Jump to content

siliconman01

Experienced Members
  • Posts

    1,116
  • Joined

  • Last visited

Everything posted by siliconman01

  1. Modified Entry: [Cyberlink PowerDVD 16*] changed to [Cyberlink PowerDVD 16/17*] - Changed Detect to Detect1 - Added Detect2 [CyberLink PowerDVD 16/17*] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PowerDVD16 Detect2=HKCU\Software\CyberLink\PowerDVD17 Default=False FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.* FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE
  2. The MS URL below indicates that the name "SkyDrive" should be gone by now. (Article ID: 17787 - Last Review: Sep 9, 2016 - Revision: 26) https://support.microsoft.com/en-us/help/17787/skydrive-to-onedrive Why do I still see "SkyDrive" in apps and online? Is that an error? No, it's most likely not an error—just part of the update. Over the next few months you might see SkyDrive in some places and OneDrive in others. However, the product features will continue to work the way you expect them to.
  3. I don't think the main OneDrive issued as part of Windows is an "App". I saw this code in Winapp2.ini. Because of the name I assumed the submitter was referring the OneDrive app that is available in Windows Store. I suspect that the "SkyDrive" code can be removed. If it is referring to the "app", it should be placed in LangSecRef=3031 instead of 3021. OR perhaps this code was submitted for Windows 7 or 8/8.1 because the Detect1/Detect2 does not appear correct for Windows 10. We could probably go with the code below to replace [OneDrive App Logs*] and the one I submitted [OneDrive Usage Logs*] [OneDrive Logs*] LangSecRef=3021 Detect1=HKCU\Software\Microsoft\OneDrive DetectFile2=%LocalAppData%\Microsoft\Windows\OneDrive Default=False FileKey1=%LocalAppData%\Microsoft\OneDrive\logs|*.*|RECURSE FileKey2=%LocalAppData%\Microsoft\Windows\OneDrive\logs|*.*|RECURSE
  4. New Entry: [Apps CrashDumps (*.dmp)*] [Apps CrashDumps (*.dmp)*] DetectOS=6.2| Section=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\WinStore_cw5n1h2txyewy Detect2=HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe Default=False Warning=This deletes crash dumps from Windows Store Apps. FileKey1=%LocalAppData%\CrashDumps\|*.*|RECURSE
  5. New Entry: [OneDrive Usage Logs*] [OneDrive Usage Logs*] LangSecRef=3021 Detect=HKCU\Software\Microsoft\OneDrive Default=False FileKey1=%LocalAppData%\Microsoft\OneDrive\logs|*.*
  6. New Entry: [Kaspersky Now*] [Kaspersky Now*] Section=3031 Default=False Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\KasperskyLab.KasperskyNow_8jx5e25qw3tdc FileKey1=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\INetCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\INetCookies|*.*|RECURSE FileKey3=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\INetHistory|*.*|RECURSE FileKey4=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\Microsoft\CLR_v4.0_32\UsageLogs|*.*|RECURSE FileKey5=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\Temp|*.*|RECURSE FileKey6=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\LocalCache\|*.*|RECURSE FileKey7=%LocalAppData%\Packages\KasperskyLab.KasperskyNow_*\AC\Microsoft\CLR_v4.0_32|*.log
  7. Modified Entry: [snagit 13*] Added FileKey5 [Snagit 13*] LangSecRef=3024 Detect=HKCU\Software\TechSmith\SnagIt\13 Default=False FileKey1=%LocalAppData%\TechSmith\SnagIt|Tray.bin FileKey2=%LocalAppData%\TechSmith\SnagIt\DataStore\AppIcons|*.ico FileKey3=%LocalAppData%\TechSmith\SnagIt\DataStore\WebSiteIcons|*.ico FileKey4=%LocalAppData%\TechSmith\SnagIt\Thumbnails|*.* FileKey5=%LocalAppData%\TechSmith\SnagIt\TrackerbirdFiles|*.log RegKey1=HKCU\Software\TechSmith\SnagIt\13\Recent Captures RegKey2=HKCU\Software\TechSmith\SnagIt\13\SnagItEditor\Recent File List
  8. Modified Entry: [AVG PC TuneUp & Utilities Logs*] Changed FileKey5 from |*.log to |*.* [AVG PC TuneUp & Utilities Logs*] LangSecRef=3024 Detect1=HKCU\Software\TuneUp Detect2=HKCU\Software\AVG\AWL\RegistryCleaner Default=False FileKey1=%CommonAppData%\TuneUp Software\TuneUp Utilities *|*.log|RECURSE FileKey2=%LocalAppData%\AvgSetupLog|*.*|REMOVESELF FileKey3=%LocalAppData%\Avg\AWL*\Log|*.log FileKey4=%LocalAppData%\Avg\Log|*.log;zappapi.log.1|RECURSE FileKey5=%LocalAppData%\Avg\log\fmw1|*.* FileKey6=%LocalAppData%\Avg\log\tu16|*.log FileKey7=%LocalAppData%\TuneUp Software|*.log|RECURSE FileKey8=%WinDir%\System32\config\systemprofile\AppData\Local\Avg\Log\fmw1|*.log FileKey9=%WinDir%\System32\config\systemprofile\AppData\Local\Avg\Log\tu16|*.log FileKey10=%SystemDrive%\Users\Default\AppData\Local\Avg\Log\tu16|*.log
  9. Modified entry: [Movavi Video Converter (Logs)*] Added FileKey2 [Movavi Video Converter (Logs)*] LangSecRef=3023 Detect=HKCU\Software\MOVAVI Default=False FileKey1=%LocalAppData%\Movavi\Logs\VideoConverter*|*.* FileKey2=%LocalAppData%\Movavi\Video Converter|Log.txt
