Jump to content
CCleaner Community Forums

APMichael

Experienced Members
  • Content count

    602
  • Joined

  • Last visited

Everything posted by APMichael

  1. Winapp2.ini additions

    Yes, a ExcludeKey for "single" files would always work without it. Because CC accept that syntax. If a syntax works or not only relies on the syntax itself respectively how CC interpret it. It's absolutely not related to the excluded file or the application the entry is written for. But if a future CC version will check the syntax stricter, we should use the syntax from the official documentation. I don't understand your concern. The syntax from the official documentation works always, is more accurate and future proof. CC uses the same syntax in the ccleaner.ini (and the "settings" registry). And some of the current ExcludeKeys are definitely wrong and won't work. The overhaul and a common syntax for all entries is important.
  2. Winapp2.ini additions

    My final words about the ExcludeKey syntax. I discovered the official documentation: http://www.piriform.com/docs/ccleaner/advanced-usage/ccleaner-ini-files/how-to-exclude-items-from-ccleaners-cleaning. I don't know since when this documentation exists, but somehow I missed it. The official documentation should always be the reference for the syntax. Therefore, I revised all the ExcludeKeys again and posted them on GitHub. @siliconman01: The "unnecessary" pipe symbol is back again! Even if the entries usually would work without it. (CCleaner seems to allow much tolerance in the syntax.)
  3. Winapp2.ini additions

    Modified entries: Sorted, and fixed (not working) ExcludeKeys. [360 Browser - Cache*] LangSecRef=3029 Detect=HKCU\Software\360Browser\Browser Default=False FileKey1=%LocalAppData%\360Browser\Browser\User Data\Default|*-journal* FileKey2=%LocalAppData%\360Browser\Browser\User Data\Default\Cache|*.* FileKey3=%LocalAppData%\360Browser\Browser\User Data\Default\Local Storage|*.* ExcludeKey1=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\Login data-journal ExcludeKey2=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\switcher-journal ExcludeKey3=FILE|%LocalAppData%\360Browser\Browser\User Data\Default\Web data-journal [HuluPlus*] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\HuluLLC.HuluPlus_fphbd361v8tya Default=False FileKey1=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCookies|*.*|RECURSE FileKey3=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetHistory|*.*|RECURSE FileKey4=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Temp|*.* FileKey5=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Microsoft\CryptnetUrlCache\Content|*.* FileKey6=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.* FileKey7=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\TempState|*.*|RECURSE FileKey8=%LocalAppData%\Packages\HuluLLC.HuluPlus_*\LocalState|*.tmp|RECURSE ExcludeKey1=FILE|%LocalAppData%\Packages\HuluLLC.HuluPlus_*\AC\INetCache\container.dat [Internet Explorer More*] LangSecRef=3022 Detect=HKCU\Software\Microsoft\Internet Explorer Default=False FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE FileKey10=%LocalAppData%\Microsoft\Windows\INetCache\Content.Word|*.* FileKey11=%LocalAppData%\Microsoft\Windows\INetCache\IE|*.*|RECURSE FileKey12=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE FileKey13=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF FileKey14=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE FileKey15=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey16=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey17=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE FileKey18=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE FileKey19=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey20=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey21=%WinDir%\System32\config\Systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey22=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey23=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore RegKey5=HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl RegKey6=HKCU\Software\Microsoft\Internet Explorer\PageSetup RegKey7=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete RegKey8=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime RegKey9=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE\container.datI think all syntax mismatches should be fixed now.
  4. Winapp2.ini additions

    Please don't take it personally! It wasn't my intention. Bugs in applications are something different. We are just talking about the syntax of the ExcludeKeys! And that syntax gets interpreted by CCleaner only and not by the application the entry is written for. I know the posts you mentioned about the ExcludeKeys. If you search them you will see that the syntax was wrong always, like "folder|file.txt" which doesn't work. You can correct that to "folder\file.txt" or "folder\|file.txt". The second one is correct and working, but simply not necessary. I just want to help to clean up winapp2.ini and to make sure that the syntax is common for all entries. (That's essential if e.g. somebody wants to code a tool for error checking the winapp2.ini file.) (BTW: We are talking about only 2 of 2,495 entries.) Edit: Please ignore it! More information: #6536
  5. Winapp2.ini additions

