Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

New entry:  [Amazon Prime Video *]

[Amazon Prime Video *]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\AmazonVideo.PrimeVideo_pwbj9vvecjh7j
FileKey1=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\INet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Nvidia|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Temp|*.*
FileKey7=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\LocalState|*.log;*.tmp|RECURSE
FileKey8=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\TempState|*.*|RECURSE

Modified entry:  [Netflix *]

Added FileKey7

[Netflix *]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\4DF9E0F8.Netflix_mcm4njqhnhss8
FileKey1=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\BackgroundTransferApi|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\INet*|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\Internet Explorer\DOMStore\*|*.*|REMOVESELF
FileKey7=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Nvidia|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\PRICache|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Temp|*.*|RECURSE
FileKey10=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AppData\Indexed DB|*.log
FileKey11=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalCache|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalState|*.tmp
FileKey13=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalState\LiveTile|*.*|RECURSE
FileKey14=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\TempState|*.*|RECURSE
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\4DF9E0F8.Netflix_mcm4njqhnhss8\SearchHistory
ExcludeKey1=FILE|%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\Internet Explorer\DOMStore\*\|www.netflix[1].xml

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

1 hour ago, siliconman01 said:
FileKey5=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Nvidia|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Nvidia|*.*|RECURSE

"...\AC\Nvidia\..." is cleaned up in all app packages by the [NVIDIA *] entry. I assume the corresponding FileKeys can then be omitted in the two entries?

Link to comment
Share on other sites

30 minutes ago, APMichael said:

"...\AC\Nvidia\..." is cleaned up in all app packages by the [NVIDIA *] entry. I assume the corresponding FileKeys can then be omitted in the two entries?

Most definitely, thanks for the correction 🙃

Modified entry:   [Dell SupportAssist *]

Reworked to make more efficient.

[Dell SupportAssist *]
LangSecRef=3024
DetectFile=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_htrsf667h5kn2
FileKey1=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\AppCache|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Inet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Microsoft\CryptnetUrlCache|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Temp|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalCache\Local\Microsoft\CLR_v4.0_32\UsageLogs|*.log
FileKey7=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalCache\Local\Microsoft\Windows\Caches|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalState|*.txt
FileKey9=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\TempState|*.*|RECURSE

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Revised entry

Added *.jpg into FileKey9

[Mail and Calendar *]
DetectOS=10.0|
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe
FileKey1=%LocalAppData%\Comms\Unistore\data|AggregateCache.uca
FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INet*|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.*|RECURSE
FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\TokenBroker\Cache|*.*|RECURSE
FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalCache|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState|*.etl;*.jpg;*.log
FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\AppData\Local\Office\*\WebServiceCache|*.*|RECURSE
FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\Livecomm\*\dbStore\LogFiles|*.*
FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory

Link to comment
Share on other sites

Revised entry

Added: RegKey4 - RegKey12

[Internet Explorer *]
LangSecRef=3001
Detect=HKCU\Software\Microsoft\Internet Explorer
FileKey1=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE
FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*.log;*.txt|RECURSE
FileKey3=%LocalAppData%\Microsoft\Internet Explorer\CacheStorage|*.*|RECURSE
FileKey4=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE
FileKey5=%LocalAppData%\Microsoft\Windows\IECompat*Cache|*.*|RECURSE
FileKey6=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey7=%LocalAppData%\Microsoft\Windows\INetCookies|*.*|RECURSE
FileKey8=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE
FileKey9=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF
FileKey10=%LocalAppData%\Packages\windows_ie_ac_*\AC\AppCache|*.*|RECURSE
FileKey11=%LocalAppData%\Packages\windows_ie_ac_*\AC\IECompat*Cache|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\windows_ie_ac_*\AC\IEDownloadHistory|*.*|RECURSE
FileKey13=%LocalAppData%\Packages\windows_ie_ac_*\AC\INet*|*.*|RECURSE
FileKey14=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE
FileKey15=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\CryptnetUrlCache\*|*.*
FileKey16=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE
FileKey17=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\Internet Explorer\Emie*List|*.*|RECURSE
FileKey18=%LocalAppData%\Packages\windows_ie_ac_*\AC\PRICache|*.*|RECURSE
FileKey19=%LocalAppData%\Packages\windows_ie_ac_*\AC\Temp|*.*|RECURSE
FileKey20=%LocalAppData%\Packages\windows_ie_ac_*\LocalState\Cache|*.*|RECURSE
FileKey21=%LocalAppData%\Packages\windows_ie_ac_*\LocalState\navigationHistory|*.*|RECURSE
FileKey22=%LocalAppData%\Packages\windows_ie_ac_*\TempState|*.*|RECURSE
FileKey23=%SystemDrive%\Documents and Settings\LocalService*\Cookies|*.*|RECURSE
FileKey24=%SystemDrive%\Documents and Settings\LocalService*\Local Settings\History|*.*|RECURSE
FileKey25=%SystemDrive%\Documents and Settings\LocalService*\Local Settings\Temporary Internet Files|*.*|RECURSE
FileKey26=%SystemDrive%\Documents and Settings\NetworkService*\Cookies|*.*|RECURSE
FileKey27=%SystemDrive%\Documents and Settings\NetworkService*\Local Settings\History|*.*|RECURSE
FileKey28=%SystemDrive%\Documents and Settings\NetworkService*\Local Settings\Temporary Internet Files|*.*|RECURSE
FileKey29=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\History|*.*|RECURSE
FileKey30=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey31=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE
FileKey32=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History|*.*|RECURSE
FileKey33=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey34=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE
FileKey35=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache|*.*|RECURSE
FileKey36=%WinDir%\System32\config\systemprofile\Cookies|*.*|RECURSE
FileKey37=%WinDir%\System32\config\systemprofile\History|*.*|RECURSE
FileKey38=%WinDir%\System32\config\systemprofile\Local Settings\Temporary Internet Files|*.*|RECURSE
FileKey39=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History|*.*|RECURSE
FileKey40=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE
FileKey41=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE
FileKey42=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache|*.*|RECURSE
RegKey1=HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Explorer\DOMStorage
RegKey2=HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage
RegKey3=HKCU\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage
RegKey4=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
RegKey5=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation
RegKey6=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CrossDomain_Fix_KB867801
RegKey7=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION
RegKey8=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING
RegKey9=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN
RegKey10=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER
RegKey11=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER
RegKey12=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION
RegKey13=HKCU\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete
RegKey14=HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats
RegKey15=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU
RegKey16=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU
RegKey17=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\TypedURLs

Link to comment
Share on other sites

Modified entry:  [Quicken *]

Added FileKey12

[Quicken *]
LangSecRef=3021
Detect1=HKLM\Software\Intuit\Quicken
Detect2=HKLM\Software\Quicken
FileKey1=%AppData%\Intuit\Quicken\Log|*.txt;*.log
FileKey2=%AppData%\Quicken\Log|*.txt;*.log
FileKey3=%CommonAppData%\Intuit\Quicken\Log|*.log
FileKey4=%CommonAppData%\Intuit\Quicken\Log\installer|*.*|REMOVESELF
FileKey5=%CommonAppData%\Intuit\SendError|*.log
FileKey6=%CommonAppData%\Quicken\Inet\QWWebData|LOG.old|RECURSE
FileKey7=%CommonAppData%\Quicken\Inet\QWWebData\Cache|*.*
FileKey8=%CommonAppData%\Quicken\Inet\QWWebData\Local Storage\leveldb|*tmp
FileKey9=%CommonAppData%\Quicken\Log|*.log
FileKey10=%CommonAppData%\Quicken\Log\installer|*.*|REMOVESELF
FileKey11=%CommonAppData%\Quicken\SendError|*.log
FileKey12=%Documents%\Quicken\GPUCache|*.*
FileKey13=%LocalAppData%\Intuit\Common\Authorization\V1\Logs|*.txt
FileKey14=%LocalAppData%\Quicken\Common\Authorization\V1\Logs|*.txt
FileKey15=%ProgramFiles%\Quicken\PDFDrv|install.log;InstallPDFConverter.log

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

  • Moderators
21 hours ago, 212eta said:

Country Flags & IP Whois

https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo

After cleaning with CCleaner & Winapp2.ini the respective Extension, no longer works!

Depending upon what's being cleaned with some addons/extensions in browsers it's been necessary to input an exclusion into CCleaner of the extension and extension database/files - it's been that way since 2014. That details finding out exactly where the extension and extension database/files are saved on your system and then to exclude the folder and/or files.

Edit:

Chrome/Chromium based browsers usually involves excluding the whole "Local Extension Settings" folder to protect all addons/extensions.

