siliconman01 Posted April 9, 2022 Share Posted April 9, 2022 New entry: [Amazon Prime Video *] [Amazon Prime Video *] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\AmazonVideo.PrimeVideo_pwbj9vvecjh7j FileKey1=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\INet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey4=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey5=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Nvidia|*.*|RECURSE FileKey6=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Temp|*.* FileKey7=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\LocalState|*.log;*.tmp|RECURSE FileKey8=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\TempState|*.*|RECURSE Modified entry: [Netflix *] Added FileKey7 [Netflix *] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\4DF9E0F8.Netflix_mcm4njqhnhss8 FileKey1=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\BackgroundTransferApi|*.*|RECURSE FileKey3=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\INet*|*.*|RECURSE FileKey4=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey5=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey6=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\Internet Explorer\DOMStore\*|*.*|REMOVESELF FileKey7=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Nvidia|*.*|RECURSE FileKey8=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\PRICache|*.*|RECURSE FileKey9=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Temp|*.*|RECURSE FileKey10=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AppData\Indexed DB|*.log FileKey11=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalCache|*.*|RECURSE FileKey12=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalState|*.tmp FileKey13=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\LocalState\LiveTile|*.*|RECURSE FileKey14=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\TempState|*.*|RECURSE RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\4DF9E0F8.Netflix_mcm4njqhnhss8\SearchHistory ExcludeKey1=FILE|%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Microsoft\Internet Explorer\DOMStore\*\|www.netflix[1].xml Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
APMichael Posted April 9, 2022 Share Posted April 9, 2022 1 hour ago, siliconman01 said: FileKey5=%LocalAppData%\Packages\AmazonVideo.PrimeVideo_*\AC\Nvidia|*.*|RECURSE FileKey7=%LocalAppData%\Packages\4DF9E0F8.Netflix_*\AC\Nvidia|*.*|RECURSE "...\AC\Nvidia\..." is cleaned up in all app packages by the [NVIDIA *] entry. I assume the corresponding FileKeys can then be omitted in the two entries? Link to comment Share on other sites More sharing options...
siliconman01 Posted April 9, 2022 Share Posted April 9, 2022 30 minutes ago, APMichael said: "...\AC\Nvidia\..." is cleaned up in all app packages by the [NVIDIA *] entry. I assume the corresponding FileKeys can then be omitted in the two entries? Most definitely, thanks for the correction Modified entry: [Dell SupportAssist *] Reworked to make more efficient. [Dell SupportAssist *] LangSecRef=3024 DetectFile=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_htrsf667h5kn2 FileKey1=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Inet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Microsoft\CryptnetUrlCache|*.*|RECURSE FileKey4=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey5=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\AC\Temp|*.*|RECURSE FileKey6=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalCache\Local\Microsoft\CLR_v4.0_32\UsageLogs|*.log FileKey7=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalCache\Local\Microsoft\Windows\Caches|*.*|RECURSE FileKey8=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\LocalState|*.txt FileKey9=%LocalAppData%\Packages\DellInc.DellSupportAssistforPCs_*\TempState|*.*|RECURSE Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
APMichael Posted April 16, 2022 Share Posted April 16, 2022 Thanks for the suggestion and the new and modified entries. Winapp2.ini update:https://github.com/MoscaDotTo/Winapp2/commit/9f6247334d7e7d6748073eb35d96349c98599db9 Link to comment Share on other sites More sharing options...
SMalik Posted April 17, 2022 Share Posted April 17, 2022 Revised entry Added *.jpg into FileKey9 [Mail and Calendar *] DetectOS=10.0| LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe FileKey1=%LocalAppData%\Comms\Unistore\data|AggregateCache.uca FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INet*|*.*|RECURSE FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\*|*.*|RECURSE FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.*|RECURSE FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\TokenBroker\Cache|*.*|RECURSE FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalCache|*.*|RECURSE FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState|*.etl;*.jpg;*.log FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\AppData\Local\Office\*\WebServiceCache|*.*|RECURSE FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\Livecomm\*\dbStore\LogFiles|*.* FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory Link to comment Share on other sites More sharing options...
