Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

New Entry

[Paint 3D *]
DetectOS=10.0
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MSPaint_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\Microsoft.MSPaint_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\INet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.MSPaint_*\AC\Temp|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.MSPaint_*\LocalCache|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.MSPaint_*\LocalState|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\Microsoft.MSPaint_*\TempState|*.*|RECURSE

Link to comment
Share on other sites

Revised Entry

Removed |RECURSE from FileKey3 and FileKey4

[TeamViewer *]
LangSecRef=3024
Detect=HKCU\Software\TeamViewer
Default=False
FileKey1=%AppData%\TeamViewer|*.log;*.mdmp
FileKey2=%LocalAppData%\TeamViewer\*Cache|*.*|RECURSE
FileKey3=%LocalAppData%\VirtualStore\Program Files*\TeamViewer|*.log
FileKey4=%ProgramFiles%\TeamViewer|*.log
FileKey5=%WinDir%\System32|TeamViewer*_Hooks.log
RegKey1=HKCU\Software\TeamViewer\Version5|Last_Machine_Connections
RegKey2=HKCU\Software\TeamViewer\Version5.1|Last_Machine_Connections
RegKey3=HKCU\Software\TeamViewer\Version6|Last_Machine_Connections
RegKey4=HKCU\Software\TeamViewer\Version7|Last_Machine_Connections

Link to comment
Share on other sites

3 hours ago, APMichael said:

Thank you for your revised and new entries.

Own entry? Or should we add the FileKey to [Windows Subsystems *]?

I think a separate entry is better.
I changed the Detect from HKLM to HKCU.

Link to comment
Share on other sites

19 hours ago, SMalik said:

[Installer *] entry should be removed from Google Chrome. If chrome.7z is removed it gives an error when updating Google Chrome the next time.

Thank you very much for this important note.

Yes, if the entry breaks the update function, it should be moved to Winapp3.ini.

Link to comment
Share on other sites

Revised Entries

Removed *.db file extension from FileKey1. Removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature.

[Notifications *]
DetectOS=10.0|
LangSecRef=3025
Default=False
FileKey1=%LocalAppData%\Microsoft\Windows\Notifications|*.db-shm;*.db-wal;*.tmp
FileKey2=%LocalAppData%\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\Backup
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm


Removed %LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\BackgroundTransferApi|*.*|RECURSE

[Content Delivery Manager *]
DetectOS=10.0|
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\INet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\Temp|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\AC\TokenBroker\Cache|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalCache|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\Favicons|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\MobilityExperience\ImageCache|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\OneSettingsResponseCache|*.*|RECURSE
FileKey10=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\LocalState\TargetedContentCache|*.*|RECURSE
FileKey11=%LocalAppData%\Packages\Microsoft.Windows.ContentDeliveryManager_*\TempState|*.*|RECURSE

Link to comment
Share on other sites

18 hours ago, SMalik said:

Revised Entries

Removed *.db file extension from FileKey1. Removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature.

[Notifications *]
DetectOS=10.0|
LangSecRef=3025
Default=False
FileKey1=%LocalAppData%\Microsoft\Windows\Notifications|*.db-shm;*.db-wal;*.tmp
FileKey2=%LocalAppData%\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\Backup
RegKey2=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm

if removing wpndatabase.db break Microsoft Store Apps Live Tile feature. then i think *.db-shm;*.db-wal need to be remove too as it is created by wpndatabase.db and will be deleted automatically

https://www.sqlite.org/tempfiles.html

Link to comment
Share on other sites

9 hours ago, dvdbane said:

if removing wpndatabase.db breaks Microsoft Store Apps Live Tile feature. then i think *.db-shm;*.db-wal need to be removed too as it is created by wpndatabase.db and will be deleted automatically

https://www.sqlite.org/tempfiles.html

There is no harm in deleting files with *.db-shm and *.db-wal extensions. These hold traces of Notifications. I didn't see anything related to these file extensions in the link you provided.

wpndatabase.db, wpndatabase.db-shm and wpndatabase.db-wal are locked files. CCleaner can't delete them unless CCleaner is used in Windows Safe Mode. Another privacy cleaner program that I test was causing this issue, as it has an option to delete locked files on system boot. It took me a few hours to find out the cause of the Live Tile issue.

