Browse Source

Update

master
Joe 1 year ago
parent
commit
a683c0cd11
139 changed files with 3976 additions and 3668 deletions
  1. +1
    -0
      21H1-21H2_PB
  2. BIN
      21H1-21H2_Standalone.zip
  3. +0
    -16
      Configuration/custom.yml
  4. +0
    -8
      Configuration/features/base/admin.yml
  5. +0
    -38
      Configuration/features/base/base.yml
  6. +0
    -14
      Configuration/features/base/choco.yml
  7. +0
    -676
      Configuration/features/base/files.yml
  8. +0
    -8
      Configuration/features/base/login.yml
  9. +0
    -8
      Configuration/features/base/permission.yml
  10. +0
    -79
      Configuration/features/base/services.yml
  11. +0
    -8
      Configuration/features/base/shortcuts.yml
  12. +0
    -8
      Configuration/features/base/silent.yml
  13. +0
    -8
      Configuration/features/base/wallpaper.yml
  14. +0
    -8
      Configuration/features/base/windowsterminal.yml
  15. +0
    -97
      Configuration/features/languages/lang.yml
  16. +0
    -4
      Configuration/langs.txt
  17. BIN
      Executables/7za.dll
  18. BIN
      Executables/7za.exe
  19. BIN
      Executables/7zxa.dll
  20. +0
    -12
      Executables/ADMIN.bat
  21. +0
    -42
      Executables/APPX.bat
  22. BIN
      Executables/Albacore.ViVe.dll
  23. +0
    -4
      Executables/BANN.bat
  24. +0
    -100
      Executables/CHOC.bat
  25. +0
    -6
      Executables/DEFENDER.bat
  26. +0
    -1
      Executables/DNET.bat
  27. +0
    -17
      Executables/EDGE.bat
  28. +0
    -13
      Executables/EDGEX.bat
  29. +0
    -13
      Executables/FILEASSOC.bat
  30. +0
    -202
      Executables/FIREFOXCONF.bat
  31. +0
    -17
      Executables/FileAssociations.xml
  32. +0
    -8
      Executables/LOGIN.bat
  33. +0
    -16
      Executables/Layout.xml
  34. +0
    -1
      Executables/ONED.bat
  35. +0
    -8
      Executables/PERM.bat
  36. +0
    -5
      Executables/PYTH.bat
  37. +0
    -1511
      Executables/Packages.txt
  38. +0
    -387
      Executables/REGI.bat
  39. +0
    -38
      Executables/SERV.bat
  40. +0
    -20
      Executables/SHRT.bat
  41. +0
    -42
      Executables/SLNT.bat
  42. +0
    -33
      Executables/TILE.bat
  43. +0
    -4
      Executables/UPDATES.bat
  44. BIN
      Executables/UsrClass.dat
  45. BIN
      Executables/ViVeTool.exe
  46. +0
    -1
      Executables/WAIT.bat
  47. +0
    -128
      Executables/WALLPAPER.bat
  48. +0
    -3
      Executables/WINTERM.bat
  49. BIN
      Executables/credprovhost.dll.mui
  50. BIN
      Executables/install_wim_tweak.exe
  51. BIN
      Executables/python-3.9.7-amd64.exe
  52. +0
    -54
      Executables/remove_SecHealthUI_stub.py
  53. BIN
      Executables/silent_installers.7z
  54. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extension-preferences.json
  55. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extension-settings.json
  56. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extensions.json
  57. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi
  58. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/places.sqlite
  59. +8
    -1
      Shared_PB/Executables/AME-Firefox-Injection/prefs.js
  60. +0
    -0
      Shared_PB/Executables/AME-Firefox-Injection/search.json.mozlz4
  61. BIN
      Shared_PB/Executables/Associations.dll
  62. +0
    -0
      Shared_PB/Executables/Fluent-Metro.skin
  63. +0
    -0
      Shared_PB/Executables/Fluent-Metro.skin7
  64. +0
    -0
      Shared_PB/Executables/NSudoLC.exe
  65. +0
    -0
      Shared_PB/Executables/ProcessHacker/CHANGELOG.txt
  66. +0
    -0
      Shared_PB/Executables/ProcessHacker/COPYRIGHT.txt
  67. +0
    -0
      Shared_PB/Executables/ProcessHacker/LICENSE.txt
  68. +0
    -0
      Shared_PB/Executables/ProcessHacker/README.txt
  69. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/ProcessHacker.exe
  70. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/kprocesshacker.sys
  71. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/peview.exe
  72. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/DotNetTools.dll
  73. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll
  74. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedServices.dll
  75. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedTools.dll
  76. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/NetworkTools.dll
  77. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/OnlineChecks.dll
  78. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/SbieSupport.dll
  79. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/ToolStatus.dll
  80. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/Updater.dll
  81. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/UserNotes.dll
  82. +0
    -0
      Shared_PB/Executables/ProcessHacker/x64/plugins/WindowExplorer.dll
  83. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/ProcessHacker.exe
  84. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/kprocesshacker.sys
  85. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/peview.exe
  86. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/DotNetTools.dll
  87. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedNotifications.dll
  88. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedServices.dll
  89. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedTools.dll
  90. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/NetworkTools.dll
  91. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/OnlineChecks.dll
  92. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/SbieSupport.dll
  93. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/ToolStatus.dll
  94. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/Updater.dll
  95. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/UserNotes.dll
  96. +0
    -0
      Shared_PB/Executables/ProcessHacker/x86/plugins/WindowExplorer.dll
  97. +0
    -0
      Shared_PB/Executables/SFCDEPLOY.bat
  98. BIN
      Shared_PB/Executables/ame-assassin/Microsoft.Data.Sqlite.dll
  99. BIN
      Shared_PB/Executables/ame-assassin/Microsoft.Win32.Registry.dll
  100. BIN
      Shared_PB/Executables/ame-assassin/SQLitePCLRaw.batteries_v2.dll

+ 1
- 0
21H1-21H2_PB

@ -0,0 +1 @@
Subproject commit ee13017910963ec819bd7bc53727e9e3fd0e7d0a

BIN
21H1-21H2_Standalone.zip View File


+ 0
- 16
Configuration/custom.yml View File

@ -1,16 +0,0 @@
---
title: Custom
description: Custom AME configuration
privilege: Admin
actions: []
features:
- features/base/base.yml
- features/base/files.yml
- features/base/shortcuts.yml
- features/base/choco.yml
- features/base/windowsterminal.yml
- features/base/silent.yml
- features/base/login.yml
- features/base/wallpaper.yml
- features/base/permission.yml
- features/base/admin.yml

+ 0
- 8
Configuration/features/base/admin.yml View File

@ -1,8 +0,0 @@
---
title: Admin
description: Remove user from admin group, enable administrator account
privilege: Admin
actions:
- !run:
currentDir: true
exe: "ADMIN.bat"

+ 0
- 38
Configuration/features/base/base.yml View File

@ -1,38 +0,0 @@
---
title: Base
description: Base AME configuration
privilege: Admin
actions:
- !run:
currentDir: true
exe: "DNET.bat"
- !run:
currentDir: true
exe: "REGI.bat"
- !run:
currentDir: true
exe: "APPX.bat"
- !run:
currentDir: true
exe: "EDGE.bat"
- !run:
currentDir: true
exe: "EDGEX.bat"
- !run:
currentDir: true
exe: "ONED.bat"
- !run:
currentDir: true
exe: "PYTH.bat"
- !run:
currentDir: true
exe: "SFCDEPLOY.bat"
- !run:
currentDir: true
exe: "TILE.bat"
- !run:
currentDir: true
exe: "BANN.bat"
- !run:
currentDir: true
exe: "SERV.bat"

+ 0
- 14
Configuration/features/base/choco.yml View File

@ -1,14 +0,0 @@
---
title: Chocolatey
description: Chocolatey configuration
privilege: Admin
actions:
- !run:
currentDir: true
exe: "CHOC.bat"
- !run:
currentDir: true
exe: "FIREFOXCONF.bat"
- !run:
currentDir: true
exe: "FILEASSOC.bat"

