[ARCHIVED] Windows Editions Reconstruction Project

Discussion in 'Windows 10' started by whatever127, Jan 10, 2020.

Thread Status:
Not open for further replies.
  1. Tarsynear

    Tarsynear MDL Senior Member

    Jan 4, 2021
    303
    123
    10
    #2941 Tarsynear, May 23, 2021
    Last edited: Jun 12, 2022
    Reserved.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  2. maxtorix

    maxtorix MDL Member

    Feb 3, 2010
    181
    147
    10
    Is it possible Windows ThinPC x64?
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. iamaHUN

    iamaHUN MDL Member

    Jun 6, 2018
    111
    160
    10
    #2943 iamaHUN, May 23, 2021
    Last edited: May 23, 2021
    No, because the following packages do not exist or did not leak:
    • WinEmb-Branding-Embedded-ThinPC-Package~31bf3856ad364e35~amd64~~6.1.7601.17514
    • WinEmb-Security-SPP-PkeyConfig-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514
    • WinEmb-Security-SPP-SKU-GVLK-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 (or WinEmb-Security-SPP-SKU-EVAL-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 for evaluation)
    • WinEmb-Security-SPP-SKU-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514
    Maybe you can use POSReady 7 packages to achieve a similar but not same result.

    I can only provide filenames and hashes, except for basebrd.dll and update.cat files.

    Code:
    amd64_microsoft-windows-b..ase-embedded-thinpc_31bf3856ad364e35_6.1.7601.17514_none_7d51e49b342bd242\basebrd.dll     ????????????????????????????????????????
    amd64_microsoft-windows-b..ase-embedded-thinpc_31bf3856ad364e35_6.1.7601.17514_none_7d51e49b342bd242.manifest        4EF37088903185866357B5A11615B66480586657
    amd64_winemb-branding-emb..d-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_4ae452a7b16ce8c4.manifest        9BA59C97F2B665E3080600436F487DF39A05F5A2
    update.mum                                                                                                           84A2C03B34C16EC9C2D80A05571AF9358EDDACA9

    Code:
    amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8\pkeyconfig.xrm-ms               DF039A4A79499C0B793695519F3D0C1DC4D365C2
    amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8\pkeyconfig-embedded.xrm-ms      DF039A4A79499C0B793695519F3D0C1DC4D365C2
    amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8.manifest                        5AFE10710680B7DE46D3BA8E0A9D82422C72DA11
    amd64_winemb-security-spp..g-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_ccc4f0bdec5718b0.manifest                        2248087755EF4F0D605CA83C889225DC9D4B79AC

    Code:
    amd64_microsoft-windows-s..t-sku-embedded-gvlk_31bf3856ad364e35_8.1.7601.17514_none_8e014c03fa2fb5df.manifest        3D56BE064F12F3BE2827DAF4A4EE14F169C1933C
    amd64_winemb-security-spp..k-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_25802252b543e935.manifest        E1F2A3E77350F47149B3D07BE8E159D5BC1FEA91
    update.mum                                                                                                           B8F37545F4A4472719202EC8121445C989A071A8

    Code:
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-pl.xrm-ms                       A24556871DAC86C713D34C62D19721D4642790BB
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ppdlic.xrm-ms                   CCAB00C639465733D2E89B496B5EDD12D2880710
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-TIMEBASEDEVAL-pl.xrm-ms         C481AE29B0CD4785308F3539E08C48738E3B9F9C
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-TIMEBASEDEVAL-ul-oob.xrm-ms     DF492047A25EC4207F9CE4E68882345967230414
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ul-oob.xrm-ms                   54C1943C83AFA7B2DD475DBFA5B595D965F37813
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ul-phn.xrm-ms                   5E1A7360FFB69919848FF70B53B69E5BF5DC99AF
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-RAC-private.xrm-ms    69D95F1F87D929CF258F06D6DD25DD164F517023
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-RAC-public.xrm-ms     F49363A14A9D918FB2444E7F6A23F458C7ADC46C
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-ul.xrm-ms             2CACE1BEC40E990192FCBDEAD73383F4B5AD5DB1
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-ul-oob.xrm-ms         7D63EDB37C10F7407D42FC1C8F8DC827BD27BB33
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-pl.xrm-ms               C0F429F26F6EDD3FBFD18DA65395F7FDC3860E8A
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-ul-oob.xrm-ms           9909740C22289B91E282D842B5E5AE6AA9BE5FED
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-ul-phn.xrm-ms           C238BB7ADA7434F1B8688561AF9D4C2F776ABC80
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52.manifest                                                            CE34B96B96B08B2ED471C2C98CC02AF3FFBD9984
    amd64_winemb-security-spp..u-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_dc5dbd16d1422e80.manifest                                                            455B100C9240B9BF42559314F799E276FBECBEFA
    update.mum                                                                                                                                                               FBA1F26771B6068139250BE65AAF3C9854CD3CBF