Link to comment
Share on other sites

Revised Entries

Added *.ldb and MANIFEST-*

I guess .ldb files keep information about downloads

[Internet Cache *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware\Brave-Browser
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Opera Software
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Torch
Detect17=HKCU\Software\Vivaldi
Detect18=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave|Network Persistent State;Origin Bound Certs
FileKey2=%AppData%\Opera Software\Opera*|Network Persistent State;Origin Bound Certs
FileKey3=%LocalAppData%\7Star\7Star\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey4=%LocalAppData%\360Browser\Browser\User Data\*|Network Persistent State;Origin Bound Certs
FileKey5=%LocalAppData%\Amigo\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey6=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey7=%LocalAppData%\CentBrowser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey8=%LocalAppData%\Chromium\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey9=%LocalAppData%\CocCoc\Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey10=%LocalAppData%\Comodo\Dragon\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey11=%LocalAppData%\Coowon\Coowon\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey12=%LocalAppData%\Epic Privacy Browser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey13=%LocalAppData%\Flock\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey14=%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey15=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey16=%LocalAppData%\RockMelt\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey17=%LocalAppData%\Slimjet\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey18=%LocalAppData%\Torch\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey19=%LocalAppData%\Vivaldi\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs
FileKey20=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.ldb;MANIFEST-*;Network Persistent State;Origin Bound Certs


Added *.log

[Logs *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware\Brave-Browser
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Opera Software
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Torch
Detect17=HKCU\Software\Vivaldi
Detect18=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave|LOG;LOG.old|RECURSE
FileKey2=%AppData%\Opera Software\Opera*|LOG;LOG.old|RECURSE
FileKey3=%LocalAppData%\7Star\7Star\Application|debug.log
FileKey4=%LocalAppData%\7Star\7Star\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey5=%LocalAppData%\360Browser\Browser\Application|debug.log
FileKey6=%LocalAppData%\360Browser\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey7=%LocalAppData%\Amigo\Application|debug.log
FileKey8=%LocalAppData%\Amigo\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey9=%LocalAppData%\Brave|debug.log
FileKey10=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey11=%LocalAppData%\CentBrowser\Application|debug.log
FileKey12=%LocalAppData%\CentBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey13=%LocalAppData%\Chromium\Application|debug.log
FileKey14=%LocalAppData%\Chromium\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey15=%LocalAppData%\CocCoc\Browser\Application|debug.log
FileKey16=%LocalAppData%\CocCoc\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey17=%LocalAppData%\Comodo\Dragon\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey18=%LocalAppData%\Coowon\Coowon\Application|debug.log
FileKey19=%LocalAppData%\Coowon\Coowon\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey20=%LocalAppData%\Epic Privacy Browser\Application|debug.log
FileKey21=%LocalAppData%\Epic Privacy Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey22=%LocalAppData%\Flock\Application|debug.log
FileKey23=%LocalAppData%\Flock\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey24=%LocalAppData%\Google\Chrome Cleanup Tool|*.log
FileKey25=%LocalAppData%\Google\Chrome*\Application|debug.log
FileKey26=%LocalAppData%\Google\Chrome*\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey27=%LocalAppData%\Google\Software Reporter Tool|*.log
FileKey28=%LocalAppData%\MapleStudio\ChromePlus\Application|debug.log
FileKey29=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey30=%LocalAppData%\Programs\Opera*|debug.log
FileKey31=%LocalAppData%\RockMelt\Application|debug.log
FileKey32=%LocalAppData%\RockMelt\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey33=%LocalAppData%\Slimjet\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey34=%LocalAppData%\Torch\Application|debug.log
FileKey35=%LocalAppData%\Torch\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey36=%LocalAppData%\Vivaldi\Application|debug.log
FileKey37=%LocalAppData%\Vivaldi\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey38=%LocalAppData%\Yandex\YandexBrowser\Application|debug.log
FileKey39=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey40=%ProgramFiles%\BraveSoftware\Brave-Browser\Application|debug.log
FileKey41=%ProgramFiles%\Comodo\Dragon|debug.log
FileKey42=%ProgramFiles%\Google\Chrome*\Application|debug.log
FileKey43=%ProgramFiles%\Opera*|debug.log
FileKey44=%ProgramFiles%\Slimjet|debug.log
FileKey45=%ProgramFiles%\SRWare Iron|debug.log
FileKey46=%ProgramFiles%\SuperBird|debug.log
FileKey47=%ProgramFiles%\Vivaldi\Application|debug.log