Exclude example for Microsoft Edge Chromium:
C:\Users\YourUserProfileName\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings

Mozilla Firefox Portable ESR exclude example (could be extracted/installed anywhere):
C:\PortableApps\FirefoxPortableESR\Data\profile\browser-extension-data

SRWare Iron Portable exclude example (could be extracted/installed anywhere):
C:\PortableApps\IronPortable\Profile\Default\Local Extension Settings

Edited by Andavari
Link to comment
Share on other sites

-Excluding Microsoft Edge Extensions, via C:\Users\YourUserProfileName\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings, is the easy way.

-Finding which Winapp2.ini  entry is actually responsible for damaging the respective Extension  

Country Flags & IP Whois

https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo                                                                                                                                                       

and, in turn, correcting Winapp2.ini  is the hard way. 

Link to comment
Share on other sites

On 18/04/2022 at 13:52, 212eta said:

Country Flags & IP Whois

https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo

After cleaning with CCleaner & Winapp2.ini the respective Extension, no longer works!

A Winapp2.ini entry is not the cause, but the entry [Google Chrome - Internet Cache] built into CCleaner. As a workaround, you can exclude the following folder in CCleaner options:

C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\

Or these subfolders, then the cache is still partially cleaned:

C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\
C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\
Link to comment
Share on other sites

On 19/04/2022 at 15:44, APMichael said:

A Winapp2.ini entry is not the cause, but the entry [Google Chrome - Internet Cache] built into CCleaner

Maybe CCleaner needs to remove the [Google Chrome - Internet Cache] entry...

5 hours ago, APMichael said:

Simply replace "\Google\Chrome\" with "\Microsoft\Edge\" in the path.

Yeah, I know...

Link to comment
Share on other sites

Modified entry:  [Samsung Magician *]

Added FileKey1

[Samsung Magician *]
LangSecRef=3024
Detect=HKLM\Software\Samsung Magician
FileKey1=%AppData%\Samsung Magician\GPUCache|*.*|REMOVESELF
FileKey2=%AppData%\Samsung Magician\Local Storage\leveldb|*.old
FileKey3=%AppData%\Samsung Magician\Session Storage|*.old
FileKey4=%CommonAppData%\Samsung\Backup|*.exe
FileKey5=%CommonAppData%\Samsung\Samsung Magician|*.exe|RECURSE
FileKey6=%CommonAppData%\Samsung\Samsung Magician\PB|*.txt
FileKey7=%ProgramFiles%\Samsung Magician\Logs|*.*
FileKey8=%ProgramFiles%\Samsung\Samsung Magician\Log*|*.*
FileKey9=%SystemDrive%\MagicianPerf*|*.*|REMOVESELF
RegKey1=HKCU\Software\Local AppWizard-Generated Applications\SamsungMagician

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Modified entry: [Quicken *]

Added FileKey8; Modified FileKey13

[Quicken *]
LangSecRef=3021
Detect1=HKLM\Software\Intuit\Quicken
Detect2=HKLM\Software\Quicken
FileKey1=%AppData%\Intuit\Quicken\Log|*.txt;*.log
FileKey2=%AppData%\Quicken\Log|*.txt;*.log
FileKey3=%CommonAppData%\Intuit\Quicken\Log|*.log
FileKey4=%CommonAppData%\Intuit\Quicken\Log\installer|*.*|REMOVESELF
FileKey5=%CommonAppData%\Intuit\SendError|*.log
FileKey6=%CommonAppData%\Quicken\Inet\QWWebData|LOG.old|RECURSE
FileKey7=%CommonAppData%\Quicken\Inet\QWWebData\Cache|*.*
FileKey8=%CommonAppData%\Quicken\Inet\QWWebData\GPUCache|*.*|REMOVESELF
FileKey9=%CommonAppData%\Quicken\Inet\QWWebData\Local Storage\leveldb|*tmp
FileKey10=%CommonAppData%\Quicken\Log|*.log
FileKey11=%CommonAppData%\Quicken\Log\installer|*.*|REMOVESELF
FileKey12=%CommonAppData%\Quicken\SendError|*.log
FileKey13=%Documents%\Quicken\GPUCache|*.*|REMOVESELF
FileKey14=%LocalAppData%\Intuit\Common\Authorization\V1\Logs|*.txt
FileKey15=%LocalAppData%\Quicken\Common\Authorization\V1\Logs|*.txt
FileKey16=%ProgramFiles%\Quicken\PDFDrv|install.log;InstallPDFConverter.log

