SMalik Posted November 21, 2018 Share Posted November 21, 2018 New Entry [Paint 3D *] DetectOS=10.0 LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MSPaint_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\Microsoft.MSPaint_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\INet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\Temp|*.*|RECURSE FileKey5=%LocalAppData%\Packages\Microsoft.MSPaint_*\LocalCache|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.MSPaint_*\LocalState|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.MSPaint_*\TempState|*.*|RECURSE Link to comment Share on other sites More sharing options...
SMalik Posted November 21, 2018 Share Posted November 21, 2018 Revised Entry Removed |RECURSE from FileKey3 and FileKey4 [TeamViewer *] LangSecRef=3024 Detect=HKCU\Software\TeamViewer Default=False FileKey1=%AppData%\TeamViewer|*.log;*.mdmp FileKey2=%LocalAppData%\TeamViewer\*Cache|*.*|RECURSE FileKey3=%LocalAppData%\VirtualStore\Program Files*\TeamViewer|*.log FileKey4=%ProgramFiles%\TeamViewer|*.log FileKey5=%WinDir%\System32|TeamViewer*_Hooks.log RegKey1=HKCU\Software\TeamViewer\Version5|Last_Machine_Connections RegKey2=HKCU\Software\TeamViewer\Version5.1|Last_Machine_Connections RegKey3=HKCU\Software\TeamViewer\Version6|Last_Machine_Connections RegKey4=HKCU\Software\TeamViewer\Version7|Last_Machine_Connections Link to comment Share on other sites More sharing options...
SMalik Posted November 21, 2018 Share Posted November 21, 2018 New Entry [Direct3D Shader Cache *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Windows Default=False FileKey1=%LocalAppData%\D3DSCache|*.*|RECURSE Link to comment Share on other sites More sharing options...
APMichael Posted November 21, 2018 Share Posted November 21, 2018 Thank you for your revised and new entries. 4 hours ago, SMalik said: ... [Direct3D Shader Cache *] ... Own entry? Or should we add the FileKey to [Windows Subsystems *]? Link to comment Share on other sites More sharing options...
SMalik Posted November 21, 2018 Share Posted November 21, 2018 3 hours ago, APMichael said: Thank you for your revised and new entries. Own entry? Or should we add the FileKey to [Windows Subsystems *]? I think a separate entry is better. I changed the Detect from HKLM to HKCU. Link to comment Share on other sites More sharing options...
APMichael Posted November 22, 2018 Share Posted November 22, 2018 Thanks for your fast reply. Winapp2.ini updates:https://github.com/MoscaDotTo/Winapp2/commit/83d58d505f25fee9c1937e7b76e9587372038a83https://github.com/MoscaDotTo/Winapp2/commit/7207c52f72cbb7405ebab3a0c158d8d057ff0fe0 Link to comment Share on other sites More sharing options...
SMalik Posted November 22, 2018 Share Posted November 22, 2018 [Installer *] entry should be removed from Google Chrome. If chrome.7z is removed it gives an error when updating Google Chrome the next time. Link to comment Share on other sites More sharing options...
APMichael Posted November 23, 2018 Share Posted November 23, 2018 19 hours ago, SMalik said: [Installer *] entry should be removed from Google Chrome. If chrome.7z is removed it gives an error when updating Google Chrome the next time. Thank you very much for this important note. Yes, if the entry breaks the update function, it should be moved to Winapp3.ini. Link to comment Share on other sites More sharing options...
APMichael Posted November 27, 2018 Share Posted November 27, 2018 Winapp2.ini update:https://github.com/MoscaDotTo/Winapp2/commit/1a1ac67f7f89373deae283ffb4022adefa3359b9 Winapp3.ini update:https://github.com/MoscaDotTo/Winapp2/commit/c40255ec03cf0a64d915f76862bb2aed81bd4f6a Link to comment Share on other sites More sharing options...