  10. https://raw.githubusercontent.com/MoscaDotTo/Winapp2/ee06a5132c3b979c40dd028f236af2849b76b20a/Development/Winapp2
  11. Yep, duplicate names are not permitted. The bad part is that if Trim.bat encounters duplicate names, it may include both or it may omit both. So duplicate names can cause cleaning code to not be included in the final "trimmed" winapp2.ini
  12. There are duplicates showing up in the Chrome section.
  13. You can get it now based on this Betanews article. https://betanews.com/2017/03/28/upgrade-to-windows-10-creators-update/
  14. In CCleaner, if you look under the Applications tab>Windows, you should find [Config.msi Folder*] which is just sitting waiting for a %systemdrive%\Config.msi to be created by an installer\uninstaller. As far as temp files or logs, you need to be careful to not force CCleaner to scan the entire drive looking for logs or temp files. But if there is a folder that gets created and is full of logs or temp files, then yes you can create code to clean out that folder and delete it and the code needs no Detect. It will show up on every system.
  15. The [Device Manager Cache XP*] code is now showing up on Windows 10 systems. [Device Manager Cache XP*] DetectOS=5.1| LangSecRef=3025 Default=False Warning=This clears cached drivers of connected devices. As soon as you connect a new device, this file regenerates. FileKey1=%WinDir%\inf|INFCACHE.1 I changed the DetectOS to DetectOS=|5.1 and it no longer shows up on Windows 10. HOWEVER, I have no way to determine if it shows up properly on XP systems after this change.
  16. The "Detect" is missing on this entry because the entry should always be present. The Config.msi folder pops in and out based on program installers. If you do a TRIM of Winapp2.ini at a time when Config.msi is not present on the drive because the last run installer properly cleaned up after itself, then you will not pick up the cleaning code so that it can cleanup a left over Config.msi until the next time your trim.
  17. Modified entry: [Microsoft Edge More*] Removed FileKey 11 because it is covered by RECURSE of FileKey 12 already. [Microsoft Edge More*] LangSecRef=3022 Detect=HKCU\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\INetCookies|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\MicrosoftEdge\Cookies|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\INetCookies|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\MicrosoftEdge\Cookies|*.*|RECURSE FileKey5=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\Cookies|*.*|RECURSE FileKey9=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Indexed\Data\|*.*|RECURSE FileKey10=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AppData\User\Default\Indexed DB\|*.log|RECURSE FileKey11=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|*.*|RECURSE ExcludeKey1=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|edb.chk ExcludeKey2=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|spartan.edb ExcludeKey3=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|spartan.jfm Modified entry: [internet Explorer More*] Removed FileKey 22 and 23 because they are covered by RECURSE of FileKey 9. [Internet Explorer More*] LangSecRef=3022 Detect=HKCU\Software\Microsoft\Internet Explorer Default=False FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE FileKey10=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE FileKey11=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF FileKey12=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE FileKey13=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey14=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey15=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE FileKey16=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE FileKey17=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey18=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey19=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey20=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey21=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore RegKey5=HKCU\Software\Microsoft\Internet Explorer\PageSetup RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete RegKey7=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime RegKey8=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE|container.dat @siliconman01: Please check if this is ok for you. Thanks. (For me RECURSE works flawless.) You know, I checked and double checked these on my Windows 10x64 Professional systems, and the removal of these FileKeys does not clean out what the removed keys targeted. That's why I added them to the cleaning code just a few days ago. I discovered this by constantly seeing these files being removed by another cleaning program that I have AFTER I had just run CCleaner. So I confirmed that the files were not being deleted by the code you suggest. Why??? Beats me. I would prefer to see the code left as is.
