Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

Try this.

http://www.mydigital...-google-chrome/

 

I was wondering if you also have Firefox installed on the system. Firefox has a feature called 'caret browsing'. The main reason that Firefox has this feature is that you can select text with your keyboard. This feature could cause the curser blink.

 

You can disable this feature. Type in "about:config" in the address bar and then type in "caret" in the filter box and simply double click to change the option from "true" to "false".

 

Of course i have firefox, its my main browser. Just in case this is the cause, ill disable that feature. Don't use it anyway. Which one do i set to false??

post-24841-0-86417300-1325889216_thumb.jpg

Link to comment
Share on other sites

  • Moderators

Caret browsing now disabled. ^_^

lets us know if that fixed the issue

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT  https://support.piriform.com/hc/en-us and  https://www.ccleaner.com/docs

Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new

link to WINAPP2.INI explanation

Link to comment
Share on other sites

Added FileKey32 and FileKey33

 

[TuneUp Utilities 2011/2012 Reg Defrag Cleanup*]
LangSecRef=3024
Detect=HKCU\Software\TuneUp\Utilities\10.0
Detect2=HKCU\Software\TuneUp\Utilities\12.0
Default=False
FileKey1=%WinDir%\System32\config|SECURITY_tureg_old
FileKey2=%WinDir%\System32\config|SOFTWARE_tureg_old
FileKey3=%WinDir%\System32\config|SYSTEM_tureg_old
FileKey4=%WinDir%\System32\config|DEFAULT_tureg_new.LOG1
FileKey5=%WinDir%\System32\config|DEFAULT_tureg_new.LOG2
FileKey6=%WinDir%\System32\config|SAM_tureg_new.LOG1
FileKey7=%WinDir%\System32\config|SAM_tureg_new.LOG2
FileKey8=%WinDir%\System32\config|SECURITY_tureg_new.LOG1
FileKey9=%WinDir%\System32\config|SECURITY_tureg_new.LOG2
FileKey10=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG1
FileKey11=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG2
FileKey12=%WinDir%\System32\config|SYSTEM_tureg_new.LOG1
FileKey13=%WinDir%\System32\config|SYSTEM_tureg_new.LOG2
FileKey14=%WinDir%\System32\config|DEFAULT_tureg_old
FileKey15=%WinDir%\System32\config|SAM_tureg_old
FileKey16=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_old
FileKey17=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG1
FileKey18=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG2
FileKey19=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_old
FileKey20=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG1
FileKey21=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG2
Filekey22=%WinDir%\System32\config|COMPONENTS_tureg_old
Filekey23=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG1
Filekey24=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG2
FileKey25=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_old
FileKey26=%UserProfile%|NTUSER.DAT_tureg_new.LOG1
FileKey27=%UserProfile%|NTUSER.DAT_tureg_new.LOG2
FileKey28=%UserProfile%|NTUSER.DAT_tureg_old
FileKey29=%SystemDrive%\Boot\|BCD_tureg_new.LOG1
FileKey30=%SystemDrive%\Boot\|BCD_tureg_new.LOG2
FileKey31=%SystemDrive%\Boot\|BCD_tureg_old
FileKey32=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_new.LOG1
FileKey33=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_new.LOG2

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2019 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD20, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

Added FileKey32 and FileKey33

Btw. I guess you could shorten this (and other) entries by using wildcards in the end (*-mark).

In example:

FileKey32=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_new.LOG*

FileKey1=%WinDir%\System32\config|SECURITY_tureg_old
FileKey2=%WinDir%\System32\config|SOFTWARE_tureg_old
FileKey3=%WinDir%\System32\config|SYSTEM_tureg_old
FileKey4=%WinDir%\System32\config|DEFAULT_tureg_new.LOG*
FileKey5=%WinDir%\System32\config|SAM_tureg_new.LOG*
FileKey6=%WinDir%\System32\config|SECURITY_tureg_new.LOG*
FileKey7=%WinDir%\System32\config|SOFTWARE_tureg_new.LOG*
FileKey8=%WinDir%\System32\config|SYSTEM_tureg_new.LOG*
FileKey9=%WinDir%\System32\config|DEFAULT_tureg_old
FileKey10=%WinDir%\System32\config|SAM_tureg_old
FileKey11=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_old
FileKey12=%WinDir%\ServiceProfiles\LocalService|NTUSER.DAT_tureg_new.LOG*
FileKey13=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_old
FileKey14=%WinDir%\ServiceProfiles\NetworkService|NTUSER.DAT_tureg_new.LOG*
Filekey15=%WinDir%\System32\config|COMPONENTS_tureg_old
Filekey16=%WinDir%\System32\config|COMPONENTS_tureg_new.LOG*
FileKey17=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_old
FileKey18=%UserProfile%|NTUSER.DAT_tureg_new.LOG*
FileKey19=%UserProfile%|NTUSER.DAT_tureg_old
FileKey20=%SystemDrive%\Boot\|BCD_tureg_new.LOG*
FileKey21=%SystemDrive%\Boot\|BCD_tureg_old
FileKey22=%LocalAppData%\Microsoft\Windows\|USRCLASS.DAT_tureg_new.LOG*

That's 11 (unnecessary) FileKeys less.