+ 0
- 676
Configuration/features/base/files.yml View File

@ -1,676 +0,0 @@
title: Files
description: delete files
privilege: TrustedInstaller
actions:
- !cmd:
command: "taskkill /f /im explorer.exe"
- !cmd:
command: "taskkill /f /im msedge.exe"
- !task:
path: "\\Microsoft\\Windows\\Customer Experience Improvement Program\\Consolidator"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Customer Experience Improvement Program\\KernelCeipTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Customer Experience Improvement Program\\UsbCeip"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Application Experience\\Microsoft Compatibility Appraiser"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Application Experience\\ProgramDataUpdater"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Application Experience\\StartupAppTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Clip\\License Validation"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Customer Experience Improvement Program\\UsbCeip"
state: absent
- !task:
path: "\\Microsoft\\Windows\\HelloFace\\FODCleanupTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Maps\\MapsToastTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Maps\\MapsUpdateTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\UpdateOrchestrator\\Schedule Scan"
state: absent
- !task:
path: "\\Microsoft\\Windows\\UpdateOrchestrator\\Schedule Scan Static Task"
state: absent
- !task:
path: "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateModelTask"
state: absent
- !task:
path: "\\Microsoft\\Windows\\UpdateOrchestrator\\USO_UxBroker"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Windows Defender\\Windows Defender Cache Maintenance"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Windows Defender\\Windows Defender Cleanup"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Windows Defender\\Windows Defender Scheduled Scan"
state: absent
- !task:
path: "\\Microsoft\\Windows\\Windows Defender\\Windows Defender Verification"
state: absent
- !task:
path: "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start"
state: absent
- !taskkill:
name: "NisSrv"
- !taskkill:
name: "MicrosoftEdgeUpdate"
- !taskkill:
name: "SecurityHealthService"
- !taskkill:
name: "SecurityHealthSystray"
- !taskkill:
name: "SkypeBackgroundHost"
- !taskkill:
name: "OneDrive"
- !taskkill:
name: "MsMpEng"
- !taskkill:
name: "msiexec"
- !file:
path: "%windir%\\System32\\smartscreen.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthSystray.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthService.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthAgent.dll"
- !file:
path: "%windir%\\System32\\SecurityHealthHost.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthSSO.dll"
- !file:
path: "%windir%\\System32\\smartscreenps.dll"
- !file:
path: "%ProgramFiles(x86)%\\Windows Media Player"
- !file:
path: "%ProgramW6432%\\Windows Media Player"
- !file:
path: "%ProgramFiles(x86)%\\Windows Mail"
- !file:
path: "%ProgramW6432%\\Windows Mail"
- !file:
path: "%windir%\\System32\\SecurityHealthSystray.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthService.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthHost.exe"
- !file:
path: "%windir%\\System32\\SecurityHealthAgent.dll"
- !file:
path: "%windir%\\System32\\wscsvc.dll"
- !file:
path: "%ProgramW6432%\\Windows Defender"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows Defender"
- !file:
path: "%ProgramFiles(x86)%\\Windows Defender"
- !file:
path: "%ProgramW6432%\\Microsoft Update Health Tools"
- !file:
path: "%ProgramFiles(x86)%\\Internet Explorer"
- !file:
path: "%ProgramW6432%\\Internet Explorer"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate"
- !file:
path: "%windir%\\diagnostics\\system\\Apps"
- !file:
path: "%windir%\\SystemApps\\Microsoft.XboxIdentityProvider*"
- !file:
path: "%windir%\\SystemApps\\Microsoft.XboxGameCallableUI*"
- !file:
path: "%windir%\\SystemApps\\Microsoft.Windows.Cortana*"
- !file:
path: "%windir%\\SystemApps\\Microsoft.MicrosoftEdge*"
- !file:
path: "%windir%\\SystemApps\\*ContentDeliveryManager*"
- !file:
path: "%windir%\\SystemApps\\*CloudExperienceHost*"
- !file:
path: "%ProgramW6432%\\PCHealthCheck"
- !file:
path: "%ProgramW6432%\\Windows Defender Advanced Threat Protection"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection"
- !file:
path: "%windir%\\System32\\MusNotifyIcon.exe"
- !file:
path: "%ProgramW6432%\\Windows Security"
- !file:
path: "%windir%\\System32\\wuapi.dll"
- !file:
path: "%windir%\\System32\\wuapihost.exe"
- !file:
path: "%windir%\\System32\\wuauclt.exe"
- !file:
path: "%windir%\\System32\\wuaueng.dll"
- !file:
path: "%ProgramFiles(x86)%\\Microsoft"
- !file:
path: "%windir%\\System32\\AppLockerCSP.dll"
- !file:
path: "%windir%\\SysWOW64\\AppLockerCSP.dll"
- !file:
path: "%windir%\\System32\\drivers\\applockerfltr.sys"
- !file:
path: "%windir%\\System32\\en-US\\applockercsp.dll.mui"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\AppLocker\\AppLocker.psd1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\AppLocker\\AppLocker.psd1"
- !file:
path: "C:\\ProgramData\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\EventTracingManagement\\MSFT_AutologgerConfig_v1.0.cdxml"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\EventTracingManagement\\MSFT_AutologgerConfig_v1.0.cdxml"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\EventTracingManagement\\MSFT_AutologgerConfig_v1.0.format.ps1xml"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\EventTracingManagement\\MSFT_AutologgerConfig_v1.0.format.ps1xml"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\Provisioning\\provautologger_add.reg"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\Provisioning\\provautologger_del.reg"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\Provisioning\\provautologger_add.reg"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\Provisioning\\provautologger_del.reg"
- !file:
path: "%windir%\\System32\\ClipSVC.dll"
- !file:
path: "%windir%\\System32\\en-US\\clipsvc.dll.mui"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\ClipSVC\\tokens.dat"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Windows\\ClipSVC\\tokens.dat"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Windows\\ClipSVC\\tokens.dat"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\ClipSVC"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Windows\\ClipSVC"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Windows\\ClipSVC"
- !file:
path: "%windir%\\System32\\ClipUp.exe"
- !file:
path: "%windir%\\System32\\DeliveryOptimizationMIProv.mof"
- !file:
path: "%windir%\\PolicyDefinitions\\DeliveryOptimization.admx"
- !file:
path: "%windir%\\System32\\DeliveryOptimizationMIProvUninstall.mof"
- !file:
path: "%windir%\\PolicyDefinitions\\en-US\\DeliveryOptimization.adml"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimization.psd1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimization.psd1"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimizationStatus.psm1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimizationStatus.psm1"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimizationVerboseLogs.psm1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\DeliveryOptimizationVerboseLogs.psm1"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\migration.dat"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\dosvcState.dat"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\migration.dat.LOG1"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\migration.dat.LOG2"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\dosvcState.dat.LOG1"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\State\\dosvcState.dat.LOG2"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\Microsoft.Windows.DeliveryOptimization.AdminCommands.dll"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\DeliveryOptimization\\Microsoft.Windows.DeliveryOptimization.AdminCommands.dll"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20201119_074736_959.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210317_230544_126.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210331_194932_086.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210401_010837_018.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210401_011649_049.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210401_014000_025.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210401_021554_184.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210401_023127_689.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210424_231742_182.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\dosvc.20210424_232559_356.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\domgmt.20210317_230400_085.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\domgmt.20210401_011537_705.etl"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization\\Logs\\domgmt.20210424_232442_384.etl"
- !file:
path: "%windir%\\System32\\DeviceCensus.exe"
- !file:
path: "%windir%\\System32\\diagtrack.dll"
- !file:
path: "%windir%\\DiagTrack\\utc.allow.diffbase"
- !file:
path: "%windir%\\DiagTrack\\analyticsevents.dat"
- !file:
path: "%windir%\\DiagTrack\\utc.privacy.diffbase"
- !file:
path: "%windir%\\DiagTrack\\Settings\\utc.app.json"
- !file:
path: "%windir%\\System32\\en-US\\diagtrack.dll.mui"
- !file:
path: "%windir%\\DiagTrack\\Settings\\utc.tracing.json"
- !file:
path: "%windir%\\DiagTrack\\RunExeActionAllowedList.dat"
- !file:
path: "%windir%\\DiagTrack\\GetFileActionAllowedList.dat"
- !file:
path: "%windir%\\DiagTrack\\GetFileInfoActionAllowedList.dat"
- !file:
path: "%windir%\\DiagTrack\\Scenarios\\windows.uif_ondemand.xml"
- !file:
path: "%windir%\\DiagTrack\\Settings\\windows.uif_ondemand.json"
- !file:
path: "%windir%\\DiagTrack\\RemoteAggregatorTriggerCriteria.dat"
- !file:
path: "%windir%\\DiagTrack\\Scenarios\\windows.diag_ondemand.xml"
- !file:
path: "%windir%\\System32\\LogFiles\\WMI\\Diagtrack-Listener.etl.004"
- !file:
path: "%windir%\\DiagTrack\\Settings\\telemetry.ASM-WindowsDefault.json"
- !file:
path: "C:\\ProgramData\\Microsoft\\Diagnosis\\ETLLogs\\ShutdownLogger\\Diagtrack-Listener.etl"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\ShutdownLogger\\Diagtrack-Listener.etl"
- !file:
path: "C:\\ProgramData\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\ShutdownLogger\\Diagtrack-Listener.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Diagnosis\\ETLLogs\\Autologger\\AutoLogger-Diagtrack-Listener.etl"
- !file:
path: "%windir%\\System32\\dmclient.exe"
- !file:
path: "%windir%\\System32\\DDFs\\DMClient_DDF.xml"
- !file:
path: "%windir%\\System32\\Tasks\\Microsoft\\Windows\\Feedback\\Siuf\\DmClient"
- !file:
path: "%windir%\\System32\\Tasks\\Microsoft\\Windows\\Feedback\\Siuf\\DmClientOnScenarioDownload"
- !file:
path: "%windir%\\System32\\omadmclient.exe"
- !file:
path: "%windir%\\System32\\dosvc.dll"
- !file:
path: "%windir%\\System32\\en-US\\dosvc.dll.mui"
- !file:
path: "%windir%\\ServiceProfiles\\NetworkService\\AppData\\Local\\Microsoft\\Windows\\DeliveryOptimization"
- !file:
path: "%windir%\\PolicyDefinitions\\EnhancedStorage.admx"
- !file:
path: "%windir%\\PolicyDefinitions\\en-US\\EnhancedStorage.adml"
- !file:
path: "%windir%\\PolicyDefinitions\\hotspotauth.admx"
- !file:
path: "%windir%\\PolicyDefinitions\\en-US\\hotspotauth.adml"
- !file:
path: "%windir%\\schemas\\Provisioning\\hotspotprofile_v1.xsd"
- !file:
path: "%windir%\\System32\\Windows.Networking.NetworkOperators.HotspotAuthentication.dll"
- !file:
path: "%windir%\\SysWOW64\\Windows.Networking.NetworkOperators.HotspotAuthentication.dll"
- !file:
path: "%windir%\\System32\\invagent.dll"
- !file:
path: "%windir%\\System32\\msra.exe"
- !file:
path: "%windir%\\SysWOW64\\msra.exe"
- !file:
path: "%windir%\\System32\\msrahc.dll"
- !file:
path: "%windir%\\System32\\MsraLegacy.tlb"
- !file:
path: "%windir%\\SysWOW64\\MsraLegacy.tlb"
- !file:
path: "%windir%\\System32\\en-US\\msra.exe.mui"
- !file:
path: "%windir%\\System32\\en-US\\msrahc.dll.mui"
- !file:
path: "%windir%\\System32\\SIHClient.exe"
- !file:
path: "%windir%\\System32\\en-US\\sihclient.exe.mui"
- !file:
path: "%windir%\\Prefetch\\SIHCLIENT.EXE-A872A8BF.pf"
- !file:
path: "%windir%\\System32\\slui.exe"
- !file:
path: "%windir%\\System32\\en-US\\slui.exe.mui"
- !file:
path: "%windir%\\Prefetch\\SLUI.EXE-724E99D9.pf"
- !file:
path: "%windir%\\System32\\Startupscan.dll"
- !file:
path: "%windir%\\SysWOW64\\Startupscan.dll"
- !file:
path: "%windir%\\System32\\en-US\\Startupscan.dll.mui"
- !file:
path: "%windir%\\SysWOW64\\en-US\\Startupscan.dll.mui"
- !file:
path: "%windir%\\System32\\StorSvc.dll"
- !file:
path: "%windir%\\System32\\en-US\\StorSvc.dll.mui"
- !file:
path: "%windir%\\System32\\usoapi.dll"
- !file:
path: "%windir%\\SysWOW64\\usoapi.dll"
- !file:
path: "%windir%\\System32\\UsoClient.exe"
- !file:
path: "%windir%\\System32\\usocoreps.dll"
- !file:
path: "%windir%\\System32\\usocoreworker.exe"
- !file:
path: "%windir%\\System32\\MoUsoCoreWorker.exe"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "%windir%\\Prefetch\\MOUSOCOREWORKER.EXE-681A8FEE.pf"
- !file:
path: "%windir%\\System32\\usocoreworker.exe"
- !file:
path: "%windir%\\System32\\MoUsoCoreWorker.exe"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\ProgramData\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\Users\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.2bdb351a-82b4-4f2c-bc55-ec328ca677be.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.4a695923-0852-4c25-9999-60bc09954fbe.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.5e2840a3-5955-481c-83b8-ddd64cdaa7ae.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.761c6d23-f36c-46be-bf3f-26ba35c4dcca.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.80c59111-3f67-46a5-9fd1-379f4b7c2f7d.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.86ba5ad4-3ec9-43cf-997e-568832e6e2b8.1.etl"
- !file:
path: "C:\\Documents and Settings\\All Users\\USOShared\\Logs\\System\\MoUsoCoreWorker.ab8bb825-292c-450d-ac06-03e39e89d684.1.etl"
- !file:
path: "%windir%\\Prefetch\\MOUSOCOREWORKER.EXE-681A8FEE.pf"
- !file:
path: "%windir%\\System32\\usosvc.dll"
- !file:
path: "%windir%\\System32\\en-US\\usosvc.dll.mui"
- !file:
path: "%windir%\\System32\\WaaSMedicPS.dll"
- !file:
path: "%windir%\\System32\\WaaSMedicSvc.dll"
- !file:
path: "%windir%\\System32\\WaaSAssessment.dll"
- !file:
path: "%windir%\\System32\\WaaSMedicAgent.exe"
- !file:
path: "%windir%\\System32\\WaaSMedicCapsule.dll"
- !file:
path: "%windir%\\System32\\en-US\\WaaSMedicSvc.dll.mui"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_WaaSMedic.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_WaaSMedic.ps1"
- !file:
path: "%windir%\\WaaS\\tasks\\17499b8d805e9480903b0df0326a3d231841049e.xml"
- !file:
path: "%windir%\\WaaS\\tasks\\5ffea6126f02e78b9099eb4614d2d339f03ca5a8.xml"
- !file:
path: "%windir%\\WaaS\\services\\14a3f9e824793931d34f7f786a538bbc9ef1f0d6.xml"
- !file:
path: "%windir%\\WaaS\\services\\20bbcadaff3e0543ef358ba4dd8b74bfe8e747c8.xml"
- !file:
path: "%windir%\\WaaS\\services\\2213703c9c64cc61ba900531652e23c84728d2a2.xml"
- !file:
path: "%windir%\\WaaS\\services\\315818c03ccc2b10070df2d4ebd09eb6c4c66e58.xml"
- !file:
path: "%windir%\\WaaS\\services\\43ee7b2a373632f9a701249fd96d0edec2ff1279.xml"
- !file:
path: "%windir%\\WaaS\\services\\ceb497ee0184aaa4681d2fb2ef242a5b8551eea8.xml"
- !file:
path: "%windir%\\System32\\Tasks\\Microsoft\\Windows\\WaaSMedic\\PerformRemediation"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\AppRepository\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe.xml"
- !file:
path: "C:\\Users\\All Users\\Microsoft\\Windows\\AppRepository\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe.xml"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\\resources.pri"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\\AppxBlockMap.xml"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\\AppxManifest.xml"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\\AppxSignature.p7x"
- !file:
path: "C:\\Documents and Settings\\All Users\\Microsoft\\Windows\\AppRepository\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe.xml"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps*"
- !file:
path: "%ProgramW6432%\\WindowsApps\\DeletedAllUserPackages\\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe"
- !file:
path: "%windir%\\WindowsUpdate.log"
- !file:
path: "%windir%\\PolicyDefinitions\\WindowsUpdate.admx"
- !file:
path: "%windir%\\System32\\@WindowsUpdateToastIcon.png"
- !file:
path: "%windir%\\PolicyDefinitions\\en-US\\WindowsUpdate.adml"
- !file:
path: "%windir%\\System32\\WindowsUpdateElevatedInstaller.exe"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\TS_Main.ps1"
- !file:
path: "%windir%\\diagnostics\\index\\WindowsUpdateDiagnostic.xml"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\cl_Service.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\CL_Utility.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_appdata.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_AppData.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\CL_SetupEnv.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\DiagPackage.dll"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_DateTime.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_DateTime.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_DataStore.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_WaaSMedic.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_DataStore.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_WaaSMedic.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\VF_DataStore.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\rc_genwuerror.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_GENWUError.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\VF_GenWUError.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\DiagPackage.diagpkg"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\cl_windowsupdate.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\cl_windowsversion.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_Pendingrestart.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RC_Pendingupdates.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_Pendingrestart.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\RS_Pendingupdates.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\VF_Pendingupdates.ps1"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\en-US\\DiagPackage.dll.mui"
- !file:
path: "%windir%\\System32\\Tasks\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start"
- !file:
path: "%windir%\\diagnostics\\system\\WindowsUpdate\\en-US\\CL_LocalizationData.psd1"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\WindowsUpdate\\WindowsUpdate.psd1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\WindowsUpdate\\WindowsUpdate.psd1"
- !file:
path: "%windir%\\System32\\WindowsPowerShell\\v1.0\\Modules\\WindowsUpdate\\WindowsUpdateLog.psm1"
- !file:
path: "%windir%\\SysWOW64\\WindowsPowerShell\\v1.0\\Modules\\WindowsUpdate\\WindowsUpdateLog.psm1"
- !file:
path: "C:\\Users\\Public\\Desktop\\Microsoft Edge.lnk"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Microsoft Edge.lnk"
- !file:
path: "%APPDATA%\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Microsoft Edge.lnk"
- !file:
path: "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\PC Health Check.lnk"
- !file:
path: "%windir%\\System32\\wsqmcons.exe"
- !file:
path: "%windir%\\System32\\en-US\\wsqmcons.exe.mui"
- !file:
path: "%windir%\\System32\\wuapi.dll"
- !file:
path: "%windir%\\SysWOW64\\wuapi.dll"
- !file:
path: "%windir%\\System32\\wuauclt.exe"
- !file:
path: "%windir%\\System32\\wuapihost.exe"
- !file:
path: "%windir%\\System32\\en-US\\wuapi.dll.mui"
- !file:
path: "%windir%\\SysWOW64\\en-US\\wuapi.dll.mui"
- !file:
path: "%windir%\\SystemResources\\wuapi.dll.mun"
- !file:
path: "%windir%\\System32\\en-US\\wuaueng.dll.mui"
- !file:
path: "%windir%\\System32\\storewuauth.dll"
- !file:
path: "%windir%\\System32\\wusa.exe"
- !file:
path: "%windir%\\SysWOW64\\wusa.exe"
- !file:
path: "%windir%\\System32\\en-US\\wusa.exe.mui"
- !file:
path: "%windir%\\System32\\wups.dll"
- !file:
path: "%windir%\\System32\\wups2.dll"
- !file:
path: "%windir%\\System32\\wuaueng.dll"
- !file:
path: "%windir%\\System32\\calc.exe"
- !cmd:
command: "start explorer.exe"

