Jump to content
CCleaner Community Forums

Winapp2.ini additions


Recommended Posts

  • Moderators
On 01/08/2020 at 12:59, SMalik said:

Revised Entries

[Windows Logs *]

 

Thank you for posting that, been awhile since I updated that cleaning entry. Just cleared up a little over 93MB.

Link to post
Share on other sites

Revised Entry

[MS Office *]
LangSecRef=3021
Detect1=HKCU\Software\Microsoft\Office\11.0
Detect2=HKCU\Software\Microsoft\Office\12.0
Detect3=HKCU\Software\Microsoft\Office\14.0
Detect4=HKCU\Software\Microsoft\Office\15.0
Detect5=HKCU\Software\Microsoft\Office\16.0
FileKey1=%AppData%\Microsoft\Document Building Blocks|*.*|RECURSE
FileKey2=%AppData%\Microsoft\Office|*.tmp|RECURSE
FileKey3=%AppData%\Microsoft\OIS|Toolbars.dat
FileKey4=%AppData%\Microsoft\UProof|*.bin;*.XML
FileKey5=%Documents%|~*.ppt;~*.pptx;~*.doc;~*.docx|RECURSE
FileKey6=%LocalAppData%\Microsoft Help|*.*
FileKey7=%LocalAppData%\Microsoft\Office\*|OneNoteOfflineCache.onecache
FileKey8=%LocalAppData%\Microsoft\Office\*\WebServiceCache\AllUsers\officeclient.microsoft.com|*.*|RECURSE
FileKey9=%LocalAppData%\Microsoft\Office\OTele|*.*|RECURSE
FileKey10=%LocalAppData%\Microsoft\OneNote\*|OneNoteOfflineCache.onecache
FileKey11=%LocalAppData%\Microsoft\OneNote\*\cache|*.*|RECURSE
FileKey12=%LocalAppData%\Microsoft\OneNote\*\OneNoteOfflineCache_Files|*.*|RECURSE
FileKey13=%LocalAppData%\Packages\oice_*\AC\Temp|*.*|RECURSE
FileKey14=%SystemDrive%|propfix.log
FileKey15=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Office\OTele|*.*|RECURSE
FileKey16=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Office\OTele|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Office\11.0\MSE|LastLoadedSolution
RegKey2=HKCU\Software\Microsoft\Office\11.0\MSE\FileMRUList
RegKey3=HKCU\Software\Microsoft\Office\11.0\MSE\ProjectMRUList
RegKey4=HKCU\Software\Microsoft\Office\11.0\MSE\SolutionMRUList
RegKey5=HKCU\Software\Microsoft\Office\12.0\Common\Internet|UseRWHlinkNavigation
RegKey6=HKCU\Software\Microsoft\Office\12.0\Word\Reading Locations
RegKey7=HKCU\Software\Microsoft\Office\14.0\Common\Internet|UseRWHlinkNavigation
RegKey8=HKCU\Software\Microsoft\Office\14.0\Word\Reading Locations
RegKey9=HKCU\Software\Microsoft\Office\15.0\Common\Internet|UseRWHlinkNavigation
RegKey10=HKCU\Software\Microsoft\Office\15.0\Word\Reading Locations
RegKey11=HKCU\Software\Microsoft\Office\16.0\Common\Internet|UseRWHlinkNavigation
RegKey12=HKCU\Software\Microsoft\Office\16.0\Word\Reading Locations
RegKey13=HKCU\Software\Microsoft\Office\Common|FontBmpCache
RegKey14=HKCU\Software\Microsoft\OfficeCustomizeWizard\12.0\RecentFileList
RegKey15=HKCU\Software\Microsoft\OfficeCustomizeWizard\14.0\RecentFileList
RegKey16=HKCU\Software\Microsoft\OfficeCustomizeWizard\15.0\RecentFileList
RegKey17=HKCU\Software\Microsoft\OfficeCustomizeWizard\16.0\RecentFileList

Added:
%LocalAppData%\Microsoft\Office\*\WebServiceCache\AllUsers\officeclient.microsoft.com|*.*|RECURSE

Link to post
Share on other sites
  • Moderators
6 hours ago, Winapp2.ini said:

hey neat, this thread is a decade old :)


Good things just keep going despite flood, fire , or plauges. ūüė∑

Link to post
Share on other sites

Please change the entry name of [Xbox *] to [Xbox Console Companion *] and [Game Bar *] to [Xbox Game Bar *]

xbox entries.png

Link to post
Share on other sites

Is it possible to automate Winapp2ool?

I mean, I've set CCleanerClean task to clean the system every 2 weeks on Monday at 21:00, and created a task for running Winapp2ool every 2 weeks on Monday at 15:00. Winapp2ool is opening as it should every 2 week at 15:00, but then I need to choose number 9 to for "Update & Trim", and then push any button to go further, and then 0 to close the Winapp2ool window. Is it possible to automate this process? I'd like to automatically update and trim my winapp2.ini file just before CCleanerClean task clean my system, instead of having to do it manually?

Link to post
Share on other sites

A small update is available for winapp2ool beta that improves the Diff module's output

 

image.thumb.png.5a94d2eba1b43c2f4958e52ab26f88b7.png

image.png.4bf48fb9db0841705d236e4c88e098dc.png

Edited by Winapp2.ini
winapp2ool beta not winapp2ool
Link to post
Share on other sites
13 hours ago, siliconman01 said:

Is version 1.4.7550.20152 still considered "beta"?

Yes, sorry! Version 1.5.x.y will be the next non-beta release, hopefully by this weekend. Most of the recent work on winapp2ool has been to make the docs easier to maintain, and I'm nearly through with that process :)

Link to post
Share on other sites

Revised Entry (new LangSecRef):

 

[OBS *]
LangSecRef=3023
DetectFile1=%AppData%\OBS
DetectFile2=%AppData%\obs-studio
FileKey1=%AppData%\OBS|*.log|RECURSE
FileKey2=%AppData%\OBS\crashDumps|*.*
FileKey3=%AppData%\obs-studio\crashes|*.*
FileKey4=%AppData%\obs-studio\logs|*.*
FileKey5=%AppData%\obs-studio\profiler_data|*.*

Link to post
Share on other sites

Modified entry:  [Dell Logs *]

Changed FileKey15 from FileKey15=%CommonAppData%\PCDr\*\Logs|*.Log to FileKey15=%CommonAppData%\PCDr\*\Logs|*.*  to remove all files in this Logs folder.

[Dell Logs *]
LangSecRef=3024
Detect1=HKLM\Software\Dell\MUP
Detect2=HKLM\Software\Dell\UpdateService
Detect3=HKLM\Software\PC-Doctor
DetectFile1=%AppData%\Creative\DELL Webcam Center
DetectFile2=%CommonAppData%\Dell
DetectFile3=%LocalAppData%\Dell
DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
DetectFile5=%ProgramFiles%\Dell*
FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
FileKey2=%AppData%\PCDr\*\Logs|*.*
FileKey3=%CommonAppData%\Dell\*\Log|*.*
FileKey4=%CommonAppData%\Dell\*\Logs|*.*
FileKey5=%CommonAppData%\Dell\D3\pla\*\*|*.txt|REMOVESELF
FileKey6=%CommonAppData%\Dell\D3\Resources\Logs\serilog|*.*
FileKey7=%CommonAppData%\Dell\Drivers\*|*.log;*.tmp|RECURSE
FileKey8=%CommonAppData%\Dell\Update|*.txt
FileKey9=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
FileKey10=%CommonAppData%\Dell\UpdateService\UpdatePackage\Log|*.txt
FileKey11=%CommonAppData%\PCDr\*\Cache|*.xml
FileKey12=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
FileKey13=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
FileKey14=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
FileKey15=%CommonAppData%\PCDr\*\Logs|*.*
FileKey16=%LocalAppData%\Dell\*\Log|*.*
FileKey17=%LocalAppData%\Dell\DellMobileConnect|*.log
FileKey18=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
FileKey19=%ProgramFiles%\Dell*|*.log|RECURSE

 

Link to post
Share on other sites

Modified entry:  [Quicken *]

Added FileKey6 and FileKey7

[Quicken *]
LangSecRef=3021
Detect1=HKLM\Software\Intuit\Quicken
Detect2=HKLM\Software\Quicken
FileKey1=%AppData%\Intuit\Quicken\Log|*.txt;*.log
FileKey2=%AppData%\Quicken\Log|*.txt;*.log
FileKey3=%CommonAppData%\Intuit\Quicken\Log|*.log
FileKey4=%CommonAppData%\Intuit\Quicken\Log\installer|*.*|REMOVESELF
FileKey5=%CommonAppData%\Intuit\SendError|*.log
FileKey6=%CommonAppData%\Quicken\Inet\QWWebData|Log.old
FileKey7=%CommonAppData%\Quicken\Inet\QWWebData\Cache|*.*
FileKey8=%CommonAppData%\Quicken\Log|*.log
FileKey9=%CommonAppData%\Quicken\Log\installer|*.*|REMOVESELF
FileKey10=%CommonAppData%\Quicken\SendError|*.log
FileKey11=%LocalAppData%\Intuit\Common\Authorization\V1\Logs|*.txt
FileKey12=%LocalAppData%\Quicken\Common\Authorization\V1\Logs|*.txt
FileKey13=%ProgramFiles%\Quicken\PDFDrv|install.log;InstallPDFConverter.log

 

Link to post
Share on other sites

Modified entry:  [Malwarebytes Anti-Malware *]

Added FileKey7=%LocalAppData%\Crashdumps\Malwarebytes|*.*|REMOVESELF

[Malwarebytes Anti-Malware *]
LangSecRef=3024
Detect=HKCU\Software\Malwarebytes
DetectFile=%ProgramFiles%\Malwarebytes Anti-Malware\mbam.exe
Warning=You must manually and temporarily turn off Malwarebytes "self-protection" to remove the logs.
FileKey1=%AppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware|mbam-setup.exe
FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
FileKey4=%CommonAppData%\Malwarebytes\MBAMService|*.log;*.bak;*.regtrans-ms;*.TM.blf;*-ntuser.dat;*.LOG1;*.LOG2;*-UsrClass.dat
FileKey5=%CommonAppData%\Malwarebytes\MBAMService\logs|*.*
FileKey6=%CommonAppData%\Malwarebytes\MBAMService\ScanResults|*.*
FileKey7=%LocalAppData%\Crashdumps\Malwarebytes|*.*|REMOVESELF

 

Link to post
Share on other sites

Modifiec entry:  [Cyberlink PowerDVD *]

Added Filekey2

[CyberLink PowerDVD *]
LangSecRef=3023
Detect1=HKCU\Software\CyberLink\PowerDVD14
Detect2=HKCU\Software\CyberLink\PowerDVD15
Detect3=HKCU\Software\CyberLink\PowerDVD16
Detect4=HKCU\Software\CyberLink\PowerDVD17
Detect5=HKCU\Software\CyberLink\PowerDVD18
Detect6=HKCU\Software\CyberLink\PowerDVD19
Detect7=HKCU\Software\CyberLink\PowerDVD20
FileKey1=%CommonAppData%\Cyberlink\Evoparser|*.xml
FileKey2=%CommonAppData%\SUPPORTDIR\*|*.log
FileKey3=%LocalAppData%\Cyberlink\DigitalHome|*.log|RECURSE
FileKey4=%LocalAppData%\Cyberlink\PowerDVD*|*.log|RECURSE
FileKey5=%LocalAppData%\Cyberlink\PowerDVD*\cache*|*.*|RECURSE
FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser|*.*|RECURSE
FileKey7=%LocalAppData%\Cyberlink\PowerDVD*\DB*\computer|*.db|RECURSE
FileKey8=%LocalAppData%\Cyberlink\PowerDVD*\DefaultMember|*.*|RECURSE
RegKey1=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey2=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey3=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey4=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey5=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey6=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey7=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey8=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey9=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey10=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey11=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey12=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey13=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey14=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey15=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey16=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey17=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey18=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Thumbnail5

 

Link to post
Share on other sites

New Entries:

[AOMEI Backupper *]
LangSecRef=3024
DetectFile=%ProgramFiles%\AOMEI Backupper
FileKey1=%CommonAppData%\AomeiBR|brlog.xml
FileKey2=%ProgramFiles%\AOMEI Backupper\log|*.*
FileKey3=%ProgramFiles%\AOMEI Backupper\AOMEI Image Deploy\log|*.*

[CoinManage *]
LangSecRef=3021
Detect=HKCU\Software\Liberty Street Software\CoinManage
Detect2=HKCU\Software\Liberty Street Software\CoinManage Canada
Default=False
FileKey1=%ProgramFiles%\CoinManage*|*.txt

[CoinManage Crash Reports *]
LangSecRef=3021
Detect=HKCU\Software\Liberty Street Software\CoinManage
Detect2=HKCU\Software\Liberty Street Software\CoinManage Canada
Default=False
FileKey1=%Documents%|CoinManage.zip;CRASH.DMP;ERRORLOG.TXT;XCrashReport.ini;XCRASHREPORT_Mon1.bmp

[CurrencyManage *]
LangSecRef=3021
Detect=HKCU\Software\Liberty Street Software\CurrencyManage
Default=False
FileKey1=%ProgramFiles%\CurrencyManage|*.txt

[PrivaZer *]
LangSecRef=3024
Detect=HKCU\Software\PrivaZer
Default=False
FileKey1=%LocalAppData%\PrivaZer|*.txt

[PrivaZer Backups *]
LangSecRef=3024
Detect=HKCU\Software\PrivaZer
DetectFile=%ProgramFiles%\PrivaZer
Default=False
Warning=This deletes PrivaZer Registry backups.
FileKey1=%LocalAppData%\PrivaZer\Registry backups|*.*|RECURSE
FileKey2=%ProgramFiles%\PrivaZer\PrivaZer registry backups|*.*|RECURSE

[R-Wipe & Clean *]
LangSecRef=3024
Detect=HKLM\Software\R-TT\RWC
Default=False
FileKey1=%ProgramFiles%\R-Wipe & Clean|*.txt
FileKey2=%AppData%\R-TT|*.*|REMOVESELF

 

Link to post
Share on other sites

New Entry:

[Athentech Perfectly Clear Temps *]
LangSecRef=3021
Detect=HKLM\Software\Athentech
Default=False
FileKey1=%LocalAppData%\cache\Athentech|*.*|REMOVESELF

 

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...