SMalik Posted December 1, 2018 Share Posted December 1, 2018 Revised Entries Removed *.db file extension from FileKey1. Removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature. [Notifications *] DetectOS=10.0| LangSecRef=3025 Default=False FileKey1=%LocalAppData%\Microsoft\Windows\Notifications|*.db-shm;*.db-wal;*.tmp FileKey2=%LocalAppData%\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\Backup RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm Removed %LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\BackgroundTransferApi|*.*|RECURSE [Content Delivery Manager *] DetectOS=10.0| LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy Default=False FileKey1=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\INet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey4=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\Temp|*.*|RECURSE FileKey5=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\TokenBroker\Cache|*.*|RECURSE FileKey6=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalCache|*.*|RECURSE FileKey7=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\Favicons|*.*|RECURSE FileKey8=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\MobilityExperience\ImageCache|*.*|RECURSE FileKey9=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\OneSettingsResponseCache|*.*|RECURSE FileKey10=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\TargetedContentCache|*.*|RECURSE FileKey11=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\TempState|*.*|RECURSE Link to comment Share on other sites More sharing options...
dvdbane Posted December 1, 2018 Share Posted December 1, 2018 18 hours ago, SMalik said: Revised Entries Removed *.db file extension from FileKey1. Removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature. [Notifications *] DetectOS=10.0| LangSecRef=3025 Default=False FileKey1=%LocalAppData%\Microsoft\Windows\Notifications|*.db-shm;*.db-wal;*.tmp FileKey2=%LocalAppData%\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\Backup RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm if removing wpndatabase.db break Microsoft Store Apps Live Tile feature. then i think *.db-shm;*.db-wal need to be remove too as it is created by wpndatabase.db and will be deleted automatically https://www.sqlite.org/tempfiles.html Link to comment Share on other sites More sharing options...
SMalik Posted December 2, 2018 Share Posted December 2, 2018 9 hours ago, dvdbane said: if removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature. then i think *.db-shm;*.db-wal need to be removed too as it is created by wpndatabase.db and will be deleted automatically https://www.sqlite.org/tempfiles.html There is no harm in deleting files with *.db-shm and *.db-wal extensions. These hold traces of Notifications. I didn't see anything related to these file extensions in the link you provided. wpndatabase.db, wpndatabase.db-shm and wpndatabase.db-wal are locked files. CCleaner can't delete them unless CCleaner is used in Windows Safe Mode. Another privacy cleaner program that I test was causing this issue, as it has an option to delete locked files on system boot. It took me a few hours to find out the cause of the Live Tile issue. Link to comment Share on other sites More sharing options...
SMalik Posted December 2, 2018 Share Posted December 2, 2018 Revised Entries Added *.ldb and MANIFEST-* I guess .ldb files keep information about downloads [Internet Cache *] LangSecRef=3029 Detect1=HKCU\Software\7Star\7Star Detect2=HKCU\Software\360Browser\Browser Detect3=HKCU\Software\Amigo Detect4=HKCU\Software\BraveSoftware\Brave-Browser Detect5=HKCU\Software\CentBrowser Detect6=HKCU\Software\ChromePlus Detect7=HKCU\Software\Chromium\PreferenceMACs Detect8=HKCU\Software\CocCoc\Browser Detect9=HKCU\Software\Comodo\Dragon Detect10=HKCU\Software\Coowon\Coowon Detect11=HKCU\Software\Epic Privacy Browser Detect12=HKCU\Software\Flock Detect13=HKCU\Software\Opera Software Detect14=HKCU\Software\RockMelt Detect15=HKCU\Software\Slimjet Detect16=HKCU\Software\Torch Detect17=HKCU\Software\Vivaldi Detect18=HKCU\Software\Yandex\YandexBrowser DetectFile1=%AppData%\brave DetectFile2=%LocalAppData%\Google\Chrome* Default=False FileKey1=%AppData%\brave|Network Persistent State;Origin Bound Certs FileKey2=%AppData%\Opera Software\Opera*|Network Persistent State;Origin Bound Certs FileKey3=%LocalAppData%\7Star\7Star\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey4=%LocalAppData%\360Browser\Browser\User Data\*|Network Persistent State;Origin Bound Certs