Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

Here is a little "cosmetic" change, because this was the only entry for Firefox using %ProgramFiles% for detection.

 

[Extensions Logs*]

LangSecRef=3026

DetectFile=%AppData%\Mozilla\Firefox

Default=False

FileKey1=%AppData%\Mozilla\Firefox\Profiles\*|extensions.log

 

The next entry has two detection lines. I think the first one (DetectFile) is enough because the entry gets detected regardless if the second one (Detect) matches or not.

 

[secunia PSI*]

LangSecRef=3021

DetectFile=%ProgramFiles%\Secunia\PSI\psi.exe

Detect=HKCU\Software\Secunia\PSI

Default=False

FileKey1=%ProgramFiles%\secunia\PSI|sualog.txt

FileKey2=%ProgramFiles%\Secunia\PSI|psialog.txt

FileKey3=%ProgramFiles%\Secunia\PSI|psialog.txt2

 

And I have a question about the following entry. Are you really sure this is for "MS Customer Experience Improvement Program"? Because the file "Custom.DIC" saves your own additions to the office dictionary (for the spell checker). And until now I didn't find a suspect file in the folder "UProof".

 

[MS Office Saved CEIP data*]

LangSecRef=3021

DetectFile=%AppData%\Microsoft\UProof

Default=False

FileKey1=%AppData%\Microsoft\UProof|*.bin

FileKey2=%AppData%\Microsoft\UProof|*.DIC

FileKey3=%AppData%\Microsoft\UProof|*.XML

Link to comment
Share on other sites

And I have a question about the following entry. Are you really sure this is for "MS Customer Experience Improvement Program"? Because the file "Custom.DIC" saves your own additions to the office dictionary (for the spell checker). And until now I didn't find a suspect file in the folder "UProof".

 

 

Quote

 

[MS Office Saved CEIP data*]

LangSecRef=3021

DetectFile=%AppData%\Microsoft\UProof

Default=False

FileKey1=%AppData%\Microsoft\UProof|*.bin

FileKey2=%AppData%\Microsoft\UProof|*.DIC

FileKey3=%AppData%\Microsoft\UProof|*.XML

 

Personally I do not checkmark this code because I use Office 2007 and Office 2010. As stated, this code clears out the Custom.dic which is undesirable to me for Outlook and other Office programs.

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA Nvidia GeForce 980 Titan card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Kaspersky Internet Security 2021, Malwarebytes 4, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD21, MSI Burner, Rainmeter, Windows Sidebar, WD Smartware and many more.

Link to comment
Share on other sites

@ siliconman01 & Winapp2.ini: Thanks for your replies.

 

 

Here are some more changes and new entries. The first 2 are just cosmetic changes. Can you rename them please?

 

[MalwareBytes' Anti-Malware 1.50 (Logs)*] to [Malwarebytes Anti Malware Logs*]

[VLC media player More*] to [VLC Media Player More*]

 

This is a new entry:

 

[DVBViewer*]

LangSecRef=3023

DetectFile=%CommonAppData%\CMUV\DVBViewer

Default=False

FileKey1=%CommonAppData%\CMUV\DVBViewer|*.bak

FileKey2=%CommonAppData%\CMUV\DVBViewer|*.log

 

 

The following entries are suggestions only. I'm not sure if they are good for all. I'm using a small SSD and therefore searched for unnecessary setup files. It would be great if other users could check and test them.

 

Adobe Reader X: The only ill effect is that a repair installation doesn't work anymore. But the uninstaller still works.

[Adobe Reader 10.0 Setup Files*]

LangSecRef=3021

DetectFile=%CommonAppData%\Adobe\Acrobat\10.0

Warning=This will prevent a repair installation. You have to download the installer for a reinstallation.

Default=False

FileKey1=%CommonAppData%\Adobe\ARM\Reader_10.*|*.*|REMOVESELF

FileKey2=%CommonAppData%\Adobe\Setup\{AC76BA86-7AD7-*-7B44-AA1000000001}|*.*|REMOVESELF

 

Citrix Web Client: No errors occurred. Uninstaller still works.

[Citrix Online Plug-in Web Setup Files*]

LangSecRef=3021

DetectFile=%CommonAppData%\Citrix\Citrix Online Plug-in - Web

Default=False

FileKey1=%CommonAppData%\Citrix\Citrix Online Plug-in - Web|*.msi

FileKey2=%CommonAppData%\Citrix\Citrix Online Plug-in - Web|*.cab

FileKey3=%CommonAppData%\Citrix\Citrix Online Plug-in - Web|eula*.rtf

 

JavaRE 7: No errors occurred. Uninstaller still works.

