Browse Source

Implement proper support for W11

review
Joe 1 year ago
parent
commit
d8d2366f1d
161 changed files with 5402 additions and 2505 deletions
  1. +5
    -4
      21H1-22H2_PB/Configuration/custom.yml
  2. +3
    -2
      21H1-22H2_PB/Configuration/features/base/admin.yml
  3. +21
    -0
      21H1-22H2_PB/Configuration/features/base/base.yml
  4. +7
    -7
      21H1-22H2_PB/Configuration/features/base/choco.yml
  5. +28
    -0
      21H1-22H2_PB/Configuration/features/base/components.yml
  6. +46
    -5
      21H1-22H2_PB/Configuration/features/base/files.yml
  7. +8
    -0
      21H1-22H2_PB/Configuration/features/base/login.yml
  8. +3
    -2
      21H1-22H2_PB/Configuration/features/base/permission.yml
  9. +0
    -0
      21H1-22H2_PB/Configuration/features/base/services.yml
  10. +3
    -2
      21H1-22H2_PB/Configuration/features/base/shortcuts.yml
  11. +13
    -0
      21H1-22H2_PB/Configuration/features/base/silent.yml
  12. +3
    -2
      21H1-22H2_PB/Configuration/features/base/wallpaper.yml
  13. +3
    -2
      21H1-22H2_PB/Configuration/features/base/windowsterminal.yml
  14. +0
    -0
      21H1-22H2_PB/Configuration/features/languages/lang.yml
  15. +0
    -0
      21H1-22H2_PB/Configuration/langs.txt
  16. +2
    -1
      21H1-22H2_PB/Executables/ADMIN.bat
  17. +94
    -0
      21H1-22H2_PB/Executables/APPX.bat
  18. +24
    -0
      21H1-22H2_PB/Executables/CHOC.bat
  19. +41
    -0
      21H1-22H2_PB/Executables/CONVERT.bat
  20. +0
    -0
      21H1-22H2_PB/Executables/DNET.bat
  21. +169
    -0
      21H1-22H2_PB/Executables/EDGE.bat
  22. +16
    -0
      21H1-22H2_PB/Executables/EDGEX.bat
  23. +13
    -0
      21H1-22H2_PB/Executables/FILEASSOC.bat
  24. +9
    -2
      21H1-22H2_PB/Executables/FIREFOXCONF.bat
  25. +18
    -0
      21H1-22H2_PB/Executables/LOGIN.bat
  26. +1
    -1
      21H1-22H2_PB/Executables/Layout.xml
  27. +443
    -0
      21H1-22H2_PB/Executables/ONED.bat
  28. BIN
      21H1-22H2_PB/Executables/OldClassicCalc-2.0-setup.exe
  29. BIN
      21H1-22H2_PB/Executables/OpenShellSetup_4_4_170.exe
  30. +0
    -0
      21H1-22H2_PB/Executables/PERM.bat
  31. +71
    -15
      21H1-22H2_PB/Executables/REGI.bat
  32. +6
    -4
      21H1-22H2_PB/Executables/SERV.bat
  33. +23
    -2
      21H1-22H2_PB/Executables/SHRT.bat
  34. +87
    -0
      21H1-22H2_PB/Executables/SLNT.bat
  35. +0
    -0
      21H1-22H2_PB/Executables/TILE.bat
  36. +77
    -0
      21H1-22H2_PB/Executables/UI.bat
  37. +0
    -0
      21H1-22H2_PB/Executables/UPDATES.bat
  38. +31
    -0
      21H1-22H2_PB/Executables/UPDHEALTH.bat
  39. BIN
      21H1-22H2_PB/Executables/UsrClass.dat
  40. +29
    -12
      21H1-22H2_PB/Executables/WALLPAPER.bat
  41. +0
    -0
      21H1-22H2_PB/Executables/WINTERM.bat
  42. BIN
      21H1-22H2_PB/Executables/ep_setup-22621.608.51.4.exe
  43. BIN
      21H2-22H2_Standalone.zip
  44. +0
    -38
      Configuration/features/base/base.yml
  45. +0
    -8
      Configuration/features/base/login.yml
  46. +0
    -8
      Configuration/features/base/silent.yml
  47. BIN
      Executables/7za.dll
  48. BIN
      Executables/7za.exe
  49. BIN
      Executables/7zxa.dll
  50. +0
    -42
      Executables/APPX.bat
  51. BIN
      Executables/Albacore.ViVe.dll
  52. +0
    -4
      Executables/BANN.bat
  53. +0
    -78
      Executables/CHOC.bat
  54. +0
    -6
      Executables/DEFENDER.bat
  55. +0
    -20
      Executables/EDGE.bat
  56. +0
    -5
      Executables/EDGEX.bat
  57. +0
    -32
      Executables/FILEASSOC.bat
  58. +0
    -17
      Executables/FileAssociations.xml
  59. +0
    -8
      Executables/LOGIN.bat
  60. +0
    -1
      Executables/ONED.bat
  61. +0
    -2
      Executables/PRESS.bat
  62. +0
    -5
      Executables/PYTH.bat
  63. +0
    -1511
      Executables/Packages.txt
  64. +0
    -69
      Executables/SFCDEPLOY.bat
  65. +0
    -67
      Executables/SLNT.bat
  66. +0
    -34
      Executables/UI.bat
  67. BIN
      Executables/ViVeTool.exe
  68. +0
    -1
      Executables/WAIT.bat
  69. +0
    -255
      Executables/assoc.ps1
  70. BIN
      Executables/credprovhost.dll.mui
  71. BIN
      Executables/install_wim_tweak.exe
  72. BIN
      Executables/python-3.9.7-amd64.exe
  73. +0
    -54
      Executables/remove_SecHealthUI_stub.py
  74. +0
    -175
      Executables/sfc.cmd
  75. BIN
      Executables/silent_installers.7z
  76. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extension-preferences.json
  77. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extension-settings.json
  78. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extensions.json
  79. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi
  80. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/places.sqlite
  81. +8
    -1
      Shared_PB/Executables/AME-Firefox-Injection/prefs.js
  82. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/search.json.mozlz4
  83. BIN
      Shared_PB/Executables/Associations.dll
  84. +0
    -0
      Shared_PB/Executables/Fluent-Metro.skin
  85. +0
    -0
      Shared_PB/Executables/Fluent-Metro.skin7
  86. +0
    -0
      Shared_PB/Executables/NSudoLC.exe
  87. +0
    -0
      Shared_PB/Executables/ProcessHacker/CHANGELOG.txt
  88. +0
    -0
      Shared_PB/Executables/ProcessHacker/COPYRIGHT.txt
  89. +0
    -0
      Shared_PB/Executables/ProcessHacker/LICENSE.txt
  90. +0
    -0
      Shared_PB/Executables/ProcessHacker/README.txt
  91. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/ProcessHacker.exe
  92. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/kprocesshacker.sys
  93. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/peview.exe
  94. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/DotNetTools.dll
  95. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll
  96. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedServices.dll
  97. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedTools.dll
  98. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/NetworkTools.dll
  99. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/OnlineChecks.dll
  100. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/SbieSupport.dll

Configuration/custom.yml → 21H1-22H2_PB/Configuration/custom.yml View File

@ -5,12 +5,13 @@ privilege: Admin
actions: []
features:
- features/base/base.yml
- features/base/components.yml
- features/base/files.yml
- features/base/login.yml
- features/base/shortcuts.yml
- features/base/choco.yml
- features/base/windowsterminal.yml
- features/base/silent.yml
- features/base/login.yml
- features/base/wallpaper.yml
- features/base/permission.yml
- features/base/admin.yml
- features/base/admin.yml
- features/base/windowsterminal.yml
- features/base/choco.yml

Configuration/features/base/admin.yml → 21H1-22H2_PB/Configuration/features/base/admin.yml View File

@ -4,5 +4,6 @@ description: Remove user from admin group, enable administrator account
privilege: Admin
actions:
- !run:
currentDir: true
exe: "ADMIN.bat"
exeDir: true
exe: "ADMIN.bat"
weight: 10

+ 21
- 0
21H1-22H2_PB/Configuration/features/base/base.yml View File

@ -0,0 +1,21 @@
---
title: Base
description: Base AME configuration
privilege: Admin
actions:
- !run:
exeDir: true
exe: "DNET.bat"
weight: 60
- !run:
exeDir: true
exe: "REGI.bat"
weight: 30
- !run:
exeDir: true
exe: "SFCDEPLOY.bat"
weight: 5
- !run:
exeDir: true
exe: "TILE.bat"
weight: 15

Configuration/features/base/choco.yml → 21H1-22H2_PB/Configuration/features/base/choco.yml View File

@ -4,14 +4,14 @@ description: Chocolatey configuration
privilege: Admin
actions:
- !run:
currentDir: true
exeDir: true
exe: "CHOC.bat"
weight: 250
- !run:
currentDir: true
exe: "UI.bat"
- !run:
currentDir: true
exeDir: true
exe: "FIREFOXCONF.bat"
weight: 20
- !run:
currentDir: true
exe: "FILEASSOC.bat"
exeDir: true
exe: "FILEASSOC.bat"
weight: 50

+ 28
- 0
21H1-22H2_PB/Configuration/features/base/components.yml View File

@ -0,0 +1,28 @@
title: Components
description: Remove certain windows components
privilege: TrustedInstaller
actions:
- !run:
exeDir: true
exe: "EDGE.bat"
weight: 20
- !run:
exeDir: true
exe: "EDGEX.bat"
weight: 10
- !run:
exeDir: true
exe: "ONED.bat"
weight: 20
- !run:
exeDir: true
exe: "UPDHEALTH.bat"
weight: 20
- !run:
exeDir: true
exe: "APPX.bat"
weight: 120
- !run:
exeDir: true
exe: "CONVERT.bat"
weight: 10

Configuration/features/base/files.yml → 21H1-22H2_PB/Configuration/features/base/files.yml View File

@ -2,6 +2,9 @@ title: Files
description: delete files
privilege: TrustedInstaller
actions:
- !run:
exeDir: true
exe: "SERV.bat"
- !cmd:
command: "taskkill /f /im explorer.exe"
- !cmd:
@ -116,10 +119,15 @@ actions:
path: "%windir%\\System32\\wscsvc.dll"
- !file:
path: "%ProgramW6432%\\Windows Defender"
weight: 10
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows Defender"
path: "%ProgramData%\\Microsoft\\Windows Defender"
weight: 10
- !file:
path: "%ProgramFiles(x86)%\\Windows Defender"
weight: 10
- !file:
path: "%ProgramData%\\Microsoft OneDrive"
- !file:
path: "%ProgramW6432%\\Microsoft Update Health Tools"
- !file:
@ -148,8 +156,34 @@ actions:
path: "%ProgramW6432%\\Windows Defender Advanced Threat Protection"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection"
- !file:
path: "%windir%\\System32\\MoNotificationUx.exe"
- !file:
path: "%windir%\\System32\\MusNotifyIcon.exe"
- !file:
path: "%windir%\\System32\\MusNotificationUx.exe"
- !file:
path: "%windir%\\System32\\MoNotifyIconHandler.dll"
- !file:
path: "%windir%\\System32\\MusUpdateHandlers.dll"
- !file:
path: "%windir%\\System32\\MusDialogHandlers.dll"
- !file:
path: "%windir%\\System32\\MusUxToastHandler.dll"
- !file:
path: "%windir%\\UUS"
# - !file:
# path: "%windir%\\SoftwareDistribution"
- !file:
path: "%windir%\\System32\\OOBE"
# - !file:
# path: "%windir%\\System32\\SgrmBroker.exe"
# - !file:
# path: "%windir%\\System32\\SgrmEnclave.dll"
# - !file:
# path: "%windir%\\System32\\SgrmEnclave_secure.dll"
# - !file:
# path: "%windir%\\System32\\SgrmLpac.exe"
- !file:
path: "%ProgramW6432%\\Windows Security"
- !file:
@ -162,6 +196,7 @@ actions:
path: "%windir%\\System32\\wuaueng.dll"
- !file:
path: "%ProgramFiles(x86)%\\Microsoft"
weight: 30
- !file:
path: "%windir%\\System32\\AppLockerCSP.dll"
- !file:
@ -197,9 +232,13 @@ actions:
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\Provisioning\\provautologger_del.reg"
- !file:
path: "%windir%\\System32\\ClipSVC.dll"
path: "%windir%\\SysWOW64\\OneDriveSetup.exe"
- !file:
path: "%windir%\\System32\\en-US\\clipsvc.dll.mui"
path: "%windir%\\SysWOW64\\OneDriveSettingSyncProvider.dll"
#- !file:
# path: "%windir%\\System32\\ClipSVC.dll"
#- !file:
# path: "%windir%\\System32\\en-US\\clipsvc.dll.mui"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\ClipSVC\\tokens.dat"
- !file:
@ -236,6 +275,8 @@ actions:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimizationVerboseLogs.psm1"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\migration.dat"
- !taskkill:
name: "LogonUI"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\dosvcState.dat"
- !file:
@ -670,5 +711,5 @@ actions:
path: "%windir%\\System32\\wups2.dll"
- !file:
path: "%windir%\\System32\\wuaueng.dll"
- !cmd:
command: "start explorer.exe"
- !file:
path: "%windir%\\System32\\calc.exe"

+ 8
- 0
21H1-22H2_PB/Configuration/features/base/login.yml View File

@ -0,0 +1,8 @@
---
title: Login
description: Modifies login screen
privilege: TrustedInstaller
actions:
- !run:
exeDir: true
exe: "LOGIN.bat"

Configuration/features/base/permission.yml → 21H1-22H2_PB/Configuration/features/base/permission.yml View File

@ -4,5 +4,6 @@ description: Sets UAC level and user permissions
privilege: Admin
actions:
- !run:
currentDir: true
exe: "PERM.bat"
exeDir: true
exe: "PERM.bat"
weight: 10

Configuration/features/base/services.yml → 21H1-22H2_PB/Configuration/features/base/services.yml View File


Configuration/features/base/shortcuts.yml → 21H1-22H2_PB/Configuration/features/base/shortcuts.yml View File

@ -4,5 +4,6 @@ description: Remove and add shortcuts
privilege: Admin
actions:
- !run:
currentDir: true
exe: "SHRT.bat"
exeDir: true
exe: "SHRT.bat"
weight: 5

+ 13
- 0
21H1-22H2_PB/Configuration/features/base/silent.yml View File

@ -0,0 +1,13 @@
---
title: Silent Installers
description: Silent Installers for Windows 7 Calculator
privilege: Admin
actions:
- !run:
exeDir: true
exe: "UI.bat"
weight: 70
- !run:
exeDir: true
exe: "SLNT.bat"
weight: 50

Configuration/features/base/wallpaper.yml → 21H1-22H2_PB/Configuration/features/base/wallpaper.yml View File

@ -4,5 +4,6 @@ description: Installs Malte Wallpapers
privilege: Admin
actions:
- !run:
currentDir: true
exe: "WALLPAPER.bat"
exeDir: true
exe: "WALLPAPER.bat"
weight: 20

Configuration/features/base/windowsterminal.yml → 21H1-22H2_PB/Configuration/features/base/windowsterminal.yml View File

@ -4,5 +4,6 @@ description: Installs Windows Terminal
privilege: Admin
actions:
- !run:
currentDir: true
exe: "WINTERM.bat"
exeDir: true
exe: "WINTERM.bat"
weight: 120

Configuration/features/languages/lang.yml → 21H1-22H2_PB/Configuration/features/languages/lang.yml View File