FileKey5=%LocalAppData%\Amigo\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey6=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey7=%LocalAppData%\CentBrowser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey8=%LocalAppData%\Chromium\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey9=%LocalAppData%\CocCoc\Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey10=%LocalAppData%\Comodo\Dragon\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey11=%LocalAppData%\Coowon\Coowon\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey12=%LocalAppData%\Epic Privacy Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey13=%LocalAppData%\Flock\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey14=%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey16=%LocalAppData%\RockMelt\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey17=%LocalAppData%\Slimjet\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey18=%LocalAppData%\Torch\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey19=%LocalAppData%\Vivaldi\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs FileKey20=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs Added *.log [Logs *] LangSecRef=3029 Detect1=HKCU\Software\7Star\7Star Detect2=HKCU\Software\360Browser\Browser Detect3=HKCU\Software\Amigo Detect4=HKCU\Software\BraveSoftware\Brave-Browser Detect5=HKCU\Software\CentBrowser Detect6=HKCU\Software\ChromePlus Detect7=HKCU\Software\Chromium\PreferenceMACs Detect8=HKCU\Software\CocCoc\Browser Detect9=HKCU\Software\Comodo\Dragon Detect10=HKCU\Software\Coowon\Coowon Detect11=HKCU\Software\Epic Privacy Browser Detect12=HKCU\Software\Flock Detect13=HKCU\Software\Opera Software Detect14=HKCU\Software\RockMelt Detect15=HKCU\Software\Slimjet Detect16=HKCU\Software\Torch Detect17=HKCU\Software\Vivaldi Detect18=HKCU\Software\Yandex\YandexBrowser DetectFile1=%AppData%\brave DetectFile2=%LocalAppData%\Google\Chrome* Default=False FileKey1=%AppData%\brave|LOG;LOG.old|RECURSE FileKey2=%AppData%\Opera Software\Opera*|LOG;LOG.old|RECURSE FileKey3=%LocalAppData%\7Star\7Star\Application|debug.log FileKey4=%LocalAppData%\7Star\7Star\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey5=%LocalAppData%\360Browser\Browser\Application|debug.log FileKey6=%LocalAppData%\360Browser\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey7=%LocalAppData%\Amigo\Application|debug.log FileKey8=%LocalAppData%\Amigo\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey9=%LocalAppData%\Brave|debug.log FileKey10=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey11=%LocalAppData%\CentBrowser\Application|debug.log FileKey12=%LocalAppData%\CentBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey13=%LocalAppData%\Chromium\Application|debug.log FileKey14=%LocalAppData%\Chromium\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey15=%LocalAppData%\CocCoc\Browser\Application|debug.log FileKey16=%LocalAppData%\CocCoc\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey17=%LocalAppData%\Comodo\Dragon\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey18=%LocalAppData%\Coowon\Coowon\Application|debug.log FileKey19=%LocalAppData%\Coowon\Coowon\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey20=%LocalAppData%\Epic Privacy Browser\Application|debug.log FileKey21=%LocalAppData%\Epic Privacy Browser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey22=%LocalAppData%\Flock\Application|debug.log FileKey23=%LocalAppData%\Flock\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey24=%LocalAppData%\Google\Chrome Cleanup Tool|*.log FileKey25=%LocalAppData%\Google\Chrome*\Application|debug.log FileKey26=%LocalAppData%\Google\Chrome*\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey27=%LocalAppData%\Google\Software Reporter Tool|*.log FileKey28=%LocalAppData%\MapleStudio\ChromePlus\Application|debug.log FileKey29=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey30=%LocalAppData%\Programs\Opera*|debug.log FileKey31=%LocalAppData%\RockMelt\Application|debug.log FileKey32=%LocalAppData%\RockMelt\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey33=%LocalAppData%\Slimjet\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey34=%LocalAppData%\Torch\Application|debug.log FileKey35=%LocalAppData%\Torch\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey36=%LocalAppData%\Vivaldi\Application|debug.log FileKey37=%LocalAppData%\Vivaldi\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey38=%LocalAppData%\Yandex\YandexBrowser\Application|debug.log FileKey39=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE FileKey40=%ProgramFiles%\BraveSoftware\Brave-Browser\Application|debug.log FileKey41=%ProgramFiles%\Comodo\Dragon|debug.log FileKey42=%ProgramFiles%\Google\Chrome*\Application|debug.log FileKey43=%ProgramFiles%\Opera*|debug.log FileKey44=%ProgramFiles%\Slimjet|debug.log FileKey45=%ProgramFiles%\SRWare Iron|debug.log FileKey46=%ProgramFiles%\SuperBird|debug.log FileKey47=%ProgramFiles%\Vivaldi\Application|debug.log Link to comment Share on other sites More sharing options...