    There are .cab files if you wait long enough, until the .log file reaches his file size limit! It's not necessary to leave them as is, because it's 100% clear how the ExcludeKey works: #4274. The revised [Jump Lists*] entry works flawless. All other entries don't have that unnecessary pipe symbol also. And we should use a common syntax for all the winapp2.ini entries! If we "just leave developed and tested code as is" then we have to stop overhauling of winapp2.ini completely.
  6. Winapp2.ini additions

    Modified entry: Removed unnecessary pipe symbols from ExcludeKeys. [FlashPlayer SharedObjects*] LangSecRef=3029 SpecialDetect=DET_CHROME Detect1=HKCU\Software\Chromium Detect2=HKCU\Software\SuperBird Detect3=HKCU\Software\Torch Detect4=HKCU\Software\Vivaldi Default=False FileKey1=%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey2=%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey3=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey4=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey5=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey6=%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey7=%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey8=%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey9=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE FileKey10=%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE ExcludeKey1=FILE|%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey2=FILE|%LocalAppData%\Chrome Plus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey3=FILE|%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey4=FILE|%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey5=FILE|%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey6=FILE|%LocalAppData%\Rockmelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey7=FILE|%LocalAppData%\SRWare Iron\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey8=FILE|%LocalAppData%\SuperBird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey9=FILE|%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol ExcludeKey10=FILE|%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\settings.sol Modified entry: Removed unnecessary pipe symbol from ExcludeKey. [Jump Lists*] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%AppData%\Microsoft\windows\recent\Automaticdestinations|*.*|RECURSE FileKey2=%AppData%\Microsoft\windows\recent\CustomDestinations|*.*|RECURSE ExcludeKey1=FILE|%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
  7. Winapp2.ini additions

    Modified entry: Changed Detect and removed unnecessary pipe symbols from ExcludeKeys. [Multi-Edit 2008 Logs*] LangSecRef=3024 Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0 Default=False FileKey1=%AppData%\Multi Edit Software|*.log|RECURSE ExcludeKey1=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\EVOLVE.LOG ExcludeKey2=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\FILEPANE.LOG ExcludeKey3=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\INSTALL.LOG ExcludeKey4=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\POLYSTYLE.LOG ExcludeKey5=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\TMPLPANE.LOG ExcludeKey6=FILE|%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\WINLIST.LOG Modified entry: Changed name from [Multi-Edit 2008 11.04*] to [Multi-Edit 2008 Temps*] and corrected LangSecRef. [Multi-Edit 2008 Temps*] LangSecRef=3024 Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0 Default=False FileKey1=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\Tmp|*.TMP Edit: Fixed entry.
  8. Winapp2.ini additions