Link to comment
Share on other sites

Is the [WLSetup Logs*] entry sensible ?

It starts with

[WLSetup Logs*]
LangSecRef=3022
DetectFile=%LocalAppData%\Microsoft\WLSetup\Logs\
Default=False
FileKey1=%LocalAppData%\Microsoft\WLSetup\Logs|*.log|REMOVESELF

First of all this is volatile/intermittent detection.

If it appears and you clean the REMOVESELF should remove the "DetectFile=..." trigger,

and hitting the Function F5 key will cause CC to refresh and the check-box will not appear again.

 

Secondly it seems to me that it attempts to remove *.log files but avoid removing "brother/sister" files with other extensions

BUT THEN

it tries to REMOVESELF the parent folder, and if it succeeds there will be no home for future "brother/sister" files.

A bit like an evil step-mother, don't evict the children, but when they go out change the locks quick :angry:

Link to comment
Share on other sites

MODIFIED ENTRY

 

http://forum.piriform.com/index.php?showtopic=32310&view=findpost&p=207593

 

[internet Explorer More*]

LangSecRef=3022

DetectFile=%ProgramFiles%\Internet Explorer\iexplore.exe

Default=False

RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache

RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache

RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU

RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

RegKey5=HKCU\Software\Microsoft\Internet Explorer\PageSetup

RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

FileKey1=%LocalAppData%\Microsoft\Internet Explorer|brndlog.*

FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*iconcache.dat

FileKey3=%LocalAppData%\Microsoft\Internet Explorer\iconcache|*.*|REMOVESELF

FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

FileKey5=%LocalLowAppData%\Microsoft\CryptnetUrlCache\Content|*.*

FileKey6=%LocalLowAppData%\Microsoft\CryptnetUrlCache\MetaData|*.*

FileKey7=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE

 

Added: RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

Moved into alphabet order: RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

Link to comment
Share on other sites

  • Moderators

saad I think we should wait on the ie more entry until Miroku4444's issue is resolved, since it is mostly your entry, I believe, I wonder if you could give him some aid in it

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

CCLEANER, RECUVA, DEFRAGGLER AND SPECCY DOCUMENTATION CAN BE FOUND AT  https://support.piriform.com/hc/en-us and  https://www.ccleaner.com/docs

Pro users file a PRIORITY SUPPORT request at https://support.piriform.com/hc/en-us/requests/new

link to WINAPP2.INI explanation

Link to comment
Share on other sites

Is the [WLSetup Logs*] entry sensible ?

It starts with

[WLSetup Logs*]
LangSecRef=3022
DetectFile=%LocalAppData%\Microsoft\WLSetup\Logs\
Default=False
FileKey1=%LocalAppData%\Microsoft\WLSetup\Logs|*.log|REMOVESELF

First of all this is volatile/intermittent detection.

If it appears and you clean the REMOVESELF should remove the "DetectFile=..." trigger,

and hitting the Function F5 key will cause CC to refresh and the check-box will not appear again.

 

Secondly it seems to me that it attempts to remove *.log files but avoid removing "brother/sister" files with other extensions

BUT THEN

it tries to REMOVESELF the parent folder, and if it succeeds there will be no home for future "brother/sister" files.

A bit like an evil step-mother, don't evict the children, but when they go out change the locks quick :angry:

 

Possibly. No future files are generated until a WLSetup is run again though, but I think you're right.

 

Some entries are designed for applications that are portable, but WL is not portable so I think the removeself can be changed to |*.*|RECURSE

Link to comment
Share on other sites

saad I think we should wait on the ie more entry until Miroku4444's issue is resolved, since it is mostly your entry, I believe, I wonder if you could give him some aid in it

 

That issue has nothing to do with Internet Explorer More entry. I think that issue is with Adobe FlashPlayer or Shockwave Player. I think he should uninstall both the programs and re-install.

 

http://forum.pirifor...ndpost&p=208487

 

What exactly Internet Explorer More entry removes.

http://forum.pirifor...ndpost&p=192469

 

Some of them are included into CCleaner now.

Link to comment
Share on other sites

New Entry

[CamStudio*]
LangSecRef=3023
DetectFile=%ProgramFiles%\CamStudio\
Default=False
FileKey1=%ProgramFiles%\CamStudio|CamLayout.ini
FileKey2=%ProgramFiles%\CamStudio|CamShapes.ini
FileKey3=%ProgramFiles%\CamStudio|Camdata.ini

 

 

 

After some more testing this entire entry can be left out.

Cleaning Camdata.ini will cause the program to crash unless you open/close then reopen it

Cleaning CamShapes.ini will wipe the annotaions list

CamLayout.ini saves settings on close

:blink:

Link to comment
Share on other sites

I think we should move "FileKey" before the "RegKey" in entries. I have tried some other privacy eraser programs and that is how they have their entries.

