Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

New Entry

[Stored Explorer View *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey3=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey4=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey5=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0
RegKey6=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx

Share this post


Link to post
Share on other sites
13 hours ago, SMalik said:

Changed name from [Internet Cache *] to [Network Persistence Statistics *] ...

IMHO, the current name of the entry fits better because the *-journal files are typical cache and the *.ldb/*.log files caches download links, for example.

13 hours ago, SMalik said:

I have CCleaner v5.57. Looks like the cookies cleaning issue has been fixed. So I think the [Cookies *] entry should be removed from Google Chrome.

Also, [Internet History *] should be removed from Google Chrome. CCleaner does the job now.

CCleaner has been cleaning these files for a long time. But such entries have been added because CCleaner does not delete the files itself, so traces may be left. There are also some other such entries under Chrome and Firefox.

11 hours ago, SMalik said:

[Stored Explorer View *] ...

This is already covered by the entry [Windows ShellBags *]. Is a separate entry necessary?

Share this post


Link to post
Share on other sites
17 hours ago, APMichael said:

IMHO, the current name of the entry fits better because the *-journal files are typical cache and the *.ldb/*.log files caches download links, for example.

CCleaner has been cleaning these files for a long time. But such entries have been added because CCleaner does not delete the files itself, so traces may be left. There are also some other such entries under Chrome and Firefox.

This is already covered by the entry [Windows ShellBags *]. Is a separate entry necessary?

%LocalAppData%\Google\Chrome*\User Data|*-journal
%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-*;Network Persistent State;Origin Bound Certs

Safe Browsing Cookies-journal file is already in CCleaner's Internet Cache entry.
*.ldb;*.log;CURRENT;LOCK;MANIFEST-* files keep download history. There should be a new Download History entry.
Network Persistent State file should have its own entry.
There should be a new TLS Certificates entry for Origin Bound Certs files.

[Download History *]
%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-*

[Network Persistence Statistics *]
%LocalAppData%\Google\Chrome*\User Data\*|Network Persistent State

[TLS Certificates *]
%LocalAppData%\Google\Chrome*\User Data\*|Origin Bound Certs


Previously, CCleaner was not wiping all of the Google Chrome cookies and that is why I presented that [Cookies *] entry. Now, CCleaner is able to wipe all of the cookies. Also, deleting Cookies file over rides CCleaner's Cookies to keep option.

I usually don't use [Windows ShellBags *] all the time as it required Explorer to be refreshed or sign out from the user. So I think it is OK to keep [Stored Explorer View *] entry.

Share this post


Link to post
Share on other sites

Thank you for your quick reply and clarification. Okay, then we will split the entry.

13 hours ago, SMalik said:

%LocalAppData%\Google\Chrome*\User Data|*-journal ...
Safe Browsing Cookies-journal file is already in CCleaner's Internet Cache entry. ...

Unfortunately, CCleaner only deletes this file for the few Chromium-based browsers that CCleaner directly supports. If you need to use "CustomLocation", CCleaner does not delete the file. Therefore, we should keep these FileKeys.

Share this post


Link to post
Share on other sites

Revised Entry

I suggest changing the entry name from [Internet Cache *] to [Rollback Journals *]

