@MSMG hi Well I have some comments to do after using Toolkit v11.6 without any problem so thank you again; So as I already said in a previous post that I did not remove anything inside the new operating system and I only used the customizations I thought are correct and that will help earn a lot of time after the new system is installed mainly when you are applying my settings inside of gpedit.msc, lusrmgr.msc, changes in registry, services.msc, and much more and finally I must remember my many thanks to several developers in the United States of America and some friends of Russia as well as all were in stating that Do not recommend or at least avoid removing "things" of the system then obviously as a simple apprentice I tried to follow these recommendations is clear and finally already with the system in use is that I can make big changes using PowerShell and lastly confirming my hwid I have since Windows 7 times will work as soon as I connect to the internet (another thing I should mention this and the first time I see the toolkit using a version of DISM that is not the most current lol ...)
Yes it's right! But the problem doesn't interfere with the integration, only the screen display. MSMG, corrected 3 times. The Official was released on the 13th, correction on the 14th, another on the 15th and another on the 16th. Check the last one if this error remains. It seems to me that this has been fixed, the problem was not with the absence of these lines but by resetting the value of the PackageIndex variable to empty, in other integrations. I'm sure you used the 15th version and integrated one of the components below before DirectX9c. Win32Calc WinToGo DaRT sidebar VCRuntime
The Lines 6199 and 6207 not fixed (16th) Errors in the Toolkit.cmd file (16th) at the root of Mega's MSMG account. DirectX9c and VC++ Runtime fixed into Toolkit_v11.6.7z on day 14
That's what I said: "Yes, that's right! But the problem doesn't interfere with the integration, only the screen display." No. PackageIndex is set at the beginning of the toolkit and there were remnants of resetting this variable to empty until the 15th file. This was only fixed, on the 16th. I just tested it here, and if you take the 15th version, integrate DirectX9c you can't integrate VC++ Runtime, discarding the changes and integrating VC++ Runtime first you can't integrate DirectX9c. Day 16 everything is working fine.
I have remove my Toolkit Folder. I have redownload the files "Toolkit_v11.6.7z" and "Toolkit.cmd". Extract Toolkit_v11.6.7z to folder and overwrite with Toolkit.cmd (day 16)... Yeeesssss is working fine. Sorry for the inconvenience
I finished the merge of Custom Toolkit with Official Toolkit. And, with this comment of yours, I thought of leaving Custom a little more permissive to be able to mess with these more current images. It will do, just for testing. But you should be able to use the list removal and apply the windows 10 tweaks (that doesn't sound good to me, hehehehe), because it's logically experimental. I just removed some restrictive conditions and used in some crucial parts a condition like: If SelectedSourceOS is equal to "w10" or if it is equal to "w11" assign "21" to move forward. example: Code: if "%ImageVersion%" equ "6.1.7601" set "SelectedSourceOS=w7" if "%ImageVersion%" equ "6.3.9600" set "SelectedSourceOS=w81" if "%ImageVersion:~,-6%" equ "10.0" ( set "SelectedSourceOS=w10" set "W10_W11=21" ) if "%ImageVersion:~,-6%" equ "11.0" ( set "SelectedSourceOS=w11" set "W10_W11=21" ) if "%W10_W11%" equ "21" ( set "ImageBuild=%ImageVersion:~5.5%" ) else ( set "ImageBuild=%ImageVersion:~4.4%" ) The most that will happen is not to pass this condition: Code: if "%ImageVersion:~,-6%" equ "11.0" ( . . . ) But I believe it is going well. This will not interfere with using the images that the Toolkit supports. When I finish testing the stable part with windows 10 images, I will post. Then you can play with your tests on Windows 11. Note: I'll advance one thing... Anyone who has a computer or notebook without TPM2.0 support, will have to circumvent this by doing the bypass below. 1. Convert install.wim (Windows 11) to install.esd 2. Copy and replace this install.esd, inside the source folder of a Windows 10 Install Media. I haven't run tests yet. It certainly has to replace boot.wim as well, but that information was not provided. So, this should be part of your test. I read about it yesterday.
if we move boot.wim from 21996 build to win10 iso sources the same msg will appear. its just a work of boot wim & attached extra folder at boot directory with highest security for setup.
