Example: Use the ADK for Windows 10 / 11 to Create an ISO Image with Anti-Malware Services Disabled

Iron Contributor

NOTE: The following requires either the 64-bit Windows 10 2004 ADK, or the 64-bit Windows 11 23H2 ADK, and the accompanying WinPE Add-On to be installed.

 

(1.) Download the Windows 10 / 11 ISO Image ( 32-bit / 64-bit ) and place in the following folder: C:\ISO

 

Download Windows 10 / 11 Disk Image (ISO) -> Select Download -> Windows 10 / 11 (multi-edition ISO) -> Download
Select the product language -> English (United States) -> Confirm
Windows 10 / 11 English -> 32-bit Download / 64-bit Download

NOTE: When Downloading the ISO Images on Windows 10 / 11, you must use a User-Agent Switching Addon, like in the examples below:

User-Agent Switcher and Manager: https://chrome.google.com/webstore/detail/user-agent-switcher-and-m/bhchdcejhohfmigjafbampogmaanbfkg
( Firefox: https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher/ )

 

NOTE: Right-click on the following batch files after saving them, and click "Run as administrator".

 

(2.) Use Notepad to create this file on your desktop or another folder: Win10_11_ISO_Image_Generator.bat

 

@ECHO OFF
SETLOCAL EnableDelayedExpansion

REM Windows 10, version 21H2 update history - Microsoft Support -> https://support.microsoft.com/en-us/topic/windows-10-update-history-857b8ccb-71e4-49e5-b3f6-7073197d98fb
REM History of Cumulative Updates for .NET Framework for Windows 10 Version 21H2 - Microsoft Support -> https://support.microsoft.com/en-us/topic/history-of-cumulative-updates-for-net-framework-for-windows-10-a5928b6e-2c67-4f78-8729-918864dee1f0

REM Windows 10, version 22H2 update history - Microsoft Support -> https://support.microsoft.com/en-us/topic/windows-10-update-history-8127c2c6-6edf-4fdf-8b9f-0f7be1ef3562
REM History of Cumulative Updates for .NET Framework for Windows 10 Version 22H2 - Microsoft Support -> https://support.microsoft.com/en-us/topic/history-of-cumulative-updates-for-net-framework-for-windows-10-ed11bbe6-5999-4ca3-b01c-c5831eb7c85a

REM Windows 11, version 23H2 update history - Microsoft Support -> https://support.microsoft.com/en-us/topic/windows-11-update-history-59875222-b990-4bd9-932f-91a5954de434
REM History of Cumulative Updates for .NET Framework for Windows 11 Version 23H2 - Microsoft Support -> https://support.microsoft.com/en-us/topic/history-of-cumulative-updates-for-net-framework-for-windows-11-681b6830-77cb-41aa-80cf-185818ce6144

IF EXIST "C:\Patches\Win10" DEL /Q "C:\Patches\Win10\*.*" 2> nul
IF EXIST "C:\Patches\Win11" DEL /Q "C:\Patches\Win11\*.*" 2> nul

:STRT_LNE_WIN_SRT_1_
CHOICE /C YN /N /M "...LAST UPDATED ON: [MARCH] [26TH] [2024] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 255 GOTO STRT_LNE_WIN_SRT_1_
IF %ErrorLevel% EQU 2 GOTO LST_LNE_WIN_SRT_2_

IF NOT EXIST "C:\Patches" (SET PTCH_CLNP_WIN_SRT_VAR_=0&GOTO STRT_LNE_WIN_SRT_0_)

:STRT_LNE_WIN_SRT_2_
CHOICE /C YN /N /M "REMOVING OLD ETAG AND PATCH FILES... <- [Y] YES TO REMOVE [N] NO TO SKIP?"
IF %ErrorLevel% EQU 255 GOTO STRT_LNE_WIN_SRT_2_
IF %ErrorLevel% EQU 2 SET PTCH_CLNP_WIN_SRT_VAR_=1
IF %ErrorLevel% EQU 1 SET PTCH_CLNP_WIN_SRT_VAR_=0
:STRT_LNE_WIN_SRT_0_

IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (((DIR /B /S /O:N "C:\Patches\windows10.0-kb*.msu.txt"&DIR /B /S /O:N "C:\Patches\windows10.0-kb*.msu"&DIR /B /S /O:N "C:\Patches\windows11.0-kb*.msu.txt"&DIR /B /S /O:N "C:\Patches\windows11.0-kb*.msu")>> "C:\Patches\Cleanup_Win_Old_.txt") >nul 2>&1)

SET LST_MSS_UPDT_=0
SET _OS_TTL_=WINDOWS 10 22H2 32-BIT
SET _VERISO_=Win10_22H2_English_x32
SET _FLDRNM_=Win_10_32
SET _PTH_NM_=W10_x86
SET _OSVRNM_=Win10
SET _OSPTCH_1_=22H2
SET _OSPTCH_2_=21H2
SET _SCRTCH_=x86
SET _ARCHNM_=x86
SET _ISORCH_=X86
SET _LINK_1_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows10.0-kb5035941-x86_bf2f1104f245aff87d57a4a68b0004332b6a21a4.msu
SET _LINK_2_=https://catalog.s.download.windowsupdate.com/d/msdownload/update/software/updt/2024/03/windows10.0-kb5036034-x86-ndp481_244167e71e7423cbd4c9bf6d12056c89715d31fd.msu
SET _LNK1NM_=windows10.0-kb5035941-x86_bf2f1104f245aff87d57a4a68b0004332b6a21a4.msu
SET _LNK2NM_=windows10.0-kb5036034-x86-ndp481_244167e71e7423cbd4c9bf6d12056c89715d31fd.msu
SET _CMNT_1_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5035941 10 22H2 x86 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _CMNT_2_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036034 10 22H2 -"x64" -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _LINK_3_=https://catalog.s.download.windowsupdate.com/d/msdownload/update/software/secu/2023/06/windows10.0-kb5027215-x86_cc0a610e47eef5b404e5530b73ab28d6f2e017d3.msu
SET _LINK_4_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2023/05/windows10.0-kb5027122-x86-ndp48_8404123479deb0b3007ac2fd884447e519971c99.msu
SET _LNK3NM_=windows10.0-kb5027215-x86_cc0a610e47eef5b404e5530b73ab28d6f2e017d3.msu
SET _LNK4NM_=windows10.0-kb5027122-x86-ndp48_8404123479deb0b3007ac2fd884447e519971c99.msu
SET _CMNT_3_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027215 10 LTSB x86 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _CMNT_4_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027537 10 LTSB -"x64" -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
CALL :SEL_INDEX_RNG_

SET _OS_TTL_=WINDOWS 10 22H2 64-BIT
SET _VERISO_=Win10_22H2_English_x64
SET _FLDRNM_=Win_10_64
SET _PTH_NM_=W10_x64
SET _OSVRNM_=Win10
SET _OSPTCH_1_=22H2
SET _OSPTCH_2_=21H2
SET _SCRTCH_=AMD64
SET _ARCHNM_=x64
SET _ISORCH_=X64
SET _LINK_1_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows10.0-kb5035941-x64_ae10e283549475067d2e4085d76a2cc1b5cf51d8.msu
SET _LINK_2_=https://catalog.s.download.windowsupdate.com/d/msdownload/update/software/updt/2024/03/windows10.0-kb5036034-x64-ndp481_5e0992df3a17c080f7cc79ed317ee3d1605da25b.msu
SET _LNK1NM_=windows10.0-kb5035941-x64_ae10e283549475067d2e4085d76a2cc1b5cf51d8.msu
SET _LNK2NM_=windows10.0-kb5036034-x64-ndp481_5e0992df3a17c080f7cc79ed317ee3d1605da25b.msu
SET _CMNT_1_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5035941 10 22H2 x64 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _CMNT_2_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036034 10 22H2 x64 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _LINK_3_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2023/06/windows10.0-kb5027215-x64_45971faad5d92b3fe36347a915dd7144b7f3f0c0.msu
SET _LINK_4_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2023/05/windows10.0-kb5027122-x64-ndp48_b4a399e994cdaa75c9b9bd3771b8670c89e5f17b.msu
SET _LNK3NM_=windows10.0-kb5027215-x64_45971faad5d92b3fe36347a915dd7144b7f3f0c0.msu
SET _LNK4NM_=windows10.0-kb5027122-x64-ndp48_b4a399e994cdaa75c9b9bd3771b8670c89e5f17b.msu
SET _CMNT_3_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027215 10 LTSB x64 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _CMNT_4_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027537 10 LTSB x64 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
CALL :SEL_INDEX_RNG_

SET LST_MSS_UPDT_=1
SET _OS_TTL_=WINDOWS 10 22H2 ARM 64-BIT
SET _VERISO_=Win10_22H2_English_x64
SET _FLDRNM_=Win_10_64_ARM
SET _PTH_NM_=W10_x64_ARM
SET _OSVRNM_=Win10
SET _OSPTCH_1_=22H2
SET _OSPTCH_2_=21H2
SET _SCRTCH_=ARM64
SET _ARCHNM_=x64
SET _ISORCH_=X64
SET _LINK_1_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows10.0-kb5035941-arm64_b7cf1327853fbe79be60db5d72dbd25cb7e2ea0c.msu
SET _LINK_2_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows10.0-kb5036036-arm64-ndp48_568a52f4ee5c9ba837f6e676b1dbaecd289809bf.msu
SET _LNK1NM_=windows10.0-kb5035941-arm64_b7cf1327853fbe79be60db5d72dbd25cb7e2ea0c.msu
SET _LNK2NM_=windows10.0-kb5036036-arm64-ndp48_568a52f4ee5c9ba837f6e676b1dbaecd289809bf.msu
SET _CMNT_1_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5035941 10 22H2 "ARM64" -"GDR-DU" -"Dynamic" -"UUP"
SET _CMNT_2_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036036 10 22H2 "ARM64" -"GDR-DU" -"Dynamic" -"UUP"
SET _LINK_3_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2023/06/windows10.0-kb5027215-arm64_132b14243965f7f30959b7c2543cca572373faa7.msu
SET _LINK_4_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2023/05/windows10.0-kb5027122-arm64-ndp48_ce9d451b64831832791b0560d969aa7b96229151.msu
SET _LNK3NM_=windows10.0-kb5027215-arm64_132b14243965f7f30959b7c2543cca572373faa7.msu
SET _LNK4NM_=windows10.0-kb5027122-arm64-ndp48_ce9d451b64831832791b0560d969aa7b96229151.msu
SET _CMNT_3_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027215 10 LTSB "ARM64" -"GDR-DU" -"Dynamic" -"UUP"
SET _CMNT_4_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5027537 10 LTSB "ARM64" -"GDR-DU" -"Dynamic" -"UUP"
CALL :SEL_INDEX_RNG_

SET LST_MSS_UPDT_=0
SET _OS_TTL_=WINDOWS 11 23H2 64-BIT
SET _VERISO_=Win11_23H2_English_x64v2
SET _FLDRNM_=Win_11_64
SET _PTH_NM_=W11_x64
SET _OSVRNM_=Win11
SET _OSPTCH_1_=23H2
SET _SCRTCH_=AMD64
SET _ARCHNM_=x64
SET _ISORCH_=X64
SET _LINK_1_=https://catalog.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/396ddabf-b27a-451e-a898-31d0427a36f7/public/windows11.0-kb5035942-x64_3f37174fadabd9d29ffe92a92b3422557586f645.msu
SET _LINK_2_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows11.0-kb5036035-x64-ndp481_dafbc93db37227d7601e8c5b82002386f4bdc33f.msu
SET _LNK1NM_=windows11.0-kb5035942-x64_3f37174fadabd9d29ffe92a92b3422557586f645.msu
SET _LNK2NM_=windows11.0-kb5036035-x64-ndp481_dafbc93db37227d7601e8c5b82002386f4bdc33f.msu
SET _CMNT_1_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5035942 11 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
SET _CMNT_2_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036035 11 -"GDR-DU" -"Dynamic" -"ARM64" -"UUP"
CALL :SEL_INDEX_RNG_

SET LST_MSS_UPDT_=1
SET _OS_TTL_=WINDOWS 11 23H2 ARM 64-BIT
SET _VERISO_=Win11_23H2_English_x64v2
SET _FLDRNM_=Win_11_64_ARM
SET _PTH_NM_=W11_x64_ARM
SET _OSVRNM_=Win11
SET _OSPTCH_1_=23H2
SET _SCRTCH_=ARM64
SET _ARCHNM_=x64
SET _ISORCH_=X64
SET _LINK_1_=https://catalog.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/62ae3fb7-46cc-4385-8ae8-477175023ca1/public/windows11.0-kb5035942-arm64_474dccf5d9754dc625a6373318030776a723c6fc.msu
SET _LINK_2_=https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/updt/2024/03/windows11.0-kb5036035-arm64-ndp481_431273a296f3e6fc273c09fa0ffd58c6536abada.msu
SET _LNK1NM_=windows11.0-kb5035942-arm64_474dccf5d9754dc625a6373318030776a723c6fc.msu
SET _LNK2NM_=windows11.0-kb5036035-arm64-ndp481_431273a296f3e6fc273c09fa0ffd58c6536abada.msu
SET _CMNT_1_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5035942 11 -"x64" -"GDR-DU" -"Dynamic" -"UUP"
SET _CMNT_2_=REM https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036035 11 -"x64" -"GDR-DU" -"Dynamic" -"UUP"
CALL :SEL_INDEX_RNG_

GOTO LST_LNE_WIN_SRT_1_

:SEL_INDEX_RNG_

IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (IF %_OSVRNM_%==Win10 (((ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%)&(ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%)&(ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch\%_LNK3NM_%)&(ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%))>> "C:\Patches\Cleanup_Win_New_.txt") >nul 2>&1)
IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (IF %_OSVRNM_%==Win11 (((ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%)&(ECHO C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt)&(ECHO C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%))>> "C:\Patches\Cleanup_Win_New_.txt") >nul 2>&1)

ECHO ...SELECT ISO INDEX FOR [%_OS_TTL_%]:
ECHO [A] %_OSVRNM_% Home [B] %_OSVRNM_% Home N [C] %_OSVRNM_% Home Single Language [D] %_OSVRNM_% Education [E] %_OSVRNM_% Education N [F] %_OSVRNM_% Pro
ECHO [G] %_OSVRNM_% Pro N [H] %_OSVRNM_% Pro Education [I] %_OSVRNM_% Pro Education N [J] %_OSVRNM_% Pro for Workstations [K] %_OSVRNM_% Pro N for Workstations
:STRT_LNE_WIN_SRT_3_
CHOICE /C ABCDEFGHIJK /N /M "ENTER YOUR SELECTION [A-K]"
IF %ErrorLevel% EQU 255 GOTO STRT_LNE_WIN_SRT_3_
SET _VER_NM_=%ErrorLevel%
CALL :MAIN_PROC_WIN_SRT_
GOTO :EOF

:MAIN_PROC_WIN_SRT_
IF NOT EXIST "C:\Patches\%_OSVRNM_%" MKDIR "C:\Patches\%_OSVRNM_%"
ECHO Optional: Download All Dependencies And Updates For Offline Use> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (0.) -^> "C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++---------->> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (1.) -^> "C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (2.) -^> "C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++---------->> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO Optional: Only Necessary If You Want To Skip The Hassle Of Always Repeating The First 2 Steps>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (3.) -^> "C:\Patches\%_OSVRNM_%\MK_ISO_Pre_Patch_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO Optional Starting Point:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (4.) -^> "C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO NOTE: ISO Will Be Between 4-7GB If Run At Step #5 ( It Will Be Less Than 4GB When Run At Step #3 )>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x64 ECHO NOTE: ISO Will Be Between 6-8GB If Run At Step #5 ( It Will Be Less Than 6GB When Run At Step #3 )>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x64_ARM ECHO NOTE: ISO Will Be Between 6-8GB If Run At Step #5 ( It Will Be Less Than 6GB When Run At Step #3 )>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_OSVRNM_%==Win11 ECHO NOTE: ISO Will Be Between 6-8GB If Run At Step #5 ( It Will Be Less Than 6.15GB When Run At Step #3 )>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++---------->> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (5.) -^> "C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO NOTE: Run This Batch File To Create A Driver Backup For Use In Step #6: "C:\Patches\Batch_Files\Create_Driver_Backup.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (6.) -^> "C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (7.) -^> "C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO NOTE: Step #8 is Optional>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (8.) -^> "C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (9.) -^> "C:\Patches\%_OSVRNM_%\MK_ISO_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++---------->> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_OSVRNM_%==Win10 ECHO NOTE: The Following Section Cannot Be Used Without Installing The Windows PE Add-On For The Windows 10 ADK>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_OSVRNM_%==Win11 ECHO NOTE: The Following Section Cannot Be Used Without Installing The Windows PE Add-On For The Windows 11 ADK>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10A.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10B.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10C.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF NOT %_PTH_NM_%==W10_x86 ECHO NOTE: Option #10D Is Only Useful For Devices With 1GB Of Memory Or Less>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO NOTE: Options #10D / #10F Are Only Useful For Devices With 1GB Of Memory Or Less>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10D.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10E.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO:>> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt
IF %_PTH_NM_%==W10_x86 ECHO [  ] STARTED ^<-^> FINISHED [  ] ^<- (10F.) -^> "C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat">> C:\Patches\%_OSVRNM_%\CheckList_%_PTH_NM_%.txt

IF EXIST "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" GOTO SKP_LBL_FIXED_PRFL

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO SETLOCAL>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO CD /D "%%~dp0">> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /S 381b4222-f694-41f0-9685-ff5bb260df2e^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 0012ee47-9041-4b5d-9b77-535fba8b1442 6738e2c4-e8a5-4a42-b16a-e040e769756e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 0012ee47-9041-4b5d-9b77-535fba8b1442 6738e2c4-e8a5-4a42-b16a-e040e769756e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 02f815b5-a5cf-4c84-bf20-649d1f75d3d8 4c793e7d-a264-42e1-87d3-7a0d2f523ccd 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 02f815b5-a5cf-4c84-bf20-649d1f75d3d8 4c793e7d-a264-42e1-87d3-7a0d2f523ccd 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 0d7dbae2-4294-402a-ba8e-26777e8488cd 309dce9b-bef4-4119-9921-a851fb12f0f4 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 0d7dbae2-4294-402a-ba8e-26777e8488cd 309dce9b-bef4-4119-9921-a851fb12f0f4 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 19cbb8fa-5279-450e-9fac-8a3d5fedd0c1 12bbebe6-58d6-4636-95bb-3217ef867c1a 3^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 19cbb8fa-5279-450e-9fac-8a3d5fedd0c1 12bbebe6-58d6-4636-95bb-3217ef867c1a 3^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 29f6c1db-86da-48c5-9fdb-f2b67b1f44da 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 29f6c1db-86da-48c5-9fdb-f2b67b1f44da 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 94ac6d29-73ce-41a6-809f-6363ba21b47e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 94ac6d29-73ce-41a6-809f-6363ba21b47e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 9d7815a6-7ee4-497e-8888-515a05f02364 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 9d7815a6-7ee4-497e-8888-515a05f02364 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 bd3b718a-0680-4d9d-8ab2-e1d2b4ac806d 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 238c9fa8-0aad-41ed-83f4-97be242c8f20 bd3b718a-0680-4d9d-8ab2-e1d2b4ac806d 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 2a737441-1930-4402-8d77-b2bebba308a3 48e6b7a6-50f5-4782-a5d4-53bb8f07e226 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 2a737441-1930-4402-8d77-b2bebba308a3 48e6b7a6-50f5-4782-a5d4-53bb8f07e226 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 44f3beca-a7c0-460e-9df2-bb8b99e0cba6 3619c3f2-afb2-4afc-b0e9-e7fef372de36 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 44f3beca-a7c0-460e-9df2-bb8b99e0cba6 3619c3f2-afb2-4afc-b0e9-e7fef372de36 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 a7066653-8d6c-40a8-910e-a1f54b84c7e5 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 a7066653-8d6c-40a8-910e-a1f54b84c7e5 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 501a4d13-42af-4429-9fd1-a8218c268e20 ee12f906-d277-404b-b6da-e5fa1a576df5 2^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 501a4d13-42af-4429-9fd1-a8218c268e20 ee12f906-d277-404b-b6da-e5fa1a576df5 2^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 54533251-82be-4824-96c1-47b60b740d00 893dee8e-2bef-41e0-89c6-b55d0929964c 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 54533251-82be-4824-96c1-47b60b740d00 893dee8e-2bef-41e0-89c6-b55d0929964c 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 54533251-82be-4824-96c1-47b60b740d00 bc5038f7-23e0-4960-96da-33abaf5935ec 85^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 54533251-82be-4824-96c1-47b60b740d00 bc5038f7-23e0-4960-96da-33abaf5935ec 85^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 3c0bc021-c8a8-4e07-a973-6b14cbcb2b7e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 3c0bc021-c8a8-4e07-a973-6b14cbcb2b7e 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 aded5e82-b909-4619-9949-f5d71dac0bcb 75^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 aded5e82-b909-4619-9949-f5d71dac0bcb 75^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 f1fbfde2-a960-4165-9f88-50667911ce96 50^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 f1fbfde2-a960-4165-9f88-50667911ce96 50^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 fbd9aa66-9553-4097-ba44-ed6e9d65eab8 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 7516b95f-f776-4464-8c53-06167f40cc99 fbd9aa66-9553-4097-ba44-ed6e9d65eab8 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 03680956-93bc-4294-bba6-4e0f09bb717f 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 03680956-93bc-4294-bba6-4e0f09bb717f 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 10778347-1370-4ee0-8bbd-33bdacaade49 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 10778347-1370-4ee0-8bbd-33bdacaade49 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 34c7b99f-9a6d-4b3c-8dc7-b6693b78cef4 2^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e 9596fb26-9850-41fd-ac3e-f7c3c00afd4b 34c7b99f-9a6d-4b3c-8dc7-b6693b78cef4 2^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 5dbb7c9f-38e9-40d2-9749-4f8a0e9f640f 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 5dbb7c9f-38e9-40d2-9749-4f8a0e9f640f 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 637ea02f-bbcb-4015-8e2c-a1c7b9c0b546 3^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 637ea02f-bbcb-4015-8e2c-a1c7b9c0b546 3^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 8183ba9a-e910-48da-8769-14ae6dc1170a 10^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 8183ba9a-e910-48da-8769-14ae6dc1170a 10^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 9a66d8d7-4ff7-4ef9-b5a2-5a326ca2a469 5^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f 9a66d8d7-4ff7-4ef9-b5a2-5a326ca2a469 5^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f bcded951-187b-4d05-bccc-f7e51960c258 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f bcded951-187b-4d05-bccc-f7e51960c258 1^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f d8742dcb-3e6a-4b3c-b3fe-374623cdcf06 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f d8742dcb-3e6a-4b3c-b3fe-374623cdcf06 0^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETACVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f f3c5027d-cd16-4930-aa6b-90db844a8f00 7^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(POWERCFG /SETDCVALUEINDEX 381b4222-f694-41f0-9685-ff5bb260df2e e73a048d-bf27-4f12-9731-8b2076e8891f f3c5027d-cd16-4930-aa6b-90db844a8f00 7^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ^(IF EXIST Profile_Power_Setup.bat DEL /Q Profile_Power_Setup.bat^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
REM ECHO ^(IF EXIST Startnet.cmd DEL /Q Startnet.cmd^) 2^> nul>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt
ECHO ENDLOCAL>> C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt

IF %_OSVRNM_%==Win10 ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO SETLOCAL>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO DEL /Q "C:\Patches\Win10\WinPE_10_Log.txt" 2^> nul>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\Download_Dependencies_Updates_Win10.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_ARM_Patch_Add_Cmdlets.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_ARM.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_ARM_Low_Memory.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_Patch_Add_Cmdlets.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_Low_Memory.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_Patch_Add_Cmdlets.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_Low_Memory.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_ARM.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_ARM_Low_Memory.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x86_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_ARM_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win10\WinPE_W10_x64_ARM_Patch_MK_ISO.bat^>^> "C:\Patches\Win10\WinPE_10_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO REM NOTE: If there are any failures, you will have to check the log file, run DISM to close any open handles for unused mount points, and manually unmount the image while discarding any changes>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO REM 1.^) DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO REM 2.^) DISM /Unmount-Image /MountDir:^<Insert_Mount_Path_Here^> /Discard>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO ENDLOCAL>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat
IF %_OSVRNM_%==Win10 ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_10_All.bat

IF %_OSVRNM_%==Win11 ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO SETLOCAL>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO DEL /Q "C:\Patches\Win11\WinPE_11_Log.txt" 2^> nul>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\Download_Dependencies_Updates_Win11.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_Patch_Add_Cmdlets.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_Low_Memory.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_ARM_Patch_Add_Cmdlets.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_ARM.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_ARM_Low_Memory.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_Patch_MK_ISO.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_Patch_MK_ISO.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_ARM_Patch_MK_ISO.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Win11\WinPE_W11_x64_ARM_Patch_MK_ISO.bat^>^> "C:\Patches\Win11\WinPE_11_Log.txt" 2^>^&^1>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO REM NOTE: If there are any failures, you will have to check the log file, run DISM to close any open handles for unused mount points, and manually unmount the image while discarding any changes>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO REM 1.^) DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO REM 2.^) DISM /Unmount-Image /MountDir:^<Insert_Mount_Path_Here^> /Discard>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO ENDLOCAL>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat
IF %_OSVRNM_%==Win11 ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\MKISO_WinPE_11_All.bat

:SKP_LBL_FIXED_PRFL

IF EXIST "C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat" GOTO SKP_LBL_MSS_UPDTE_
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat

ECHO IF NOT EXIST "C:\Patches\ETag_Cache\%_OSVRNM_%" MKDIR "C:\Patches\ETag_Cache\%_OSVRNM_%">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP" MKDIR "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
ECHO curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/5/C/85C25433-A1B0-4FFA-9429-7E023E7DA8D8/SetObjectSecurity.zip" --etag-compare "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" --etag-save "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" -o "C:\Patches\SetObjectSecurity.zip" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.sysinternals.com/files/SDelete.zip" --etag-compare "C:\Patches\ETag_Cache\SDelete.zip.txt" --etag-save "C:\Patches\ETag_Cache\SDelete.zip.txt" -o "C:\Patches\SDelete.zip" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
:SKP_LBL_MSS_UPDTE_

IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_1_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_2_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_3_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch\%_LNK3NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 IF %LST_MSS_UPDT_% EQU 0 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_4_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win10 IF %LST_MSS_UPDT_% EQU 1 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_4_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat

IF %_OSVRNM_%==Win11 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_1_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win11 IF %LST_MSS_UPDT_% EQU 0 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_2_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %_OSVRNM_%==Win11 IF %LST_MSS_UPDT_% EQU 1 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_2_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat

IF %LST_MSS_UPDT_% EQU 1 ECHO tar -xf "C:\Patches\SetObjectSecurity.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %LST_MSS_UPDT_% EQU 1 ECHO tar -xf "C:\Patches\SDelete.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat
IF %LST_MSS_UPDT_% EQU 1 ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Download_Dependencies_Updates_%_OSVRNM_%.bat

IF NOT %_PTH_NM_%==W10_x86 GOTO SKP_SRT_ARM_LBL_
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\ARM" GOTO LST_WinPE_%_PTH_NM_%_ARM_Low_Memory_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO IF EXIST "C:\WinPE_%_PTH_NM_%_ARM_PS" RMDIR /S /Q "C:\WinPE_%_PTH_NM_%_ARM_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\DANDIS~1.BAT>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\copype.cmd ARM "C:\WinPE_%_PTH_NM_%_ARM_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Set-ScratchSpace:32 /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\lp.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Fonts-Legacy.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-NetFx.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-NetFx_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Scripting.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Scripting_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PowerShell.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PowerShell_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-StorageWMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-StorageWMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-DismCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-DismCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureBootCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureStartup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PlatformId.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Dot3Svc.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Dot3Svc_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-EnhancedStorage.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\ARM" GOTO LST_WinPE_WinPE_%_PTH_NM_%_ARM_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF EXIST "C:\WinPE_%_PTH_NM_%_ARM_PS" RMDIR /S /Q "C:\WinPE_%_PTH_NM_%_ARM_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\DANDIS~1.BAT>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\copype.cmd ARM "C:\WinPE_%_PTH_NM_%_ARM_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Set-ScratchSpace:512 /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\lp.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Fonts-Legacy.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-WinRE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-JA-JP.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-KO-KR.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-CN.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-HK.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-TW.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-NetFx.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-NetFx_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Scripting.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Scripting_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PowerShell.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PowerShell_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-StorageWMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-StorageWMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-DismCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-DismCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureBootCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureStartup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PlatformId.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WinReCfg.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WinReCfg_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PPPoE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PPPoE_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-RNDIS.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-RNDIS_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-HTA.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-HTA_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Dot3Svc.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Dot3Svc_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-EnhancedStorage.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FMAPI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WDS-Tools.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WDS-Tools_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Client.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Client_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Server.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Server_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-LegacySetup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-LegacySetup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-MDAC.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-MDAC_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\windows\system32\Startnet.cmd">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\windows\system32\Startnet.cmd">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Image:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /Optimize-Image /Boot>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim" /SourceIndex:1 /DestinationImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO COPY "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim" "C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim" /SourceIndex:1 /DestinationImageFile:"C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO COPY "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim" "C:\WinPE_%_PTH_NM_%_ARM_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_ARM_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM NOTE: The following can only be run from the "Deployment and Imaging Tools Environment" Command Prompt:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO REM NOTE: Choose one or the other below, pick whatever output directory and name works:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO REM NOTE: The following can only be run from the "Deployment and Imaging Tools Environment" Command Prompt:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM NOTE: Choose one or the other below, pick whatever output directory and name works:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM MakeWinPEMedia /ISO C:\WinPE_%_PTH_NM_%_ARM_PS C:\ISO\WinPE_%_PTH_NM_%_ARM_Low_Memory.iso>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO REM MakeWinPEMedia /ISO C:\WinPE_%_PTH_NM_%_ARM_PS C:\ISO\WinPE_%_PTH_NM_%_ARM.iso>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO REM MakeWinPEMedia /UFD C:\WinPE_%_PTH_NM_%_ARM_PS D:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO REM MakeWinPEMedia /UFD C:\WinPE_%_PTH_NM_%_ARM_PS D:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_ARM -pEF -b"C:\WinPE_%_PTH_NM_%_ARM_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_ARM_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_ARM_Low_Memory.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_ARM -pEF -b"C:\WinPE_%_PTH_NM_%_ARM_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_ARM_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_ARM.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO :LST_WinPE_%_PTH_NM_%_ARM_Low_Memory_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO :LST_WinPE_WinPE_%_PTH_NM_%_ARM_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM_Low_Memory.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_ARM.bat
:SKP_SRT_ARM_LBL_
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%" GOTO LST_WinPE_%_PTH_NM_%_Low_Memory_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO IF EXIST "C:\WinPE_%_PTH_NM_%_PS" RMDIR /S /Q "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\DANDIS~1.BAT>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\copype.cmd %_SCRTCH_% "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Set-ScratchSpace:32 /Image:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\lp.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Fonts-Legacy.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-NetFx.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-NetFx_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Scripting.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Scripting_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PowerShell.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PowerShell_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-StorageWMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-StorageWMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-DismCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-DismCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureBootCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureStartup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PlatformId.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Dot3Svc.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Dot3Svc_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-EnhancedStorage.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%" GOTO LST_WinPE_WinPE_%_PTH_NM_%_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF EXIST "C:\WinPE_%_PTH_NM_%_PS" RMDIR /S /Q "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\DANDIS~1.BAT>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\copype.cmd %_SCRTCH_% "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Set-ScratchSpace:512 /Image:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\lp.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Fonts-Legacy.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-WinRE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-JA-JP.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-KO-KR.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-CN.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-HK.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-TW.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-NetFx.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-NetFx_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Scripting.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Scripting_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PowerShell.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PowerShell_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-StorageWMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-StorageWMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-DismCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-DismCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureBootCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureStartup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PlatformId.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WinReCfg.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WinReCfg_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PPPoE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PPPoE_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-RNDIS.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-RNDIS_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-HTA.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-HTA_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Dot3Svc.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Dot3Svc_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-EnhancedStorage.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FMAPI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WDS-Tools.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WDS-Tools_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Client.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Client_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Server.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Server_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-LegacySetup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-LegacySetup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-MDAC.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-MDAC_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%" GOTO LST_WinPE_%_PTH_NM_%_Patch_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF EXIST "C:\WinPE_%_PTH_NM_%_PS" RMDIR /S /Q "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\DANDIS~1.BAT>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO CALL C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\copype.cmd %_SCRTCH_% "C:\WinPE_%_PTH_NM_%_PS">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Set-ScratchSpace:512 /Image:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\lp.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Fonts-Legacy.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-WinRE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-JA-JP.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-KO-KR.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-CN.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-HK.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FontSupport-ZH-TW.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-NetFx.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-NetFx_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Scripting.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Scripting_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PowerShell.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PowerShell_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-StorageWMI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-StorageWMI_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-DismCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-DismCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureBootCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-SecureStartup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-SecureStartup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PlatformId.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WinReCfg.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WinReCfg_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PPPoE.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PPPoE_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-RNDIS.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-RNDIS_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-HTA.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-HTA_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Dot3Svc.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Dot3Svc_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-EnhancedStorage.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-EnhancedStorage_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-FMAPI.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-PmemCmdlets.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO IF EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab" DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-PmemCmdlets_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-WDS-Tools.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-WDS-Tools_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Client.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Client_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-Setup-Server.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-Setup-Server_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-LegacySetup.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO REM DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-LegacySetup_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\WinPE-MDAC.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Add-Package /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /PackagePath:"C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%\WinPE_OCs\en-us\WinPE-MDAC_en-us.cab">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO IF NOT EXIST "C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\WINDOW~2\%_SCRTCH_%" GOTO LST_WinPE_%_PTH_NM_%_Patch_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO IF EXIST "C:\Scratch_WinPE" RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO DISM /Mount-Image /ImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /Index:1 /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO IF NOT EXIST "C:\Scratch_WinPE" MKDIR "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat

IF %_OSVRNM_%==Win10 ECHO DISM /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /Add-Package /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch\%_LNK3NM_%" /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat

IF %_OSVRNM_%==Win11 ECHO DISM /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /Add-Package /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat

ECHO DISM /Cleanup-Image /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO DISM /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /Optimize-Image /Boot>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat

IF %_SCRTCH_%==x86 ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
IF %_SCRTCH_%==AMD64 ECHO COPY "C:\Patches\TMP\sdelete64.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
IF %_SCRTCH_%==ARM64 ECHO COPY "C:\Patches\TMP\sdelete64a.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
IF %_SCRTCH_%==x86 ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
IF %_SCRTCH_%==AMD64 ECHO COPY "C:\Patches\TMP\sdelete64.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
IF %_SCRTCH_%==ARM64 ECHO COPY "C:\Patches\TMP\sdelete64a.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
IF %_SCRTCH_%==x86 ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
IF %_SCRTCH_%==AMD64 ECHO COPY "C:\Patches\TMP\sdelete64.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
IF %_SCRTCH_%==ARM64 ECHO COPY "C:\Patches\TMP\sdelete64a.exe" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32\Startnet.cmd">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32\Startnet.cmd">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\WinPE_%_PTH_NM_%_PS\mount\windows\system32\Startnet.cmd">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Image:"C:\WinPE_%_PTH_NM_%_PS\mount" /ScratchDir:"C:\Scratch_WinPE" /Optimize-Image /Boot>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /SourceIndex:1 /DestinationImageFile:"C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO COPY "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim" "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /SourceIndex:1 /DestinationImageFile:"C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO COPY "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim" "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\WinPE_%_PTH_NM_%_PS\mount" /Commit>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO RMDIR /S /Q "C:\Scratch_WinPE">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim" /SourceIndex:1 /DestinationImageFile:"C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO COPY "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim" "C:\WinPE_%_PTH_NM_%_PS\media\sources\boot.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO DEL "C:\WinPE_%_PTH_NM_%_PS\mount\boot2.wim">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO :LST_WinPE_%_PTH_NM_%_Patch_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_Add_Cmdlets.bat