[Rollback Journals *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Iridium
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Superbird
Detect17=HKCU\Software\Torch
Detect18=HKCU\Software\Vivaldi
Detect19=HKCU\Software\Yandex\YandexBrowser
DetectFile=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%LocalAppData%\7Star\7Star\User Data|*-journal
FileKey2=%LocalAppData%\360Browser\Browser\User Data|*-journal
FileKey3=%LocalAppData%\Amigo\User Data|*-journal
FileKey4=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data|*-journal
FileKey5=%LocalAppData%\CentBrowser\User Data|*-journal
FileKey6=%LocalAppData%\Chromium\User Data|*-journal
FileKey7=%LocalAppData%\CocCoc\Browser\User Data|*-journal
FileKey8=%LocalAppData%\Comodo\Dragon\User Data|*-journal
FileKey9=%LocalAppData%\Coowon\Coowon\User Data|*-journal
FileKey10=%LocalAppData%\Epic Privacy Browser\User Data|*-journal
FileKey11=%LocalAppData%\Flock\User Data|*-journal
FileKey12=%LocalAppData%\Google\Chrome*\User Data|*-journal
FileKey13=%LocalAppData%\Iridium\User Data|*-journal
FileKey14=%LocalAppData%\MapleStudio\ChromePlus\User Data|*-journal
FileKey15=%LocalAppData%\RockMelt\User Data|*-journal
FileKey16=%LocalAppData%\Slimjet\User Data|*-journal
FileKey17=%LocalAppData%\Superbird\User Data|*-journal
FileKey18=%LocalAppData%\Torch\User Data|*-journal
FileKey19=%LocalAppData%\Vivaldi\User Data|*-journal
FileKey20=%LocalAppData%\Yandex\YandexBrowser\User Data|*-journal

Share this post


Link to post
Share on other sites

Revised Entry

Removed unnecessary Detect's

Removed:
%AppData%\Auslogics\Disk*Defrag*\Logs|*.*|RECURSE
%AppData%\Auslogics\Disk Defrag\*\Reports|*.*|RECURSE

Added:
%CommonAppData%\Auslogics\Disk Defrag\*\BootTimeReports|*.*|RECURSE
%CommonAppData%\Auslogics\Disk Defrag Portable\*\BootTimeReports|*.*|RECURSE
%CommonAppData%\Auslogics\Disk Defrag Portable\*\Reports|*.*|RECURSE

[Auslogics Disk Defrag *]
LangSecRef=3024
Detect1=HKLM\SOFTWARE\Auslogics\Disk Defrag
Detect2=HKLM\SOFTWARE\Auslogics\Disk Defrag Portable
Default=False
FileKey1=%CommonAppData%\Auslogics\Disk Defrag\*\BootTimeReports|*.*|RECURSE
FileKey2=%CommonAppData%\Auslogics\Disk Defrag\*\Reports|*.*|RECURSE
FileKey3=%CommonAppData%\Auslogics\Disk Defrag Portable\*\BootTimeReports|*.*|RECURSE
FileKey4=%CommonAppData%\Auslogics\Disk Defrag Portable\*\Reports|*.*|RECURSE

Share this post


Link to post
Share on other sites

New Entry

[Auslogics Disk Defrag Professional *]
LangSecRef=3024
Detect=HKLM\Software\Auslogics\Disk Defrag Professional
Default=False
FileKey1=%CommonAppData%\Auslogics\Disk Defrag Professional\*\BootTimeReports|*.*|RECURSE
FileKey2=%CommonAppData%\Auslogics\Disk Defrag Professional\*\Reports|*.*|RECURSE
FileKey3=%ProgramFiles%\Auslogics\Disk Defrag Professional|ndefrg.log

Share this post


Link to post
Share on other sites

Revised Entries

Added: %LocalAppData%\Packages\Microsoft.*Cortana_*\AC\TokenBroker\Cache|*.*|RECURSE

[Cortana *]
LangSecRef=3031
Detect1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Cortana_8wekyb3d8bbwe
Detect2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Cortana_cw5n1h2txyewy
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\INet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\Temp|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.*Cortana_*\AC\TokenBroker\Cache|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\Microsoft.*Cortana_*\TempState|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalCache|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\AppIconCache|*.*|RECURSE
FileKey10=%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\DeviceSearchCache|*.txt
ExcludeKey1=FILE|%LocalAppData%\Packages\Microsoft.Windows.Cortana_*\LocalState\DeviceSearchCache\|SettingsCache.txt

Added: %LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\TempState|*.*|RECURSE

[Start Menu Experience Host *]
DetectOS=10.0|
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\INet*|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\NVIDIA Corporation\NV_Cache|*.*
FileKey3=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\AC\Temp|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.Windows.StartMenuExperienceHost_*\TempState|*.*|RECURSE

Share this post


Link to post
Share on other sites

New entry:  [Chrome Sandbox *]

