Jump to content

Winapp2.ini additions


Winapp2.ini

Recommended Posts

  • Moderators
6 hours ago, SMalik said:

Deleting this file will also delete the bookmarks.

 

Probably safer to leave it be then imo

 

ADVICE FOR USING CCleaner'S REGISTRY INTEGRITY SECTION

DON'T JUST CLEAN EVERYTHING THAT'S CHECKED OFF.

Do your Registry Cleaning in small bits (at the very least Check-mark by Check-mark)

ALWAYS BACKUP THE ENTRY, YOU NEVER KNOW WHAT YOU'LL BREAK IF YOU DON'T.

Support at https://support.ccleaner.com/s/?language=en_US

Pro users file a PRIORITY SUPPORT via email support@ccleaner.com

Link to comment
Share on other sites

Revised Entry

Changed the entry name from [urlclassifier3.sqlite *] to [Anti-Phishing data *]

Changed the Warning from "This will delete urlclassifier3.sqlite. If you just want to reduce its size, select Compact Databases instead." to "This will delete anti-phishing data."

urlclassifier2.sqlite stores anti-phishing data

http://kb.mozillazine.org/Urlclassifier2.sqlite


[Anti-Phishing data *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
Warning=This will delete anti-phishing data.
FileKey1=%LocalAppData%\Moonchild Productions\Pale Moon\Profiles\*|urlclassifier3.sqlite
FileKey2=%LocalAppData%\Mozilla\Firefox\Profiles\*|urlclassifier3.sqlite
FileKey3=%LocalAppData%\Mozilla\SeaMonkey\Profiles\*|urlclassifier3.sqlite
FileKey4=%LocalAppData%\Waterfox\Profiles\*|urlclassifier3.sqlite

Link to comment
Share on other sites

Revised Entry

Changed the entry name from [webappsstore.sqlite *] to [DOM Storage *]

webappsstore.sqlite stores all the DOM storage data, mostly data for websites

http://kb.mozillazine.org/Webappsstore.sqlite

[DOM Storage *]
LangSecRef=3026
Detect1=HKLM\Software\Mozilla\Pale Moon
Detect2=HKLM\Software\Mozilla\SeaMonkey
Detect3=HKLM\Software\Mozilla\Waterfox
DetectFile=%AppData%\Mozilla\Firefox
Default=False
FileKey1=%AppData%\Moonchild Productions\Pale Moon\Profiles\*|webappsstore.sqlite
FileKey2=%AppData%\Mozilla\Firefox\Profiles\*|webappsstore.sqlite
FileKey3=%AppData%\Mozilla\SeaMonkey\Profiles\*|webappsstore.sqlite
FileKey4=%AppData%\Waterfox\Profiles\*|webappsstore.sqlite

Link to comment
Share on other sites

Revised Entry
Changed the DetectFile from %CommonAppData%\Norton\LocalDumps to %CommonAppData%\Norton

[Norton *]
LangSecRef=3024
DetectFile=%CommonAppData%\Norton
Default=False
FileKey1=%CommonAppData%\Norton|*.log;*.txt
FileKey2=%CommonAppData%\Norton\LocalDumps|*.dmp
FileKey3=%CommonAppData%\NortonInstaller\Logs|*.*|RECURSE
FileKey4=%LocalAppData%\VirtualStore\ProgramData\Norton\LocalDumps|*.dmp
FileKey5=%LocalAppData%\VirtualStore\ProgramData\NortonInstaller\Logs|*.*|RECURSE

Link to comment
Share on other sites

On 21.10.2018 at 22:48, SMalik said:

New Entry ... [HSTS supercookies*] ...

This entry [Firefox Stored HSTS Cookies Extras *] is in the "Removed entries.ini" file, because CCleaner can clean up the "SiteSecurityServiceState.txt" file itself.
(https://forum.piriform.com/topic/51568-cookies-visible-to-ccleaner-but-not-to-firefox-settings/?tab=comments#comment-299024)

On 21.10.2018 at 22:52, SMalik said:

... %AppData%\Mozilla\Firefox\Profiles\*|places.sqlite ...