    Code:
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-pl.xrm-ms                       5C7EA48C565893709611AEEA456D75512D67A9CD
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ppdlic.xrm-ms                   E4331EF78A15879E60F869252BD1B96409E8AB4A
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-timebasedeval-pl.xrm-ms         C389DEF0491BC6E4827FBC8F780890942FB7E725
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-timebasedeval-ul-oob.xrm-ms     77CFECEB838D5729399DE3C1427DB39D9F7AB5BD
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ul-oob.xrm-ms                   20681E0E40948941EEBCBD5A51693AFE970D4FD7
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ul-phn.xrm-ms                   C0FFDEF24AA9B4D6C23F0BF652B69BF36E3A7D2A
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-rac-private.xrm-ms    D353C4780846304FE9F273854842CF163C3A3703
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-rac-public.xrm-ms     771C33F18197FBB9473230301D1CEE9EA97A63AF
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-ul.xrm-ms             B122E7E279DFC548C0D232136C4B30D50B997287
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-ul-oob.xrm-ms         85A9585F4B92088F9710C6C66F52BFCC0D693DCF
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-pl.xrm-ms               23175E9E4BB085B250A0604367E65377E3DD4581
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-ul-oob.xrm-ms           6B91E48DD311EAB49559A97749D9335D2E8C35D7
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-ul-phn.xrm-ms           34FD044C54E8ACA0DBE8C2E45A2029FCDAC3FA4F
    amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52.manifest                                                            F9EF1816A9F51129A9C817846D23EC1AB02F4F40
    amd64_winemb-security-spp..u-thinpc-deployment_31bf3856ad364e35_6.1.7601.17764_none_dc5dbd16d1422e80.manifest                                                            609A2FBF76258F19A4EB14F552FEA954E79CD02F
    update.mum                                                                                                                                                               C21620EDA18559A314A941EFBFF8FACAFAAFEF49

    So these would be the names and hashes for the 64-bit files, if they would exist, I think. Of course there are no 64-bit basebrd.dll and update.cat files, but manifests and mums can be edited easily, and xrm-ms license files would be the same as the 32-bit ones. Unfortunately without valid catalogs there's no way to add these packages.
     
  4. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2944 xinso, May 23, 2021
    Last edited: May 23, 2021
    Same old story repeats.

    19041 --> 19042
    19042 --> 19043
    19043 -->19044
     
  5. zhanglin

    zhanglin MDL Expert

    Jan 11, 2018
    1,014
    552
    60
  6. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    Endless learning...

    Boot --> Elockdown --> E lockdown

    E = ?

    OK. Wait for your research.
     
  7. zhanglin

    zhanglin MDL Expert

    Jan 11, 2018
    1,014
    552
    60
    EmodePolicyRequired
    E=EFI ?
     
  8. gareths

    gareths MDL Senior Member

    Jun 5, 2017
    469
    128
    10
    19044 *could* be an option for people who may not yet want a big update
     
  9. Tarsynear

    Tarsynear MDL Senior Member

    Jan 4, 2021
    303
    123
    10
    #2949 Tarsynear, May 23, 2021
    Last edited: Jun 12, 2022
    Reserved.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  10. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2950 xinso, May 23, 2021
    Last edited: May 23, 2021
    I must say that forum is not the style I am familiar with. Thanks.
     
