Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

Sorry >_< I've been a little bogged down between school and college applications recently, mostly wating on letters at this point :lol:

 

I added a few new entries, namely

 

[Windows CBS Logs*]
LangSecRef=3025
DetectFile=%Windir%\Logs\CBS
Default=False
FileKey1=%WinDir%\Logs\CBS|cbs.log
FileKey2=%WinDir%\Logs\CBS|*.cab

[Windows DRM Cache*]
LangSecRef=3025
DetectFile=%CommonAppData%\Microsoft\Windows\DRM
Default=False
FileKey1=%CommonAppData%\Microsoft\Windows\DRM\Cache|*.tmp|RECURSE

[Windows Media Player Cache*]
LangSecRef=3025
DetectFile=%LocalAppData%\Microsoft\Media player\
Default=False
FileKey1=%LocalAppData%\Microsoft\Media player|cacheentry*.|RECURSE

[Windows Media Player Last Played*]
LangSecRef=3025
DetectFile=%LocalAppData%\Microsoft\Media Player
Default=False
FileKey1=%LocalAppData%\Microsoft\Media Player|lastplayed.wpl

[Temp Files*]
ID=2013
Section=Google Chrome
Detect=HKCU\Software\Chromium
DetectFile=%LocalAppData%\Google\Chrome\Application\chrome.exe
DetectFile2=%ProgramFiles%\Google\Chrome\Application\chrome.exe
DetectFile3=%LocalAppData%\Flock\Application\flock.exe
DetectFile4=%ProgramFiles%\Flock\Application\flock.exe
DetectFile5=%LocalAppData%\Google\Chrome SxS\Application\chrome.exe
DetectFile6=%ProgramFiles%\Google\Chrome SxS\Application\chrome.exe
DetectFile7=%LocalAppData%\SRWare Iron\iron.exe
DetectFile8=%ProgramFiles%\SRWare Iron\iron.exe
DetectFile9=%ProgramFiles%\Chromium\chrome.exe
DetectFile10=%LocalAppData%\Chromium\chrome.exe
DetectFile11=%ProgramFiles%\Chromium\Application\chrome.exe
DetectFile12=%LocalAppData%\Chromium\Application\chrome.exe
DetectFile13=%AppData%\ChromePlus\chrome.exe
DetectFile14=%LocalAppData%\RockMelt\Application\rockmelt.exe
DetectFile15=%ProgramFiles%\RockMelt\Application\rockmelt.exe
Default=False
FileKey1=%LocalAppData%\Google\Chrome|*.tmp|RECURSE
FileKey2=%LocalAppData%\Flock|*.tmp|RECURSE
FileKey3=%LocalAppData%\Google\Chrome SxS|*.tmp|RECURSE
FileKey4=%LocalAppData%\SRWare Iron|*.tmp|RECURSE
FileKey5=%LocalAppData%\Chromium|*.tmp|RECURSE
FileKey6=%LocalAppData%\Chrome Plus|*.tmp|RECURSE
FileKey7=%LocalAppData%\Rockmelt|*.tmp|RECURSE

 

and improved

 

[Jumplist icons temp files*]
ID=2013
Section=Google Chrome
Detect=HKCU\Software\Chromium
DetectFile=%LocalAppData%\Google\Chrome\Application\chrome.exe
DetectFile2=%ProgramFiles%\Google\Chrome\Application\chrome.exe
DetectFile3=%LocalAppData%\Flock\Application\flock.exe
DetectFile4=%ProgramFiles%\Flock\Application\flock.exe
DetectFile5=%LocalAppData%\Google\Chrome SxS\Application\chrome.exe
DetectFile6=%ProgramFiles%\Google\Chrome SxS\Application\chrome.exe
DetectFile7=%LocalAppData%\SRWare Iron\iron.exe
DetectFile8=%ProgramFiles%\SRWare Iron\iron.exe
DetectFile9=%ProgramFiles%\Chromium\chrome.exe
DetectFile10=%LocalAppData%\Chromium\chrome.exe
DetectFile11=%ProgramFiles%\Chromium\Application\chrome.exe
DetectFile12=%LocalAppData%\Chromium\Application\chrome.exe
DetectFile13=%AppData%\ChromePlus\chrome.exe
DetectFile14=%LocalAppData%\RockMelt\Application\rockmelt.exe
DetectFile15=%ProgramFiles%\RockMelt\Application\rockmelt.exe
Default=False
FileKey1=%LocalAppData%\Google\Chrome\User Data|*.tmp|RECURSE
FileKey2=%LocalAppData%\Flock\User Data|*.tmp|RECURSE
FileKey3=%LocalAppData%\Google\Chrome SxS\User Data|*.tmp|RECURSE
FileKey4=%LocalAppData%\SRWare Iron\User Data|*.tmp|RECURSE
FileKey5=%LocalAppData%\Chromium\User Data|*.tmp|RECURSE
FileKey6=%LocalAppData%\Chrome Plus\User Data|*.tmp|RECURSE
FileKey7=%LocalAppData%\Rockmelt\User Data\|*.tmp|RECURSE