CCleaner can clean up that file also (CCleaner modifies the SQLite database directly). If there are still traces left, you could report them to Piriform.

 

Link to comment
Share on other sites

[Oxygen 14 *] shows up on my system but I just have JDownloader software, not sure what the entry is tied to.  I have included the export of the HKCU\software\ej-technologies

==================================================

[HKEY_CURRENT_USER\Software\ej-technologies]

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j]
"InstallStarted"=dword:00000000

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\jvms]

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\jvms\c:/users/galloway/appdata/local/jdownloader v2.0/jre/bin/java.exe]
"LastWriteTime"=hex:b0,80,a9,11,06,7a,d3,01
"Version"="1.8.0_40"

[HKEY_CURRENT_USER\Software\ej-technologies\exe4j\pids]
"c:\\users\\galloway\\appdata\\local\\temp\\in0db19a7d\\2c8aabb5_stp.exe"=dword:000012e4

[HKEY_CURRENT_USER\Software\ej-technologies\install4j]

[HKEY_CURRENT_USER\Software\ej-technologies\install4j\installations]
"allinstdirsjdownloader2"="C:\\Users\\Galloway\\AppData\\Local\\JDownloader v2.0"
"instdirjdownloader2"="C:\\Users\\Galloway\\AppData\\Local\\JDownloader v2.0"

Suggest the [Oxygen 14 *] detect be modified ......

Link to comment
Share on other sites

3 hours ago, CSGalloway said:

Suggest the [Oxygen 14 *] detect be modified .....

Agreed

ej-technologies seem not connected to OxygenXML except for their java app being used by OxygenXML same like Jdownloader

[Oxygen 14 *]
LangSecRef=3021
DetectFile=%ProgramFiles%\Oxygen XML Editor 14
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14|*.properties;*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\.install4j|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\lib|*.txt|RECURSE
FileKey5=%ProgramFiles%\Oxygen XML Editor 14|*.properties;*.log
FileKey6=%ProgramFiles%\Oxygen XML Editor 14\.install4j|*.log
FileKey7=%ProgramFiles%\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey8=%ProgramFiles%\Oxygen XML Editor 14\lib|*.txt|RECURSE
ExcludeKey1=FILE|%ProgramFiles%\Oxygen XML Editor 14\.install4j\|files.log

- change Detect to DetectFile

 

found the entry, 2013 :lol:

 

Link to comment
Share on other sites

20 minutes ago, dvdbane said:

Agreed

ej-technologies seem not connected to OxygenXML except for their java app being used by OxygenXML same like Jdownloader


[Oxygen 14 *]
LangSecRef=3021
DetectFile=%ProgramFiles%\Oxygen XML Editor 14
Default=False
FileKey1=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14|*.properties;*.log
FileKey2=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\.install4j|*.log
FileKey3=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey4=%LocalAppData%\VirtualStore\Program Files*\Oxygen XML Editor 14\lib|*.txt|RECURSE
FileKey5=%ProgramFiles%\Oxygen XML Editor 14|*.properties;*.log
FileKey6=%ProgramFiles%\Oxygen XML Editor 14\.install4j|*.log
FileKey7=%ProgramFiles%\Oxygen XML Editor 14\dicts|*.txt;*.html
FileKey8=%ProgramFiles%\Oxygen XML Editor 14\lib|*.txt|RECURSE
ExcludeKey1=FILE|%ProgramFiles%\Oxygen XML Editor 14\.install4j\|files.log

- change Detect to DetectFile

 

found the entry, 2013 :lol:

 

Be great if the Detect would be changed and not have to use DetectFile......  One could go to https://www.oxygenxml.com/contact.html and see if a better registry key could be used.....

Link to comment
Share on other sites

[Thunderbird DOM Storage *]
LangSecRef=3030
Detect1=HKLM\Software\Mozilla\FossaMail
Detect2=HKLM\Software\Mozilla\Mozilla Thunderbird
Default=False
FileKey1=%AppData%\FossaMail\Profiles\*|webappsstore.sqlite
FileKey2=%AppData%\Thunderbird\Profiles\*|webappsstore.sqlite

- follow firefox naming for cleaning webappsstore.sqlite

Link to comment
Share on other sites

@Winapp2.ini

got this error and winapp2ool crash when running offline while trying to setup winapp2.ini on my friend laptop

no error when running online

test function merge and trim, no problem, didn't test other features

does this cause by not using dotnet 4.6 like issue #251 on github?

win 7 sp1, dotnet 4.5.2

Untitled.png.ffdc69d56fb7163a99c2356d11fc6dd7.png

Link to comment
Share on other sites

Modified entry:  [Microsoft Edge *]

Removed FileKey8 because it deletes the URL icons of links in the Favorites bar.

FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\Datastore\Data\nouser1\*\Favorites|*.ico

[Microsoft Edge *]
LangSecRef=3022
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe
DetectFile=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe
Default=False
FileKey1=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\INetCookies|*.*|RECURSE
FileKey2=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\Microsoft\Cryptnet*Cache|*.*|RECURSE
FileKey3=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\#!00*\MicrosoftEdge\Cookies|*.*|RECURSE
FileKey4=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Microsoft\Cryptnet*Cache|*.*|RECURSE
FileKey5=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\Cookies|*.*|RECURSE
FileKey6=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\UrlBlock|*.tmp
FileKey7=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\*\DBStore|V01*.log;V01*.jrs
FileKey8=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\DataStore\Indexed\Data\nouser1\*|*.*|RECURSE
FileKey9=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\ImageStore|*.*|RECURSE
FileKey10=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\MicrosoftEdge\User\Default\Recovery\Active|*.dat
FileKey11=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AC\Temp|*.*|RECURSE
FileKey12=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\AppData\User\Default\Indexed DB|*.*|RECURSE
FileKey13=%LocalAppData%\Packages\Microsoft.MicrosoftEdge_*\LocalState\Favicons\PushNotificationGrouping|*.*|RECURSE
FileKey14=%UserProfile%\MicrosoftEdgeBackups\backups\*|*.*|REMOVESELF
RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete
RegKey2=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultOpenFileMultiple
RegKey3=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultOpenFileSingle
RegKey4=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedPickerData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge\DefaultSaveFileSingle

 

 

EdgeURLIcons.png

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

On 10/30/2018 at 09:47, dvdbane said:

@Winapp2.ini

got this error and winapp2ool crash when running offline while trying to setup winapp2.ini on my friend laptop

no error when running online

test function merge and trim, no problem, didn't test other features

does this cause by not using dotnet 4.6 like issue #251 on github?

win 7 sp1, dotnet 4.5.2

Untitled.png.ffdc69d56fb7163a99c2356d11fc6dd7.png

This error wasn't happening in my development environment (probably due to the nature of debugging applications) but it should be fixed in the next winapp2ool update. The application is intended to be usable when offline (with the exception of online functions)

If using .NET 4.5.2 you should also see a message on the menu informing you that the tool requires .NET 4.6 but 4.6 is only required to use TLS 1.2 for downloading the executable. Everything else should work as expected

Link to comment
Share on other sites

As for the Microsoft Edge Favorites icons, I believe it is a sensitive area because deleted Favorites’ icons remain in that location and don’t get removed. Favorites icons get repopulated after opening Microsoft Edge. I don’t think it is a wise idea to remove that FileKey from that entry.

I believe the Firefox and Chrome entries also remove bookmarks’ icons.

Link to comment
Share on other sites

5 hours ago, SMalik said:

As for the Microsoft Edge Favorites icons, I believe it is a sensitive area because deleted Favorites’ icons remain in that location and don’t get removed. Favorites icons get repopulated after opening Microsoft Edge. I don’t think it is a wise idea to remove that FileKey from that entry.

I believe the Firefox and Chrome entries also remove bookmarks’ icons.