[Chrome Sandbox *]
DetectOS=10.0|
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\chrome.sandbox.mfcdmec0b66bbd70f841470aa70f965aa4fb831f77b7f
Default=False
FileKey1=%LocalAppData%\Packages\chrome.sandbox.*\AC\INet*|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\chrome.sandbox.*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\chrome.sandbox.*\AC\Temp|*.*|RECURSE

 

Share this post


Link to post
Share on other sites

Question to all:

The files of the following entries are also cleaned by CCleaner. Since I don't have Chrome in my daily use, I can't tell if CCleaner deletes the contents completely or only partially. It would be great if you could share your experiences and recommend which entries possibly could be removed. Many thanks in advance.

 

Chrome/Chromium:

[FlashPlayer SharedObjects *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE ...

The built-in entry "Cookies" cleans this location.

[Local Storage *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Local Storage|http*.*|RECURSE ...

In my tests, this entry never deletes a single file. It seems that "Local Storage" has been switched to Level-DB and the entry is outdated.
Edit: The built-in entry "Cookies" cleans the "http*.*" files.

[Omnibox Shortcuts *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Shortcuts ...

The built-in entry "Internet History" cleans this file.

[Quota Manager Data *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|QuotaManager ...

The built-in entry "Cookies" cleans this file.

[Web Data *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Web Data ...

The built-in entries "Internet History" and "Saved Form Information" clean this file.

 

Firefox:

[Anti-Phishing Data *] ...
FileKey2=%LocalAppData%\Mozilla\Firefox\Profiles\*|urlclassifier3.sqlite ...

Mozilla stopped using and supporting this file a long time ago. It seems that the entry is outdated.

[DOM Store *] ...
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite ...

The built-in entry "Cookies" cleans this file.

Share this post


Link to post
Share on other sites
10 hours ago, APMichael said:

Question to all:

The files of the following entries are also cleaned by CCleaner. Since I don't have Chrome in my daily use, I can't tell if CCleaner deletes the contents completely or only partially. It would be great if you could share your experiences and recommend which entries possibly could be removed. Many thanks in advance.

Google Chrome
I don't know about [FlashPlayer SharedObjects *] and [Local Storage *] entries, but [Omnibox Shortcuts *], [Quota Manager Data *] and [Web Data *] are not in CCleaner's built-in entries.

Mozilla Firefox
I don't know about [Anti-Phishing Data *] entry, but [DOM Store *] entry is not in CCleaner's built-in entries.

Share this post


Link to post
Share on other sites

This is regarding [Stored Explorer View *]  entry.

I just noticed that there are some more values there. We should add values from 0 to 10 or just remove the entry.

 

Share this post


Link to post
Share on other sites
Quote

 

[DOM Store *] ...
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite ...

The built-in entry "Cookies" cleans this file.

 

With the on and off bug reports about cleaning (various browsers) I'd personally just leave it as is - kind of a more "brute force" way for users to get rid of it.

Share this post


Link to post
Share on other sites

Thanks for the replies.

11 hours ago, SMalik said:

... but [Omnibox Shortcuts *], [Quota Manager Data *] and [Web Data *] are not in CCleaner's built-in entries.

... but [DOM Store *] entry is not in CCleaner's built-in entries.

I'm not sure we've misunderstood each other. Therefore a little more detailed: Please use the built-in entries I mentioned and check the modification date of the files before and after cleaning. You will see that the modification date changes, so that CCleaner at least opens these files and accesses the content/database. There are some other built-in entries that just clean the content/database instead of deleting the file itself. That's why I ask the community for their experiences with these entries. If we don't get enough information, we'll leave it as it is.

Share this post


Link to post
Share on other sites
9 hours ago, SMalik said:

This is regarding [Stored Explorer View *]  entry.

I just noticed that there are some more values there. We should add values from 0 to 10 or just remove the entry.

Is the following entry correct? (It is your entry, please let us know if it should be revised or removed. Thanks.)