ECHO REM NOTE: The following can only be run from the "Deployment and Imaging Tools Environment" Command Prompt:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO REM NOTE: Choose one or the other below, pick whatever output directory and name works:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO REM NOTE: The following can only be run from the "Deployment and Imaging Tools Environment" Command Prompt:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM NOTE: Choose one or the other below, pick whatever output directory and name works:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM NOTE: The following can only be run from the "Deployment and Imaging Tools Environment" Command Prompt:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO REM NOTE: Choose one or the other below, pick whatever output directory and name works:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO REM MakeWinPEMedia /ISO C:\WinPE_%_PTH_NM_%_PS C:\ISO\WinPE_%_PTH_NM_%_Low_Memory.iso>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO REM MakeWinPEMedia /ISO C:\WinPE_%_PTH_NM_%_PS C:\ISO\WinPE_%_PTH_NM_%.iso>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM MakeWinPEMedia /ISO C:\WinPE_%_PTH_NM_%_PS C:\ISO\WinPE_%_PTH_NM_%_Patch.iso>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO REM MakeWinPEMedia /UFD C:\WinPE_%_PTH_NM_%_PS D:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO REM MakeWinPEMedia /UFD C:\WinPE_%_PTH_NM_%_PS D:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO REM MakeWinPEMedia /UFD C:\WinPE_%_PTH_NM_%_PS D:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
IF NOT %_SCRTCH_%==ARM64 GOTO SKP_WINPE_LBL_ISOIMG_1_
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_ARM64 -pEF -b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_Low_Memory.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_ARM64 -pEF -b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_ARM64 -pEF -b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_Patch.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
GOTO SKP_WINPE_LBL_ISOIMG_2_
:SKP_WINPE_LBL_ISOIMG_1_
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_%_ISORCH_% -bootdata:2#p0,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\etfsboot.com"#pEF,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_Low_Memory.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_%_ISORCH_% -bootdata:2#p0,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\etfsboot.com"#pEF,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lWIN_PE_%_ISORCH_% -bootdata:2#p0,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\etfsboot.com"#pEF,e,b"C:\WinPE_%_PTH_NM_%_PS\fwfiles\efisys.bin" "C:\WinPE_%_PTH_NM_%_PS\media" "C:\ISO\WinPE_%_PTH_NM_%_Patch.iso">> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO:>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
:SKP_WINPE_LBL_ISOIMG_2_
ECHO :LST_WinPE_%_PTH_NM_%_Low_Memory_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO :LST_WinPE_WinPE_%_PTH_NM_%_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO :LST_WinPE_%_PTH_NM_%_Patch_PS_LBL>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Low_Memory.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\WinPE_%_PTH_NM_%_Patch_MK_ISO.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_Win" MKDIR "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Mount" MKDIR "C:\Mount">> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\%_FLDRNM_%\sources\install.wim" /Index:%_VER_NM_% /MountDir:"C:\Mount">> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Add-Driver /Driver:"C:\DISM_Drivers" /Recurse>> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Image /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\Mount" /Commit>> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Add_Drivers_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_Win" MKDIR "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Mount" MKDIR "C:\Mount">> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\%_FLDRNM_%\sources\install.wim" /Index:%_VER_NM_% /MountDir:"C:\Mount">> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Enable-Feature /All /FeatureName:NetFx3 /Source:C:\%_FLDRNM_%\sources\sxs>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Enable-Feature /All /FeatureName:Microsoft-Windows-Subsystem-Linux>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Enable-Feature /All /FeatureName:VirtualMachinePlatform>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Enable-Feature /All /FeatureName:HypervisorPlatform>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\Mount" /Commit>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Enable_Features_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO MOUNTVOL /R>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF EXIST "C:\%_FLDRNM_%" RMDIR /S /Q "C:\%_FLDRNM_%">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF EXIST "C:\Scratch_Win" RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF EXIST "C:\Mount" RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\ETag_Cache\%_OSVRNM_%" MKDIR "C:\Patches\ETag_Cache\%_OSVRNM_%">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP" MKDIR "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\%_FLDRNM_%" MKDIR "C:\%_FLDRNM_%">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO IF [%%1]==[] GOTO STRT_SKP_DL_LBL_1_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF %%1==BYPASS GOTO STRT_SKP_DL_LBL_2_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO :STRT_SKP_DL_LBL_1_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO CHOICE /C YN /N /M "...DOWNLOAD PATCHES / DEPENDENCIES <- [Y/N] TO PROCEED?">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF %%ErrorLevel%% EQU 2 GOTO SKP_DL_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_1_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_2_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_3_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch\%_LNK3NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_4_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/5/C/85C25433-A1B0-4FFA-9429-7E023E7DA8D8/SetObjectSecurity.zip" --etag-compare "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" --etag-save "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" -o "C:\Patches\SetObjectSecurity.zip" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.sysinternals.com/files/SDelete.zip" --etag-compare "C:\Patches\ETag_Cache\SDelete.zip.txt" --etag-save "C:\Patches\ETag_Cache\SDelete.zip.txt" -o "C:\Patches\SDelete.zip">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO :STRT_SKP_DL_LBL_2_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO tar -xf "C:\Patches\SetObjectSecurity.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO tar -xf "C:\Patches\SDelete.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO GOTO MID_SKP_LBL>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO :SKP_DL_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO ECHO DOWNLOAD SKIPPED...>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO :MID_SKP_LBL>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\SetObjectSecurity.zip" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\SDelete.zip" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP\sdelete*.exe" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP\SetObjectSecurity_10\SetObjectSecurity.exe" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\ISO\%_VERISO_%.iso" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Mount-DiskImage -ImagePath 'C:\ISO\%_VERISO_%_Pre_Patch.iso'}">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path 'C:\Patches\TMP\Fldr_ISO_Nm_Pr_Ptch.txt' -value (Get-Volume -FileSystemLabel CCCOMA_%_ISORCH_%FRE_EN-US_DV9 | Format-Table DriveLetter -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'DriveLetter', '-----------' -NotMatch)}">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO FOR /F "tokens=* delims= " %%%%A IN (C:\Patches\TMP\Fldr_ISO_Nm_Pr_Ptch.txt) DO (XCOPY "%%%%A:\*.*" "C:\%_FLDRNM_%\" /E /C /I /Q /G /H /R /Y /B /J)>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Dismount-DiskImage -ImagePath 'C:\ISO\%_VERISO_%_Pre_Patch.iso'}">> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO DEL /Q C:\Patches\TMP\Fldr_ISO_Nm_Pr_Ptch.txt>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO GOTO SKP_ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO :ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO ECHO ...ISO / PATCHES / DEPENDENCIES MISSING ( DOWNLOAD %_OS_TTL_% ISO IMAGE TO "C:\ISO" FOLDER AND RUN "Initial_%_PTH_NM_%.bat" )>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO PAUSE>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO :SKP_ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Initial_Pre_Patch_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO MOUNTVOL /R>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF EXIST "C:\%_FLDRNM_%" RMDIR /S /Q "C:\%_FLDRNM_%">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF EXIST "C:\Scratch_Win" RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF EXIST "C:\Mount" RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP" MKDIR "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\ETag_Cache\%_OSVRNM_%" MKDIR "C:\Patches\ETag_Cache\%_OSVRNM_%">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP" MKDIR "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\%_FLDRNM_%" MKDIR "C:\%_FLDRNM_%">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO IF [%%1]==[] GOTO STRT_SKP_DL_LBL_1_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF %%1==BYPASS GOTO STRT_SKP_DL_LBL_2_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO :STRT_SKP_DL_LBL_1_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO CHOICE /C YN /N /M "...DOWNLOAD PATCHES / DEPENDENCIES <- [Y/N] TO PROCEED?">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF %%ErrorLevel%% EQU 2 GOTO SKP_DL_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_1_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK1NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_2_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK2NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_3_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK3NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\Patch\%_LNK3NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
IF %_OSVRNM_%==Win10 ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "%_LINK_4_%" --etag-compare "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" --etag-save "C:\Patches\ETag_Cache\%_OSVRNM_%\%_LNK4NM_%.txt" -o "C:\Patches\%_OSVRNM_%\%_OSPTCH_2_%\NDP\%_LNK4NM_%" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/5/C/85C25433-A1B0-4FFA-9429-7E023E7DA8D8/SetObjectSecurity.zip" --etag-compare "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" --etag-save "C:\Patches\ETag_Cache\SetObjectSecurity.zip.txt" -o "C:\Patches\SetObjectSecurity.zip" --next ^^>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO --parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.sysinternals.com/files/SDelete.zip" --etag-compare "C:\Patches\ETag_Cache\SDelete.zip.txt" --etag-save "C:\Patches\ETag_Cache\SDelete.zip.txt" -o "C:\Patches\SDelete.zip">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO :STRT_SKP_DL_LBL_2_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO tar -xf "C:\Patches\SetObjectSecurity.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO tar -xf "C:\Patches\SDelete.zip" -C "C:\Patches\TMP">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO GOTO MID_SKP_LBL>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO :SKP_DL_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO ECHO DOWNLOAD SKIPPED...>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO :MID_SKP_LBL>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\SetObjectSecurity.zip" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\SDelete.zip" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP\sdelete*.exe" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\TMP\SetObjectSecurity_10\SetObjectSecurity.exe" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\ISO\%_VERISO_%.iso" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%" GOTO ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Mount-DiskImage -ImagePath 'C:\ISO\%_VERISO_%.iso'}">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path 'C:\Patches\TMP\Fldr_ISO_Nm.txt' -value (Get-Volume -FileSystemLabel CCCOMA_%_ISORCH_%FRE_EN-US_DV9 | Format-Table DriveLetter -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'DriveLetter', '-----------' -NotMatch)}">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO FOR /F "tokens=* delims= " %%%%A IN (C:\Patches\TMP\Fldr_ISO_Nm.txt) DO (XCOPY "%%%%A:\*.*" "C:\%_FLDRNM_%\" /E /C /I /Q /G /H /R /Y /B /J)>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Dismount-DiskImage -ImagePath 'C:\ISO\%_VERISO_%.iso'}">> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO DEL /Q C:\Patches\TMP\Fldr_ISO_Nm.txt>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO GOTO SKP_ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO :ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO ECHO ...ISO / PATCHES / DEPENDENCIES MISSING ( DOWNLOAD %_OS_TTL_% ISO IMAGE TO "C:\ISO" FOLDER AND RUN "Initial_%_PTH_NM_%.bat" )>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO PAUSE>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO :SKP_ER_LBL_>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Initial_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_Win" MKDIR "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Mount" MKDIR "C:\Mount">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\%_FLDRNM_%\sources\install.wim" /Index:%_VER_NM_% /MountDir:"C:\Mount">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
IF %_ARCHNM_%==x86 ECHO COPY "C:\Patches\TMP\sdelete.exe" "C:\Mount\Windows\System32">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
IF %_ARCHNM_%==x64 ECHO COPY "C:\Patches\TMP\sdelete64.exe" "C:\Mount\Windows\System32">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO COPY "C:\Patches\TMP\SetObjectSecurity_10\SetObjectSecurity.exe" "C:\Mount\Windows\System32">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO COPY "C:\Patches\%_OSVRNM_%\Profile_Power_Setup.txt" "C:\Mount\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Profile_Power_Setup.bat">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO REM DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Optimize-Image /WimBoot>> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\Mount" /Commit>> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DISM /Export-Image /SourceImageFile:"C:\%_FLDRNM_%\sources\install.wim" /SourceIndex:1 /DestinationImageFile:"C:\%_FLDRNM_%\sources\install2.wim">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DEL "C:\%_FLDRNM_%\sources\install.wim">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO COPY "C:\%_FLDRNM_%\sources\install2.wim" "C:\%_FLDRNM_%\sources\install.wim">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO DEL "C:\%_FLDRNM_%\sources\install2.wim">> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Main_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\MK_ISO_Pre_Patch_%_PTH_NM_%.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lCCCOMA_%_ISORCH_%FRE_EN-US_DV9 -bootdata:2#p0,e,b"C:\%_FLDRNM_%\boot\etfsboot.com"#pEF,e,b"C:\%_FLDRNM_%\efi\microsoft\boot\efisys_noprompt.bin" "C:\%_FLDRNM_%" "C:\ISO\%_VERISO_%_Pre_Patch.iso">> C:\Patches\%_OSVRNM_%\MK_ISO_Pre_Patch_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\MK_ISO_Pre_Patch_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\MK_ISO_%_PTH_NM_%.bat
ECHO C:\PROGRA~2\WI3CF2~1\10\ASSESS~1\DEPLOY~1\amd64\Oscdimg\oscdimg.exe -m -o -u1 -udfver102 -lCCCOMA_%_ISORCH_%FRE_EN-US_DV9 -bootdata:2#p0,e,b"C:\%_FLDRNM_%\boot\etfsboot.com"#pEF,e,b"C:\%_FLDRNM_%\efi\microsoft\boot\efisys_noprompt.bin" "C:\%_FLDRNM_%" "C:\ISO\%_VERISO_%_Patch.iso">> C:\Patches\%_OSVRNM_%\MK_ISO_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\MK_ISO_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_Win" MKDIR "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Mount" MKDIR "C:\Mount">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO CD /D "C:\Patches\TMP\SetObjectSecurity_10">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\%_FLDRNM_%\sources\install.wim" /Index:%_VER_NM_% /MountDir:"C:\Mount">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG LOAD HKLM\WIN_10_11_SOFTWARE C:\Mount\Windows\System32\config\SOFTWARE>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG LOAD HKLM\WIN_10_11_SYSTEM C:\Mount\Windows\System32\config\SYSTEM>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG LOAD HKLM\WIN_10_11_HKU C:\Mount\Windows\System32\config\DEFAULT>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO SETLOCAL EnableDelayedExpansion>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[1]_="HKLM\WIN_10_11_SYSTEM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[2]_="HKLM\WIN_10_11_SOFTWARE">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[3]_="HKLM\WIN_10_11_SOFTWARE\Microsoft">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[4]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[5]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[6]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[7]_="HKLM\WIN_10_11_SYSTEM\ControlSet001">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[8]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[9]_="HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\MRT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[10]_="HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[11]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[12]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[13]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Command Processor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[14]_="HKLM\WIN_10_11_SYSTEM\Setup\MoSetup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[15]_="HKLM\WIN_10_11_SYSTEM\Setup\LabConfig">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[16]_="HKLM\WIN_10_11_SOFTWARE\Classes\Directory\ShellEx\ContextMenuHandlers\EPP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[17]_="HKLM\WIN_10_11_SOFTWARE\Classes\Drive\ShellEx\ContextMenuHandlers\EPP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[18]_="HKLM\WIN_10_11_SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[19]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Run">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[20]_="HKLM\WIN_10_11_SOFTWARE\Classes\CompressedFolder\CLSID">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[21]_="HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\.zip\CLSID">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[22]_="HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\image\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[23]_="HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\text\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[24]_="HKLM\WIN_10_11_SOFTWARE\Classes\batfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[25]_="HKLM\WIN_10_11_SOFTWARE\Classes\cmdfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[26]_="HKLM\WIN_10_11_SOFTWARE\Classes\docfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[27]_="HKLM\WIN_10_11_SOFTWARE\Classes\fonfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[28]_="HKLM\WIN_10_11_SOFTWARE\Classes\htmlfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[29]_="HKLM\WIN_10_11_SOFTWARE\Classes\inffile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[30]_="HKLM\WIN_10_11_SOFTWARE\Classes\inifile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[31]_="HKLM\WIN_10_11_SOFTWARE\Classes\JSEFile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[32]_="HKLM\WIN_10_11_SOFTWARE\Classes\JSFile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[33]_="HKLM\WIN_10_11_SOFTWARE\Classes\MSInfo.Document\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[34]_="HKLM\WIN_10_11_SOFTWARE\Classes\otffile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[35]_="HKLM\WIN_10_11_SOFTWARE\Classes\pfmfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[36]_="HKLM\WIN_10_11_SOFTWARE\Classes\regfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[37]_="HKLM\WIN_10_11_SOFTWARE\Classes\rtffile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[38]_="HKLM\WIN_10_11_SOFTWARE\Classes\ttcfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[39]_="HKLM\WIN_10_11_SOFTWARE\Classes\ttffile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[40]_="HKLM\WIN_10_11_SOFTWARE\Classes\txtfile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[41]_="HKLM\WIN_10_11_SOFTWARE\Classes\VBEFile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[42]_="HKLM\WIN_10_11_SOFTWARE\Classes\VBSFile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[43]_="HKLM\WIN_10_11_SOFTWARE\Classes\Wordpad.Document.1\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[44]_="HKLM\WIN_10_11_SOFTWARE\Classes\WPEDoc\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[45]_="HKLM\WIN_10_11_SOFTWARE\Classes\WPSDoc\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[46]_="HKLM\WIN_10_11_SOFTWARE\Classes\wrifile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[47]_="HKLM\WIN_10_11_SOFTWARE\Classes\WSFFile\shell\print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[48]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AxInstSV">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[49]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AJRouter">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[50]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AppReadiness">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[51]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Appinfo">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[52]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\ALG">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[53]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\tzautoupdate">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[54]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[55]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\bthserv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[56]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CertPropSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[57]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\KeyIso">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[58]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventSystem">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[59]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\COMSysApp">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[60]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Browser">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[61]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[62]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DiagTrack">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[63]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\VaultSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[64]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CryptSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[65]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DsSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[66]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DeviceAssociationService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[67]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DeviceInstall">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[68]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DmEnrollmentSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[69]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DsmSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[70]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DevQueryBroker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[71]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Dhcp">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[72]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MSDTC">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[73]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\dmwappushservice">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[74]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MapsBroker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[75]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EFS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[76]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EapHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[77]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\fdPHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[78]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\FDResPub">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[79]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lfsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[80]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\hidserv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[81]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\HvHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[82]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmickvpexchange">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[83]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicguestinterface">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[84]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicshutdown">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[85]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicheartbeat">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[86]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicvmsession">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[87]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicrdv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[88]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmictimesync">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[89]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vmicvss">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[90]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\IKEEXT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[91]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SharedAccess">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[92]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\iphlpsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[93]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PolicyAgent">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[94]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\KtmRm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[95]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lltdsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[96]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[97]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wlidsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[98]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MSiSCSI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[99]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\swprv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[100]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\smphost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[101]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\NetTcpPortSharing">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[102]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Netlogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[103]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\NcbService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[104]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Netman">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[105]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\NcaSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[106]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\netprofm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[107]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\NlaSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[108]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\NetSetupSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[109]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\nsi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[110]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\defragsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[111]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PerfHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[112]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\pla">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[113]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PhoneSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[114]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PlugPlay">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[115]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WPDBusEnum">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[116]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Power">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[117]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Spooler">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[118]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PrintNotify">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[119]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wercplsupport">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[120]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PcaSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[121]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\QWAVE">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[122]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RmSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[123]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RasAuto">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[124]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RasMan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[125]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SessionEnv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[126]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\TermService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[127]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UmRdpService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[128]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RpcLocator">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[129]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteRegistry">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[130]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteAccess">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[131]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\seclogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[132]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SstpSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[133]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SensorDataService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[134]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SensrSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[135]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SensorService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[136]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\LanmanServer">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[137]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\ShellHWDetection">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[138]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SCardSvr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[139]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\ScDeviceEnum">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[140]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SCPolicySvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[141]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SNMPTRAP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[142]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\svsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[143]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SSDPSRV">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[144]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WiaRpc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[145]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\StorSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[146]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\TieringEngineService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[147]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SysMain">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[148]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SENS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[149]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lmhosts">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[150]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\TapiSrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[151]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Themes">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[152]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UsoSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[153]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\upnphost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[154]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UserManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[155]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\ProfSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[156]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\vds">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[157]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\VSS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[158]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WalletService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[159]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Audiosrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[160]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AudioEndpointBuilder">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[161]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WbioSrvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[162]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\FrameServer">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[163]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Wcmsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[164]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WEPHOSTSVC">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[165]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Wecsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[166]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\FontCache">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[167]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\stisvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[168]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wisvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[169]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\LicenseManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[170]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Winmgmt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[171]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\icssvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[172]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[173]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinRM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[174]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WSearch">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[175]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\W32Time">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[176]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\dot3svc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[177]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wmiApSrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[178]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\LanmanWorkstation">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[179]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblAuthManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[180]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblGameSave">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[181]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BcastDVRUserService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[182]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BluetoothUserService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[183]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CaptureService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[184]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPUserSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[185]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DevicePickerUserSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[186]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DevicesFlowUserSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[187]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MessagingService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[188]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\OneSyncSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[189]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[190]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UnistoreSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[191]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UserDataSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[192]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnUserService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[193]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[194]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\FileSystem">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[195]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[196]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefusersvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[197]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wscsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[198]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\sedsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[199]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[200]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdate">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[201]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdate\TriggerInfo">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[202]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdate\TriggerInfo\0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[203]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdatem">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[204]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdatem\TriggerInfo">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[205]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdatem\TriggerInfo\0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[206]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[207]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WMPNetworkSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[208]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lmhosts">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[209]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpcMonSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[210]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[211]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc\Parameters">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[212]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[213]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\uhssvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[214]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[215]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS\Parameters">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[216]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS\Performance">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[217]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[218]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[219]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[220]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Application">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[221]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Application Error">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[222]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Application Hang">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[223]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Application-Addon-Event-Provider">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[224]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\CardSpace 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[225]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Chkdsk">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[226]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\COM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[227]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\COM+">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[228]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Desktop Window Manager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[229]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\DiskQuota">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[230]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Dwminit">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[231]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Error Instrument">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[232]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\ESENT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[233]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\EventSystem">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[234]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Folder Redirection">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[235]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AAD">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[236]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ApplicationExperienceInfrastructure">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[237]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AppModel-Runtime">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[238]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AppModel-State">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[239]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ASN1">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[240]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Audio">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[241]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Audit-CVE">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[242]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AxInstallService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[243]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Backup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[244]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CAPI2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[245]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[246]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-AutoEnrollment">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[247]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-CertEnroll">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[248]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-CredentialRoaming">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[249]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificationAuthorityClient-CertCli">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[250]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-COMRuntime">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[251]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-BCrypt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[252]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-CNG">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[253]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-DPAPI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[254]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-DSSEnh">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[255]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-NCrypt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[256]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-RNG">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[257]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-RSAEnh">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[258]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DeliveryOptimization">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[259]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DeviceGuard">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[260]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DirectShow-Core">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[261]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DirectShow-KernelSupport">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[262]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EapHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[263]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EFS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[264]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EventCollector">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[265]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Folder Redirection">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[266]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Immersive-Shell">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[267]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-KdsSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[268]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-LiveId">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[269]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PDH">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[270]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfDisk">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[271]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Perflib">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[272]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfNet">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[273]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfOS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[274]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfProc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[275]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ProcessExitMonitor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[276]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RemoteApp and Desktop Connections">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[277]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RemoteAssistance">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[278]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RestartManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[279]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RPC-Events">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[280]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Search">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[281]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-EnterpriseData-FileRevocationManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[282]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-Netlogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[283]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-SPP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[284]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SmartCard-DeviceEnum">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[285]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SoftwareRestrictionPolicies">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[286]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Spell-Checking">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[287]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SpellChecker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[288]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Spellchecking-Host">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[289]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-System-Restore">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[290]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-TerminalServices-ClientActiveXCore">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[291]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User Profiles General">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[292]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User Profiles Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[293]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User-Loader">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[294]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Video-For-Windows">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[295]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WBioSrvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[296]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WindowsSystemAssessmentTool">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[297]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Winsrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[298]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WMI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[299]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-XWizards">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[300]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft.Transactions.Bridge 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[301]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[302]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC 2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[303]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[304]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC Client 2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[305]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Process Exit Monitor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[306]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Profsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[307]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\SceCli">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[308]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\SceSrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[309]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\SecurityCenter">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[310]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\ServiceModel Audit 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[311]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\SideBySide">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[312]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Software Protection Platform Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[313]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\SpeechRuntime">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[314]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Standard TCP/IP Port">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[315]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\System.IdentityModel 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[316]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\System.IO.Log 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[317]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\System.Runtime.Serialization 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[318]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\System.ServiceModel 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[319]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\usbperf">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[320]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Userenv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[321]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\VBRuntime">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[322]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Windows Error Reporting">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[323]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Wininit">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[324]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Winlogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[325]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\WinMgmt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[326]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Wlclntfy">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[327]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\WMI.NET Provider Extension">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[328]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\Wow64 Emulation Layer">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[329]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Application\WSH">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[330]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\HardwareEvents">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[331]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Internet Explorer">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[332]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Key Management Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[333]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Key Management Service\KmsRequests">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[334]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Parameters">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[335]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[336]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\DS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[337]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\DS\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[338]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\LSA">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[339]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\LSA\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[340]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Microsoft-Windows-Eventlog">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[341]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Microsoft-Windows-Security-Auditing">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[342]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\SC Manager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[343]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\SC Manager\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[344]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[345]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Security\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[346]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Security Account Manager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[347]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Security Account Manager\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[348]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\ServiceModel 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[349]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Spooler">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[350]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\Spooler\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[351]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\TCP/IP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[352]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\TCP/IP\ObjectNames">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[353]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security\VSSAudit">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[354]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[355]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\3ware">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[356]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ACPI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[357]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ADP80XX">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[358]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AFD">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[359]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AMD Crash Defender Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[360]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AmdK8">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[361]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AmdPPM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[362]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\amdsata">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[363]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\amdsbs">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[364]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\amdxata">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[365]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AppleSSD">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[366]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Application Popup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[367]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\arcsas">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[368]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\AsyncMac">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[369]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\atapi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[370]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\b06bdrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[371]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BasicRender">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[372]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\beep">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[373]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BthEnum">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[374]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BthLEEnum">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[375]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BthMini">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[376]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BTHPORT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[377]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BTHUSB">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[378]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\BugCheck">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[379]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\cdrom">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[380]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\cht4iscsi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[381]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\cht4vbd">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[382]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\DCOM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[383]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\DfsSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[384]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Dhcp">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[385]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Dhcpv6">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[386]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\disk">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[387]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Display">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[388]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Dnsapi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[389]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Dnscache">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[390]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ebdrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[391]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ebdrv0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[392]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\EventLog">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[393]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\exFAT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[394]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\FltMgr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[395]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\fvevol">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[396]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\HidBth">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[397]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\hidi2c">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[398]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\hidspi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[399]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\HpSAMD">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[400]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Http">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[401]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\hvservice">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[402]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\i8042prt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[403]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\iaStorAVC">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[404]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\iaStorV">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[405]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ibbus">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[406]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS-GPIO">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[407]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS-I2C">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[408]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS2-GPIO2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[409]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS2-I2C">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[410]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\intelppm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[411]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\IPMGM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[412]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\IPMIDRV">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[413]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\IPNATHLP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[414]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\IPRouterManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[415]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\IPxlatCfg">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[416]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\isapnp">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[417]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\iScsiPrt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[418]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ItSas35i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[419]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\kbdclass">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[420]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\kbdhid">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[421]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\kdnic">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[422]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Lfsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[423]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\lltdio">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[424]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\LmHosts">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[425]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\LsaSrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[426]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[427]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS2i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[428]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS3i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[429]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\megasas2i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[430]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\megasas35i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[431]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\megasr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[432]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Audit-CVE">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[433]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-BitLocker-API">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[434]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-BitLocker-Driver">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[435]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Bits-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[436]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Bluetooth-BthLEPrepairing">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[437]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CoreSystem-InitMachineConfig">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[438]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CoreSystem-NetProvision-JoinProviderOnline">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[439]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CorruptedFileRecovery-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[440]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CorruptedFileRecovery-Server">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[441]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Devices-Background">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[442]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DfsSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[443]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Dhcp-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[444]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DHCPv6-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[445]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Diagnostics-Networking">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[446]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Directory-Services-SAM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[447]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DiskDiagnostic">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[448]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DistributedCOM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[449]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DNS-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[450]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DriverFrameworks-UserMode">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[451]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-EnhancedStorage-EhStorTcgDrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[452]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-EventCollector">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[453]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Eventlog">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[454]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-exFAT-SQM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[455]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FailoverClustering-Client">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[456]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Fat-SQM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[457]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Fault-Tolerant-Heap">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[458]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FilterManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[459]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Firewall">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[460]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FMS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[461]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FunctionDiscoveryHost">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[462]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-GPIO-ClassExtension">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[463]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-GroupPolicy">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[464]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HAL">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[465]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HttpEvent">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[466]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HttpService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[467]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Hyper-V-Hypervisor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[468]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Iphlpsvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[469]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Iphlpsvc-Trace">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[470]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-IsolatedUserMode">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[471]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Boot">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[472]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-General">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[473]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Interrupt-Steering">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[474]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-IO">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[475]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-PnP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[476]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Power">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[477]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Processor-Power">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[478]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Tm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[479]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-WHEA">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[480]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-XDV">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[481]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-LanguagePackSetup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[482]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Memory-Diagnostic-Task-Handler">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[483]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MemoryDiagnostics-Results">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[484]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MemoryDiagnostics-Schedule">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[485]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MountMgr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[486]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NDIS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[487]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NdisImPlatformSysEvtProvider">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[488]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Network-ExecutionContext">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[489]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NetworkBridge">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[490]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Ntfs">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[491]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Ntfs-UBPM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[492]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-OverlayFilter">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[493]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-PersistentMemory-Nvdimm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[494]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-PersistentMemory-PmemDisk">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[495]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Power-Meter-Polling">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[496]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Power-Troubleshooter">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[497]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ReFS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[498]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ReFS-v1">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[499]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ResetEng">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[500]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Resource-Exhaustion-Detector">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[501]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ResourcePublication">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[502]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SCPNP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[503]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Serial-ClassExtension">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[504]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Serial-ClassExtension-V2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[505]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Setup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[506]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SetupPlatform">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[507]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SPB-ClassExtension">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[508]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SPB-HIDI2C">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[509]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Spell-Checking">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[510]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SpellChecker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[511]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-StartupRepair">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[512]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Subsys-SMSS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[513]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TaskScheduler">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[514]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TerminalServices-LocalSessionManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[515]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TerminalServices-RemoteConnectionManager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[516]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Time-Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[517]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TPM-WMI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[518]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-CCID">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[519]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-MAUSBHOST">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[520]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USB4DeviceRouter-EventLogs">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[521]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USBHUB3">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[522]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USBXHCI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[523]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-UserModePowerService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[524]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-UserPnp">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[525]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WER-SystemErrorReporting">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[526]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WHEA-Logger">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[527]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Windows Firewall With Advanced Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[528]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WindowsToGo-StartupOptions">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[529]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WindowsUpdateClient">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[530]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Wininit">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[531]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Winlogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[532]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WLAN-AutoConfig">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[533]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WMPNSS-Service">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[534]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mlx4_bus">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[535]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mouclass">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[536]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mouhid">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[537]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mpi3drvi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[538]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\MsBridge">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[539]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mshidumdf">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[540]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\MSiSCSI">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[541]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\MTConfig">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[542]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Mup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[543]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\mvumis">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[544]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NdisImPlatform">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[545]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NdisImPlatformSysEvtProvider">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[546]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NdisWan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[547]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\ndiswanlegacy">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[548]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NetBIOS">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[549]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NetBT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[550]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\NetJoin">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[551]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Netlogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[552]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Ntfs">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[553]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\nvdimm">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[554]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\nvmedisk">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[555]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\nvstor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[556]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\P2PIMSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[557]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Parport">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[558]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\pcmcia">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[559]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\percsas2i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[560]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\percsas3i">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[561]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\pmem">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[562]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\PNPMEM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[563]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\PNRPSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[564]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Power">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[565]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\PptpMiniport">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[566]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Print">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[567]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\PrintFilterPipelineSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[568]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Processor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[569]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\pvscsi">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[570]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\RasAuto">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[571]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\RasCfg">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[572]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Rasman">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[573]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\RemoteAccess">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[574]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\RFCOMM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[575]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\rhproxy">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[576]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\rspndr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[577]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SAM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[578]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\sbp2port">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[579]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Schannel">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[580]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\scmbus">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[581]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\sercx">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[582]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\sercx2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[583]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Serial">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[584]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\sermouse">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[585]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Server">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[586]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Service Control Manager">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[587]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SiSRaid2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[588]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SiSRaid4">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[589]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SmartSAMD">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[590]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SMSvcHost 4.0.0.0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[591]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\SNMPTRAP">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[592]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\spaceport">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[593]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\spbcx">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[594]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Srv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[595]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\stexstor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[596]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\StillImage">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[597]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\storahci">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[598]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\stornvme">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[599]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\System">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[600]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Tcpip">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[601]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Tcpip6">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[602]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\TCPMon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[603]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\TPM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[604]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\tsusbflt">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[605]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\tunnel">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[606]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\UASPStor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[607]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\UmRdpService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[608]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\usbaudio2">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[609]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\usbehci">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[610]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\usbser">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[611]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\User32">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[612]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\volmgr">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[613]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Volsnap">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[614]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\vpci">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[615]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\vsmraid">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[616]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\VSTXRAID">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[617]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\W32Time">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[618]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WacomPen">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[619]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\wdf01000">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[620]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WinDefend">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[621]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Windows Disk Diagnostic">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[622]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\Windows Script Host">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[623]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WinHttpAutoProxySvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[624]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WinNat">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[625]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WinRM">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[626]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WMPNetworkSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[627]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\System\WPDClassInstaller">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[628]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Windows PowerShell">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[629]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[630]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[631]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmAgent">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[632]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmAgent\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[633]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[634]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker\TriggerInfo">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[635]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker\TriggerInfo\0">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[636]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisDrv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[637]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisDrv\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[638]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[639]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc\Parameters">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[640]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[641]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[642]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[643]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wuauserv">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[644]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wuauserv\Parameters">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[645]_="HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wuauserv\Security">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[646]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[647]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[648]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Media Sharing\UpdateLibrary">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[649]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[650]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\ProgramDataUpdater">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[651]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[652]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic\PerformRemediation">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[653]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[654]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore\SR">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[655]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitor">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[656]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitorToastTask">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[657]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefresh">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[658]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefreshTask">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[659]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\IndexerAutomaticMaintenance">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[660]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[661]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[662]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cleanup">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[663]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[664]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Verification">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[665]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[666]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Check And Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[667]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[668]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Scan for Crash Recovery">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[669]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[670]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[671]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[672]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\RestoreDevice">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[673]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\SmartRetry">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[674]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdates">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[675]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdatesAsUser">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[676]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[677]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[678]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Scheduled Start">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[679]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Automatic App Update">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[680]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Refresh Group Policy Cache">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[681]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihboot">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[682]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihpostreboot">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[683]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sih">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[684]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[685]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Retry Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[686]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[687]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[688]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[689]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[690]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Backup Scan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[691]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_AC">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[692]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_Battery">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[693]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[694]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[695]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[696]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Report policies">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[697]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[698]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[699]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Work">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[700]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Start Oobe Expedite Work">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[701]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[702]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_LicenseAccepted">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[703]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_OobeAppReady">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[704]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScanAfterUpdate">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[705]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UUS Failover Task">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[706]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maintenance\WinSAT">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[707]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Error Reporting\QueueReporting">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[708]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Diagnosis\Scheduled">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[709]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maps\MapsUpdateTask">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[710]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\Consolidator">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[711]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\rempl\shell">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[712]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[713]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskLogon">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[714]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskNetwork">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[715]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[716]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[717]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SET RGSRT_[718]_="HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\RemovalTools\MRT_ERROR_HB">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO FOR /L %%%%A IN (1,1,718) DO (SetObjectSecurity KEY ^^!RGSRT_[%%%%A]_^^! "O:BA" -q)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO FOR /L %%%%A IN (1,1,718) DO (SetObjectSecurity KEY ^^!RGSRT_[%%%%A]_^^! "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO SETLOCAL DisableDelayedExpansion>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows Kits\Installed Roots" /V "KitsRoot10" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\10\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows Kits\Installed Roots" /V "KitsRoot8.1" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\8.1\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows Kits\Installed Roots" /V "WindowsDebuggersRoot10" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\10\Debuggers\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\WOW6432Node\Microsoft\Windows Kits\Installed Roots" /V "KitsRoot10" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\10\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\WOW6432Node\Microsoft\Windows Kits\Installed Roots" /V "KitsRoot8.1" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\8.1\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO ^(REG ADD "HKLM\WIN_10_11_SOFTWARE\WOW6432Node\Microsoft\Windows Kits\Installed Roots" /V "WindowsDebuggersRoot10" /T REG_SZ /D "C:\Program Files (x86)\Windows Kits\10\Debuggers\\" /F^)>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\FindMyDevice /V AllowFindMyDevice /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\PreviewBuilds /V AllowBuildPreview /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Mail" /V ManualLaunchAllowed /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator /V NoActiveProbe /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Maps /V AllowUntriggeredNetworkTrafficOnSettingsPage /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat 
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\OneDrive /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\FindMyDevice\AllowFindMyDevice /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\PreviewBuilds /V AllowBuildPreview /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Mail" /V ManualLaunchAllowed /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator /V NoActiveProbe /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Maps /V AllowUntriggeredNetworkTrafficOnSettingsPage /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\OneDrive /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo /V Enabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo /V Enabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost /V EnableWebContentEvaluation /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors /V DisableLocation /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy /V HasAccepted /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\MicrosoftSpeech /V AllowSpeechModelUpdate /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Messaging /V AllowMessageSync /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\DataCollection /V DoNotShowFeedbackNotifications /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\DataCollection /V AllowTelemetry /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Siuf\Rules /V PeriodInNanoSeconds /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Siuf\Rules /V NumberOfSIUFInPeriod /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsConsumerFeatures /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\InputPersonalization /V AllowInputPersonalization /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitTextCollection /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitInkCollection /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /V EnableFeeds /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\StorageHealth /V AllowDiskHealthModelUpdates /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\SettingSync /V DisableSettingSync /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\SettingSync /V DisableSettingSyncUserOverride /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Messaging /V CloudServiceSyncEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\TCPIP\v6Transition /V Teredo_State /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V DefinitionUpdateFileSharesSources /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableCloudOptimizedContent /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\MicrosoftWindowsStore /V AutoDownload /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate /V AutoDownload /T REG_DWORD /D 00000005 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\DataCollection /V DisableOneSettingsDownloads /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSyncProviderNotifications /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackDocs /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackProgs /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V EnableFontProviders /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V EnableCdp /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V AllowAutoAcceptPairingAndPrivacyConsentPrompts /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V AllowCrossDeviceClipboard /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V EnableActivityFeed /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V AllowUserInfoAccess /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V PublishUserActivities /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V UploadUserActivities /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\System /V EnableSmartScreen /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /V DisableConfig /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\OOBE /V DisablePrivacyExperience /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableAntiSpyware /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender" /V ServiceKeepAlive /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /V ForceDefenderPassiveMode /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SpyNetReporting /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SubmitSamplesConsent /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Updates" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /V DisableRealtimeMonitoring /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /V DisableBehaviorMonitoring /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /V DisableRestorePoint /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V FallbackOrder /T REG_SZ /D FileShares /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V UpdateOnStartUp /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V DefinitionUpdateFileSharesSources /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /V DisableEnhancedNotifications /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /V ConfigureAppInstallControlEnabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /V ConfigureAppInstallControl /T REG_SZ /D "Anywhere" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\MRT /V DontReportInfectionInformation /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\MRT /V DontOfferThroughWUAU /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Explorer /V HideRecommendedPersonalizedSites /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCortana /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowSearchToUseLocation /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V DisableWebSearch /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWeb /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Mobility /V OptedIn /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\Explorer /V HideRecommendedPersonalizedSites /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\PCHC /V UpgradeEligibility /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSyncProviderNotifications /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackDocs /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackProgs /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-310093Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338387Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338393Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353694Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353696Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\UserProfileEngagement /V ScoobeSystemSettingEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableSoftLanding /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsConsumerFeatures /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableCloudOptimizedContent /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Policies\Microsoft\Windows\WindowsCopilot /V TurnOffWindowsCopilot /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings /V AutoOpenCopilotLargeScreens /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\SmartActionPlatform\SmartClipboard /V Disabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost /V EnableWebContentEvaluation /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_HKU\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy /V HasAccepted /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Siuf\Rules /V PeriodInNanoSeconds /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Siuf\Rules /V NumberOfSIUFInPeriod /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitTextCollection /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitInkCollection /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Messaging /V CloudServiceSyncEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsActivateWithVoice /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsActivateWithVoiceAboveLock /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\AccessChk /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Active Directory Explorer" /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\ADInsight /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\AdRestore /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Autologon /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Autoruns /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\BGInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\CacheSet /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\ClockRes /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Contig /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Coreinfo /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\CPUSTRES /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\DbgView /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Desktops /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Disk2Vhd /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\DiskExt /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Diskmon /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\DiskView /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Du /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\FindLinks /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Handle /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Hex2Dec /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Junction /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\ListDLLs /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\LiveKd /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\LoadOrder /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\LogonSessions /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Movefile /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\NotMyFault /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\nTestlimit /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\NTFSInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PendMove /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PipeList /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\ProcDump /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Process Explorer" /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Process Monitor" /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsExec /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsFile /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsGetSid /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsKill /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsList /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsLoggedon /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsLoglist /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsPasswd /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsPing /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsService /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsShutdown /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\PsSuspend /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\RamMap /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\RegDelNull /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Regsize /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\SDelete /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Share Enum" /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\sigcheck /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Streams /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Strings /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Sync /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\TCPView /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\VMMap /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\VolumeID /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\Whois /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\WinObj /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_HKU\SOFTWARE\Sysinternals\ZoomIt /V EulaAccepted /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client" /V DisabledByDefault /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client" /V Enabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server" /V DisabledByDefault /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server" /V Enabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client" /V DisabledByDefault /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client" /V Enabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server" /V DisabledByDefault /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server" /V Enabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableHttp2Tls /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableHttp3 /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableAltSvc /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\SmartActionPlatform\SmartClipboard /V Disabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V DisableCachingOfSSLPages /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V EnableNegotiate /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V ProxyEnable /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V MigrateProxy /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V WarnonZoneCrossing /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V SyncMode5 /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery /V DisableSearchBoxSuggestions /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\PCHC /V UpgradeEligibility /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\MoSetup /V AllowUpgradesWithUnsupportedTPMOrCPU /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassCPUCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassDiskCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassRAMCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassSecureBootCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassStorageCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\Setup\LabConfig /V BypassTPMCheck /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Mobility /V OptedIn /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\WindowsUpdate\UX\Settings /V IsContinuousInnovationOptedIn /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /T REG_SZ /D "0" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 2 /T REG_SZ /D "time.windows.com" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 1 /T REG_SZ /D "time.nist.gov" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 0 /T REG_SZ /D "time.cloudflare.com" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-310093Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338387Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338393Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353694Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353696Enabled" /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableSoftLanding /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\UserProfileEngagement /V ScoobeSystemSettingEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\CI\Policy /V VerifiedAndReputablePolicyState /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Policies\Microsoft\Windows\WindowsCopilot /V TurnOffWindowsCopilot /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings /V AutoOpenCopilotLargeScreens /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Privacy /V TailoredExperiencesWithDiagnosticDataEnabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection /V AllowTelemetry /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V BypassNRO /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V DisableVoice /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V PrivacyConsentStatus /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V ProtectYourPC /T REG_DWORD /D 00000003 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
REM ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V SkipMachineOOBE /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
REM ECHO REG ADD HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V SkipUserOOBE /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\Directory\ShellEx\ContextMenuHandlers\EPP /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\Drive\ShellEx\ContextMenuHandlers\EPP /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SecurityHealth /F >> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\CompressedFolder\CLSID /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\.zip\CLSID /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\image\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\SystemFileAssociations\text\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\batfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\cmdfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\docfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\fonfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\htmlfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\inffile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\inifile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\JSEFile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\JSFile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\MSInfo.Document\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\otffile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\pfmfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\regfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\rtffile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\ttcfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\ttffile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\txtfile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\VBEFile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\VBSFile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\Wordpad.Document.1\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\WPEDoc\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\WPSDoc\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\wrifile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SOFTWARE\Classes\WSFFile\shell\print /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AxInstSV /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\AxInstSV /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\tzautoupdate /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\tzautoupdate /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Browser /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\Browser /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPSvc /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DiagTrack /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\DiagTrack /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wercplsupport /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wercplsupport /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PcaSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PcaSvc /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SessionEnv /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SessionEnv /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\TermService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\TermService /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UmRdpService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UmRdpService /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteRegistry /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteRegistry /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteAccess /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\RemoteAccess /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\LanmanServer /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\LanmanServer /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SCardSvr /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SCardSvr /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SSDPSRV /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SSDPSRV /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lmhosts /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lmhosts /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lmhosts /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UsoSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\UsoSvc /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WalletService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WalletService /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\FrameServer /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\FrameServer /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnService /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinRM /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinRM /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WSearch /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WSearch /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblAuthManager /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblAuthManager /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblGameSave /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\XblGameSave /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPUserSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\CDPUserSvc /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnUserService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpnUserService /V DelayedAutostart /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\CI\Config /V VulnerableDriverBlocklistEnable /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity /V Enabled /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Control\FileSystem /V LongPathsEnabled /T REG_DWORD /D 00000001 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lfsvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lfsvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\lfsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefsvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefsvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefusersvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefusersvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\webthreatdefusersvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wscsvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wscsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisDrv /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisDrv /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\uhssvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmBroker /V LaunchProtected /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdate /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdate /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdatem /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\edgeupdatem /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WMPNetworkSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WMPNetworkSvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpcMonSvc /V Start /T REG_DWORD /D 00000004 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG ADD HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WpcMonSvc /V ErrorControl /T REG_DWORD /D 00000000 /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Media Sharing\UpdateLibrary" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\ProgramDataUpdater" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic\PerformRemediation" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore\SR" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitor" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitorToastTask" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefresh" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefreshTask" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\IndexerAutomaticMaintenance" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Verification" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\RestoreDevice" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\SmartRetry" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdates" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdatesAsUser" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Scheduled Start" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Automatic App Update" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Refresh Group Policy Cache" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihboot" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihpostreboot" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sih" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Retry Scan" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Backup Scan" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_AC" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_Battery" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Report policies" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Work" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Start Oobe Expedite Work" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_LicenseAccepted" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_OobeAppReady" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScanAfterUpdate" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UUS Failover Task" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maintenance\WinSAT" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Diagnosis\Scheduled" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maps\MapsUpdateTask" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\rempl\shell" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskLogon" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskNetwork" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE "HKLM\WIN_10_11_SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\RemovalTools\MRT_ERROR_HB" /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\BITS\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\EventLog\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SecurityHealthService\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WaaSMedicSvc\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\SgrmAgent\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisDrv\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WdNisSvc\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\WinDefend\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG DELETE HKLM\WIN_10_11_SYSTEM\ControlSet001\Services\wuauserv\Security /V Security /F>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO REG UNLOAD HKLM\WIN_10_11_HKU>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG UNLOAD HKLM\WIN_10_11_SYSTEM>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO REG UNLOAD HKLM\WIN_10_11_SOFTWARE>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO DISM /Unmount-Image /MountDir:"C:\Mount" /Commit>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Modify_Registry_%_PTH_NM_%.bat

ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scratch_Win" MKDIR "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Mount" MKDIR "C:\Mount">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO DISM /Mount-Image /ImageFile:"C:\%_FLDRNM_%\sources\install.wim" /Index:%_VER_NM_% /MountDir:"C:\Mount">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO DISM /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /Add-Package /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Image /Image:"C:\Mount" /ScratchDir:"C:\Scratch_Win" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO DISM /Unmount-Image /MountDir:"C:\Mount" /Commit>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO DISM /Cleanup-Mountpoints>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scratch_Win">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Mount">> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO %_CMNT_1_%>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO %_CMNT_2_%>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Patch_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scrtch" MKDIR "C:\Scrtch">> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO DISM /Online /NoRestart /ScratchDir:"C:\Scrtch" /Add-Package /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%">> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO DISM /Online /Cleanup-Image /ScratchDir:"C:\Scrtch" /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scrtch">> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO %_CMNT_1_%>> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO %_CMNT_2_%>> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Patch_Online_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO IF NOT EXIST "C:\Scrtch_External" MKDIR "C:\Scrtch_External">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Add-Package /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\Patch\%_LNK1NM_%" /PackagePath:"C:\Patches\%_OSVRNM_%\%_OSPTCH_1_%\NDP\%_LNK2NM_%">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Cleanup-Image /StartComponentCleanup /ResetBase>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO RMDIR /S /Q "C:\Scrtch_External">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO %_CMNT_1_%>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO %_CMNT_2_%>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%.bat
ECHO @ECHO OFF> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO IF NOT EXIST "C:\Scrtch_External" MKDIR "C:\Scrtch_External">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Add-Capability /CapabilityName:NetFX3~~~~ /Source:"C:\%_FLDRNM_%\sources\sxs">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Enable-Feature /All /Norestart /FeatureName:Microsoft-Windows-Subsystem-Linux>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Enable-Feature /All /Norestart /FeatureName:VirtualMachinePlatform>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO DISM /Image:D:\ /ScratchDir:"C:\Scrtch_External" /Enable-Feature /All /Norestart /FeatureName:HypervisorPlatform>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO RMDIR /S /Q "C:\Scrtch_External">> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
ECHO MOVE NUL 2^>^&^0>> C:\Patches\%_OSVRNM_%\Patch_External_%_PTH_NM_%_Enable_WSL_NET3_5.bat
GOTO :EOF

