Jump to content
CCleaner Community Forums

APMichael

Experienced Members
  • Content Count

    638
  • Joined

  • Last visited

Posts posted by APMichael


  1. Thank you very very much for this huge update!
     
    I don't want to be a grinch, but I think there was a big misunderstanding about the VirtualStore folder. Sorry! :(

     

    Only Pre-Windows-Vista programs or programs which ignores the Windows guidelines for Vista (and higher) uses the VirtualStore folder. The majority of programs works correctly with UAC and will never need the VirtualStore folder, even if they write to %ProgramFiles%. (On my computer only one very old XP program needs the VirtualStore folder.)

    Nergal wrote this already:

    No because VS is only made by programs not fixed for vista/7/8 and only some of them (the ones that try to store in program folder but don't run with UAC elevation and the ones (I think) set to run as XP or lower in compatibility mode)


  2. Shouldn't FileKey2 be?

     

    [Avidemux log*]
    LangSecRef=3023
    Detect1=HKLM\Software\Avidemux 2.4
    Detect2=HKLM\Software\Avidemux 2.5
    Detect3=HKLM\Software\Avidemux 2.6
    Default=False
    FileKey1=%AppData%\avidemux|admlog.txt
    FileKey2=%LocalAppData%\VirtualStore\Program Files (x86)\Avidemux*|admlog.txt


  3. Thanks for the huge update! :)

     

    Missing dots:

     

    [DivX Logs*]
    LangSecRef=3023
    Detect=HKCU\Software\DivX
    Default=False
    FileKey1=%CommonAppData%\DivX|*.log|RECURSE

     

    [Lexware Logs*]
    LangSecRef=3021
    DetectFile=%LocalAppData%\Lexware
    Default=False
    FileKey1=%CommonAppData%\Lexware\logs|*.*|REMOVESELF
    FileKey2=%CommonAppData%\Lexware\elster\Log|*.*|REMOVESELF
    FileKey3=%CommonAppData%\Lexware|*.log;*.logx|RECURSE
    FileKey4=%LocalAppData%\Lexware|*.log;*.logx|RECURSE
    FileKey5=%SystemDrive%|LxDasi.Log
    FileKey6=%ProgramFiles%\Common Files\Lexware|*.log|RECURSE

     

    Modified FileKey2 - should work with version 1 and 2 now:

     

    [MalwareBytes Anti Malware More*]
    LangSecRef=3024
    Detect1=HKCU\Software\Malwarebytes' Anti-Malware
    Detect2=HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
    Default=False
    FileKey1=%AppData%\Malwarebytes\Malwarebytes' Anti-Malware\Logs|*.*
    FileKey2=%CommonAppData%\Malwarebytes\Malwarebytes*Anti-Malware\Logs|*.*
    FileKey3=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe


  4. Thanks for the update!

    - FileKey4 is not necessary because FileKey3 deletes aum.log also:

    [Adobe Updater Logs*]
    LangSecRef=3021
    Detect=HKCU\Software\Adobe
    Default=False
    FileKey1=%AppData%\Adobe\LogTransport*\Logs|ulog_*.tmp
    FileKey2=%LocalAppData%\Adobe\AAMUpdater|*.Log|RECURSE
    FileKey3=%LocalAppData%\Adobe\Updater*|*.log|RECURSE
    FileKey4=%LocalAppData%\Adobe\Updater5|aum.log

     
    - The entry [Windows Log Files More*] exists twice. Please delete the first one:

    [Windows Log Files More*]
    LangSecRef=3025
    DetectFile=%windir%\Panther
    Default=False
    FileKey1=%windir%\PANTHER|

     
    - Above the entry [sKSE*] are blank lines.


