1. Tiger-1

    Tiger-1 MDL Guru

    Oct 18, 2014
    7,897
    10,733
    240
    @MSMG hi Well I have some comments to do after using Toolkit v11.6 without any problem so thank you again; So as I already said in a previous post that I did not remove anything inside the new operating system and I only used the customizations I thought are correct and that will help earn a lot of time after the new system is installed mainly when you are applying my settings inside of gpedit.msc, lusrmgr.msc, changes in registry, services.msc, and much more and finally I must remember my many thanks to several developers in the United States of America and some friends of Russia as well as all were in stating that Do not recommend or at least avoid removing "things" of the system then obviously as a simple apprentice I tried to follow these recommendations is clear and finally already with the system in use is that I can make big changes using PowerShell and lastly confirming my hwid I have since Windows 7 times will work as soon as I connect to the internet (another thing I should mention this and the first time I see the toolkit using a version of DISM that is not the most current lol ...)
     

    Attached Files:

    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  2. inTerActionVRI

    inTerActionVRI MDL Expert

    Sep 23, 2009
    1,651
    3,398
    60
    Yes it's right! But the problem doesn't interfere with the integration, only the screen display.


    MSMG, corrected 3 times.
    The Official was released on the 13th, correction on the 14th, another on the 15th and another on the 16th.

    Check the last one if this error remains. It seems to me that this has been fixed, the problem was not with the absence of these lines but by resetting the value of the PackageIndex variable to empty, in other integrations.

    I'm sure you used the 15th version and integrated one of the components below before DirectX9c.
    Win32Calc
    WinToGo
    DaRT
    sidebar
    VCRuntime
     
  3. babyboom666

    babyboom666 MDL Novice

    Nov 14, 2010
    36
    16
    0
    #19684 babyboom666, Jun 18, 2021
    Last edited: Jun 18, 2021
    The Lines 6199 and 6207 not fixed (16th)
    Errors in the Toolkit.cmd file (16th) at the root of Mega's MSMG account. DirectX9c and VC++ Runtime fixed into Toolkit_v11.6.7z on day 14
     

    Attached Files:

  4. Solarsails

    Solarsails MDL Junior Member

    Jan 6, 2016
    74
    33
    0
    #19686 Solarsails, Jun 18, 2021
    Last edited: Jun 18, 2021
    ^^^^^^^^Cortanna?
     
  5. inTerActionVRI

    inTerActionVRI MDL Expert

    Sep 23, 2009
    1,651
    3,398
    60
    That's what I said:
    "Yes, that's right! But the problem doesn't interfere with the integration, only the screen display."

    No. PackageIndex is set at the beginning of the toolkit and there were remnants of resetting this variable to empty until the 15th file. This was only fixed, on the 16th.

    I just tested it here, and if you take the 15th version, integrate DirectX9c you can't integrate VC++ Runtime, discarding the changes and integrating VC++ Runtime first you can't integrate DirectX9c.

    Day 16 everything is working fine.
     
  6. babyboom666

    babyboom666 MDL Novice

    Nov 14, 2010
    36
    16
    0
    I have remove my Toolkit Folder. I have redownload the files "Toolkit_v11.6.7z" and "Toolkit.cmd". Extract Toolkit_v11.6.7z to folder and overwrite with Toolkit.cmd (day 16)... Yeeesssss is working fine.

    Sorry for the inconvenience :sorry::weep:
     
  7. inTerActionVRI

    inTerActionVRI MDL Expert

    Sep 23, 2009
    1,651
    3,398
    60
    I finished the merge of Custom Toolkit with Official Toolkit.

    And, with this comment of yours, I thought of leaving Custom a little more permissive to be able to mess with these more current images.

    It will do, just for testing.

    But you should be able to use the list removal and apply the windows 10 tweaks (that doesn't sound good to me, hehehehe), because it's logically experimental.

    I just removed some restrictive conditions and used in some crucial parts a condition like:
    If SelectedSourceOS is equal to "w10" or if it is equal to "w11" assign "21" to move forward.

    example:
    Code:
    if "%ImageVersion%" equ "6.1.7601" set "SelectedSourceOS=w7"
    if "%ImageVersion%" equ "6.3.9600" set "SelectedSourceOS=w81"
    if "%ImageVersion:~,-6%" equ "10.0" (
    set "SelectedSourceOS=w10"
    set "W10_W11=21"
    )
    if "%ImageVersion:~,-6%" equ "11.0" (
    set "SelectedSourceOS=w11"
    set "W10_W11=21"
    )
    
    if "%W10_W11%" equ "21" (
    set "ImageBuild=%ImageVersion:~5.5%"
    ) else (
    set "ImageBuild=%ImageVersion:~4.4%"
    )
    
    The most that will happen is not to pass this condition:
    Code:
    if "%ImageVersion:~,-6%" equ "11.0" (
    .
    .
    .
    )
    
    But I believe it is going well. This will not interfere with using the images that the Toolkit supports.