Configuration/langs.txt → 21H1-22H2_PB/Configuration/langs.txt View File


Executables/ADMIN.bat → 21H1-22H2_PB/Executables/ADMIN.bat View File

@ -1,11 +1,12 @@
net user Administrator /active:yes
net user Administrator malte
@echo OFF
for /f "usebackq delims=" %%A in (`net localgroup users ^| findstr /V /I /c:"NT AUTHORITY\\" /c:"Alias name" /c:"Comment" /c:"Members" /c:"------------------------------------------------------------" /c:"The command completed"`) do (
for /f "usebackq delims=" %%A in (`net localgroup administrators ^| findstr /V /X /I /R /c:"Alias name[ ].*" /c:"Comment[ ].*" /c:"Members" /c:"-*" /c:"The command completed.*" /c:"Administrator"`) do (
echo net localgroup administrators "%%A" /delete
net localgroup administrators "%%A" /delete
)
@echo ON
schtasks /create /tn "AME Admin Log-off" /tr "CMD /C 'SCHTASKS /run /tn 'AME Admin Log-off Msg' & Logoff'" /ru "Administrator" /sc ONLOGON /it /rl HIGHEST /f > NUL
PowerShell -NoP -C "$TaskSet = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries; Set-ScheduledTask -TaskName 'AME Admin Log-off Msg' -Settings $TaskSet" > NUL
schtasks /create /tn "AME Admin Log-off Msg" /tr "PowerShell -NoP -C 'While($lim -lt 20){WMIC computersystem get username|findstr /c:'\Administrator ';if(!$?){Break};$lim++;Sleep 1};'''Logging in as the Administrator user is not supported on AME.`nPlease login using a different account.'''|Msg *'" /sc MONTHLY /f /rl HIGHEST /ru "SYSTEM" > NUL

+ 94
- 0
21H1-22H2_PB/Executables/APPX.bat View File

@ -0,0 +1,94 @@
cd Executables\ame-assassin
ame-assassin -Family *Microsoft.549981C3F5F10*
ame-assassin -Family *3DViewer*
ame-assassin -Family *AssignedAccessLockApp*
ame-assassin -Family *PinningConfirmationDialog*
ame-assassin -Family *SecureAssessmentBrowser*
ame-assassin -Family *FeedbackHub*
ame-assassin -Family *MixedReality*
ame-assassin -Family *Microsoft.Calculator*
ame-assassin -Family *Microsoft.WindowsAlarms*
ame-assassin -Family *Microsoft.GetHelp*
ame-assassin -Family *Getstarted*
ame-assassin -Family *disney*
ame-assassin -Family *Microsoft.OneConnect*
ame-assassin -Family *WindowsCamera*
ame-assassin -Family *bing*
ame-assassin -Family *Sticky*
ame-assassin -Family *Microsoft.WindowsStore*
ame-assassin -Family *StorePurchaseApp*
ame-assassin -Family *MicrosoftOfficeHub*
ame-assassin -Family *Paint*
ame-assassin -Family *wallet*
ame-assassin -Family *OneNote*
ame-assassin -Family *Microsoft.People*
ame-assassin -Family *WindowsPhone*
ame-assassin -Family *YourPhone*
ame-assassin -Family *photos*
ame-assassin -Family *SkypeApp*
ame-assassin -Family *solit*
ame-assassin -Family *spotify*
ame-assassin -Family *WindowsSoundRecorder*
ame-assassin -Family *windowscommunicationsapps*
ame-assassin -Family *zune*
ame-assassin -Family *WindowsCalculator*
ame-assassin -Family *WindowsMaps*
ame-assassin -Family *Sway*
ame-assassin -Family *CommsPhone*
ame-assassin -Family *ConnectivityStore*
ame-assassin -Family *Microsoft.Messaging*
ame-assassin -Family *Microsoft.WindowsStore*
ame-assassin -Family *XboxApp*
ame-assassin -Family *GamingApp*
ame-assassin -Family *XboxSpeechToTextOverlay*
ame-assassin -Family *XboxGamingOverlay*
ame-assassin -App *WebExperienceHost* -Verbose
ame-assassin -Family *XboxGameOverlay*
ame-assassin -Family *Xbox.TCUI*
ame-assassin -Family *XboxGameCallableUI*
ame-assassin -Family *XboxIdenitity*
ame-assassin -Family *SecHealthUI*
ame-assassin -Family *Microsoft.Todos*
ame-assassin -Family *PowerAutomate*
ame-assassin -Family *MicrosoftEdge*
ame-assassin -Family *OneDrive*
::ame-assassin -Family *DesktopAppInstaller*
ame-assassin -Family *PeopleExperienceHost*
ame-assassin -Family *Parental*
ame-assassin -Family *CloudExperienceHost*
ame-assassin -Family *ContentDeliveryManager*
ame-assassin -Family *Client.WebExperience*
ame-assassin -Family *Apprep.Chx*
ame-assassin -Family *OOBENetwork*
ame-assassin -Family *MicrosoftTeams*
ame-assassin -Family *Clipchamp*
ame-assassin -App *Global.IrisService* -Verbose
ame-assassin -App *Global.Accounts* -Verbose
ame-assassin -App *Global.ValueBanner* -Verbose
ame-assassin -ClearCache *Client.CBS*
ame-assassin -ClearCache *StartMenuExperienceHost*
ame-assassin -ClearCache *Windows.Search*
::ame-assassin -Extension *Client.CBS* SystemSettingsExtensions.dll
::ame-assassin -Extension *Client.CBS* SearchUx.InternalWebAPi.dll
@echo OFF
for /f "usebackq delims=" %%A in (`dir /b "%WINDIR%\SystemApps\*Client.CBS*"`) do (
echo del /q /f "%WINDIR%\SystemApps\%%A\SystemSettingsExtensions.dll"
del /q /f "%WINDIR%\SystemApps\%%A\SystemSettingsExtensions.dll"
)

+ 24
- 0
21H1-22H2_PB/Executables/CHOC.bat View File

@ -0,0 +1,24 @@
cd Executables
reg query "HKLM\SOFTWARE\Clients\StartMenuInternet" /k /f "Firefox-" > "%TEMP%\Firefox-Reg-Output.txt"
@PowerShell -NoP -ExecutionPolicy Bypass -C "iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1'))" && set "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"
@PowerShell -NoP -ExecutionPolicy Bypass -C "choco install -y --force --allow-empty-checksums firefox thunderbird vlc 7zip jpegview vcredist-all directx onlyoffice cascadiamono"
:: Load Open-Shell menu
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 1 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
::@PowerShell -NoP -ExecutionPolicy Bypass -C "choco install -y --force --allow-empty-checksums -n eartrumpet"
::if exist "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip" (
:: echo PowerShell -NoP -C "Expand-Archive -Path '%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip' -DestinationPath '%ALLUSERSPROFILE%\EarTrumpet'"
:: PowerShell -NoP -C "Expand-Archive -Path '%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip' -DestinationPath '%ALLUSERSPROFILE%\EarTrumpet'"
:: echo rmdir /q /s "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet"
:: rmdir /q /s "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet"
:: echo mkdir "%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
:: mkdir "%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
:: echo PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EarTrumpet.lnk'); $S.TargetPath = '%ALLUSERSPROFILE%\EarTrumpet\EarTrumpet.exe'; $S.Save()"
:: PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EarTrumpet.lnk'); $S.TargetPath = '%ALLUSERSPROFILE%\EarTrumpet\EarTrumpet.exe'; $S.Save()"
::)

+ 41
- 0
21H1-22H2_PB/Executables/CONVERT.bat View File

@ -0,0 +1,41 @@
cd Executables
for /f "usebackq delims=" %%E in (`PowerShell -NoP -C "(Get-LocalUser | Where {$_.PrincipalSource -eq 'MicrosoftAccount'}).Name"`) do call :CONVERTUSER "%%E"
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\IdentityStore\LogonCache\Name2Sid" ^| findstr /i /c:"Name2Sid"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\IdentityStore\LogonCache\Sid2Name" ^| findstr /i /c:"Sid2Name"`) do reg delete "%%E" /f
rmdir /q /s "%WINDIR%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\CloudAPCache"
rmdir /q /s "%WINDIR%\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc"
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers" /s /f "NGC Credential Provider" ^| findstr /c:"Credential Providers\\"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers" /s /f "WLIDCredentialProvider" ^| findstr /c:"Credential Providers\\"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\IdentityStore\Providers" /s /f "MicrosoftAccount" ^| findstr /c:"Providers\\"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\IdentityStore\Providers" /s /f "MicrosoftAccount" ^| findstr /c:"Providers\\"`) do reg delete "%%E" /f
exit /b 0
:CONVERTUSER
for /f "usebackq delims=" %%E in (`reg query "HKLM\SAM\SAM\Domains\Account\Users" ^| findstr /i /c:"Account\Users"`) do (
for /f "usebackq tokens=1 delims= " %%F in (`reg query "%%E" ^| findstr /r /c:"[]*Internet" /c:"GivenName" /c:"Surname"`) do reg delete "%%E" /v "%%F" /f
)
for /f "usebackq delims=" %%E in (`PowerShell -NoP -C "(New-Object -ComObject Microsoft.DiskQuota).TranslateLogonNameToSID('%~1')"`) do set "userSID=%%E"
reg add "HKU\%userSID%\SOFTWARE\Microsoft\Windows\CurrentVersion\AccountState" /v "ExplicitLocal" /t REG_DWORD /d 1 /f
reg delete "HKU\%userSID%\SOFTWARE\Microsoft\IdentityCRL" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers" /s /f "%userSID%" ^| findstr /c:"%userSID%"`) do reg delete "%%E" /f
net user "%~1" /fullname:""
net user "%~1" malte

Executables/DNET.bat → 21H1-22H2_PB/Executables/DNET.bat View File


+ 169
- 0
21H1-22H2_PB/Executables/EDGE.bat View File

@ -0,0 +1,169 @@
taskkill /im msedge.exe /f
@echo OFF
::for /f "usebackq delims=" %%A in (`dir /b /s "%PROGRAMFILES(x86)%\Microsoft\Edge\Application\*setup.exe" ^| findstr /c:"Installer\\setup.exe"`) do (
:: echo PowerShell -NoP -C "Start-Process '%%A' -ArgumentList '--uninstall','--system-level','--verbose-logging','--force-uninstall' -NoNewWindow -Wait"
:: PowerShell -NoP -C "Start-Process '%%A' -ArgumentList '--uninstall','--system-level','--verbose-logging','--force-uninstall' -NoNewWindow -Wait"
::)
taskkill /f /im "msedge.exe"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
CALL :USERREG "%%A"
)
)
@echo ON
for /f "usebackq tokens=1 delims= " %%E in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" ^| findstr /i /c:"MicrosoftEdge" /c:"msedge"`) do reg delete "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "%%E" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarMigratedBrowserPin" /f
del /q /f "%ProgramData%\Microsoft\Windows\Start Menu\Programs\Microsoft Edge.lnk"
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall" ^| findstr /i /r /c:"Microsoft[ ]*Edge" /c:"msedge"`) do reg delete "%%E" /f
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate" /f
reg delete "HKCR\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767}" /f
reg delete "HKCR\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767}" /f
reg delete "HKCR\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}" /f
reg delete "HKCR\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}" /f
reg delete "HKCR\MSEdgeHTM" /f
reg delete "HKCR\MSEdgePDF" /f
reg delete "HKCR\MSEdgeMHT" /f
reg delete "HKCR\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}" /f
reg delete "HKLM\SOFTWARE\Clients\StartMenuInternet\Microsoft Edge" /f
reg delete "HKLM\SOFTWARE\RegisteredApplications" /v "Microsoft Edge" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\msedge.exe" /f
reg delete "HKCR\.htm\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKCR\.html\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKCR\.shtml\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKCR\.svg\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKCR\.xht\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKCR\.xhtml\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKCR\.webp\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKCR\.xml\OpenWithProgIds" /v "MSEdgeHTM" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts" /v "MSEdgeHTM_microsoft-edge" /f
reg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode" /v "MSEdgePath" /f
reg delete "HKCR\AppID\ie_to_edge_bho.dll" /f
reg delete "HKCR\AppID\{31575964-95F7-414B-85E4-0E9A93699E13}" /f
reg delete "HKCR\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKCR\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKCR\ie_to_edge_bho.IEToEdgeBHO" /f
reg delete "HKCR\ie_to_edge_bho.IEToEdgeBHO.1" /f
::
reg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /f
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID" /v "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Edge" /f
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Edge" /f
reg delete "HKCR\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}" /f
reg delete "HKCR\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\PreviewHandlers" /v "{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}" /f
reg delete "HKCR\.pdf\ShellEx\{8895b1c6-b41f-4c1c-a562-0d564250836f}" /v "(Default)" /f
reg delete "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}" /f
reg delete "HKU\S-1-5-21-3476428458-2503407758-626446112-1002\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}" /f
reg delete "HKLM\System\CurrentControlSet\Services\EventLog\Application\Edge" /f
reg delete "HKLM\SOFTWARE\Microsoft\MediaPlayer\ShimInclusionList\msedge.exe" /f
rmdir /q /s "%ProgramFiles(x86)%\Microsoft\EdgeCore"
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Microsoft Edge Update" /f
::WebView
reg delete "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Microsoft EdgeWebView" /f
rmdir /q /s "%ProgramFiles(x86)%\Microsoft\EdgeWebView"
@echo OFF
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users"`) do (
::WebView
echo rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\EdgeWebView"
rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\EdgeWebView"
echo rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Edge"
rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Edge"
)
exit /b 0
:USERREG
@echo ON
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v "FavoritesResolve" /t REG_BINARY /d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f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v Favorites /t REG_BINARY /d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f
reg delete "HKU\%~1\SOFTWARE\RegisteredApplications" /v "Microsoft Edge" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.htm\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.html\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.shtml\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.svg\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.xht\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.xhtml\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.webp\OpenWithProgids" /v "MSEdgeHTM" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts" /v "MSEdgeHTM_microsoft-edge" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\Edge" /f
::WebView
reg delete "HKU\%~1\SOFTWARE\Microsoft\EdgeWebView" /f
@echo OFF

+ 16
- 0
21H1-22H2_PB/Executables/EDGEX.bat View File

@ -0,0 +1,16 @@
cd Executables
start /b /wait install_wim_tweak.exe /o /l
start /b /wait install_wim_tweak.exe /o /c Microsoft-Windows-Internet-Browser-Package /r
start /b /wait install_wim_tweak.exe /h /o /l
:: Removes ActiveX item in open with menu
reg delete "HKCR\Applications\iexplore.exe" /f
:: Removes ActiveX item in open with menu for XML files
reg delete "HKCR\xmlfile" /f
:: Removes internet explorer option when setting default browser in settings
reg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /f
reg delete "HKLM\SOFTWARE\RegisteredApplications" /v "Internet Explorer" /f
reg delete "HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE" /f

+ 13
- 0
21H1-22H2_PB/Executables/FILEASSOC.bat View File

@ -0,0 +1,13 @@
cd Executables
copy /y "Associations.dll" "%WINDIR%\System32\OEMDefaultAssociations.dll"
del /q /f "%WINDIR%\System32\OEMDefaultAssociations.xml"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
PowerShell -NoP -ExecutionPolicy Bypass -File assoc.ps1 "Placeholder" "%%A" ".html:FirefoxHTML-308046B0AF4A39CB" ".htm:FirefoxHTML-308046B0AF4A39CB" ".url:FirefoxURL-308046B0AF4A39CB" "Proto:https:FirefoxURL-308046B0AF4A39CB" "Proto:http:FirefoxURL-308046B0AF4A39CB" "Proto:mailto:Thunderbird.Url.mailto" ".3g2:VLC.3g2" ".3gp:VLC.3gp" ".3gp2:VLC.3gp2" ".3gpp:VLC.3gpp" ".aac:VLC.aac" ".adts:VLC.adts" ".aif:VLC.aif" ".aifc:VLC.aifc" ".aiff:VLC.aiff" ".amr:VLC.amr" ".asf:VLC.asf" ".asx:VLC.asx" ".au:VLC.au" ".avi:VLC.avi" ".bmp:JPEGView.exe" ".cda:VLC.cda" ".flac:VLC.flac" ".jpeg:JPEGView.exe" ".jpg:JPEGView.exe" ".m1v:VLC.m1v" ".m2t:VLC.m2t" ".m2ts:VLC.m2ts" ".m3u:VLC.m3u" ".m4a:VLC.m4a" ".m4p:VLC.m4p" ".m4v:VLC.m4v" ".mid:VLC.mid" ".mka:VLC.mka" ".mkv:VLC.mkv" ".mov:VLC.mov" ".MP2:VLC.mp2" ".mp2v:VLC.mp2v" ".mp3:VLC.mp3" ".mp4:VLC.mp4" ".mp4v:VLC.mp4v" ".mpa:VLC.mpa" ".MPE:VLC.mpe" ".mpeg:VLC.mpeg" ".mpg:VLC.mpg" ".mpv2:VLC.mpv2" ".mts:VLC.mts" ".png:JPEGView.exe" ".ra:VLC.ra" ".ram:VLC.ram" ".rmi:VLC.rmi" ".s3m:VLC.s3m" ".snd:VLC.snd" ".TS:VLC.ts" ".TTS:VLC.tts" ".voc:VLC.voc" ".wav:VLC.wav" ".webp:JPEGView.exe" ".wma:VLC.wma" ".wmv:VLC.wmv" ".WPL:VLC.wpl" ".wvx:VLC.wvx" ".xm:VLC.xm" ".zpl:VLC.zpl" ".xml:txtfilelegacy"
)
)

Executables/FIREFOXCONF.bat → 21H1-22H2_PB/Executables/FIREFOXCONF.bat View File

@ -37,11 +37,18 @@ set "RunEC=10"
set /a "count0=1"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :AFISCALL "%%C"
if "%%A"=="AME_UserHive_Default" (
call :AFISCALL "%SYSTEMDRIVE%\Users\Default\AppData\Roaming"
if errorlevel 2 set "RunEC=2"
if errorlevel 1 set "RunEC=1"
if errorlevel 0 set "RunEC=0"
) else (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :AFISCALL "%%C"
if errorlevel 2 set "RunEC=2"
if errorlevel 1 set "RunEC=1"
if errorlevel 0 set "RunEC=0"
)
)
)
exit /b %RunEC%

+ 18
- 0
21H1-22H2_PB/Executables/LOGIN.bat View File

@ -0,0 +1,18 @@
cd Executables
@tasklist /fi "IMAGENAME eq Explorer.exe" /fi "USERNAME ne SYSTEM" /v | findstr /I /c:"explorer.exe" > NUL
@if %errorlevel% neq 0 echo start explorer.exe & start explorer.exe
:: Make output just after file deletion look nicer
@timeout /t 5 /nobreak > nul
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d "" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers" /s /f "WLIDCredentialProvider" ^| findstr /c:"Credential Providers\\"`) do reg delete "%%E" /f
REM takeown /f "%WINDIR%\System32\en-US\credprovhost.dll.mui"
REM icacls "%WINDIR%\System32\en-US\credprovhost.dll.mui" /reset
REM certutil -hashfile "%WINDIR%\System32\en-US\credprovhost.dll.mui" md5 | findstr /i /c:"7AED5636DB4388798718F09C53348F49" /c:"36320488BF78869BD369013CBE93C22A" || EXIT /B 1
ame-hexer "%WINDIR%\System32\en-US\credprovhost.dll.mui" "4F 00 74 00 68 00 65 00 72 00 20 00 75 00 73 00 65 00 72" "4C 00 6F 00 67 00 69 00 6E 00 00 00 00 00 00 00 00 00 00"

Executables/Layout.xml → 21H1-22H2_PB/Executables/Layout.xml View File

@ -8,7 +8,7 @@
<CustomTaskbarLayoutCollection PinListPlacement="Replace">
<defaultlayout:TaskbarLayout>
<taskbar:TaskbarPinList>
<taskbar:DesktopApp DesktopApplicationLinkPath="%APPDATA%\Microsoft\Windows\Start Menu\Programs\System Tools\File Explorer.lnk" />
<taskbar:DesktopApp DesktopApplicationLinkPath="%APPDATA%\Microsoft\Windows\Start Menu\Programs\File Explorer.lnk" />
<taskbar:DesktopApp DesktopApplicationLinkPath="%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Firefox.lnk" />
</taskbar:TaskbarPinList>
</defaultlayout:TaskbarLayout>

+ 443
- 0
21H1-22H2_PB/Executables/ONED.bat View File

@ -0,0 +1,443 @@
cd Executables
@echo OFF
for /f "usebackq tokens=2 delims=\" %%E in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%E" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
call :USERREG "%%E"
)
)
taskkill /f /im "OneDrive.exe"
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users"`) do (
echo rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\OneDrive"
rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\OneDrive"
echo rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\OneDrive"
rmdir /q /s "%SYSTEMDRIVE%\Users\%%A\OneDrive"
echo del /q /f "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneDrive.lnk"
del /q /f "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneDrive.lnk"
)
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SyncRootManager" ^| findstr /i /c:"OneDrive"`) do echo reg delete "%%E" /f & reg delete "%%E" /f
exit /b 0
:USERREG
@echo ON
reg delete "HKU\%~1\SOFTWARE\Microsoft\OneDrive" /f
for /f "usebackq delims=" %%E in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BannerStore" ^| findstr /i /c:"OneDrive"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers" ^| findstr /i /c:"OneDrive"`) do reg delete "%%E" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.fluid" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.note" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.whiteboard" /f
reg delete "HKU\%~1\SOFTWARE\Classes\.loop" /f
for /f "usebackq delims=" %%E in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths" ^| findstr /i /c:"OneDrive"`) do reg delete "%%E" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{F904F88C-E60D-4327-9FA2-865AD075B400}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{A87958FF-B414-7748-9183-DBF183A25905}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{A87958FF-B414-7748-9183-DBF183A25905}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\NucleusNativeMessaging.NucleusNativeMessaging.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\NucleusNativeMessaging.NucleusNativeMessaging" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\NucleusToastActivator.NucleusToastActivator.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\NucleusToastActivator.NucleusToastActivator" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\mssharepointclient" /f
reg delete "HKU\%~1\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.microsoft.onedrive.nucleus.auth.provider" /f
reg delete "HKU\%~1\SOFTWARE\Classes\AppID\{EEABD3A3-784D-4334-AAFC-BB13234F17CF}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\AppID\OneDrive.EXE" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{1EDD003E-C446-43C5-8BA0-3778CC4792CC}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{1EDD003E-C446-43C5-8BA0-3778CC4792CC}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{4B1C80DA-FA45-468F-B42B-46496BDBE0C5}\1.0" /f
reg delete "HKU\%~1\SOFTWARE\Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{638805C3-4BA3-4AC8-8AAC-71A0BA2BC284}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\FileSyncClient.FileSyncClient.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\FileSyncClient.FileSyncClient" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\FileSyncClient.AutoPlayHandler.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\FileSyncClient.AutoPlayHandler" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\BannerNotificationHandler.BannerNotificationHandler" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{0f872661-c863-47a4-863f-c065c182858a}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{0f872661-c863-47a4-863f-c065c182858a}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{da82e55e-fa2f-45b3-aec3-e7294106ef52}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{da82e55e-fa2f-45b3-aec3-e7294106ef52}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{2B865677-AC3A-43BD-B9E7-BF6FCD3F0596}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{2B865677-AC3A-43BD-B9E7-BF6FCD3F0596}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{50487D09-FFA9-45E1-8DF5-D457F646CD83}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{50487D09-FFA9-45E1-8DF5-D457F646CD83}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{D32F7B3A-DEC8-4F44-AF28-E9B7FEB62118}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{D32F7B3A-DEC8-4F44-AF28-E9B7FEB62118}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{10C9242E-D604-49B5-99E4-BF87945EF86C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{10C9242E-D604-49B5-99E4-BF87945EF86C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{3A4E62AE-45D9-41D5-85F5-A45B77AB44E5}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{3A4E62AE-45D9-41D5-85F5-A45B77AB44E5}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{1196AE48-D92B-4BC7-85DE-664EC3F761F1}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{1196AE48-D92B-4BC7-85DE-664EC3F761F1}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{AF60000F-661D-472A-9588-F062F6DB7A0E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{AF60000F-661D-472A-9588-F062F6DB7A0E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{b5c25645-7426-433f-8a5f-42b7ff27a7b2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{b5c25645-7426-433f-8a5f-42b7ff27a7b2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{f0440f4e-4884-4a8F-8a45-ba89c00f96f2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{f0440f4e-4884-4a8F-8a45-ba89c00f96f2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{0776ae27-5ab9-4e18-9063-1836da63117a}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{0776ae27-5ab9-4e18-9063-1836da63117a}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{1b7aed4f-fcaf-4da4-8795-c03e635d8edc}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{1b7aed4f-fcaf-4da4-8795-c03e635d8edc}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{d8c80ebb-099c-4208-afa3-fbc4d11f8a3c}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{d8c80ebb-099c-4208-afa3-fbc4d11f8a3c}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{22A68885-0FD9-42F6-9DED-4FB174DC7344}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{22A68885-0FD9-42F6-9DED-4FB174DC7344}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{c1439245-96b4-47fc-b391-679386c5d40f}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{c1439245-96b4-47fc-b391-679386c5d40f}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{2387C6BD-9A36-41A2-88ED-FF731E529384}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{2387C6BD-9A36-41A2-88ED-FF731E529384}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{2F12C599-7AA5-407A-B898-09E6E4ED2D1E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{2F12C599-7AA5-407A-B898-09E6E4ED2D1E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{fac14b75-7862-4ceb-be41-f53945a61c17}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{fac14b75-7862-4ceb-be41-f53945a61c17}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{679EC955-75AA-4FB2-A7ED-8C0152ECF409}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{679EC955-75AA-4FB2-A7ED-8C0152ECF409}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{0827D883-485C-4D62-BA2C-A332DBF3D4B0}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{0827D883-485C-4D62-BA2C-A332DBF3D4B0}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ FileSyncEx" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\ FileSyncEx" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\ FileSyncEx" /f
reg delete "HKU\%~1\SOFTWARE\Classes\IE.AssocFile.URL\shellex\ContextMenuHandlers\ FileSyncEx" /f
reg delete "HKU\%~1\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{31508CC7-9BC7-494B-9D0F-7B1C7F144182}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{31508CC7-9BC7-494B-9D0F-7B1C7F144182}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\SyncEngineFileInfoProvider.SyncEngineFileInfoProvider.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\SyncEngineFileInfoProvider.SyncEngineFileInfoProvider" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\OOBERequestHandler.OOBERequestHandler.1" /f
reg delete "HKU\%~1\SOFTWARE\Classes\OOBERequestHandler.OOBERequestHandler" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\TypeLib\{082D3FEC-D0D0-4DF6-A988-053FECE7B884}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{53de12aa-df96-413d-a25e-c75b6528abf2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{53de12aa-df96-413d-a25e-c75b6528abf2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{6A821279-AB49-48F8-9A27-F6C59B4FF024}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{6A821279-AB49-48F8-9A27-F6C59B4FF024}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{A91EFACB-8B83-4B84-B797-1C8CF3AB3DCB}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{A91EFACB-8B83-4B84-B797-1C8CF3AB3DCB}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\Interface\{C47B67D4-BA96-44BC-AB9E-1CAC8EEA9E93}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\Interface\{C47B67D4-BA96-44BC-AB9E-1CAC8EEA9E93}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}" /f
reg delete "HKU\%~1\SOFTWARE\Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION" /v "OneDrive.exe" /f
reg delete "HKU\%~1\SOFTWARE\Classes\odopen" /f
reg delete "HKU\%~1\SOFTWARE\Microsoft\SkyDrive" /f
reg delete "HKU\%~1\SOFTWARE\SyncEngines\Providers\OneDrive" /f
for /f "usebackq delims=" %%E in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" ^| findstr /i /c:"OneDrive"`) do reg delete "%%E" /f
::reg delete "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe" /f
@echo OFF