[Stored Explorer View *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|1
RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|2
RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|3
RegKey5=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|4
RegKey6=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|5
RegKey7=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|6
RegKey8=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|7
RegKey9=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|8
RegKey10=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|9
RegKey11=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|10
RegKey12=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey13=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey14=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey15=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0
RegKey16=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx

Share this post


Link to post
Share on other sites
3 hours ago, APMichael said:

Thanks for the replies.

I'm not sure we've misunderstood each other. Therefore a little more detailed: Please use the built-in entries I mentioned and check the modification date of the files before and after cleaning. You will see that the modification date changes, so that CCleaner at least opens these files and accesses the content/database. There are some other built-in entries that just clean the content/database instead of deleting the file itself. That's why I ask the community for their experiences with these entries. If we don't get enough information, we'll leave it as it is.

I checked again. You're right. CCleaner's built-in entries clean those files except [Web Data *].

I suggest changing the name of [Web Data *] to [Search Engines Data *].

Removed: Warning=This will remove Autofill, Autocomplete, Search Engines keyword, Sign-in and Credit Card info.
There is no need to have a warning.

[Search Engines Data *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Iridium
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Superbird
Detect17=HKCU\Software\Torch
Detect18=HKCU\Software\Vivaldi
Detect19=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave|Web Data
FileKey2=%LocalAppData%\7Star\7Star\User Data\*|Web Data
FileKey3=%LocalAppData%\360Browser\Browser\User Data\*|Web Data
FileKey4=%LocalAppData%\Amigo\User Data\*|Web Data
FileKey5=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data\*|Web Data
FileKey6=%LocalAppData%\CentBrowser\User Data\*|Web Data
FileKey7=%LocalAppData%\Chromium\User Data\*|Web Data
FileKey8=%LocalAppData%\CocCoc\Browser\User Data\*|Web Data
FileKey9=%LocalAppData%\Comodo\Dragon\User Data\*|Web Data
FileKey10=%LocalAppData%\Coowon\Coowon\User Data\*|Web Data
FileKey11=%LocalAppData%\Epic Privacy Browser\User Data\*|Web Data
FileKey12=%LocalAppData%\Flock\User Data\*|Web Data
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*|Web Data
FileKey14=%LocalAppData%\Iridium\User Data\*|Web Data
FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|Web Data
FileKey16=%LocalAppData%\RockMelt\User Data\*|Web Data
FileKey17=%LocalAppData%\Slimjet\User Data\*|Web Data
FileKey18=%LocalAppData%\Superbird\User Data\*|Web Data
FileKey19=%LocalAppData%\Torch\User Data\*|Web Data
FileKey20=%LocalAppData%\Vivaldi\User Data\*|Web Data
FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*|Web Data

Share this post


Link to post
Share on other sites

New Entries

[Indexed Databases *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*\storage\default|*.*|RECURSE
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage\default|*.*|RECURSE
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*\storage\default|*.*|RECURSE
FileKey4=%AppData%\Waterfox\Profiles\*\storage\default|*.*|RECURSE

[FlashPlayer Cache *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Iridium
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Superbird
Detect17=HKCU\Software\Torch
Detect18=HKCU\Software\Vivaldi
Detect19=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey2=%LocalAppData%\7Star\7Star\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey3=%LocalAppData%\360Browser\Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey4=%LocalAppData%\Amigo\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey5=%LocalAppData%\BraveSoftware\Brave-Browser*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey6=%LocalAppData%\CentBrowser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey7=%LocalAppData%\Chromium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey8=%LocalAppData%\CocCoc\Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey9=%LocalAppData%\Comodo\Dragon\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey10=%LocalAppData%\Coowon\Coowon\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey11=%LocalAppData%\Epic Privacy Browser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey12=%LocalAppData%\Flock\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey14=%LocalAppData%\Iridium\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey16=%LocalAppData%\RockMelt\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey17=%LocalAppData%\Slimjet\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey18=%LocalAppData%\Superbird\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey19=%LocalAppData%\Torch\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey20=%LocalAppData%\Vivaldi\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE
FileKey21=%LocalAppData%\Yandex\YandexBrowser\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE

Share this post


Link to post
Share on other sites
2 hours ago, APMichael said:

Is the following entry correct? (It is your entry, please let us know if it should be revised or removed. Thanks.)


