Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

I search my hard drive for *.bak and *.tmp files and would like help in creating Winapp2.ini entries to remove them please.

 

C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK
C:\Documents and Settings\Charles\Application Data\Microsoft\File Transfer Manager\ftmTransferList.txt.bak
C:\Documents and Settings\Charles\Local Settings\jv16PT_temp.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\DIO4.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\DIO9.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\MAR1.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\MAR2.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG1A0.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG1A1.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG19A.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG19B.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG19C.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG19E.tmp
C:\Documents and Settings\Charles\Local Settings\Temp\REG19F.tmp
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp
C:\Program Files\Google\GoogleToolbarNotifier\GooA32.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gthA2B.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gtnA2A.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swgA29.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gthA2E.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gtnA2D.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\swgA2C.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gthA31.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gtnA30.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\swgA2F.tmp
C:\Program Files\Secunia\PSI\RCX3CA.tmp
C:\Program Files\TuneXP\docs\hardware.html.bak
C:\Program Files\TuneXP\docs\memoryfs.html.bak
C:\Program Files\Yahoo!\Messenger\Cache\9G0IMTf7KSnOtr1pRkveNQ--.ProfileMap.dat.tmp
C:\RECYCLER\S-1-5-21-1202660629-854245398-1801674531-1003\Dc1.bak
C:\RECYCLER\S-1-5-21-1202660629-854245398-1801674531-1003\Dc2.bak
C:\WINDOWS\msdownld.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2A.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6B.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP14.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP74D.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP80.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP113A.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP229.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP349.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDB.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF21.tmp
C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak
C:\WINDOWS\system32\REN72.tmp
C:\WINDOWS\system32\wuapi.dll.wusetup.139324421.bak
C:\WINDOWS\system32\wuauclt.exe.wusetup.139325171.bak
C:\WINDOWS\system32\wuaueng.dll.wusetup.139325937.bak
C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK

 

Thanks in advance

 

I just ran CCleaner with the least program open and then did the same DIR as above and got this:

 

C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK
C:\Documents and Settings\Charles\Application Data\Microsoft\File Transfer Manager\ftmTransferList.txt.bak
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.tmp
C:\Program Files\Google\GoogleToolbarNotifier\GooA32.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gthA2B.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\gtnA2A.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swgA29.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gthA2E.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\gtnA2D.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7018.1622\swgA2C.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gthA31.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\gtnA30.tmp
C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\swgA2F.tmp
C:\Program Files\Secunia\PSI\RCX3CA.tmp
C:\Program Files\TuneXP\docs\hardware.html.bak
C:\Program Files\TuneXP\docs\memoryfs.html.bak
C:\WINDOWS\msdownld.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2A.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP6B.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP14.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP74D.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP80.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP113A.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP229.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP349.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPDB.tmp
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPF21.tmp
C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak
C:\WINDOWS\system32\REN72.tmp
C:\WINDOWS\system32\wuapi.dll.wusetup.139324421.bak
C:\WINDOWS\system32\wuauclt.exe.wusetup.139325171.bak
C:\WINDOWS\system32\wuaueng.dll.wusetup.139325937.bak
C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK

 

so one can see there are some BAK files from Google... and other places that could be cleaned.

Link to comment
Share on other sites

For users of Yahoo Messenger it would be nice if someone would make an winapp2.ini enry to set the chat window size and location back tpo the "just installed" state. Not sure what key it would be but at least HKCU\Software\Yahoo!\pager would be a good start.