+ 0
- 8
Configuration/features/base/login.yml View File

@ -1,8 +0,0 @@
---
title: Malte Wallpapers
description: Installs Malte Wallpapers
privilege: Admin
actions:
- !run:
currentDir: true
exe: "LOGIN.bat"

+ 0
- 8
Configuration/features/base/permission.yml View File

@ -1,8 +0,0 @@
---
title: Permission
description: Sets UAC level and user permissions
privilege: Admin
actions:
- !run:
currentDir: true
exe: "PERM.bat"

+ 0
- 79
Configuration/features/base/services.yml View File

@ -1,79 +0,0 @@
title: services
description: services
privilege: Admin
actions:
- !service:
name: "DoSvc"
state: stop
- !service:
name: "iphlpsvc"
state: stop
- !service:
name: "Winmgmt"
state: stop
- !service:
name: "ClipSVC"
state: stop
- !service:
name: "DiagTrack"
state: stop
- !service:
name: "RetailDemo"
state: stop
- !service:
name: "diagnosticshub.standardcollector.service"
state: stop
- !service:
name: "dmwappushservice"
state: stop
- !service:
name: "InstallService"
state: stop
- !service:
name: "LicenseManager"
state: stop
- !service:
name: "lfsvc"
state: stop
- !service:
name: "MapsBroker"
state: stop
- !service:
name: "NetTcpPortSharing"
state: stop
- !service:
name: "RemoteAccess"
state: stop
- !service:
name: "RemoteRegistry"
state: stop
- !service:
name: "SharedAccess"
state: stop
- !service:
name: "StorSvc"
state: stop
- !service:
name: "TrkWks"
state: stop
- !service:
name: "UsoSvc"
state: stop
- !service:
name: "WbioSrvc"
state: stop
- !service:
name: "WMPNetworkSvc"
state: stop
- !service:
name: "XblAuthManager"
state: stop
- !service:
name: "XblGameSave"
state: stop
- !service:
name: "XboxNetApiSvc"
state: stop
- !service:
name: "wlidsvc"
state: stop

+ 0
- 8
Configuration/features/base/shortcuts.yml View File

@ -1,8 +0,0 @@
---
title: Shortcuts
description: Remove and add shortcuts
privilege: Admin
actions:
- !run:
currentDir: true
exe: "SHRT.bat"

+ 0
- 8
Configuration/features/base/silent.yml View File

@ -1,8 +0,0 @@
---
title: Silent Installers
description: Silent Installers for Windows 7 Calculator, OldNewExplorer, and Hardentools
privilege: Admin
actions:
- !run:
currentDir: true
exe: "SLNT.bat"

+ 0
- 8
Configuration/features/base/wallpaper.yml View File

@ -1,8 +0,0 @@
---
title: Malte Wallpapers
description: Installs Malte Wallpapers
privilege: Admin
actions:
- !run:
currentDir: true
exe: "WALLPAPER.bat"

+ 0
- 8
Configuration/features/base/windowsterminal.yml View File

@ -1,8 +0,0 @@
---
title: Windows Terminal
description: Installs Windows Terminal
privilege: Admin
actions:
- !run:
currentDir: true
exe: "WINTERM.bat"

+ 0
- 97
Configuration/features/languages/lang.yml View File

@ -1,97 +0,0 @@
!UTask
title: Language installation
description: Installs the files for the languages selected in the GUI
minVersion:
maxVersion:
status: ToDo
actions:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/basic_de-de.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/speech_de-de.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/tts_de-de.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/ocr_de-de.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/hw_de-de.cab
standardError:
standardOutput:
- !powershell
command: $OldList = Get-WinUserLanguageList; $OldList.Add(de-DE); Set-WinUserLanguageList -LanguageList $OldList -Force
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/basic_en-us.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/speech_en-us.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/tts_en-us.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/ocr_en-us.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/hw_en-us.cab
standardError:
standardOutput:
- !powershell
command: $OldList = Get-WinUserLanguageList; $OldList.Add(en-US); Set-WinUserLanguageList -LanguageList $OldList -Force
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/basic_es-es.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/speech_es-es.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/tts_es-es.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/ocr_es-es.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/hw_es-es.cab
standardError:
standardOutput:
- !powershell
command: $OldList = Get-WinUserLanguageList; $OldList.Add(es-ES); Set-WinUserLanguageList -LanguageList $OldList -Force
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/basic_fi-fi.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/speech_fi-fi.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/tts_fi-fi.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/ocr_fi-fi.cab
standardError:
standardOutput:
- !cmd
command: Dism /online /Add-Package /PackagePath:%temp%/AME/Languages/hw_fi-fi.cab
standardError:
standardOutput:
- !powershell
command: $OldList = Get-WinUserLanguageList; $OldList.Add(fi-FI); Set-WinUserLanguageList -LanguageList $OldList -Force
priority: 1
features: []

+ 0
- 4
Configuration/langs.txt View File

@ -1,4 +0,0 @@
de-DE
en-US
es-ES
fi-FI

BIN
Executables/7za.dll View File


BIN
Executables/7za.exe View File


BIN
Executables/7zxa.dll View File


+ 0
- 12
Executables/ADMIN.bat View File

@ -1,12 +0,0 @@
net user Administrator /active:yes
net user Administrator malte
@echo OFF
for /f "usebackq delims=" %%A in (`net localgroup administrators ^| findstr /V /X /I /R /c:"Alias name[ ].*" /c:"Comment[ ].*" /c:"Members" /c:"-*" /c:"The command completed.*" /c:"Administrator"`) do (
echo net localgroup administrators "%%A" /delete
net localgroup administrators "%%A" /delete
)
@echo ON
schtasks /create /tn "AME Admin Log-off" /tr "CMD /C 'SCHTASKS /run /tn 'AME Admin Log-off Msg' & Logoff'" /ru "Administrator" /sc ONLOGON /it /rl HIGHEST /f > NUL
PowerShell -NoP -C "$TaskSet = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries; Set-ScheduledTask -TaskName 'AME Admin Log-off Msg' -Settings $TaskSet" > NUL
schtasks /create /tn "AME Admin Log-off Msg" /tr "PowerShell -NoP -C 'While($lim -lt 20){WMIC computersystem get username|findstr /c:'\Administrator ';if(!$?){Break};$lim++;Sleep 1};'''Logging in as the Administrator user is not supported on AME.`nPlease login using a different account.'''|Msg *'" /sc MONTHLY /f /rl HIGHEST /ru "SYSTEM" > NUL
PowerShell -NoP -C "$TaskSet = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries; Set-ScheduledTask -TaskName 'AME Admin Log-off Msg' -Settings $TaskSet; $serv = New-Object -ComObject Schedule.Service; $serv.Connect($env:COMPUTERNAME); $folder = $serv.GetFolder('\'); $task = $folder.GetTask('AME Admin Log-off Msg'); $item = $task.Definition; $item.Triggers.Remove(1); $folder.RegisterTaskDefinition($task.Name, $item, 4, $null, $null, $null)" > NUL

+ 0
- 42
Executables/APPX.bat View File

@ -1,42 +0,0 @@
PowerShell -NoP -C "Get-AppxPackage -AllUsers *Microsoft.549981C3F5F10* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *3DViewer* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *AssignedAccessLockApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *PinningConfirmationDialog* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *SecureAssessmentBrowser* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *FeedbackHub* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *MixedReality* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.Calculator* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.WindowsAlarms* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.GetHelp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Getstarted* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *disney* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.OneConnect* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsCamera* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *bing* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Sticky* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Store* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *MicrosoftOfficeHub* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Paint* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *wallet* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *OneNote* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.People* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *YourPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *photos* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *SkypeApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *solit* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *spotify* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsSoundRecorder* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *zune* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsCalculator* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *WindowsMaps* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Sway* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *CommsPhone* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *ConnectivityStore* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.Messaging* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *Microsoft.WindowsStore* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxApp* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxSpeechToTextOverlay* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxGamingOverlay* | Remove-AppxPackage"
PowerShell -NoP -C "Get-AppxPackage *XboxGameOverlay* | Remove-AppxPackage"

BIN
Executables/Albacore.ViVe.dll View File


+ 0
- 4
Executables/BANN.bat View File

@ -1,4 +0,0 @@
cd Executables
ViVeTool addconfig 18299130 1
ViVeTool addconfig 31950543 1