  18. Please remove the ** on [Windows Experience Index**] to make it [Windows Experience Index*] My Bad !! Sorry.
  19. Modified Entry: [ThumbsPlus 8/9/10*] Added FileKey2 [ThumbsPlus 8/9/10*] LangSecRef=3023 Detect=HKCU\Software\Cerious Software Inc. Default=False FileKey1=%AppData%\Thumbsplus|*.log;*.bak;*.dmp;*.7z;*.exc;*.png FileKey2=%ProgramFiles%\Thumbsplus *\Bin|*.log
  20. Modified Entry: [CyberLink PowerDVD 16*] Added FileKey4/5/6 [CyberLink PowerDVD 16*] LangSecRef=3023 Detect=HKCU\Software\CyberLink\PowerDVD16 Default=False FileKey1=%LocalAppData%\Cyberlink\PowerDVD*\cache\|*.* FileKey2=%CommonAppData%\Cyberlink\Evoparser\|*.xml FileKey3=%LocalAppData%\Cyberlink\PowerDVD*\caches\|*.*|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser\|*.*|RECURSE FileKey5=%LocalAppData%\Cyberlink\DigitalHome\|*.log|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\|*.log|RECURSE
  21. New Entry: [Windows Experience Index*] [Windows Experience Index**] LangSecRef=3025 DetectOS=10.0| Warning=You may have to "Take Ownership" of the Windows\Performance\WinSAT folder for it to be entirely cleaned. Default=False FileKey1=%WinDir%\Performance\WinSAT\|*.* FileKey2=%WinDir%\Performance\WinSAT\DataStore\|*.* This data seems to me to be useless for 99.95% of Windows 10 users. Avira Speedup removes this data if you use their tool. Reference the link below https://betanews.com/2015/11/02/how-to-find-the-windows-experience-index-in-windows-8-10/
  22. Modified Entry: [internet Explorer More*] Added FileKey 22/23 [Internet Explorer More*] LangSecRef=3022 Detect=HKCU\Software\Microsoft\Internet Explorer Default=False FileKey1=%AppData%\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey2=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE FileKey3=%LocalAppData%\Microsoft\Internet Explorer|frameiconcache.dat;tabiconcache.dat;brndlog.txt;brndlog.bak FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE FileKey5=%LocalAppData%\Microsoft\SmartScreen|*.tmp FileKey6=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey7=%LocalAppData%\Microsoft\Windows\IECompatCache|*.*|RECURSE FileKey8=%LocalAppData%\Microsoft\Windows\IECompatUACache|*.*|RECURSE FileKey9=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE FileKey10=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE FileKey11=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF FileKey12=%LocalLowAppData%\Microsoft\Internet Explorer\iconcache|*.*|RECURSE FileKey13=%LocalLowAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey14=%SystemDrive%\Documents and Settings\Default User\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey15=%SystemDrive%\Documents and Settings\LocalService\IETldCache|*.*|RECURSE FileKey16=%SystemDrive%\Documents and Settings\NetworkService\IETldCache|*.*|RECURSE FileKey17=%WinDir%\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey18=%WinDir%\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\IETldCache|*.*|RECURSE FileKey19=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey20=%WinDir%\System32\config\SystemProfile\AppData\LocalLow\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey21=%WinDir%\System32\config\SystemProfile\Application Data\Microsoft\Internet Explorer|brndlog.bak;brndlog.txt FileKey22=%LocalAppData%\Microsoft\Windows\INetCache\IE\|*.*|RECURSE FileKey23=%LocalAppData%\Microsoft\Windows\INetCache\Content.Word\|*.* RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore RegKey5=HKCU\Software\Microsoft\Internet Explorer\PageSetup RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete RegKey7=HKCU\Software\Microsoft\Internet Explorer\TypedURLSTime RegKey8=HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats ExcludeKey1=FILE|%LocalAppData%\Microsoft\Windows\INetCache\IE|container.dat
