Skip to content

Commit

Permalink
Update Winapp2.ini (#669)
Browse files Browse the repository at this point in the history
- New and revised entries by aquila-XP.
  • Loading branch information
APMichael committed Jan 27, 2020
1 parent e21a5fe commit ca593aa
Showing 1 changed file with 216 additions and 9 deletions.
225 changes: 216 additions & 9 deletions Winapp2.ini
Expand Up @@ -4301,12 +4301,51 @@ DetectFile=%UserProfile%\.autobahn
Default=False
FileKey1=%UserProfile%\.autobahn|autobahn-log*.*

[Autodesk AutoCAD *]
LangSecRef=3021
Detect1=HKCU\Software\Autodesk\AutoCAD\R17.0
Detect2=HKCU\Software\Autodesk\AutoCAD\R18.0
Detect3=HKCU\Software\Autodesk\AutoCAD\R18.1
Detect4=HKCU\Software\Autodesk\AutoCAD\R19.0
Detect5=HKCU\Software\Autodesk\AutoCAD\R20.0
Detect6=HKCU\Software\Autodesk\AutoCAD\R23.0
Detect7=HKCU\Software\Autodesk\R19.0
Detect8=HKCU\Software\Autodesk\R22.0
Default=False
RegKey1=HKCU\Software\Autodesk\AutoCAD\R17.0\ACAD-5001:409\Recent File List
RegKey2=HKCU\Software\Autodesk\AutoCAD\R18.0\ACAD-8001:409\Recent File List
RegKey3=HKCU\Software\Autodesk\AutoCAD\R18.0\ACAD-8001:411\Recent File List
RegKey4=HKCU\Software\Autodesk\AutoCAD\R18.1\ACAD-9000:409\Recent File List
RegKey5=HKCU\Software\Autodesk\AutoCAD\R19.0\ACAD-B000:409\Recent File List
RegKey6=HKCU\Software\Autodesk\AutoCAD\R19.0\ACAD-B001:409\Recent File List
RegKey7=HKCU\Software\Autodesk\AutoCAD\R19.0\ACAD-B004:409\Recent File List
RegKey8=HKCU\Software\Autodesk\AutoCAD\R20.0\ACAD-8001:409\Recent File List
RegKey9=HKCU\Software\Autodesk\AutoCAD\R23.0\ACAD-A001:409\Recent File List
RegKey10=HKCU\Software\Autodesk\R19.0\ACAD-B005:409\Recent File List
RegKey11=HKCU\Software\Autodesk\R22.0\ACAD-1001:409\Recent File List

[Autodesk Design Review MRU *]
LangSecRef=3023
Detect=HKCU\Software\AutoDesk\DWF Common
Default=False
RegKey1=HKCU\Software\AutoDesk\DWF Common\Preferences\MRUList

[Autodesk Inventor *]
LangSecRef=3021
Detect1=HKCU\Software\Autodesk\Inventor\RegistryVersion19.0
Detect2=HKCU\Software\Autodesk\Inventor\RegistryVersion20.0
Detect3=HKCU\Software\Autodesk\Inventor\RegistryVersion21.0
Detect4=HKCU\Software\Autodesk\Inventor\RegistryVersion22.0
Detect5=HKCU\Software\Autodesk\Inventor\RegistryVersion23.0
Detect6=HKCU\Software\Autodesk\Inventor\RegistryVersion24.0
Default=False
RegKey1=HKCU\Software\Autodesk\Inventor\RegistryVersion19.0\Recent File List
RegKey2=HKCU\Software\Autodesk\Inventor\RegistryVersion20.0\Recent File List
RegKey3=HKCU\Software\Autodesk\Inventor\RegistryVersion21.0\Recent File List
RegKey4=HKCU\Software\Autodesk\Inventor\RegistryVersion22.0\Recent File List
RegKey5=HKCU\Software\Autodesk\Inventor\RegistryVersion23.0\Recent File List
RegKey6=HKCU\Software\Autodesk\Inventor\RegistryVersion24.0\Recent File List

[AutoIt3 *]
LangSecRef=3021
Detect=HKCU\Software\AutoIt v3
Expand Down Expand Up @@ -4896,6 +4935,7 @@ DetectFile2=%ProgramFiles%\BitTorrent\BitTorrent.exe
Default=False
FileKey1=%AppData%\BitTorrent\ie|*.tmp
FileKey2=%AppData%\BitTorrent\Updates|*.exe
FileKey3=%LocalLowAppData%\BitTorrent|BitTorrent_*