BIN
21H1-22H2_PB/Executables/OldClassicCalc-2.0-setup.exe View File


BIN
21H1-22H2_PB/Executables/OpenShellSetup_4_4_170.exe View File


Executables/PERM.bat → 21H1-22H2_PB/Executables/PERM.bat View File


Executables/REGI.bat → 21H1-22H2_PB/Executables/REGI.bat View File

@ -1,6 +1,6 @@
@echo OFF
for /f "usebackq delims=" %%A in (`DIR /B /A:d "%SYSTEMDRIVE%\Users" ^| findstr /V /I /X /c:"Public" /c:"Default User" /c:"Default" /c:"All Users"`) do (
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users" ^| findstr /V /I /X /c:"Public" /c:"Default User" /c:"All Users"`) do (
for /f "usebackq tokens=2 delims=\" %%B in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
for /f "usebackq tokens=2* delims= " %%C in (`reg query "HKU\%%B\Volatile Environment" /v "USERPROFILE" 2^>^&1 ^| findstr /R /X /C:".*USERPROFILE[ ]*REG_SZ[ ].*"`) do (
REM IF errorlevel 5 CMD /C "exit /b 5"
@ -12,18 +12,34 @@ for /f "usebackq delims=" %%A in (`DIR /B /A:d "%SYSTEMDRIVE%\Users" ^| findstr
if not errorlevel 1 (
for /f "usebackq tokens=1 delims=:" %%D in (`echo :^>NUL ^& ^(reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_" ^& echo AME-Placeholder^) ^| findstr /N /c:"AME-Placeholder"`) do (
if exist "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT" (
echo reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
echo reg add "HKU\AME_UserHive_%%D\SOFTWARE\AME" /v "UserPath" /t REG_SZ /d "%SYSTEMDRIVE%\Users\%%A" /f
reg add "HKU\AME_UserHive_%%D\SOFTWARE\AME" /v "UserPath" /t REG_SZ /d "%SYSTEMDRIVE%\Users\%%A" /f
if /i "%%A"=="Default" (
echo reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
) else (
echo reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
if exist "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat" (
echo reg load "HKU\AME_UserClassesHive_%%D" "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat"
reg load "HKU\AME_UserClassesHive_%%D" "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat"
)
)
)
)
) else (
if exist "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT" (
echo reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
echo reg add "HKU\AME_UserHive_1\SOFTWARE\AME" /v "UserPath" /t REG_SZ /d "%SYSTEMDRIVE%\Users\%%A" /f
reg add "HKU\AME_UserHive_1\SOFTWARE\AME" /v "UserPath" /t REG_SZ /d "%SYSTEMDRIVE%\Users\%%A" /f
if /i "%%A"=="Default" (
echo reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
) else (
echo reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
if exist "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat" (
echo reg load "HKU\AME_UserClassesHive_1" "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat"
reg load "HKU\AME_UserClassesHive_1" "%SYSTEMDRIVE%\Users\%%A\AppData\Local\Microsoft\Windows\UsrClass.dat"
)
)
)
)
) else (
@ -71,7 +87,7 @@ reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreen
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /f
:: New Control Panel cleanup - List of commands: https://winaero.com/ms-settings-commands-in-windows-10/
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility /t REG_SZ /d "showonly:display;nightlight;sound;notifications;quiethours;powersleep;batterysaver;tabletmode;multitasking;clipboard;remote-desktop;about;bluetooth;connecteddevices;printers;mousetouchpad;devices-touchpad;typing;pen;autoplay;usb;network-status;network-cellular;network-wifi;network-wificalling;network-wifisettings;network-ethernet;network-dialup;network-vpn;network-airplanemode;network-mobilehotspot;datausage;network-proxy;personalization-background;personalization-start;fonts;colors;lockscreen;themes;taskbar;defaultapps;videoplayback;startupapps;dateandtime;regionformatting;gaming;gamemode;easeofaccess-display;easeofaccess-colorfilter;easeofaccess-audio;easeofaccess-easeofaccess-narrator;easeofaccess-magnifier;easeofaccess-highcontrast;easeofaccess-closedcaptioning;easeofaccess-speechrecognition;easeofaccess-eyecontrol;easeofaccess-keyboard;easeofaccess-mouse;cortana-windowssearch;search-moredetails" /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility /t REG_SZ /d "showonly:display;nightlight;sound;notifications;quiethours;powersleep;batterysaver;tabletmode;multitasking;clipboard;remote-desktop;about;bluetooth;connecteddevices;printers;mousetouchpad;devices-touchpad;typing;pen;autoplay;usb;network-status;network-cellular;network-wifi;network-wificalling;network-wifisettings;network-ethernet;network-dialup;network-vpn;network-airplanemode;network-mobilehotspot;datausage;network-proxy;personalization-background;personalization-start;fonts;colors;lockscreen;themes;taskbar;defaultapps;videoplayback;startupapps;dateandtime;regionformatting;gaming;gamemode;easeofaccess-display;easeofaccess-colorfilter;easeofaccess-audio;easeofaccess-easeofaccess-narrator;easeofaccess-magnifier;easeofaccess-highcontrast;easeofaccess-closedcaptioning;easeofaccess-speechrecognition;easeofaccess-eyecontrol;easeofaccess-keyboard;easeofaccess-mouse" /f
:: Decrease shutdown time
reg add "HKLM\SYSTEM\CurrentControlSet\Control" /v WaitToKillServiceTimeout /t REG_SZ /d 2000 /f
@ -93,7 +109,7 @@ reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\N
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{0DB7E03F-FC29-4DC6-9020-FF41B59E513A}" /f
:: Disable Windows Error Reporting
reg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD d/1 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d /1 /f
:: Enables full drive indexing (Enhanced Search)
cd Executables
@ -157,10 +173,10 @@ sc config lanmanworkstation depend= bowser/mrxsmb20/nsi
:: Set Time reference to UTC
reg add "HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation" /v RealTimeIsUniversal /t REG_DWORD /d 1 /f
::Disable Users On Login Screen
:: Disable Users On Login Screen
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v dontdisplaylastusername /t REG_DWORD /d 1 /f
::Disable The Lock Screen
:: Disable The Lock Screen
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v NoLockScreen /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
@ -171,6 +187,36 @@ reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global" /f
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global\NVTweak" /f
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global\NVTweak" /v "DisableStoreNvCplNotifications" /t REG_DWORD /d 1 /f
:: Improve new user login experience
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OOBE" /v DisablePrivacyExperience /t REG_DWORD /d 1 /f > NUL 2>&1
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableFirstLogonAnimation /t REG_DWORD /d 0 /f > NUL 2>&1
:: Remove Windows Contacts showing up in default apps in W11
reg delete "HKCR\certificate_wab_auto_file" /f
reg delete "HKCR\wab_auto_file" /f
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKCR\contact_wab_auto_file" /f
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKCR\WAB.AssocProtocol.LDAP" /f
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKCR\TIFImage.Document" /f
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKCR\PhotoViewer.FileAssoc.Tiff" /f
:: Remove Windows Media Player from default apps list
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait CMD /c "for /f "usebackq delims=" %%A in (`reg query "HKCR" /f "WMP11*" ^| findstr /c:"WMP11"`) do reg delete "%%A" /f"
:: Make Ti explorer nicer
reg add "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f
reg add "HKU\S-1-5-18\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f
reg add "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowCortanaButton /t REG_DWORD /d 0 /f
reg add "HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowTaskViewButton /t REG_DWORD /d 0 /f
:: Disable News and Interests
reg add "HKLM\SOFTWARE\Microsoft\PolicyManager\default\NewsAndInterests" /v AllowNewsAndInterests /t REG_DWORD /d 0
reg add "HKLM\SOFTWARE\Policies\Microsoft\Dsh" /v AllowNewsAndInterests /t REG_DWORD /d 0
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v EnableFeeds /t REG_DWORD /d 0
:: Removes MpOAV.dll link
::NSudoLC -U:T -P:E -M:S -Priority:RealTime -Wait reg delete "HKCR\CLSID\{2781761E-28E0-4109-99FE-B9D127C57AFE}\InprocServer32" /f
:: Fix black screen issue with new users
:: start NSudoLC -U:T -P:E -M:S -Priority:RealTime -Wait reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore" /f
@ -343,7 +389,6 @@ reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization" /v "RestrictImplicitIn
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /v "AcceptedPrivacyPolicy" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /v "HarvestContacts" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Personalization\Settings" /v "AcceptedPrivacyPolicy" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableSearchBoxSuggestions" /t REG_DWORD /d 1 /f
:: Setup Windows Explorer
:: Removes the shake to minimze all other windows gesture
@ -352,8 +397,9 @@ reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f
:: TBD
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V TaskbarGlomLevel /T REG_DWORD /D 2 /F
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarDa" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarAl" /t REG_DWORD /D 0 /f
:: Taskbar
reg add "HKU\%~1\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f
@ -361,11 +407,21 @@ reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowTaskViewButton /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v EnableAutoTray /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAMeetNow /t REG_DWORD /d 1 /f
:: W11 Chat item
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v TaskbarMn /t REG_DWORD /d 0 /f
:: Disable Security and Maintenance notifications
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d 0 /f
:: Disable configue backup notifications
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.BackupReminder" /v "Enabled" /t REG_DWORD /d 0 /f
:: Disable "Let's Finish Setting Up Your Device" OOBE screen
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f
@echo OFF
if "%~1"=="AME_UserHive_Default" (
echo copy /y "UsrClass.dat" "%SYSTEMDRIVE%\Users\Default\AppData\Local\Microsoft\Windows"
copy /y "UsrClass.dat" "%SYSTEMDRIVE%\Users\Default\AppData\Local\Microsoft\Windows"
:: echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "AME New User Msg" /t REG_EXPAND_SZ /d "msg """"%%username%%"""" Warning: Creating a new user after amelioration is not fully supported. The settings app will not work and certain UI elements will be broken." /f
:: reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "AME New User Msg" /t REG_EXPAND_SZ /d "msg """"%%username%%"""" Warning: Creating a new user after amelioration is not fully supported. The settings app will not work and certain UI elements will be broken." /f
)
@exit /b 0

Executables/SERV.bat → 21H1-22H2_PB/Executables/SERV.bat View File

@ -1,15 +1,16 @@
cd Executables\ProcessHacker\x64
ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction delete
timeout /t 2 > NUL
::ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction stop
::timeout /t 8 > NUL
::ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction delete
::timeout /t 2 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction delete
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject BITS -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject DoSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject iphlpsvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject Winmgmt -caction stop
@ -35,4 +36,5 @@ ProcessHacker.exe -elevate -s -c -ctype service -cobject XblAuthManager -caction
ProcessHacker.exe -elevate -s -c -ctype service -cobject XblGameSave -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject XboxNetApiSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject wlidsvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject DoSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject ClipSVC -caction stop

Executables/SHRT.bat → 21H1-22H2_PB/Executables/SHRT.bat View File

@ -1,7 +1,8 @@
cd Executables
@echo OFF
for /f "usebackq delims=" %%A in (`dir /B /A:d "%SYSTEMDRIVE%\Users" ^| findstr /V /I /X /c:"Public" /c:"Default User" /c:"Default" /c:"All Users"`) do (
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users" ^| findstr /v /i /x /c:"Public" /c:"Default User" /c:"All Users"`) do (
echo mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell"
mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell"
echo mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned"
@ -17,4 +18,24 @@ for /f "usebackq delims=" %%A in (`dir /B /A:d "%SYSTEMDRIVE%\Users" ^| findstr
)
@echo ON
del /q /f "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Media Player.lnk"
del /q /f "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Media Player.lnk"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
echo del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
)
)
)
copy /y "amecs.cmd" "%WINDIR%\System32"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :CHOCCALL "%%A"
)

+ 87
- 0
21H1-22H2_PB/Executables/SLNT.bat View File

@ -0,0 +1,87 @@
cd Executables
:: Load tile layout from before
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 2 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :OPENSHELLREG "%%A"
)
@echo ON
OpenShellSetup_4_4_170.exe /qn /quiet ADDLOCAL=StartMenu
copy /y Fluent-Metro.skin "%PROGRAMFILES%\Open-Shell\Skins"
copy /y Fluent-Metro.skin7 "%PROGRAMFILES%\Open-Shell\Skins"
::PowerShell -NoP -C "Invoke-WMIMethod -Class Win32_Process -Name Create -ArgumentList '%~dp0\silent_installers\OldCalculatorforWindows10Cfg.exe' | Wait-Process"
OldClassicCalc-2.0-setup.exe /VERYSILENT /SUPPRESSMSGBOXES /NORESTART
del /q /f "%SYSTEMDRIVE%\Users\Public\Desktop\Calculator (classic).lnk"
rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk"
rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Calculator (classic).lnk" "Calculator.lnk"
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" ^| findstr /r /c:"Old[ ].*Calculator"`) do reg add "%%E" /v "DisplayName" /t REG_SZ /d "Calculator" /f
@exit /b 0
:OPENSHELLREG
@echo ON
reg add "HKU\%~1\SOFTWARE\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "CSettingsDlg" /t REG_BINARY /d a8030000d00100000000000000000000aa0f00000100010100000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "ShowedToolbar" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "NewLine" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /v "ShowStatusBar" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ShowedStyle2" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "CSettingsDlg" /t REG_BINARY /d c80100001a0100000000000000000000360d00000100000000000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "OldItems" /t REG_BINARY /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ItemRanks" /t REG_BINARY /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\MRU" /v "0" /t REG_SZ /d "C:\Windows\regedit.exe" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "Version" /t REG_DWORD /d 04040098 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "AllProgramsMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "RecentMetroApps" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "StartScreenShortcut" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SearchInternet" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassOverride" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassColor" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinW7" /t REG_SZ /d "Fluent-Metro" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinVariationW7" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "ShiftWin" /t REG_SZ /d "Nothing" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinOptionsW7" /t REG_MULTI_SZ /d "DARK_MAIN=0\0METRO_MAIN=0\0LIGHT_MAIN=0\0AUTOMODE_MAIN=1\0DARK_SUBMENU=0\0METRO_SUBMENU=\0LIGHT_SUBMENU=0\0AUTOMODE_SUBMENU=1\0SUBMENU_SEPARATORS=1\0DARK_SEARCH=0\0METRO_SEARCH=\0LIGHT_SEARCH=0\0AUTOMODE_SEARCH=1\0SEARCH_FRAME=1\0SEARCH_COLOR=0\0SMALL_SEARCH=0\0MOERN_SEARCH=1\0SEARCH_ITALICS=0\0NONE=0\0SEPARATOR=0\0TWO_TONE=1\0CLASSIC_SELECTOR=1\0HAF_SELECTOR=0\0CURVED_MENUSEL=1\0CURVED_SUBMENU=0\0SELECTOR_REVEAL=1\0TRANSPARENT=0\0OPAQU_SUBMENU=1\0OPAQUE_MENU=0\0OPAQUE=0\0STANDARD=0\0SMALL_MAIN2=1\0SMALL_ICONS=0\0COMPACT_UBMENU=0\0PRESERVE_MAIN2=0\0LESS_PADDING=0\0EXTRA_PADDING=1\024_PADDING=0\0LARGE_PROGRAMS0\0TRANSPARENT_SHUTDOWN=0\0OUTLINE_SHUTDOWN=0\0BUTTON_SHUTDOWN=1\0EXPERIMENTAL_SHUTDOWN=0\LARGE_FONT=0\0CONNECTED_BORDER=0\0FLOATING_BORDER=1\0LARGE_SUBMENU=0\0LARGE_LISTS=0\0THI_MAIN2=0\0EXPERIMENTAL_MAIN2=1\0USER_IMAGE=1\0USER_OUTSIDE=0\0SCALING_USER=1\056=0\064=\0TRANSPARENT_USER=0\0UWP_SCROLLBAR=0\0MODERN_SCROLLBAR=1\0SMALL_ARROWS=0\0ARROW_BACKGROUD=1\0ICON_FRAME=0\0SEARCH_SEPARATOR=0\0NO_PROGRAMS_BUTTON=0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkipMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=pc_settings\0Item17.Settings=TRACK_RECENT\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /v "Update" /d 0 /t REG_DWORD /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "CheckWinUpdates" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "HighlightNew" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser" /v "ITBar7Layout" /t REG_BINARY /d 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 /f
@echo OFF
::if "%~1"=="AME_UserHive_Default" (
:: echo reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=ITEM_DISABLED\0Item17.Settings=TRACK_RECENT\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
:: reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=pc_settings\0Item17.Settings=ITEM_DISABLED\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
:: echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVolume" /t REG_DWORD /d 1 /f
:: reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVolume" /t REG_DWORD /d 1 /f
:: reg add "HKU\%~1\SOFTWARE\EarTrumpet" /v "hasShownFirstRun" /t REG_SZ /d "<?xml version=""""1.0"""" encoding=""""utf-16""""?><boolean>true</boolean>" /f
:: reg add "HKU\%~1\SOFTWARE\EarTrumpet" /v "IsTelemetryEnabled" /t REG_SZ /d "<?xml version=""""1.0"""" encoding=""""utf-16""""?><boolean>false</boolean>" /f
:: copy /y "UsrClass.dat" "%SYSTEMDRIVE%\Users\Default\AppData\Local\Microsoft\Windows"
::)
exit /b 0

Executables/TILE.bat → 21H1-22H2_PB/Executables/TILE.bat View File


+ 77
- 0
21H1-22H2_PB/Executables/UI.bat View File

@ -0,0 +1,77 @@
cd Executables
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait cmd /c "del /q /f "%WINDIR%\HelpPane.exe""
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait ame-hexer "%WINDIR%\Resources\Themes\aero\Shell\NormalColor\shellstyle.dll" "3c69662069643d2261746f6d2848656c70427574746f6e29223e" "3c69662069643d2261746f6d282d2d2d52454d4f56454429223e" 120000
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait ame-hexer "%WINDIR%\Resources\Themes\aero\Shell\NormalColor\shellstyle.dll" "3c69662069643d2261746f6d2848656c70427574746f6e29223e" "3c69662069643d2261746f6d282d2d2d52454d4f56454429223e" 120000
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"Classes"`) do (
call :UICALL1 "%%A"
)
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :UICALL2 "%%A"
)
@echo ON
PowerShell -NoP -C "Start-Process 'ep_setup-22621.608.51.4.exe' -NoNewWindow -Wait"
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" ^| findstr /i /c:"ExplorerPatcher"`) do reg delete "%%E" /f
@exit /b 0
:UICALL1
@echo ON
:: Context Menu
reg add "HKU\%~1\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}" /f
reg add "HKU\%~1\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}\InprocServer32" /t REG_SZ /d "" /f
:: File Explorer Command Bar
reg add "HKU\%~1\CLSID\{d93ed569-3b3e-4bff-8355-3c44f6a52bb5}" /f
reg add "HKU\%~1\CLSID\{d93ed569-3b3e-4bff-8355-3c44f6a52bb5}\InprocServer32" /t REG_SZ /d "" /f
:: Old Explorer Search
reg add "HKU\%~1\CLSID\{1d64637d-31e9-4b06-9124-e83fb178ac6e}" /f
reg add "HKU\%~1\CLSID\{1d64637d-31e9-4b06-9124-e83fb178ac6e}\TreatAs" /t REG_SZ /d "{64bc32b5-4eec-4de7-972d-bd8bd0324537}" /f
@echo OFF
exit /b 0
:UICALL2
@echo ON
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Start_ShowClassicMode" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "OldTaskbar" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "UpdatePolicy" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "EnableSymbolDownload" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "HideControlCenterButton" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "StartDocked_DisableRecommendedSection" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "TaskbarGlomLevel" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "MMTaskbarGlomLevel" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "OrbStyle" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "FileExplorerCommandUI" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "StartUI_EnableRoundedCorners" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ExplorerExplorerPatcher" /v "StartUI_EnableRoundedCorners" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "ClockFlyoutOnWinC" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "DisableOfficeHotkeys" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "DisableWinFHotkey" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "DoNotRedirectProgramsAndFeaturesToSettingsApp" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "HideIconAndTitleInExplorer" /t REG_DWORD /D 3 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "IMEStyle" /t REG_DWORD /D 4 /f
reg add "HKU\%~1\SOFTWARE\ExplorerPatcher" /v "MicaEffectOnTitlebar" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "SystemUsesLightTheme" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "AppsUseLightTheme" /t REG_DWORD /d 1 /f
@echo OFF
exit /b 0

Executables/UPDATES.bat → 21H1-22H2_PB/Executables/UPDATES.bat View File


+ 31
- 0
21H1-22H2_PB/Executables/UPDHEALTH.bat View File

@ -0,0 +1,31 @@
for /f "usebackq tokens=7 delims=\" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /d /f "Update Health Tools" /s ^| findstr /i /c:"CurrentVersion\Uninstall\\"`) do set "GUID=%%E"
for /f "usebackq tokens=4 delims=\" %%E in (`reg query "HKCR\Installer\Products" /d /f "Update Health Tools" /s ^| findstr /i /c:"Installer\Products\\"`) do set "ProdID=%%E"
if "%GUID%"=="" goto :Prod
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\%GUID%" /f
:Prod
if "%ProdID%"=="" exit /b 0
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes" /d /f "%ProdID%" /s ^| findstr /i /c:"Installer\UpgradeCodes\\"`) do reg delete "%%E" /f
reg delete "HKCR\Installer\Products\%ProdID%" /f
reg delete "HKCR\Installer\Features\%ProdID%" /f
for /f "usebackq delims=" %%E in (`reg query "HKCR\Installer\UpgradeCodes" /d /f "%ProdID%" /s ^| findstr /i /c:"Installer\UpgradeCodes\\"`) do reg delete "%%E" /f
for /f "usebackq delims=" %%E in (`reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components" /d /f "%ProdID%" /s ^| findstr /i /c:"S-1-5-18\Components\\"`) do reg delete "%%E" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\%ProdID%" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\UpdateHealthTools" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\rempl" /f
reg delete "HKLM\SOFTWARE\Microsoft\CloudManagedUpdate" /f
SETLOCAL ENABLEDELAYEDEXPANSION
for /f "usebackq delims=" %%E in (`PowerShell -NoP -C "(Get-Item 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders').Property" ^| findstr /i /c:"Update Health Tools"`) do (
set "var=%%E"
if "!var:~-1!"=="\" set "var=%%E\"
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders" /v "!var!" /f
)
ENDLOCAL

BIN
21H1-22H2_PB/Executables/UsrClass.dat View File


Executables/WALLPAPER.bat → 21H1-22H2_PB/Executables/WALLPAPER.bat View File

@ -1,26 +1,46 @@
cd Executables
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait icacls "%WINDIR%\Resources\Themes\aero.theme" /reset /t
PowerShell -NoP -C "(Get-Content '%WINDIR%\Resources\Themes\aero.theme') -replace 'Wallpaper=%%SystemRoot%%.*', 'Wallpaper=%%SystemRoot%%\web\wallpaper\Windows\ame_wallpaper_1440.bmp' | Set-Content '%WINDIR%\Resources\Themes\aero.theme'"
@echo OFF
if exist "ame_wallpaper_1440.bmp" (
echo move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
echo icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
)
set "RunEC=10"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :WALLRUN "%%A" "%%C"
if "%%A"=="AME_UserHive_Default" (
call :WALLRUN "%%A" "%SYSTEMDRIVE%\Users\Default"
IF errorlevel 5 set "RunEC=5"
IF errorlevel 4 set "RunEC=4"
IF errorlevel 3 set "RunEC=3"
IF errorlevel 2 set "RunEC=2"
IF errorlevel 1 set "RunEC=1"
IF errorlevel 0 set "RunEC=0"
) else (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :WALLRUN "%%A" "%%C"
IF errorlevel 5 set "RunEC=5"
IF errorlevel 4 set "RunEC=4"
IF errorlevel 3 set "RunEC=3"
IF errorlevel 2 set "RunEC=2"
IF errorlevel 1 set "RunEC=1"
IF errorlevel 0 set "RunEC=0"
)
)
)
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_"`) do echo reg unload "%%A" & reg unload "%%A"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_" /c:"AME_UserClassHive_"`) do echo reg unload "HKU\%%A" & reg unload "HKU\%%A"
exit /b %RunEC%
:WALLRUN
if not exist "%WINDIR%\Web\Wallpaper\Windows" echo mkdir "%WINDIR%\Web\Wallpaper\Windows" & mkdir "%WINDIR%\Web\Wallpaper\Windows"
if exist "%~2\Microsoft\Windows\Themes\Transcoded_000" set "wallChanged=true" & goto lockScreen
if not exist "%~2\Microsoft\Windows\Themes\TranscodedWallpaper" set "wallFail=true" & goto lockScreen
echo PowerShell -NoP -C "Add-Type -AssemblyName System.Drawing; $img = New-Object System.Drawing.Bitmap '%~2\Microsoft\Windows\Themes\TranscodedWallpaper'; if ($img.Flags -ne 77840) {exit 1}; if ($img.HorizontalResolution -ne 96) {exit 1}; if ($img.VerticalResolution -ne 96) {exit 1}; if ($img.PropertyIdList -notcontains 40961) {exit 1}; if ($img.PropertyIdList -notcontains 20624) {exit 1}; if ($img.PropertyIdList -notcontains 20625) {exit 1}"
PowerShell -NoP -C "Add-Type -AssemblyName System.Drawing; $img = New-Object System.Drawing.Bitmap '%~2\Microsoft\Windows\Themes\TranscodedWallpaper'; if ($img.Flags -ne 77840) {exit 1}; if ($img.HorizontalResolution -ne 96) {exit 1}; if ($img.VerticalResolution -ne 96) {exit 1}; if ($img.PropertyIdList -notcontains 40961) {exit 1}; if ($img.PropertyIdList -notcontains 20624) {exit 1}; if ($img.PropertyIdList -notcontains 20625) {exit 1}"
@ -44,12 +64,6 @@ if exist "img0.jpg" (
move /y "img0.jpg" "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
)
if exist "ame_wallpaper_1440.bmp" (
echo move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
echo icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
)
if not exist "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" set "wallFail=true" & goto lockScreen
echo reg add "HKEY_USERS\%~1\Control Panel\Desktop" /v WallPaper /t REG_SZ /d "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /f
@ -60,8 +74,11 @@ reg add "HKEY_USERS\%~1\Control Panel\Desktop" /v WallPaper /t REG_SZ /d "%WINDI
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreen*" > NUL 2>&1
if %errorlevel% NEQ 0 (
echo reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
echo "%~1" | findstr /c:"S-" > NUL
if not errorlevel 1 (
echo reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
)
echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f

Executables/WINTERM.bat → 21H1-22H2_PB/Executables/WINTERM.bat View File


BIN
Executables/ep_setup-22000.795.48.1.exe → 21H1-22H2_PB/Executables/ep_setup-22621.608.51.4.exe View File


BIN
21H2-22H2_Standalone.zip View File


+ 0
- 38
Configuration/features/base/base.yml View File

@ -1,38 +0,0 @@
---
title: Base
description: Base AME configuration
privilege: Admin
actions:
- !run:
currentDir: true
exe: "DNET.bat"
- !run:
currentDir: true
exe: "REGI.bat"
- !run:
currentDir: true
exe: "APPX.bat"
- !run:
currentDir: true
exe: "EDGE.bat"
- !run:
currentDir: true
exe: "EDGEX.bat"
- !run:
currentDir: true
exe: "ONED.bat"
- !run:
currentDir: true
exe: "PYTH.bat"
- !run:
currentDir: true
exe: "SFCDEPLOY.bat"
- !run:
currentDir: true
exe: "TILE.bat"
- !run:
currentDir: true
exe: "BANN.bat"
- !run:
currentDir: true
exe: "SERV.bat"

+ 0
- 8
Configuration/features/base/login.yml View File

@ -1,8 +0,0 @@
---
title: Malte Wallpapers
description: Installs Malte Wallpapers
privilege: Admin
actions:
- !run:
currentDir: true
exe: "LOGIN.bat"

+ 0
- 8
Configuration/features/base/silent.yml View File

@ -1,8 +0,0 @@
---
title: Silent Installers
description: Silent Installers for Windows 7 Calculator, OldNewExplorer, and Hardentools
privilege: Admin
actions:
- !run:
currentDir: true
exe: "SLNT.bat"

BIN
Executables/7za.dll View File


BIN
Executables/7za.exe View File


BIN
Executables/7zxa.dll View File


+ 0
- 42
Executables/APPX.bat View File

@ -1,42 +0,0 @@
PowerShell -NoP -C "Get-AppxPackage -AllUsers *Microsoft.549981C3F5F10* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *3DViewer* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *AssignedAccessLockApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *PinningConfirmationDialog* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *SecureAssessmentBrowser* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *FeedbackHub* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *MixedReality* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.Calculator* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.WindowsAlarms* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.GetHelp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Getstarted* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *disney* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.OneConnect* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsCamera* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *bing* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Sticky* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Store* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *MicrosoftOfficeHub* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Paint* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *wallet* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *OneNote* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.People* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *YourPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *photos* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *SkypeApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *solit* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *spotify* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsSoundRecorder* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *zune* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsCalculator* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsMaps* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Sway* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *CommsPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *ConnectivityStore* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.Messaging* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.WindowsStore* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxSpeechToTextOverlay* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxGamingOverlay* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxGameOverlay* | Remove-AppxPackage"

BIN
Executables/Albacore.ViVe.dll View File


+ 0
- 4
Executables/BANN.bat View File

@ -1,4 +0,0 @@
cd Executables
start .\ViVeTool.exe addconfig 18299130 1
start .\ViVeTool.exe addconfig 31950543 1

+ 0
- 78
Executables/CHOC.bat View File

@ -1,78 +0,0 @@
reg query "HKLM\SOFTWARE\Clients\StartMenuInternet" /k /f "Firefox-" > "%TEMP%\Firefox-Reg-Output.txt"
:: Load tile layout from before
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 3 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :CHOCCALL "%%A"
)
@echo ON
@PowerShell -NoP -ExecutionPolicy Bypass -C "iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1'))" && set "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"
@PowerShell -NoP -ExecutionPolicy Bypass -C "choco install -y --force --allow-empty-checksums firefox thunderbird open-shell vlc 7zip jpegview vcredist-all directx onlyoffice cascadiamono"
cd Executables
copy Fluent-Metro.skin "C:\%PROGRAMFILES%\Open-Shell\Skins"
copy Fluent-Metro.skin7 "%PROGRAMFILES%\Open-Shell\Skins"
:: Load new Open-Shell menu
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 3 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
@exit /b 0
:CHOCCALL
@echo ON
reg add "HKU\%~1\SOFTWARE\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "CSettingsDlg" /t REG_BINARY /d a8030000d00100000000000000000000aa0f00000100010100000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "ShowedToolbar" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "NewLine" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /v "ShowStatusBar" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ShowedStyle2" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "CSettingsDlg" /t REG_BINARY /d c80100001a0100000000000000000000360d00000100000000000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "OldItems" /t REG_BINARY /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ItemRanks" /t REG_BINARY /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\MRU" /v "0" /t REG_SZ /d "C:\Windows\regedit.exe" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "Version" /t REG_DWORD /d 04040098 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "AllProgramsMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "RecentMetroApps" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "StartScreenShortcut" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SearchInternet" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassOverride" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassColor" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinW7" /t REG_SZ /d "Fluent-Metro" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinVariationW7" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "ShiftWin" /t REG_SZ /d "Nothing" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinOptionsW7" /t REG_MULTI_SZ /d "DARK_MAIN=0"\0"METRO_MAIN=0"\0"LIGHT_MAIN=0"\0"AUTOMODE_MAIN=1"\0"DARK_SUBMENU=0"\0"METRO_SUBMENU="\0"LIGHT_SUBMENU=0"\0"AUTOMODE_SUBMENU=1"\0"SUBMENU_SEPARATORS=1"\0"DARK_SEARCH=0"\0"METRO_SEARCH="\0"LIGHT_SEARCH=0"\0"AUTOMODE_SEARCH=1"\0"SEARCH_FRAME=1"\0"SEARCH_COLOR=0"\0"SMALL_SEARCH=0"\0"MOERN_SEARCH=1"\0"SEARCH_ITALICS=0"\0"NONE=0"\0"SEPARATOR=0"\0"TWO_TONE=1"\0"CLASSIC_SELECTOR=1"\0"HAF_SELECTOR=0"\0"CURVED_MENUSEL=1"\0"CURVED_SUBMENU=0"\0"SELECTOR_REVEAL=1"\0"TRANSPARENT=0"\0"OPAQU_SUBMENU=1"\0"OPAQUE_MENU=0"\0"OPAQUE=0"\0"STANDARD=0"\0"SMALL_MAIN2=1"\0"SMALL_ICONS=0"\0"COMPACT_UBMENU=0"\0"PRESERVE_MAIN2=0"\0"LESS_PADDING=0"\0"EXTRA_PADDING=1"\0"24_PADDING=0"\0"LARGE_PROGRAMS0"\0"TRANSPARENT_SHUTDOWN=0"\0"OUTLINE_SHUTDOWN=0"\0"BUTTON_SHUTDOWN=1"\0"EXPERIMENTAL_SHUTDOWN=0"\"LARGE_FONT=0"\0"CONNECTED_BORDER=1"\0"FLOATING_BORDER=0"\0"LARGE_SUBMENU=0"\0"LARGE_LISTS=0"\0"THI_MAIN2=0"\0"EXPERIMENTAL_MAIN2=1"\0"USER_IMAGE=1"\0"USER_OUTSIDE=0"\0"SCALING_USER=1"\0"56=0"\0"64="\0"TRANSPARENT_USER=0"\0"UWP_SCROLLBAR=0"\0"MODERN_SCROLLBAR=1"\0"SMALL_ARROWS=0"\0"ARROW_BACKGROUD=1"\0"ICON_FRAME=0"\0"SEARCH_SEPARATOR=0"\0"NO_PROGRAMS_BUTTON=0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkipMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files"\0"Item1.Settings=NOEXPAND"\0"Item2.Command=user_documents"\0"Item2.Settings=NOEXPAND"\0"Item3.Command=user_pictures"\0"Item3.Settings=NOEXPAND"\0"Item4.Command=user_music"\0"Item4.Settings=NOEXPAND"\0"Item5.Command=user_videos"\0"Item5.Settings=NOEXPAND"\0"Item6.Command=downloads"\0"Item6.Settings=NOEXPAND"\0"Item7.Command=homegroup"\0"Item7.Settings=ITEM_DISABLED"\0"Item8.Command=separator"\0"Item9.Command=games"\0"Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED"\0"Item10.Command=favorites"\0"Item10.Settings=ITEM_DISABLED"\0"Item11.Command=recent_documents"\0"Item12.Command=computer"\0"Item12.Settings=NOEXPAND"\0"Item13.Command=network"\0"Item13.Settings=ITEM_DISABLED"\0"Item14.Command=network_connections"\0"Item14.Settings=ITEM_DISABLED"\0"Item15.Command=separator"\0"Item16.Command=control_panel"\0"Item16.Settings=TRACK_RECENT"\0"Item17.Command=pc_settings"\0"Item17.Settings=TRACK_RECENT"\0"Item18.Command=admin"\0"Item18.Settings=TRACK_RECENT|ITEM_DISABLED"\0"Item19.Command=devices"\0"Item19.Settings=ITEM_DISABLED"\0"Item20.Command=defaults"\0"Item20.Settings=ITEM_DISABLED"\0"Item21.Command=help"\0"Item21.Settings=ITEM_DISABLED"\0"Item22.Command=run"\0"Item23.Command=apps"\0"Item23.Settings=ITEM_DISABLED"\0"Item24.Command=windows_security"\0"Item24.Settings=ITEM_DISABLED"\0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /v "Update" /d 0 /t REG_DWORD /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "CheckWinUpdates" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "HighlightNew" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser" /v "ITBar7Layout" /t REG_BINARY /d 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 /f
@echo OFF
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
echo del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
)
exit /b 0