Link to comment
Share on other sites

I have come up with close to good entries for my BAK and TMP file posts. I'll post the ones I am not sure of at the bottom:

 

New Entry
[Google Toolbar Notifier*]
LangSecRef=3022
Detect=HKCU\Software\Google\GoogleToolbarNotifier
Default=False
FileKey1=%ProgramFiles%\Google\GoogleToolbarNotifier|*.tmp|RECURSE
[TuneUp XP*]
LangSecRef=3021
DetectFile=%ProgramFiles%\TuneXP
Default=False
FileKey1=%ProgramFiles%\TuneXP\docs\*.bak
[Windows Assembly*]
LangSecRef=????
DetectFile=%WinDir%\assemply
Default=False
FileKey1=%WinDir%\assemply|*.tmp|Recurse
[Misc Windows Tmp/Bak's *]
LangSecRef=3022	 <== Not sure ?
DetectFile=%WinDir%\system32
Default=False
FileKey1=%WinDir%\system32|*.bak
FileKey2=%WinDir%\system32|*.tmp
[Registry Backup Files]
LangSecRef=3024
DetectFile1=%UserProfile%\..\LocalService
DetectFile2=%UserProfile%\..\NetworkService
Default=False
Warning=This removes additional registry hive bakcup files
FileKey1=%UserProfile%\..\LocalService\Local Settings\Application Data\Microsoft\Windows|UsrClass.dat.tmp
FileKey2=%UserProfile%\..\NetworkService\Local Settings\Application Data\Microsoft\Windows|UsrClass.dat.tmp
[File Transfer Manager]
LangSecRef=3022 <== ????
DetectFile=%appdata%\Microsoft\File Transfer Manager
Default=False
FileKey1=%appdata%\Microsoft\File Transfer Manager|*.bak
;=====================================================================
Revise Entry
[secunia PSI*]
LangSecRef=3021
Detect1=HKLM\SOFTWARE\Secunia\PSI
Detect2=HKCU\Software\Secunia\PSI
Default=False
FileKey1=%ProgramFiles%\secunia\PSI|sualog.txt
FileKey2=%ProgramFiles%\Secunia\PSI|psialog.txt*
FileKey3=%ProgramFiles%\Secunia\PSI|*.tmp	  <== ADD

 

The ones I am not sure of are:

 

C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA11.BAK
C:\WINDOWS\pchealth\helpctr\Config\Cache\Professional_32_1033.dat.bak
C:\WINDOWS\system32\NtmsData\NTMSDATA.BAK

 

Thank you.

Link to comment
Share on other sites

OPA11.bak and OPA11.dat are your Office 2007 activation files,

 

According to the KB link below 'NTMSDATA' files are used by the W2K Server/Pro operating systems for backup to media:

http://support.microsoft.com/default.aspx?scid=kb;EN-US;235032

 

It is also referenced here:

http://support.microsoft.com/kb/235469

Link to comment
Share on other sites

  • Moderators

[TuneUp XP*]

LangSecRef=3021

DetectFile=%ProgramFiles%\TuneXP

Default=False

FileKey1=%ProgramFiles%\TuneXP\docs\*.bak

 

You've got a backslash \ (highlighted in bold red in the quote above), when it needs that thing I think is called a pipe |

Does that cleaner even work?

 

If not maybe this:

[TuneUp XP*]

LangSecRef=3021

DetectFile=%ProgramFiles%\TuneXP

Default=False

FileKey1=%ProgramFiles%\TuneXP\docs|*.bak

Link to comment
Share on other sites

Thank you very much for the update.

 

Missed posts:

#1824 (2 new entries)

#1875 (2 modified entries)

#1877 (modified entry)

#1879 (new entry "NetworkService Temps")

#1926 (modified "JDownloader" entries)

#1942 (modified entry)

 

Modified entry:

[FlashGot*]

LangSecRef=3026

SpecialDetect=DET_MOZILLA

Default=False

FileKey1=%AppData%\Mozilla\Firefox\Profiles\*|FlashGot.log

FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|FlashGot.log.bak*

 

Modified entry:

[spybot Search and Destroy History*]

LangSecRef=3024

Detect=HKLM\Software\Safer Networking Limited\SpybotSnD

Default=False

FileKey1=%CommonAppData%\Spybot – Search & Destroy\Backups|*.*|RECURSE

FileKey2=%CommonAppData%\Spybot – Search & Destroy\Recovery|*.*|RECURSE

FileKey3=%CommonAppData%\Spybot – Search & Destroy\Snapshots|*.*|RECURSE

FileKey4=%CommonAppData%\Spybot – Search & Destroy\Snapshots2|*.*|RECURSE

 

Please rename [TuneUp XP*] to [TuneXP*].

