Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

So am I right in saying that Piriform themselves don't issue an 'official' winapp2 file, but that this forum are the 'keepers' of the file and update/amend it based of member suggestions/feedback

yes, you are correct. And many entries are then picked up by the developers and added to the program

Share this post


Link to post
Share on other sites

I know how a big winapp2.ini file effects the speed of loading CCleaner, do you know if that's still the same once those entries are addedd to the program?

 

And once added, does winapp2.ini (the person) then remove the entries from winapp2.ini (the file)?

 

(As someone called him earlier in this thread, maybe we need a naming convention, something like winapp2.ini(hero) and winapp2.ini(file) to reflect the difference)

Share this post


Link to post
Share on other sites

1st question: I think (at a guess) that it doesn't (as much) slow it down when they're built in because the program isn't reading an external file

 

2nd question: yes he does.

Share this post


Link to post
Share on other sites

I know how a big winapp2.ini file effects the speed of loading CCleaner, do you know if that's still the same once those entries are addedd to the program?

 

And once added, does winapp2.ini (the person) then remove the entries from winapp2.ini (the file)?

 

(As someone called him earlier in this thread, maybe we need a naming convention, something like winapp2.ini(hero) and winapp2.ini(file) to reflect the difference)

 

From the current update, these changes should be of interest to your section question.

 

As for my forum username.. probably a poor choice in hindsight! :lol:

 

Removed in this version:

 

[CoolNovo - Cache*]
LangSecRef=3029
DetectFile1=%AppData%\MapleStudio\ChromePlus\Application\Chrome.exe
DetectFile2=%LocalAppData%\MapleStudio\ChromePlus\Application\Chrome.exe
Default=False
FileKey1=%AppData%\MapleStudio\ChromePlus\User Data\Default\Cache|*.*|RECURSE

- Added to CCleaner

[CoolNovo - Cookies*]
LangSecRef=3029
DetectFile1=%AppData%\MapleStudio\ChromePlus\Application\Chrome.exe
DetectFile2=%LocalAppData%\MapleStudio\ChromePlus\Application\Chrome.exe
Default=False
FileKey1=%AppData%\MapleStudio\ChromePlus\User Data\Default|*Cookies|RECURSE

- Added to CCleaner

[CoolNovo - Form Data*]
LangSecRef=3029
DetectFile1=%AppData%\MapleStudio\ChromePlus\Application\Chrome.exe
DetectFile2=%LocalAppData%\MapleStudio\ChromePlus\Application\Chrome.exe
Default=False
FileKey1=%AppData%\MapleStudio\ChromePlus\User Data\Default|Web Data|RECURSE

- Added to CCleaner

[CoolNovo - History*]
LangSecRef=3029
DetectFile1=%AppData%\MapleStudio\ChromePlus\Application\Chrome.exe
DetectFile2=%LocalAppData%\MapleStudio\ChromePlus\Application\Chrome.exe
Default=False
FileKey1=%AppData%\MapleStudio\ChromePlus\User Data\Default|*History*|RECURSE
FileKey2=%AppData%\MapleStudio\ChromePlus\User Data\Default|Thumbnails|RECURSE
FileKey3=%AppData%\MapleStudio\ChromePlus\User Data\Default|Visited Links|RECURSE

- Added to CCleaner

[CoolNovo - Session Restore*]
LangSecRef=3029
DetectFile1=%AppData%\MapleStudio\ChromePlus\Application\Chrome.exe
DetectFile2=%LocalAppData%\MapleStudio\ChromePlus\Application\Chrome.exe
Default=False
FileKey1=%AppData%\MapleStudio\ChromePlus\User Data\Default|Current*|RECURSE
FileKey2=%LocalAppData%\Chromium\User Data\Default|Last*|RECURSE

- Added to CCleaner

[Temp Files*]
ID=2013
LangSecRef=3029
Detect=HKCU\Software\Chromium
DetectFile1=%LocalAppData%\Google\Chrome\Application\chrome.exe
DetectFile2=%ProgramFiles%\Google\Chrome\Application\chrome.exe
DetectFile3=%LocalAppData%\Flock\Application\flock.exe
DetectFile4=%ProgramFiles%\Flock\Application\flock.exe
DetectFile5=%LocalAppData%\Google\Chrome SxS\Application\chrome.exe
DetectFile6=%ProgramFiles%\Google\Chrome SxS\Application\chrome.exe
DetectFile7=%LocalAppData%\SRWare Iron\iron.exe
DetectFile8=%ProgramFiles%\SRWare Iron\iron.exe
DetectFile9=%ProgramFiles%\Chromium\chrome.exe
DetectFile10=%LocalAppData%\Chromium\chrome.exe
DetectFile11=%ProgramFiles%\Chromium\Application\chrome.exe
DetectFile12=%LocalAppData%\Chromium\Application\chrome.exe
DetectFile13=%AppData%\ChromePlus\chrome.exe
DetectFile14=%LocalAppData%\RockMelt\Application\rockmelt.exe
DetectFile15=%ProgramFiles%\RockMelt\Application\rockmelt.exe
Default=False
FileKey1=%LocalAppData%\Google\Chrome|*.tmp|RECURSE
FileKey2=%LocalAppData%\Flock|*.tmp|RECURSE
FileKey3=%LocalAppData%\Google\Chrome SxS|*.tmp|RECURSE
FileKey4=%LocalAppData%\SRWare Iron|*.tmp|RECURSE
FileKey5=%LocalAppData%\Chromium|*.tmp|RECURSE
FileKey6=%LocalAppData%\Chrome Plus|*.tmp|RECURSE
FileKey7=%LocalAppData%\Rockmelt|*.tmp|RECURSE