  11. Tarsynear

    Tarsynear MDL Senior Member

    Jan 4, 2021
    303
    123
    10
    #2951 Tarsynear, May 23, 2021
    Last edited: Jun 12, 2022
    Reserved.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  12. EeroS

    EeroS MDL Senior Member

    Jul 28, 2018
    318
    147
    10
    Version 2004/19041 it's like a modern day XP, a immortal OS. Updates won't ever end:roflmao:
     
  13. OSMAN

    OSMAN MDL Addicted

    Oct 25, 2009
    592
    103
    30
    how u install 19044 ?
     
  14. maxtorix

    maxtorix MDL Member

    Feb 3, 2010
    181
    147
    10
    Thank you for your detailed answer. What you think can Server 2008R2 to be reconstructed in 32-bit from 64-bit files?

    Thank you, but that is actually the oldest solution. The question was pointed to the title of the project "Windows Editions Reconstruction Project", and the possibilities...
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  15. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2955 xinso, May 24, 2021
    Last edited: May 24, 2021
    To remove Windows Defender from 17763 Server Desktop Experience

    Step 2-1 Remove these packages
    Code:
    Microsoft-Antimalware-Scan-Interface-Core-Package~31bf3856ad364e35~amd64~~10.0.17763.1
    Microsoft-Windows-SenseClient-Package~31bf3856ad364e35~amd64~~10.0.17763.1
    Windows-Defender-Server-Core-Package~31bf3856ad364e35~amd64~~10.0.17763.1
    
    Step 2-2

    [Online]

    Import this registry
    Code:
    Windows Registry Editor Version 5.00
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT]
    "DontOfferThroughWUAU"=dword:00000001
    "DontReportInfectionInformation"=dword:00000001
    
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe]
    
    [Offline]

    a. Load Windows\System32\config\SOFTWARE to HKEY_LOCAL_MACHINE\SOFTWARE1
    b. Import this registry
    Code:
    Windows Registry Editor Version 5.00
    
    [HKEY_LOCAL_MACHINE\SOFTWARE1\Policies\Microsoft\MRT]
    "DontOfferThroughWUAU"=dword:00000001
    "DontReportInfectionInformation"=dword:00000001
    
    [-HKEY_LOCAL_MACHINE\SOFTWARE1\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe]
    
    c. Unload HKEY_LOCAL_MACHINE\SOFTWARE1


    PS.
    For Server 2022, it is these packages. e.g. 20344.1
    Code:
    Microsoft-Antimalware-Scan-Interface-Core-Package~31bf3856ad364e35~amd64~~10.0.20344.1
    Microsoft-Antimalware-Scan-Interface-Core-WOW64-Package~31bf3856ad364e35~amd64~~10.0.20344.1
    Microsoft-Windows-SenseClient-Package~31bf3856ad364e35~amd64~~10.0.20344.1
    Windows-Defender-Server-Core-Package~31bf3856ad364e35~amd64~~10.0.20344.1
    
    But, sooner ot later, this will cause Cumulative Updates malfunctional due to new Update Technology and PSFX update.
     
  16. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2956 xinso, May 24, 2021
    Last edited: May 24, 2021
    Q: Is it OK to remove Windows-Defender-Group-Policy-Package?
    A: It belongs to Microsoft-Windows-GroupPolicy-ClientTools-Package.

    For Server 2019, yes.
    For Server 2022, no if for working Windows Update.
     
  17. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2957 xinso, May 24, 2021
    Last edited: May 24, 2021
    BTW,

    For 21H2, I found the /remove-edge command won't work with EdgeChromium being updated Online.

    PS.
    1. The EdgeChromium in the latest install.wim is not necessarily the latest build.
    2. It's OK to integrate the latest EdgeChromium to install.wim.
     
  18. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2958 xinso, May 24, 2021
    Last edited: May 24, 2021
    OK. No more for today.

    Yes, there is one more.

    The EdgeChromium is the same one, but its functions depend on the target system.