+ 0
- 100
Executables/CHOC.bat View File

@ -1,100 +0,0 @@
cd Executables
reg query "HKLM\SOFTWARE\Clients\StartMenuInternet" /k /f "Firefox-" > "%TEMP%\Firefox-Reg-Output.txt"
:: Load tile layout from before
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 3 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :CHOCCALL "%%A"
)
@PowerShell -NoP -ExecutionPolicy Bypass -C "iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1'))" && set "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"
@PowerShell -NoP -ExecutionPolicy Bypass -C "choco install -y --force --allow-empty-checksums firefox thunderbird open-shell vlc 7zip jpegview vcredist-all directx onlyoffice cascadiamono"
@PowerShell -NoP -ExecutionPolicy Bypass -C "choco install -y --force --allow-empty-checksums -n eartrumpet"
if exist "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip" (
echo PowerShell -NoP -C "Expand-Archive -Path '%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip' -DestinationPath '%ALLUSERSPROFILE%\EarTrumpet'"
PowerShell -NoP -C "Expand-Archive -Path '%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet\tools\release.zip' -DestinationPath '%ALLUSERSPROFILE%\EarTrumpet'"
echo rmdir /q /s "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet"
rmdir /q /s "%ALLUSERSPROFILE%\chocolatey\lib\eartrumpet"
echo mkdir "%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
mkdir "%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
echo PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EarTrumpet.lnk'); $S.TargetPath = '%ALLUSERSPROFILE%\EarTrumpet\EarTrumpet.exe'; $S.Save()"
PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EarTrumpet.lnk'); $S.TargetPath = '%ALLUSERSPROFILE%\EarTrumpet\EarTrumpet.exe'; $S.Save()"
)
@echo ON
copy /y Fluent-Metro.skin "%PROGRAMFILES%\Open-Shell\Skins"
copy /y Fluent-Metro.skin7 "%PROGRAMFILES%\Open-Shell\Skins"
:: Load new Open-Shell menu
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
timeout /t 3 > NUL
PowerShell -NoP -C "(New-Object -ComObject wscript.shell).SendKeys('^{ESCAPE}')"
@exit /b 0
:CHOCCALL
@echo ON
reg add "HKU\%~1\SOFTWARE\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "CSettingsDlg" /t REG_BINARY /d a8030000d00100000000000000000000aa0f00000100010100000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "ShowedToolbar" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer" /v "NewLine" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\ClassicExplorer\Settings" /v "ShowStatusBar" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ShowedStyle2" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "CSettingsDlg" /t REG_BINARY /d c80100001a0100000000000000000000360d00000100000000000000 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "OldItems" /t REG_BINARY /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu" /v "ItemRanks" /t REG_BINARY /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\MRU" /v "0" /t REG_SZ /d "C:\Windows\regedit.exe" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "Version" /t REG_DWORD /d 04040098 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "AllProgramsMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "RecentMetroApps" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "StartScreenShortcut" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SearchInternet" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassOverride" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "GlassColor" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinW7" /t REG_SZ /d "Fluent-Metro" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinVariationW7" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "ShiftWin" /t REG_SZ /d "Nothing" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkinOptionsW7" /t REG_MULTI_SZ /d "DARK_MAIN=0"\0"METRO_MAIN=0"\0"LIGHT_MAIN=0"\0"AUTOMODE_MAIN=1"\0"DARK_SUBMENU=0"\0"METRO_SUBMENU="\0"LIGHT_SUBMENU=0"\0"AUTOMODE_SUBMENU=1"\0"SUBMENU_SEPARATORS=1"\0"DARK_SEARCH=0"\0"METRO_SEARCH="\0"LIGHT_SEARCH=0"\0"AUTOMODE_SEARCH=1"\0"SEARCH_FRAME=1"\0"SEARCH_COLOR=0"\0"SMALL_SEARCH=0"\0"MOERN_SEARCH=1"\0"SEARCH_ITALICS=0"\0"NONE=0"\0"SEPARATOR=0"\0"TWO_TONE=1"\0"CLASSIC_SELECTOR=1"\0"HAF_SELECTOR=0"\0"CURVED_MENUSEL=1"\0"CURVED_SUBMENU=0"\0"SELECTOR_REVEAL=1"\0"TRANSPARENT=0"\0"OPAQU_SUBMENU=1"\0"OPAQUE_MENU=0"\0"OPAQUE=0"\0"STANDARD=0"\0"SMALL_MAIN2=1"\0"SMALL_ICONS=0"\0"COMPACT_UBMENU=0"\0"PRESERVE_MAIN2=0"\0"LESS_PADDING=0"\0"EXTRA_PADDING=1"\0"24_PADDING=0"\0"LARGE_PROGRAMS0"\0"TRANSPARENT_SHUTDOWN=0"\0"OUTLINE_SHUTDOWN=0"\0"BUTTON_SHUTDOWN=1"\0"EXPERIMENTAL_SHUTDOWN=0"\"LARGE_FONT=0"\0"CONNECTED_BORDER=1"\0"FLOATING_BORDER=0"\0"LARGE_SUBMENU=0"\0"LARGE_LISTS=0"\0"THI_MAIN2=0"\0"EXPERIMENTAL_MAIN2=1"\0"USER_IMAGE=1"\0"USER_OUTSIDE=0"\0"SCALING_USER=1"\0"56=0"\0"64="\0"TRANSPARENT_USER=0"\0"UWP_SCROLLBAR=0"\0"MODERN_SCROLLBAR=1"\0"SMALL_ARROWS=0"\0"ARROW_BACKGROUD=1"\0"ICON_FRAME=0"\0"SEARCH_SEPARATOR=0"\0"NO_PROGRAMS_BUTTON=0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "SkipMetro" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=pc_settings\0Item17.Settings=TRACK_RECENT\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\OpenShell\Settings" /v "Update" /d 0 /t REG_DWORD /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "CheckWinUpdates" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "HighlightNew" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser" /v "ITBar7Layout" /t REG_BINARY /d 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 /f
@echo OFF
if "%~1"=="AME_UserHive_Default" (
echo reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=ITEM_DISABLED\0Item17.Settings=TRACK_RECENT\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
reg add "HKU\%~1\SOFTWARE\OpenShell\StartMenu\Settings" /v "MenuItems7" /t REG_MULTI_SZ /d "Item1.Command=user_files\0Item1.Settings=NOEXPAND\0Item2.Command=user_documents\0Item2.Settings=NOEXPAND\0Item3.Command=user_pictures\0Item3.Settings=NOEXPAND\0Item4.Command=user_music\0Item4.Settings=NOEXPAND\0Item5.Command=user_videos\0Item5.Settings=NOEXPAND\0Item6.Command=downloads\0Item6.Settings=NOEXPAND\0Item7.Command=homegroup\0Item7.Settings=ITEM_DISABLED\0Item8.Command=separator\0Item9.Command=games\0Item9.Settings=TRACK_RECENT|NOEXPAND|ITEM_DISABLED\0Item10.Command=favorites\0Item10.Settings=ITEM_DISABLED\0Item11.Command=recent_documents\0Item12.Command=computer\0Item12.Settings=NOEXPAND\0Item13.Command=network\0Item13.Settings=ITEM_DISABLED\0Item14.Command=network_connections\0Item14.Settings=ITEM_DISABLED\0Item15.Command=separator\0Item16.Command=control_panel\0Item16.Settings=TRACK_RECENT\0Item17.Command=pc_settings\0Item17.Settings=ITEM_DISABLED\0Item18.Command=admin\0Item18.Settings=TRACK_RECENT|ITEM_DISABLED\0Item19.Command=devices\0Item19.Settings=ITEM_DISABLED\0Item20.Command=defaults\0Item20.Settings=ITEM_DISABLED\0Item21.Command=help\0Item21.Settings=ITEM_DISABLED\0Item22.Command=run\0Item23.Command=apps\0Item23.Settings=ITEM_DISABLED\0Item24.Command=windows_security\0Item24.Settings=ITEM_DISABLED\0" /f
echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVolume" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVolume" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\EarTrumpet" /v "hasShownFirstRun" /t REG_SZ /d "<?xml version=""""1.0"""" encoding=""""utf-16""""?><boolean>true</boolean>" /f
reg add "HKU\%~1\SOFTWARE\EarTrumpet" /v "IsTelemetryEnabled" /t REG_SZ /d "<?xml version=""""1.0"""" encoding=""""utf-16""""?><boolean>false</boolean>" /f
copy /y "UsrClass.dat" "%SYSTEMDRIVE%\Users\Default\AppData\Local\Microsoft\Windows"
)
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
echo del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
del "%%C\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk" /q /f
echo del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
del "%%C\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk" /q /f
)
exit /b 0

+ 0
- 6
Executables/DEFENDER.bat View File

@ -1,6 +0,0 @@
cd Executables
start /b /wait install_wim_tweak.exe /o /l
start /b /wait install_wim_tweak.exe /o /c "Windows-Defender" /r
start /b /wait install_wim_tweak.exe /h /o /l
start /b /wait winmgmt /resetrepository
shutdown /r /f /t 0

+ 0
- 1
Executables/DNET.bat View File

@ -1 +0,0 @@
dism /online /enable-feature /featurename:NetFX3 /All /Source:Executables /LimitAccess

+ 0
- 17
Executables/EDGE.bat View File

@ -1,17 +0,0 @@
taskkill /im msedge.exe /f
@echo OFF
for /f "usebackq delims=" %%A in (`dir /b /s "%PROGRAMFILES(x86)%\Microsoft\Edge\Application\*setup.exe" ^| findstr /c:"Installer\\setup.exe"`) do (
echo PowerShell -NoP -C "Start-Process '%%A' -ArgumentList '--uninstall','--system-level','--verbose-logging','--force-uninstall' -NoNewWindow -Wait"
PowerShell -NoP -C "Start-Process '%%A' -ArgumentList '--uninstall','--system-level','--verbose-logging','--force-uninstall' -NoNewWindow -Wait"
)
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
echo reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v "FavoritesResolve" /t REG_BINARY /d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f
reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v "FavoritesResolve" /t REG_BINARY /d 320300004C0000000114020000000000C0000000000000468300800020000000549E39A5246AD8012B113CA5246AD801A8B6C6DADDACD501970100000000000001000000000000000000000000000000A0013A001F80C827341F105C1042AA032EE45287D668260001002600EFBE1200000056F21270246AD8010F37A185246AD8012B113CA5246AD80114005600310000000000B154E29B11005461736B42617200400009000400EFBEB154C69BB154E29B2E000000F4940100000001000000000000000000000000000000D5BA89005400610073006B00420061007200000016000E01320097010000874F0749200046494C4545587E312E4C4E4B00007C0009000400EFBEB154E29BB154E29B2E00000097900100000002000000000000000000520000000000589C4400460069006C00650020004500780070006C006F007200650072002E006C006E006B00000040007300680065006C006C00330032002E0064006C006C002C002D003200320030003600370000001C00220000001E00EFBE02005500730065007200500069006E006E006500640000001C00120000002B00EFBE2B113CA5246AD8011C00420000001D00EFBE02004D006900630072006F0073006F00660074002E00570069006E0064006F00770073002E004500780070006C006F0072006500720000001C0000009B0000001C000000010000001C0000002D000000000000009A0000001100000003000000E4A63B761000000000433A5C55736572735C757365725C417070446174615C526F616D696E675C4D6963726F736F66745C496E7465726E6574204578706C6F7265725C517569636B204C61756E63685C557365722050696E6E65645C5461736B4261725C46696C65204578706C6F7265722E6C6E6B000060000000030000A058000000000000006465736B746F702D62356E36683339006E1A1EE27BFFA94ABB0361D86F25337E500764DB17D6EC11A598000C2907D6A06E1A1EE27BFFA94ABB0361D86F25337E500764DB17D6EC11A598000C2907D6A045000000090000A03900000031535053B1166D44AD8D7048A748402EA43D788C1D000000680000000048000000CE2181FCD4BF31408F25FF009E4345CA000000000000000000000000 /f
echo reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v Favorites /t REG_BINARY /d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f
reg add "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Taskband" /v Favorites /t REG_BINARY /d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f
)
)

+ 0
- 13
Executables/EDGEX.bat View File

@ -1,13 +0,0 @@
cd Executables
start /b /wait install_wim_tweak.exe /o /l
start /b /wait install_wim_tweak.exe /o /c Microsoft-Windows-Internet-Browser-Package /r
start /b /wait install_wim_tweak.exe /h /o /l
:: Removes ActiveX item in open with menu
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKCR\Applications\iexplore.exe" /f
:: Removes internet explorer option when setting default browser in settings
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /f
reg delete "HKLM\SOFTWARE\RegisteredApplications" /v "Internet Explorer" /f
reg delete "HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE" /f

+ 0
- 13
Executables/FILEASSOC.bat View File

@ -1,13 +0,0 @@
cd Executables
copy /y "OEMDefaultAssociations.dll" "%WINDIR%\System32"
del /q /f "%WINDIR%\System32\OEMDefaultAssociations.xml"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
PowerShell -NoP -ExecutionPolicy Bypass -File assoc.ps1 "Placeholder" "%%A" ".html:FirefoxHTML-308046B0AF4A39CB" ".htm:FirefoxHTML-308046B0AF4A39CB" ".url:FirefoxURL-308046B0AF4A39CB" "Proto:https:FirefoxURL-308046B0AF4A39CB" "Proto:http:FirefoxURL-308046B0AF4A39CB" "Proto:mailto:Thunderbird.Url.mailto" ".3g2:VLC.3g2" ".3gp:VLC.3gp" ".3gp2:VLC.3gp2" ".3gpp:VLC.3gpp" ".aac:VLC.aac" ".adts:VLC.adts" ".aif:VLC.aif" ".aifc:VLC.aifc" ".aiff:VLC.aiff" ".amr:VLC.amr" ".asf:VLC.asf" ".asx:VLC.asx" ".au:VLC.au" ".avi:VLC.avi" ".bmp:JPEGView.exe" ".cda:VLC.cda" ".flac:VLC.flac" ".jpeg:JPEGView.exe" ".jpg:JPEGView.exe" ".m1v:VLC.m1v" ".m2t:VLC.m2t" ".m2ts:VLC.m2ts" ".m3u:VLC.m3u" ".m4a:VLC.m4a" ".m4p:VLC.m4p" ".m4v:VLC.m4v" ".mid:VLC.mid" ".mka:VLC.mka" ".mkv:VLC.mkv" ".mov:VLC.mov" ".MP2:VLC.mp2" ".mp2v:VLC.mp2v" ".mp3:VLC.mp3" ".mp4:VLC.mp4" ".mp4v:VLC.mp4v" ".mpa:VLC.mpa" ".MPE:VLC.mpe" ".mpeg:VLC.mpeg" ".mpg:VLC.mpg" ".mpv2:VLC.mpv2" ".mts:VLC.mts" ".png:JPEGView.exe" ".ra:VLC.ra" ".ram:VLC.ram" ".rmi:VLC.rmi" ".s3m:VLC.s3m" ".snd:VLC.snd" ".TS:VLC.ts" ".TTS:VLC.tts" ".voc:VLC.voc" ".wav:VLC.wav" ".webp:JPEGView.exe" ".wma:VLC.wma" ".wmv:VLC.wmv" ".WPL:VLC.wpl" ".wvx:VLC.wvx" ".xm:VLC.xm" ".zpl:VLC.zpl"
)
)