 

There's actually 455 entries in this version

Share this post


Link to post
Share on other sites

jv16 PowerTools 2011 has been officially released:

 

[jv16 PowerTools 2011*]
LangSecRef=3024
DetectFile=%ProgramFiles%\jv16 PowerTools 2011\jv16PT.exe
Default=False
FileKey1=%userprofile%\|NTUSER.DAT.jv16pt_bak
FileKey2=%userprofile%\|NTUSER.DAT.jv16pt_bak2
FileKey3=%userprofile%\|NTUSER.DAT.jv16pt_bak.LOG1
FileKey4=%userprofile%\|NTUSER.DAT.jv16pt_bak.LOG2
FileKey5=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak
FileKey6=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak2
FileKey7=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak.LOG1
FileKey8=%LocalAppData%\Microsoft\Windows\|UsrClass.dat.jv16pt_bak.LOG2
FileKey9=%windir%\system32\config\|Default.jv16pt_bak
FileKey10=%windir%\system32\config\|Default.jv16pt_bak2
FileKey11=%windir%\system32\config\|Default.jv16pt_bak.LOG1
FileKey12=%windir%\system32\config\|Default.jv16pt_bak.LOG2
FileKey13=%windir%\system32\config\|software.jv16pt_bak.LOG1
FileKey14=%windir%\system32\config\|software.jv16pt_bak.LOG2
FileKey15=%windir%\system32\config\|software.jv16pt_bak
FileKey16=%windir%\system32\config\|software.jv16pt_bak2
FileKey17=%windir%\system32\config\|system.jv16pt_bak
FileKey18=%windir%\system32\config\|system.jv16pt_bak2
FileKey19=%windir%\system32\config\|system.jv16pt_bak.LOG1     
FileKey20=%windir%\system32\config\|system.jv16pt_bak.LOG2
FileKey21=%windir%\System32\config\|SAM.jv16pt_bak
FileKey22=%windir%\System32\config\|SAM.jv16pt_bak2
FileKey23=%windir%\System32\config\|SAM.jv16pt_bak.LOG1
FileKey24=%windir%\System32\config\|SAM.jv16pt_bak.LOG2
FileKey25=%windir%\System32\config\|COMPONENTS.jv16pt_bak
FileKey26=%windir%\System32\config\|COMPONENTS.jv16pt_bak2
FileKey27=%windir%\System32\config\|COMPONENTS.jv16pt_bak.LOG1
FileKey28=%windir%\System32\config\|COMPONENTS.jv16pt_bak.LOG2
FileKey29=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak
FileKey30=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak2
FileKey31=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak.LOG1
FileKey32=%windir%\ServiceProfiles\NetworkService\|NTUSER.DAT.jv16pt_bak.LOG2
FileKey33=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak
FileKey34=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak2
FileKey35=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak.LOG1
FileKey36=%windir%\ServiceProfiles\LocalService\|NTUSER.DAT.jv16pt_bak.LOG2

 

Also this code for Light Scribe is a suggested addition

 

[LightScribe (Logs)*]
LangSecRef=3023
Detect=HKCU\Software\LightScribe
Default=False
FileKey1=%CommonAppData%\LightScribe\log\|*.xml