SMalik Posted December 2, 2018 Share Posted December 2, 2018 Revised Entry Added FileKey5 & FileKey6 [MS Notepad *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Notepad Default=False Warning=If Notepad stops remembering your window size settings, this entry will reset it back to the default size. RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY RegKey5=HKCU\Software\Microsoft\Notepad|replaceString RegKey6=HKCU\Software\Microsoft\Notepad|searchString Link to comment Share on other sites More sharing options...
dvdbane Posted December 2, 2018 Share Posted December 2, 2018 2 hours ago, SMalik said: There is no harm in deleting files with *.db-shm and *.db-wal extensions. These hold traces of Notifications. I didn't see anything related to these file extensions in the link you provided. wpndatabase.db, wpndatabase.db-shm and wpndatabase.db-wal are locked files. CCleaner can't delete them unless CCleaner is used in Windows Safe Mode. Another privacy cleaner program that I test was causing this issue, as it has an option to delete locked files on system boot. It took me a few hours to find out the cause of the Live Tile issue. 2.2. Write-Ahead Log (WAL) Files A write-ahead log or WAL file is used in place of a rollback journal when SQLite is operating in WAL mode. As with the rollback journal, the purpose of the WAL file is to implement atomic commit and rollback. The WAL file is always located in the same directory as the database file and has the same name as the database file except with the 4 characters "-wal" appended. The WAL file is created when the first connection to the database is opened and is normally removed when the last connection to the database closes. However, if the last connection does not shutdown cleanly, the WAL file will remain in the filesystem and will be automatically cleaned up the next time the database is opened. 2.3. Shared-Memory Files When operating in WAL mode, all SQLite database connections associated with the same database file need to share some memory that is used as an index for the WAL file. In most implementations, this shared memory is implemented by calling mmap() on a file created for this sole purpose: the shared-memory file. The shared-memory file, if it exists, is located in the same directory as the database file and has the same name as the database file except with the 4 characters "-shm" appended. Shared memory files only exist while running in WAL mode. The shared-memory file contains no persistent content. The only purpose of the shared-memory file is to provide a block of shared memory for use by multiple processes all accessing the same database in WAL mode. If the VFS is able to provide an alternative method for accessing shared memory, then that alternative method might be used rather than the shared-memory file. For example, if PRAGMA locking_mode is set to EXCLUSIVE (meaning that only one process is able to access the database file) then the shared memory will be allocated from heap rather than out of the shared-memory file, and the shared-memory file will never be created. The shared-memory file has the same lifetime as its associated WAL file. The shared-memory file is created when the WAL file is created and is deleted when the WAL file is deleted. During WAL file recovery, the shared memory file is recreated from scratch based on the contents of the WAL file being recovered. Link to comment Share on other sites More sharing options...