+ 0
- 202
Executables/FIREFOXCONF.bat View File

@ -1,202 +0,0 @@
@echo OFF
if not exist "%~dp0\AME-Firefox-Injection" (
echo. & echo No supplied AME-Firefox-Injection folder detected.
exit /b 4
)
:ENTRIES
echo. & echo Grabbing previous Firefox entries...
if not exist "%TEMP%\Firefox-Reg-Output.txt" echo No input entries detected & echo. & echo Generating random string... & goto GenRND
setlocal EnableDelayedExpansion
set /a "count1=0"
for /f "usebackq tokens=2 delims=-" %%A in (`findstr /c:"Firefox-" "%TEMP%\Firefox-Reg-Output.txt"`) do (
set /a "count1=!count1!+1"
set "ffBef!count1!=%%A"
set "par=!par!)"
set "arg=!arg!if not "%%D"=="%%A" ("
)
del /q /f "%TEMP%\Firefox-Reg-Output.txt" > NUL 2>&1
echo. & echo Comparing Firefox entries...
set /a "count2=0"
for /f "usebackq tokens=2 delims=-" %%D in (`reg query "HKLM\SOFTWARE\Clients\StartMenuInternet" /f "Firefox-"`) do (
set /a "count2=!count2!+1"
%arg%set "NewCode=%%D"%par%
)
if "%count1%"=="0" (if "%count2%"=="0" (set "NewCode=NULL"))
endlocal & set "NewCode=%NewCode%"
:CHECKS
set "RunEC=10"
set /a "count0=1"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
if "%%A"=="AME_UserHive_Default" (
call :AFISCALL "%SYSTEMDRIVE%\Users\Default\AppData\Roaming"
if errorlevel 2 set "RunEC=2"
if errorlevel 1 set "RunEC=1"
if errorlevel 0 set "RunEC=0"
) else (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :AFISCALL "%%C"
if errorlevel 2 set "RunEC=2"
if errorlevel 1 set "RunEC=1"
if errorlevel 0 set "RunEC=0"
)
)
)
exit /b %RunEC%
:AFISCALL
setlocal
echo. & echo Generating random string...
:GenRND
setlocal EnableDelayedExpansion
set "RNDConsist=abcdefghijklmnopqrstuvwxyz0123456789"
set /a "RND=%RANDOM% %% 36"
set "RNDStr=!RNDStr!!RNDConsist:~%RND%,1!"
if "%RNDStr:~7%"=="" (goto GenRND)
endlocal & set "RNDStr=%RNDStr%"
:: Redundancy, incase the original Firefox installed check fails
if "%NewCode%"=="NULL" echo. & echo No Firefox install detected & goto PREFSONLY
if "%NewCode%"=="" echo. & echo Firefox version already installed & goto PREFSONLY
if not EXIST "%PROGRAMFILES%\Mozilla Firefox\firefox.exe" echo. & echo Can't find Firefox.exe & goto PREFSONLY
if exist "%~1\Mozilla\Firefox\profiles.ini" (
findstr /c:"%NewCode%" "%~1\Mozilla\Firefox\profiles.ini" > NUL 2>&1
if not errorlevel 1 echo. & echo Firefox version already in profiles.ini & goto PREFSONLY
)
:PROFILENAME
if %count0% GTR 50 echo. & echo Default-release count exceeded 50 & goto PREFSONLY
if exist "%~1\Mozilla\Firefox\profiles.ini" (
findstr /c:"Name=default-release" "%~1\Mozilla\Firefox\profiles.ini" > NUL 2>&1
if not errorlevel 1 (
findstr /c:"Name=default-release-%count0%" "%~1\Mozilla\Firefox\profiles.ini"
if not errorlevel 1 (
set /a "count0=%count0%+1"
goto PROFILENAME
) else (
set "profileName=default-release-%count0%"
)
) else (
set "profileName=default-release"
)
) else (
set "profileName=default-release"
)
echo. & echo Injecting profile...
@echo ON
:: This could also be set manually in the profiles.ini file
mkdir "%~1\Mozilla\Firefox\Profiles\%RNDStr%.%profileName%"
robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%RNDStr%.%profileName%" /E > NUL
:: Sets profile as the default
echo [Install%NewCode%]>> "%~1\Mozilla\Firefox\profiles.ini"
echo Default=Profiles/%RNDStr%.%profileName%>> "%~1\Mozilla\Firefox\profiles.ini"
echo Locked=^1>> "%~1\Mozilla\Firefox\profiles.ini"
echo.>> "%~1\Mozilla\Firefox\profiles.ini"
echo [Profile0]>> "%~1\Mozilla\Firefox\profiles.ini"
echo Name=%profileName%>> "%~1\Mozilla\Firefox\profiles.ini"
echo IsRelative=^1>> "%~1\Mozilla\Firefox\profiles.ini"
echo Path=Profiles/%RNDStr%.%profileName%>> "%~1\Mozilla\Firefox\profiles.ini"
:: Add prefs to any other Firefox profiles in all users
@echo OFF
for /f "usebackq delims=" %%B in (`dir /B /A:d "%~1\Mozilla\Firefox\Profiles" ^| findstr /v /x /c:"%RNDStr%.%profileName%"`) do (
if exist "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js" (
:: Removes lines containing these entries from the profiles prefs.js. This way any old prefs don't overlap with the new prefs
echo findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js "^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js ">> "%TEMP%\prefs.js.tmp"
)
:: Filters out a few prefs from AME-Firefox-Injectiont\prefs.js and adds them to prefs.js.tmp
echo findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js"^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js">> "%TEMP%\prefs.js.tmp"
echo move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js"
move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js"
if exist "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4" echo del /Q /F "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4" & del /Q /F "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4"
echo robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%B" search.json.mozlz4 /E ^> NUL
robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%B" search.json.mozlz4 /E > NUL
echo PowerShell -NoP -C "%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\prefs.js'" ^> NUL 2^>^&1
PowerShell -NoP -C "%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\prefs.js'" > NUL 2>&1
echo PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4'" ^> NUL 2^>^&1
PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4'" > NUL 2>&1
)
echo. & echo Successfully injected custom Firefox configs.
endlocal & exit /b 0
:PREFSONLY
:: uBlock Origin could be installed automatically here, however that would involve overwriting the old extension.json etc
:: files, which, if the user had previous extensions, could cause issues.
@echo. & echo Injecting config files...
if exist "%TEMP%\prefs.js.tmp" del /q /f "%TEMP%\prefs.js.tmp" > NUL
set /a "count3=0"
@echo OFF
for /f "usebackq delims=" %%A in (`dir /B /A:d "%~1\Mozilla\Firefox\Profiles"`) do (
set /a "count3=%count3%+1"
if exist "%~1\Mozilla\Firefox\Profiles\%%A\prefs.js" (
:: Removes lines containing these entries from the profiles prefs.js. This way any old prefs don't overlap with the new prefs
echo findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%A\prefs.js "^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%A\prefs.js ">> "%TEMP%\prefs.js.tmp"
)
:: Filters out a few prefs from AME-Firefox-Injectiont\prefs.js and adds them to prefs.js.tmp
echo findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js"^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js">> "%TEMP%\prefs.js.tmp"
echo move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%A\prefs.js"
move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%A\prefs.js"
if exist "%~1\Mozilla\Firefox\Profiles\%%A\search.json.mozlz4" echo del /Q /F "%~1\Mozilla\Firefox\Profiles\%%A\search.json.mozlz4" & del /Q /F "%~1\Mozilla\Firefox\Profiles\%%A\search.json.mozlz4"
echo robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%A" search.json.mozlz4 /E ^> NUL
robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%A" search.json.mozlz4 /E > NUL
)
for /f "usebackq delims=" %%A in (`dir /B /A:d "%SYSTEMDRIVE%\Users"`) do (
if exist "%~1\Mozilla\Firefox\Profiles" (
for /f "usebackq delims=" %%B in (`dir /B /A:d "%~1\Mozilla\Firefox\Profiles"`) do (
set /a "count3=%count3%+1"
if exist "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js" (
:: Removes lines containing these entries from the profiles prefs.js. This way any old prefs don't overlap with the new prefs
echo findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js "^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""app.shield.optoutstudies.enabled"""" /C:""""browser.aboutwelcome.enabled"""" /C:""""browser.disableResetPrompt"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons"""" /C:""""browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features"""" /C:""""browser.newtabpage.activity-stream.feeds.section.topstories"""" /C:""""browser.newtabpage.activity-stream.feeds.topsites"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includePocket"""" /C:""""browser.newtabpage.activity-stream.section.highlights.includeVisited"""" /C:""""browser.newtabpage.activity-stream.showSponsored"""" /C:""""browser.newtabpage.activity-stream.showSponsoredTopSites"""" /C:""""browser.urlbar.placeholderNam"""" /C:""""browser.urlbar.suggest.quicksuggest.nonsponsored"""" /C:""""browser.urlbar.suggest.quicksuggest.sponsored"""" /C:""""browser.urlbar.suggest.topsites"""" /C:""""datareporting.healthreport.uploadEnabled"""" /C:""""dom.security.https_only_mode"""" /C:""""dom.security.https_only_mode_ever_enabled"""" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js ">> "%TEMP%\prefs.js.tmp"
)
:: Filters out a few prefs from AME-Firefox-Injectiont\prefs.js and adds them to prefs.js.tmp
echo findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js"^>^> "%TEMP%\prefs.js.tmp"
findstr /V /C:""""browser.toolbars.bookmarks.visibility"""" /C:""""extensions.webextensions.uuids"""" /C:""""extensions.webextensions.uuids"""" "%~dp0\AME-Firefox-Injection\prefs.js">> "%TEMP%\prefs.js.tmp"
echo move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js"
move /y "%TEMP%\prefs.js.tmp" "%~1\Mozilla\Firefox\Profiles\%%B\prefs.js"
if exist "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4" echo del /Q /F "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4" & del /Q /F "%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4"
echo robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%B" search.json.mozlz4 /E ^> NUL
robocopy "%~dp0\AME-Firefox-Injection" "%~1\Mozilla\Firefox\Profiles\%%B" search.json.mozlz4 /E > NUL
echo PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\prefs.js'" ^> NUL 2^>^&1
PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\prefs.js'" > NUL 2>&1
echo PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4'" ^> NUL 2^>^&1
PowerShell -NoP -C "Get-Acl '%~1\Mozilla\Firefox\Profiles' | Set-Acl '%~1\Mozilla\Firefox\Profiles\%%B\search.json.mozlz4'" > NUL 2>&1
)
)
)
if %count3% EQU 0 (
echo. & echo Failed! No profiles detected
endlocal & exit /b 2
) else (
echo. & echo Successfully injected custom Firefox configs.
endlocal & exit /b 1
)

+ 0
- 17
Executables/FileAssociations.xml View File

@ -1,17 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<DefaultAssociations>
<Association Identifier=".inf" ProgId="inffile" ApplicationName="Notepad" />
<Association Identifier=".ini" ProgId="inifile" ApplicationName="Notepad" />
<Association Identifier=".log" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".MP2" ProgId="WMP11.AssocFile.MP3" />
<Association Identifier=".ps1" ProgId="Microsoft.PowerShellScript.1" ApplicationName="Notepad" />
<Association Identifier=".psd1" ProgId="Microsoft.PowerShellData.1" ApplicationName="Notepad" />
<Association Identifier=".psm1" ProgId="Microsoft.PowerShellModule.1" ApplicationName="Notepad" />
<Association Identifier=".scp" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".tif" ProgId="PhotoViewer.FileAssoc.Tiff" ApplicationName="Windows Photo Viewer" />
<Association Identifier=".tiff" ProgId="PhotoViewer.FileAssoc.Tiff" ApplicationName="Windows Photo Viewer" />
<Association Identifier=".txt" ProgId="txtfile" ApplicationName="Notepad" />
<Association Identifier=".url" ProgId="IE.AssocFile.URL" ApplicationName="Internet Browser" />
<Association Identifier=".website" ProgId="IE.AssocFile.WEBSITE" />
<Association Identifier=".wtx" ProgId="txtfile" ApplicationName="Notepad" />
</DefaultAssociations>

+ 0
- 8
Executables/LOGIN.bat View File

@ -1,8 +0,0 @@
cd Executables
takeown /f C:\Windows\System32\en-US\credprovhost.dll.mui
icacls C:\Windows\System32\en-US\credprovhost.dll.mui /reset
del C:\Windows\System32\en-US\credprovhost.dll.mui /f /q
copy credprovhost.dll.mui C:\Windows\System32\en-US\ /Y
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 0 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d "" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d "" /f

+ 0
- 16
Executables/Layout.xml View File

@ -1,16 +0,0 @@
<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns:taskbar="http://schemas.microsoft.com/Start/2014/TaskbarLayout" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
<LayoutOptions StartTileGroupCellWidth="6" />
<DefaultLayoutOverride>
<StartLayoutCollection>
<defaultlayout:StartLayout GroupCellWidth="6" />
</StartLayoutCollection>
</DefaultLayoutOverride>
<CustomTaskbarLayoutCollection PinListPlacement="Replace">
<defaultlayout:TaskbarLayout>
<taskbar:TaskbarPinList>
<taskbar:DesktopApp DesktopApplicationLinkPath="%APPDATA%\Microsoft\Windows\Start Menu\Programs\System Tools\File Explorer.lnk" />
<taskbar:DesktopApp DesktopApplicationLinkPath="%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Firefox.lnk" />
</taskbar:TaskbarPinList>
</defaultlayout:TaskbarLayout>
</CustomTaskbarLayoutCollection>
</LayoutModificationTemplate>

+ 0
- 1
Executables/ONED.bat View File

@ -1 +0,0 @@
PowerShell -NoP -C "Start-Process '%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe' -ArgumentList '/uninstall' -NoNewWindow"

+ 0
- 8
Executables/PERM.bat View File

@ -1,8 +0,0 @@
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 00000005 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ConsentPromptBehaviorUser /t REG_DWORD /d 00000003 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableInstallerDetection /t REG_DWORD /d 00000001 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 00000001 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableVirtualization /t REG_DWORD /d 00000001 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v PromptOnSecureDesktop /t REG_DWORD /d 00000001 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v ValidateAdminCodeSignatures /t REG_DWORD /d 00000000 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v FilterAdministratorToken /t REG_DWORD /d 00000000 /f

