I do some system clean up, and see this path Code: C:\Recovery\OEM have 2 files in it Code: AfterImageApply_BDB0C1E8-6951-46C4-AB7F-C07B29F462FD ResetConfig I didn't create it, who did ?
might be one of my script did it . i forgot which one . its for custom re.wim & registry set to load custom pe instead of re when called via commandline.
Certainly you or your script didn't make them. These are completely common/default hidden Windows files and are in every computer. But at all another story is when you or anyone else can see or access them, even worse - can be freely deleted. By default, these are hidden and write -protected system files that no ordinary users should have access and even less the opportunity to delete them.