 

And above the entry [Windows Audio/Video (Stats)*] is a blank line missing.

Link to comment
Share on other sites

  • Moderators

New:

[Emsisoft HiJackFree*]
LangSecRef=3024
Detect=HKLM\SOFTWARE\Emsi Software GmbH\a-squared HiJackFree
Default=False
FileKey1=%ProgramFiles%\Emsisoft HiJackFree\Logs|*.*
FileKey2=%ProgramFiles%\Emsisoft HiJackFree|*.old

 

New - since this is the default location suggested by the PortableApps.com installer, why not:

[ultraDefrag Portable (Log)*]
LangSecRef=3024
DetectFile=%systemdrive%\PortableApps\UltraDefragPortable\UltraDefragPortable.exe
Default=False
FileKey1=%systemdrive%\PortableApps\UltraDefragPortable\Data|UltraDefragPortable.log

 

New - this registry key keeps a debug record of many .exe files you run:

[Windows ESENT Process (MRU)*]
LangSecRef=3025
Detect=HKLM\SOFTWARE\Microsoft\ESENT
Default=False
RegKey1=HKLM\SOFTWARE\Microsoft\ESENT\Process

 

----------------------

 

Shouldn't the name of this be renamed? It has detection for two versions and could be misleading having a version number in the name:

 

Old:

[Avidemux 2.5 log*]
LangSecRef=3023
Detect1=HKLM\Software\Avidemux 2.5
Detect2=HKLM\Software\Avidemux 2.4
Default=False
FileKey1=%AppData%\avidemux|admlog.txt

 

Updated:

[Avidemux log*]
LangSecRef=3023
Detect1=HKLM\Software\Avidemux 2.5
Detect2=HKLM\Software\Avidemux 2.4
Default=False
FileKey1=%AppData%\avidemux|admlog.txt

 

----------------------

 

I have a question:

Does CCleaner understand when using all current compatible OSes it works on that %Documents% refers to "My Documents"?

Link to comment
Share on other sites

Hi, is it too late to include a new entry I made up for Mozdev Session Manager for Firefox?

 

[session Manager deleted sessions*]
LangSecRef=3026
SpecialDetect=DET_MOZILLA
Default=False
FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\sessions\Deleted Sessions\*.session

"When people are free to do as they please, they usually imitate each other."

 

--Eric Hoffer

Link to comment
Share on other sites

My solution for Kingsoft Office only worked for Kingsoft Office 2010 (Office 6). Now it works for all versions, including Kingsoft Office 2011 (Office 7) and Kingsoft Office 2012 (Office 8).

 

[Kingsoft Office*]
LangSecRef=3021
Detect=HKCU\SOFTWARE\Kingsoft
Default=False
FileKey1=%AppData%\Kingsoft\*\backup|*.*
FileKey2=%AppData%\Kingsoft\*\update\log|*.log
FileKey3=%AppData%\Kingsoft\*|*.bak
FileKey4=%LocalAppData%\Kingsoft\et\cache\http|*
FileKey5=%LocalAppData%\Kingsoft\et\cache\https|*
FileKey6=%LocalAppData%\Kingsoft\wps\cache\http|*
FileKey7=%LocalAppData%\Kingsoft\wps\cache\https|*
FileKey8=%ProgramFiles%\Kingsoft\Kingsoft Office\*|update.log

