Jump to content
CCleaner Community Forums
Winapp2.ini

Winapp2.ini additions

Recommended Posts

6 hours ago, SMalik said:

Deleting this file will also delete the bookmarks.

 

Probably safer to leave it be then imo

Share this post


Link to post
Share on other sites

Revised Entry

Changed the entry name from [urlclassifier3.sqlite *] to [Anti-Phishing data *]

Changed the Warning from "This will delete urlclassifier3.sqlite. If you just want to reduce its size, select Compact Databases instead." to "This will delete anti-phishing data."

urlclassifier2.sqlite stores anti-phishing data

http://kb.mozillazine.org/Urlclassifier2.sqlite


[Anti-Phishing data *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
Warning=This will delete anti-phishing data.
FileKey1=%LocalAppData%\Moonchild Productions\Pale Moon\Profiles\*|urlclassifier3.sqlite
FileKey2=%LocalAppData%\Mozilla\Firefox\Profiles\*|urlclassifier3.sqlite
FileKey3=%LocalAppData%\Mozilla\SeaMonkey\Profiles\*|urlclassifier3.sqlite
FileKey4=%LocalAppData%\Waterfox\Profiles\*|urlclassifier3.sqlite

Share this post


Link to post
Share on other sites

Revised Entry

Changed the entry name from [webappsstore.sqlite *] to [DOM Storage *]

webappsstore.sqlite stores all the DOM storage data, mostly data for websites

http://kb.mozillazine.org/Webappsstore.sqlite

[DOM Storage *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|webappsstore.sqlite
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|webappsstore.sqlite
FileKey4=%AppData%\Waterfox\Profiles\*|webappsstore.sqlite

Share this post


Link to post
Share on other sites

Revised Entry
Changed the DetectFile from %CommonAppData%\Norton\LocalDumps to %CommonAppData%\Norton

[Norton *]
LangSecRef=3024
DetectFile=%CommonAppData%\Norton
Default=False
FileKey1=%CommonAppData%\Norton|*.log;*.txt
FileKey2=%CommonAppData%\Norton\LocalDumps|*.dmp
FileKey3=%CommonAppData%\NortonInstaller\Logs|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\ProgramData\Norton\LocalDumps|*.dmp
FileKey5=%LocalAppData%\VirtualStore\ProgramData\NortonInstaller\Logs|*.*|RECURSE

Share this post


Link to post
Share on other sites
On 21.10.2018 at 22:48, SMalik said:

New Entry ... [HSTS supercookies*] ...

This entry [Firefox Stored HSTS Cookies Extras *] is in the "Removed entries.ini" file, because CCleaner can clean up the "SiteSecurityServiceState.txt" file itself.
(https://forum.piriform.com/topic/51568-cookies-visible-to-ccleaner-but-not-to-firefox-settings/?tab=comments#comment-299024)

On 21.10.2018 at 22:52, SMalik said:

... %AppData%\Mozilla\Firefox\Profiles\*|places.sqlite ...

CCleaner can clean up that file also (CCleaner modifies the SQLite database directly). If there are still traces left, you could report them to Piriform.

 

Share this post


Link to post
Share on other sites

[Oxygen 14 *] shows up on my system but I just have JDownloader software, not sure what the entry is tied to.  I have included the export of the HKCU\software\ej-technologies

==================================================

[HKEY_CURRENT_USER\Software\ej-technologies]

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j]
"InstallStarted"=dword:00000000

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\jvms]

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\jvms\c:/users/galloway/appdata/local/jdownloader v2.0/jre/bin/java.exe]
"LastWriteTime"=hex:b0,80,a9,11,06,7a,d3,01
"Version"="1.8.0_40"

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\pids]
"c:\\users\\galloway\\appdata\\local\\temp\\in0db19a7d\\2c8aabb5_stp.exe"=dword:000012e4

[HKEY_CURRENT_USER\Software\ej-technologies\install4j]

[HKEY_CURRENT_USER\Software\ej-technologies\install4j\installations]
"allinstdirsjdownloader2"="C:\\Users\\Galloway\\AppData\\Local\\JDownloader v2.0"
"instdirjdownloader2"="C:\\Users\\Galloway\\AppData\\Local\\JDownloader v2.0"

Suggest the [Oxygen 14 *] detect be modified ......

Share this post


Link to post
Share on other sites
3 hours ago, CSGalloway said:

Suggest the [Oxygen 14 *] detect be modified .....