+ 0
- 5
Executables/PYTH.bat View File

@ -1,5 +0,0 @@
cd Executables
python-3.9.7-amd64.exe /quiet InstallAllUsers=1 TargetDir="%PROGRAMFILES%\Python39"
NSudoLC -U:S -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait PowerShell -NoP -C "Start-Process '%PROGRAMFILES%\Python39\python.exe' -ArgumentList 'remove_SecHealthUI_stub.py' -NoNewWindow"
PowerShell -NoP -ExecutionPolicy Bypass -Command "Get-AppxPackage -All *Microsoft.Windows.SecHealthUI* | Remove-AppPackage -AllUsers"

+ 0
- 1511
Executables/Packages.txt
File diff suppressed because it is too large
View File


+ 0
- 387
Executables/REGI.bat View File

@ -1,387 +0,0 @@
@echo OFF
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users" ^| findstr /V /I /X /c:"Public" /c:"Default User" /c:"All Users"`) do (
for /f "usebackq tokens=2 delims=\" %%B in (`reg query "HKEY_USERS" ^| findstr /c:"S-"`) do (
for /f "usebackq tokens=2* delims= " %%C in (`reg query "HKU\%%B\Volatile Environment" /v "USERPROFILE" 2^>^&1 ^| findstr /R /X /C:".*USERPROFILE[ ]*REG_SZ[ ].*"`) do (
REM IF errorlevel 5 CMD /C "exit /b 5"
if /i "%SYSTEMDRIVE%\Users\%%A"=="%%D" cmd /c "exit /b 5"
)
)
if not errorlevel 5 (
reg query "HKEY_USERS" | findstr /c:"AME_UserHive_"
if not errorlevel 1 (
for /f "usebackq tokens=1 delims=:" %%D in (`echo :^>NUL ^& ^(reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_" ^& echo AME-Placeholder^) ^| findstr /N /c:"AME-Placeholder"`) do (
if exist "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT" (
if /i "%%A"=="Default" (
echo reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
) else (
echo reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_%%D" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
)
)
)
) else (
if exist "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT" (
if /i "%%A"=="Default" (
echo reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_Default" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
) else (
echo reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
reg load "HKU\AME_UserHive_1" "%SYSTEMDRIVE%\Users\%%A\NTUSER.DAT"
)
)
)
) else (
cmd /c "exit /b 0"
)
)
for /f "usebackq tokens=2 delims=\" %%E in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%E" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
call :REGICALL "%%E"
)
)
@echo ON
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener" /v "Start" /t REG_DWORD /d 0 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger" /v "Start" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v DownloadMode /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\SettingSync" /v DisableSettingSync /t REG_DWORD /d 2 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\SettingSync" /v DisableSettingSyncUserOverride /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo" /v DisabledByGroupPolicy /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\EnhancedStorageDevices" /v TCGSecurityActivationDisabled /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v DisableFileSyncNGSC /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\safer\codeidentifiers" /v authenticodeenabled /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v DontSendAdditionalData /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /v value /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /v value /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform" /v NoGenTicket /t REG_DWORD /d 1 /f
:: Remove SecurityHealth from startup
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
:: Turns off Windows blocking installation of files downloaded from the internet
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v SaveZoneInformation /t REG_DWORD /d 1 /f
:: Disables SmartScreen
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d "Off" /f
:: Remove Metadata Tracking
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /f
:: New Control Panel cleanup - List of commands: https://winaero.com/ms-settings-commands-in-windows-10/
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v SettingsPageVisibility /t REG_SZ /d "showonly:display;nightlight;sound;notifications;quiethours;powersleep;batterysaver;tabletmode;multitasking;clipboard;remote-desktop;about;bluetooth;connecteddevices;printers;mousetouchpad;devices-touchpad;typing;pen;autoplay;usb;network-status;network-cellular;network-wifi;network-wificalling;network-wifisettings;network-ethernet;network-dialup;network-vpn;network-airplanemode;network-mobilehotspot;datausage;network-proxy;personalization-background;personalization-start;fonts;colors;lockscreen;themes;taskbar;defaultapps;videoplayback;startupapps;dateandtime;regionformatting;gaming;gamemode;easeofaccess-display;easeofaccess-colorfilter;easeofaccess-audio;easeofaccess-easeofaccess-narrator;easeofaccess-magnifier;easeofaccess-highcontrast;easeofaccess-closedcaptioning;easeofaccess-speechrecognition;easeofaccess-eyecontrol;easeofaccess-keyboard;easeofaccess-mouse;cortana-windowssearch;search-moredetails" /f
:: Decrease shutdown time
reg add "HKLM\SYSTEM\CurrentControlSet\Control" /v WaitToKillServiceTimeout /t REG_SZ /d 2000 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control" /v HungAppTimeout /t REG_SZ /d 2000 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control" /v AutoEndTasks /t REG_SZ /d 1 /f
:: Clean up the This PC Icon Selection
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{0DB7E03F-FC29-4DC6-9020-FF41B59E513A}" /f
:: Disable Windows Error Reporting
reg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD d/1 /f
:: Enables full drive indexing (Enhanced Search)
cd Executables
NSudoLC -U:S -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait reg add "HKLM\SOFTWARE\Microsoft\Windows Search\Gather\Windows\SystemIndex" /v "EnableFindMyFiles" /t REG_DWORD /d 1 /f
:: Search
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "DisableWebSearch" /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWeb" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowIndexingEncryptedStoresOrItems" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowSearchToUseLocation" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AlwaysUseAutoLangDetection" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "DisableWebSearch" /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWeb" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWebOverMeteredConnections" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCloudSearch" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Speech_OneCore\Preferences" /v "VoiceActivationDefaultOn" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Speech_OneCore\Preferences" /v "VoiceActivationEnableAboveLockscreen" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Speech_OneCore\Preferences" /v "ModelDownloadAllowed" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE" /v "DisableVoice" /t REG_DWORD /d 1 /f
:: Firewall rules to prevent the startmenu from talking
reg add "HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /v "Block Search SearchApp.exe" /t REG_SZ /d "v2.30|Action=Block|Active=TRUE|Dir=Out|RA42=IntErnet|RA62=IntErnet|App=C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe|Name=Block Search SearchUI.exe|Desc=Block Cortana Outbound UDP/TCP Traffic|" /f
::reg add "HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules" /v "Block Search Package" /t REG_SZ /d "v2.30|Action=Block|Active=TRUE|Dir=Out|RA42=IntErnet|RA62=IntErnet|Name=Block Search Package|Desc=Block Search Outbound UDP/TCP Traffic|AppPkgId=S-1-15-2-536077884-713174666-1066051701-3219990555-339840825-1966734348-1611281757|Platform=2:6:2|Platform2=GTEQ|" /f
:: Disable Timeline
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d 0 /f
:: Setup Windows Explorer
reg delete "HKEY_CLASSES_ROOT\CABFolder\CLSID" /f
reg delete "HKEY_CLASSES_ROOT\SystemFileAssociations\.cab\CLSID" /f
reg delete "HKEY_CLASSES_ROOT\CompressedFolder\CLSID" /f
reg delete "HKEY_CLASSES_ROOT\SystemFileAssociations\.zip\CLSID" /f
:: Taskbar
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ImmersiveShell" /v UseActionCenterExperience /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAHealth /t REG_DWORD /d 0x1 /f
:: Remove the Open with Paint 3D from the explorer context menu
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.bmp\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.jpeg\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.jpe\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.jpg\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.jpg\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.png\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.gif\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.tif\Shell\3D Edit" /f
reg delete "HKLM\SOFTWARE\Classes\SystemFileAssociations\.tiff\Shell\3D Edit" /f
:: Remove OneDrive from the Explorer Side Panel
reg delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f
reg delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f
:: Disable ActiveProbing/NCSI
:: reg add "HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc\Parameters\Internet" /v EnableActiveProbing /t REG_DWORD /d 0 /f
:: smb config
sc config lanmanworkstation depend= bowser/mrxsmb20/nsi
:: Set Time reference to UTC
reg add "HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation" /v RealTimeIsUniversal /t REG_DWORD /d 1 /f
::Disable Users On Login Screen
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v dontdisplaylastusername /t REG_DWORD /d 1 /f
::Disable The Lock Screen
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v NoLockScreen /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f
:: Prevent NVCP not found message after installing NVIDIA drivers
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm" /f
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global" /f
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global\NVTweak" /f
reg add "HKLM\System\CurrentControlSet\Services\nvlddmkm\Global\NVTweak" /v "DisableStoreNvCplNotifications" /t REG_DWORD /d 1 /f
:: Improve new user login experience
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OOBE" /v DisablePrivacyExperience /t REG_DWORD /d 1 /f > NUL 2>&1
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableFirstLogonAnimation /t REG_DWORD /d 0 /f > NUL 2>&1
:: Fix black screen issue with new users
:: start NSudoLC -U:T -P:E -M:S -Priority:RealTime -Wait reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore" /f
:: Enable Legacy F8 Bootmenu
bcdedit /set {default} bootmenupolicy legacy
:: Disable Recovery
bcdedit /set {current} recoveryenabled no
:: Disable Hibernation to make NTFS accessable outside of Windows
powercfg /h off
:: Set Performance Plan to High Performance and display to never turn off
powercfg /S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
powercfg /change monitor-timeout-ac 0
@exit /b 0
:REGICALL
@echo ON
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v Enabled /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v EnableWebContentEvaluation /t REG_DWORD /d 0 /f
reg add "HKU\%~1\Control Panel\International\User Profile" /v HttpAcceptLanguageOptOut /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR" /v AppCaptureEnabled /t REG_DWORD /d 0 /f
reg add "HKU\%~1\System\GameConfigStore" /v GameDVR_Enabled /t REG_DWORD /d 0 /f
:: Autorun
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoDriveTypeAutoRun /t REG_DWORD /d 181 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers" /v DisableAutoplay /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoAutorun /t REG_DWORD /d 1 /f
:: Adobe Security Improvements
reg add "HKU\%~1\SOFTWARE\Adobe" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\JSPrefs" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\JSPrefs" /v "bEnableJS" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\Originals" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\Originals" /v "bAllowOpenFile" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\Originals" /v "bSecureOpenFile" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\Privileged" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\Privileged" /v "bProtectedMode" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\TrustManager" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\TrustManager" /v "iProtectedView" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\TrustManager" /v "bEnhancedSecurityInBrowser" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\DC\TrustManager" /v "bEnhancedSecurityStandalone" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\JSPrefs" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\JSPrefs" /v "bEnableJS" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\Originals" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\Originals" /v "bAllowOpenFile" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\Originals" /v "bSecureOpenFile" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\Privileged" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\Privileged" /v "bProtectedMode" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\TrustManager" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\TrustManager" /v "iProtectedView" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\TrustManager" /v "bEnhancedSecurityInBrowser" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Adobe\Acrobat Reader\XI\TrustManager" /v "bEnhancedSecurityStandalone" /t REG_DWORD /d 1 /f
:: Office Security Improvements
reg add "HKU\%~1\SOFTWARE\Microsoft\Office" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Excel" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Excel\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Excel\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Excel\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Excel\Security" /v "WorkbookLinkWarnings" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\PowerPoint" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\PowerPoint\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\PowerPoint\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\PowerPoint\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Options\vpref" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Options\vpref" /v "fNoCalclinksOnopen_90_1" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\12.0\Word\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Excel\Security" /v "WorkbookLinkWarnings" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\PowerPoint" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\PowerPoint\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\PowerPoint\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\PowerPoint\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Options\WordMail" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Options\WordMail" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\14.0\Word\Security" /v "AllowDDE" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Excel\Security" /v "WorkbookLinkWarnings" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\PowerPoint" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\PowerPoint\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\PowerPoint\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\PowerPoint\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Options\WordMail" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Options\WordMail" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\15.0\Word\Security" /v "AllowDDE" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Excel\Security" /v "WorkbookLinkWarnings" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\PowerPoint" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\PowerPoint\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\PowerPoint\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\PowerPoint\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Options" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Options" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Options\WordMail" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Options\WordMail" /v "DontUpdateLinks" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Security" /v "PackagerPrompt" /t REG_DWORD /d 2 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Security" /v "VBAWarnings" /t REG_DWORD /d 4 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\16.0\Word\Security" /v "AllowDDE" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\Common" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\Common\Security" /t REG_SZ /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Office\Common\Security" /v "DisableAllActiveX" /t REG_DWORD /d 1 /f
:: Turns off Windows blocking installation of files downloaded from the internet
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v SaveZoneInformation /t REG_DWORD /d 1 /f
:: Disables SmartScreen
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v ContentEvaluation /t REG_DWORD /d 0 /f
:: Decrease shutdown time
reg add "HKU\%~1\Control Panel\Desktop" /v WaitToKillAppTimeOut /t REG_SZ /d 2000 /f
:: Disable Storage Sense
reg delete "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense" /f
:: Search
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "BingSearchEnabled" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "CortanaConsent" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "CortanaInAmbientMode" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "HistoryViewEnabled" /t REG_DWORD 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "HasAboveLockTips" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "AllowSearchToUseLocation" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings" /v "SafeSearchMode" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableSearchBoxSuggestions" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization" /v "RestrictImplicitTextCollection" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization" /v "RestrictImplicitInkCollection" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /v "AcceptedPrivacyPolicy" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /v "HarvestContacts" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Personalization\Settings" /v "AcceptedPrivacyPolicy" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableSearchBoxSuggestions" /t REG_DWORD /d 1 /f
:: Setup Windows Explorer
:: Removes the shake to minimze all other windows gesture
::reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "DisallowShaking" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "NavPaneShowAllFolders" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f
:: TBD
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V TaskbarGlomLevel /T REG_DWORD /D 2 /F
:: Taskbar
reg add "HKU\%~1\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v DisableNotificationCenter /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowCortanaButton /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowTaskViewButton /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v EnableAutoTray /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v HideSCAMeetNow /t REG_DWORD /d 1 /f
:: Disable Security and Maintenance notifications
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d 0 /f
:: Disable configue backup notifications
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.BackupReminder" /v "Enabled" /t REG_DWORD /d 0 /f
:: Disable "Let's Finish Setting Up Your Device" OOBE screen
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f
@echo OFF
if "%~1"=="AME_UserHive_Default" (
echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "AME New User Msg" /t REG_EXPAND_SZ /d "msg """"%%username%%"""" Warning: Creating a new user after amelioration is not fully supported. The settings app will not work and certain UI elements will be broken." /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "AME New User Msg" /t REG_EXPAND_SZ /d "msg """"%%username%%"""" Warning: Creating a new user after amelioration is not fully supported. The settings app will not work and certain UI elements will be broken." /f
)
@exit /b 0