:LST_LNE_WIN_SRT_1_

IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (FOR /F "usebackq tokens=* delims=" %%A IN ("C:\Patches\Cleanup_Win_New_.txt") DO ((TYPE "C:\Patches\Cleanup_Win_Old_.txt"| FIND "%%A" /V> "C:\Patches\Cleanup_Win_Del_.txt"&COPY /V /Y /L "C:\Patches\Cleanup_Win_Del_.txt" "C:\Patches\Cleanup_Win_Old_.txt") >nul 2>&1))
IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (FOR /F "usebackq tokens=* delims=" %%A IN ("C:\Patches\Cleanup_Win_Del_.txt") DO ((DEL /Q "%%A") >nul 2>&1))
IF %PTCH_CLNP_WIN_SRT_VAR_% EQU 1 (DEL /Q "C:\Patches\Cleanup_Win_*_.txt" >nul 2>&1)

IF NOT EXIST "C:\Patches\Batch_Files\Firewall" MKDIR "C:\Patches\Batch_Files\Firewall"
IF NOT EXIST "C:\Patches\Batch_Files\ACL" MKDIR "C:\Patches\Batch_Files\ACL"
IF NOT EXIST "C:\Patches\Batch_Files\Networking" MKDIR "C:\Patches\Batch_Files\Networking"
IF NOT EXIST "C:\Patches\Batch_Files\Misc" MKDIR "C:\Patches\Batch_Files\Misc"

IF EXIST "C:\Patches\Batch_Files\Firewall\*.bat" DEL /Q "C:\Patches\Batch_Files\Firewall\*.bat" 2> nul
IF EXIST "C:\Patches\Batch_Files\ACL\*.bat" DEL /Q "C:\Patches\Batch_Files\ACL\*.bat" 2> nul
IF EXIST "C:\Patches\Batch_Files\Networking\*.bat" DEL /Q "C:\Patches\Batch_Files\Networking\*.bat" 2> nul
IF EXIST "C:\Patches\Batch_Files\Misc\*.bat" DEL /Q "C:\Patches\Batch_Files\Misc\*.bat" 2> nul

ENDLOCAL DisableDelayedExpansion

SETLOCAL DisableDelayedExpansion
CD /D "%~dp0"
SET DLM_SKP_=2416
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_1_PRSE GOTO SKP_SRT_3960_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Blizzard_App_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_1_
GOTO :LST_LNE_DELAMINATE_3960_1_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
CD /D "%~dp0"
DEL /Q "%~dp0BNet_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

IF NOT EXIST "%AppData%\Battle.net\Battle.net.config" GOTO BNET_APP_FR_WLL_LST_LNE
IF NOT EXIST "%ProgramData%\Battle.net" GOTO BNET_APP_FR_WLL_LST_LNE

SET BNET_APP_FR_WLL_TST_SRT_VAR_CHK_=0
SET BNET_APP_FR_WLL_TST_SRT_VAR_1_=\/
SET BNET_APP_FR_WLL_TST_SRT_VAR_2_=\\
SET BNET_APP_FR_WLL_TST_SRT_VAR_CHK_1_="EMPTY"
SET BNET_APP_FR_WLL_TST_SRT_VAR_CHK_2_="EMPTY"

(((TYPE "%AppData%\Battle.net\Battle.net.config"| FINDSTR /BRC:"            \"DefaultInstallPath\":")> "%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1)
TYPE "%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0BNet_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P BNET_APP_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0BNet_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %BNET_APP_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO BNET_APP_FR_WLL_SKP_CHK_0_
SET /A BNET_APP_FR_WLL_TST_SRT_VAR_CHK_+=1

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO !TMP_VAR_:~35,-2!> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
CALL :BNET_APP_FR_WLL_PRE_SRT_

:BNET_APP_FR_WLL_SKP_CHK_0_

(((TYPE "%AppData%\Battle.net\Battle.net.config"| FINDSTR /BRC:"        \"Path\":")> "%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1)
TYPE "%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0BNet_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P BNET_APP_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0BNet_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %BNET_APP_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO BNET_APP_FR_WLL_SKP_CHK_1_
SET /A BNET_APP_FR_WLL_TST_SRT_VAR_CHK_+=1

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO !TMP_VAR_:~17,-2!> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
CALL :BNET_APP_FR_WLL_PRE_SRT_

:BNET_APP_FR_WLL_SKP_CHK_1_

SETLOCAL DisableDelayedExpansion
DEL /Q "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt" 2> nul
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_2_SMPL_.txt") DO (ECHO %%~A>> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
SETLOCAL EnableDelayedExpansion

ECHO %ProgramData%\Battle.net^\>> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
ECHO %ProgramData%\Battle.net_components^\>> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO (SET TMP_VAR_=%%A&IF EXIST "!TMP_VAR_:~0,-1!" ((DIR /B /S /O:N "!TMP_VAR_:~0,-1!\*.exe">> "%~dp0BNet_FrWll_GENERATOR_RNGE_4_SMPL_.txt") >nul 2>&1))
TYPE "%~dp0BNet_FrWll_GENERATOR_RNGE_4_SMPL_.txt"> "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

IF [%1]==[] GOTO BNET_APP_FR_WLL_SKP_LBL_1_
IF %1==BYPASS GOTO BNET_APP_FR_WLL_SKP_LBL_2_

:BNET_APP_FR_WLL_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "CREATING FIREWALL RULES FOR: [%ProgramData%\Battle.net\] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO BNET_APP_FR_WLL_LST_LNE
:BNET_APP_FR_WLL_SKP_LBL_2_

SET ALS_FrWll_STRT=Battle_Net_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

TYPE "%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0BNet_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0BNet_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

GOTO BNET_APP_FR_WLL_LST_LNE

:BNET_APP_FR_WLL_PRE_SRT_
(SET BNET_APP_FR_WLL_TMP_VAR_=)
(SET BNET_APP_FR_WLL_TMP_VAR_2_=)

IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 1 (FOR /L %%A IN (1,1,100) DO (CALL :BNET_APP_FR_WLL_TST_ %%A %BNET_APP_FR_WLL_TST_SRT_VAR_1_% ))
IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 1 (SET BNET_APP_FR_WLL_TST_SRT_VAR_CHK_1_="%BNET_APP_FR_WLL_TMP_VAR_2_%")

IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 2 (FOR /L %%A IN (1,1,100) DO (CALL :BNET_APP_FR_WLL_TST_ %%A %BNET_APP_FR_WLL_TST_SRT_VAR_2_% ))
IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 2 (SET BNET_APP_FR_WLL_TST_SRT_VAR_CHK_2_="%BNET_APP_FR_WLL_TMP_VAR_2_%")

(IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 1 (((ECHO "%BNET_APP_FR_WLL_TMP_VAR_2_%")>> "%~dp0BNet_FrWll_GENERATOR_RNGE_2_SMPL_.txt") >nul 2>&1))
(IF %BNET_APP_FR_WLL_TST_SRT_VAR_CHK_% EQU 2 (IF NOT [%BNET_APP_FR_WLL_TST_SRT_VAR_CHK_1_%]==[%BNET_APP_FR_WLL_TST_SRT_VAR_CHK_2_%] (((ECHO "%BNET_APP_FR_WLL_TMP_VAR_2_%")>> "%~dp0BNet_FrWll_GENERATOR_RNGE_2_SMPL_.txt") >nul 2>&1)) )

GOTO BNET_APP_INNR_FRWLL_LST_LNE_
:BNET_APP_FR_WLL_TST_
FOR /F "usebackq tokens=%1 delims=%2" %%A IN ("%~dp0BNet_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET BNET_APP_FR_WLL_TMP_VAR_=!BNET_APP_FR_WLL_TMP_VAR_2_!%%A^\)&(SET BNET_APP_FR_WLL_TMP_VAR_2_=!BNET_APP_FR_WLL_TMP_VAR_!))
GOTO :EOF
:BNET_APP_INNR_FRWLL_LST_LNE_
GOTO :EOF

:BNET_APP_FR_WLL_LST_LNE

DEL /Q "%~dp0BNet_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_1_PRSE

:LST_LNE_DELAMINATE_3960_1_

SET DLM_SKP_=2526
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_2_PRSE GOTO SKP_SRT_3960_2_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Configure_Win10_11_Firewall.bat")
:SKP_SRT_3960_2_
GOTO :LST_LNE_DELAMINATE_3960_2_

@ECHO OFF
SETLOCAL

IF [%1]==[] GOTO CNFG_FRWLL_SKP_RST_LBL
IF %1==RESET (netsh advfirewall reset)
:CNFG_FRWLL_SKP_RST_LBL

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallProfile | Set-NetFirewallProfile -Enabled True -DefaultInboundAction Block -DefaultOutboundAction Block -AllowUnicastResponseToMulticast False -NotifyOnListen True -EnableStealthModeForIPsec True}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -Enabled True | Disable-NetFirewallRule}"

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'DNSCrypt Client Proxy'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Service'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN ( OpenVPN )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Terminal ( MYSYS2 Shell )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Package Manager 1 ( MYSYS2 Shell )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Package Manager 2 ( MYSYS2 Shell )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Package Manager 3 ( MYSYS2 Shell )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Package Manager 4 ( MYSYS2 Shell )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'FireFox Portable'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Vivaldi Portable'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'Vivaldi Portable (Updater)'}"

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater ( * )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater Essential ( * )'}"

IF EXIST "C:\Windows\System32\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - System32 )' -Profile Any -Program 'C:\Windows\System32\curl.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - SysWOW64 )' -Profile Any -Program 'C:\Windows\SysWOW64\curl.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( Windows Time Service )' -Profile Any -Protocol UDP -LocalPort 123 -RemotePort 123 -Service W32Time}"

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( DNS Client )' -Enabled False -Profile Any -Protocol Any -Service Dnscache}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Intelligent Transfer Service )' -Enabled False -Profile Any -Protocol Any -Service BITS}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Cryptographic Services )' -Enabled False -Profile Any -Protocol Any -Service CryptSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Delivery Optimization )' -Enabled False -Profile Any -Protocol Any -Service DoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Device Setup Manager )' -Enabled False -Profile Any -Protocol Any -Service DsmSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update )' -Enabled False -Profile Any -Protocol Any -Service wuauserv}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Update Orchestrator Service )' -Enabled False -Profile Any -Protocol Any -Service UsoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( AppX Deployment Service )' -Enabled False -Profile Any -Protocol Any -Service AppXSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Microsoft Store Install Service )' -Enabled False -Profile Any -Protocol Any -Service InstallService}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows License Manager Service )' -Enabled False -Profile Any -Protocol Any -Service LicenseManager}"

IF EXIST "C:\Windows\System32\Fondue.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features on Demand UX )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Fondue.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\OptionalFeatures.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features )' -Enabled False -Profile Any -Program 'C:\Windows\System32\OptionalFeatures.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\usocoreworker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\usocoreworker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\UUS\amd64\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( MoUSO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\UUS\amd64\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\oobe\UserOOBEBroker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update - User OOBE Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\oobe\UserOOBEBroker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\LsaIso.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Credential Guard & VBS Key Isolation )' -Enabled False -Profile Any -Program 'C:\Windows\System32\LsaIso.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\sihost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Shell Infrastructure Host )' -Enabled False -Profile Any -Program 'C:\Windows\System32\sihost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\SLUI.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Activation Client )' -Enabled False -Profile Any -Program 'C:\Windows\System32\SLUI.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Settings )' -Enabled False -Profile Any -Program 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe' -Protocol Any}"
IF EXIST "C:\Windows\servicing\TrustedInstaller.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Modules Installer )' -Enabled False -Profile Any -Program 'C:\Windows\servicing\TrustedInstaller.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - SySWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\browser_broker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Browser Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\browser_broker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\AppHostRegistrationVerifier.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( App Uri Handlers Registration Verifier )' -Enabled False -Profile Any -Program 'C:\Windows\System32\AppHostRegistrationVerifier.exe' -Protocol Any}"

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'DNSCrypt Client Proxy' -Profile Any -Program '%ProgramFiles%\dnscrypt-proxy\dnscrypt-proxy.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Terminal ( MYSYS2 Shell )' -Enabled False -Profile Any -Program 'I:\MYSYS2\usr\bin\mintty.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Package Manager 1 ( MYSYS2 Shell )' -Enabled False -Profile Any -Program 'I:\MYSYS2\usr\bin\pacman.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Package Manager 2 ( MYSYS2 Shell )' -Enabled False -Profile Any -Program 'I:\MYSYS2\usr\bin\pacman-conf.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Package Manager 3 ( MYSYS2 Shell )' -Enabled False -Profile Any -Program 'I:\MYSYS2\usr\bin\pacsync.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Package Manager 4 ( MYSYS2 Shell )' -Enabled False -Profile Any -Program 'I:\MYSYS2\usr\bin\paccheck.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'FireFox Portable' -Profile Any -Program 'G:\Win64\FirefoxPortable\App\Firefox64\firefox.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Vivaldi Portable' -Profile Any -Program 'G:\Win64\Vivaldi\Application\vivaldi.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'Vivaldi Portable (Updater)' -Enabled False -Profile Any -Program 'G:\Win64\Vivaldi\Application\update_notifier.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Service' -Profile Any -Program '%ProgramFiles%\NordVPN\nordvpn-service.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN' -Profile Any -Program '%ProgramFiles%\NordVPN\NordVPN.exe' -Protocol Any}"

DIR /B /A:D /O:N "%ProgramFiles%\NordVPN"> "%~dp0FireWall_List_1.txt"
TYPE "%~dp0FireWall_List_1.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*"> "%~dp0FireWall_List_2.txt"
TYPE "%~dp0FireWall_List_2.txt" | FIND /V "" /C> "%~dp0FireWall_List_3.txt"
SET /P MX_LNE_FRWLL_1_=<"%~dp0FireWall_List_3.txt"
IF %MX_LNE_FRWLL_1_% EQU 1 GOTO TMP_SKP_FRWLL_LNE_1_
SET /A MX_LNE_FRWLL_1_-=1
FOR /F "usebackq skip=%MX_LNE_FRWLL_1_% tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
GOTO TMP_SKP_FRWLL_LNE_2_
:TMP_SKP_FRWLL_LNE_1_
FOR /F "usebackq tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
:TMP_SKP_FRWLL_LNE_2_
DEL /Q "%~dp0FireWall_List_*.txt" 2> nul

ECHO @ECHO OFF> "%~dp0RFRSH_FireWall_.bat"
ECHO SETLOCAL>> "%~dp0RFRSH_FireWall_.bat"