  5. Modified:

    [Apple Installer Cache*]
    LangSecRef=3023
    Detect=HKCU\Software\Apple Computer, Inc.
    Default=False
    Warning=You have to reinstall iTunes after adding a new windows user account.
    FileKey1=%CommonAppData%\Apple Computer\Installer Cache|*.*|RECURSE
    FileKey2=%CommonAppData%\Apple\Installer Cache|*.*|RECURSE

    - Improved cleaning (I had 28 empty previous version folders dated back to June 2011)

     

    Please do not modify this entry! If you delete the (latest) folders also, QuickTime (and probably iTunes) recognizes this and wants to start a repair installation.


  6. Thanks for the update! :)

     

    You forgot to remove the entry [sun Java More*].

    Please rename the entry [sun Java Setup Files*] to [Java Setup Files*].

     

    Modified entry:

    [spybot Search and Destroy Updates*]
    LangSecRef=3024
    Detect1=HKCU\Software\Safer Networking Limited\Spybot - Search & Destroy 2
    Detect2=HKLM\Software\Safer Networking Limited\SpybotSnD
    Default=False
    FileKey1=%ProgramFiles%\Spybot - Search & Destroy\Updates|*.zip
    FileKey2=%ProgramFiles%\Spybot - Search & Destroy 2\Updates|*.*|RECURSE
    ExcludeKey1=FILE|%ProgramFiles%\Spybot - Search & Destroy 2\Updates\Downloads\updates.uid
    


  7. Thanks for the update.

     

    You added the entry [Miranda IM Cache*] twice.

     

    And I think that you overlooked my comment:

     

    I recognized that some of the ExcludeKeys don't work. Conclusion: If you exclude a single file only (without a wildcard *), you have to use a backslash instead of the pipe symbol.

     

    Here is an example:

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY|file.exe (does not work)

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY\file.exe (does work)

     

    The pipe symbol is necessary if you use a wildcard (*) or a separator (;):

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY|*.exe;*.log

     

    The following entries are affected:

     

    [AI Roboform*]

    [jv16 PowerTools 2011 Backup Files*]

    [jv16 PowerTools 2012 Backup Files*]

    [jv16 PowerTools 2013 Backup Files*]

    [MS Office Word More*]

    [Oxygen 14*]

    [Photodex ProShow Producer*]

    [PS3 Media Server*]

    [TVersity*]

    [VMware Player*]

    [VMware Workstation*]


  8. I recognized that some of the ExcludeKeys don't work. Conclusion: If you exclude a single file only (without a wildcard *), you have to use a backslash instead of the pipe symbol.

     

    Here is an example:

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY|file.exe (does not work)

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY\file.exe (does work)

     

    The pipe symbol is necessary if you use a wildcard (*) or a separator (;):

    ExcludeKey1=FILE|%ProgramFiles%\ProgramXY|*.exe;*.log

     

     

    Modified entry:

    [ElsterFormular*]
    LangSecRef=3021
    Detect=HKLM\SOFTWARE\Landesfinanzdirektion Thüringen\ElsterFormular
    Default=False
    FileKey1=%AppData%\elsterformular\*\log|*.log
    FileKey2=%AppData%\elsterformular\*\tmp|*.*|RECURSE
    FileKey3=%LocalAppData%\.elfohilfe|*.*|REMOVESELF
    FileKey4=%CommonAppData%\elsterformular|*.log
    


  9. Thanks! :)

     

    Missed correction (from Coffee4Joe, "fixed mozila to mozilla and added \firefox\ after"):

    [shortcut Cache*]

    LangSecRef=3026

    SpecialDetect=DET_MOZILLA

    Default=False

    FileKey1=%LocalAppData%\Mozilla\Firefox\Profiles\*\shortcutCache|*.*

     

    Typo (doubled backslash):

    [Diablo 2 + LOD Logs*]

    Section=Games

    Detect=HKCU\Software\Blizzard Entertainment\Diablo II

    Default=False

    FileKey1=%ProgramFiles%\Diablo II|bnupdate.log;BnetLog.txt;D*.txt

    FileKey2=%SystemDrive%\\Diablo II|bnupdate.log;BnetLog.txt;D*.txt

×
×
  • Create New...