Link to comment
Share on other sites

Revised Entry

Added FileKey5 & FileKey6

[MS Notepad *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Notepad
Default=False
Warning=If Notepad stops remembering your window size settings, this entry will reset it back to the default size.
RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX
RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY
RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX
RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY
RegKey5=HKCU\Software\Microsoft\Notepad|replaceString
RegKey6=HKCU\Software\Microsoft\Notepad|searchString

 

Link to comment
Share on other sites

2 hours ago, SMalik said:

There is no harm in deleting files with *.db-shm and *.db-wal extensions. These hold traces of Notifications. I didn't see anything related to these file extensions in the link you provided.

wpndatabase.db, wpndatabase.db-shm and wpndatabase.db-wal are locked files. CCleaner can't delete them unless CCleaner is used in Windows Safe Mode. Another privacy cleaner program that I test was causing this issue, as it has an option to delete locked files on system boot. It took me a few hours to find out the cause of the Live Tile issue.

2.2. Write-Ahead Log (WAL) Files

A write-ahead log or WAL file is used in place of a rollback journal when SQLite is operating in WAL mode. As with the rollback journal, the purpose of the WAL file is to implement atomic commit and rollback. The WAL file is always located in the same directory as the database file and has the same name as the database file except with the 4 characters "-wal" appended. The WAL file is created when the first connection to the database is opened and is normally removed when the last connection to the database closes. However, if the last connection does not shutdown cleanly, the WAL file will remain in the filesystem and will be automatically cleaned up the next time the database is opened. 

2.3. Shared-Memory Files

When operating in WAL mode, all SQLite database connections associated with the same database file need to share some memory that is used as an index for the WAL file. In most implementations, this shared memory is implemented by calling mmap() on a file created for this sole purpose: the shared-memory file. The shared-memory file, if it exists, is located in the same directory as the database file and has the same name as the database file except with the 4 characters "-shm" appended. Shared memory files only exist while running in WAL mode.

The shared-memory file contains no persistent content. The only purpose of the shared-memory file is to provide a block of shared memory for use by multiple processes all accessing the same database in WAL mode. If the VFS is able to provide an alternative method for accessing shared memory, then that alternative method might be used rather than the shared-memory file. For example, if PRAGMA locking_mode is set to EXCLUSIVE (meaning that only one process is able to access the database file) then the shared memory will be allocated from heap rather than out of the shared-memory file, and the shared-memory file will never be created.

The shared-memory file has the same lifetime as its associated WAL file. The shared-memory file is created when the WAL file is created and is deleted when the WAL file is deleted. During WAL file recovery, the shared memory file is recreated from scratch based on the contents of the WAL file being recovered. 

 