[BitTorrent Incomplete Downloads *]
LangSecRef=3022
Expand Down Expand Up @@ -5375,7 +5415,8 @@ Default=False
FileKey1=%AppData%\Canon_Inc_IC\DPP4\Application\Temp|*.*|RECURSE
FileKey2=%AppData%\Canon_Inc_IC\DPP4\DppMWare\Cache|*.*|RECURSE
FileKey3=%AppData%\Canon_Inc_IC\ServiceLog\AutoUpdateService|*.txt
FileKey4=%CommonAppData%\Canon_Inc_IC\UniversalInstaller\ServiceLog|*.TXT
FileKey4=%AppData%\Canon_Inc_IC\ServiceLog\imagebrowserexservice|*.txt
FileKey5=%CommonAppData%\Canon_Inc_IC\UniversalInstaller\ServiceLog|*.TXT

[Canon Inkjet Print Utility *]
LangSecRef=3031
Expand Down Expand Up @@ -6837,6 +6878,16 @@ Detect3=HKCU\Software\Valve\Steam\Apps\383180
Default=False
FileKey1=%Documents%\DeadIsland*\out\logs|*.*

[DeadHash *]
LangSecRef=3024
DetectFile=%AppData%\deadhash
Default=False
FileKey1=%AppData%\deadhash\Cache|*.*
FileKey2=%AppData%\deadhash\GPUCache|*.*
FileKey3=%AppData%\deadhash\Session Storage|*.*
FileKey4=%LocalAppData%\deadhash-updater|*.exe
FileKey5=%ProgramFiles%\DeadHash|Credits.rtf;LICENSE;LICENSES.chromium.html;LICENSE.electron.txt;terminal-notifier-LICENSE|RECURSE

[Dear Esther *]
Section=Games
Detect=HKCU\Software\Valve\Steam\Apps\203810
Expand Down Expand Up @@ -7841,12 +7892,15 @@ Detect1=HKCU\Software\DVDFab
Detect2=HKCU\Software\DVDFab Passkey
Detect3=HKCU\Software\FabPlayer
Default=False
FileKey1=%Documents%\DVDFab*|*.log
FileKey2=%Documents%\DVDFab*\Log|*.*|RECURSE
FileKey3=%Documents%\DVDFab*\SceneData|*.*|RECURSE
FileKey4=%Documents%\DVDFab*\Temp|*.*|RECURSE
FileKey5=%Documents%\PcSetup|*.*|RECURSE
RegKey1=HKCU\Software\FabPlayer|DefaultFile
FileKey1=%AppData%\DVDFab Player*\Advertise|*.*|RECURSE
FileKey2=%AppData%\DVDFab Player*\AdvertisingData|*.*|RECURSE
FileKey3=%Documents%\DVDFab*|*.log
FileKey4=%Documents%\DVDFab*\Log|*.*|RECURSE
FileKey5=%Documents%\DVDFab*\SceneData|*.*|RECURSE
FileKey6=%Documents%\DVDFab*\Temp|*.*|RECURSE
FileKey7=%Documents%\PcSetup|*.*|RECURSE
RegKey1=HKCU\Software\FabPlayer|DefaultDir
RegKey2=HKCU\Software\FabPlayer|DefaultFile

[DVDSmith *]
LangSecRef=3023
Expand Down Expand Up @@ -8602,7 +8656,7 @@ RegKey1=HKCU\Software\Shredder\{FF14D9EE-48EB-4873-80AC-8E224BEE5823}
LangSecRef=3025
DetectFile=%AppData%\Microsoft\File Transfer Manager
Default=False
FileKey1=%AppData%\Microsoft\File Transfer Manager|*.bak
FileKey1=%AppData%\Microsoft\File Transfer Manager|*.bak;ftm_History.xml

[File Type Doctor Last Selected *]
LangSecRef=3024
Expand Down Expand Up @@ -10754,7 +10808,7 @@ LangSecRef=3023
Detect=HKCU\Software\InterVideo\WinDVD4
DetectFile=%ProgramFiles%\InterVideo\WinDVD\WinDVD.exe
Default=False
FileKey1=%AppData%\InterVideo\WinDVD\5.0\Bookmark|*.bmk
FileKey1=%AppData%\InterVideo\WinDVD\*\Bookmark|*.bmk

[Intuit Data Protect *]
LangSecRef=3024
Expand Down Expand Up @@ -16844,6 +16898,120 @@ Detect=HKCU\Software\Microsoft\Windows
Default=False
FileKey1=%LocalAppData%\Microsoft\TokenBroker\Cache|*.*|RECURSE

[SecurityXploded Directory Scanner *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\DirectoryScanner
Default=False
RegKey1=HKCU\Software\SecurityXploded\DirectoryScanner|EndHostAddress
RegKey2=HKCU\Software\SecurityXploded\DirectoryScanner|StartHostAddress

