Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

34 minutes ago, APMichael said:

Would "DetectFile=%CommonAppData%\CanonBJ\IJPrinter\CNMWindows" possibly work or does this path/folder also exist on your system?

The CNMWindows folder exists, yes, so that would not resolve the issue from my viewpoint. 

Canon.png

Edited by siliconman01
included registry pic

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

Quote

Thank you, but is this entry really safe? I guess you're only using the MCT to create an ISO file, right? Because if you read the many articles about these folders, it seems you also need these folders for a Windows rollback if you have used the MCT for a Windows upgrade (or if Windows has upgraded itself). For example: https://www.howtogeek.com/268667/what-is-the-windows.bt-folder-and-can-you-delete-it/. There is also an entry in the Winapp3.ini: [Old Windows Installation *].

Link to comment
Share on other sites

  • Moderators

Didn't know that, I only used it to create a USB Flash Drive installer.

I've deleted my post after reading your link to protect anyone who might blindly use it without knowing.

Link to comment
Share on other sites

I see an entry for [Auslogics Registry Defrag*] is in the winapp2.ini but not showing up on my system. I am using windows 7 x64. The places where Auslogics is mentioned in my registry are the following:

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Auslogics\Registry Defrag\11.x

The reports are stored in "C:\ProgramData\Auslogics\Registry Defrag\11.x\Reports"

 

Link to comment
Share on other sites

17 hours ago, Andavari said:

Didn't know that, I only used it to create a USB Flash Drive installer...

Thanks for your reply.

 

12 hours ago, CSGalloway said:

I see an entry for [Auslogics Registry Defrag*] is in the winapp2.ini but not showing up on my system. I am using windows 7 x64...

This should work (Detect does not require "Wow6432Node"):

[Auslogics Registry Defrag *]
LangSecRef=3024
Detect1=HKCU\Software\Auslogics\Registry Defrag
Detect2=HKLM\Software\Auslogics\Registry Defrag
Default=False
FileKey1=%AppData%\Auslogics\Registry Defrag\Logs|*.*
FileKey2=%AppData%\Auslogics\Registry Defrag\Reports|*.*
FileKey3=%CommonAppData%\Auslogics\Registry Defrag\*.x\Reports|*.*
Link to comment
Share on other sites

Modified entry: [Xbox/ Xbox Game Overlay/Xbox Identity Provider *]

Changed name from [Xbox *] to [Xbox/ Xbox Game Overlay/Xbox Identity Provider *] because this code covers three Xbox Apps

Added Detect2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe

Added FileKey23=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Nvidia Corporation\NV_Cache|*.*

[Xbox/Xbox Game Overlay/Xbox Identity Provider *]
DetectOS=10.0|
LangSecRef=3031
Detect1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.XboxApp_8wekyb3d8bbwe
Detect2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.XboxIdentityProvider_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.XboxApp_*\AC\INet*|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.XboxApp_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.XboxApp_*\AC\Temp|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.XboxApp_*\AC\TokenBroker\Cache|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.XboxApp_*\LocalCache|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.XboxApp_*\LocalState|*.log*|RECURSE
FileKey7=%LocalAppData%\Packages\Microsoft.XboxApp_*\LocalState\*Cache|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\Microsoft.XboxApp_*\LocalState\DiagOutputDir|*.txt
FileKey9=%LocalAppData%\Packages\Microsoft.XboxApp_*\LocalState\SmartGlass|*.log
FileKey10=%LocalAppData%\Packages\Microsoft.XboxApp_*\TempState|*.*|RECURSE
FileKey11=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\AC\INet*|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey13=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\AC\Temp|*.*|RECURSE
FileKey14=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\LocalCache|*.*|RECURSE
FileKey15=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\LocalState\Cache|*.*|RECURSE
FileKey16=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\LocalState\DiagOutputDir|*.txt
FileKey17=%LocalAppData%\Packages\Microsoft.XboxGameOverlay_*\TempState|*.*|RECURSE
FileKey18=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\INet*|*.*|RECURSE
FileKey19=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Microsoft\CLR_v4.0*|*.log
FileKey20=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Microsoft\CLR_v4.0*\NativeImages\Temp|*.*|RECURSE
FileKey21=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Microsoft\CLR_v4.0*\UsageLogs|*.*|RECURSE
FileKey22=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey23=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Nvidia Corporation\NV_Cache|*.*
FileKey24=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\Temp|*.*|RECURSE
FileKey25=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\AC\TokenBroker\Cache|*.*|RECURSE
FileKey26=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\LocalCache|*.*|RECURSE
FileKey27=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\LocalState\Cache|*.*|RECURSE
FileKey28=%LocalAppData%\Packages\Microsoft.XboxIdentityProvider_*\TempState|*.*|RECURSE