- Added to CCleaner

Share this post


Link to post
Share on other sites

Don't leave me hanging! What was it? :o

 

It was for Windows Explorer Shell Extensions.

 

As for my forum username.. probably a poor choice in hindsight! :lol:

 

I think it was brilliant myself, you chose that name all those years ago, and then made the file so much better by injecting it with new life keeping it active.

Share this post


Link to post
Share on other sites

winapp2.ini,

 

please consider removing the code below. it is not really the proper or best way to handle the ctfmon.exe running issue.

 

[ctfmon.exe (disable startup)*]
langsecref=3021
detect1=hkcu\software\microsoft\office
detect2=hklm\software\microsoft\office
default=false
warning=this will only temporarily disable the microsoft office installed file ctfmon.exe from starting with windows. ctfmon.exe is known to cause severe system slow downs and can be permanently disabled using the free ctfmon-remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/
regkey1=hklm\software\microsoft\windows\currentversion\run|ctfmon.exe
regkey2=hkcu\software\microsoft\windows\currentversion\run|ctfmon.exe
regkey3=hku\.default\software\microsoft\windows\currentversion\run|ctfmon.exe

Share this post


Link to post
Share on other sites

winapp2.ini,

 

please consider removing the code below. it is not really the proper or best way to handle the ctfmon.exe running issue.

 

[ctfmon.exe (disable startup)*]
langsecref=3021
detect1=hkcu\software\microsoft\office
detect2=hklm\software\microsoft\office
default=false
warning=this will only temporarily disable the microsoft office installed file ctfmon.exe from starting with windows. ctfmon.exe is known to cause severe system slow downs and can be permanently disabled using the free ctfmon-remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/
regkey1=hklm\software\microsoft\windows\currentversion\run|ctfmon.exe
regkey2=hkcu\software\microsoft\windows\currentversion\run|ctfmon.exe
regkey3=hku\.default\software\microsoft\windows\currentversion\run|ctfmon.exe

+1

Share this post


Link to post
Share on other sites

The original coder of ctfmon.exe is attempting to stop ctfmon.exe from starting up on system reboot.

 

I originally wrote it, and the Warning= section was there to give a clue how to properly disable it using CTFMON-Remover, well at least that works in WinXP:

Warning=This will only temporarily disable the Microsoft Office installed file ctfmon.exe from starting with Windows. ctfmon.exe is known to cause severe system slow downs and can be permanently disabled using the free CTFMON-Remover: http://www.gerhard-schlager.at/en/projects/ctfmonremover/

Share this post


Link to post
Share on other sites

new entries

 

[windows live movie maker*]

langsecref=3023

detect=hkcu\software\microsoft\windows live\movie maker

default=false

regkey1=hkcu\software\microsoft\windows live\movie maker|browseformusicdirectory

regkey2=hkcu\software\microsoft\windows live\movie maker|browseforpicturesdirectory

regkey3=hkcu\software\microsoft\windows live\movie maker|browseforprojectsdirectory

regkey4=hkcu\software\microsoft\windows live\movie maker|rendertofiledirectory

regkey5=hkcu\software\microsoft\windows live\movie maker|snapshotfiledirectory

regkey6=hkcu\software\microsoft\windows live\movie maker\recent

filekey1=%localappdata%\microsoft\windows live movie maker|*.*|recurse

 

[windows live photo gallery*]

langsecref=3023

detect=hkcu\software\microsoft\windows live\photo gallery

default=false

regkey1=hkcu\software\microsoft\windows live\photo gallery|galleryscopedfolders

filekey1=%localappdata%\microsoft\windows live photo gallery|*.*|recurse

 

why i am seeing everything here in lower case?

Share this post


Link to post
Share on other sites

[sUPERAntiSpyware Quarantine*]
LangSecRef=3024
Detect=HKCU\SOFTWARE\SUPERAntiSpyware.com\SUPERAntiSpyware
Default=False
Warning=This will delete the files which SUPERAntiSpyware moved into quarantine. If you are not sure what this is about, uncheck this option.
FileKey=%AppData%\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine|*.*

 

The quarantined files of SUPERAntiSpyware. It does not work for me at the moment but I can not figure out what I missed. Maybe someone knows.