SMalik Posted April 17, 2022 Share Posted April 17, 2022 Revised entry Added: RegKey4 - RegKey12 [Internet Explorer *] LangSecRef=3001 Detect=HKCU\Software\Microsoft\Internet Explorer FileKey1=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*.log;*.txt|RECURSE FileKey3=%LocalAppData%\Microsoft\Internet Explorer\CacheStorage|*.*|RECURSE FileKey4=%LocalAppData%\Microsoft\Windows\AppCache|*.*|RECURSE FileKey5=%LocalAppData%\Microsoft\Windows\IECompat*Cache|*.*|RECURSE FileKey6=%LocalAppData%\Microsoft\Windows\INetCache|*.*|RECURSE FileKey7=%LocalAppData%\Microsoft\Windows\INetCookies|*.*|RECURSE FileKey8=%LocalAppData%\Microsoft\Windows\WebCache|*.*|RECURSE FileKey9=%LocalAppData%\Microsoft\Windows\WebCache.old|*.*|REMOVESELF FileKey10=%LocalAppData%\Packages\windows_ie_ac_*\AC\AppCache|*.*|RECURSE FileKey11=%LocalAppData%\Packages\windows_ie_ac_*\AC\IECompat*Cache|*.*|RECURSE FileKey12=%LocalAppData%\Packages\windows_ie_ac_*\AC\IEDownloadHistory|*.*|RECURSE FileKey13=%LocalAppData%\Packages\windows_ie_ac_*\AC\INet*|*.*|RECURSE FileKey14=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey15=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\CryptnetUrlCache\*|*.* FileKey16=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey17=%LocalAppData%\Packages\windows_ie_ac_*\AC\Microsoft\Internet Explorer\Emie*List|*.*|RECURSE FileKey18=%LocalAppData%\Packages\windows_ie_ac_*\AC\PRICache|*.*|RECURSE FileKey19=%LocalAppData%\Packages\windows_ie_ac_*\AC\Temp|*.*|RECURSE FileKey20=%LocalAppData%\Packages\windows_ie_ac_*\LocalState\Cache|*.*|RECURSE FileKey21=%LocalAppData%\Packages\windows_ie_ac_*\LocalState\navigationHistory|*.*|RECURSE FileKey22=%LocalAppData%\Packages\windows_ie_ac_*\TempState|*.*|RECURSE FileKey23=%SystemDrive%\Documents and Settings\LocalService*\Cookies|*.*|RECURSE FileKey24=%SystemDrive%\Documents and Settings\LocalService*\Local Settings\History|*.*|RECURSE FileKey25=%SystemDrive%\Documents and Settings\LocalService*\Local Settings\Temporary Internet Files|*.*|RECURSE FileKey26=%SystemDrive%\Documents and Settings\NetworkService*\Cookies|*.*|RECURSE FileKey27=%SystemDrive%\Documents and Settings\NetworkService*\Local Settings\History|*.*|RECURSE FileKey28=%SystemDrive%\Documents and Settings\NetworkService*\Local Settings\Temporary Internet Files|*.*|RECURSE FileKey29=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\History|*.*|RECURSE FileKey30=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey31=%WinDir%\ServiceProfiles\*\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE FileKey32=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History|*.*|RECURSE FileKey33=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey34=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE FileKey35=%WinDir%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache|*.*|RECURSE FileKey36=%WinDir%\System32\config\systemprofile\Cookies|*.*|RECURSE FileKey37=%WinDir%\System32\config\systemprofile\History|*.*|RECURSE FileKey38=%WinDir%\System32\config\systemprofile\Local Settings\Temporary Internet Files|*.*|RECURSE FileKey39=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History|*.*|RECURSE FileKey40=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache|*.*|RECURSE FileKey41=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies|*.*|RECURSE FileKey42=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache|*.*|RECURSE RegKey1=HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Explorer\DOMStorage RegKey2=HKCU\SOFTWARE\Microsoft\Internet Explorer\DOMStorage RegKey3=HKCU\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage RegKey4=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION RegKey5=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_Cross_Domain_Redirect_Mitigation RegKey6=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_CrossDomain_Fix_KB867801 RegKey7=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION RegKey8=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING RegKey9=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN RegKey10=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPER1_0SERVER RegKey11=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MAXCONNECTIONSPERSERVER RegKey12=HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION RegKey13=HKCU\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete RegKey14=HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats RegKey15=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU RegKey16=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU RegKey17=HKU\.DEFAULT\Software\Microsoft\Internet Explorer\TypedURLs Link to comment Share on other sites More sharing options...