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\EdgeWebView" GOTO SKIP_0_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\EdgeWebView\Application"
DIR /B /S "msedgewebview2.exe"> "%~dp0rfrshfrwll_0.txt"
SET /P TMP_FRWLL_RULE_EDGE_=<"%~dp0rfrshfrwll_0.txt"
IF NOT EXIST "%TMP_FRWLL_RULE_EDGE_%" GOTO SKIP_0_LBL
SET NM_VR_=App Updater ( Microsoft Edge WebView2 )
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_0.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_0_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_Arm64__*"
IF NOT EXIST "WhatsNew.Store.exe" GOTO SKIP_1_LBL
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_13.txt' -value (Get-AppxPackage -AllUsers Microsoft.Getstarted | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_13.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 2 )
DIR /B /S "WhatsNew.Store.exe"> "%~dp0rfrshfrwll_1.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_1.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_1_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "WinStore.App.exe" GOTO SKIP_2_LBL
SET NM_VR_=App Updater ( Microsoft Store App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_14.txt' -value (Get-AppxPackage -AllUsers Microsoft.WindowsStore | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_14.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store App 2 )
DIR /B /S "WinStore.App.exe"> "%~dp0rfrshfrwll_2.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_2.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_2_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_Arm64__*"
IF NOT EXIST "StoreExperienceHost.exe" GOTO SKIP_3_LBL
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_15.txt' -value (Get-AppxPackage -AllUsers Microsoft.StorePurchaseApp | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_15.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 2 )
DIR /B /S "StoreExperienceHost.exe"> "%~dp0rfrshfrwll_3.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_3.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_3_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "StoreDesktopExtension.exe" GOTO SKIP_4_LBL
SET NM_VR_=App Updater ( Microsoft Store - Desktop Extension )
DIR /B /S "StoreDesktopExtension.exe"> "%~dp0rfrshfrwll_4.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_4.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_4_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "winget.exe" GOTO SKIP_5_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGet )
DIR /B /S "winget.exe"> "%~dp0rfrshfrwll_5.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_5.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_5_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstaller.exe" GOTO SKIP_6_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_16.txt' -value (Get-AppxPackage -AllUsers Microsoft.DesktopAppInstaller | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_16.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 2 )
DIR /B /S "AppInstaller.exe"> "%~dp0rfrshfrwll_6.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_6.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_6_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerFullTrustAppServiceClient.exe" GOTO SKIP_7_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 3 )
DIR /B /S "AppInstallerFullTrustAppServiceClient.exe"> "%~dp0rfrshfrwll_7.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_7.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_7_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerPythonRedirector.exe" GOTO SKIP_8_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 4 )
DIR /B /S "AppInstallerPythonRedirector.exe"> "%~dp0rfrshfrwll_8.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_8.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_8_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AuthenticationManager.exe" GOTO SKIP_9_LBL
SET NM_VR_=App Updater ( Microsoft Store - AuthenticationManager )
DIR /B /S "AuthenticationManager.exe"> "%~dp0rfrshfrwll_9.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_9.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_9_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "WindowsPackageManagerServer.exe" GOTO SKIP_10_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGetServer )
DIR /B /S "WindowsPackageManagerServer.exe"> "%~dp0rfrshfrwll_10.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_10.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_10_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x86__*\Dashboard"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x64__*\Dashboard"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_Arm64__*\Dashboard"
IF NOT EXIST "Widgets.exe" GOTO SKIP_11_LBL
SET NM_VR_=App Updater ( Widgets 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_17.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.WebExperience | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_17.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Widgets 2 )
DIR /B /S "Widgets.exe"> "%~dp0rfrshfrwll_11.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_11.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_11_LBL

CD /D "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_*"
IF NOT EXIST "SearchHost.exe" GOTO SKIP_12_LBL
SET NM_VR_=App Updater ( Search Host - Cortana 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_18.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.CBS | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_18.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Search Host - Cortana 2 )
DIR /B /S "SearchHost.exe"> "%~dp0rfrshfrwll_12.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_12.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_12_LBL

ECHO ENDLOCAL>> "%~dp0RFRSH_FireWall_.bat"
ECHO DEL /Q "%%~dp0RFRSH_FireWall_.bat" 2^> nul>> "%~dp0RFRSH_FireWall_.bat"

GOTO LST_LNE_

:RFRSH_FRWLL_1_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Program '%~s1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:RFRSH_FRWLL_2_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Package '%~1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:LST_LNE_

DEL /Q "%~dp0rfrshfrwll_*.txt" 2> nul
CALL "%~dp0RFRSH_FireWall_.bat"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_2_PRSE

:LST_LNE_DELAMINATE_3960_2_

SET DLM_SKP_=2785
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_3_PRSE GOTO SKP_SRT_3960_3_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Create_FireWall_Rules.bat")
:SKP_SRT_3960_3_
GOTO :LST_LNE_DELAMINATE_3960_3_

@ECHO OFF
SETLOCAL
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Configure_Win10_11_Firewall.bat RESET
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Blizzard_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0EA_Desktop_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0EPIC_Launcher_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Steam_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Ubisoft_Connect_App_Firewall_Rule_Creator.bat BYPASS
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_3_PRSE

:LST_LNE_DELAMINATE_3960_3_

SET DLM_SKP_=2805
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_4_PRSE GOTO SKP_SRT_3960_4_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Create_FireWall_Rules_Blizzard_EA_EPIC_Steam_Ubisoft.bat")
:SKP_SRT_3960_4_
GOTO :LST_LNE_DELAMINATE_3960_4_

@ECHO OFF
SETLOCAL
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Blizzard_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0EA_Desktop_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0EPIC_Launcher_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Steam_App_Firewall_Rule_Creator.bat BYPASS
CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Ubisoft_Connect_App_Firewall_Rule_Creator.bat BYPASS
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_4_PRSE

:LST_LNE_DELAMINATE_3960_4_

SET DLM_SKP_=2824
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_5_PRSE GOTO SKP_SRT_3960_5_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Current_Directory_Temp_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_5_
GOTO :LST_LNE_DELAMINATE_3960_5_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

DIR /B /S /O:N "%~dp0*.exe"> "%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
TYPE "%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

ECHO ...Creating %FRWLL_MAX_CNTR_NUM% Temporary Firewall Rules For The Current Directory
PAUSE

SET ALS_FrWll_STRT=Current_Directory_Temp_Rule

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

DEL /Q "%~dp0CrrntDirectory_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ECHO ...Removing %FRWLL_MAX_CNTR_NUM% Temporary Firewall Rules Created For The Current Directory
PAUSE

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_5_PRSE

:LST_LNE_DELAMINATE_3960_5_

SET DLM_SKP_=2868
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_6_PRSE GOTO SKP_SRT_3960_6_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Disable_Windows_App_Update_Firewall.bat")
:SKP_SRT_3960_6_
GOTO :LST_LNE_DELAMINATE_3960_6_

@ECHO OFF
SETLOCAL
sc config EventLog start= disabled
sc config UsoSvc start= disabled
sc config wuauserv start= disabled
sc config InstallService start= disabled
net stop UsoSvc
net stop wuauserv
net stop InstallService
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName '*mDNS*Out)*' | Disable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*DNS*Out)' | Disable-NetFirewallRule}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'App Updater ( * )' | Disable-NetFirewallRule}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_6_PRSE

:LST_LNE_DELAMINATE_3960_6_

SET DLM_SKP_=2892
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_7_PRSE GOTO SKP_SRT_3960_7_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\EA_Desktop_App_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_7_
GOTO :LST_LNE_DELAMINATE_3960_7_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0EA_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

IF NOT EXIST "%LocalAppData%\Electronic Arts\EA Desktop\user_*.ini" GOTO EA_DESKTOP_APP_FR_WLL_LST_LNE
(TYPE "%LocalAppData%\Electronic Arts\EA Desktop\user_*.ini"| FIND "user.downloadinplacedir"> "%~dp0EA_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0EA_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A)
IF NOT EXIST "%TMP_VAR_:~24,-1%" GOTO EA_DESKTOP_APP_FR_WLL_LST_LNE

IF [%1]==[] GOTO EA_DESKTOP_APP_FR_WLL_SKP_LBL_1_
IF %1==BYPASS GOTO EA_DESKTOP_APP_FR_WLL_SKP_LBL_2_

:EA_DESKTOP_APP_FR_WLL_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "CREATING FIREWALL RULES FOR: [%TMP_VAR_:~27,-1%] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO EA_DESKTOP_APP_FR_WLL_LST_LNE
:EA_DESKTOP_APP_FR_WLL_SKP_LBL_2_

SET ALS_FrWll_STRT=EA_Desktop_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

DIR /B /S /O:N "C:\Program Files\Electronic Arts\*.exe"> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
DIR /B /S /O:N "C:\Program Files\EA\*.exe">> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
DIR /B /S /O:N "%TMP_VAR_:~24,-1%\*.exe">> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrA.exe" ECHO C:\Windows\system32\PnkBstrA.exe>> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrB.exe" ECHO C:\Windows\system32\PnkBstrB.exe>> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrA.exe" ECHO C:\Windows\SysWOW64\PnkBstrA.exe>> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrB.exe" ECHO C:\Windows\SysWOW64\PnkBstrB.exe>> "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

TYPE "%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0EA_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0EA_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0EA_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

:EA_DESKTOP_APP_FR_WLL_LST_LNE

DEL /Q "%~dp0EA_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_7_PRSE

:LST_LNE_DELAMINATE_3960_7_

SET DLM_SKP_=2951
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_8_PRSE GOTO SKP_SRT_3960_8_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Enable_Windows_App_Update_Firewall.bat")
:SKP_SRT_3960_8_
GOTO :LST_LNE_DELAMINATE_3960_8_

@ECHO OFF
SETLOCAL
sc config EventLog start= auto
sc config UsoSvc start= auto
sc config wuauserv start= auto
sc config InstallService start= auto
net start EventLog
net start UsoSvc
net start wuauserv
net start InstallService
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName '*mDNS*Out)*' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*DNS*Out)' | Enable-NetFirewallRule}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'App Updater ( * )' | Enable-NetFirewallRule}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_8_PRSE

:LST_LNE_DELAMINATE_3960_8_

SET DLM_SKP_=2976
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_9_PRSE GOTO SKP_SRT_3960_9_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Endless_Firewall_Inbound_Rule_Blocker.bat")
:SKP_SRT_3960_9_
GOTO :LST_LNE_DELAMINATE_3960_9_

@ECHO OFF
SETLOCAL
:STRT_LBL_
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -Direction Inbound -Enabled True | Disable-NetFirewallRule}"
TIMEOUT /T 5 /NOBREAK
GOTO STRT_LBL_
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_9_PRSE

:LST_LNE_DELAMINATE_3960_9_

SET DLM_SKP_=2994
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_10_PRSE GOTO SKP_SRT_3960_10_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\EPIC_Launcher_App_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_10_
GOTO :LST_LNE_DELAMINATE_3960_10_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
CD /D "%~dp0"
DEL /Q "%~dp0EPIC_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

IF NOT EXIST "%LocalAppData%\EpicGamesLauncher\Saved\Config\Windows\GameUserSettings.ini" GOTO EPIC_LAUNCHER_FR_WLL_LST_LNE
IF NOT EXIST "%ProgramFiles(x86)%\Epic Games" GOTO EPIC_LAUNCHER_FR_WLL_LST_LNE
IF NOT EXIST "%ProgramData%\Epic" GOTO EPIC_LAUNCHER_FR_WLL_LST_LNE

(TYPE "%LocalAppData%\EpicGamesLauncher\Saved\Config\Windows\GameUserSettings.ini"| FIND "VaultCacheDirectories"> "%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1

TYPE "%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0EPIC_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P EPIC_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0EPIC_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %EPIC_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO EPIC_LAUNCHER_FR_WLL_SKP_CHK_1_

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO !TMP_VAR_:~22!> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
CALL :EPIC_LAUNCHER_FR_WLL_PRE_SRT_

:EPIC_LAUNCHER_FR_WLL_SKP_CHK_1_

(TYPE "%LocalAppData%\EpicGamesLauncher\Saved\Config\Windows\GameUserSettings.ini"| FIND "DefaultAppInstallLocation"> "%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1

TYPE "%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0EPIC_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P EPIC_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0EPIC_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %EPIC_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO EPIC_LAUNCHER_FR_WLL_SKP_CHK_2_

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO "!TMP_VAR_:~26!^\">> "%~dp0EPIC_FrWll_GENERATOR_RNGE_2_SMPL_.txt")

:EPIC_LAUNCHER_FR_WLL_SKP_CHK_2_

SETLOCAL DisableDelayedExpansion
DEL /Q "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt" 2> nul
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_2_SMPL_.txt") DO (ECHO %%~A>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
SETLOCAL EnableDelayedExpansion

ECHO %ProgramFiles(x86)%\Epic Games^\>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
ECHO %ProgramFiles(x86)%\EasyAntiCheat^\>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
ECHO %ProgramFiles(x86)%\EasyAntiCheat_EOS^\>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
ECHO %ProgramData%\Epic^\>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO (SET TMP_VAR_=%%A&IF EXIST "!TMP_VAR_:~0,-1!" ((DIR /B /S /O:N "!TMP_VAR_:~0,-1!\*.exe">> "%~dp0EPIC_FrWll_GENERATOR_RNGE_4_SMPL_.txt") >nul 2>&1))
TYPE "%~dp0EPIC_FrWll_GENERATOR_RNGE_4_SMPL_.txt"> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrA.exe" ECHO C:\Windows\system32\PnkBstrA.exe>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrB.exe" ECHO C:\Windows\system32\PnkBstrB.exe>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrA.exe" ECHO C:\Windows\SysWOW64\PnkBstrA.exe>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrB.exe" ECHO C:\Windows\SysWOW64\PnkBstrB.exe>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

IF [%1]==[] GOTO EPIC_LAUNCHER_FR_WLL_SKP_LBL_1_
IF %1==BYPASS GOTO EPIC_LAUNCHER_FR_WLL_SKP_LBL_2_

:EPIC_LAUNCHER_FR_WLL_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "CREATING FIREWALL RULES FOR: [%ProgramFiles(x86)%\Epic Games\] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO EPIC_LAUNCHER_FR_WLL_LST_LNE
:EPIC_LAUNCHER_FR_WLL_SKP_LBL_2_

SET ALS_FrWll_STRT=EPIC_Launcher_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

TYPE "%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0EPIC_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0EPIC_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

GOTO EPIC_LAUNCHER_FR_WLL_LST_LNE

:EPIC_LAUNCHER_FR_WLL_PRE_SRT_
(SET EPIC_LAUNCHER_FR_WLL_TMP_VAR_=)
(SET EPIC_LAUNCHER_FR_WLL_TMP_VAR_2_=)

FOR /L %%A IN (1,1,100) DO (CALL :EPIC_LAUNCHER_FR_WLL_TST_ %%A)

(ECHO "%EPIC_LAUNCHER_FR_WLL_TMP_VAR_2_%")>> "%~dp0EPIC_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

GOTO EPIC_LAUNCHER_INNR_FRWLL_LST_LNE_
:EPIC_LAUNCHER_FR_WLL_TST_
FOR /F "usebackq tokens=%1 delims=/" %%A IN ("%~dp0EPIC_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET EPIC_LAUNCHER_FR_WLL_TMP_VAR_=!EPIC_LAUNCHER_FR_WLL_TMP_VAR_2_!%%A^\)&(SET EPIC_LAUNCHER_FR_WLL_TMP_VAR_2_=!EPIC_LAUNCHER_FR_WLL_TMP_VAR_!))
GOTO :EOF
:EPIC_LAUNCHER_INNR_FRWLL_LST_LNE_
GOTO :EOF

:EPIC_LAUNCHER_FR_WLL_LST_LNE

DEL /Q "%~dp0EPIC_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_10_PRSE

:LST_LNE_DELAMINATE_3960_10_

SET DLM_SKP_=3099
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_11_PRSE GOTO SKP_SRT_3960_11_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Generate_Win10_11_Firewall_Rules.bat")
:SKP_SRT_3960_11_
GOTO :LST_LNE_DELAMINATE_3960_11_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater ( * )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater Essential ( * )'}"

IF EXIST "C:\Windows\System32\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - System32 )' -Profile Any -Program 'C:\Windows\System32\curl.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - SysWOW64 )' -Profile Any -Program 'C:\Windows\SysWOW64\curl.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( Windows Time Service )' -Profile Any -Protocol UDP -LocalPort 123 -RemotePort 123 -Service W32Time}"

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( DNS Client )' -Enabled False -Profile Any -Protocol Any -Service Dnscache}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Intelligent Transfer Service )' -Enabled False -Profile Any -Protocol Any -Service BITS}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Cryptographic Services )' -Enabled False -Profile Any -Protocol Any -Service CryptSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Delivery Optimization )' -Enabled False -Profile Any -Protocol Any -Service DoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Device Setup Manager )' -Enabled False -Profile Any -Protocol Any -Service DsmSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update )' -Enabled False -Profile Any -Protocol Any -Service wuauserv}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Update Orchestrator Service )' -Enabled False -Profile Any -Protocol Any -Service UsoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( AppX Deployment Service )' -Enabled False -Profile Any -Protocol Any -Service AppXSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Microsoft Store Install Service )' -Enabled False -Profile Any -Protocol Any -Service InstallService}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows License Manager Service )' -Enabled False -Profile Any -Protocol Any -Service LicenseManager}"