    Case 1:
    Edge
    EdgeUpdate

    Case 2:
    Edge
    EdgeUpdate
    EdgeWebView

    Case 3:
    Edge
    EdgeCore
    EdgeUpdate
    EdgeWebView
     
  19. zhanglin

    zhanglin MDL Expert

    Jan 11, 2018
    1,014
    552
    60
    Enable21H2

    Code:
    <?xml version="1.0" encoding="utf-8" standalone="yes"?>
    <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved.">
      <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Package" version="10.0.19041.1023" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" />
      <package identifier="Microsoft-Windows-21H2Enablement" releaseType="Feature Pack">
        <update name="Microsoft-Windows-21H2Enablement">
          <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3">
            <mum2:noAutoMerge />
          </mum2:customInformation>
        </update>
      </package>
    </assembly>
     
  20. xinso

    xinso MDL Guru

    Mar 5, 2009
    13,714
    14,439
    340
    #2960 xinso, May 24, 2021
    Last edited: May 24, 2021
    An Enablement package should be like this:
    Code:
    <?xml version="1.0" encoding="utf-8" standalone="yes"?>
    <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved.">
      <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" />
      <package identifier="Microsoft-Windows-21H2Enablement" releaseType="Feature Pack">
        <update name="Microsoft-Windows-20H2Enablement">
          <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3">
            <mum2:noAutoMerge />
          </mum2:customInformation>
          <package contained="false" integrate="hidden">
            <assemblyIdentity name="Microsoft-Windows-20H2Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" />
          </package>
        </update>
        <update name="Microsoft-Windows-21H1Enablement">
          <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3">
            <mum2:noAutoMerge />
          </mum2:customInformation>
          <package contained="false" integrate="hidden">
            <assemblyIdentity name="Microsoft-Windows-21H1Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" />
          </package>
        </update>
        <update name="Microsoft-Windows-21H2Enablement">
          <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3">
            <mum2:noAutoMerge />
          </mum2:customInformation>
          <package contained="false" integrate="hidden">
            <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" />
          </package>
        </update>
      </package>
    </assembly>
    
    Which installs a manifest like this:

    amd64_microsoft-windows-21h2enablement_31bf3856ad364e35_10.0.19041.844_none_6e1ed8e9d3d0bbd9.manifest
    Code:
    <?xml version="1.0" encoding="utf-8" standalone="yes"?>
    <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved.">
      <assemblyIdentity name="Microsoft-Windows-21H1Enablement" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" versionScope="nonSxS" />
      <registryKeys>
        <registryKey keyName="HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FeatureManagement\Overrides\0\XXXXXXXXX">
          <registryValue name="EnabledState" valueType="REG_DWORD" value="0x00000002" />
          <registryValue name="EnabledStateOptions" valueType="REG_DWORD" value="0x00000000" />
          <securityDescriptor name="WRP_REGKEY_DEFAULT_SDDL" />
        </registryKey>
      </registryKeys>
      <trustInfo>
        <security>
          <accessControl>
            <securityDescriptorDefinitions>
              <securityDescriptorDefinition name="WRP_REGKEY_DEFAULT_SDDL" sddl="O:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464G:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464D:P(A;CI;GA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;CI;GR;;;SY)(A;CI;GR;;;BA)(A;CI;GR;;;BU)(A;CI;GR;;;S-1-15-2-1)(A;CI;GR;;;S-1-15-3-1024-1065365936-1281604716-3511738428-1654721687-432734479-3232135806-4053264122-3456934681)" operationHint="replace" />
              <securityDescriptorDefinition name="WRP_FILE_DEFAULT_SDDL" sddl="O:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464G:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464D:P(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;GRGX;;;BA)(A;;GRGX;;;SY)(A;;GRGX;;;BU)(A;;GRGX;;;S-1-15-2-1)(A;;GRGX;;;S-1-15-2-2)S:(AU;FASA;0x000D0116;;;WD)" operationHint="replace" />
            </securityDescriptorDefinitions>
          </accessControl>
        </security>
      </trustInfo>
    </assembly>
    
    Without this registry, the new feature won't work:
    Code:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FeatureManagement\Overrides\0\XXXXXXXXX"