    Modified entries: Revised those Detect lines. [Active Setup Temp Folder*] LangSecRef=3025 Detect=HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders [Age of Empires*] Section=Games Detect1=HKLM\Software\Microsoft\Games\Age of Empires Detect2=HKLM\Software\Microsoft\Microsoft Games\Age of Empires Detect3=HKLM\Software\Microsoft\microsoft games\age of empires 3 [Auslogics Registry Cleaner*] LangSecRef=3024 Detect1=HKCU\Software\Auslogics\Registry Cleaner Detect2=HKLM\Software\Auslogics\Registry Cleaner\3.x Detect3=HKLM\Software\Auslogics\Registry Cleaner\4.x Detect4=HKLM\Software\Auslogics\Registry Cleaner\5.X [Bitcoin*] LangSecRef=3022 Detect1=HKCU\Software\Bitcoin Detect2=HKCU\Software\Bitcoin Core Detect3=HKLM\SOFTWARE\Bitcoin Core [Copernic DesktopSearch4 Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Copernic\DesktopSearch4 [Crysis 3*] Section=Games Detect=HKLM\Software\Crytek\Crysis 3 [CyberLink PhotoDirector*] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PhotoDirector3 Detect2=HKLM\Software\CyberLink\PhotoDirector4 Detect3=HKLM\SOFTWARE\CyberLink\PhotoDirector6 Detect4=HKCU\Software\Cyberlink\PowerDirector7 Detect5=HKCU\Software\CyberLink\PowerDirector10 Detect6=HKCU\Software\CyberLink\PowerDirector11 Detect7=HKCU\Software\CyberLink\PowerDirector12 Detect8=HKCU\Software\CyberLink\PowerDirector13 [Dragon Age: Origins*] Section=Games Detect1=HKCU\Software\BioWare\Dragon Age Detect2=HKLM\Software\BioWare\Dragon Age [DVBDream*] LangSecRef=3024 Detect=HKLM\SOFTWARE\DVBDream [Forte Agent*] LangSecRef=3025 Detect=HKLM\SOFTWARE\Forte [FossaMail Corrupt SQLites*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Crash Reports*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Extensions Log*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Log*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Maintenance Service*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Minidumps*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Net Predictions*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Startup Cache*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail TestPilot Error Logs*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail Update Logs*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [FossaMail webappsstore.sqlite*] LangSecRef=3030 Detect=HKLM\SOFTWARE\Mozilla\FossaMail [Hedgewars VideoTemp*] Section=Games Detect=HKLM\SOFTWARE\Hedgewars [HitmanPro*] LangSecRef=3024 Detect1=HKCU\Software\HitMan Pro Detect2=HKCU\Software\HitMan Pro 2 Detect3=HKCU\Software\HitMan Pro 3 Detect4=HKLM\SOFTWARE\HitmanPro [League of Legends*] Section=Games Detect1=HKCU\Software\Bugsplat\lol_beta_riotgames_com Detect2=HKCU\Software\Riot Games Detect3=HKLM\Software\Riot Games [Logitech Desktop Messenger*] LangSecRef=3024 Detect1=HKCU\Software\Logitech\DesktopMessenger Detect2=HKLM\SOFTWARE\Logitech\DesktopMessenger Detect3=HKLM\SOFTWARE\Logitech\Logitech Desktop Messenger [Microsoft XNA Game Studio*] Section=Games Detect=HKLM\Software\Microsoft\XNA [Midori - Cache*] LangSecRef=3022 Detect=HKLM\Software\Midori [Midori - Cookies*] LangSecRef=3022 Detect=HKLM\Software\Midori [Midori - History*] LangSecRef=3022 Detect=HKLM\Software\Midori [Midori - Session*] LangSecRef=3022 Detect=HKLM\Software\Midori [Neostar CMS Station Client Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\company\Neostar CMS [Nero*] LangSecRef=3021 Detect1=HKLM\Software\Nero\Nero 11\Nero11Suite Detect2=HKLM\Software\Nero\Nero 12\Nero12Suite [OpenOffice.org Setup Files*] LangSecRef=3021 Detect1=HKLM\Software\OpenOffice Detect2=HKLM\Software\OpenOffice.org [OpenOffice.org*] LangSecRef=3021 Detect1=HKLM\Software\OpenOffice Detect2=HKLM\Software\OpenOffice.org [Samsung Magician Logs*] LangSecRef=3021 Detect=HKLM\Software\Samsung Magician [Seagate SeaTools for Windows Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\SeaToolsforWindows [TrendMicro RUBotted Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\TrendMicro\RUBotted [UltraDefrag Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UltraDefrag DetectFile=%WinDir%\UltraDefrag\ultradefrag.exe [Windows Live Writer Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Microsoft\Windows Live Writer [Wistron Corp Launch Manager Logs*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Wistron Corp\Launch Manager [Wondershare PDF Editor*] LangSecRef=3021 Detect=HKLM\Software\Wondershare\Wondershare PDF Editor [Wondershare Video Converter Ultimate More*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Wondershare\Wondershare Video Converter Ultimate [XnView More*] LangSecRef=3023 Detect1=HKCU\Software\XnView Detect2=HKLM\Software\XnView
  9. Winapp2.ini additions

    No, CC doesn't remove the .cab files! (winsys.ini: FileKey15=%windir%\Logs|*.log|RECURSE) Modified entry: [CBS Logs*] LangSecRef=3025 Detect=HKLM\Software\Microsoft\Windows Default=False FileKey1=%WinDir%\Logs\CBS|*.cab
  10. Yes, the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WbemPerf" is a Windows default key. Only the mentioned subkeys (\001 to \004) are created by the malware.
  11. Winapp2.ini additions