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Modified entry:  DVDFab *]

Added FileKey16

[DVDFab *]
LangSecRef=3023
Detect1=HKCU\Software\DVDFab
Detect2=HKCU\Software\DVDFab Passkey
Detect3=HKCU\Software\FabPlayer
FileKey1=%AppData%\DVDFab Player*\Advertis*|*.*|RECURSE
FileKey2=%AppData%\DVDFab\DVDFab*\SceneData|*.*|RECURSE
FileKey3=%AppData%\LiveUpdate|*.log
FileKey4=%AppData%\Microsoft\Windows\Templates\Videos\Temp|*.*|RECURSE
FileKey5=%Documents%\DVDFab*|*.log
FileKey6=%Documents%\DVDFab*\Log|*.*|RECURSE
FileKey7=%Documents%\DVDFab*\SceneData|*.*|RECURSE
FileKey8=%Documents%\DVDFab*\Temp|*.*|RECURSE
FileKey9=%Documents%\DVDFab\DVDFab*\Cinavia|*.*|RECURSE
FileKey10=%Documents%\DVDFab\DVDFab*\Log|*.*|RECURSE
FileKey11=%Documents%\DVDFab\DVDFab*\Temp|*.*|RECURSE
FileKey12=%Documents%\DVDFab\updateLog|*.*|REMOVESELF
FileKey13=%Documents%\LiveUpdate|*.*|REMOVESELF
FileKey14=%Documents%\PcSetup|*.*|RECURSE
FileKey15=%LocalAppData%\DVDFab*\cache\QtWebEngine\Default\Cache|*.*
FileKey16=%LocalAppData%\DVDFab*\QtWebEngine\Default\GPUCache|*.*|REMOVESELF
RegKey1=HKCU\Software\FabPlayer|DefaultDir
RegKey2=HKCU\Software\FabPlayer|DefaultFile

 

Modified entry:  [Snagit *]