Share this post


Link to post
Share on other sites

I honestly do not feel that winapp2.ini should be permitted to remove "quarantined" files of security programs. All security programs have their own option to remove one or all quarantined files. The potential of a CCleaner user deleting a false positive in quarantine by having winapp2.ini code such as {superantispyware quarantine*] check marked is pretty great in my opinion. Obviously this would prevent the user from returning a valid file (flagged as false positive) to its normal location. I feel the user should have to "think twice" by having to use the security program's option to empty quarantined files. Most security companies recommend that a quarantined file should not be dumped for at least a week.

 

And I continue to feel that Piriform should fix the winapp.ini code for Malwarebytes so that it does NOT delete quarantined items. JMO... :mellow:

Share this post


Link to post
Share on other sites

The quarantined files of SUPERAntiSpyware. It does not function for me at the moment but I can not figure out what I missed. Maybe someone knows.

If you expect SUPERAntiSpyware to permit meddling with its special quarantine folder by CCleaner then you have a low opinion of SUPERAntiSpyware.

Share this post


Link to post
Share on other sites

Additions

 

 

[Jetclean Logs *]

LangSecRef=3024

DetectFile=%ProgramFiles%\BlueSprig\JetClean\JetClean.exe

Default=False

FileKey1=%AppData%\BlueSprig\JetClean\Log|*.*

 

[Jetclean Registry Backups *]

LangSecRef=3024

DetectFile=%ProgramFiles%\BlueSprig\JetClean\JetClean.exe

Default=False

Warning="Deleting the backups will result in you being unable to undo any changes by Jetclean. Be sure you are okay with removing the backups!"

FileKey1=%AppData%\BlueSprig\JetClean\Backup|*.reg

 

Modifications

Removed FileKey1 because I saw no such folder is created. It does not create user reports.

Added Warning that this one actually removed your backups.

 

 

[Auslogics Registry Cleaner Backups*]

LangSecRef=3024

Detect=HKCU\Software\Auslogics\Registry Cleaner

Default=False

Warning="Deleting the backups will result in you being unable to undo any changes by Auslogics Registry Cleaner. Be sure you are okay with removing the backups!

FileKey1=%AppData%\Auslogics\Rescue\Auslogics Registry Cleaner|*.rsc

Share this post


Link to post
Share on other sites

Modified entry: (Fixed wrong path.)

 

[sun Java Cache*]

LangSecRef=3022

DetectOS=6.0

Detect=HKLM\SOFTWARE\JavaSoft\Java Runtime Environment

Default=False

FileKey1=%LocalLowAppData%\Sun\Java\Deployment\cache|*.*|RECURSE

FileKey2=%LocalLowAppData%\Sun\Java\Deployment\SystemCache|*.*|RECURSE

FileKey3=%WinDir%\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE

FileKey4=%WinDir%\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Development\Cache|*.*|RECURSE

Share this post


Link to post
Share on other sites

New Entry

 

 

[Leapfrog Connect Cache *]

LangSecRef=3021

DetectFile=%ProgramFiles%\LeapFrog\LeapFrog Connect\LeapFrogConnect.exe

Default=False

FileKey1=%CommonAppData%\Leapfrog\LeapFrog Connect\cache\*\http|*.*

FileKey2=%CommonAppData%\Leapfrog\LeapFrog Connect\cache\*\https|*.*

Filekey3=%CommonAppData%\Leapfrog\LeapFrog Connect\cache\*\prepared|*.*

Filekey4=%CommonAppData%\Leapfrog\LeapFrog Connect\cache\*\cookies|*.*

Filekey5=%CommonAppData%\Leapfrog\LeapFrog Connect\cache\*\data7\*\|*.*

Filekey6=%CommonAppData%\Leapfrog\LeapFrog Connect\DownloadCache|*.*

Share this post


Link to post
Share on other sites

NEW ENTRY

[DriveImage XML*]
LangSecRef=3021
Detect=HKLM\SOFTWARE\Runtime Software\DIXML
Default=False
FileKey1=%ProgramFiles%\Runtime Software\DriveImage XML|log.txt

Share this post


Link to post
Share on other sites

NEW

[sUMo Log*]
LangSecRef=3024
Detect=HKCU\Software\KC Softwares\SUMo
Default=False
FileKey1=%AppData%\KC Softwares\SUMo|*.log

or

FileKey1=%AppData%\KC Softwares\SUMo|SUMo.log

 

PS: Should or shouldn't this

 ... 

thing be used?

Share this post


Link to post
Share on other sites

 

What thing? Dots? :D

 

No ^^, the code-thing like

[Name*]
LangSecRef=
Detect/DetectFile=
Default=False
FileKey/RegKey

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...