 

For example:

 

[internet Explorer More*]

LangSecRef=3022

DetectFile=%ProgramFiles%\Internet Explorer\iexplore.exe

Default=False

FileKey1=%LocalAppData%\Microsoft\Internet Explorer|brndlog.*

FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*iconcache.dat

FileKey3=%LocalAppData%\Microsoft\Internet Explorer\iconcache|*.*|REMOVESELF

FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

FileKey5=%LocalLowAppData%\Microsoft\CryptnetUrlCache\Content|*.*

FileKey6=%LocalLowAppData%\Microsoft\CryptnetUrlCache\MetaData|*.*

FileKey7=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE

RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache

RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache

RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU

RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

RegKey5=HKCU\Software\Microsoft\Internet Explorer\PageSetup

RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

Link to comment
Share on other sites

RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

:wacko: ??????????????????????????????????????????????????????? :wacko:

 

That surprises me.

 

I naturally assumed that ...\PendingDelete signified :-

Failed to promptly delete at the time ;

On Microsoft's ToDo list ;

Should get done on the next Reboot, or failing that the next Patch Tuesday, or failing that the next Operating System Service Pack.

 

I would be concerned that if the flag was removed then Windows might forget to delete what was pending.

 

Do these ...\PendingDelete flags get forgotten and left behind after the relevant delete ?

Or is Microsoft better at promising than it is at performing requisite deletions ?

Link to comment
Share on other sites

:wacko: ??????????????????????????????????????????????????????? :wacko:

 

That surprises me.

 

I naturally assumed that ...\PendingDelete signified :-

Failed to promptly delete at the time ;

On Microsoft's ToDo list ;

Should get done on the next Reboot, or failing that the next Patch Tuesday, or failing that the next Operating System Service Pack.

 

I would be concerned that if the flag was removed then Windows might forget to delete what was pending.

 

Do these ...\PendingDelete flags get forgotten and left behind after the relevant delete ?

Or is Microsoft better at promising than it is at performing requisite deletions ?

 

It is related to the FileKey4. Last Active directory files traces in registry.

FileKey4=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

Link to comment
Share on other sites

 

Could you please replace the Internet Explorer More entry with the one listed here and try it. I don't have a XP system to try it.

 

[internet Explorer More*]

LangSecRef=3022

DetectFile=%ProgramFiles%\Internet Explorer\iexplore.exe

Default=False

FileKey1=%LocalAppData%\Microsoft\Internet Explorer\Recovery\Last Active|*.*|RECURSE

FileKey2=%LocalLowAppData%\Microsoft\CryptnetUrlCache\Content|*.*

FileKey3=%LocalLowAppData%\Microsoft\CryptnetUrlCache\MetaData|*.*

FileKey4=%AppData%\Microsoft\Internet Explorer\UserData|*.*|RECURSE

RegKey1=HKCU\Software\Microsoft\Internet Explorer\International|CNum_CpCache

RegKey2=HKCU\Software\Microsoft\Internet Explorer\International|CpCache

RegKey3=HKCU\Software\Microsoft\Internet Explorer\International\CpMRU

RegKey4=HKCU\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore

RegKey5=HKCU\Software\Microsoft\Internet Explorer\PageSetup

RegKey6=HKCU\Software\Microsoft\Internet Explorer\Recovery\PendingDelete

 

Basically I have provided this entry but, someone added the lines listed below into this entry.

 

FileKey1=%LocalAppData%\Microsoft\Internet Explorer|brndlog.*

FileKey2=%LocalAppData%\Microsoft\Internet Explorer|*iconcache.dat

FileKey3=%LocalAppData%\Microsoft\Internet Explorer\iconcache|*.*|REMOVESELF

Link to comment
Share on other sites

MODIFIED ENTRY

 

[FastStone Capture*]

LangSecRef=3023

DetectFile=%Program Files%\FastStone Capture\FSCapture.exe

Default=False

FileKey1=%LocalAppData%\FastStone\FSC\EditWith|*.*

FileKey2=%AppData%\FastStone\FSC|*.bak

RegKey1=HKCU\Software\FastStone\APP.FSRecorder\Global|_GrbId

RegKey2=HKCU\Software\FastStone\APP.FSRecorder\Global|_LastClipPlayed

RegKey3=HKCU\Software\FastStone\APP.FSRecorder\Global|_LastRecordingFileName

 

I have edited this post. Added: HKCU\Software\FastStone\APP.FSRecorder\Global|_GrbId

Link to comment
Share on other sites

Thanks saad!

 

I created a custom skin for winapp2.ini editing in Notepad++

 

http://dl.dropbox.com/u/14823386/winapp2.xml

 

import it from the language maker

select langauge winapp from the language list.

 

It works on a dark background

 

Here's my view

 

http://dl.dropbox.com/u/14823386/2012-01-12_140500.png

 

Just thought I'd share it for anyone else who'd like to use it. :)

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.