Added FileKey8, FileKey9, FileKey10

[Snagit *]
LangSecRef=3021
Detect=HKCU\Software\TechSmith\Snagit
FileKey1=%CommonAppData%\TechSmith\Uploader|*.log
FileKey2=%Documents%|SnagitDebug.log
FileKey3=%Documents%\Snagit|*.snagx
FileKey4=%Documents%\Snagit\.metadata|*.*|RECURSE
FileKey5=%LocalAppData%\TechSmith\Logs|*.log
FileKey6=%LocalAppData%\TechSmith\Snagit|Tray.bin
FileKey7=%LocalAppData%\TechSmith\Snagit\*\NativeCrashReporting\Reports|*.dmp|RECURSE
FileKey8=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\Default\GPUCache|*.*|REMOVESELF
FileKey9=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\GrShaderCache\GPUCache|*.*|REMOVESELF
FileKey10=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\ShaderCache\GPUCache|*.*|REMOVESELF
FileKey11=%LocalAppData%\TechSmith\Snagit\CrashDumps|*.*|RECURSE
FileKey12=%LocalAppData%\TechSmith\Snagit\DataStore\AppIcons|*.ico
FileKey13=%LocalAppData%\TechSmith\Snagit\DataStore\WebSiteIcons|*.ico
FileKey14=%LocalAppData%\TechSmith\Snagit\Thumbnails|*.*|RECURSE
FileKey15=%LocalAppData%\TechSmith\Snagit\TrackerbirdFiles|*.log;*.logtmp
FileKey16=%Public%\TechSmith\Snagit\License|*.cache;*.log
RegKey1=HKCU\Software\TechSmith\Snagit\9|StampCustomFolder
RegKey2=HKCU\Software\TechSmith\Snagit\10|StampCustomFolder
RegKey3=HKCU\Software\TechSmith\Snagit\11|CaptureCount
RegKey4=HKCU\Software\TechSmith\Snagit\11|CaptureOpenCount
RegKey5=HKCU\Software\TechSmith\Snagit\11|OutputDirLastUsed
RegKey6=HKCU\Software\TechSmith\Snagit\11|VidOutputDirLastUsed
RegKey7=HKCU\Software\TechSmith\Snagit\11\SnagItEditor\Tray|Thumbnailsize
RegKey8=HKCU\Software\TechSmith\Snagit\12|CaptureCount
RegKey9=HKCU\Software\TechSmith\Snagit\12|CaptureOpenCount
RegKey10=HKCU\Software\TechSmith\Snagit\12|OutputDirLastUsed
RegKey11=HKCU\Software\TechSmith\Snagit\12|VidOutputDirLastUsed
RegKey12=HKCU\Software\TechSmith\Snagit\12\SnagItEditor\Tray|Thumbnailsize
RegKey13=HKCU\Software\TechSmith\Snagit\13|CaptureCount
RegKey14=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount
RegKey15=HKCU\Software\TechSmith\Snagit\13|OutputDirLastUsed
RegKey16=HKCU\Software\TechSmith\Snagit\13|VidOutputDirLastUsed
RegKey17=HKCU\Software\TechSmith\Snagit\13\Recent Captures
RegKey18=HKCU\Software\TechSmith\Snagit\13\SnagitEditor\Recent File List
RegKey19=HKCU\Software\TechSmith\Snagit\13\SnagItEditor\Tray|Thumbnailsize
RegKey20=HKCU\Software\TechSmith\Snagit\18|CaptureCount
RegKey21=HKCU\Software\TechSmith\Snagit\18|CaptureOpenCount
RegKey22=HKCU\Software\TechSmith\Snagit\18|OutputDirLastUsed
RegKey23=HKCU\Software\TechSmith\Snagit\18|VidOutputDirLastUsed
RegKey24=HKCU\Software\TechSmith\Snagit\18\Recent Captures
RegKey25=HKCU\Software\TechSmith\Snagit\18\SnagitEditor\Recent File List
RegKey26=HKCU\Software\TechSmith\Snagit\18\SnagItEditor\Tray|Thumbnailsize
RegKey27=HKCU\Software\TechSmith\Snagit\19|CaptureCount
RegKey28=HKCU\Software\TechSmith\Snagit\19|CaptureOpenCount
RegKey29=HKCU\Software\TechSmith\Snagit\19|OutputDirLastUsed
RegKey30=HKCU\Software\TechSmith\Snagit\19|VidOutputDirLastUsed
RegKey31=HKCU\Software\TechSmith\Snagit\19\Recent Captures
RegKey32=HKCU\Software\TechSmith\Snagit\19\SnagitEditor\Recent File List
RegKey33=HKCU\Software\TechSmith\Snagit\19\SnagItEditor\Tray|Thumbnailsize
RegKey34=HKCU\Software\TechSmith\Snagit\20|CaptureCount
RegKey35=HKCU\Software\TechSmith\Snagit\20|CaptureOpenCount
RegKey36=HKCU\Software\TechSmith\Snagit\20|OutputDirLastUsed
RegKey37=HKCU\Software\TechSmith\Snagit\20|VidOutputDirLastUsed
RegKey38=HKCU\Software\TechSmith\Snagit\20\Recent Captures
RegKey39=HKCU\Software\TechSmith\Snagit\20\SnagitEditor\Recent File List
RegKey40=HKCU\Software\TechSmith\Snagit\20\SnagItEditor\Tray|Thumbnailsize
RegKey41=HKCU\Software\TechSmith\Snagit\21|CaptureCount
RegKey42=HKCU\Software\TechSmith\Snagit\21|CaptureOpenCount
RegKey43=HKCU\Software\TechSmith\Snagit\21|OutputDirLastUsed
RegKey44=HKCU\Software\TechSmith\Snagit\21|VidOutputDirLastUsed
RegKey45=HKCU\Software\TechSmith\Snagit\21\Recent Captures
RegKey46=HKCU\Software\TechSmith\Snagit\21\SnagitEditor\Recent File List
RegKey47=HKCU\Software\TechSmith\Snagit\21\SnagItEditor\Tray|Thumbnailsize
RegKey48=HKCU\Software\TechSmith\Snagit\22|CaptureCount
RegKey49=HKCU\Software\TechSmith\Snagit\22|CaptureOpenCount
RegKey50=HKCU\Software\TechSmith\Snagit\22|OutputDirLastUsed
RegKey51=HKCU\Software\TechSmith\Snagit\22|VidOutputDirLastUsed
RegKey52=HKCU\Software\TechSmith\Snagit\22\Recent Captures
RegKey53=HKCU\Software\TechSmith\Snagit\22\SnagitEditor\Recent File List
RegKey54=HKCU\Software\TechSmith\Snagit\22\SnagItEditor\Tray|Thumbnailsize

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

6 hours ago, SMalik said:

Is there a code to delete only the registry values?