    When I finish testing the stable part with windows 10 images, I will post.

    Then you can play with your tests on Windows 11. :);)


    Note:
    I'll advance one thing...
    Anyone who has a computer or notebook without TPM2.0 support, will have to circumvent this by doing the bypass below.

    1. Convert install.wim (Windows 11) to install.esd

    2. Copy and replace this install.esd, inside the source folder of a Windows 10 Install Media.

    I haven't run tests yet. It certainly has to replace boot.wim as well, but that information was not provided. So, this should be part of your test.
    I read about it yesterday.
     
  8. if we move boot.wim from 21996 build to win10 iso sources the same msg will appear.
    its just a work of boot wim & attached extra folder at boot directory with highest security for setup.
     
  9. inTerActionVRI

    inTerActionVRI MDL Expert

    Sep 23, 2009
    1,651
    3,398
    60
    I assembled the puzzle...

    I understand that the integration code from the "ESU_%ImageArchitecture%.reg" registry file is missing.

    Both WHD Update integration and EdgeChromium integration.

    Here is the Code for verification:

    Code:
               :: Applying Windows 7 Extended Security Update (ESU) Suppressor Patch
               echo.
               echo.-------------------------------------------------------------------------------
               echo.Apply Windows 7 Extended Security Update ^(ESU^) Suppressor Patch...
               echo.-------------------------------------------------------------------------------
               call :ApplyImage "%W7ESU%\ESU.tpk", %PackageIndex%, "%InstallMount%\%%i"
    
               echo.-------------------------------------------------------------------------------
               echo.Importing Windows 7 Extended Security Update ^(ESU^) Registry Settings...
               echo.-------------------------------------------------------------------------------
               echo.
               echo.Mounting Image Registry...
               call :MountImageRegistry "%InstallMount%\%%i"
    
               for /f "tokens=5 delims=\" %%a in ('reg query "HKLM\TK_COMPONENTS\DerivedData\Components" ^| findstr "%ImageArchitecture%_!EsuFoundation!"') do (set "EsuFoundation=%%a")
    
               if "%ImageArchitecture%" equ "x86" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
               if "%ImageArchitecture%" equ "x64" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
               echo.Importing Registry Settings to Image Registry...
               if exist "%W7ESU%\ESU_%ImageArchitecture%.reg" call :ImportRegistry2Image "%W7ESU%\ESU_%ImageArchitecture%.reg"
    
               echo.Un-Mounting Image Registry...
               call :UnMountImageRegistry
    
     
  10. x33st0rm

    x33st0rm MDL Novice

    Dec 25, 2016
    7
    0
    0
  11. Bira

    Bira MDL Member

    Oct 4, 2017
    197
    108
    10
    Code:
               :: Applying Windows 7 Extended Security Update (ESU) Suppressor Patch
               echo.
               echo.-------------------------------------------------------------------------------
               echo.Apply Windows 7 Extended Security Update ^(ESU^) Suppressor Patch...
               echo.-------------------------------------------------------------------------------
               call :ApplyImage "%W7ESU%\ESU.tpk", %PackageIndex%, "%InstallMount%\%%i"
    
               echo.-------------------------------------------------------------------------------
               echo.Importing Windows 7 Extended Security Update ^(ESU^) Registry Settings...
               echo.-------------------------------------------------------------------------------
               echo.
               echo.Mounting Image Registry...
               call :MountImageRegistry "%InstallMount%\%%i"
    
               for /f "tokens=5 delims=\" %%a in ('reg query "HKLM\TK_COMPONENTS\DerivedData\Components" ^| findstr "%ImageArchitecture%_!EsuFoundation!"') do (set "EsuFoundation=%%a")
    
               if "%ImageArchitecture%" equ "x86" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
               if "%ImageArchitecture%" equ "x64" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
               echo.Importing Registry Settings to Image Registry...
               if exist "%W7ESU%\ESU_%ImageArchitecture%.reg" call :ImportRegistry2Image "%W7ESU%\ESU_%ImageArchitecture%.reg"
    
               echo.Un-Mounting Image Registry...
               call :UnMountImageRegistry
    
    [/QUOTE]

    Code:
    
    ===============================================================================
              MSMG ToolKit - Integrate Microsoft Edge Chromium Browser
    ===============================================================================
    
    -------------------------------------------------------------------------------
    ####Starting Integrating Microsoft Edge Chromium Browser#######################
    -------------------------------------------------------------------------------
    
        Image                    : Install.wim
        Image Index              : 1
        Image Architecture       : x64
        Image Version            : 6.1.7601.17514.1
    
    -------------------------------------------------------------------------------
    ####Integrating Microsoft Edge Chromium Browser################################
    -------------------------------------------------------------------------------
    
    ===========================[Install.wim, Index : 1]============================
    
    -------------------------------------------------------------------------------
    Integrating Windows Servicing Stack Update (SSU) (KB4490628) Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Image Version: 6.1.7601.17514
    
    Processing 1 of 1 - Adding package Package_for_KB4490628~31bf3856ad364e35~amd64~
    ~6.1.1.2
    [==========================100.0%==========================]
    The operation completed successfully.
    
