comment Share on other sites More sharing options...
SMalik Posted June 1, 2019 Share Posted June 1, 2019 10 hours ago, APMichael said: Question to all: The files of the following entries are also cleaned by CCleaner. Since I don't have Chrome in my daily use, I can't tell if CCleaner deletes the contents completely or only partially. It would be great if you could share your experiences and recommend which entries possibly could be removed. Many thanks in advance. Google Chrome I don't know about [FlashPlayer SharedObjects *] and [Local Storage *] entries, but [Omnibox Shortcuts *], [Quota Manager Data *] and [Web Data *] are not in CCleaner's built-in entries. Mozilla Firefox I don't know about [Anti-Phishing Data *] entry, but [DOM Store *] entry is not in CCleaner's built-in entries. Link to comment Share on other sites More sharing options...
SMalik Posted June 2, 2019 Share Posted June 2, 2019 This is regarding [Stored Explorer View *] entry. I just noticed that there are some more values there. We should add values from 0 to 10 or just remove the entry. Link to comment Share on other sites More sharing options...
Moderators Andavari Posted June 2, 2019 Moderators Share Posted June 2, 2019 Quote [DOM Store *] ... FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite ... The built-in entry "Cookies" cleans this file. With the on and off bug reports about cleaning (various browsers) I'd personally just leave it as is - kind of a more "brute force" way for users to get rid of it. Link to comment Share on other sites More sharing options...
APMichael Posted June 2, 2019 Share Posted June 2, 2019 Thanks for the replies. 11 hours ago, SMalik said: ... but [Omnibox Shortcuts *], [Quota Manager Data *] and [Web Data *] are not in CCleaner's built-in entries. ... but [DOM Store *] entry is not in CCleaner's built-in entries. I'm not sure we've misunderstood each other. Therefore a little more detailed: Please use the built-in entries I mentioned and check the modification date of the files before and after cleaning. You will see that the modification date changes, so that CCleaner at least opens these files and accesses the content/database. There are some other built-in entries that just clean the content/database instead of deleting the file itself. That's why I ask the community for their experiences with these entries. If we don't get enough information, we'll leave it as it is. Link to comment Share on other sites More sharing options...
APMichael Posted June 2, 2019 Share Posted June 2, 2019 9 hours ago, SMalik said: This is regarding [Stored Explorer View *] entry. I just noticed that there are some more values there. We should add values from 0 to 10 or just remove the entry. Is the following entry correct? (It is your entry, please let us know if it should be revised or removed. Thanks.) [Stored Explorer View *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|1 RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|2 RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|3 RegKey5=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|4 RegKey6=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|5 RegKey7=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|6 RegKey8=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|7 RegKey9=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|8 RegKey10=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|9 RegKey11=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|10 RegKey12=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey13=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey14=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey15=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0 RegKey16=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx Link to comment Share on other sites More sharing options...
SMalik Posted June 2, 2019 Share Posted June 2, 2019 3 hours ago, APMichael said: Thanks for the replies. I'm not sure we've misunderstood each other. Therefore a little more detailed: Please use the built-in entries I mentioned and check the modification date of the files before and after cleaning. You will see that the modification date changes, so that CCleaner at least opens these files and accesses the content/database. There are some other built-in entries that just clean the content/database instead of deleting the file itself. That's why I ask the community for their experiences with these entries. If we don't get enough information, we'll leave it as it is. I checked again. You're right. CCleaner's built-in entries clean those files except [Web Data *]. I suggest changing the name of [Web Data *] to [Search Engines Data *]. Removed: Warning=This will remove Autofill, Autocomplete, Search Engines keyword, Sign-in and Credit Card info. There is no need to have a warning. [Search Engines Data *] LangSecRef=3029 Detect1=HKCU\Software\7Star\7Star Detect2=HKCU\Software\360Browser\Browser Detect3=HKCU\Software\Amigo Detect4=HKCU\Software\BraveSoftware Detect5=HKCU\Software\CentBrowser Detect6=HKCU\Software\ChromePlus Detect7=HKCU\Software\Chromium\PreferenceMACs Detect8=HKCU\Software\CocCoc\Browser Detect9=HKCU\Software\Comodo\Dragon Detect10=HKCU\Software\Coowon\Coowon Detect11=HKCU\Software\Epic Privacy Browser Detect12=HKCU\Software\Flock Detect13=HKCU\Software\Iridium Detect14=HKCU\Software\RockMelt Detect15=HKCU\Software\Slimjet Detect16=HKCU\Software\Superbird Detect17=HKCU\Software\Torch Detect18=HKCU\Software\Vivaldi Detect19=HKCU\Software\Yandex\YandexBrowser DetectFile1=%AppData%\brave DetectFile2=%LocalAppData%\Google\Chrome* Default=False FileKey1=%AppData%\brave|Web Data FileKey2=%LocalAppData%\7Star\7Star\User Data\*|Web Data FileKey3=%LocalAppData%\360Browser\Browser\User Data\*|Web Data FileKey4=%LocalAppData%\Amigo\User Data\*|Web Data FileKey5=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data\*|Web Data FileKey6=%LocalAppData%\CentBrowser\User Data\*|Web Data FileKey7=%LocalAppData%\Chromium\User Data\*|Web Data FileKey8=%LocalAppData%\CocCoc\Browser\User Data\*|Web Data FileKey9=%LocalAppData%\Comodo\Dragon\User Data\*|Web Data FileKey10=%LocalAppData%\Coowon\Coowon\User Data\*|Web Data FileKey11=%LocalAppData%\Epic Privacy Browser\User Data\*|Web Data FileKey12=%LocalAppData%\Flock\User Data\*|Web Data FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Web Data FileKey14=%LocalAppData%\Iridium\User Data\*|Web Data FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|Web Data FileKey16=%LocalAppData%\RockMelt\User Data\*|Web Data FileKey17=%LocalAppData%\Slimjet\User Data\*|Web Data FileKey18=%LocalAppData%\Superbird\User Data\*|Web Data FileKey19=%LocalAppData%\Torch\User Data\*|Web Data FileKey20=%LocalAppData%\Vivaldi\User Data\*|Web Data FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*|Web Data Link to comment Share on other sites More sharing options...
SMalik Posted June 2, 2019 Share Posted June 2, 2019 New Entries [Indexed Databases *] LangSecRef=3026 Detect1=HKLM\Software\Mozilla\Pale Moon Detect2=HKLM\Software\Mozilla\SeaMonkey Detect3=HKLM\Software\Mozilla\Waterfox DetectFile=%AppData%\Mozilla\Firefox Default=False FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*\storage\default|*.*|RECURSE FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage\default|*.*|RECURSE FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*\storage\default|*.*|RECURSE FileKey4=%AppData%\Waterfox\Profiles\*\storage\default|*.*|RECURSE [FlashPlayer Cache *] LangSecRef=3029 Detect1=HKCU\Software\7Star\7Star Detect2=HKCU\Software\360Browser\Browser Detect3=HKCU\Software\Amigo Detect4=HKCU\Software\BraveSoftware Detect5=HKCU\Software\CentBrowser Detect6=HKCU\Software\ChromePlus Detect7=HKCU\Software\Chromium\PreferenceMACs Detect8=HKCU\Software\CocCoc\Browser Detect9=HKCU\Software\Comodo\Dragon Detect10=HKCU\Software\Coowon\Coowon Detect11=HKCU\Software\Epic Privacy Browser Detect12=HKCU\Software\Flock Detect13=HKCU\Software\Iridium Detect14=HKCU\Software\RockMelt Detect15=HKCU\Software\Slimjet Detect16=HKCU\Software\Superbird Detect17=HKCU\Software\Torch Detect18=HKCU\Software\Vivaldi Detect19=HKCU\Software\Yandex\YandexBrowser DetectFile1=%AppData%\brave DetectFile2=%LocalAppData%\Google\Chrome* Default=False FileKey1=%AppData%\brave\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey2=%LocalAppData%\7Star\7Star\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey3=%LocalAppData%\360Browser\Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey4=%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey5=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey6=%LocalAppData%\CentBrowser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey7=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey8=%LocalAppData%\CocCoc\Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey9=%LocalAppData%\Comodo\Dragon\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey10=%LocalAppData%\Coowon\Coowon\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey11=%LocalAppData%\Epic Privacy Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey12=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey14=%LocalAppData%\Iridium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey16=%LocalAppData%\RockMelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey17=%LocalAppData%\Slimjet\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey18=%LocalAppData%\Superbird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey19=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey20=%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE Link to comment Share on other sites More sharing options...
SMalik Posted June 2, 2019 Share Posted June 2, 2019 2 hours ago, APMichael said: Is the following entry correct? (It is your entry, please let us know if it should be revised or removed. Thanks.) [Stored Explorer View *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|1 RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|2 RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|3 RegKey5=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|4 RegKey6=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|5 RegKey7=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|6 RegKey8=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|7 RegKey9=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|8 RegKey10=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|9 RegKey11=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|10 RegKey12=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey13=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0 RegKey14=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx RegKey15=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0 RegKey16=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx I think we should remove it. [Windows ShellBags *] entry is sufficient. Link to comment Share on other sites More sharing options...
APMichael Posted June 3, 2019 Share Posted June 3, 2019 19 hours ago, SMalik said: I checked again. You're right. CCleaner's built-in entries clean those files except [Web Data *]. ... Thank you very much for your quick reply and checking the built-in entries. Just to be safe: We could then remove the following entries (= move them to "Removed entries.ini"), right? [FlashPlayer SharedObjects *] [Local Storage *] [Omnibox Shortcuts *] [Quota Manager Data *] [Anti-Phishing Data *] [DOM Store *] Link to comment Share on other sites More sharing options...
SMalik Posted June 3, 2019 Share Posted June 3, 2019 7 minutes ago, APMichael said: Thank you very much for your quick reply and checking the built-in entries. Just to be safe: We could then remove the following entries (= move them to "Removed entries.ini"), right? [FlashPlayer SharedObjects *] [Local Storage *] [Omnibox Shortcuts *] [Quota Manager Data *] [Anti-Phishing Data *] [DOM Store *] I guess Link to comment Share on other sites More sharing options...
APMichael Posted June 3, 2019 Share Posted June 3, 2019 On 2.6.2019 at 14:33, SMalik said: [Indexed Databases *] ... FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage\default|*.*|RECURSE ... The entry [HTML5 Store *] cleans the folder "\storage" already. Except for the folders "\storage\default\moz-extension*", because Firefox stores all settings of all installed add-ons (extensions) there. Deleting these Indexed Databases resets all add-ons to their default settings. For example, if you use uBlock Origin, you will also delete all downloaded filter lists. ("3647222921wleabcEoxlt-eengsairo.*" stores the settings of an add-on that was silently migrated by Firefox 66. "1671402671ueBglaorcokt0SCeahc.*" stores the uBlock Origin filter lists.) The Indexed Databases created by websites ("\storage\default\http*") are always deleted, even by the built-in entry "Cookies". [HTML5 Store *] ... FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage|*.*|RECURSE ... ExcludeKey2=PATH|%AppData%\Mozilla\Firefox\Profiles\*\storage\default\moz-extension*\|*.* ... On 2.6.2019 at 14:33, SMalik said: [FlashPlayer Cache *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE ... The previous entry [FlashPlayer SharedObjects *] and the built-in entry "Cookies" seem to deliberately exclude this location/file. It seems that the file "settings.sol" stores global settings for the Flash Player in this location: https://forum.piriform.com/topic/32310-winapp2ini-additions/?page=242&tab=comments#comment-280836. (If there are really other files than "settings.sol" in the folder after the cleaning, we also could simply keep the entry [FlashPlayer SharedObjects *].) [FlashPlayer SharedObjects *] ... FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE ... ExcludeKey13=FILE|%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\|settings.sol ... Link to comment Share on other sites More sharing options...
Winapp2.ini Posted June 4, 2019 Author Share Posted June 4, 2019 https://github.com/MoscaDotTo/Winapp2/issues/383 Is it safe to remove %LocalAppData%\Chromium\User Data\Default\Web Applications\? For me this folder only has icons of some extensions (e.g. uBlock Origin, Dark Reader). And they are not removed when you remove corresponding extension. winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
APMichael Posted June 4, 2019 Share Posted June 4, 2019 Many thanks for all the replies and the new or revised entries. Winapp2.ini update:https://github.com/MoscaDotTo/Winapp2/commit/24609673dd246f5756aca501cb0817c28ad990b3 Link to comment Share on other sites More sharing options...
SMalik Posted June 4, 2019 Share Posted June 4, 2019 New Entry [Stored Push Notifications *] LangSecRef=3026 Detect1=HKLM\Software\Mozilla\Pale Moon Detect2=HKLM\Software\Mozilla\SeaMonkey Detect3=HKLM\Software\Mozilla\Waterfox DetectFile=%AppData%\Mozilla\Firefox Default=False FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|notificationstore.json FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|notificationstore.json FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|notificationstore.json FileKey4=%AppData%\Waterfox\Profiles\*|notificationstore.json Link to comment Share on other sites More sharing options...
Recommended Posts