[SecurityXploded FTP Password Kracker *]
LangSecRef=3024
Detect=HKCU\Software\FTP Password Kracker
Default=False
RegKey1=HKCU\Software\FTP Password Kracker|File
RegKey2=HKCU\Software\FTP Password Kracker|Port
RegKey3=HKCU\Software\FTP Password Kracker|ServerAddress
RegKey4=HKCU\Software\FTP Password Kracker|Username

[SecurityXploded Hash Kracker *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\HashKracker
Default=False
RegKey1=HKCU\Software\SecurityXploded\HashKracker|File
RegKey2=HKCU\Software\SecurityXploded\HashKracker|Hash
RegKey3=HKCU\Software\SecurityXploded\HashKracker|Type

[SecurityXploded LDAP Password Kracker *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\LDAPPasswordKracker
Default=False
RegKey1=HKCU\Software\SecurityXploded\LDAPPasswordKracker|File
RegKey2=HKCU\Software\SecurityXploded\LDAPPasswordKracker|Port
RegKey3=HKCU\Software\SecurityXploded\LDAPPasswordKracker|ServerAddress
RegKey4=HKCU\Software\SecurityXploded\LDAPPasswordKracker|Username

[SecurityXploded LDAP Search *]
LangSecRef=3024
Detect=HKCU\Software\LDAPSearch_Nag
Default=False
RegKey1=HKCU\Software\LDAPSearch_Nag|BaseDN
RegKey2=HKCU\Software\LDAPSearch_Nag|CertPath
RegKey3=HKCU\Software\LDAPSearch_Nag|IPAddress
RegKey4=HKCU\Software\LDAPSearch_Nag|LoginDN
RegKey5=HKCU\Software\LDAPSearch_Nag|Port

[SecurityXploded Mysql Password Auditor *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\MysqlPasswordAuditor
Default=False
RegKey1=HKCU\Software\SecurityXploded\MysqlPasswordAuditor|File
RegKey2=HKCU\Software\SecurityXploded\MysqlPasswordAuditor|Port
RegKey3=HKCU\Software\SecurityXploded\MysqlPasswordAuditor|ServerAddress
RegKey4=HKCU\Software\SecurityXploded\MysqlPasswordAuditor|Username

[SecurityXploded Net Database Scanner *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\NetDatabaseScanner
Default=False
RegKey1=HKCU\Software\SecurityXploded\NetDatabaseScanner|DatabaseType
RegKey2=HKCU\Software\SecurityXploded\NetDatabaseScanner|EndHostAddress
RegKey3=HKCU\Software\SecurityXploded\NetDatabaseScanner|StartHostAddress

[SecurityXploded Router Password Kracker *]
LangSecRef=3024
Detect1=HKCU\Software\RouterPasswordKracker
Detect2=HKCU\Software\SecurityXploded\RouterPasswordDecryptor
Default=False
RegKey1=HKCU\Software\RouterPasswordKracker|File
RegKey2=HKCU\Software\RouterPasswordKracker|ServerAddress
RegKey3=HKCU\Software\RouterPasswordKracker|Username
RegKey4=HKCU\Software\SecurityXploded\RouterPasswordDecryptor|File
RegKey5=HKCU\Software\SecurityXploded\RouterPasswordDecryptor|ServerAddress
RegKey6=HKCU\Software\SecurityXploded\RouterPasswordDecryptor|Username

[SecurityXploded Salted Hash Kracker *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\SaltedHashKracker
Default=False
RegKey1=HKCU\Software\SecurityXploded\SaltedHashKracker|File
RegKey2=HKCU\Software\SecurityXploded\SaltedHashKracker|Hash
RegKey3=HKCU\Software\SecurityXploded\SaltedHashKracker|Salt
RegKey4=HKCU\Software\SecurityXploded\SaltedHashKracker|Type

[SecurityXploded SSL Certificate Scanner *]
LangSecRef=3024
Detect1=HKCU\Software\SecurityXploded\SSLCertScanner
Detect2=HKCU\Software\SSLCertScanner
Default=False
RegKey1=HKCU\Software\SecurityXploded\SSLCertScanner|Port
RegKey2=HKCU\Software\SecurityXploded\SSLCertScanner|ServerAddress
RegKey3=HKCU\Software\SSLCertScanner|Port
RegKey4=HKCU\Software\SSLCertScanner|ServerAddress

[SecurityXploded Virus Total Scanner *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\VirusTotalScanner
Default=False
RegKey1=HKCU\Software\SecurityXploded\VirusTotalScanner|File