+ 0
- 6
Executables/DEFENDER.bat View File

@ -1,6 +0,0 @@
cd Executables
start /b /wait install_wim_tweak.exe /o /l
start /b /wait install_wim_tweak.exe /o /c "Windows-Defender" /r
start /b /wait install_wim_tweak.exe /h /o /l
start /b /wait winmgmt /resetrepository
shutdown /r /f /t 0

+ 0
- 20
Executables/EDGE.bat View File

@ -1,20 +0,0 @@
taskkill /im msedge.exe /f
cd "%PROGRAMFILES(x86)%\Microsoft\Edge\Application"
if exist "84.0.522.52" cd 84.0.522.52\Installer
if exist "9*" cd 9*\Installer
if exist "1*" cd 1*\Installer
start setup.exe --uninstall --system-level --verbose-logging --force-uninstall
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
echo reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v "FavoritesResolve" /t REG_BINARY /d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f
reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v "FavoritesResolve" /t REG_BINARY /d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f
echo reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v Favorites /t REG_BINARY /d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f
reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v Favorites /t REG_BINARY /d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f
)
)

+ 0
- 5
Executables/EDGEX.bat View File

@ -1,5 +0,0 @@
cd Executables
start /b /wait install_wim_tweak.exe /o /l
start /b /wait install_wim_tweak.exe /o /c Microsoft-Windows-Internet-Browser-Package /r
start /b /wait install_wim_tweak.exe /h /o /l

+ 0
- 32
Executables/FILEASSOC.bat View File

@ -1,32 +0,0 @@
cd Executables
reg delete "HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE" /f
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment"> NUL 2>&1
if not errorlevel 1 (
echo reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "UserSignedIn" /t REG_DWORD /d 1 /f
reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "UserSignedIn" /t REG_DWORD /d 1 /f
PowerShell -NoP -ExecutionPolicy Bypass -File assoc.ps1 "%%A" "%%A" ".html:FirefoxHTML-308046B0AF4A39CB" ".htm:FirefoxHTML-308046B0AF4A39CB" "Proto:https:FirefoxURL-308046B0AF4A39CB" "Proto:http:FirefoxURL-308046B0AF4A39CB" ".3g2:VLC.3g2" ".3gp:VLC.3gp" ".3gp2:VLC.3gp2" ".3gpp:VLC.3gpp" ".aac:VLC.aac" ".adts:VLC.adts" ".aif:VLC.aif" ".aifc:VLC.aifc" ".aiff:VLC.aiff" ".amr:VLC.amr" ".asf:VLC.asf" ".asx:VLC.asx" ".au:VLC.au" ".avi:VLC.avi" ".bmp:JPEGView.exe" ".cda:VLC.cda" ".flac:VLC.flac" ".jpeg:JPEGView.exe" ".jpg:JPEGView.exe" ".m1v:VLC.m1v" ".m2t:VLC.m2t" ".m2ts:VLC.m2ts" ".m3u:VLC.m3u" ".m4a:VLC.m4a" ".m4p:VLC.m4p" ".m4v:VLC.m4v" ".mid:VLC.mid" ".mka:VLC.mka" ".mkv:VLC.mkv" ".mov:VLC.mov" ".MP2:VLC.mp2" ".mp2v:VLC.mp2v" ".mp3:VLC.mp3" ".mp4:VLC.mp4" ".mp4v:VLC.mp4v" ".mpa:VLC.mpa" ".MPE:VLC.mpe" ".mpeg:VLC.mpeg" ".mpg:VLC.mpg" ".mpv2:VLC.mpv2" ".mts:VLC.mts" ".png:JPEGView.exe" ".ra:VLC.ra" ".ram:VLC.ram" ".rmi:VLC.rmi" ".s3m:VLC.s3m" ".snd:VLC.snd" ".TS:VLC.ts" ".TTS:VLC.tts" ".voc:VLC.voc" ".wav:VLC.wav" ".webp:JPEGView.exe" ".wma:VLC.wma" ".wmv:VLC.wmv" ".WPL:VLC.wpl" ".wvx:VLC.wvx" ".xm:VLC.xm" ".zpl:VLC.zpl"
)
)
for /f "usebackq tokens=4 delims=_" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_"`) do (
for /f "usebackq tokens=7 delims=\" %%B in (`reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList" ^| findstr /c:"S-"`) do (
for /f "usebackq tokens=2* delims= " %%C in (`reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\%%B" ^| findstr /R /X /C:".*ProfileImagePath[ ]*REG_EXPAND_SZ[ ].*"`) do (
for /f "usebackq tokens=2* delims= " %%E in (`reg query "HKU\AME_UserHive_%%A\SOFTWARE\AME" ^| findstr /R /X /C:".*UserPath[ ]*REG_SZ[ ].*"`) do (
if "%%D"=="%%F" (
echo reg delete "HKU\AME_UserHive_%%A\SOFTWARE\AME" /f
reg delete "HKU\AME_UserHive_%%A\SOFTWARE\AME" /f
echo reg add "HKU\AME_UserHive_%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "UserSignedIn" /t REG_DWORD /d 1 /f
reg add "HKU\AME_UserHive_%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "UserSignedIn" /t REG_DWORD /d 1 /f
PowerShell -NoP -ExecutionPolicy Bypass -File assoc.ps1 "%%B" "AME_UserHive_%%A" ".html:FirefoxHTML-308046B0AF4A39CB" ".htm:FirefoxHTML-308046B0AF4A39CB" "Proto:https:FirefoxURL-308046B0AF4A39CB" "Proto:http:FirefoxURL-308046B0AF4A39CB" ".3g2:VLC.3g2" ".3gp:VLC.3gp" ".3gp2:VLC.3gp2" ".3gpp:VLC.3gpp" ".aac:VLC.aac" ".adts:VLC.adts" ".aif:VLC.aif" ".aifc:VLC.aifc" ".aiff:VLC.aiff" ".amr:VLC.amr" ".asf:VLC.asf" ".asx:VLC.asx" ".au:VLC.au" ".avi:VLC.avi" ".bmp:JPEGView.exe" ".cda:VLC.cda" ".flac:VLC.flac" ".jpeg:JPEGView.exe" ".jpg:JPEGView.exe" ".m1v:VLC.m1v" ".m2t:VLC.m2t" ".m2ts:VLC.m2ts" ".m3u:VLC.m3u" ".m4a:VLC.m4a" ".m4p:VLC.m4p" ".m4v:VLC.m4v" ".mid:VLC.mid" ".mka:VLC.mka" ".mkv:VLC.mkv" ".mov:VLC.mov" ".MP2:VLC.mp2" ".mp2v:VLC.mp2v" ".mp3:VLC.mp3" ".mp4:VLC.mp4" ".mp4v:VLC.mp4v" ".mpa:VLC.mpa" ".MPE:VLC.mpe" ".mpeg:VLC.mpeg" ".mpg:VLC.mpg" ".mpv2:VLC.mpv2" ".mts:VLC.mts" ".png:JPEGView.exe" ".ra:VLC.ra" ".ram:VLC.ram" ".rmi:VLC.rmi" ".s3m:VLC.s3m" ".snd:VLC.snd" ".TS:VLC.ts" ".TTS:VLC.tts" ".voc:VLC.voc" ".wav:VLC.wav" ".webp:JPEGView.exe" ".wma:VLC.wma" ".wmv:VLC.wmv" ".WPL:VLC.wpl" ".wvx:VLC.wvx" ".xm:VLC.xm" ".zpl:VLC.zpl"
)
)
)
)
)

+ 0
- 17
Executables/FileAssociations.xml View File

@ -1,17 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<DefaultAssociations>
<Association Identifier=".inf" ProgId="inffile" ApplicationName="Notepad" />
<Association Identifier=".ini" ProgId="inifile" ApplicationName="Notepad" />
<Association Identifier=".log" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".MP2" ProgId="WMP11.AssocFile.MP3" />
<Association Identifier=".ps1" ProgId="Microsoft.PowerShellScript.1" ApplicationName="Notepad" />
<Association Identifier=".psd1" ProgId="Microsoft.PowerShellData.1" ApplicationName="Notepad" />
<Association Identifier=".psm1" ProgId="Microsoft.PowerShellModule.1" ApplicationName="Notepad" />
<Association Identifier=".scp" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".tif" ProgId="PhotoViewer.FileAssoc.Tiff" ApplicationName="Windows Photo Viewer" />
<Association Identifier=".tiff" ProgId="PhotoViewer.FileAssoc.Tiff" ApplicationName="Windows Photo Viewer" />
<Association Identifier=".txt" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".url" ProgId="IE.AssocFile.URL" ApplicationName="Internet Browser" />
<Association Identifier=".website" ProgId="IE.AssocFile.WEBSITE" />
<Association Identifier=".wtx" ProgId="txtfile" ApplicationName="Notepad" />
</DefaultAssociations>

+ 0
- 8
Executables/LOGIN.bat View File

@ -1,8 +0,0 @@
cd Executables
takeown /f C:\Windows\System32\en-US\credprovhost.dll.mui
icacls C:\Windows\System32\en-US\credprovhost.dll.mui /reset
del C:\Windows\System32\en-US\credprovhost.dll.mui /f /q
copy credprovhost.dll.mui C:\Windows\System32\en-US\ /Y
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d "" /f

+ 0
- 1
Executables/ONED.bat View File

@ -1 +0,0 @@
PowerShell -NoP -C "Start-Process '%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe' -ArgumentList '/uninstall' -NoNewWindow"

+ 0
- 2
Executables/PRESS.bat View File

@ -1,2 +0,0 @@
start "C:\Program Files\Open-Shell\StartMenu.exe" -settings
PowerShell -Command "$wshell = New-Object -ComObject wscript.shell; $wshell.SendKeys('~')"

+ 0
- 5
Executables/PYTH.bat View File

@ -1,5 +0,0 @@
cd Executables
python-3.9.7-amd64.exe /quiet InstallAllUsers=1 TargetDir="%PROGRAMFILES%\Python39"
NSudoLC -U:S -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait PowerShell -NoP -C "Start-Process '%PROGRAMFILES%\Python39\python.exe' -ArgumentList 'remove_SecHealthUI_stub.py' -NoNewWindow"
PowerShell -NoP -ExecutionPolicy Bypass -Command "Get-AppxPackage -All *Microsoft.Windows.SecHealthUI* | Remove-AppPackage -AllUsers"

+ 0
- 1511
Executables/Packages.txt
File diff suppressed because it is too large
View File


+ 0
- 69
Executables/SFCDEPLOY.bat View File

@ -1,69 +0,0 @@
@echo OFF
:sfcCmdChecks
if not exist "%~dp0\sfc.cmd" (
echo. & echo No supplied sfc.cmd detected
exit /b 2
)
if exist "%SYSTEMROOT%\System32\sfc.cmd" (
echo takeown /f "%SYSTEMROOT%\System32\sfc.cmd" /a
takeown /f "%SYSTEMROOT%\System32\sfc.cmd" /a
echo icacls "%SYSTEMROOT%\System32\sfc.cmd" /grant Administrators:F
icacls "%SYSTEMROOT%\System32\sfc.cmd" /grant Administrators:F
echo del /q /f "%SYSTEMROOT%\System32\sfc.cmd"
del /q /f "%SYSTEMROOT%\System32\sfc.cmd"
goto move
) else (
goto move
)
:move
@echo on
move /y "%~dp0\sfc.cmd" "%SYSTEMROOT%\System32\" 1> NUL
:sfc1ExeCheck
@echo OFF
if exist "%SYSTEMROOT%\System32\sfc1.exe" (
echo sfc1.exe already exists, assigning permissions... & echo.
echo PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc1.exe'" ^> NUL 2^>^&1
PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc1.exe'" > NUL 2>&1
echo PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc.cmd'" ^> NUL 2^>^&1
PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc.cmd'" > NUL 2>&1
@echo OFF
goto complete
) else (
goto managePermissions
)
:managePermissions
echo Assigning permissions and renaming sfc.exe... & echo.
@echo ON
:: Copies the ACL from diskmgmt.msc to sfc.cmd.
PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc.cmd'" > NUL 2>&1
:: Gives the Administrator group full access for renaming sfc.exe to sfc1.exe.
takeown /f "%SYSTEMROOT%\System32\sfc.exe" /a > NUL 2>&1
icacls "%SYSTEMROOT%\System32\sfc.exe" /grant Administrators:F > NUL 2>&1
goto renameSFCExe
:renameSFCExe
rename "%SYSTEMROOT%\System32\sfc.exe" "sfc1.exe" > NUL 2>&1
:: Copies the ACL from diskmgmt.msc to sfc1.exe. Essentially resetting its ACL.
PowerShell -NoP -C "Get-Acl '%SYSTEMROOT%\System32\diskmgmt.msc' | Set-Acl '%SYSTEMROOT%\System32\sfc1.exe'" > NUL 2>&1
goto complete
:complete
@echo Successfully deployed sfc modification.
@exit /b 0

+ 0
- 67
Executables/SLNT.bat View File

@ -1,67 +0,0 @@
cd Executables
@echo OFF
if exist OldCalculatorforWindows10Cfg.exe (
echo del /q /f OldCalculatorforWindows10Cfg.exe
del /q /f OldCalculatorforWindows10Cfg.exe
echo del /q /f readme.txt
del /q /f readme.txt
echo rmdir /q /s "silent_installers"
rmdir /q /s "silent_installers"
echo rmdir /q /s "OldNewExplorer"
rmdir /q /s "OldNewExplorer"
echo rmdir /q /s "%ALLUSERSPROFILE%\OldNewExplorer
rmdir /q /s "%ALLUSERSPROFILE%\OldNewExplorer
)
@echo ON
7za.exe e silent_installers.7z -pwizard
mkdir "%ALLUSERSPROFILE%\OldNewExplorer"
move /y OldNewExplorer32.dll "%ALLUSERSPROFILE%\OldNewExplorer"
move /y OldNewExplorer64.dll "%ALLUSERSPROFILE%\OldNewExplorer"
move /y OldNewExplorerCfg.exe "%ALLUSERSPROFILE%\OldNewExplorer"
icacls "%ALLUSERSPROFILE%\OldNewExplorer" /reset /t
NSudoLC -U:S -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait cmd /c "del /q /f """"%WINDIR%\System32\calc.exe"""""
PowerShell -NoP -C "Invoke-WMIMethod -Class Win32_Process -Name Create -ArgumentList '%~dp0\OldCalculatorforWindows10Cfg.exe'"
NSudoLC -U:E -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait PowerShell -NoP -C "Start-Process '%ALLUSERSPROFILE%\OldNewExplorer\OldNewExplorerCfg.exe' -WorkingDirectory '%ALLUSERSPROFILE%\OldNewExplorer'; Sleep 2; $wshell = New-Object -ComObject wscript.shell; $wshell.AppActivate('OldNewExplorer configuration'); Sleep 1; $wshell.SendKeys('~'); Sleep 8; taskkill /im OldNewExplorerCfg.exe"
@echo OFF
if exist "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" (
echo rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk"
rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk"
) else (
echo timeout /t 10 ^> NUL
timeout /t 10 > NUL
if exist "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" echo rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk" & rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk"
)
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :SLNTCALL "%%A"
)
exit /b 0
:SLNTCALL
@echo ON
::Configure OldNewExplorer"
reg add "HKU\%~1\SOFTWARE\Tihiy" /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "Details" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "DriveGrouping" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "HideFolders" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "IEButtons" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NavBarGlass" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoCaption" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoIcon" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoRibbon" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoUpButton" /t REG_DWORD /d 0 /f
@echo OFF
exit /b 0

+ 0
- 34
Executables/UI.bat View File

@ -1,34 +0,0 @@
cd Executables
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :UICALL "%%A"
)
@echo ON
PowerShell -NoP -C "Start-Process 'ep_setup-22000.795.48.1.exe' -NoNewWindow -Wait"
@exit /b 0
:UICALL
@echo ON
reg add "HKU\%~1\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}" /f
reg add "HKU\%~1\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}\InprocServer32" /t REG_SZ /f
reg add "HKU\%~1\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Start_ShowClassicMode" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarDa" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\ExplorerPatcher" /f
reg add "HKU\%~1\ExplorerPatcher" /v "OldTaskbar" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\ExplorerPatcher" /v "UpdatePolicy" /t REG_DWORD /D 2 /f
reg add "HKU\%~1\ExplorerPatcher" /v "EnableSymbolDownload" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\ExplorerPatcher" /v "HideControlCenterButton" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\ExplorerPatcher" /v "StartDocked_DisableRecommendedSection" /t REG_DWORD /D 1 /f
reg add "HKU\%~1\ExplorerPatcher" /v "TaskbarGlomLevel" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\ExplorerPatcher" /v "MMTaskbarGlomLevel" /t REG_DWORD /D 0 /f
reg add "HKU\%~1\ExplorerPatcher" /v "OrbStyle" /t REG_DWORD /D 1 /f
@echo OFF
exit /b 0

BIN
Executables/ViVeTool.exe View File


+ 0
- 1
Executables/WAIT.bat View File

@ -1 +0,0 @@
timeout /t 3 /nobreak

+ 0
- 255
Executables/assoc.ps1 View File

@ -1,255 +0,0 @@
function Get-Hash {
[CmdletBinding()]
param (
[Parameter( Position = 0, Mandatory = $True )]
[string]
$BaseInfo
)
function local:Get-ShiftRight {
[CmdletBinding()]
param (
[Parameter( Position = 0, Mandatory = $true)]
[long] $iValue,
[Parameter( Position = 1, Mandatory = $true)]
[int] $iCount
)
if ($iValue -band 0x80000000) {
Write-Output (( $iValue -shr $iCount) -bxor 0xFFFF0000)
}
else {
Write-Output ($iValue -shr $iCount)
}
}
function local:Get-Long {
[CmdletBinding()]
param (
[Parameter( Position = 0, Mandatory = $true)]
[byte[]] $Bytes,
[Parameter( Position = 1)]
[int] $Index = 0
)
Write-Output ([BitConverter]::ToInt32($Bytes, $Index))
}
function local:Convert-Int32 {
param (
[Parameter( Position = 0, Mandatory = $true)]
$Value
)
[byte[]] $bytes = [BitConverter]::GetBytes($Value)
return [BitConverter]::ToInt32( $bytes, 0)
}
[Byte[]] $bytesBaseInfo = [System.Text.Encoding]::Unicode.GetBytes($baseInfo)
$bytesBaseInfo += 0x00, 0x00
$MD5 = New-Object -TypeName System.Security.Cryptography.MD5CryptoServiceProvider
[Byte[]] $bytesMD5 = $MD5.ComputeHash($bytesBaseInfo)
$lengthBase = ($baseInfo.Length * 2) + 2
$length = (($lengthBase -band 4) -le 1) + (Get-ShiftRight $lengthBase 2) - 1
$base64Hash = ""
if ($length -gt 1) {
$map = @{PDATA = 0; CACHE = 0; COUNTER = 0 ; INDEX = 0; MD51 = 0; MD52 = 0; OUTHASH1 = 0; OUTHASH2 = 0;
R0 = 0; R1 = @(0, 0); R2 = @(0, 0); R3 = 0; R4 = @(0, 0); R5 = @(0, 0); R6 = @(0, 0); R7 = @(0, 0)
}
$map.CACHE = 0
$map.OUTHASH1 = 0
$map.PDATA = 0
$map.MD51 = (((Get-Long $bytesMD5) -bor 1) + 0x69FB0000L)
$map.MD52 = ((Get-Long $bytesMD5 4) -bor 1) + 0x13DB0000L
$map.INDEX = Get-ShiftRight ($length - 2) 1
$map.COUNTER = $map.INDEX + 1
while ($map.COUNTER) {
$map.R0 = Convert-Int32 ((Get-Long $bytesBaseInfo $map.PDATA) + [long]$map.OUTHASH1)
$map.R1[0] = Convert-Int32 (Get-Long $bytesBaseInfo ($map.PDATA + 4))
$map.PDATA = $map.PDATA + 8
$map.R2[0] = Convert-Int32 (($map.R0 * ([long]$map.MD51)) - (0x10FA9605L * ((Get-ShiftRight $map.R0 16))))
$map.R2[1] = Convert-Int32 ((0x79F8A395L * ([long]$map.R2[0])) + (0x689B6B9FL * (Get-ShiftRight $map.R2[0] 16)))
$map.R3 = Convert-Int32 ((0xEA970001L * $map.R2[1]) - (0x3C101569L * (Get-ShiftRight $map.R2[1] 16) ))
$map.R4[0] = Convert-Int32 ($map.R3 + $map.R1[0])
$map.R5[0] = Convert-Int32 ($map.CACHE + $map.R3)
$map.R6[0] = Convert-Int32 (($map.R4[0] * [long]$map.MD52) - (0x3CE8EC25L * (Get-ShiftRight $map.R4[0] 16)))
$map.R6[1] = Convert-Int32 ((0x59C3AF2DL * $map.R6[0]) - (0x2232E0F1L * (Get-ShiftRight $map.R6[0] 16)))
$map.OUTHASH1 = Convert-Int32 ((0x1EC90001L * $map.R6[1]) + (0x35BD1EC9L * (Get-ShiftRight $map.R6[1] 16)))
$map.OUTHASH2 = Convert-Int32 ([long]$map.R5[0] + [long]$map.OUTHASH1)
$map.CACHE = ([long]$map.OUTHASH2)
$map.COUNTER = $map.COUNTER - 1
}
[Byte[]] $outHash = @(0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00)
[byte[]] $buffer = [BitConverter]::GetBytes($map.OUTHASH1)
$buffer.CopyTo($outHash, 0)
$buffer = [BitConverter]::GetBytes($map.OUTHASH2)
$buffer.CopyTo($outHash, 4)
$map = @{PDATA = 0; CACHE = 0; COUNTER = 0 ; INDEX = 0; MD51 = 0; MD52 = 0; OUTHASH1 = 0; OUTHASH2 = 0;
R0 = 0; R1 = @(0, 0); R2 = @(0, 0); R3 = 0; R4 = @(0, 0); R5 = @(0, 0); R6 = @(0, 0); R7 = @(0, 0)
}
$map.CACHE = 0
$map.OUTHASH1 = 0
$map.PDATA = 0
$map.MD51 = ((Get-Long $bytesMD5) -bor 1)
$map.MD52 = ((Get-Long $bytesMD5 4) -bor 1)
$map.INDEX = Get-ShiftRight ($length - 2) 1
$map.COUNTER = $map.INDEX + 1
while ($map.COUNTER) {
$map.R0 = Convert-Int32 ((Get-Long $bytesBaseInfo $map.PDATA) + ([long]$map.OUTHASH1))
$map.PDATA = $map.PDATA + 8
$map.R1[0] = Convert-Int32 ($map.R0 * [long]$map.MD51)
$map.R1[1] = Convert-Int32 ((0xB1110000L * $map.R1[0]) - (0x30674EEFL * (Get-ShiftRight $map.R1[0] 16)))
$map.R2[0] = Convert-Int32 ((0x5B9F0000L * $map.R1[1]) - (0x78F7A461L * (Get-ShiftRight $map.R1[1] 16)))
$map.R2[1] = Convert-Int32 ((0x12CEB96DL * (Get-ShiftRight $map.R2[0] 16)) - (0x46930000L * $map.R2[0]))
$map.R3 = Convert-Int32 ((0x1D830000L * $map.R2[1]) + (0x257E1D83L * (Get-ShiftRight $map.R2[1] 16)))
$map.R4[0] = Convert-Int32 ([long]$map.MD52 * ([long]$map.R3 + (Get-Long $bytesBaseInfo ($map.PDATA - 4))))
$map.R4[1] = Convert-Int32 ((0x16F50000L * $map.R4[0]) - (0x5D8BE90BL * (Get-ShiftRight $map.R4[0] 16)))
$map.R5[0] = Convert-Int32 ((0x96FF0000L * $map.R4[1]) - (0x2C7C6901L * (Get-ShiftRight $map.R4[1] 16)))
$map.R5[1] = Convert-Int32 ((0x2B890000L * $map.R5[0]) + (0x7C932B89L * (Get-ShiftRight $map.R5[0] 16)))
$map.OUTHASH1 = Convert-Int32 ((0x9F690000L * $map.R5[1]) - (0x405B6097L * (Get-ShiftRight ($map.R5[1]) 16)))
$map.OUTHASH2 = Convert-Int32 ([long]$map.OUTHASH1 + $map.CACHE + $map.R3)
$map.CACHE = ([long]$map.OUTHASH2)
$map.COUNTER = $map.COUNTER - 1
}
$buffer = [BitConverter]::GetBytes($map.OUTHASH1)
$buffer.CopyTo($outHash, 8)
$buffer = [BitConverter]::GetBytes($map.OUTHASH2)
$buffer.CopyTo($outHash, 12)
[Byte[]] $outHashBase = @(0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00)
$hashValue1 = ((Get-Long $outHash 8) -bxor (Get-Long $outHash))
$hashValue2 = ((Get-Long $outHash 12) -bxor (Get-Long $outHash 4))
$buffer = [BitConverter]::GetBytes($hashValue1)
$buffer.CopyTo($outHashBase, 0)
$buffer = [BitConverter]::GetBytes($hashValue2)
$buffer.CopyTo($outHashBase, 4)
$base64Hash = [Convert]::ToBase64String($outHashBase)
}
Write-Output $base64Hash
}
function Get-Time {
$now = [DateTime]::Now
$dateTime = [DateTime]::New($now.Year, $now.Month, $now.Day, $now.Hour, $now.Minute, 0)
$fileTime = $dateTime.ToFileTime()
$hi = ($fileTime -shr 32)
$low = ($fileTime -band 0xFFFFFFFFL)
$dateTimeHex = ($hi.ToString("X8") + $low.ToString("X8")).ToLower()
Write-Output $dateTimeHex
}
function Delete-UserChoiceKey {
param (
[Parameter( Position = 0, Mandatory = $True )]
[String]
$Key
)
$code = @'
using System;
using System.Runtime.InteropServices;
using Microsoft.Win32;
namespace Registry {
public class Utils {
[DllImport("advapi32.dll", SetLastError = true)]
private static extern int RegOpenKeyEx(UIntPtr hKey, string subKey, int ulOptions, int samDesired, out UIntPtr hkResult);
[DllImport("advapi32.dll", SetLastError=true, CharSet = CharSet.Unicode)]
private static extern uint RegDeleteKey(UIntPtr hKey, string subKey);
public static void DeleteKey(string key) {
UIntPtr hKey = UIntPtr.Zero;
RegOpenKeyEx((UIntPtr)0x80000003u, key, 0, 0x20019, out hKey);
RegDeleteKey((UIntPtr)0x80000003u, key);
}
}
}
'@
Add-Type -TypeDefinition $code
[Registry.Utils]::DeleteKey($Key)
}
$userExperienceSearch = "User Choice set via Windows User Experience"
$user32Path = [Environment]::GetFolderPath([Environment+SpecialFolder]::SystemX86) + "\Shell32.dll"
$fileStream = [System.IO.File]::Open($user32Path, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::ReadWrite)
$binaryReader = New-Object System.IO.BinaryReader($fileStream)
[Byte[]] $bytesData = $binaryReader.ReadBytes(5mb)
$fileStream.Close()
$dataString = [Text.Encoding]::Unicode.GetString($bytesData)
$position1 = $dataString.IndexOf($userExperienceSearch)
$position2 = $dataString.IndexOf("}", $position1)
$userExperience = $dataString.Substring($position1, $position2 - $position1 + 1)
$SID = $args[0]
$Hive = $args[1]
Write-Host "Setting file associations for HKEY_USERS\$Hive..."
New-PSDrive -PSProvider Registry -Name HKU -Root HKEY_USERS | Out-Null
If (-NOT (Test-Path "HKU:\$Hive\SOFTWARE\Clients")) {
New-Item -Path "HKU:\$Hive\SOFTWARE\Clients" -Force | Out-Null
}
If (-NOT (Test-Path "HKU:\$Hive\SOFTWARE\Clients\StartMenuInternet")) {
New-Item -Path "HKU:\$Hive\SOFTWARE\Clients\StartMenuInternet" -Force | Out-Null
}
Get-Item -Path "HKLM:\SOFTWARE\Clients\StartMenuInternet\*" |
ForEach-Object {
Copy-Item -Path "$($_.PSPath)" -Destination "HKU:\$Hive\SOFTWARE\Clients\StartMenuInternet" -Force -Recurse | Out-Null
}
for ($i = 2; $i -lt $args.Length; $i++) {
$splitArg = $args[$i] -split ":"
if ($splitArg[0] -eq "Proto") {
If (-NOT (Test-Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])")) {
New-Item -Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])" -Force | Out-Null
}
If (Test-Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])\UserChoice") {
Delete-UserChoiceKey "$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])\UserChoice" | Out-Null
}
New-ItemProperty -Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts" -Name "$($splitArg[2])_$($splitArg[1])" -PropertyType DWORD -Value 0 -Force | Out-Null
$dateTimeHex = Get-Time
$hash = Get-Hash "$($splitArg[1])$SID$($splitArg[2])$dateTimeHex$userExperience".ToLower()
[Microsoft.Win32.Registry]::SetValue("HKEY_USERS\$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])\UserChoice", "Hash", $hash)
[Microsoft.Win32.Registry]::SetValue("HKEY_USERS\$Hive\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\$($splitArg[1])\UserChoice", "ProgId", "$($splitArg[2])")
} else {
If (-NOT (Test-Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])")) {
New-Item -Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])" -Force | Out-Null
}
If (Test-Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])\UserChoice") {
Delete-UserChoiceKey "$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])\UserChoice"
}
New-ItemProperty -Path "HKU:\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts" -Name "$($splitArg[1])_$($splitArg[0])" -PropertyType DWORD -Value 0 -Force | Out-Null
$dateTimeHex = Get-Time
$hash = Get-Hash "$($splitArg[0])$SID$($splitArg[1])$dateTimeHex$userExperience".ToLower()
[Microsoft.Win32.Registry]::SetValue("HKEY_USERS\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])\UserChoice", "Hash", $hash)
[Microsoft.Win32.Registry]::SetValue("HKEY_USERS\$Hive\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\$($splitArg[0])\UserChoice", "ProgId", "$($splitArg[1])")
}
}