    I don't know the game. It looks like there's a special German version available. But Detect4 and 5 are not necessary, because CC checks "Wow6432Node" automatically. I found many entries with an unnecessary "Wow6432Node" Detect, using the following regular expression: ^Detect.+\\Wow6432Node\\.+
  12. Winapp2.ini additions

    Thanks for the update! Missed post: #6485 I found some more entries with a wrong or inconsistent VirtualStore path. And fixed them: [Multi-Edit 2008 11.04*] LangSecRef=3021 Detect=HKCU\Software\Multi Edit Software\Multi-Edit\11.0 Default=False FileKey1=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04|*.bak FileKey2=%AppData%\Multi Edit Software\Multi-Edit\11\Config.04\Tmp|*.* FileKey3=%LocalAppData%\VirtualStore\Program Files*\Multi-Edit 2008\Config|*.tmp FileKey4=%ProgramFiles%\Multi-Edit 2008\Config|*.tmp [My Horse and Me*] Section=Games Detect1=HKLM\SOFTWARE\My Horse and Me 2 Detect2=HKLM\SOFTWARE\Atari\Mein Pferd und ich Demo Detect3=HKLM\SOFTWARE\Atari\Mein Pferd und ich Detect4=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich Demo Detect5=HKLM\SOFTWARE\Wow6432Node\Atari\Mein Pferd und ich Default=False FileKey1=%LocalAppData%\VirtualStore\Program Files*\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE FileKey2=%LocalAppData%\VirtualStore\Program Files*\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE FileKey4=%ProgramFiles%\Atari\Mein Pferd und ich*\System|++ Finish log.txt;++ Start log.txt;*.log|RECURSE FileKey5=%ProgramFiles%\Atari\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE FileKey6=%ProgramFiles%\Atari\W!Games\My Horse and Me|++ Finish log.txt;++ Start log.txt;*.log|RECURSE [Warcraft III*] Section=Games Detect=HKLM\Software\Blizzard Entertainment\Warcraft III DetectFile=%ProgramFiles%\Warcraft III\Warcraft III.exe Default=False FileKey1=%LocalAppData%\VirtualStore\Program Files*\Warcraft III|*.log;*.html FileKey2=%LocalAppData%\VirtualStore\Program Files*\Warcraft III\Errors|*.dmp;*.txt FileKey3=%ProgramFiles%\Warcraft III|*.log;*.html FileKey4=%ProgramFiles%\Warcraft III\Errors|*.dmp;*.txt ExcludeKey1=FILE|%ProgramFiles%\Warcraft III|*CustomKeyInfo.txt;*CustomKeysSample.txt [Yahoo Messenger Cache*] LangSecRef=3022 Detect=HKCU\Software\Yahoo\pager Default=False FileKey1=%AppData%\Yahoo!\Messenger|*.*|RECURSE FileKey2=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.*|RECURSE [Yahoo Messenger Logs*] LangSecRef=3022 Detect=HKCU\Software\Yahoo\pager Default=False FileKey1=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Cache|*.log;*.tmp FileKey2=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\logs|*.log|RECURSE FileKey3=%ProgramFiles%\Yahoo!\Messenger|*.log ExcludeKey1=FILE|%ProgramFiles%\Yahoo!\Messenger\INSTALL.LOG [Yahoo Messenger Profiles*] LangSecRef=3022 Detect=HKCU\Software\Yahoo\pager Default=False Warning=This will also delete your saved chat histories. FileKey1=%LocalAppData%\VirtualStore\Program Files*\Yahoo!\Messenger\Profiles|*.*|RECURSE FileKey2=%ProgramFiles%\Yahoo!\Messenger\Profiles|*.*|RECURSE
  13. Winapp2.ini additions

    Modified entry: Missing pipe symbol | in FileKey1. [Winamp More*] LangSecRef=3023 Detect=HKCU\Software\Winamp Default=False Warning=This removes the current playlist. FileKey1=%APPDATA%\Winamp|Winamp.m3u;Winamp.m3u8
  14. Winapp2.ini additions

    Modified entry: [MakeHuman] needs an asterisk: [MakeHuman*]
  15. Winapp2.ini additions