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

5 hours ago, APMichael said:

Thanks! IMHO we should continue to use [Xbox *], as the other apps are actually only hidden "sub-apps" of the Xbox app. (And if we add more "sub-apps" in the future, the name will be far too long.)

https://forum.piriform.com/topic/32310-winapp2ini-additions/?page=302&tab=comments#comment-302515

Leaving the name as [Xbox *] is fine with me.  

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

Revised Entry

Removing files from the two locations listed below breaking up the Microsoft Apps Live Tile feature. These should be removed.

Removed:
%LocalAppData%\Microsoft\Windows\Notifications|*.db;*.db-shm;*.db-wal;*.tmp
%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Notifications|*.db;*.db-shm;*.db-wal;*.tmp

[Push Notifications *]
DetectOS=10.0|
LangSecRef=3025
Detect=HKCU\Software\Microsoft\Windows
Default=False
FileKey1=%LocalAppData%\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE
FileKey2=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Notifications\wpnidm|*.*|RECURSE
RegKey1=HKCU\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm
RegKey2=HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\PushNotifications\wpnidm

Link to comment
Share on other sites

I use a Google Chrome Extension called  Translate Selected Text

For example, I visited THIS web-page, selected text, and translated it:

x6kjafty3afz87rtn6bp_s.jpg

When selecting the Winapp2.ini entries: Extensions State* , History*, and Logs*,                                                                                                                                                                    the above Chrome Extension becomes neutralized (i.e. it becomes no longer available via the Right-Click).                     

The same happens when I select to clear the Google Chrome entry Session of CCleaner.

xr9yr3hk6e2k24xf4l4d4_s.jpg

 

 

 

Link to comment
Share on other sites

2 hours ago, 212eta said:

... When selecting the Winapp2.ini entries: Extensions State*, History*, and Logs*, the above Chrome Extension becomes neutralized (i.e. it becomes no longer available via the Right-Click). ...

Referring to the entry names you are using an old version of Winapp2.ini. Please update to the latest version.

Link to comment
Share on other sites

I updated to the latest version of winapp2.ini for CCleaner.

Logs*  and Session entries STILL exist

and the respective Chrome Extension becomes neutralized (i.e. it becomes no longer available via the Right-Click).

Link to comment
Share on other sites

  • Moderators
8 hours ago, 212eta said:

I updated to the latest version for CCleaner.

Logs*  and Session entries STILL exist

and the respective Chrome Extension becomes neutralized (i.e. it becomes no longer available via the Right-Click).

No he means the latest version of winapp2 which seems to have edited rules that fix the issue you have (caused by your old winapp2)

Edited by Nergal

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT  https://support.piriform.com/hc/en-us and  https://www.ccleaner.com/docs

Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new

link to WINAPP2.INI explanation

Link to comment
Share on other sites

  • Moderators

That's why I have exclusions in CCleaner as it pertains to SRWare Iron's extensions, extension settings, etc., i.e.; can't be broken inadvertently. Chrome/Chromium based browsers extensions easily break if cleaning the wrong thing, hence it's worthwhile having them excluded.

Link to comment
Share on other sites

10 hours ago, Nergal said:

No he means the latest version of winapp2 which seems to have edited rules that fix the issue you have (caused by your old winapp2)

I corrected my Post, HERE.

The last release of winapp2.ini STILL includes entries Logs*  and Session which BOTH damage the respective Chrome Extension.

Link to comment
Share on other sites

3 hours ago, 212eta said:

... The last release of winapp2.ini STILL includes entries Logs*  and Session which BOTH damage the respective Chrome Extension.