[SecurityXploded Wi-Fi Network Monitor *]
LangSecRef=3024
Detect1=HKCU\Software\SecurityXploded\WiFiNetworkMonitor
Detect2=HKCU\Software\WiFi Network Monitor
Default=False
RegKey1=HKCU\Software\SecurityXploded\WiFiNetworkMonitor|EndHostAddress
RegKey2=HKCU\Software\SecurityXploded\WiFiNetworkMonitor|StartHostAddress
RegKey3=HKCU\Software\WiFi Network Monitor|EndHostAddress
RegKey4=HKCU\Software\WiFi Network Monitor|StartHostAddress

[SecurityXploded Windows Password Kracker *]
LangSecRef=3024
Detect=HKCU\Software\SecurityXploded\WindowsPasswordKracker
Default=False
RegKey1=HKCU\Software\SecurityXploded\WindowsPasswordKracker|File
RegKey2=HKCU\Software\SecurityXploded\WindowsPasswordKracker|Hash

[SecuROM Diagnostics Tool *]
Section=Games
DetectFile1=%SystemDrive%\AnalysisLog.sr0
Expand Down Expand Up @@ -17426,6 +17594,31 @@ Detect=HKCU\Software\Valve\Steam\Apps\284990
Default=False
FileKey1=%ProgramFiles%\Steam\SteamApps\common\Solarix\UDKGame\Logs|*.*

[SolidWorks *]
LangSecRef=3021
Detect1=HKCU\Software\Solidworks\SolidWorks 2012
Detect2=HKCU\Software\SolidWorks\SolidWorks 2013
Detect3=HKCU\Software\Solidworks\SolidWorks 2014
Detect4=HKCU\Software\SolidWorks\Solidworks 2015
Detect5=HKCU\Software\SolidWorks\Solidworks 2016
Detect6=HKCU\Software\SolidWorks\SOLIDWORKS 2017
Detect7=HKCU\Software\Solidworks\SOLIDWORKS 2018
Detect8=HKCU\Software\Solidworks\SOLIDWORKS 2019
Detect9=HKCU\Software\SolidWorks\SOLIDWORKS 2020
Default=False
RegKey1=HKCU\Software\Solidworks\SolidWorks 2012\Recent File List
RegKey2=HKCU\Software\SolidWorks\SolidWorks 2013\Recent File List
RegKey3=HKCU\Software\Solidworks\SolidWorks 2014\Recent File List
RegKey4=HKCU\Software\SolidWorks\Solidworks 2015\Recent File List
RegKey5=HKCU\Software\SolidWorks\Solidworks 2016\Recent File List
RegKey6=HKCU\Software\SolidWorks\SOLIDWORKS 2017\Recent File List
RegKey7=HKCU\Software\Solidworks\SOLIDWORKS 2018\Recent File List
RegKey8=HKCU\Software\Solidworks\SOLIDWORKS 2018\Recent Folder List
RegKey9=HKCU\Software\Solidworks\SOLIDWORKS 2019\Recent File List
RegKey10=HKCU\Software\Solidworks\SOLIDWORKS 2019\Recent Folder List
RegKey11=HKCU\Software\SolidWorks\SOLIDWORKS 2020\Recent File List
RegKey12=HKCU\Software\SolidWorks\SOLIDWORKS 2020\Recent Folder List

[Solway Password Kernel *]
LangSecRef=3021
Detect=HKCU\Software\SolwaySoftware\PasswordKernel
Expand Down Expand Up @@ -18035,6 +18228,13 @@ DetectFile=%AppData%\StepMania*
Default=False
FileKey1=%AppData%\Stepmania*\Logs|*.*

[SterJo NetStalker *]
LangSecRef=3022
DetectFile=%LocalAppData%\SterJo NetStalker
Default=False
FileKey1=%LocalAppData%\SterJo NetStalker|dscnt.exe;History.sjh
FileKey2=%LocalAppData%\SterJo NetStalker\Logs|*.*

[Stocks and Futures *]
LangSecRef=3031
Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\24877CutthroatSoftware.StocksandFutures_xgnzh3xnefnqe
Expand Down Expand Up @@ -20255,11 +20455,18 @@ DetectFile=%AppData%\WildTangent
Default=False
FileKey1=%AppData%\WildTangent\Logs|*.*

[Winaero Tweaker *]
LangSecRef=3024
Detect=HKCU\Software\Winaero.com\Winaero Tweaker
Default=False
RegKey1=HKCU\Software\Winaero.com\Winaero Tweaker|SetupDir

[Winamp *]
LangSecRef=3023
Detect=HKCU\Software\Winamp
Default=False
FileKey1=%AppData%\Winamp\Plugins|*.dmp;*.log;feedback.ini;report.zip
FileKey2=%ProgramFiles%\Winamp|*log.txt

[Winamp Playlist *]
LangSecRef=3023
Expand Down

0 comments on commit ca593aa

Please sign in to comment.