I assembled the puzzle... I understand that the integration code from the "ESU_%ImageArchitecture%.reg" registry file is missing. Both WHD Update integration and EdgeChromium integration. Here is the Code for verification: Code: :: Applying Windows 7 Extended Security Update (ESU) Suppressor Patch echo. echo.------------------------------------------------------------------------------- echo.Apply Windows 7 Extended Security Update ^(ESU^) Suppressor Patch... echo.------------------------------------------------------------------------------- call :ApplyImage "%W7ESU%\ESU.tpk", %PackageIndex%, "%InstallMount%\%%i" echo.------------------------------------------------------------------------------- echo.Importing Windows 7 Extended Security Update ^(ESU^) Registry Settings... echo.------------------------------------------------------------------------------- echo. echo.Mounting Image Registry... call :MountImageRegistry "%InstallMount%\%%i" for /f "tokens=5 delims=\" %%a in ('reg query "HKLM\TK_COMPONENTS\DerivedData\Components" ^| findstr "%ImageArchitecture%_!EsuFoundation!"') do (set "EsuFoundation=%%a") if "%ImageArchitecture%" equ "x86" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul ) if "%ImageArchitecture%" equ "x64" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul ) echo.Importing Registry Settings to Image Registry... if exist "%W7ESU%\ESU_%ImageArchitecture%.reg" call :ImportRegistry2Image "%W7ESU%\ESU_%ImageArchitecture%.reg" echo.Un-Mounting Image Registry... call :UnMountImageRegistry
Code: :: Applying Windows 7 Extended Security Update (ESU) Suppressor Patch echo. echo.------------------------------------------------------------------------------- echo.Apply Windows 7 Extended Security Update ^(ESU^) Suppressor Patch... echo.------------------------------------------------------------------------------- call :ApplyImage "%W7ESU%\ESU.tpk", %PackageIndex%, "%InstallMount%\%%i" echo.------------------------------------------------------------------------------- echo.Importing Windows 7 Extended Security Update ^(ESU^) Registry Settings... echo.------------------------------------------------------------------------------- echo. echo.Mounting Image Registry... call :MountImageRegistry "%InstallMount%\%%i" for /f "tokens=5 delims=\" %%a in ('reg query "HKLM\TK_COMPONENTS\DerivedData\Components" ^| findstr "%ImageArchitecture%_!EsuFoundation!"') do (set "EsuFoundation=%%a") if "%ImageArchitecture%" equ "x86" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul ) if "%ImageArchitecture%" equ "x64" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul ) echo.Importing Registry Settings to Image Registry... if exist "%W7ESU%\ESU_%ImageArchitecture%.reg" call :ImportRegistry2Image "%W7ESU%\ESU_%ImageArchitecture%.reg" echo.Un-Mounting Image Registry... call :UnMountImageRegistry [/QUOTE] Code: =============================================================================== MSMG ToolKit - Integrate Microsoft Edge Chromium Browser =============================================================================== ------------------------------------------------------------------------------- ####Starting Integrating Microsoft Edge Chromium Browser####################### ------------------------------------------------------------------------------- Image : Install.wim Image Index : 1 Image Architecture : x64 Image Version : 6.1.7601.17514.1 ------------------------------------------------------------------------------- ####Integrating Microsoft Edge Chromium Browser################################ ------------------------------------------------------------------------------- ===========================[Install.wim, Index : 1]============================ ------------------------------------------------------------------------------- Integrating Windows Servicing Stack Update (SSU) (KB4490628) Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Image Version: 6.1.7601.17514 Processing 1 of 1 - Adding package Package_for_KB4490628~31bf3856ad364e35~amd64~ ~6.1.1.2 [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- Integrating Windows Servicing Stack Update (SSU) (KB4592510) Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Image Version: 6.1.7601.24383 Processing 1 of 1 - Adding package Package_for_KB4592510~31bf3856ad364e35~amd64~ ~6.1.1.0 [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- Integrating Windows SHA-2 Code Update (KB4474419) Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Image Version: 6.1.7601.24563 Processing 1 of 1 - Adding package Package_for_KB4474419~31bf3856ad364e35~amd64~ ~6.1.3.2 [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- Apply Windows 7 Extended Security Update (ESU) Suppressor Patch... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Applying image [==========================100.0%==========================] The operation completed successfully. Importing Registry Settings to Image Registry... A operação foi concluída com êxito. ------------------------------------------------------------------------------- Integrating Microsoft Edge Chromium Browser Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Image Version: 6.1.7601.24563 Processing 1 of 1 - Adding package Package_for_KB5001027~31bf3856ad364e35~amd64~ ~6.1.1.3 [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- Integrating Microsoft Edge Chromium Browser Group Policy Base Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Applying image [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- Integrating Microsoft Edge Chromium Browser Group Policy [en-US] Package... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.21382.1 Applying image [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- ####Finished Integrating Microsoft Edge Chromium Browser####################### ------------------------------------------------------------------------------- =============================================================================== Pressione qualquer tecla para continuar. . .
Edge from taskbar can be removed using custom taskbar layout but for desktop shortcut you may need to remove it directly from the image.
Just to have the latest binary I switched to the Server 2022 Win32Calc but seems it has some dependency files required, will try to make it work or restore back to older pack.
Integrate Windows Updates method will leave the integration order to DISM which unfortunately doesn't' work with Windows 8.1/10 properly. Did you removed the components before the integration?
Thanks have add the fix for the Dedup thing and for other issues use the latest Toolkit.cmd from download link.
The ESU_%ImageArchitecture%.reg is not required, just forgot to remove it from Bin folder. Instead the registry setting are directly added in the Toolkit since the registry value is not static. Code: if "%ImageArchitecture%" equ "x86" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul ) if "%ImageArchitecture%" equ "x64" ( reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1 reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul )