Jump to content
CCleaner Community Forums

CSGalloway

Experienced Members
  • Content Count

    374
  • Joined

  • Last visited

Everything posted by CSGalloway

  1. Shouldn't FileKey4=%CommonAppData%\HP\Installer\Temp|*.* in reference to http://forum.piriform.com/index.php?showtopic=32310&page=242&do=findComment&comment=259821 ?
  2. After using this entry - did you wait for WLM to finish finding the emails? It seems not to have the problems you are experiencing -
  3. CCleaner does not kill Disk Cleanup. I use Win 7 Home x64.
  4. I guess mentioning other party tools is against the rules? Sorry. | Shane has been travelling and hasn't had time to update the download on his end, where voldemort draws his magic from I would assume he just replaces the old winapp2.ini with the newer one. Hence the actually link does not change. I have heard people are having troubles downloading other files like Trim.bat - so I think it's a access rule that is not correct...
  5. Where is the INI file stored and the name of it please?
  6. The settings are stored in "HKCU\Software\Piriform\CCleaner" - could export from the old system and import to the new one....
  7. I use {VOLDEMORT} and it wouldn't download the updated winapp2,ini so I had to finally use Chrome to download the INI to the desktop then move I to the CCleaner folder.
  8. Well a solution that is not elegant - is to uninstall CCleaner then download fresh from www.piriform.com
  9. Could it be System > Desktop Shortcuts was selected and it removed dead shortcuts - or maybe Windows > Icon Cache was selected? Has DavidOptrics restarted the computer to see if the icons will reappear?
  10. You have to use CMD as administrator then search for the folder -
  11. Well then do not include the entry in winapp2.ini - thanks
  12. I thought BAK files were backups and safe to delete. And anyway: 10/17/2002 20:23 8,200 OPA11.BAK 3/20/2013 14:22 11,094 opa11.dat so I thought OFFICE would be using the .DAT file and not the .BAK one...
  13. New: [Google Chrome ART*] LangSecRef=3022 SpecialDetect=DET_CHROME Default=False FileKey1=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak FileKey2=%CommonProgramFiles%\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE Add FileKey 7 [Microsoft Security Essentials*] LangSecRef=3021 Detect=HKCU\Software\Microsoft\Microsoft Antimalware Default=False FileKey1=%CommonAppData%\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE FileKey2=%CommonAppData%\Microsoft\Microsoft Antimalware\Scans\History\Service|*.log|RECURSE FileKey3=%CommonAppData%\Microsoft\Microsoft Security Client\Support|MSSecurityClient*.log FileKey4=%LocalAppData%\VirtualStore\ProgramData\Microsoft\Microsoft Antimalware\LocalCopy|*.*|RECURSE FileKey5=%LocalAppData%\VirtualStore\ProgramData\Microsoft\Microsoft Antimalware\Scans\History\Service|*.log|RECURSE FileKey6=%LocalAppData%\VirtualStore\ProgramData\Microsoft\Microsoft Security Client\Support|MSSecurityClient*.log FileKey7=%CommonAppData%\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak New: [MaceCraft PowerTools hosts backups*] LangSecRef=3024 Default=False DetectFile=%CommonProgramFiles%\jv16 PowerTools *\jv16PT.exe FileKey1=%windir%\System32\drivers\etc|hosts_PTBackup*.bak Add FileKey11 [Windows Live Messenger More*] LangSecRef=3022 Detect=HKLM\Software\Microsoft\Windows Live\Messenger Default=False FileKey1=%CommonProgramFiles%\Windows Live\.cache|*.*|RECURSE FileKey2=%LocalAppData%\Microsoft\Messenger|*.uccapilog;*.bak;*.txt|RECURSE FileKey3=%LocalAppData%\Microsoft\Windows Live|*.log;*.jrs;*.sqm|RECURSE FileKey4=%LocalAppData%\Microsoft\Windows Live Contacts|*.log;*.jrs|RECURSE FileKey5=%LocalAppData%\Microsoft\Windows Live Contacts\*\*\*\Backup|*.