Agreed

ej-technologies seem not connected to OxygenXML except for their java app being used by OxygenXML same like Jdownloader

[Oxygen 14 *]
LangSecRef=3021
DetectFile=%ProgramFiles%\Oxygen XML Editor 14
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14|*.properties;*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\.install4j|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\lib|*.txt|RECURSE
FileKey5=%ProgramFiles%\Oxygen XML Editor 14|*.properties;*.log
FileKey6=%ProgramFiles%\Oxygen XML Editor 14\.install4j|*.log
FileKey7=%ProgramFiles%\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey8=%ProgramFiles%\Oxygen XML Editor 14\lib|*.txt|RECURSE
ExcludeKey1=FILE|%ProgramFiles%\Oxygen XML Editor 14\.install4j\|files.log

- change Detect to DetectFile

 

found the entry, 2013 :lol:

 

Share this post


Link to post
Share on other sites
20 minutes ago, dvdbane said:

Agreed

ej-technologies seem not connected to OxygenXML except for their java app being used by OxygenXML same like Jdownloader


[Oxygen 14 *]
LangSecRef=3021
DetectFile=%ProgramFiles%\Oxygen XML Editor 14
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14|*.properties;*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\.install4j|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\lib|*.txt|RECURSE
FileKey5=%ProgramFiles%\Oxygen XML Editor 14|*.properties;*.log
FileKey6=%ProgramFiles%\Oxygen XML Editor 14\.install4j|*.log
FileKey7=%ProgramFiles%\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey8=%ProgramFiles%\Oxygen XML Editor 14\lib|*.txt|RECURSE
ExcludeKey1=FILE|%ProgramFiles%\Oxygen XML Editor 14\.install4j\|files.log

- change Detect to DetectFile

 

found the entry, 2013 :lol:

 

Be great if the Detect would be changed and not have to use DetectFile......  One could go to https://www.oxygenxml.com/contact.html and see if a better registry key could be used.....

Share this post


Link to post
Share on other sites
[Thunderbird DOM Storage *]
LangSecRef=3030
Detect1=HKLM\Software\Mozilla\FossaMail
Detect2=HKLM\Software\Mozilla\Mozilla Thunderbird
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|webappsstore.sqlite
FileKey2=%AppData%\Thunderbird\Profiles\*|webappsstore.sqlite

- follow firefox naming for cleaning webappsstore.sqlite

Share this post


Link to post
Share on other sites

@Winapp2.ini

got this error and winapp2ool crash when running offline while trying to setup winapp2.ini on my friend laptop

no error when running online

test function merge and trim, no problem, didn't test other features

does this cause by not using dotnet 4.6 like issue #251 on github?

win 7 sp1, dotnet 4.5.2

Untitled.png.ffdc69d56fb7163a99c2356d11fc6dd7.png

Share this post


Link to post
Share on other sites

Modified entry:  [Microsoft Edge *]

Removed FileKey8 because it deletes the URL icons of links in the Favorites bar.

FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\Datastore\Data\nouser1\*\Favorites|*.ico

[Microsoft Edge *]
LangSecRef=3022
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\INetCookies|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\Microsoft\Cryptnet*Cache|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\MicrosoftEdge\Cookies|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Microsoft\Cryptnet*Cache|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\Cookies|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\UrlBlock|*.tmp
FileKey7=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\*\DBStore|V01*.log;V01*.jrs
FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Indexed\Data\nouser1\*|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\ImageStore|*.*|RECURSE
FileKey10=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\Recovery\Active|*.dat
FileKey11=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Temp|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AppData\User\Default\Indexed DB|*.*|RECURSE
FileKey13=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\LocalState\Favicons\PushNotificationGrouping|*.*|RECURSE
FileKey14=%UserProfile%\MicrosoftEdgeBackups\backups\*|*.*|REMOVESELF
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete
RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultOpenFileMultiple
RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultOpenFileSingle
RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultSaveFileSingle

 

 

EdgeURLIcons.png

Share this post


Link to post
Share on other sites
On 10/30/2018 at 09:47, dvdbane said:

@Winapp2.ini

got this error and winapp2ool crash when running offline while trying to setup winapp2.ini on my friend laptop

no error when running online

test function merge and trim, no problem, didn't test other features

does this cause by not using dotnet 4.6 like issue #251 on github?