Link to comment
Share on other sites

Quote

[Logs *]
LangSecRef=3029
Detect1=HKCU\Software\7Star\7Star
Detect2=HKCU\Software\360Browser\Browser
Detect3=HKCU\Software\Amigo
Detect4=HKCU\Software\BraveSoftware\Brave-Browser
Detect5=HKCU\Software\CentBrowser
Detect6=HKCU\Software\ChromePlus
Detect7=HKCU\Software\Chromium\PreferenceMACs
Detect8=HKCU\Software\CocCoc\Browser
Detect9=HKCU\Software\Comodo\Dragon
Detect10=HKCU\Software\Coowon\Coowon
Detect11=HKCU\Software\Epic Privacy Browser
Detect12=HKCU\Software\Flock
Detect13=HKCU\Software\Opera Software
Detect14=HKCU\Software\RockMelt
Detect15=HKCU\Software\Slimjet
Detect16=HKCU\Software\Torch
Detect17=HKCU\Software\Vivaldi
Detect18=HKCU\Software\Yandex\YandexBrowser
DetectFile1=%AppData%\brave
DetectFile2=%LocalAppData%\Google\Chrome*
Default=False
FileKey1=%AppData%\brave|LOG;LOG.old|RECURSE
FileKey2=%AppData%\Opera Software\Opera*|LOG;LOG.old|RECURSE
FileKey3=%LocalAppData%\7Star\7Star\Application|debug.log
FileKey4=%LocalAppData%\7Star\7Star\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey5=%LocalAppData%\360Browser\Browser\Application|debug.log
FileKey6=%LocalAppData%\360Browser\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey7=%LocalAppData%\Amigo\Application|debug.log
FileKey8=%LocalAppData%\Amigo\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey9=%LocalAppData%\Brave|debug.log
FileKey10=%LocalAppData%\BraveSoftware\Brave-Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey11=%LocalAppData%\CentBrowser\Application|debug.log
FileKey12=%LocalAppData%\CentBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey13=%LocalAppData%\Chromium\Application|debug.log
FileKey14=%LocalAppData%\Chromium\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey15=%LocalAppData%\CocCoc\Browser\Application|debug.log
FileKey16=%LocalAppData%\CocCoc\Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey17=%LocalAppData%\Comodo\Dragon\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey18=%LocalAppData%\Coowon\Coowon\Application|debug.log
FileKey19=%LocalAppData%\Coowon\Coowon\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey20=%LocalAppData%\Epic Privacy Browser\Application|debug.log
FileKey21=%LocalAppData%\Epic Privacy Browser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey22=%LocalAppData%\Flock\Application|debug.log
FileKey23=%LocalAppData%\Flock\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey24=%LocalAppData%\Google\Chrome Cleanup Tool|*.log
FileKey25=%LocalAppData%\Google\Chrome*\Application|debug.log
FileKey26=%LocalAppData%\Google\Chrome*\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey27=%LocalAppData%\Google\Software Reporter Tool|*.log
FileKey28=%LocalAppData%\MapleStudio\ChromePlus\Application|debug.log
FileKey29=%LocalAppData%\MapleStudio\ChromePlus\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey30=%LocalAppData%\Programs\Opera*|debug.log
FileKey31=%LocalAppData%\RockMelt\Application|debug.log
FileKey32=%LocalAppData%\RockMelt\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey33=%LocalAppData%\Slimjet\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey34=%LocalAppData%\Torch\Application|debug.log
FileKey35=%LocalAppData%\Torch\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey36=%LocalAppData%\Vivaldi\Application|debug.log
FileKey37=%LocalAppData%\Vivaldi\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey38=%LocalAppData%\Yandex\YandexBrowser\Application|debug.log
FileKey39=%LocalAppData%\Yandex\YandexBrowser\User Data\*|*.log;LOG;LOG.old|RECURSE
FileKey40=%ProgramFiles%\BraveSoftware\Brave-Browser\Application|debug.log
FileKey41=%ProgramFiles%\Comodo\Dragon|debug.log
FileKey42=%ProgramFiles%\Google\Chrome*\Application|debug.log
FileKey43=%ProgramFiles%\Opera*|debug.log
FileKey44=%ProgramFiles%\Slimjet|debug.log
FileKey45=%ProgramFiles%\SRWare Iron|debug.log
FileKey46=%ProgramFiles%\SuperBird|debug.log
FileKey47=%ProgramFiles%\Vivaldi\Application|debug.log

The ExcludeKey below needs to be added to this to keep Internet Download Manager (IDM) extension from opening its "installed" webpage on the first Chrome opening after a CCleaner run.

ExcludeKey1=FILE|%LocalAppData%\Google\Chrome*\User Data\Profile 1\Local Extension Settings\ngpampappnmepgilojfohadhhmbhlaek\|000003.log

 

 

ChromeIDMExt.png

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

3 hours ago, SMalik said:

Revised Entries
Added *.log

[Logs *]

 

16 minutes ago, siliconman01 said:

The ExcludeKey below needs to be added to this to keep Internet Download Manager (IDM) extension from opening its "installed" webpage on the first Chrome opening after a CCleaner run.