*|RECURSE FileKey6=%ProgramFiles%\Windows Live\Messenger|*.bak|RECURSE FileKey7=%WinDir%\System32\config\systemprofile\Documents|wlidsvctrace*.txt FileKey8=%WinDir%\SysWOW64\config\systemprofile\Documents|wlidsvctrace*.txt FileKey9=%LocalAppData%\VirtualStore\Program Files*\Windows Live\Messenger|*.bak|RECURSE FileKey10=%LocalAppData%\VirtualStore\Program Files*\Common Files\Windows Live\.cache|*.*|RECURSE FileKey11=%CommonProgramFiles%\Windows Live\.cache|*.tmp New [CyberLink PowerToGo9*] LangSecRef=3024 Detect=HKCU\Software\CyberLink\Power2Go9 Default=False FileKey1=C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame|*.tmp New [Windows WebCache] LangSecRef=3025 DetectFile=%LocalAppData%\Microsoft\Windows\WebCache\ Default=False FileKey1=%LocalAppData%\Microsoft\Windows\WebCache|*.tmp New [Music Temp Files] LangSecRef=3023 DetectFile=%UserProfile%\Music Default=False FileKey1=%UserProfile%\Music|*.tmp New [Windows Device Icon Downloads *] LangSecRef=3025 Detect=%windir%\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\ Default=False FileKey1=%windir%\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads|*.tmp
  14. For TMP files left after running CCleaner while in Safe mode.... Modify [Google Chrome ART*] to add FileKey2 FileKey2=C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default|*.tmp|RECURSE Modify [Windows Live Messenger More*] to add FileKey11 FileKey11=C:\Program Files (x86)\Common Files\Windows Live\.cache|*.tmp [CyberLink PowerToGo9*] LangSecRef= ? Detect=HKCU\Software\CyberLink\Power2Go9 Default=False FileKey1=C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame|*.tmp [Windows WebCache] LangSecRef= ? DetectFile=%LocalAppData%\Microsoft\Windows\WebCache\ Default=False FileKey1=%LocalAppData%\Microsoft\Windows\WebCache|*.tmp [Music Temp Files] LangSecRef= ? DetectFile=%UserProfile%\Music Default=False FileKey1=%UserProfile%\Music|*.tmp [Windows Device Icon Downloads *] LangSecRef= ? Detect=%windir%\System32\%LOCALAPPDATA%\Microsoft\Device Metadata\dmrccache\downloads\ Default=False FileKey1=%windir%\System32\%LOCALAPPDATA%\Microsoft\Device Metadata\dmrccache\downloads|*.tmp
  15. For left over BAK files after running CCleaner in Safe mode New: [Google Chrome ART*] LangSecRef= ? SpecialDetect=DET_CHROME Default=False FileKey1=C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak Modify [Microsoft Security Essentials*] to add: FileKey7=C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak NEW: [MS Office 2003*] LangSecRef=3021 Detect=HKCU\Software\Microsoft\Office\11.0 Default=False FileKey1=C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK New: [MaceCraft PowerTools hosts backups*] LangSecRef= not sure here Default=False DetectFile=C:\Program Files (x86)\jv16 PowerTools *\jv16PT.exe FileKey1=%windir%\System32\drivers\etc|hosts_PTBackup*.bak
  16. I did a search of %systemdisk% for both BAK and TMP files and would like modifications to winapp2.ini to included these or why each one won't be included please. C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK C:\Windows\System32\drivers\etc\hosts_PTBackup.bak C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak C:\Z_UserFiles\Unkn\BAK_000\settings.bak C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp C:\Users\Administrator\AppData\Local\Temp\DIOB0C9.tmp C:\Users\Administrator\AppData\Local\Temp\MAR8E98.tmp C:\Users\Administrator\AppData\Local\Temp\MAR9202.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8B.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8C.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8D.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIcons\7B8E.