siliconman01 Posted December 2, 2018 Share Posted December 2, 2018 Quote [Logs *]LangSecRef=3029Detect1=HKCU\Software\7Star\7StarDetect2=HKCU\Software\360Browser\BrowserDetect3=HKCU\Software\AmigoDetect4=HKCU\Software\BraveSoftware\Brave-BrowserDetect5=HKCU\Software\CentBrowserDetect6=HKCU\Software\ChromePlusDetect7=HKCU\Software\Chromium\PreferenceMACsDetect8=HKCU\Software\CocCoc\BrowserDetect9=HKCU\Software\Comodo\DragonDetect10=HKCU\Software\Coowon\CoowonDetect11=HKCU\Software\Epic Privacy BrowserDetect12=HKCU\Software\FlockDetect13=HKCU\Software\Opera SoftwareDetect14=HKCU\Software\RockMeltDetect15=HKCU\Software\SlimjetDetect16=HKCU\Software\TorchDetect17=HKCU\Software\VivaldiDetect18=HKCU\Software\Yandex\YandexBrowserDetectFile1=%AppData%\braveDetectFile2=%LocalAppData%\Google\Chrome*Default=FalseFileKey1=%AppData%\brave|LOG;LOG.old|RECURSEFileKey2=%AppData%\Opera Software\Opera*|LOG;LOG.old|RECURSEFileKey3=%LocalAppData%\7Star\7Star\Application|debug.logFileKey4=%LocalAppData%\7Star\7Star\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey5=%LocalAppData%\360Browser\Browser\Application|debug.logFileKey6=%LocalAppData%\360Browser\Browser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey7=%LocalAppData%\Amigo\Application|debug.logFileKey8=%LocalAppData%\Amigo\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey9=%LocalAppData%\Brave|debug.logFileKey10=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey11=%LocalAppData%\CentBrowser\Application|debug.logFileKey12=%LocalAppData%\CentBrowser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey13=%LocalAppData%\Chromium\Application|debug.logFileKey14=%LocalAppData%\Chromium\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey15=%LocalAppData%\CocCoc\Browser\Application|debug.logFileKey16=%LocalAppData%\CocCoc\Browser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey17=%LocalAppData%\Comodo\Dragon\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey18=%LocalAppData%\Coowon\Coowon\Application|debug.logFileKey19=%LocalAppData%\Coowon\Coowon\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey20=%LocalAppData%\Epic Privacy Browser\Application|debug.logFileKey21=%LocalAppData%\Epic Privacy Browser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey22=%LocalAppData%\Flock\Application|debug.logFileKey23=%LocalAppData%\Flock\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey24=%LocalAppData%\Google\Chrome Cleanup Tool|*.logFileKey25=%LocalAppData%\Google\Chrome*\Application|debug.logFileKey26=%LocalAppData%\Google\Chrome*\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey27=%LocalAppData%\Google\Software Reporter Tool|*.logFileKey28=%LocalAppData%\MapleStudio\ChromePlus\Application|debug.logFileKey29=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey30=%LocalAppData%\Programs\Opera*|debug.logFileKey31=%LocalAppData%\RockMelt\Application|debug.logFileKey32=%LocalAppData%\RockMelt\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey33=%LocalAppData%\Slimjet\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey34=%LocalAppData%\Torch\Application|debug.logFileKey35=%LocalAppData%\Torch\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey36=%LocalAppData%\Vivaldi\Application|debug.logFileKey37=%LocalAppData%\Vivaldi\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey38=%LocalAppData%\Yandex\YandexBrowser\Application|debug.logFileKey39=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.log;LOG;LOG.old|RECURSEFileKey40=%ProgramFiles%\BraveSoftware\Brave-Browser\Application|debug.logFileKey41=%ProgramFiles%\Comodo\Dragon|debug.logFileKey42=%ProgramFiles%\Google\Chrome*\Application|debug.logFileKey43=%ProgramFiles%\Opera*|debug.logFileKey44=%ProgramFiles%\Slimjet|debug.logFileKey45=%ProgramFiles%\SRWare Iron|debug.logFileKey46=%ProgramFiles%\SuperBird|debug.logFileKey47=%ProgramFiles%\Vivaldi\Application|debug.log The ExcludeKey below needs to be added to this to keep Internet Download Manager (IDM) extension from opening its "installed" webpage on the first Chrome opening after a CCleaner run. ExcludeKey1=FILE|%LocalAppData%\Google\Chrome*\User Data\Profile 1\Local Extension Settings\ngpampappnmepgilojfohadhhmbhlaek\|000003.log Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
dvdbane Posted December 2, 2018 Share Posted December 2, 2018 3 hours ago, SMalik said: Revised Entries Added *.log [Logs *] 16 minutes ago, siliconman01 said: The ExcludeKey below needs to be added to this to keep Internet Download Manager (IDM) extension from opening its "installed" webpage on the first Chrome opening after a CCleaner run. ExcludeKey1=FILE|%LocalAppData%\Google\Chrome*\User Data\Profile 1\Local Extension Settings\ngpampappnmepgilojfohadhhmbhlaek\|000003.log didn't notice the modified entry until @siliconman01 mentioned it *.log and excludekey was removed from the entry [Logs *] due to issues #320 Link to comment Share on other sites More sharing options...