Link to comment
Share on other sites

[League of Legends*]
LangSecRef=3021
Detect=HKCU\Software\Bugsplat\lol_beta_riotgames_com
Default=False
FileKey1=%HomeDrive%\Riot Games\League of Legends|*.log*|RECURSE
FileKey2=%HomeDrive%\Riot Games\League of Legends|*.log|RECURSE
FileKey3=%HomeDrive%\Riot Games\League of Legends\rads\solutions\lol_game_client_sln\releases\0*\deploy|*.log
FileKey4=%HomeDrive%\Riot Games\League of Legends\rads\solutions\lol_game_client_sln\releases\0*\deploy|*.txt
FileKey5=%HomeDrive%\Riot Games\League of Legends|*.tmp|RECURSE
FileKey6=%HomeDrive%\Riot Games\League of Legends\Logs|*.txt|RECURSE
FileKey7=%UserProfile%\riotsGamesLogs|*.log
FileKey8=%HomeDrive%\Riot Games\League of Legends|*.pandurl|RECURSE
FileKey9=%AppData%\LolClient*|*.*|RECURSE

Should the Detect be changed to "HKEY_LOCAL_MACHINE\SOFTWARE\Riot Games" or "HKEY_LOCAL_MACHINE\SOFTWARE\Riot Games\League of Legends"?

Link to comment
Share on other sites

MODIFIED ENTRY

[Windows Live Messenger Chat History*]
LangSecRef=3022
Detect=HKLM\SOFTWARE\Microsoft\Windows Live\Messenger
Warning=Removes Windows Live Messenger chat history!
Default=False
FileKey1=%Documents%\*\*\Histor*|*.*

Edited the entry so it'll clean the history in more languages (not just english).

Link to comment
Share on other sites

MODIFIED ENTRIES

[Apple Application Logs*]
LangSecRef=3021
Detect=HKCU\Software\Apple Computer, Inc.
Default=False
FileKey1=%AppData%\Apple Computer\logs|*.log

Changed Detect (previous didn't work).

[Teamviewer Past Connections*]
LangSecRef=3024
Detect=HKCU\Software\TeamViewer
Default=False
RegKey1=HKCU\Software\TeamViewer\Version5|Last_Machine_Connections
RegKey2=HKCU\Software\TeamViewer\Version5.1|Last_Machine_Connections
RegKey3=HKCU\Software\TeamViewer\Version6|Last_Machine_Connections
RegKey4=HKCU\Software\TeamViewer\Version7|Last_Machine_Connections
FileKey1=%AppData%\TeamViewer|*.*|RECURSE

Added RECURSE to FileKey1.

[uTorrent More*]
LangSecRef=3022
Detect=HKCU\Software\BitTorrent\uTorrent
Default=False
FileKey1=%AppData%\utorrent|*.log
FileKey2=%AppData%\utorrent|*.dmp
FileKey3=%AppData%\uTorrent|*.old
FileKey4=%AppData%\uTorrent\ie|*.tmp
FileKey5=%ProgramFiles%\uTorrent|*.tmp

Added FileKey3 (*.old).

 

 

Edit. a few more modified entries:

 

[Ghostbuster*]
LangSecRef=3021
DetectFile=%AppData%\Ghostbuster
Default=False
FileKey1=%AppData%\Ghostbuster|*.*|REMOVESELF

Added REMOVESELF.

 

[Jagex Cache*]
LangSecRef=3021
DetectFile1=%UserProfile%\jagexcache
Default=False
FileKey1=%WinDir%\.jagex*|*.*|REMOVESELF
FileKey2=%UserProfile%\jagex*|*.*|RECURSE
FileKey3=%UserProfile%|jagex*

Remade the whole entry.

Edited by nodles
Link to comment
Share on other sites

  • Moderators

Should the Detect be changed to "HKEY_LOCAL_MACHINE\SOFTWARE\Riot Games" or "HKEY_LOCAL_MACHINE\SOFTWARE\Riot Games\League of Legends"?

 

If that's the registry key it uses I'd say use the "HKLM\Software\Riot Games\League of Legends" one because if someone doesn't have that game installed but instead other Riot Games it would needlessly show up in CCleaner but wouldn't be installed and nothing would be cleaned.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.