Share this post


Link to post
Share on other sites

Please add:

 

[AVG AntiVirus 10.0 More]
ID=2170
LangSecRef=3024
Detect=HKLM\SOFTWARE\AVG\Avg10
Default=True
FileKey1=%allusersprofile%\Application Data\AVG10\IDS\config\|*.bak
FileKey2=%allusersprofile%\Application Data\AVG10\IDS\profile\|*.bak
FileKey3=%allusersprofile%\Application Data\AVG10\Temp\|*.tmp

Also when using the embedded INIs plus the winapp2.ini I have: (when run in debug mode)

 

19:38:20:156250[DEBUG] OnRuleStarted | 3022 | | Google Talk

19:38:20:156250[DEBUG] OnRuleFinished | 3022 | | Google Talk

19:38:20:156250[DEBUG] OnRuleStarted | 3022 | | Google Talk*

19:38:20:171875[DEBUG] OnRuleFinished | 3022 | | Google Talk*

Share this post


Link to post
Share on other sites

Can you plese add this line to Internet Download Accelerator that I explained earlier in this post?

 

[internet Download Accelerator*]
; Add this please
FileKey6=%AppData%\Internet Download Accelerator\temp\Preview|*.*

 

 

====================================================================================================================================================

 

 

BTW I dunno if this has been discussed/requested before but there are these SET*.tmp (read only) files in Windows XP that can be deleted

 

settmp.th.png

 

I did some investigating and they are nothing but .cat files that have already been installed in the %WinDir%\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE} dir, here are the results

 

; XP SP3 Spanish
SET3.tmp = SP3.CAT = md5: 6dda25bd2f3240a5c4fa68cc41cc88df
SET4.tmp = NTPRINT.CAT = md5: 10d15250c354874754510a9e9617d243
SET5.tmp = IMS.CAT = md5: 721fdb6972400de8b18fdcac52bf6158

 

Maybe add them to an already temp file cleaning entry?

 

If not and if anybody wants to, can you guys post suggestions on entry name and detection code. I have a good idea but am sure you guys are more experienced and can implement it better that what I may have in mind

Share this post


Link to post
Share on other sites

hi

 

you may add the following utilities:

 

[RegEditX]
LangSecRef=3024
Detect=HKLM\Software\4Developers\RCrawler
Default=False
RegKey1=HKLM\Software\4Developers\RCrawler\History
RegKey2=HKLM\Software\4Developers\RCrawler\Settings|LastSearch

 

[grepWin]
LangSecRef=3024
Detect=HKCU\Software\grepWin
Default=False
RegKey1=HKCU\Software\grepWin\History
RegKey2=HKCU\Software\grepWin|searchpath

 

[Open with Arguments]
LangSecRef=3024
Detect=HKCU\Software\OpenArgs
Default=False
RegKey1=HKCU\Software\OpenArgs\History

 