+ 0
- 38
Executables/SERV.bat View File

@ -1,38 +0,0 @@
cd Executables\ProcessHacker\x64
ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject AppReadiness -caction delete
timeout /t 2 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction delete
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject wuauserv -caction stop
timeout /t 8 > NUL
ProcessHacker.exe -elevate -s -c -ctype service -cobject DoSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject iphlpsvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject Winmgmt -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject ClipSVC -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject DiagTrack -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject RetailDemo -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject diagnosticshub.standardcollector.service -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject dmwappushservice -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject InstallService -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject LicenseManager -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject lfsvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject MapsBroker -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject NetTcpPortSharing -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject RemoteAccess -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject RemoteRegistry -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject SharedAccess -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject StorSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject TrkWks -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject UsoSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject WbioSrvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject WMPNetworkSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject XblAuthManager -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject XblGameSave -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject XboxNetApiSvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject wlidsvc -caction stop
ProcessHacker.exe -elevate -s -c -ctype service -cobject ClipSVC -caction stop

+ 0
- 20
Executables/SHRT.bat View File

@ -1,20 +0,0 @@
cd Executables
@echo OFF
for /f "usebackq delims=" %%A in (`dir /b /a:d "%SYSTEMDRIVE%\Users" ^| findstr /v /i /x /c:"Public" /c:"Default User" /c:"All Users"`) do (
echo mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell"
mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell"
echo mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned"
mkdir "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned"
echo PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Windows Terminal.lnk'); $S.TargetPath = '%PROGRAMFILES%\Scoop\GlobalScoopApps\apps\windows-terminal\current\WindowsTerminal.exe'; $S.Save(); $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Mozilla Thunderbird.lnk'); $S.TargetPath = '%HOMEDRIVE%\Program Files\Mozilla Thunderbird\thunderbird.exe'; $S.WorkingDirectory = 'C:\Program Files\Mozilla Thunderbird'; $S.Save(); $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Firefox.lnk'); $S.TargetPath = '%HOMEDRIVE%\Program Files\Mozilla Firefox\firefox.exe'; $S.WorkingDirectory = 'C:\Program Files\Mozilla Firefox'; $S.Save()"
PowerShell -NoP -C "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Windows Terminal.lnk'); $S.TargetPath = '%PROGRAMFILES%\Scoop\GlobalScoopApps\apps\windows-terminal\current\WindowsTerminal.exe'; $S.Save(); $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Mozilla Thunderbird.lnk'); $S.TargetPath = '%HOMEDRIVE%\Program Files\Mozilla Thunderbird\thunderbird.exe'; $S.WorkingDirectory = 'C:\Program Files\Mozilla Thunderbird'; $S.Save(); $s = $ws.CreateShortcut('%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\OpenShell\Pinned\Firefox.lnk'); $S.TargetPath = '%HOMEDRIVE%\Program Files\Mozilla Firefox\firefox.exe'; $S.WorkingDirectory = 'C:\Program Files\Mozilla Firefox'; $S.Save()"
echo del /q /f "%SYSTEMDRIVE%\Users\%%A\Desktop\Microsoft Edge.lnk"
del /q /f "%SYSTEMDRIVE%\Users\%%A\Desktop\Microsoft Edge.lnk"
echo del /q /f "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk"
del /q /f "%SYSTEMDRIVE%\Users\%%A\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk"
)
@echo ON
del /q /f "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Media Player.lnk"

+ 0
- 42
Executables/SLNT.bat View File

@ -1,42 +0,0 @@
cd Executables
rmdir /q /s "silent_installers"
7za.exe x silent_installers.7z -pwizard
mkdir "%ALLUSERSPROFILE%\OldNewExplorer"
robocopy "silent_installers\OldNewExplorerCfg" "%ALLUSERSPROFILE%\OldNewExplorer" /e
icacls "%ALLUSERSPROFILE%\OldNewExplorer" /reset /t
PowerShell -NoP -C "Invoke-WMIMethod -Class Win32_Process -Name Create -ArgumentList '%ALLUSERSPROFILE%\OldNewExplorer\OldNewExplorerCfg.exe' | Wait-Process"
del /q /f "%ALLUSERSPROFILE%\OldNewExplorer\*"
PowerShell -NoP -C "Invoke-WMIMethod -Class Win32_Process -Name Create -ArgumentList '%~dp0\silent_installers\OldCalculatorforWindows10Cfg.exe' | Wait-Process"
rename "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Accessories\Old Calculator.lnk" "Calculator.lnk"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKU\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 call :SLNTCALL "%%A"
)
exit /b 0
:SLNTCALL
@echo ON
::Configure OldNewExplorer"
reg add "HKU\%~1\SOFTWARE\Tihiy" /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "Details" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "DriveGrouping" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "HideFolders" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "IEButtons" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NavBarGlass" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoCaption" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoIcon" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoRibbon" /t REG_DWORD /d 1 /f
reg add "HKU\%~1\SOFTWARE\Tihiy\OldNewExplorer" /v "NoUpButton" /t REG_DWORD /d 0 /f
@echo OFF
exit /b 0

+ 0
- 33
Executables/TILE.bat View File

@ -1,33 +0,0 @@
cd Executables
@if exist "%SYSTEMDRIVE%\Windows\StartMenuLayout.xml" echo del /q /f "%SYSTEMDRIVE%\Windows\StartMenuLayout.xml" & del /q /f "%SYSTEMDRIVE%\Windows\StartMenuLayout.xml"
copy /y "Layout.xml" "%SYSTEMDRIVE%\Windows\StartMenuLayout.xml"
@echo OFF
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
REM If the "Volatile Environment" key exists, that means it is a proper user. Built in accounts/SIDs don't have this key.
reg query "HKEY_USERS\%%A" | findstr /c:"Volatile Environment" /c:"AME_UserHive_" > NUL 2>&1
if not errorlevel 1 (
for /f "usebackq tokens=3* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Local AppData" 2^>^&1 ^| findstr /R /X /C:".*Local AppData[ ]*REG_SZ[ ].*"`) do (
echo copy /y "Layout.xml" "%%C\Microsoft\Windows\Shell\LayoutModification.xml"
copy /y "Layout.xml" "%%C\Microsoft\Windows\Shell\LayoutModification.xml"
)
echo reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /f
reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /f
echo reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "LockedStartLayout" /t REG_DWORD /d 0 /f
reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "LockedStartLayout" /t REG_DWORD /d 0 /f
echo reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "StartLayoutFile" /t REG_SZ /d "C:\Windows\StartMenuLayout.xml" /f
reg add "HKU\%%A\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "StartLayoutFile" /t REG_SZ /d "C:\Windows\StartMenuLayout.xml" /f
for /f "usebackq delims=" %%C in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\CloudStore\Store\Cache\DefaultAccount" ^| findstr /c:"start.tilegrid"`) do (
echo reg delete "%%C" /f
reg delete "%%C" /f
)
)
)
@echo ON
PowerShell -NoP -C "Import-StartLayout -LayoutPath '%SYSTEMDRIVE%\Windows\StartMenuLayout.xml' -MountPath $env:SystemDrive\\"
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "StartLayoutFile" /t REG_SZ /d "%SYSTEMDRIVE%\Windows\StartMenuLayout.xml" /f

+ 0
- 4
Executables/UPDATES.bat View File

@ -1,4 +0,0 @@
DISM.exe /Online /Remove-Package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.1645.1.11 /quiet /norestart
DISM.exe /Online /Remove-Package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.1586.1.7 /quiet /norestart
sc config wuauserv start= disabled
sc stop wuauserv

BIN
Executables/UsrClass.dat View File


BIN
Executables/ViVeTool.exe View File


+ 0
- 1
Executables/WAIT.bat View File

@ -1 +0,0 @@
timeout /t 3 /nobreak

+ 0
- 128
Executables/WALLPAPER.bat View File

@ -1,128 +0,0 @@
cd Executables
NSudoLC -U:T -P:E -M:S -Priority:RealTime -UseCurrentConsole -Wait icacls "%WINDIR%\Resources\Themes\aero.theme" /reset /t
PowerShell -NoP -C "(Get-Content '%WINDIR%\Resources\Themes\aero.theme') -replace 'Wallpaper=%%SystemRoot%%.*', 'Wallpaper=%%SystemRoot%%\web\wallpaper\Windows\ame_wallpaper_1440.bmp' | Set-Content '%WINDIR%\Resources\Themes\aero.theme'"
@echo OFF
if exist "ame_wallpaper_1440.bmp" (
echo move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
move /y "ame_wallpaper_1440.bmp" "%WINDIR%\Web\Wallpaper\Windows"
echo icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
icacls "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /reset
)
set "RunEC=10"
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"S-" /c:"AME_UserHive_"`) do (
if "%%A"=="AME_UserHive_Default" (
call :WALLRUN "%%A" "%SYSTEMDRIVE%\Users\Default"
IF errorlevel 5 set "RunEC=5"
IF errorlevel 4 set "RunEC=4"
IF errorlevel 3 set "RunEC=3"
IF errorlevel 2 set "RunEC=2"
IF errorlevel 1 set "RunEC=1"
IF errorlevel 0 set "RunEC=0"
) else (
for /f "usebackq tokens=2* delims= " %%B in (`reg query "HKU\%%A\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "AppData" 2^>^&1 ^| findstr /R /X /C:".*AppData[ ]*REG_SZ[ ].*"`) do (
call :WALLRUN "%%A" "%%C"
IF errorlevel 5 set "RunEC=5"
IF errorlevel 4 set "RunEC=4"
IF errorlevel 3 set "RunEC=3"
IF errorlevel 2 set "RunEC=2"
IF errorlevel 1 set "RunEC=1"
IF errorlevel 0 set "RunEC=0"
)
)
)
for /f "usebackq tokens=2 delims=\" %%A in (`reg query "HKEY_USERS" ^| findstr /c:"AME_UserHive_"`) do echo reg unload "%%A" & reg unload "%%A"
exit /b %RunEC%
:WALLRUN
if not exist "%WINDIR%\Web\Wallpaper\Windows" echo mkdir "%WINDIR%\Web\Wallpaper\Windows" & mkdir "%WINDIR%\Web\Wallpaper\Windows"
if exist "%~2\Microsoft\Windows\Themes\Transcoded_000" set "wallChanged=true" & goto lockScreen
echo PowerShell -NoP -C "Add-Type -AssemblyName System.Drawing; $img = New-Object System.Drawing.Bitmap '%~2\Microsoft\Windows\Themes\TranscodedWallpaper'; if ($img.Flags -ne 77840) {exit 1}; if ($img.HorizontalResolution -ne 96) {exit 1}; if ($img.VerticalResolution -ne 96) {exit 1}; if ($img.PropertyIdList -notcontains 40961) {exit 1}; if ($img.PropertyIdList -notcontains 20624) {exit 1}; if ($img.PropertyIdList -notcontains 20625) {exit 1}"
PowerShell -NoP -C "Add-Type -AssemblyName System.Drawing; $img = New-Object System.Drawing.Bitmap '%~2\Microsoft\Windows\Themes\TranscodedWallpaper'; if ($img.Flags -ne 77840) {exit 1}; if ($img.HorizontalResolution -ne 96) {exit 1}; if ($img.VerticalResolution -ne 96) {exit 1}; if ($img.PropertyIdList -notcontains 40961) {exit 1}; if ($img.PropertyIdList -notcontains 20624) {exit 1}; if ($img.PropertyIdList -notcontains 20625) {exit 1}"
if %errorlevel% NEQ 0 set "wallChanged=true" & goto lockScreen
if exist "img0_*" (
echo takeown /f "%WINDIR%\Web\4K\Wallpaper\Windows\*.jpg"
takeown /f "%WINDIR%\Web\4K\Wallpaper\Windows\*.jpg"
echo icacls "%WINDIR%\Web\4K\Wallpaper\Windows\*.jpg" /reset
icacls "%WINDIR%\Web\4K\Wallpaper\Windows\*.jpg" /reset
echo move /y img0_*.jpg "%WINDIR%\Web\4K\Wallpaper\Windows"
move /y img0_*.jpg "%WINDIR%\Web\4K\Wallpaper\Windows"
)
if exist "img0.jpg" (
echo takeown /f "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
takeown /f "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
echo icacls "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /reset
icacls "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /reset
echo move /y "img0.jpg" "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
move /y "img0.jpg" "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
)
if not exist "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" set "wallFail=true" & goto lockScreen
echo reg add "HKEY_USERS\%~1\Control Panel\Desktop" /v WallPaper /t REG_SZ /d "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /f
reg add "HKEY_USERS\%~1\Control Panel\Desktop" /v WallPaper /t REG_SZ /d "%WINDIR%\Web\Wallpaper\Windows\ame_wallpaper_1440.bmp" /f
if %errorlevel% NEQ 0 set "wallFail=true" & goto lockScreen
:lockScreen
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreen*" > NUL 2>&1
if %errorlevel% NEQ 0 (
echo "%~1" | findstr /c:"S-" > NUL
if not errorlevel 1 (
echo reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Creative\%~1" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
)
echo reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
reg add "HKU\%~1\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f
if exist "img100.jpg" (
echo takeown /f "%WINDIR%\Web\Screen\img100.jpg"
takeown /f "%WINDIR%\Web\Screen\img100.jpg"
echo icacls "%WINDIR%\Web\Screen\img100.jpg" /reset
icacls "%WINDIR%\Web\Screen\img100.jpg" /reset
echo copy "img100.jpg" "%WINDIR%\Web\Screen\img100.jpg" /Y
copy "img100.jpg" "%WINDIR%\Web\Screen\img100.jpg" /Y
)
if exist "img103.png" (
echo takeown /f "%WINDIR%\Web\Screen\img103.png"
takeown /f "%WINDIR%\Web\Screen\img103.png"
echo icacls "%WINDIR%\Web\Screen\img103.png" /reset
icacls "%WINDIR%\Web\Screen\img103.png" /reset
echo copy "img103.png" "%WINDIR%\Web\Screen\img103.png" /Y
copy "img103.png" "%WINDIR%\Web\Screen\img103.png" /Y
)
if exist "img0.jpg" (
echo takeown /f "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
takeown /f "%WINDIR%\Web\Wallpaper\Windows\img0.jpg"
echo icacls "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /reset
icacls "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /reset
echo copy "img0.jpg" "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /Y
copy "img0.jpg" "%WINDIR%\Web\Wallpaper\Windows\img0.jpg" /Y
)
REM Clear cache
echo takeown /R /D Y /F "%PROGRAMDATA%\Microsoft\Windows\SystemData"
takeown /R /D Y /F "%PROGRAMDATA%\Microsoft\Windows\SystemData"
echo icacls "%PROGRAMDATA%\Microsoft\Windows\SystemData" /reset /t
icacls "%PROGRAMDATA%\Microsoft\Windows\SystemData" /reset /t
for /d %%A in ("%PROGRAMDATA%\Microsoft\Windows\SystemData\*") do (
for /d %%B in ("%%A\ReadOnly\LockScreen_*") do echo rmdir /q /s "%%B" & rmdir /q /s "%%B"
)
if "%wallChanged%"=="true" exit /b 1
if "%wallFail%"=="true" exit /b 4
) else (
if "%wallChanged%"=="true" exit /b 3
if "%wallFail%"=="true" exit /b 5
exit /b 2
)
exit /b 0