siliconman01 Posted April 18, 2022 Share Posted April 18, 2022 Modified entry: [Quicken *] Added FileKey12 [Quicken *] LangSecRef=3021 Detect1=HKLM\Software\Intuit\Quicken Detect2=HKLM\Software\Quicken FileKey1=%AppData%\Intuit\Quicken\Log|*.txt;*.log FileKey2=%AppData%\Quicken\Log|*.txt;*.log FileKey3=%CommonAppData%\Intuit\Quicken\Log|*.log FileKey4=%CommonAppData%\Intuit\Quicken\Log\installer|*.*|REMOVESELF FileKey5=%CommonAppData%\Intuit\SendError|*.log FileKey6=%CommonAppData%\Quicken\Inet\QWWebData|LOG.old|RECURSE FileKey7=%CommonAppData%\Quicken\Inet\QWWebData\Cache|*.* FileKey8=%CommonAppData%\Quicken\Inet\QWWebData\Local Storage\leveldb|*tmp FileKey9=%CommonAppData%\Quicken\Log|*.log FileKey10=%CommonAppData%\Quicken\Log\installer|*.*|REMOVESELF FileKey11=%CommonAppData%\Quicken\SendError|*.log FileKey12=%Documents%\Quicken\GPUCache|*.* FileKey13=%LocalAppData%\Intuit\Common\Authorization\V1\Logs|*.txt FileKey14=%LocalAppData%\Quicken\Common\Authorization\V1\Logs|*.txt FileKey15=%ProgramFiles%\Quicken\PDFDrv|install.log;InstallPDFConverter.log Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
212eta Posted April 18, 2022 Share Posted April 18, 2022 Country Flags & IP Whois https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo After cleaning with CCleaner & Winapp2.ini the respective Extension, no longer works! Link to comment Share on other sites More sharing options...
Moderators Andavari Posted April 19, 2022 Moderators Share Posted April 19, 2022 (edited) 21 hours ago, 212eta said: Country Flags & IP Whois https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo After cleaning with CCleaner & Winapp2.ini the respective Extension, no longer works! Depending upon what's being cleaned with some addons/extensions in browsers it's been necessary to input an exclusion into CCleaner of the extension and extension database/files - it's been that way since 2014. That details finding out exactly where the extension and extension database/files are saved on your system and then to exclude the folder and/or files. Edit: Chrome/Chromium based browsers usually involves excluding the whole "Local Extension Settings" folder to protect all addons/extensions. Exclude example for Microsoft Edge Chromium: C:\Users\YourUserProfileName\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings Mozilla Firefox Portable ESR exclude example (could be extracted/installed anywhere): C:\PortableApps\FirefoxPortableESR\Data\profile\browser-extension-data SRWare Iron Portable exclude example (could be extracted/installed anywhere): C:\PortableApps\IronPortable\Profile\Default\Local Extension Settings Edited April 19, 2022 by Andavari Link to comment Share on other sites More sharing options...
212eta Posted April 19, 2022 Share Posted April 19, 2022 -Excluding Microsoft Edge Extensions, via C:\Users\YourUserProfileName\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings, is the easy way. -Finding which Winapp2.ini entry is actually responsible for damaging the respective Extension Country Flags & IP Whois https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo and, in turn, correcting Winapp2.ini is the hard way. Link to comment Share on other sites More sharing options...
APMichael Posted April 19, 2022 Share Posted April 19, 2022 On 18/04/2022 at 13:52, 212eta said: Country Flags & IP Whois https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo After cleaning with CCleaner & Winapp2.ini the respective Extension, no longer works! A Winapp2.ini entry is not the cause, but the entry [Google Chrome - Internet Cache] built into CCleaner. As a workaround, you can exclude the following folder in CCleaner options: C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ Or these subfolders, then the cache is still partially cleaned: C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\ C:\Users\<your username>\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\ Link to comment Share on other sites More sharing options...
212eta Posted April 19, 2022 Share Posted April 19, 2022 BTW, I do Not use Google Chrome. I use Country Flags & IP Whois https://chrome.google.com/webstore/detail/country-flags-ip-whois/bffjckjhidlcnenenacdahhpbacpgapo on Microsoft Edge. Link to comment Share on other sites More sharing options...
Winapp2.ini Posted April 19, 2022 Author Share Posted April 19, 2022 winapp2ool builds are signed again, you may need to redownload from github. you may also need to manually unblock from smartscreen if you have it enabled winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
APMichael Posted April 20, 2022 Share Posted April 20, 2022 16 hours ago, 212eta said: BTW, I do Not use Google Chrome. I use Country Flags & IP Whois on Microsoft Edge. Ok, then simply replace "\Google\Chrome\" with "\Microsoft\Edge\" in the path. Link to comment Share on other sites More sharing options...