Thanks for the update. I tested the extension and the Winapp2.ini entries [Logs *] and [Internet History *], formerly [History *], do not damage it. We fixed the entry [Logs *] some time ago and it now only removes usual logfiles.

wa2_ext_tst_1.jpg.91d59d0de0c713400f3477a27d3305be.jpgwa2_ext_tst_2.jpg.727fa7653ec586c50b7dbe3857fa50f3.jpg

 

But I can confirm that the built-in entry of CCleaner [Google Chrome - Session] damages the extension. As a workaround, you can exclude the following folder in the CCleaner options:

C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Extension State\

Please report this bug under "CCleaner Bug Reporting": https://forum.piriform.com/forum/8-ccleaner-bug-reporting/. Thank you!

Link to comment
Share on other sites

Or you could switch to "One Click Translate" extension which is not affected by Sessions being cleaned by CCleaner

 

OneClickTranslate 2.png

OneClickTranslate.png

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

Revised Entry

Added:
cookies.sqlite-shm
cookies.sqlite-wal

[Cookies and HSTS Cookies *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
Warning=This will delete all cookies at once. Overrides the option "Cookies to Keep".
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|cookies.sqlite;cookies.sqlite-shm;cookies.sqlite-wal;SiteSecurityServiceState.txt
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|cookies.sqlite;cookies.sqlite-shm;cookies.sqlite-wal;SiteSecurityServiceState.txt
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|cookies.sqlite;cookies.sqlite-shm;cookies.sqlite-wal;SiteSecurityServiceState.txt
FileKey4=%AppData%\Waterfox\Profiles\*|cookies.sqlite;cookies.sqlite-shm;cookies.sqlite-wal;SiteSecurityServiceState.txt

Link to comment
Share on other sites

New Entries

[Alternate Services *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|AlternateServices.txt
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|AlternateServices.txt
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|AlternateServices.txt
FileKey4=%AppData%\Waterfox\Profiles\*|AlternateServices.txt

[Content Preferences *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|content-prefs.sqlite
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|content-prefs.sqlite
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|content-prefs.sqlite
FileKey4=%AppData%\Waterfox\Profiles\*|content-prefs.sqlite

[Permissions *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|permissions.sqlite
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|permissions.sqlite
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|permissions.sqlite
FileKey4=%AppData%\Waterfox\Profiles\*|permissions.sqlite

[Sessionstore Backups *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*\sessionstore-backups|*.*|RECURSE
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\sessionstore-backups|*.*|RECURSE
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*\sessionstore-backups|*.*|RECURSE
FileKey4=%AppData%\Waterfox\Profiles\*\sessionstore-backups|*.*|RECURSE

Link to comment
Share on other sites

13 hours ago, SMalik said:

... [Sessionstore Backups *] ...
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*\sessionstore-backups|*.*|RECURSE ...

Thanks for the entries. In my tests the built-in entry "Firefox - Session" already cleans this folder completely.

cc_ff_session.jpg.7697bd4171e6bf9e6da74aa20d1edc9e.jpg

Link to comment
Share on other sites

Modified entry:  [CyberLink PowerDVD *]

Added Detect5 & RegKey13/14/15 for newly released Cyberlink PowerDVD 19

[CyberLink PowerDVD *]
LangSecRef=3023
Detect1=HKCU\Software\CyberLink\PowerDVD15
Detect2=HKCU\Software\CyberLink\PowerDVD16
Detect3=HKCU\Software\CyberLink\PowerDVD17
Detect4=HKCU\Software\CyberLink\PowerDVD18
Detect5=HKCU\Software\CyberLink\PowerDVD19
Default=False
FileKey1=%CommonAppData%\Cyberlink\Evoparser|*.xml
FileKey2=%LocalAppData%\Cyberlink\DigitalHome|*.log|RECURSE
FileKey3=%LocalAppData%\Cyberlink\PowerDVD*|*.log|RECURSE
FileKey4=%LocalAppData%\Cyberlink\PowerDVD*\cache*|*.*|RECURSE
FileKey5=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser|*.*|RECURSE
RegKey1=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey2=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey3=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey4=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey5=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey6=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey7=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey8=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey9=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey10=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey11=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey12=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey13=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey14=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey15=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Thumbnail5

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

  • Moderators
On 4/13/2019 at 15:36, SMalik said:

[Permissions *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|permissions.sqlite
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|permissions.sqlite
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|permissions.sqlite
FileKey4=%AppData%\Waterfox\Profiles\*|permissions.sqlite

CCleaner's already built-in Site Preferences already cleans that exact file, at least in Firefox ESR Portable v60.6.1esr.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.