[sun Java Setup Files*]

LangSecRef=3022

DetectFile=%LocalLowAppData%\Sun\Java

Default=False

FileKey1=%LocalLowAppData%\Sun\Java\jre*|*.*|REMOVESELF

 

Apple Installer: Changed this one a little bit. QuickTime shows no error after deletion. Uninstallers still work. Can somebody test it with latest iTunes please?

[Apple Installer Cache*]

LangSecRef=3023

DetectFile=%CommonAppData%\Apple Computer

Default=False

FileKey1=%CommonAppData%\Apple Computer\Installer Cache\*|*.*

FileKey2=%CommonAppData%\Apple\Installer Cache\*|*.*

 

DVBViewer: It's not possible to modify the installation anymore. Uninstaller still works.

[DVBViewer Setup Files*]

LangSecRef=3023

DetectFile=%ProgramFiles%\DVBViewer

Warning=This will prevent a modify installation. You have to download the installer to modify the installation.

Default=False

FileKey1=%ProgramFiles%\DVBViewer\setup|*.*

FileKey2=%ProgramFiles%\DVBViewer\Transponders|*.*

 

Malwarebytes' Anti-Malware: No errors occurred. Uninstaller still works.

[Malwarebytes Anti Malware Setup File*]

LangSecRef=3024

DetectFile=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware

Default=False

FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes' Anti-Malware|mbam-setup.exe

 

All entries are tested on Windows 7 x64.

 

 

Edit: Correction of typos. Thanks to JDPower.

Edited by APMichael
Link to comment
Share on other sites

If we're talking cosmetic surely it should be "Malwarebytes Anti-Malware" not "Malwarebytes' Anti-Malware" ;)

No, for this case "Malwarebytes' Anti-Malware" is correct, because the built-in entry of CC is written exactly like this. The program files folder is labeled "Malwarebytes' Anti-Malware" also.

 

 

Edit: Big sorry, you are right! CCleaners entry is written "Malwarebytes Anti Malware" (also no hyphen "-"). Shame on me. :( And thanks for your good eyes. :)

 

Ok, then the entries should be renamed from

[MalwareBytes' Anti-Malware 1.50 (Logs)*] to [Malwarebytes Anti Malware Logs*]

[Malwarebytes' Anti-Malware Setup File*] to [Malwarebytes Anti Malware Setup File*]

I will correct those typos in my post above.

Link to comment
Share on other sites

Personally I do not checkmark this code because I use Office 2007 and Office 2010. As stated, this code clears out the Custom.dic which is undesirable to me for Outlook and other Office programs.

 

You're right the file 'Custom.DIC' saves your own additions to the office dictionary. Other two lines are valid.

Link to comment
Share on other sites

NEW ENTRIES

 

[Cached WPF Fonts*]

LangSecRef=3025

DetectFile=%windir%\ServiceProfiles\LocalService\AppData\Local

Default=False

FileKey1=%windir%\ServiceProfiles\LocalService\AppData\Local|FontCache3.0.0.0.dat

 

http://forum.pirifor...79

 

[Defragmentation List*]

LangSecRef=3025

DetectFile=%WinDir%

Default=False

FileKey1=%WinDir%\Prefetch|Layout.ini

Link to comment
Share on other sites

I believe wiping .pf files from Prefetch directory is completely safe. The problem is only when ReadyBoot directory and its contents (.fx files) are wiped from Prefetch directory without restarting the system. I think we should have an entry to wipe .pf files since CCleaner's Old Prefetch data entry doesn't work on Windows Vista and 7.

Link to comment
Share on other sites

You're right the file 'Custom.DIC' saves your own additions to the office dictionary. Other two lines are valid.

 

I can confirm this, now. Today I get a pop-up window with the "Customer Experience Improvement Program" and those files were generated. This is the modified entry:

 

[MS Office Saved CEIP Data*]

LangSecRef=3021

DetectFile=%AppData%\Microsoft\UProof

Default=False

FileKey1=%AppData%\Microsoft\UProof|*.bin

FileKey2=%AppData%\Microsoft\UProof|*.XML

Link to comment
Share on other sites

I can confirm this, now. Today I get a pop-up window with the "Customer Experience Improvement Program" and those files were generated. This is the modified entry:

 

I made a mistake by adding .DIC into that entry. Otherwise the entry is valid. Thank you for confirming.

Link to comment
Share on other sites

I have seen 3 different sorts of DetectFiles within WinApp2.ini,

are they all legal and do they all do the same in every situation ?

 

1. Many with a trailing backslash such as

DetectFile=%AppData%\DriverCure\

 

2. Many without a trailing backslash such as

DetectFile=%LocalAppData%\Innovative Solutions\DriverMax

 

3. At least one with a trailing dot such as

DetectFile=%AppData%\dvdcss\.

 

Regards

Alan

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.