212eta Posted April 20, 2022 Share Posted April 20, 2022 On 19/04/2022 at 15:44, APMichael said: A Winapp2.ini entry is not the cause, but the entry [Google Chrome - Internet Cache] built into CCleaner Maybe CCleaner needs to remove the [Google Chrome - Internet Cache] entry... 5 hours ago, APMichael said: Simply replace "\Google\Chrome\" with "\Microsoft\Edge\" in the path. Yeah, I know... Link to comment Share on other sites More sharing options...
siliconman01 Posted April 21, 2022 Share Posted April 21, 2022 Modified entry: [Samsung Magician *] Added FileKey1 [Samsung Magician *] LangSecRef=3024 Detect=HKLM\Software\Samsung Magician FileKey1=%AppData%\Samsung Magician\GPUCache|*.*|REMOVESELF FileKey2=%AppData%\Samsung Magician\Local Storage\leveldb|*.old FileKey3=%AppData%\Samsung Magician\Session Storage|*.old FileKey4=%CommonAppData%\Samsung\Backup|*.exe FileKey5=%CommonAppData%\Samsung\Samsung Magician|*.exe|RECURSE FileKey6=%CommonAppData%\Samsung\Samsung Magician\PB|*.txt FileKey7=%ProgramFiles%\Samsung Magician\Logs|*.* FileKey8=%ProgramFiles%\Samsung\Samsung Magician\Log*|*.* FileKey9=%SystemDrive%\MagicianPerf*|*.*|REMOVESELF RegKey1=HKCU\Software\Local AppWizard-Generated Applications\SamsungMagician Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
siliconman01 Posted April 21, 2022 Share Posted April 21, 2022 Modified entry: [Quicken *] Added FileKey8; Modified FileKey13 [Quicken *] LangSecRef=3021 Detect1=HKLM\Software\Intuit\Quicken Detect2=HKLM\Software\Quicken FileKey1=%AppData%\Intuit\Quicken\Log|*.txt;*.log FileKey2=%AppData%\Quicken\Log|*.txt;*.log FileKey3=%CommonAppData%\Intuit\Quicken\Log|*.log FileKey4=%CommonAppData%\Intuit\Quicken\Log\installer|*.*|REMOVESELF FileKey5=%CommonAppData%\Intuit\SendError|*.log FileKey6=%CommonAppData%\Quicken\Inet\QWWebData|LOG.old|RECURSE FileKey7=%CommonAppData%\Quicken\Inet\QWWebData\Cache|*.* FileKey8=%CommonAppData%\Quicken\Inet\QWWebData\GPUCache|*.*|REMOVESELF FileKey9=%CommonAppData%\Quicken\Inet\QWWebData\Local Storage\leveldb|*tmp FileKey10=%CommonAppData%\Quicken\Log|*.log FileKey11=%CommonAppData%\Quicken\Log\installer|*.*|REMOVESELF FileKey12=%CommonAppData%\Quicken\SendError|*.log FileKey13=%Documents%\Quicken\GPUCache|*.*|REMOVESELF FileKey14=%LocalAppData%\Intuit\Common\Authorization\V1\Logs|*.txt FileKey15=%LocalAppData%\Quicken\Common\Authorization\V1\Logs|*.txt FileKey16=%ProgramFiles%\Quicken\PDFDrv|install.log;InstallPDFConverter.log Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
siliconman01 Posted April 21, 2022 Share Posted April 21, 2022 Modified entry: DVDFab *] Added FileKey16 [DVDFab *] LangSecRef=3023 Detect1=HKCU\Software\DVDFab Detect2=HKCU\Software\DVDFab Passkey Detect3=HKCU\Software\FabPlayer FileKey1=%AppData%\DVDFab Player*\Advertis*|*.*|RECURSE FileKey2=%AppData%\DVDFab\DVDFab*\SceneData|*.*|RECURSE FileKey3=%AppData%\LiveUpdate|*.log FileKey4=%AppData%\Microsoft\Windows\Templates\Videos\Temp|*.*|RECURSE FileKey5=%Documents%\DVDFab*|*.log FileKey6=%Documents%\DVDFab*\Log|*.*|RECURSE FileKey7=%Documents%\DVDFab*\SceneData|*.