This deletes the entire registry key "Recent File List":

RegKey53=HKCU\Software\TechSmith\Snagit\22\SnagitEditor\Recent File List

This only deletes the registry value "Thumbnailsize" under the registry key "Tray":

RegKey54=HKCU\Software\TechSmith\Snagit\22\SnagItEditor\Tray|Thumbnailsize

However, if you meant the value (i.e. the data) of a registry value, then unfortunately, as far as I know, this is not possible. Also, wildcards (like "...\Tray|*") are unfortunately not supported.

Link to comment
Share on other sites

Modified entry:  [Windows Logs *]

Added FileKey18

[Windows Logs *]
LangSecRef=3025
Detect=HKLM\Software\Microsoft\Windows
FileKey1=%CommonAppData%\Microsoft\Diagnosis\DownloadedSettings|*.json.bk
FileKey2=%CommonAppData%\Microsoft\Diagnosis\ETLLogs|*.*|RECURSE
FileKey3=%CommonAppData%\Microsoft\DiagnosticLogCSP|*.*|RECURSE
FileKey4=%CommonAppData%\Microsoft\Network\Downloader|*.*|RECURSE
FileKey5=%CommonAppData%\Microsoft\WDF|*.*|RECURSE
FileKey6=%CommonAppData%\Microsoft\Windows Security Health\Logs|*.*|RECURSE
FileKey7=%CommonAppData%\Microsoft\Windows\wfp|*.etl
FileKey8=%CommonAppData%\USOShared\Logs|*.*|RECURSE
FileKey9=%LocalAppData%\ConnectedDevicesPlatform|*.log
FileKey10=%LocalAppData%\Diagnostics|*.*|RECURSE
FileKey11=%LocalAppData%\Microsoft\Dialer|*.log.txt
FileKey12=%LocalAppData%\Microsoft\msipc\Logs|*.*
FileKey13=%LocalAppData%\Microsoft\Windows\Explorer|*.etl
FileKey14=%ProgramFiles%\UNP\*Logs|*.*
FileKey15=%SystemDrive%|DumpStack.log
FileKey16=%SystemDrive%\PerfLogs\System\Diagnostics|*.*|RECURSE
FileKey17=%SystemDrive%\PerfLogs\System\Performance|*.*|RECURSE
FileKey18=%SystemDrive%\Temp|*.log|REMOVESELF
FileKey19=%WinDir%\AppCompat\Programs|*.txt;*.xml
FileKey20=%WinDir%\AppCompat\Programs\Install|*.txt;*.xml
FileKey21=%WinDir%\debug\WIA|*.log
FileKey22=%WinDir%\INF|*.etl;*.log*
FileKey23=%WinDir%\Logs\CBS|*.cab
FileKey24=%WinDir%\Panther|cbs.log;DDACLSys.log;miglog.xml;Migrep.html;PostGatherPnPList.log;PreGatherPnPList.log;*.tmp
FileKey25=%WinDir%\Panther\FastCleanup|*.log
FileKey26=%WinDir%\Panther\Rollback|*.txt
FileKey27=%WinDir%\Panther\UnattendGC|diagerr.xml;diagwrn.xml
FileKey28=%WinDir%\repair|setup.log
FileKey29=%WinDir%\security\logs|*.*|RECURSE
FileKey30=%WinDir%\ServiceProfiles\NetworkService\debug|*.log
FileKey31=%WinDir%\System32\CatRoot|*.tmp
FileKey32=%WinDir%\System32\CatRoot_bak|*.*|REMOVESELF
FileKey33=%WinDir%\System32\catroot2|*.chk;*.log;*.jrs;*.txt
FileKey34=%WinDir%\System32\LogFiles\HTTPERR|*.log
FileKey35=%WinDir%\System32\LogFiles\Scm|*.*|RECURSE
FileKey36=%WinDir%\System32\LogFiles\setupcln|*.*|RECURSE
FileKey37=%WinDir%\System32\LogFiles\Srt|*.*|RECURSE
FileKey38=%WinDir%\System32\LogFiles\WMI|*.*|RECURSE
FileKey39=%WinDir%\System32\LogFiles\WUDF|*.*
FileKey40=%WinDir%\System32\SleepStudy|*.etl
FileKey41=%WinDir%\System32\SleepStudy\ScreenOn|*.etl
FileKey42=%WinDir%\System32\sysprep\Panther\IE|diagerr.xml;diagwrn.xml;*.log
FileKey43=%WinDir%\System32\WDI\*|snapshot.etl|REMOVESELF
FileKey44=%WinDir%\System32\WDI\LogFiles\StartupInfo|*.*|RECURSE
RegKey1=HKLM\Software\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications
RegKey2=HKLM\Software\Microsoft\Tracing
RegKey3=HKLM\Software\Wow6432Node\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications
RegKey4=HKLM\Software\Wow6432Node\Microsoft\Tracing

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Thank you for the modified or revised entries.