[CopyTo Synchronizer]
LangSecRef=3024
Detect=HKCU\Software\kishDesign\CopyTo
Default=False
RegKey1=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder00
RegKey2=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder01
RegKey3=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder02
RegKey4=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder03
RegKey5=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder04
RegKey6=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder05
RegKey7=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder06
RegKey8=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder07
RegKey9=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder08
RegKey10=HKCU\Software\kishDesign\CopyTo\settings3|scutFolder09
RegKey11=HKCU\Software\kishDesign\CopyTo\settings3|scutname00
RegKey12=HKCU\Software\kishDesign\CopyTo\settings3|scutname01
RegKey13=HKCU\Software\kishDesign\CopyTo\settings3|scutname02
RegKey14=HKCU\Software\kishDesign\CopyTo\settings3|scutname03
RegKey15=HKCU\Software\kishDesign\CopyTo\settings3|scutname04
RegKey16=HKCU\Software\kishDesign\CopyTo\settings3|scutname05
RegKey17=HKCU\Software\kishDesign\CopyTo\settings3|scutname06
RegKey18=HKCU\Software\kishDesign\CopyTo\settings3|scutname07
RegKey19=HKCU\Software\kishDesign\CopyTo\settings3|scutname08
RegKey20=HKCU\Software\kishDesign\CopyTo\settings3|scutname09
RegKey21=HKCU\Software\kishDesign\CopyTo\settings3|Source00
RegKey22=HKCU\Software\kishDesign\CopyTo\settings3|Source01
RegKey23=HKCU\Software\kishDesign\CopyTo\settings3|Source02
RegKey24=HKCU\Software\kishDesign\CopyTo\settings3|Source03
RegKey25=HKCU\Software\kishDesign\CopyTo\settings3|Source04
RegKey26=HKCU\Software\kishDesign\CopyTo\settings3|Source05
RegKey27=HKCU\Software\kishDesign\CopyTo\settings3|Source06
RegKey28=HKCU\Software\kishDesign\CopyTo\settings3|Source07
RegKey29=HKCU\Software\kishDesign\CopyTo\settings3|Source08
RegKey30=HKCU\Software\kishDesign\CopyTo\settings3|Source09
RegKey31=HKCU\Software\kishDesign\CopyTo\settings3|target00
RegKey32=HKCU\Software\kishDesign\CopyTo\settings3|target01
RegKey33=HKCU\Software\kishDesign\CopyTo\settings3|target02
RegKey34=HKCU\Software\kishDesign\CopyTo\settings3|target03
RegKey35=HKCU\Software\kishDesign\CopyTo\settings3|target04
RegKey36=HKCU\Software\kishDesign\CopyTo\settings3|target05
RegKey37=HKCU\Software\kishDesign\CopyTo\settings3|target06
RegKey38=HKCU\Software\kishDesign\CopyTo\settings3|target07
RegKey39=HKCU\Software\kishDesign\CopyTo\settings3|target08
RegKey40=HKCU\Software\kishDesign\CopyTo\settings3|target09

 

Links:

RegEditX

grepWin

Open with Arguments

CopyTo Synchronizer

 

Question: what is the meaning of * beyond the application names? some have them, some not. i thought it's something where a special message appears after enabling. but most of the apps having just a * but no message. :huh:

 

regards

Share this post


Link to post
Share on other sites

The * Is just a formatting thing, to denote that the entry is not part of the regular program (an addition)

 

Welcome to the forums, and thank you for your submissions :)!

 

With that, I've updated the file, changes in the first post.

Share this post


Link to post
Share on other sites

Can you please add the MRU entries from these two MSI installer editors?

 

InstEd (Free)

[instEd*]
LangSecRef=3024
Detect=HKCU\Software\instedit.com\insted
Default=False
RegKey1=HKCU\Software\instedit.com\insted\MRU

 

Orca (extracted from the Windows SDK)

[Orca*]
LangSecRef=3024
Detect=HKCU\Software\Microsoft\Orca
Default=False
RegKey1=HKCU\Software\Microsoft\Orca\Recent File List

Share this post


Link to post
Share on other sites

Could you please change the following entry:

 

[Windows Live Mail*]

LangSecRef=3025

Detect=HKCU\Software\Microsoft\Windows Live Mail

Default=False

Warning=this will reset the read counts, which will be recaculated when WLMail is started.

RegKey1=HKCU\Software\Microsoft\Windows Live Mail|SearchFolderVersion

FileKey1=%LocalAppData%\Microsoft\Windows Live Mail\Backup|*.*
|REMOVESELF

FileKey2=%LocalAppData%\Microsoft\Windows Live Mail|edb0*.log

Share this post


Link to post
Share on other sites

Please consider adding the following for program Weather Watcher Live

 

[Weather Watcher Live*]
LangSecRef=3021
Detect=HKCU\Software\VB and VBA Program Settings\Weather Watcher Live
Default=False
FileKey1=%UserProfile%\Appdata\Roaming\WeatherWatcherLive\Temp\|*.*

Share this post


Link to post
Share on other sites

I had posted several months ago a bug in Firefox cleaning. It doesn't clean Firefox History properly if History is set to 'By Site'. After cleaning, the folder names remain even though the entries under them are deleted.

 

After several new versions, this problem is still not fixed. Hope you can solve this in your Winapp2 file.