*|RECURSE FileKey8=%Documents%\DVDFab*\Temp|*.*|RECURSE FileKey9=%Documents%\DVDFab\DVDFab*\Cinavia|*.*|RECURSE FileKey10=%Documents%\DVDFab\DVDFab*\Log|*.*|RECURSE FileKey11=%Documents%\DVDFab\DVDFab*\Temp|*.*|RECURSE FileKey12=%Documents%\DVDFab\updateLog|*.*|REMOVESELF FileKey13=%Documents%\LiveUpdate|*.*|REMOVESELF FileKey14=%Documents%\PcSetup|*.*|RECURSE FileKey15=%LocalAppData%\DVDFab*\cache\QtWebEngine\Default\Cache|*.* FileKey16=%LocalAppData%\DVDFab*\QtWebEngine\Default\GPUCache|*.*|REMOVESELF RegKey1=HKCU\Software\FabPlayer|DefaultDir RegKey2=HKCU\Software\FabPlayer|DefaultFile Modified entry: [Snagit *] Added FileKey8, FileKey9, FileKey10 [Snagit *] LangSecRef=3021 Detect=HKCU\Software\TechSmith\Snagit FileKey1=%CommonAppData%\TechSmith\Uploader|*.log FileKey2=%Documents%|SnagitDebug.log FileKey3=%Documents%\Snagit|*.snagx FileKey4=%Documents%\Snagit\.metadata|*.*|RECURSE FileKey5=%LocalAppData%\TechSmith\Logs|*.log FileKey6=%LocalAppData%\TechSmith\Snagit|Tray.bin FileKey7=%LocalAppData%\TechSmith\Snagit\*\NativeCrashReporting\Reports|*.dmp|RECURSE FileKey8=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\Default\GPUCache|*.*|REMOVESELF FileKey9=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\GrShaderCache\GPUCache|*.*|REMOVESELF FileKey10=%LocalAppData%\TechSmith\Snagit\*\WebView2Cache\EBWebView\ShaderCache\GPUCache|*.*|REMOVESELF FileKey11=%LocalAppData%\TechSmith\Snagit\CrashDumps|*.*|RECURSE FileKey12=%LocalAppData%\TechSmith\Snagit\DataStore\AppIcons|*.ico FileKey13=%LocalAppData%\TechSmith\Snagit\DataStore\WebSiteIcons|*.ico FileKey14=%LocalAppData%\TechSmith\Snagit\Thumbnails|*.*|RECURSE FileKey15=%LocalAppData%\TechSmith\Snagit\TrackerbirdFiles|*.log;*.logtmp FileKey16=%Public%\TechSmith\Snagit\License|*.cache;*.log RegKey1=HKCU\Software\TechSmith\Snagit\9|StampCustomFolder RegKey2=HKCU\Software\TechSmith\Snagit\10|StampCustomFolder RegKey3=HKCU\Software\TechSmith\Snagit\11|CaptureCount RegKey4=HKCU\Software\TechSmith\Snagit\11|CaptureOpenCount RegKey5=HKCU\Software\TechSmith\Snagit\11|OutputDirLastUsed RegKey6=HKCU\Software\TechSmith\Snagit\11|VidOutputDirLastUsed RegKey7=HKCU\Software\TechSmith\Snagit\11\SnagItEditor\Tray|Thumbnailsize RegKey8=HKCU\Software\TechSmith\Snagit\12|CaptureCount RegKey9=HKCU\Software\TechSmith\Snagit\12|CaptureOpenCount RegKey10=HKCU\Software\TechSmith\Snagit\12|OutputDirLastUsed RegKey11=HKCU\Software\TechSmith\Snagit\12|VidOutputDirLastUsed RegKey12=HKCU\Software\TechSmith\Snagit\12\SnagItEditor\Tray|Thumbnailsize RegKey13=HKCU\Software\TechSmith\Snagit\13|CaptureCount RegKey14=HKCU\Software\TechSmith\Snagit\13|CaptureOpenCount RegKey15=HKCU\Software\TechSmith\Snagit\13|OutputDirLastUsed RegKey16=HKCU\Software\TechSmith\Snagit\13|VidOutputDirLastUsed RegKey17=HKCU\Software\TechSmith\Snagit\13\Recent Captures RegKey18=HKCU\Software\TechSmith\Snagit\13\SnagitEditor\Recent File List RegKey19=HKCU\Software\TechSmith\Snagit\13\SnagItEditor\Tray|Thumbnailsize RegKey20=HKCU\Software\TechSmith\Snagit\18|CaptureCount