ExcludeKey1=FILE|%LocalAppData%\Google\Chrome*\User Data\Profile 1\Local Extension Settings\ngpampappnmepgilojfohadhhmbhlaek\|000003.log

didn't notice the modified entry until @siliconman01 mentioned it

*.log and excludekey was removed from the entry [Logs *] due to issues #320

Link to comment
Share on other sites

33 minutes ago, SMalik said:

Let's restrict that to %LocalAppData%\Google\Chrome\User Data\Default

it doesn't matter if you're not using Google Chrome, as long as you're using chrome variant and use extension, that cleaning rule will make some extension lose settings or corrupted

that will make a lot of user really mad esp Stylish/Stylus user which is why [Logs *] was modified

i don't make the decision but if you need more explanation, then @APMichael can help with that

Link to comment
Share on other sites

The LevelDB Logs generated by Google Chrome extensions are not logs in the conventional sense we usually approach with intention to delete. They hold buffer data for the LevelDB storage.


https://github.com/google/leveldb/blob/master/doc/impl.md

https://github.com/MoscaDotTo/Winapp2/issues/320

Link to comment
Share on other sites

Quote

[MS Notepad *]
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Notepad
Default=False
Warning=If Notepad stops remembering your window size settings, this entry will reset it back to the default size.
RegKey1=HKCU\Software\Microsoft\Notepad|iWindowPosDX
RegKey2=HKCU\Software\Microsoft\Notepad|iWindowPosDY
RegKey3=HKCU\Software\Microsoft\Notepad|iWindowPosX
RegKey4=HKCU\Software\Microsoft\Notepad|iWindowPosY
RegKey5=HKCU\Software\Microsoft\Notepad|replaceString
RegKey6=HKCU\Software\Microsoft\Notepad|searchString

Are the RegKeys 1-4 really useful? I never had this problem.

Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size?

Link to comment
Share on other sites

Quote

Added *.log

[Logs *] ...

We cannot add the *.log files because all the *.log files are not usual log files. They are important database files! (I don't understand why Google chose this file extension for an important database file!?) The usual log files are only LOG and LOG.old.

Please check the links provided by Winapp2.ini.

Quote

Added *.ldb and MANIFEST-*

I guess .ldb files keep information about downloads

[Internet Cache *] ...

The *.ldb and MANIFEST-* files are also database files.

But if you are 100% sure that this database only stores traces, we could remove all database related files from the folder, e.g.:

FileKey14=%LocalAppData%\Google\Chrome*\User Data\*|*.ldb;*.log;CURRENT;LOCK;MANIFEST-*;Network Persistent State;Origin Bound Certs

(If you want to clean a LevelDB, you should always remove all related files.)

Link to comment
Share on other sites

30 minutes ago, APMichael said:

Are the RegKeys 1-4 really useful? I never had this problem.

Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size?

I also have never seen any "affect" from RegKeys 1-4.  My MS Notepad always stays the same size that I set it for.  I suggest we just eliminate these 4 keys and the warning message.

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

On 2.12.2018 at 09:34, SMalik said:

Let's restrict that to %LocalAppData%\Google\Chrome\User Data\Default

On 2.12.2018 at 10:07, dvdbane said:

it doesn't matter if you're not using Google Chrome, as long as you're using chrome variant and use extension, that cleaning rule will make some extension lose settings...

I think SMalik means that he wants to protect the profile folder, because there are other (not profile) folders that could contain usual log files (*.log).

My suggestion would be to rename the existing entry to [LevelDB Logs *] and add a new entry [Logs *] with ExcludeKeys for the profile folders:

FileKeyX=%LocalAppData%\Google\Chrome*|*.log|RECURSE
ExcludeKeyX=PATH|%LocalAppData%\Google\Chrome*\User Data\Default\|*.*
ExcludeKeyX=PATH|%LocalAppData%\Google\Chrome*\User Data\*Profile*\|*.*

(As far as I know, Google Chrome names the profile folders "Default", "Profile X" or "XYZ Profile".)

Link to comment
Share on other sites

5 hours ago, APMichael said:

Are the RegKeys 1-4 really useful? I never had this problem.

Or should we split the RegKeys into separate entries like [MS Notepad *] and [MS Notepad Window Size*], because not everyone always wants to reset the window size?

I think just FileKey5 & FileKey6 paths are enough in this entry without a warning.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.