 

Also, please add cleaning for Portable Firefox 4.

Share this post


Link to post
Share on other sites

Also, please add cleaning for Portable Firefox 4.

 

You cannot clean portable programs with winapp2.ini, as their locations differentiate on every system. Use the "Include" function instead.

Share this post


Link to post
Share on other sites

Coolhead, some things:

1) what does your post have to do with winapp2.ini?

2) firefox 4 is beta. Betas are not usually handled by ccleaner

3) what the webatom said. Portable can not be handled by ini. You need to use custom locations if you want your portables cleaned

Share this post


Link to post
Share on other sites

meep winapp2.ini was this the thread you meant ;)

Share this post


Link to post
Share on other sites

Suggestion

 

I'd like to see an option to erase the contents of Sandboxie's default container folder.

 

Here's an entry that would do that, but preserve your settings:

 

[sandboxie Default Container (Contents)*]
LangSecRef=3024
DetectFile=%ProgramFiles%\Sandboxie\Start.exe
Default=False
ExcludeKey1=FILE|%SystemDrive%\Sandbox\%UserName%\DefaultBox\DONT-USE.TXT
ExcludeKey2=FILE|%SystemDrive%\Sandbox\%UserName%\DefaultBox\desktop.ini
FileKey1=%SystemDrive%\Sandbox\%UserName%\DefaultBox|*.*|RECURSE

 

Although Sandboxie does have options to do this itself, I prefer CCleaner's secure file deletion method.

 

Edit: Fixed directories and files, thanks to randomcore.

Share this post


Link to post
Share on other sites

I had posted several months ago a bug in Firefox cleaning. It doesn't clean Firefox History properly if History is set to 'By Site'. After cleaning, the folder names remain even though the entries under them are deleted.

 

After several new versions, this problem is still not fixed. Hope you can solve this in your Winapp2 file.

 

 

I was referring to Firefox 3.6.15 installed on C drive, not Firefox 4 or Portable Firefox. CCleaner cannot clean Firefox History properly if History is set to 'By Site'. After cleaning, the folder names remain even though the entries under them are deleted. Try this yourself in Firefox.

 

Hope someone can create something in Winapp2 to solve this bug.

Share this post


Link to post
Share on other sites

 

(...) I'd like to see an option to erase the contents of Sandboxie's default container folder. (...)

 

...
ExcludeKey1=FILE|%SystemDrive%\Sandbox\%UserName%\DefaultBox\RegHive*
...

 

 

why to exclude the virtual RegHives? can get wiped, too.

 

if you clear the sandbox using sandboxie control the RegHive file won't remain. everything behind your username will be deleted. so after cleanup there is no "DefaultBox" and because of this there are no RegHives inside of DefaultBox. the only file that remains is "DONT-USE.TXT"

Share this post


Link to post
Share on other sites

why to exclude the virtual RegHives? can get wiped, too.

 

Why? Because I made a mistake. :) I fixed it in the above post

 

if you clear the sandbox using sandboxie control the RegHive file won't remain. everything behind your username will be deleted. so after cleanup there is no "DefaultBox" and because of this there are no RegHives inside of DefaultBox. the only file that remains is "DONT-USE.TXT"

 

You're right for the most part, and I fixed it in the above post. However, Desktop.ini remains undeleted by Sandboxie (it is a hidden file).

Share this post


Link to post
Share on other sites

Does that sandboxie entry work? I don't use it so I can't confirm, but I don't know what the %UserName% is for.

Share this post


Link to post
Share on other sites

Does that sandboxie entry work? I don't use it so I can't confirm, but I don't know what the %UserName% is for.

 

@tempguest yep, that's right. it's not an essential file and windows would recreate it everytime if it gets deleted.

 

@winapp2.ini yep, it works. you can include it. %username% is the same as your windows username you are on. every windows user get it's own sandbox.

 

eg.

 

\Sandbox\tempguest\DefaultBox\

\Sandbox\Winapp2.ini\DefaultBox\

\Sandbox\randomcore\DefaultBox\

\Sandbox\%UserName%\DefaultBox\

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×