They do not get repopulated unless you re-visit each and every one of the links manually. 

Comment:  I'd much rather have a separate entry [Microsoft Edge Favorites *] with a warning that it is going to delete all the Favorites icons and the icons will be rebuilt as websites are manually re-visited.

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

New Entry

[iMyFone Umate *]
LangSecRef=3024
Detect=HKLM\Software\iMyFone\Umate
Default=False
FileKey1=%ProgramFiles%\iMyFone\iMyFone Umate|mate.log
FileKey2=%ProgramFiles%\iMyFone\iMyFone Umate\cache|*.*|RECURSE
FileKey3=%ProgramFiles%\iMyFone\iMyFone Umate\Log|*.*|RECURSE
FileKey4=%ProgramFiles%\iMyFone\iMyFone Umate\temp|*.*|RECURSE

Link to comment
Share on other sites

A new version of winapp2ool.exe is available for testing (not yet pushed to master)

Should be of particular interest to WindowsXP users, as there is now a version that should work on your system. Please let me know if anything jumps out as super broken.

 

https://github.com/MoscaDotTo/Winapp2/pull/318

Link to comment
Share on other sites

Modified Entry:   [Dell Logs *]

Added:   Detect1, Detect2, Detect3, FileKey4, FileKey6/7/8/9

[Dell Logs *]
LangSecRef=3024
Detect1=HKLM\Software\Dell\MUP
Detect2=HKLM\Software\Dell\UpdateService
Detect3=HKLM\Software\PC-Doctor
DetectFile1=%AppData%\Creative\DELL Webcam Center
DetectFile2=%CommonAppData%\Dell
DetectFile3=%LocalAppData%\Dell
DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
DetectFile5=%ProgramFiles%\Dell*
Default=False
FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
FileKey2=%AppData%\PCDr\*\Logs|*.*
FileKey3=%CommonAppData%\Dell\*\Log|*.*
FileKey4=%CommonAppData%\Dell\Digital Delivery\Logs|*.*
FileKey5=%CommonAppData%\Dell\Drivers\*|*.tmp
FileKey6=%CommonAppData%\Dell\Update|*.txt
FileKey7=%CommonAppData%\Dell\Update\Logs|*.*
FileKey8=%CommonAppData%\Dell\UpdatePackage\Log|*.*
FileKey9=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
FileKey10=%CommonAppData%\PCDr\*\Cache|*.xml
FileKey11=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
FileKey12=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
FileKey13=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
FileKey14=%CommonAppData%\PCDr\*\Logs|*.log
FileKey15=%LocalAppData%\Dell\*\Log|*.*
FileKey16=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
FileKey17=%LocalAppData%\VirtualStore\Program Files*\Dell*|*.log|RECURSE
FileKey18=%LocalAppData%\VirtualStore\ProgramData\Dell\*\Log|*.*
FileKey19=%ProgramFiles%\Dell*|*.log|RECURSE

 

Remove:  [Dell PC-Doctor (Logs) *]  because it is incorporated in [Dell Logs *].   Note:  Please confirm my assertion that Dell PC-Doctor (Logs) is not needed.  

;[Dell PC-Doctor (Logs) *]
;LangSecRef=3024
;Detect=HKLM\Software\PC-Doctor
;Default=False
;FileKey1=%AppData%\PCDr\Installer\Logs|*.log
;FileKey2=%AppData%\PCDr\Update\Logs|*.log
;FileKey3=%CommonAppData%\PCDr\6299\Logs|*.log
;FileKey4=%CommonAppData%\PCDr\6992\Logs|*.log
;FileKey5=%CommonAppData%\PCDr\7060\Logs|*.log
;FileKey6=%CommonAppData%\PCDr\Installer\Logs|*.log
;FileKey7=%CommonAppData%\PCDr\Updater\Logs|*.log

 

Edited by siliconman01
Incorporated latest Dell Logs files.