[Stored Explorer View *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|1
RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|2
RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|3
RegKey5=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|4
RegKey6=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|5
RegKey7=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|6
RegKey8=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|7
RegKey9=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|8
RegKey10=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|9
RegKey11=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|10
RegKey12=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey13=HKCU\Software\Microsoft\Windows\Shell\BagMRU|0
RegKey14=HKCU\Software\Microsoft\Windows\Shell\BagMRU|MRUListEx
RegKey15=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|0
RegKey16=HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU|MRUListEx

I think we should remove it. [Windows ShellBags *] entry is sufficient.

Share this post


Link to post
Share on other sites
19 hours ago, SMalik said:

I checked again. You're right. CCleaner's built-in entries clean those files except [Web Data *]. ...

Thank you very much for your quick reply and checking the built-in entries.

Just to be safe: We could then remove the following entries (= move them to "Removed entries.ini"), right?

[FlashPlayer SharedObjects *]
[Local Storage *]
[Omnibox Shortcuts *]
[Quota Manager Data *]

[Anti-Phishing Data *]
[DOM Store *]

Share this post


Link to post
Share on other sites
7 minutes ago, APMichael said:

Thank you very much for your quick reply and checking the built-in entries.

Just to be safe: We could then remove the following entries (= move them to "Removed entries.ini"), right?

[FlashPlayer SharedObjects *]
[Local Storage *]
[Omnibox Shortcuts *]
[Quota Manager Data *]

[Anti-Phishing Data *]
[DOM Store *]

I guess

Share this post


Link to post
Share on other sites
On 2.6.2019 at 14:33, SMalik said:

[Indexed Databases *] ...
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage\default|*.*|RECURSE ...

The entry [HTML5 Store *] cleans the folder "\storage" already. Except for the folders "\storage\default\moz-extension*", because Firefox stores all settings of all installed add-ons (extensions) there. Deleting these Indexed Databases resets all add-ons to their default settings. For example, if you use uBlock Origin, you will also delete all downloaded filter lists. ("3647222921wleabcEoxlt-eengsairo.*" stores the settings of an add-on that was silently migrated by Firefox 66. "1671402671ueBglaorcokt0SCeahc.*" stores the uBlock Origin filter lists.) The Indexed Databases created by websites ("\storage\default\http*") are always deleted, even by the built-in entry "Cookies".

[HTML5 Store *] ...
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\storage|*.*|RECURSE ...
ExcludeKey2=PATH|%AppData%\Mozilla\Firefox\Profiles\*\storage\default\moz-extension*\|*.* ...

 

On 2.6.2019 at 14:33, SMalik said:

[FlashPlayer Cache *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys|*.*|RECURSE ...

The previous entry [FlashPlayer SharedObjects *] and the built-in entry "Cookies" seem to deliberately exclude this location/file. It seems that the file "settings.sol" stores global settings for the Flash Player in this location: https://forum.piriform.com/topic/32310-winapp2ini-additions/?page=242&tab=comments#comment-280836. (If there are really other files than "settings.sol" in the folder after the cleaning, we also could simply keep the entry [FlashPlayer SharedObjects *].)

[FlashPlayer SharedObjects *] ...
FileKey13=%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects|*.*|RECURSE ...
ExcludeKey13=FILE|%LocalAppData%\Google\Chrome*\User Data\*\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects\*\macromedia.com\support\flashplayer\sys\|settings.sol ...

Share this post


Link to post
Share on other sites

https://github.com/MoscaDotTo/Winapp2/issues/383

 

Is it safe to remove %LocalAppData%\Chromium\User Data\Default\Web Applications\?
For me this folder only has icons of some extensions (e.g. uBlock Origin, Dark Reader). And they are not removed when you remove corresponding extension.

Share this post


Link to post
Share on other sites

New Entry

[Stored Push Notifications *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|notificationstore.json
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|notificationstore.json
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|notificationstore.json
FileKey4=%AppData%\Waterfox\Profiles\*|notificationstore.json

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×