+ 0
- 3
Executables/WINTERM.bat View File

@ -1,3 +0,0 @@
cd Executables
@PowerShell -NoP -ExecutionPolicy Bypass -File scoop.ps1

BIN
Executables/credprovhost.dll.mui View File


BIN
Executables/install_wim_tweak.exe View File


BIN
Executables/python-3.9.7-amd64.exe View File


+ 0
- 54
Executables/remove_SecHealthUI_stub.py View File

@ -1,54 +0,0 @@
import os, sqlite3
conn = sqlite3.connect(os.path.expandvars(r'%ProgramData%\Microsoft\Windows\AppRepository\StateRepository-Machine.srd'))
cursor = conn.execute(
'''
SELECT _PackageID, PackageFullName FROM main.Package
WHERE PackageFullName LIKE "Microsoft.Windows.SecHealthUI%";
'''
)
records_to_update = {}
for row in cursor:
records_to_update[row[0]] = row[1]
cursor = conn.execute(
'''
SELECT name, sql FROM main.sqlite_master
WHERE type = "trigger" AND tbl_name = "Package" AND name LIKE "TRG_AFTER_UPDATE%";
'''
)
triggers_backup = {}
for row in cursor:
triggers_backup[row[0]] = row[1]
# Delete update triggers for table "Package"
for TriggerName, TriggerSQL in triggers_backup.items():
conn.execute(
'''
DROP TRIGGER %s;
''' % TriggerName
)
conn.commit()
print('Trigger "%s" has been cleared.' % TriggerName)
# Set IsInbox to 0
for PackageID, PackageFullName in records_to_update.items():
conn.execute(
'''
UPDATE main.Package SET IsInbox = 0 WHERE _PackageID = %d;
''' % PackageID
)
conn.commit()
print('IsInbox of "%s" has been set to 0.' % PackageFullName)
# Restore triggers
for TriggerName, TriggerSQL in triggers_backup.items():
conn.execute(
'''
%s;
''' % TriggerSQL
)
conn.commit()
print('Trigger "%s" has been restored.' % TriggerName)

BIN
Executables/silent_installers.7z View File


Executables/AME-Firefox-Injection/extension-preferences.json → Shared_PB/Executables/AME-Firefox-Injection/extension-preferences.json View File


Executables/AME-Firefox-Injection/extension-settings.json → Shared_PB/Executables/AME-Firefox-Injection/extension-settings.json View File


Executables/AME-Firefox-Injection/extensions.json → Shared_PB/Executables/AME-Firefox-Injection/extensions.json View File


Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi → Shared_PB/Executables/AME-Firefox-Injection/extensions/uBlock0@raymondhill.net.xpi View File


Executables/AME-Firefox-Injection/places.sqlite → Shared_PB/Executables/AME-Firefox-Injection/places.sqlite View File


Executables/AME-Firefox-Injection/prefs.js → Shared_PB/Executables/AME-Firefox-Injection/prefs.js View File

@ -15,6 +15,10 @@ user_pref("browser.newtabpage.activity-stream.section.highlights.includeVisited"
user_pref("browser.newtabpage.activity-stream.showSponsored", false);
user_pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false);
user_pref("browser.startup.homepage_override.mstone", "ignore");
user_pref("browser.tabs.firefox-view", false);
user_pref("browser.toolbars.bookmarks.visibility", "never");
user_pref("browser.urlbar.placeholderName", "DuckDuckGo");
@ -28,4 +32,7 @@ user_pref("dom.security.https_only_mode", true);
user_pref("dom.security.https_only_mode_ever_enabled", true);
user_pref("extensions.webextensions.uuids", "{\"doh-rollout@mozilla.org\":\"db2f3e5c-14de-49d9-8dba-b953fc744979\",\"formautofill@mozilla.org\":\"51dd30ef-9ab4-4a12-a55e-2e0c502da764\",\"pictureinpicture@mozilla.org\":\"f58f1670-842e-419e-a88e-fb02b207d325\",\"screenshots@mozilla.org\":\"f51197d4-5e00-4135-af57-cff02e92c03d\",\"webcompat-reporter@mozilla.org\":\"c3f18954-9055-44da-baf8-4e5081fcbf25\",\"webcompat@mozilla.org\":\"782c9238-3b41-4d82-9a32-977118171186\",\"default-theme@mozilla.org\":\"c5434107-1db1-4584-88cf-4dc0e5a2952b\",\"addons-search-detection@mozilla.com\":\"604c46f5-3495-47fd-b2bd-dabb4a0cf2e4\",\"google@search.mozilla.org\":\"df5a10df-d6bd-4830-9c3b-8377639bc132\",\"amazondotcom@search.mozilla.org\":\"ac0cb5cc-dab0-4baf-ac09-2d6dc327b46c\",\"wikipedia@search.mozilla.org\":\"8fae9046-aa02-4b30-8d6a-71b529043aec\",\"bing@search.mozilla.org\":\"86db028d-03fe-4ab6-82ad-a72a27a869d2\",\"ddg@search.mozilla.org\":\"f6c25656-b513-4508-a26e-929c8eebddfd\",\"ebay@search.mozilla.org\":\"2f7fe7fe-f2af-4d09-bed8-5469a52a3184\",\"uBlock0@raymondhill.net\":\"41087662-660a-4251-8c0c-38aa4da5b325\"}");
user_pref("extensions.pocket.enabled", false);
user_pref("extensions.pocket.enabled", false);
user_pref("startup.homepage_override_url", "about:home");
user_pref("startup.homepage_welcome_url", "about:home");

Executables/AME-Firefox-Injection/search.json.mozlz4 → Shared_PB/Executables/AME-Firefox-Injection/search.json.mozlz4 View File


BIN
Executables/OEMDefaultAssociations.dll → Shared_PB/Executables/Associations.dll View File


Executables/Fluent-Metro.skin → Shared_PB/Executables/Fluent-Metro.skin View File


Executables/Fluent-Metro.skin7 → Shared_PB/Executables/Fluent-Metro.skin7 View File


Executables/NSudoLC.exe → Shared_PB/Executables/NSudoLC.exe View File


Executables/ProcessHacker/CHANGELOG.txt → Shared_PB/Executables/ProcessHacker/CHANGELOG.txt View File


Executables/ProcessHacker/COPYRIGHT.txt → Shared_PB/Executables/ProcessHacker/COPYRIGHT.txt View File


Executables/ProcessHacker/LICENSE.txt → Shared_PB/Executables/ProcessHacker/LICENSE.txt View File


Executables/ProcessHacker/README.txt → Shared_PB/Executables/ProcessHacker/README.txt View File


Executables/ProcessHacker/x64/ProcessHacker.exe → Shared_PB/Executables/ProcessHacker/x64/ProcessHacker.exe View File


Executables/ProcessHacker/x64/kprocesshacker.sys → Shared_PB/Executables/ProcessHacker/x64/kprocesshacker.sys View File


Executables/ProcessHacker/x64/peview.exe → Shared_PB/Executables/ProcessHacker/x64/peview.exe View File


Executables/ProcessHacker/x64/plugins/DotNetTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/DotNetTools.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedNotifications.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedServices.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedServices.dll View File


Executables/ProcessHacker/x64/plugins/ExtendedTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ExtendedTools.dll View File


Executables/ProcessHacker/x64/plugins/NetworkTools.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/NetworkTools.dll View File


Executables/ProcessHacker/x64/plugins/OnlineChecks.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/OnlineChecks.dll View File


Executables/ProcessHacker/x64/plugins/SbieSupport.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/SbieSupport.dll View File


Executables/ProcessHacker/x64/plugins/ToolStatus.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/ToolStatus.dll View File


Executables/ProcessHacker/x64/plugins/Updater.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/Updater.dll View File


Executables/ProcessHacker/x64/plugins/UserNotes.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/UserNotes.dll View File


Executables/ProcessHacker/x64/plugins/WindowExplorer.dll → Shared_PB/Executables/ProcessHacker/x64/plugins/WindowExplorer.dll View File


Executables/ProcessHacker/x86/ProcessHacker.exe → Shared_PB/Executables/ProcessHacker/x86/ProcessHacker.exe View File


Executables/ProcessHacker/x86/kprocesshacker.sys → Shared_PB/Executables/ProcessHacker/x86/kprocesshacker.sys View File


Executables/ProcessHacker/x86/peview.exe → Shared_PB/Executables/ProcessHacker/x86/peview.exe View File


Executables/ProcessHacker/x86/plugins/DotNetTools.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/DotNetTools.dll View File


Executables/ProcessHacker/x86/plugins/ExtendedNotifications.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedNotifications.dll View File


Executables/ProcessHacker/x86/plugins/ExtendedServices.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedServices.dll View File


Executables/ProcessHacker/x86/plugins/ExtendedTools.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/ExtendedTools.dll View File


Executables/ProcessHacker/x86/plugins/NetworkTools.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/NetworkTools.dll View File


Executables/ProcessHacker/x86/plugins/OnlineChecks.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/OnlineChecks.dll View File


Executables/ProcessHacker/x86/plugins/SbieSupport.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/SbieSupport.dll View File


Executables/ProcessHacker/x86/plugins/ToolStatus.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/ToolStatus.dll View File


Executables/ProcessHacker/x86/plugins/Updater.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/Updater.dll View File


Executables/ProcessHacker/x86/plugins/UserNotes.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/UserNotes.dll View File


Executables/ProcessHacker/x86/plugins/WindowExplorer.dll → Shared_PB/Executables/ProcessHacker/x86/plugins/WindowExplorer.dll View File


Executables/SFCDEPLOY.bat → Shared_PB/Executables/SFCDEPLOY.bat View File


BIN
Shared_PB/Executables/ame-assassin/Microsoft.Data.Sqlite.dll View File


BIN
Shared_PB/Executables/ame-assassin/Microsoft.Win32.Registry.dll View File


BIN
Shared_PB/Executables/ame-assassin/SQLitePCLRaw.batteries_v2.dll View File


Some files were not shown because too many files changed in this diff

Loading…
Cancel
Save