RegKey21=HKCU\Software\TechSmith\Snagit\18|CaptureOpenCount RegKey22=HKCU\Software\TechSmith\Snagit\18|OutputDirLastUsed RegKey23=HKCU\Software\TechSmith\Snagit\18|VidOutputDirLastUsed RegKey24=HKCU\Software\TechSmith\Snagit\18\Recent Captures RegKey25=HKCU\Software\TechSmith\Snagit\18\SnagitEditor\Recent File List RegKey26=HKCU\Software\TechSmith\Snagit\18\SnagItEditor\Tray|Thumbnailsize RegKey27=HKCU\Software\TechSmith\Snagit\19|CaptureCount RegKey28=HKCU\Software\TechSmith\Snagit\19|CaptureOpenCount RegKey29=HKCU\Software\TechSmith\Snagit\19|OutputDirLastUsed RegKey30=HKCU\Software\TechSmith\Snagit\19|VidOutputDirLastUsed RegKey31=HKCU\Software\TechSmith\Snagit\19\Recent Captures RegKey32=HKCU\Software\TechSmith\Snagit\19\SnagitEditor\Recent File List RegKey33=HKCU\Software\TechSmith\Snagit\19\SnagItEditor\Tray|Thumbnailsize RegKey34=HKCU\Software\TechSmith\Snagit\20|CaptureCount RegKey35=HKCU\Software\TechSmith\Snagit\20|CaptureOpenCount RegKey36=HKCU\Software\TechSmith\Snagit\20|OutputDirLastUsed RegKey37=HKCU\Software\TechSmith\Snagit\20|VidOutputDirLastUsed RegKey38=HKCU\Software\TechSmith\Snagit\20\Recent Captures RegKey39=HKCU\Software\TechSmith\Snagit\20\SnagitEditor\Recent File List RegKey40=HKCU\Software\TechSmith\Snagit\20\SnagItEditor\Tray|Thumbnailsize RegKey41=HKCU\Software\TechSmith\Snagit\21|CaptureCount RegKey42=HKCU\Software\TechSmith\Snagit\21|CaptureOpenCount RegKey43=HKCU\Software\TechSmith\Snagit\21|OutputDirLastUsed RegKey44=HKCU\Software\TechSmith\Snagit\21|VidOutputDirLastUsed RegKey45=HKCU\Software\TechSmith\Snagit\21\Recent Captures RegKey46=HKCU\Software\TechSmith\Snagit\21\SnagitEditor\Recent File List RegKey47=HKCU\Software\TechSmith\Snagit\21\SnagItEditor\Tray|Thumbnailsize RegKey48=HKCU\Software\TechSmith\Snagit\22|CaptureCount RegKey49=HKCU\Software\TechSmith\Snagit\22|CaptureOpenCount RegKey50=HKCU\Software\TechSmith\Snagit\22|OutputDirLastUsed RegKey51=HKCU\Software\TechSmith\Snagit\22|VidOutputDirLastUsed RegKey52=HKCU\Software\TechSmith\Snagit\22\Recent Captures RegKey53=HKCU\Software\TechSmith\Snagit\22\SnagitEditor\Recent File List RegKey54=HKCU\Software\TechSmith\Snagit\22\SnagItEditor\Tray|Thumbnailsize Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
SMalik Posted April 22, 2022 Share Posted April 22, 2022 Is there a code to delete only the registry values? Link to comment Share on other sites More sharing options...
APMichael Posted April 22, 2022 Share Posted April 22, 2022 6 hours ago, SMalik said: Is there a code to delete only the registry values? This deletes the entire registry key "Recent File List": RegKey53=HKCU\Software\TechSmith\Snagit\22\SnagitEditor\Recent File List This only deletes the registry value "Thumbnailsize" under the registry key "Tray": RegKey54=HKCU\Software\TechSmith\Snagit\22\SnagItEditor\Tray|Thumbnailsize However, if you meant the value (i.e. the data) of a registry value, then unfortunately, as far as I know, this is not possible. Also, wildcards (like "...\Tray|*") are unfortunately not supported. Link to comment Share on other sites More sharing options...