win 7 sp1, dotnet 4.5.2

Untitled.png.ffdc69d56fb7163a99c2356d11fc6dd7.png

This error wasn't happening in my development environment (probably due to the nature of debugging applications) but it should be fixed in the next winapp2ool update. The application is intended to be usable when offline (with the exception of online functions)

If using .NET 4.5.2 you should also see a message on the menu informing you that the tool requires .NET 4.6 but 4.6 is only required to use TLS 1.2 for downloading the executable. Everything else should work as expected

Share this post


Link to post
Share on other sites

As for the Microsoft Edge Favorites icons, I believe it is a sensitive area because deleted Favorites’ icons remain in that location and don’t get removed. Favorites icons get repopulated after opening Microsoft Edge. I don’t think it is a wise idea to remove that FileKey from that entry.

I believe the Firefox and Chrome entries also remove bookmarks’ icons.

Share this post


Link to post
Share on other sites
5 hours ago, SMalik said:

As for the Microsoft Edge Favorites icons, I believe it is a sensitive area because deleted Favorites’ icons remain in that location and don’t get removed. Favorites icons get repopulated after opening Microsoft Edge. I don’t think it is a wise idea to remove that FileKey from that entry.

I believe the Firefox and Chrome entries also remove bookmarks’ icons.

They do not get repopulated unless you re-visit each and every one of the links manually. 

Comment:  I'd much rather have a separate entry [Microsoft Edge Favorites *] with a warning that it is going to delete all the Favorites icons and the icons will be rebuilt as websites are manually re-visited.

Share this post


Link to post
Share on other sites

New Entry

[iMyFone Umate *]
LangSecRef=3024
Detect=HKLM\Software\iMyFone\Umate
Default=False
FileKey1=%ProgramFiles%\iMyFone\iMyFone Umate|mate.log
FileKey2=%ProgramFiles%\iMyFone\iMyFone Umate\cache|*.*|RECURSE
FileKey3=%ProgramFiles%\iMyFone\iMyFone Umate\Log|*.*|RECURSE
FileKey4=%ProgramFiles%\iMyFone\iMyFone Umate\temp|*.*|RECURSE

Share this post


Link to post
Share on other sites

A new version of winapp2ool.exe is available for testing (not yet pushed to master)

Should be of particular interest to WindowsXP users, as there is now a version that should work on your system. Please let me know if anything jumps out as super broken.

 

https://github.com/MoscaDotTo/Winapp2/pull/318

Share this post


Link to post
Share on other sites

Modified Entry:   [Dell Logs *]

Added:   Detect1, Detect2, Detect3, FileKey4, FileKey6/7/8/9

[Dell Logs *]
LangSecRef=3024
Detect1=HKLM\Software\Dell\MUP
Detect2=HKLM\Software\Dell\UpdateService
Detect3=HKLM\Software\PC-Doctor
DetectFile1=%AppData%\Creative\DELL Webcam Center
DetectFile2=%CommonAppData%\Dell
DetectFile3=%LocalAppData%\Dell
DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
DetectFile5=%ProgramFiles%\Dell*
Default=False
FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
FileKey2=%AppData%\PCDr\*\Logs|*.*
FileKey3=%CommonAppData%\Dell\*\Log|*.*
FileKey4=%CommonAppData%\Dell\Digital Delivery\Logs|*.*
FileKey5=%CommonAppData%\Dell\Drivers\*|*.tmp
FileKey6=%CommonAppData%\Dell\Update|*.txt
FileKey7=%CommonAppData%\Dell\Update\Logs|*.*
FileKey8=%CommonAppData%\Dell\UpdatePackage\Log|*.*
FileKey9=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
FileKey10=%CommonAppData%\PCDr\*\Cache|*.xml
FileKey11=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
FileKey12=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
FileKey13=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
FileKey14=%CommonAppData%\PCDr\*\Logs|*.log
FileKey15=%LocalAppData%\Dell\*\Log|*.*
FileKey16=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
FileKey17=%LocalAppData%\VirtualStore\Program Files*\Dell*|*.log|RECURSE
FileKey18=%LocalAppData%\VirtualStore\ProgramData\Dell\*\Log|*.*
FileKey19=%ProgramFiles%\Dell*|*.log|RECURSE

 

Remove:  [Dell PC-Doctor (Logs) *]  because it is incorporated in [Dell Logs *].   Note:  Please confirm my assertion that Dell PC-Doctor (Logs) is not needed.  