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Modified Entry:  [Dell PC Doctor *] changed to [Dell PC Doctor (.dmp) *]

[Dell PC Doctor (.dmp) *]
LangSecRef=3024
DetectFile=%CommonAppData%\PCDr
Default=False
FileKey1=%CommonAppData%\PCDr|*.dmp|RECURSE
FileKey2=%LocalAppData%\VirtualStore\ProgramData\PCDr|*.dmp|RECURSE

 

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

30 minutes ago, siliconman01 said:

Remove:  [Dell PC-Doctor (Logs) *]  because it is incorporated in [Dell Logs *].   Note:  Please confirm my assertion that Dell PC-Doctor (Logs) is not needed. ...

Are you using a custom Winapp2.ini file? Because this entry doesn't exist in the official file. And yes, it is covered by the entry [Dell Logs *] already.

27 minutes ago, siliconman01 said:

Modified Entry:  [Dell PC Doctor *] changed to [Dell PC Doctor (.dmp) *]

As we don't use brackets in entries names anymore, is [Dell PC Doctor Dumps *] also ok for you?

Link to comment
Share on other sites

51 minutes ago, siliconman01 said:

Modified Entry:   [Dell Logs *]

Added:   Detect1, Detect2, Detect3, FileKey4, FileKey6/7/8/9 ...

FileKey4 and 7 can be merged to: FileKey4=%CommonAppData%\Dell\*\Logs|*.*
FileKey8 is covered by FileKey3 already.

[Dell Logs *]
LangSecRef=3024
Detect1=HKLM\Software\Dell\MUP
Detect2=HKLM\Software\Dell\UpdateService
Detect3=HKLM\Software\PC-Doctor
DetectFile1=%AppData%\Creative\DELL Webcam Center
DetectFile2=%CommonAppData%\Dell
DetectFile3=%LocalAppData%\Dell
DetectFile4=%LocalAppData%\SupportSoft\DellSupportCenter
DetectFile5=%ProgramFiles%\Dell*
Default=False
FileKey1=%AppData%\Creative\DELL Webcam Center|MO_Log.txt
FileKey2=%AppData%\PCDr\*\Logs|*.*
FileKey3=%CommonAppData%\Dell\*\Log|*.*
FileKey4=%CommonAppData%\Dell\*\Logs|*.*
FileKey5=%CommonAppData%\Dell\Drivers\*|*.tmp
FileKey6=%CommonAppData%\Dell\Update|*.txt
FileKey7=%CommonAppData%\Dell\UpdateService\Clients\Update|*.log
FileKey8=%CommonAppData%\PCDr\*\Cache|*.xml
FileKey9=%CommonAppData%\PCDr\*\Cache\archives|*.*|RECURSE
FileKey10=%CommonAppData%\PCDr\*\Cache\BUMA|*.*
FileKey11=%CommonAppData%\PCDr\*\Cache\DriverScan|*.*
FileKey12=%CommonAppData%\PCDr\*\Logs|*.log
FileKey13=%LocalAppData%\Dell\*\Log|*.*
FileKey14=%LocalAppData%\SupportSoft\DellSupportCenter\*\state\logs|*.*
FileKey15=%LocalAppData%\VirtualStore\Program Files*\Dell*|*.log|RECURSE
FileKey16=%LocalAppData%\VirtualStore\ProgramData\Dell\*\Log|*.*
FileKey17=%ProgramFiles%\Dell*|*.log|RECURSE

Link to comment
Share on other sites

19 minutes ago, APMichael said:

Are you using a custom Winapp2.ini file? Because this entry doesn't exist in the official file. And yes, it is covered by the entry [Dell Logs *] already.

As we don't use brackets in entries names anymore, is [Dell PC Doctor Dumps *] also ok for you?

ahhh...yeah [Dell PC-Doctor (Logs) *] was in my Custom File.  [Dell PC Doctor Dumps *] is fine by me.

Thanks for the refinement/confirmation of [Dell Logs *]

Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System);  Windows 11x64 Pro on 512 gigabyte Dell XPS 15 2-in-1 Laptop/tablet and Dell XPS 8940 PC.  ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system):   Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.