siliconman01 Posted April 30, 2022 Share Posted April 30, 2022 Modified entry: [Windows Logs *] Added FileKey18 [Windows Logs *] LangSecRef=3025 Detect=HKLM\Software\Microsoft\Windows FileKey1=%CommonAppData%\Microsoft\Diagnosis\DownloadedSettings|*.json.bk FileKey2=%CommonAppData%\Microsoft\Diagnosis\ETLLogs|*.*|RECURSE FileKey3=%CommonAppData%\Microsoft\DiagnosticLogCSP|*.*|RECURSE FileKey4=%CommonAppData%\Microsoft\Network\Downloader|*.*|RECURSE FileKey5=%CommonAppData%\Microsoft\WDF|*.*|RECURSE FileKey6=%CommonAppData%\Microsoft\Windows Security Health\Logs|*.*|RECURSE FileKey7=%CommonAppData%\Microsoft\Windows\wfp|*.etl FileKey8=%CommonAppData%\USOShared\Logs|*.*|RECURSE FileKey9=%LocalAppData%\ConnectedDevicesPlatform|*.log FileKey10=%LocalAppData%\Diagnostics|*.*|RECURSE FileKey11=%LocalAppData%\Microsoft\Dialer|*.log.txt FileKey12=%LocalAppData%\Microsoft\msipc\Logs|*.* FileKey13=%LocalAppData%\Microsoft\Windows\Explorer|*.etl FileKey14=%ProgramFiles%\UNP\*Logs|*.* FileKey15=%SystemDrive%|DumpStack.log FileKey16=%SystemDrive%\PerfLogs\System\Diagnostics|*.*|RECURSE FileKey17=%SystemDrive%\PerfLogs\System\Performance|*.*|RECURSE FileKey18=%SystemDrive%\Temp|*.log|REMOVESELF FileKey19=%WinDir%\AppCompat\Programs|*.txt;*.xml FileKey20=%WinDir%\AppCompat\Programs\Install|*.txt;*.xml FileKey21=%WinDir%\debug\WIA|*.log FileKey22=%WinDir%\INF|*.etl;*.log* FileKey23=%WinDir%\Logs\CBS|*.cab FileKey24=%WinDir%\Panther|cbs.log;DDACLSys.log;miglog.xml;Migrep.html;PostGatherPnPList.log;PreGatherPnPList.log;*.tmp FileKey25=%WinDir%\Panther\FastCleanup|*.log FileKey26=%WinDir%\Panther\Rollback|*.txt FileKey27=%WinDir%\Panther\UnattendGC|diagerr.xml;diagwrn.xml FileKey28=%WinDir%\repair|setup.log FileKey29=%WinDir%\security\logs|*.*|RECURSE FileKey30=%WinDir%\ServiceProfiles\NetworkService\debug|*.log FileKey31=%WinDir%\System32\CatRoot|*.tmp FileKey32=%WinDir%\System32\CatRoot_bak|*.*|REMOVESELF FileKey33=%WinDir%\System32\catroot2|*.chk;*.log;*.jrs;*.txt FileKey34=%WinDir%\System32\LogFiles\HTTPERR|*.log FileKey35=%WinDir%\System32\LogFiles\Scm|*.*|RECURSE FileKey36=%WinDir%\System32\LogFiles\setupcln|*.*|RECURSE FileKey37=%WinDir%\System32\LogFiles\Srt|*.*|RECURSE FileKey38=%WinDir%\System32\LogFiles\WMI|*.*|RECURSE FileKey39=%WinDir%\System32\LogFiles\WUDF|*.* FileKey40=%WinDir%\System32\SleepStudy|*.etl FileKey41=%WinDir%\System32\SleepStudy\ScreenOn|*.etl FileKey42=%WinDir%\System32\sysprep\Panther\IE|diagerr.xml;diagwrn.xml;*.log FileKey43=%WinDir%\System32\WDI\*|snapshot.etl|REMOVESELF FileKey44=%WinDir%\System32\WDI\LogFiles\StartupInfo|*.*|RECURSE RegKey1=HKLM\Software\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications RegKey2=HKLM\Software\Microsoft\Tracing RegKey3=HKLM\Software\Wow6432Node\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications RegKey4=HKLM\Software\Wow6432Node\Microsoft\Tracing Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
APMichael Posted May 2, 2022 Share Posted May 2, 2022 Thank you for the modified or revised entries. Winapp2.ini update:https://github.com/MoscaDotTo/Winapp2/commit/2857ba2c33ab3f6e9f8b98ac4de99453e2a8b541 Winapp3.ini update:https://github.com/MoscaDotTo/Winapp2/commit/0270dc51b6ad0200f7b755473c62141b5c888db4 (An entry for "Internet Explorer Feature Control" already exists in Winapp3.ini.) Link to comment Share on other sites More sharing options...