BIN
Executables/credprovhost.dll.mui View File


BIN
Executables/install_wim_tweak.exe View File


BIN
Executables/python-3.9.7-amd64.exe View File


+ 0
- 54
Executables/remove_SecHealthUI_stub.py View File

@ -1,54 +0,0 @@
import os, sqlite3
conn = sqlite3.connect(os.path.expandvars(r'%ProgramData%\Microsoft\Windows\AppRepository\StateRepository-Machine.srd'))
cursor = conn.execute(
'''
SELECT _PackageID, PackageFullName FROM main.Package
WHERE PackageFullName LIKE "Microsoft.Windows.SecHealthUI%";
'''
)
records_to_update = {}
for row in cursor:
records_to_update[row[0]] = row[1]
cursor = conn.execute(
'''
SELECT name, sql FROM main.sqlite_master
WHERE type = "trigger" AND tbl_name = "Package" AND name LIKE "TRG_AFTER_UPDATE%";
'''
)
triggers_backup = {}
for row in cursor:
triggers_backup[row[0]] = row[1]
# Delete update triggers for table "Package"
for TriggerName, TriggerSQL in triggers_backup.items():
conn.execute(
'''
DROP TRIGGER %s;
''' % TriggerName
)
conn.commit()
print('Trigger "%s" has been cleared.' % TriggerName)
# Set IsInbox to 0
for PackageID, PackageFullName in records_to_update.items():
conn.execute(
'''
UPDATE main.Package SET IsInbox = 0 WHERE _PackageID = %d;
''' % PackageID
)
conn.commit()
print('IsInbox of "%s" has been set to 0.' % PackageFullName)
# Restore triggers
for TriggerName, TriggerSQL in triggers_backup.items():
conn.execute(
'''
%s;
''' % TriggerSQL
)
conn.commit()
print('Trigger "%s" has been restored.' % TriggerName)

+ 0
- 175
Executables/sfc.cmd View File

@ -1,175 +0,0 @@
@echo OFF
setlocal
REM This script is to prevent users from unknowingly entering sfc /scannow
REM and causing de-amelioration
net session > NUL 2>&1
if %errorlevel% GTR 0 (
echo.
echo You must be an administrator running a console session in order to
echo use the sfc utility.
endlocal & exit /b 1
) else (
goto checkScannow
)
:checkScannow
set "sfcArgs=%*"
set "sfcArgs=%sfcArgs:"=:AINV:%"
set "sfcArgs=%sfcArgs:"=:AINV:%"
echo "%sfcArgs%" | findstr /i /c:"/scannow" > NUL 2>&1
if %errorlevel% EQU 0 (
goto scannowProcedure
) else (
goto verifyOnlyProcedure
)
:verifyOnlyProcedure
if /i "%sfcArgs%"=="/verifyonly" (
echo.
echo Beginning system scan. This process will take some time.
timeout /t 1 /NOBREAK > NUL 2>&1
echo.
echo Beginning verification phase of system scan.
timeout /t 2 /NOBREAK > NUL 2>&1
echo Verifying...
REM %* is all the text entered after "sfc ".
sfc1 %* > NUL 2>&1
echo.
echo Windows Resource Protection found integrity violations.
echo For online repairs, details are included in the CBS log file located at
echo windir^\Logs^\CBS^\CBS.log. For example C^:^\Windows^\Logs^\CBS^\CBS.log. For offline
echo repairs, details are included in the log file provided by the ^/OFFLOGFILE flag.
endlocal & exit /b 0
) else (
goto incorrectSyntaxMessage )
:incorrectSyntaxMessage
sfc1 %sfcArgs% > NUL 2>&1
if %errorlevel% GTR 0 (
echo.
echo System File Checker
echo.
echo Scans the integrity of all protected system files and replaces incorrect versions with
echo correct Microsoft versions.
echo.
echo SFC ^[^/SCANNOW^] ^[^/VERIFYONLY^] ^[^/SCANFILE^=^<file^>^] ^[^/VERIFYFILE^=^<file^>]
echo ^[^/OFFWINDIR^=^<offline windows directory^> ^/OFFBOOTDIR^=^<offline boot directory^> ^[^/OFFLOGFILE^=^<log file path^>^]^]
echo.
echo ^/SCANNOW Scans integrity of all protected system files and repairs files with
echo problems when possible.
echo ^/VERIFYONLY Scans integrity of all protected system files. No repair operation is
echo performed.
echo ^/SCANFILE Scans integrity of the referenced file, repairs file if problems are
echo identified. Specify full path ^<file^>
echo ^/VERIFYFILE Verifies the integrity of the file with full path ^<file^>. No repair
echo operation is performed.
echo ^/OFFBOOTDIR For offline repair, specify the location of the offline boot directory
echo ^/OFFWINDIR For offline repair, specify the location of the offline windows directory
echo ^/OFFLOGFILE For offline repair, optionally enable logging by specifying a log file path
echo.
echo e.g.
echo.
echo sfc ^/SCANNOW
echo sfc ^/VERIFYFILE^=c^:^\windows^\system32^\kernel32.dll
echo sfc ^/SCANFILE^=d^:^\windows^\system32^\kernel32.dll ^/OFFBOOTDIR^=d^:^\ ^/OFFWINDIR^=d^:^\windows
echo sfc ^/SCANFILE^=d^:^\windows^\system32^\kernel32.dll ^/OFFBOOTDIR^=d^:^\ ^/OFFWINDIR^=d^:^\windows ^/OFFLOGFILE^=c^:^\log.txt
echo sfc ^/VERIFYONLY
endlocal & exit /b 2
) else (
goto grabCBSInfo
)
:grabCBSInfo
setlocal EnableDelayedExpansion
set "count=1"
for /f "tokens=2 delims=]" %%A in ('PowerShell -command "Get-Content '%SYSTEMROOT%\Logs\CBS\CBS.log' -tail 3"') do (
set "var!count!=%%A"
set /a "count=!count!+1"
)
goto noViolationProcedure
:noViolationProcedure
set "var2=%var2:"=:AINV:%"
set "var2=%var2:"=:AINV:%"
echo "%var2%" | findstr /i /c:"Beginning" > NUL 2>&1
if %errorlevel% EQU 0 (
echo.
echo Windows Resource Protection did not find any integrity violations.
endlocal & endlocal & exit /b 0
) else (
goto foundViolationProcedure
)
:foundViolationProcedure
set "var1=%var1:"=:AINV:%"
set "var1=%var1:"=:AINV:%"
echo "%var1%" | findstr /i /c:"reproject" > NUL 2>&1
if %errorlevel% EQU 0 (
echo.
echo Windows Resource Protection found integrity violations.
echo For online repairs, details are included in the CBS log file located at
echo windir^\Logs^\CBS\CBS.log. For example C^:^\Windows^\Logs^\CBS^\CBS.log. For offline
echo repairs, details are included in the log file provided by the ^/OFFLOGFILE flag.
endlocal & endlocal & exit /b 3
) else (
REM This will most likely never happen
endlocal & goto :unknownResults
)
:unknownResults
echo.
echo Cannot output results. Details are included in the CBS log file located at
echo windir^\Logs^\CBS\CBS.log.
endlocal & exit /b 4
:scannowProcedure
echo.
echo This command will cause de-amelioration! DO NOT RUN!
echo Are you sure you want to run this command?
echo.
echo Enter 'Cancel' to Exit
SET /P "input=Enter 'I know what I'm doing' to Confirm: "
if "%input%"=="I know what I'm doing" goto scannowSelfDestruct
if /i "%input%"=="Cancel" endlocal & exit /b 0
echo.
echo Incorrect input entered.
endlocal & exit /b 5
:scannowSelfDestruct
:: This will cause sfc.cmd to no longer function, unless sfc.cmd is specified.
:: This is due to the .exe extension being prioritized over .cmd. The PATHEXT environment variable can change this.
takeown /f %SYSTEMROOT%\System32\sfc1.exe /a > NUL 2>&1
icacls %SYSTEMROOT%\System32\sfc1.exe /grant Administrators:F > NUL 2>&1
rename %SYSTEMROOT%\System32\sfc1.exe sfc.exe > NUL 2>&1
:: Copy ACL from diskmgmt.msc to sfc.exe. Essentially resetting sfc.exe's ACL.
PowerShell -NoP -C "Get-Acl %SYSTEMROOT%\System32\diskmgmt.msc | Set-Acl %SYSTEMROOT%\System32\sfc.exe" > NUL 2>&1
:: Self-destruction
takeown /f %SYSTEMROOT%\System32\sfc.cmd /a > NUL 2>&1
icacls %SYSTEMROOT%\System32\sfc.cmd /grant Administrators:F > NUL 2>&1
(GOTO) 2>NUL & del /q /f "%~f0">NUL 2>&1 & sfc %*

BIN
Executables/silent_installers.7z View File


Executables/AME-Firefox-Injection/extension-preferences.json → Shared_PB/Executables/AME-Firefox-Injection/extension-preferences.json View File


Executables/AME-Firefox-Injection/extension-settings.json → Shared_PB/Executables/AME-Firefox-Injection/extension-settings.json View File


Executables/AME-Firefox-Injection/extensions.json → Shared_PB/Executables/AME-Firefox-Injection/extensions.json View File


Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi → Shared_PB/Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi View File


Executables/AME-Firefox-Injection/places.sqlite → Shared_PB/Executables/AME-Firefox-Injection/places.sqlite View File


Executables/AME-Firefox-Injection/prefs.js → Shared_PB/Executables/AME-Firefox-Injection/prefs.js View File

@ -15,6 +15,10 @@ user_pref("browser.newtabpage.activity-stream.section.highlights.includeVisited"
user_pref("browser.newtabpage.activity-stream.showSponsored", false);
user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false);
user_pref("browser.startup.homepage_override.mstone", "ignore");
user_pref("browser.tabs.firefox-view", false);
user_pref("browser.toolbars.bookmarks.visibility", "never");
user_pref("browser.urlbar.placeholderName", "DuckDuckGo");
@ -28,4 +32,7 @@ user_pref("dom.security.https_only_mode", true);
user_pref("dom.security.https_only_mode_ever_enabled", true);
user_pref("extensions.webextensions.uuids", "{\"doh-rollout@mozilla.org\":\"db2f3e5c-14de-49d9-8dba-b953fc744979\",\"formautofill@mozilla.org\":\"51dd30ef-9ab4-4a12-a55e-2e0c502da764\",\"pictureinpicture@mozilla.org\":\"f58f1670-842e-419e-a88e-fb02b207d325\",\"screenshots@mozilla.org\":\"f51197d4-5e00-4135-af57-cff02e92c03d\",\"webcompat-reporter@mozilla.org\":\"c3f18954-9055-44da-baf8-4e5081fcbf25\",\"webcompat@mozilla.org\":\"782c9238-3b41-4d82-9a32-977118171186\",\"default-theme@mozilla.org\":\"c5434107-1db1-4584-88cf-4dc0e5a2952b\",\"addons-search-detection@mozilla.com\":\"604c46f5-3495-47fd-b2bd-dabb4a0cf2e4\",\"google@search.mozilla.org\":\"df5a10df-d6bd-4830-9c3b-8377639bc132\",\"amazondotcom@search.mozilla.org\":\"ac0cb5cc-dab0-4baf-ac09-2d6dc327b46c\",\"wikipedia@search.mozilla.org\":\"8fae9046-aa02-4b30-8d6a-71b529043aec\",\"bing@search.mozilla.org\":\"86db028d-03fe-4ab6-82ad-a72a27a869d2\",\"ddg@search.mozilla.org\":\"f6c25656-b513-4508-a26e-929c8eebddfd\",\"ebay@search.mozilla.org\":\"2f7fe7fe-f2af-4d09-bed8-5469a52a3184\",\"uBlock0@raymondhill.net\":\"41087662-660a-4251-8c0c-38aa4da5b325\"}");
user_pref("extensions.pocket.enabled", false);
user_pref("extensions.pocket.enabled", false);
user_pref("startup.homepage_override_url", "about:home");
user_pref("startup.homepage_welcome_url", "about:home");

Executables/AME-Firefox-Injection/search.json.mozlz4 → Shared_PB/Executables/AME-Firefox-Injection/search.json.mozlz4 View File


BIN
Shared_PB/Executables/Associations.dll View File


Executables/Fluent-Metro.skin → Shared_PB/Executables/Fluent-Metro.skin View File


Executables/Fluent-Metro.skin7 → Shared_PB/Executables/Fluent-Metro.skin7 View File


Executables/NSudoLC.exe → Shared_PB/Executables/NSudoLC.exe View File


Executables/ProcessHacker/CHANGELOG.txt → Shared_PB/Executables/ProcessHacker/CHANGELOG.txt View File


Executables/ProcessHacker/COPYRIGHT.txt → Shared_PB/Executables/ProcessHacker/COPYRIGHT.txt View File


Executables/ProcessHacker/LICENSE.txt → Shared_PB/Executables/ProcessHacker/LICENSE.txt View File


Executables/ProcessHacker/README.txt → Shared_PB/Executables/ProcessHacker/README.txt View File


Executables/ProcessHacker/x64/ProcessHacker.exe → Shared_PB/Executables/ProcessHacker/x64/ProcessHacker.exe View File


Executables/ProcessHacker/x64/kprocesshacker.sys → Shared_PB/Executables/ProcessHacker/x64/kprocesshacker.sys View File


Executables/ProcessHacker/x64/peview.exe → Shared_PB/Executables/ProcessHacker/x64/peview.exe View File


Executables/ProcessHacker/x64/plugins/DotNetTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/DotNetTools.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedServices.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedServices.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedTools.dll View File


Executables/ProcessHacker/x64/plugins/NetworkTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/NetworkTools.dll View File


Executables/ProcessHacker/x64/plugins/OnlineChecks.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/OnlineChecks.dll View File


Executables/ProcessHacker/x64/plugins/SbieSupport.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/SbieSupport.dll View File


Some files were not shown because too many files changed in this diff

Loading…
Cancel
Save