  23. Modified Entry: [store*] Added FileKey24 [Store*] Section=3031 Default=False Detect1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\WinStore_cw5n1h2txyewy Detect2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe FileKey1=%LocalAppData%\Packages\WinStore_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\WinStore_*\AC\INetCache|*.*|RECURSE FileKey3=%LocalAppData%\Packages\WinStore_*\AC\INetCookies|*.*|RECURSE FileKey4=%LocalAppData%\Packages\WinStore_*\AC\INetHistory|*.*|RECURSE FileKey5=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey6=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\CryptnetUrlCache\Content|*.*|RECURSE FileKey7=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*|RECURSE FileKey8=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey9=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\Windows Store\Cache|*.*|RECURSE FileKey10=%LocalAppData%\Packages\WinStore_*\AC\Microsoft\Windows Store\Data|history.dat FileKey11=%LocalAppData%\Packages\WinStore_*\AC\PRICache|*.*|RECURSE FileKey12=%LocalAppData%\Packages\WinStore_*\AC\Temp|*.*|RECURSE FileKey13=%LocalAppData%\Packages\WinStore_*\LocalState\Cache|*.*|RECURSE FileKey14=%LocalAppData%\Packages\WinStore_*\LocalState\LiveTile|*.*|RECURSE FileKey15=%LocalAppData%\Packages\WinStore_*\LocalState\navigationHistory|*.*|RECURSE FileKey16=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\AppCache|*.*|RECURSE FileKey17=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\INetCache|*.*|RECURSE FileKey18=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\INetHistory|*.*|RECURSE FileKey19=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\Microsoft\CryptnetUrlCache\Content|*.*|RECURSE FileKey20=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.*|RECURSE FileKey21=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\Temp|*.*|RECURSE FileKey22=%LocalAppData%\Packages\Microsoft.WindowsStore_*\LocalCache\*|*.*|RECURSE FileKey23=%LocalAppData%\Packages\Microsoft.WindowsStore_*\LocalState\Cache|*.*|RECURSE FileKey24=%LocalAppData%\Packages\Microsoft.WindowsStore_*\AC\INetCookies|*.*|RECURSE RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\WinStore_cw5n1h2txyewy\SearchHistory
  24. Modified entry: [Microsoft Edge More*] These modifications are made to stop CCleaner from removing the Favorites/Bookmarks as set up by the user in Edge. - FileKey10 modified - FileKey11/12, ExcludeKey1/2/3 added [Microsoft Edge More*] LangSecRef=3022 Detect=HKCU\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\INetCookies|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\MicrosoftEdge\Cookies|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\INetCookies|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\MicrosoftEdge\Cookies|*.*|RECURSE FileKey5=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!001\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!002\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\Cookies|*.*|RECURSE FileKey9=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Indexed\Data\|*.*|RECURSE FileKey10=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AppData\User\Default\Indexed DB\|*.log|RECURSE FileKey11=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\Logfiles\|*.*|RECURSE FileKey12=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|*.*|RECURSE ExcludeKey1=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|edb.chk ExcludeKey2=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|spartan.edb ExcludeKey3=FILE|%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\user\default\datastore\Data\nouser1\*\DBStore\|spartan.jfm Edited/revised post by siliconman01
  25. Modified Entry: [snagit 12/13 More*] - Added *.sdf to FileKey2 - Added RegKey 2 and RegKey 3 for Snagit 13 (I suspect there is a "CaptureOpenCount" reg key in Snagit 12 but I don't have Snagit 12 to verify the entry....so no modification added) [Snagit 12/13 More*] LangSecRef=3024 Detect1=HKCU\Software\TechSmith\SnagIt\12 Detect2=HKCU\Software\TechSmith\SnagIt\13 Default=False Warning=This will delete the backups of the captures that you have performed with SnagIt 12/13. FileKey1=%Documents%|SnagItDebug.log FileKey2=%LocalAppData%\TechSmith\Snagit\DataStore|*.SNAG;*.SNAGundo;*.MP4;*.sdf FileKey3=%LocalAppData%\TechSmith\Logs|*.log RegKey1=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey2=HKCU\Software\TechSmith\Snagit\13|CaptureCount RegKey3=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount RegKey4=HKCU\Software\TechSmith\Snagit\Stamps|StampCustomFolder
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.