;[Dell PC-Doctor (Logs) *]
;LangSecRef=3024
;Detect=HKLM\Software\PC-Doctor
;Default=False
;FileKey1=%AppData%\PCDr\Installer\Logs|*.log
;FileKey2=%AppData%\PCDr\Update\Logs|*.log
;FileKey3=%CommonAppData%\PCDr\6299\Logs|*.log
;FileKey4=%CommonAppData%\PCDr\6992\Logs|*.log
;FileKey5=%CommonAppData%\PCDr\7060\Logs|*.log
;FileKey6=%CommonAppData%\PCDr\Installer\Logs|*.log
;FileKey7=%CommonAppData%\PCDr\Updater\Logs|*.log

 

Edited by siliconman01
Incorporated latest Dell Logs files.

Share this post


Link to post
Share on other sites

Modified Entry:  [Dell PC Doctor *] changed to [Dell PC Doctor (.dmp) *]

[Dell PC Doctor (.dmp) *]
LangSecRef=3024
DetectFile=%CommonAppData%\PCDr
Default=False
FileKey1=%CommonAppData%\PCDr|*.dmp|RECURSE
FileKey2=%LocalAppData%\VirtualStore\ProgramData\PCDr|*.dmp|RECURSE

 

Share this post


Link to post
Share on other sites
30 minutes ago, siliconman01 said:

Remove:  [Dell PC-Doctor (Logs) *]  because it is incorporated in [Dell Logs *].   Note:  Please confirm my assertion that Dell PC-Doctor (Logs) is not needed. ...

Are you using a custom Winapp2.ini file? Because this entry doesn't exist in the official file. And yes, it is covered by the entry [Dell Logs *] already.

27 minutes ago, siliconman01 said:

Modified Entry:  [Dell PC Doctor *] changed to [Dell PC Doctor (.dmp) *]

As we don't use brackets in entries names anymore, is [Dell PC Doctor Dumps *] also ok for you?

Share this post


Link to post
Share on other sites
51 minutes ago, siliconman01 said:

Modified Entry:   [Dell Logs *]

Added:   Detect1, Detect2, Detect3, FileKey4, FileKey6/7/8/9 ...

FileKey4 and 7 can be merged to: FileKey4=%CommonAppData%\Dell\*\Logs|*.*
FileKey8 is covered by FileKey3 already.

[Dell Logs *]
LangSecRef=3024
Detect1=HKLM\Software\Dell\MUP
Detect2=HKLM\Software\Dell\UpdateService
Detect3=HKLM\Software\PC-Doctor
DetectFile1=%AppData%\Creative\DELL Webcam Center
DetectFile2=%CommonAppData%\Dell
DetectFile3=%LocalAppData%\Dell
DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
DetectFile5=%ProgramFiles%\Dell*
Default=False
FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
FileKey2=%AppData%\PCDr\*\Logs|*.*
FileKey3=%CommonAppData%\Dell\*\Log|*.*
FileKey4=%CommonAppData%\Dell\*\Logs|*.*
FileKey5=%CommonAppData%\Dell\Drivers\*|*.tmp
FileKey6=%CommonAppData%\Dell\Update|*.txt
FileKey7=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
FileKey8=%CommonAppData%\PCDr\*\Cache|*.xml
FileKey9=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
FileKey10=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
FileKey11=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
FileKey12=%CommonAppData%\PCDr\*\Logs|*.log
FileKey13=%LocalAppData%\Dell\*\Log|*.*
FileKey14=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
FileKey15=%LocalAppData%\VirtualStore\Program Files*\Dell*|*.log|RECURSE
FileKey16=%LocalAppData%\VirtualStore\ProgramData\Dell\*\Log|*.*
FileKey17=%ProgramFiles%\Dell*|*.log|RECURSE

Share this post


Link to post
Share on other sites
19 minutes ago, APMichael said:

Are you using a custom Winapp2.ini file? Because this entry doesn't exist in the official file. And yes, it is covered by the entry [Dell Logs *] already.

As we don't use brackets in entries names anymore, is [Dell PC Doctor Dumps *] also ok for you?

ahhh...yeah [Dell PC-Doctor (Logs) *] was in my Custom File.  [Dell PC Doctor Dumps *] is fine by me.

Thanks for the refinement/confirmation of [Dell Logs *]

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...