siliconman01 Posted May 2, 2022 Share Posted May 2, 2022 Thanks for the extensive update. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
siliconman01 Posted May 12, 2022 Share Posted May 12, 2022 Modified entry: [Cyberlink PowerDVD *] Added Detect9, RegKey26-30 [CyberLink PowerDVD *] LangSecRef=3023 Detect1=HKCU\Software\CyberLink\PowerDVD14 Detect2=HKCU\Software\CyberLink\PowerDVD15 Detect3=HKCU\Software\CyberLink\PowerDVD16 Detect4=HKCU\Software\CyberLink\PowerDVD17 Detect5=HKCU\Software\CyberLink\PowerDVD18 Detect6=HKCU\Software\CyberLink\PowerDVD19 Detect7=HKCU\Software\CyberLink\PowerDVD20 Detect8=HKCU\Software\CyberLink\PowerDVD21 Detect9=HKCU\Software\CyberLink\PowerDVD22 FileKey1=%CommonAppData%\Cyberlink\Evoparser|*.xml FileKey2=%CommonAppData%\SUPPORTDIR\*|*.log FileKey3=%LocalAppData%\Cyberlink\DigitalHome|*.log|RECURSE FileKey4=%LocalAppData%\Cyberlink\PowerDVD*|*.log|RECURSE FileKey5=%LocalAppData%\Cyberlink\PowerDVD*\*\PowerDVDMainAP|*.*|RECURSE FileKey6=%LocalAppData%\Cyberlink\PowerDVD*\cache*|*.*|RECURSE FileKey7=%LocalAppData%\Cyberlink\PowerDVD*\CL_DMP_Browser|*.*|RECURSE FileKey8=%LocalAppData%\Cyberlink\PowerDVD*\DB*\computer|*.db|RECURSE FileKey9=%LocalAppData%\Cyberlink\PowerDVD*\DefaultMember|*.*|RECURSE RegKey1=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey2=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey3=HKCU\Software\CyberLink\PowerDVD15\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey4=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey5=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey6=HKCU\Software\CyberLink\PowerDVD16\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey7=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey8=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey9=HKCU\Software\CyberLink\PowerDVD17\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey10=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey11=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey12=HKCU\Software\CyberLink\PowerDVD18\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey13=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey14=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey15=HKCU\Software\CyberLink\PowerDVD19\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey16=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey17=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey18=HKCU\Software\CyberLink\PowerDVD20\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey19=HKCU\Software\CyberLink\PowerDVD20\CoarseSnapshot\MediaObj\MediaCache5\Data5 RegKey20=HKCU\Software\CyberLink\PowerDVD20\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo RegKey21=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey22=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey23=HKCU\Software\CyberLink\PowerDVD21\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey24=HKCU\Software\CyberLink\PowerDVD21\CoarseSnapshot\MediaObj\MediaCache5\Data5 RegKey25=HKCU\Software\CyberLink\PowerDVD21\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo RegKey26=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\Data5 RegKey27=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\ProgramInfo RegKey28=HKCU\Software\CyberLink\PowerDVD22\CLMPSvc\MediaObj\MediaCache5\Thumbnail5 RegKey29=HKCU\Software\CyberLink\PowerDVD22\CoarseSnapshot\MediaObj\MediaCache5\Data5 RegKey30=HKCU\Software\CyberLink\PowerDVD22\CoarseSnapshot\MediaObj\MediaCache5\ProgramInfo Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Bitdefender Internet Security 2022, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD22, MSI AfterBurner, Rainmeter, Windows Sidebar, and many more. Link to comment Share on other sites More sharing options...
Winapp2.ini Posted May 12, 2022 Author Share Posted May 12, 2022 A small update for winapp2ool is available, there probably aren't any major changes to your normal workflow unless winapp2ool was crashing but there's some issued addressed that affect commandline usage (nothing for the end user has changed) • Winapp2ool now waits until the commandline arguments have been processed before modifying the console window. this seems to address an uncommon and difficult to reproduce crash that can happen when calling winapp2ool in silent mode from a batch file. This has the secondary effect of preventing the winapp2ool console window from "jittering" to a wider size for seemingly "no reason" when silent mode is enabled • Winapp2ool will no longer crash if you set a target output file through the commandline that points to a directory which doesn't exist. If the directory does not exist, it will now be created winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now