SMalik Posted December 2, 2018 Share Posted December 2, 2018 25 minutes ago, dvdbane said: didn't notice the modified entry until @siliconman01 mentioned it *.log and excludekey was removed from the entry [Logs *] due to issues #320 Let's restrict that to %LocalAppData%\Google\Chrome\User Data\Default Link to comment Share on other sites More sharing options...
dvdbane Posted December 2, 2018 Share Posted December 2, 2018 33 minutes ago, SMalik said: Let's restrict that to %LocalAppData%\Google\Chrome\User Data\Default it doesn't matter if you're not using Google Chrome, as long as you're using chrome variant and use extension, that cleaning rule will make some extension lose settings or corrupted that will make a lot of user really mad esp Stylish/Stylus user which is why [Logs *] was modified i don't make the decision but if you need more explanation, then @APMichael can help with that Link to comment Share on other sites More sharing options...
Winapp2.ini Posted December 2, 2018 Author Share Posted December 2, 2018 The LevelDB Logs generated by Google Chrome extensions are not logs in the conventional sense we usually approach with intention to delete. They hold buffer data for the LevelDB storage. https://github.com/google/leveldb/blob/master/doc/impl.md https://github.com/MoscaDotTo/Winapp2/issues/320 winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
APMichael Posted December 3, 2018 Share Posted December 3, 2018 Quote [MS Notepad *] LangSecRef=3025 Detect=HKCU\Software\Microsoft\Notepad Default=False Warning=If Notepad stops remembering your window size settings, this entry will reset it back to the default size. RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY RegKey5=HKCU\Software\Microsoft\Notepad|replaceString RegKey6=HKCU\Software\Microsoft\Notepad|searchString Are the RegKeys 1-4 really useful? I never had this problem. Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size? Link to comment Share on other sites More sharing options...
APMichael Posted December 3, 2018 Share Posted December 3, 2018 Quote Added *.log [Logs *] ... We cannot add the *.log files because all the *.log files are not usual log files. They are important database files! (I don't understand why Google chose this file extension for an important database file!?) The usual log files are only LOG and LOG.old. Please check the links provided by Winapp2.ini. Quote Added *.ldb and MANIFEST-* I guess .ldb files keep information about downloads [Internet Cache *] ... The *.ldb and MANIFEST-* files are also database files. But if you are 100% sure that this database only stores traces, we could remove all database related files from the folder, e.g.: FileKey14=%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-*;Network Persistent State;Origin Bound Certs (If you want to clean a LevelDB, you should always remove all related files.) Link to comment Share on other sites More sharing options...
siliconman01 Posted December 3, 2018 Share Posted December 3, 2018 30 minutes ago, APMichael said: Are the RegKeys 1-4 really useful? I never had this problem. Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size? I also have never seen any "affect" from RegKeys 1-4. My MS Notepad always stays the same size that I set it for. I suggest we just eliminate these 4 keys and the warning message. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
APMichael Posted December 3, 2018 Share Posted December 3, 2018 On 2.12.2018 at 09:34, SMalik said: Let's restrict that to %LocalAppData%\Google\Chrome\User Data\Default On 2.12.2018 at 10:07, dvdbane said: it doesn't matter if you're not using Google Chrome, as long as you're using chrome variant and use extension, that cleaning rule will make some extension lose settings... I think SMalik means that he wants to protect the profile folder, because there are other (not profile) folders that could contain usual log files (*.log). My suggestion would be to rename the existing entry to [LevelDB Logs *] and add a new entry [Logs *] with ExcludeKeys for the profile folders: FileKeyX=%LocalAppData%\Google\Chrome*|*.log|RECURSE ExcludeKeyX=PATH|%LocalAppData%\Google\Chrome*\User Data\Default\|*.* ExcludeKeyX=PATH|%LocalAppData%\Google\Chrome*\User Data\*Profile*\|*.* (As far as I know, Google Chrome names the profile folders "Default", "Profile X" or "XYZ Profile".) Link to comment Share on other sites More sharing options...
SMalik Posted December 3, 2018 Share Posted December 3, 2018 5 hours ago, APMichael said: Are the RegKeys 1-4 really useful? I never had this problem. Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size? I think just FileKey5 & FileKey6 paths are enough in this entry without a warning. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now