    -------------------------------------------------------------------------------
    Integrating Windows Servicing Stack Update (SSU) (KB4592510) Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Image Version: 6.1.7601.24383
    
    Processing 1 of 1 - Adding package Package_for_KB4592510~31bf3856ad364e35~amd64~
    ~6.1.1.0
    [==========================100.0%==========================]
    The operation completed successfully.
    
    -------------------------------------------------------------------------------
    Integrating Windows SHA-2 Code Update (KB4474419) Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Image Version: 6.1.7601.24563
    
    Processing 1 of 1 - Adding package Package_for_KB4474419~31bf3856ad364e35~amd64~
    ~6.1.3.2
    [==========================100.0%==========================]
    The operation completed successfully.
    
    
    -------------------------------------------------------------------------------
    Apply Windows 7 Extended Security Update (ESU) Suppressor Patch...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Applying image
    [==========================100.0%==========================]
    The operation completed successfully.
    
    Importing Registry Settings to Image Registry...
    A operação foi concluída com êxito.
    
    -------------------------------------------------------------------------------
    Integrating Microsoft Edge Chromium Browser Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Image Version: 6.1.7601.24563
    
    Processing 1 of 1 - Adding package Package_for_KB5001027~31bf3856ad364e35~amd64~
    ~6.1.1.3
    [==========================100.0%==========================]
    The operation completed successfully.
    
    -------------------------------------------------------------------------------
    Integrating Microsoft Edge Chromium Browser Group Policy Base Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Applying image
    [==========================100.0%==========================]
    The operation completed successfully.
    
    -------------------------------------------------------------------------------
    Integrating Microsoft Edge Chromium Browser Group Policy [en-US] Package...
    -------------------------------------------------------------------------------
    
    Deployment Image Servicing and Management tool
    Version: 10.0.21382.1
    
    Applying image
    [==========================100.0%==========================]
    The operation completed successfully.
    
    -------------------------------------------------------------------------------
    ####Finished Integrating Microsoft Edge Chromium Browser#######################
    -------------------------------------------------------------------------------
    
    ===============================================================================
    
    Pressione qualquer tecla para continuar. . .
     
  12. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    #19694 MSMG, Jun 19, 2021
    Last edited: Jun 19, 2021
    (OP)
    Edge from taskbar can be removed using custom taskbar layout but for desktop shortcut you may need to remove it directly from the image.

     
  13. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    Just to have the latest binary I switched to the Server 2022 Win32Calc but seems it has some dependency files required, will try to make it work or restore back to older pack.

     
  14. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    Integrate Windows Updates method will leave the integration order to DISM which unfortunately doesn't' work with Windows 8.1/10 properly.

    Did you removed the components before the integration?

     
  15. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    Thanks have add the fix for the Dedup thing and for other issues use the latest Toolkit.cmd from download link.

     
  16. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    What's the latest W10 ADK version available?

     
  17. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210
    The ESU_%ImageArchitecture%.reg is not required, just forgot to remove it from Bin folder.

    Instead the registry setting are directly added in the Toolkit since the registry value is not static.


    Code:
               if "%ImageArchitecture%" equ "x86" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D7838362C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "S256H" /t REG_BINARY /d "343B7E8DE2FE932E2FA1DB0CDFE69BB648BEE8E834B41728F1C83A12C1766ECB" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_6eb019927ae880f2" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\x86_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_none_b26c9b4c15d241fc\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
               if "%ImageArchitecture%" equ "x64" (
                   reg delete "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /f >nul 2>&1
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "identity" /t REG_BINARY /d "4D6963726F736F66742D57696E646F77732D534C432D436F6D706F6E656E742D457874656E64656453656375726974795570646174657341492C2043756C747572653D6E65757472616C2C2056657273696F6E3D362E312E373630332E32353030302C205075626C69634B6579546F6B656E3D333162663338353661643336346533352C2050726F636573736F724172636869746563747572653D616D6436342C2076657273696F6E53636F70653D4E6F6E537853" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "S256H" /t REG_BINARY /d "45D0AE442FD92CE32EE1DDC38EA3B875EAD9A53D6A17155A10FA9D9E16BEDEB2" >nul
                   reg add "HKLM\TK_COMPONENTS\DerivedData\Components\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /v "c^!!EsuFoundation!" /t REG_BINARY /d "" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228" /ve /t REG_SZ /d "6.1" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /v "6.1.7603.25000" /t REG_BINARY /d "01" >nul
                   reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Winners\amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.1.7603.25000_none_caceb5163345f228\6.1" /ve /t REG_SZ /d "6.1.7603.25000" >nul
               )
    
     
  18. MSMG

    MSMG MDL Developer

    Jul 15, 2011
    6,411
    15,487
    210