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIconsOld\3E6A.tmp C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\JumpListIconsOld\3E6B.tmp C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp C:\Users\Galloway\AppData\Local\Temp\DIO5FA.tmp C:\Users\Galloway\AppData\Local\Temp\DIO7EC2.tmp C:\Users\Galloway\AppData\Local\Temp\DIO464A.tmp C:\Users\Galloway\AppData\Local\Temp\DIOAE4A.tmp C:\Users\Galloway\AppData\Local\Temp\DIOD98.tmp C:\Users\Galloway\AppData\Local\Temp\DIOD115.tmp C:\Users\Galloway\AppData\Local\Temp\MAR65B5.tmp C:\Users\Galloway\AppData\Local\Temp\MAR623B.tmp C:\Users\Galloway\AppData\Local\Temp\MAR973F.tmp C:\Users\Galloway\AppData\Local\Temp\MAR975F.tmp C:\Users\Galloway\AppData\Local\Temp\MAR3557.tmp C:\Users\Galloway\AppData\Local\Temp\MAR3597.tmp C:\Users\Galloway\AppData\Local\Temp\MARB7AA.tmp C:\Users\Galloway\AppData\Local\Temp\MARB866.tmp C:\Users\Galloway\AppData\Local\Temp\MARE9B2.tmp C:\Users\Galloway\AppData\Local\Temp\MARE9E2.tmp C:\Users\Galloway\AppData\Local\Temp\MARECBE.tmp C:\Users\Galloway\AppData\Local\Temp\MAREEA2.tmp C:\Users\Galloway\AppData\Local\Temp\~DFD841554722215779.TMP C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp C:\Users\Galloway\Music\91F61065-CF82.tmp C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\BIT2DD1.tmp Regards
  17. I searched the %systemdrive% for both TMP and BAK files and would like suitable entries to be made - even if merged with the existing winapp2.ini ones.... 2011-02-11 12:00:42.742 8,192 C:\BOOTSECT.BAK 2014-12-21 01:37:29.552 544 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$IRAYQ8C.TMP 2014-12-20 23:58:12.675 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RDTQ5QN.TMP 2014-12-21 02:15:29.130 16,384 C:\$RECYCLE.BIN\S-1-5-21-1722484443-3582388537-2899109180-1000\$RZ472UH.TMP 2014-09-28 17:06:26.579 64,306 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\Preferences.bak 2014-12-11 23:29:29.989 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83D6.tmp 2014-12-11 23:29:30.005 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E8.tmp 2014-12-11 23:29:30.006 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83E9.tmp 2014-12-11 23:29:30.029 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\83EA.tmp 2014-12-11 23:29:30.046 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIcons\841A.tmp 2014-12-11 23:28:38.734 28,134 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BB90.tmp 2014-12-11 23:28:38.746 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA2.tmp 2014-12-11 23:28:38.748 0 C:\Program Files\Adware-Removal-Tool\Quarantine\Google Chrome\Default\JumpListIconsOld\BBA3.tmp 2014-03-07 13:58:02.929 46,862 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\Preferences.bak 2014-04-19 14:13:25.654 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIcons\32FA.tmp 2014-04-19 14:03:10.483 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03A.tmp 2014-04-19 14:03:10.485 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03B.tmp 2014-04-19 14:03:10.487 0 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03C.tmp 2014-04-19 14:03:10.501 28,134 C:\Program Files\Common Files\Microsoft\ART\Backup\Google Chrome\Default\JumpListIconsOld\D03D.tmp 2014-02-22 15:56:15.099 235,550 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc3B52.tmp 2014-04-24 19:32:45.519 235,566 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlc8B43.tmp 2014-01-03 16:23:32.114 235,478 C:\Program Files (x86)\Common Files\Windows Live\.cache\wlcA893.tmp 2011-03-24 21:08:09.410 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg272.tmp 2011-03-24 21:08:09.425 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg273.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg274.tmp 2011-03-24 21:08:09.441 217,160 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg275.tmp 2011-03-24 21:08:09.472 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg276.tmp 2011-03-24 21:08:09.488 131,888 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\leg277.tmp 2011-03-24 21:08:09.347 216,229 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legB1B.tmp 2011-03-24 21:08:09.394 159,852 C:\Program Files (x86)\Cyberlink\Power2Go9\Template\Cyberlink\frame\legF2.tmp 2014-12-20 07:13:46.564 33,554,583 C:\ProgramData\Microsoft\Microsoft Antimalware\Network Inspection System\Support\NisLog.txt.bak 2002-10-17 20:23:16.000 8,200 C:\ProgramData\Microsoft\OFFICE\DATA\OPA11.BAK 2014-09-28 17:06:26.579 64,306 C:\Users\Galloway\AppData\Local\Google\Chrome\User Data\Default\Preferences.bak 2014-12-20 22:11:45.504 524,288 C:\Users\Galloway\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.tmp 2014-12-20 22:12:09.787 0 C:\Users\Galloway\AppData\Local\VirtualStore\Program Files (x86)\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp 2014-10-31 19:29:25.067 5,540 C:\Users\Galloway\AppData\Roaming\Mozilla\Firefox\Profiles\y73yivh7.default-1408590376909\extensions.json.bak 2014-12-09 13:36:34.300 1,232 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\GeneralSettings.bak 2014-12-11 23:38:56.063 1,081 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\LiveUpdate.bak 2014-12-09 13:36:34.341 1,045 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RegistryCleaner.bak 2014-12-11 23:38:58.064 989 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\RescueCenter.bak 2014-12-04 23:56:57.800 2,089 C:\Users\Galloway\AppData\Roaming\Pointstone\Registry Cleaner\Statistics\REGISTRY_CLEANER.bak 2014-09-07 13:33:52.768 0 C:\Users\Galloway\Music\91F61065-CF82.tmp 2013-12-21 04:03:25.877 0 C:\Users\Public\Music\91F61065-CF82.tmp 2014-11-22 13:49:47.146 0 C:\Windows\System32\drivers\etc\hosts_PTBackup.bak 2014-11-22 13:33:54.594 837 C:\Windows\System32\drivers\etc\hosts_PTbackup2.bak 2005-07-02 17:57:28.000 4,204 C:\Z_UserFiles\Unkn\BAK_000\settings.bak Thank you!
  18. Edit needed. [Yahoo Messenger Logs*] Needs to exclude: %ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG as that file is used to remove Yahoo Messenger .....
  19. mklink /d \My Programs\JDownloader v2\ %ProgramFiles%\JDownloader v2\ Is what I would need?
  20. [JDownloader2 Logs*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 DetectFile=%ProgramFiles%\JDownloader 2\ Default=False FileKey1=%ProgramFiles%\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE FileKey2=%ProgramFiles%\JDownloader*2*\logs|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.* FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\logs|*.*|RECURSE FileKey5=C:\My Programs\JDownloader*2*|JDownloader.log;Updater_*-*-*.log;SessionInstallLog.json.*|RECURSE FileKey6=C:\My Programs\JDownloader*2*\logs|*.*|RECURSE : added FileKey5 and 6 [JDownloader2 Temps*] LangSecRef=3022 Detect=HKLM\SOFTWARE\Classes\JDownloader2 DetectFile=%ProgramFiles%\JDownloader 2\ Default=False FileKey1=%ProgramFiles%\JDownloader*2*\tmp|*.*|RECURSE FileKey2=%ProgramFiles%\JDownloader*2*\captchas|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\tmp|*.*|RECURSE FileKey4=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\captchas|*.*|RECURSE FileKey5=%ProgramFiles%\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey6=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey7=C:\My Programs\JDownloader*2*\captchas|*.*|RECURSE FileKey8=C:\My Programs\JDownloader*2*\cfg|CaptchaDialogDimensions_*.json FileKey9=C:\My Programs\JDownloader*2*\tmp|*.*|RECURSE ExcludeKey1=%ProgramFiles%\JDownloader*2*\cfg\subconf_*.ejs ExcludeKey2=%LocalAppData%\VirtualStore\Program Files*\JDownloader*2*\cfg\subconf_*.ejs ExcludeKey3=C:\My Programs\JDownloader*2*\cfg\subconf_*.ejs : added FileKeys 7-9 and ExcludeKey3
  21. I have JDownloader2 installed in C:\My Programs\JDownloader v2.0\ - I do however have the HKLM\... key. would it be possible to add the C:\My Programs\JDownloader v2.0 as additional filekeys to all the JDownloader2 entries? Or what is the best way to do it? I have it installed there instead of %ProgramFiles% sicne it does modify the contents of the folder.....
×
×
  • Create New...