Winapp2.ini update:
https://github.com/MoscaDotTo/Winapp2/commit/2857ba2c33ab3f6e9f8b98ac4de99453e2a8b541

Winapp3.ini update:
https://github.com/MoscaDotTo/Winapp2/commit/0270dc51b6ad0200f7b755473c62141b5c888db4
(An entry for "Internet Explorer Feature Control" already exists in Winapp3.ini.)

Link to comment
Share on other sites

Thanks for the extensive update.  😉

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

  • 2 weeks later...

Modified entry:  [Cyberlink PowerDVD *]

Added Detect9, RegKey26-30

[CyberLink PowerDVD *]
LangSecRef=3023
Detect1=HKCU\Software\CyberLink\PowerDVD14
Detect2=HKCU\Software\CyberLink\PowerDVD15
Detect3=HKCU\Software\CyberLink\PowerDVD16
Detect4=HKCU\Software\CyberLink\PowerDVD17
Detect5=HKCU\Software\CyberLink\PowerDVD18
Detect6=HKCU\Software\CyberLink\PowerDVD19
Detect7=HKCU\Software\CyberLink\PowerDVD20
Detect8=HKCU\Software\CyberLink\PowerDVD21
Detect9=HKCU\Software\CyberLink\PowerDVD22
FileKey1=%CommonAppData%\Cyberlink\Evoparser|*.xml
FileKey2=%CommonAppData%\SUPPORTDIR\*|*.log
FileKey3=%LocalAppData%\Cyberlink\DigitalHome|*.log|RECURSE
FileKey4=%LocalAppData%\Cyberlink\PowerDVD*|*.log|RECURSE
FileKey5=%LocalAppData%\Cyberlink\PowerDVD*\*\PowerDVDMainAP|*.*|RECURSE
FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\cache*|*.*|RECURSE
FileKey7=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser|*.*|RECURSE
FileKey8=%LocalAppData%\Cyberlink\PowerDVD*\DB*\computer|*.db|RECURSE
FileKey9=%LocalAppData%\Cyberlink\PowerDVD*\DefaultMember|*.*|RECURSE
RegKey1=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey2=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey3=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey4=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey5=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey6=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey7=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey8=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey9=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey10=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey11=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey12=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey13=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey14=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey15=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey16=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey17=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey18=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey19=HKCU\Software\CyberLink\PowerDVD20\CoarseSnapshot\MediaObj\MediaCache5\Data5
RegKey20=HKCU\Software\CyberLink\PowerDVD20\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo
RegKey21=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey22=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey23=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey24=HKCU\Software\CyberLink\PowerDVD21\CoarseSnapshot\MediaObj\MediaCache5\Data5
RegKey25=HKCU\Software\CyberLink\PowerDVD21\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo
RegKey26=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\Data5
RegKey27=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\ProgramInfo
RegKey28=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\Thumbnail5
RegKey29=HKCU\Software\CyberLink\PowerDVD22\CoarseSnapshot\MediaObj\MediaCache5\Data5
RegKey30=HKCU\Software\CyberLink\PowerDVD22\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

A small update for winapp2ool is available, there probably aren't any major changes to your normal workflow unless winapp2ool was crashing but there's some issued addressed that affect commandline usage (nothing for the end user has changed)

• Winapp2ool now waits until the commandline arguments have been processed before modifying the console window. this seems to address an uncommon and difficult to reproduce crash that can happen when calling winapp2ool in silent mode from a batch file. This has the secondary effect of preventing the winapp2ool console window from "jittering" to a wider size for seemingly "no reason" when silent mode is enabled

• Winapp2ool will no longer crash if you set a target output file through the commandline that points to a directory which doesn't exist. If the directory does not exist, it will now be created

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.