    I think there was a little misunderstanding about the trailing pipe symbols |. (But the trailing backslashes \ were also unnecessary.) Modified entry: Removed trailing pipe symbol | from RECURSE. [Acrok Video Converter Ultimate*] LangSecRef=3023 Detect=HKCU\Software\Acrok Software\Acrok Video Converter Ultimate Default=False FileKey1=%AppData%\Acrok\Acrok Video Converter Ultimate|*.dmp FileKey2=%AppData%\Acrok\Acrok Video Converter Ultimate\log|*.* FileKey3=%UserProfile%\.BDAccess|*.*|RECURSE Modified entry:Removed trailing pipe symbol | from RECURSE. [MS Office 2013/16 ClickToRun Update Files*] LangSecRef=3021 Detect1=HKCU\Software\Microsoft\Office\15.0 Detect2=HKCU\Software\Microsoft\Office\16.0 Default=False FileKey1=%CommonAppData%\Microsoft\ClickToRun\ProductReleases|*.*|RECURSE And with the following regular expression you can find 38 unnecessary trailing backslashes: ^(FileKey[^\|]+)\\\|You can use Search and Replace: \1\|
  16. The bug still occurs in version 5.36... (Firefox 56.0.1)
  17. New Emergency Updater in CCleaner v5.36

    You can simply disable the scheduled task "CCleaner Update". Start Task Scheduler > click the task "CCleaner Update" > in the Actions pane, click Disable. (I assume you have to do that after every version update.)
  18. Winapp2.ini additions

    ROCKNROLL sorts the FileKeys alphabetical. I think he just forgot to correct the numbers: [Java More*] LangSecRef=3022 Detect1=HKLM\SOFTWARE\JavaSoft\Java Plug-in Detect2=HKLM\SOFTWARE\JavaSoft\Java Runtime Environment Detect3=HKLM\SOFTWARE\JavaSoft\Java Web Start Default=False FileKey1=%AppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE FileKey2=%CommonAppData%\Oracle\Java\.oracle_jre_usage|*.* FileKey3=%LocalAppData%\Sun\Java\Deployment\cache|*.*|RECURSE FileKey4=%LocalAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE FileKey5=%LocalAppData%\VirtualStore\Program Files*\Java\jre*|*PATCH.ERR FileKey6=%LocalAppData%\VirtualStore\Program Files*\Java\jre*\lib\security|*.bak FileKey7=%LocalLowAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE FileKey8=%ProgramFiles%\Java\jre*|*PATCH.ERR FileKey9=%ProgramFiles%\Java\jre*\lib\security|*.bak FileKey10=%SystemDrive%\Users\*\.oracle_jre_usage|*.*|REMOVESELF FileKey11=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\Cache|*.*|RECURSE FileKey12=%WinDir%\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\Cache|*.*|RECURSE
  19. Winapp2.ini additions

    Modified entry (FileKey 5+6): [Adobe Flash Player More*] LangSecRef=3023 Detect=HKCU\Software\Macromedia\FlashPlayer DetectFile=%AppData%\Adobe\Flash Player Default=False FileKey1=%AppData%\Adobe\Flash Player\AFCache|*.*|RECURSE FileKey2=%AppData%\Adobe\Flash Player\AssetCache|*.*|RECURSE FileKey3=%AppData%\Adobe\Flash Player\Icon Cache|*.*|RECURSE FileKey4=%AppData%\Adobe\Flash Player\NativeCache|*.*|RECURSE FileKey5=%WinDir%\System32\Macromed\Flash|FlashInstall*.log;install.log FileKey6=%WinDir%\SysWOW64\Macromed\Flash|FlashInstall*.log;install.log
  20. Winapp2.ini additions

    I agree too. If we start adding TEMP entries this will unnecessarily blow up the winapp2.ini file.
  21. Strange, I don't know any other option which cleans the Windows Vault (Credential Manager).
  22. Did you uncheck following option? Cleaner > Windows > Windows Explorer > Network Passwords
  23. Please check the following threads: https://forum.piriform.com/index.php?showtopic=48688 and https://forum.piriform.com/index.php?showtopic=48754
  24. Thanks for your reply. Affected bookmarks: https://www.amazon.de/Blu-ray-Shop-DVD/b/ref=sd_allcat_blu?ie=UTF8&node=514450 http://www.areadvd.de/#start
×