IF EXIST "C:\Windows\System32\Fondue.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features on Demand UX )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Fondue.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\OptionalFeatures.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features )' -Enabled False -Profile Any -Program 'C:\Windows\System32\OptionalFeatures.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\usocoreworker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\usocoreworker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\UUS\amd64\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( MoUSO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\UUS\amd64\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\oobe\UserOOBEBroker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update - User OOBE Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\oobe\UserOOBEBroker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\LsaIso.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Credential Guard & VBS Key Isolation )' -Enabled False -Profile Any -Program 'C:\Windows\System32\LsaIso.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\sihost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Shell Infrastructure Host )' -Enabled False -Profile Any -Program 'C:\Windows\System32\sihost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\SLUI.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Activation Client )' -Enabled False -Profile Any -Program 'C:\Windows\System32\SLUI.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Settings )' -Enabled False -Profile Any -Program 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe' -Protocol Any}"
IF EXIST "C:\Windows\servicing\TrustedInstaller.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Modules Installer )' -Enabled False -Profile Any -Program 'C:\Windows\servicing\TrustedInstaller.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - SySWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\browser_broker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Browser Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\browser_broker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\AppHostRegistrationVerifier.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( App Uri Handlers Registration Verifier )' -Enabled False -Profile Any -Program 'C:\Windows\System32\AppHostRegistrationVerifier.exe' -Protocol Any}"

ECHO @ECHO OFF> "%~dp0RFRSH_FireWall_.bat"
ECHO SETLOCAL>> "%~dp0RFRSH_FireWall_.bat"

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\EdgeWebView" GOTO SKIP_0_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\EdgeWebView\Application"
DIR /B /S "msedgewebview2.exe"> "%~dp0rfrshfrwll_0.txt"
SET /P TMP_FRWLL_RULE_EDGE_=<"%~dp0rfrshfrwll_0.txt"
IF NOT EXIST "%TMP_FRWLL_RULE_EDGE_%" GOTO SKIP_0_LBL
SET NM_VR_=App Updater ( Microsoft Edge WebView2 )
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_0.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_0_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_Arm64__*"
IF NOT EXIST "WhatsNew.Store.exe" GOTO SKIP_1_LBL
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_13.txt' -value (Get-AppxPackage -AllUsers Microsoft.Getstarted | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_13.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 2 )
DIR /B /S "WhatsNew.Store.exe"> "%~dp0rfrshfrwll_1.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_1.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_1_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "WinStore.App.exe" GOTO SKIP_2_LBL
SET NM_VR_=App Updater ( Microsoft Store App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_14.txt' -value (Get-AppxPackage -AllUsers Microsoft.WindowsStore | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_14.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store App 2 )
DIR /B /S "WinStore.App.exe"> "%~dp0rfrshfrwll_2.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_2.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_2_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_Arm64__*"
IF NOT EXIST "StoreExperienceHost.exe" GOTO SKIP_3_LBL
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_15.txt' -value (Get-AppxPackage -AllUsers Microsoft.StorePurchaseApp | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_15.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 2 )
DIR /B /S "StoreExperienceHost.exe"> "%~dp0rfrshfrwll_3.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_3.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_3_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "StoreDesktopExtension.exe" GOTO SKIP_4_LBL
SET NM_VR_=App Updater ( Microsoft Store - Desktop Extension )
DIR /B /S "StoreDesktopExtension.exe"> "%~dp0rfrshfrwll_4.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_4.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_4_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "winget.exe" GOTO SKIP_5_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGet )
DIR /B /S "winget.exe"> "%~dp0rfrshfrwll_5.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_5.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_5_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstaller.exe" GOTO SKIP_6_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_16.txt' -value (Get-AppxPackage -AllUsers Microsoft.DesktopAppInstaller | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_16.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 2 )
DIR /B /S "AppInstaller.exe"> "%~dp0rfrshfrwll_6.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_6.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_6_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerFullTrustAppServiceClient.exe" GOTO SKIP_7_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 3 )
DIR /B /S "AppInstallerFullTrustAppServiceClient.exe"> "%~dp0rfrshfrwll_7.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_7.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_7_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerPythonRedirector.exe" GOTO SKIP_8_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 4 )
DIR /B /S "AppInstallerPythonRedirector.exe"> "%~dp0rfrshfrwll_8.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_8.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_8_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AuthenticationManager.exe" GOTO SKIP_9_LBL
SET NM_VR_=App Updater ( Microsoft Store - AuthenticationManager )
DIR /B /S "AuthenticationManager.exe"> "%~dp0rfrshfrwll_9.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_9.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_9_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "WindowsPackageManagerServer.exe" GOTO SKIP_10_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGetServer )
DIR /B /S "WindowsPackageManagerServer.exe"> "%~dp0rfrshfrwll_10.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_10.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_10_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x86__*\Dashboard"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x64__*\Dashboard"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_Arm64__*\Dashboard"
IF NOT EXIST "Widgets.exe" GOTO SKIP_11_LBL
SET NM_VR_=App Updater ( Widgets 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_17.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.WebExperience | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_17.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Widgets 2 )
DIR /B /S "Widgets.exe"> "%~dp0rfrshfrwll_11.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_11.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_11_LBL

CD /D "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_*"
IF NOT EXIST "SearchHost.exe" GOTO SKIP_12_LBL
SET NM_VR_=App Updater ( Search Host - Cortana 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_18.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.CBS | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_18.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Search Host - Cortana 2 )
DIR /B /S "SearchHost.exe"> "%~dp0rfrshfrwll_12.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_12.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_12_LBL

ECHO ENDLOCAL>> "%~dp0RFRSH_FireWall_.bat"
ECHO DEL /Q "%%~dp0RFRSH_FireWall_.bat" 2^> nul>> "%~dp0RFRSH_FireWall_.bat"

GOTO LST_LNE_

:RFRSH_FRWLL_1_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Program '%~s1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:RFRSH_FRWLL_2_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Package '%~1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:LST_LNE_

DEL /Q "%~dp0rfrshfrwll_*.txt" 2> nul
CALL "%~dp0RFRSH_FireWall_.bat"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3960_11_PRSE

:LST_LNE_DELAMINATE_3960_11_

SET DLM_SKP_=3312
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_12_PRSE GOTO SKP_SRT_3960_12_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Generic_Win10_11_Firewall_Settings.bat")
:SKP_SRT_3960_12_
GOTO :LST_LNE_DELAMINATE_3960_12_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-PSReadLineOption -HistorySaveStyle SaveNothing -MaximumHistoryCount 1}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Write-Output 'Remove-Module PSReadline' | New-Item -Path $PROFILE -Type File -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls13}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Advanced EEE' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Lite' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Green Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Power Saving Mode' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Flow Control' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'IPv4 Checksum Offload' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '4'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'ARP Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'NS Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'VLAN ID' -DisplayValue '0'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Packet Priority & VLAN' -DisplayValue 'Packet Priority & VLAN Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'PTP Hardware Timestamp' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '512'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Side Scaling' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Software Timestamp' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Speed & Duplex' -DisplayValue '1.0 Gbps Full Duplex'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wait for Link' -DisplayValue 'On'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '128'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Adaptive Inter-Frame Spacing' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy-Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Off'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Enable PME' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Adaptive'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Log Link State Event' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Master Slave Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Network Address'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Locally Administered Address' -DisplayValue ''}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit PHY Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'WOL & Shutdown Link Speed' -DisplayValue 'Not Speed Down'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Reduce Speed On Power Down' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Shutdown Wake-On-Lan' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Link Settings' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Sleep on WoWLAN Disconnect' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Packet Coalescing' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'ARP offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'NS offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'GTK rekeying for WoWLAN' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 2.4GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 5GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Mixed Mode Protection' -DisplayValue 'RTS/CTS Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Fat Channel Intolerant' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Transmit Power' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11n/ac Wireless Mode' -DisplayValue '802.11ac'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'MIMO Power Save Mode' -DisplayValue 'Auto SMPS'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Roaming Aggressiveness' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Preferred Band' -DisplayValue '3. Prefer 5GHz band'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Throughput Booster' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'U-APSD support' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11a/b/g Wireless Mode' -DisplayValue '6. Dual Band 802.11a/b/g'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetIPInterface}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Enable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_tcpip6'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_msclient'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_server'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_pacer'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_implat'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_lldp'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_rspndr'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallProfile | Set-NetFirewallProfile -Enabled True -DefaultInboundAction Block -DefaultOutboundAction Block -AllowUnicastResponseToMulticast False -NotifyOnListen True -EnableStealthModeForIPsec True}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -Direction Inbound -Enabled True | Disable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName '*mDNS*Out)*' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*DNS*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Dynamic*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Internet*IGMP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*IPHTTPS*TCP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*IPv6*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Multicast*ICMP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Packet*ICMP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Parameter*ICMP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Teredo*UDP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Time*ICMP*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Solicitation*Out)' | Enable-NetFirewallRule}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Diagnostics*ICMP*ICMP*Out)' | Enable-NetFirewallRule}"
REM PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Dynamic*DHCP-Out)' | Enable-NetFirewallRule}"
REM PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*IPHTTPS*TCP*Out)' | Enable-NetFirewallRule}"
REM PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Core Networking*Teredo*UDP*Out)' | Enable-NetFirewallRule}"

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater ( * )'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'App Updater Essential ( * )'}"

IF EXIST "C:\Windows\System32\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - System32 )' -Profile Any -Program 'C:\Windows\System32\curl.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\curl.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( cURL - SysWOW64 )' -Profile Any -Program 'C:\Windows\SysWOW64\curl.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater Essential ( Windows Time Service )' -Profile Any -Protocol UDP -LocalPort 123 -RemotePort 123 -Service W32Time}"

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( DNS Client )' -Enabled False -Profile Any -Protocol Any -Service Dnscache}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Intelligent Transfer Service )' -Enabled False -Profile Any -Protocol Any -Service BITS}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Cryptographic Services )' -Enabled False -Profile Any -Protocol Any -Service CryptSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Delivery Optimization )' -Enabled False -Profile Any -Protocol Any -Service DoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Device Setup Manager )' -Enabled False -Profile Any -Protocol Any -Service DsmSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update )' -Enabled False -Profile Any -Protocol Any -Service wuauserv}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Update Orchestrator Service )' -Enabled False -Profile Any -Protocol Any -Service UsoSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( AppX Deployment Service )' -Enabled False -Profile Any -Protocol Any -Service AppXSvc}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Microsoft Store Install Service )' -Enabled False -Profile Any -Protocol Any -Service InstallService}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows License Manager Service )' -Enabled False -Profile Any -Protocol Any -Service LicenseManager}"

IF EXIST "C:\Windows\System32\Fondue.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features on Demand UX )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Fondue.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\OptionalFeatures.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Features )' -Enabled False -Profile Any -Program 'C:\Windows\System32\OptionalFeatures.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\usocoreworker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\usocoreworker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( USO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\System32\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\UUS\amd64\MoUsoCoreWorker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( MoUSO Core Worker Process )' -Enabled False -Profile Any -Program 'C:\Windows\UUS\amd64\MoUsoCoreWorker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\oobe\UserOOBEBroker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Update - User OOBE Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\oobe\UserOOBEBroker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\LsaIso.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Credential Guard & VBS Key Isolation )' -Enabled False -Profile Any -Program 'C:\Windows\System32\LsaIso.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\sihost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Shell Infrastructure Host )' -Enabled False -Profile Any -Program 'C:\Windows\System32\sihost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\SLUI.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Activation Client )' -Enabled False -Profile Any -Program 'C:\Windows\System32\SLUI.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Image Servicing Utility - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\Dism\DismHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Dism Host Servicing Process - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\Dism\DismHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Settings )' -Enabled False -Profile Any -Program 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe' -Protocol Any}"
IF EXIST "C:\Windows\servicing\TrustedInstaller.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Modules Installer )' -Enabled False -Profile Any -Program 'C:\Windows\servicing\TrustedInstaller.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows PowerShell - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\msiexec.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Windows Installer - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\msiexec.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\svchost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Host Process for Windows Services - SySWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\svchost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\browser_broker.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Browser Broker )' -Enabled False -Profile Any -Program 'C:\Windows\System32\browser_broker.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\BackgroundTransferHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Download - Upload Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\BackgroundTransferHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - System32 )' -Enabled False -Profile Any -Program 'C:\Windows\System32\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\SysWOW64\backgroundTaskHost.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( Background Task Host - SysWOW64 )' -Enabled False -Profile Any -Program 'C:\Windows\SysWOW64\backgroundTaskHost.exe' -Protocol Any}"
IF EXIST "C:\Windows\System32\AppHostRegistrationVerifier.exe" CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'App Updater ( App Uri Handlers Registration Verifier )' -Enabled False -Profile Any -Program 'C:\Windows\System32\AppHostRegistrationVerifier.exe' -Protocol Any}"

REM "WinGet Settings" ( https://aka.ms/winget-settings )
ECHO {"$id": "https://aka.ms/winget-settings.schema.json",> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "$schema": "https://json-schema.org/draft/2019-09/schema#",>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "title": "Microsoft's Windows Package Manager Settings Profile Schema",>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "definitions":{"source": {"autoUpdateIntervalInMinutes":3},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "visual": {"progressBar":"rainbow"},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"disableInstallNotes":true},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"preferences":{"scope":"machine"}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"preferences":{"locale":["en-US"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==ARM64 ECHO "installBehavior":{"preferences":{"architectures":["Arm64"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==AMD64 ECHO "installBehavior":{"preferences":{"architectures":["x64"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==x86 ECHO "installBehavior":{"preferences":{"architectures":["x86"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "telemetry":{"disable":true},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "logging":{"level":["critical"]},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "experimentalFeatures":{"directMSI":true},}}>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json

ECHO @ECHO OFF> "%~dp0RFRSH_FireWall_.bat"
ECHO SETLOCAL>> "%~dp0RFRSH_FireWall_.bat"

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\EdgeWebView" GOTO SKIP_0_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\EdgeWebView\Application"
DIR /B /S "msedgewebview2.exe"> "%~dp0rfrshfrwll_0.txt"
SET /P TMP_FRWLL_RULE_EDGE_=<"%~dp0rfrshfrwll_0.txt"
IF NOT EXIST "%TMP_FRWLL_RULE_EDGE_%" GOTO SKIP_0_LBL
SET NM_VR_=App Updater ( Microsoft Edge WebView2 )
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_0.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_0_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.Getstarted_*_Arm64__*"
IF NOT EXIST "WhatsNew.Store.exe" GOTO SKIP_1_LBL
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_13.txt' -value (Get-AppxPackage -AllUsers Microsoft.Getstarted | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_13.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Get Started App 2 )
DIR /B /S "WhatsNew.Store.exe"> "%~dp0rfrshfrwll_1.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_1.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_1_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "WinStore.App.exe" GOTO SKIP_2_LBL
SET NM_VR_=App Updater ( Microsoft Store App 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_14.txt' -value (Get-AppxPackage -AllUsers Microsoft.WindowsStore | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_14.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store App 2 )
DIR /B /S "WinStore.App.exe"> "%~dp0rfrshfrwll_2.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_2.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_2_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.StorePurchaseApp_*_Arm64__*"
IF NOT EXIST "StoreExperienceHost.exe" GOTO SKIP_3_LBL
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_15.txt' -value (Get-AppxPackage -AllUsers Microsoft.StorePurchaseApp | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_15.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - Experience Host 2 )
DIR /B /S "StoreExperienceHost.exe"> "%~dp0rfrshfrwll_3.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_3.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_3_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.WindowsStore_*_Arm64__*"
IF NOT EXIST "StoreDesktopExtension.exe" GOTO SKIP_4_LBL
SET NM_VR_=App Updater ( Microsoft Store - Desktop Extension )
DIR /B /S "StoreDesktopExtension.exe"> "%~dp0rfrshfrwll_4.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_4.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_4_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "winget.exe" GOTO SKIP_5_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGet )
DIR /B /S "winget.exe"> "%~dp0rfrshfrwll_5.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_5.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_5_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstaller.exe" GOTO SKIP_6_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_16.txt' -value (Get-AppxPackage -AllUsers Microsoft.DesktopAppInstaller | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_16.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 2 )
DIR /B /S "AppInstaller.exe"> "%~dp0rfrshfrwll_6.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_6.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_6_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerFullTrustAppServiceClient.exe" GOTO SKIP_7_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 3 )
DIR /B /S "AppInstallerFullTrustAppServiceClient.exe"> "%~dp0rfrshfrwll_7.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_7.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_7_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AppInstallerPythonRedirector.exe" GOTO SKIP_8_LBL
SET NM_VR_=App Updater ( Microsoft Store - AppInstaller 4 )
DIR /B /S "AppInstallerPythonRedirector.exe"> "%~dp0rfrshfrwll_8.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_8.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_8_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "AuthenticationManager.exe" GOTO SKIP_9_LBL
SET NM_VR_=App Updater ( Microsoft Store - AuthenticationManager )
DIR /B /S "AuthenticationManager.exe"> "%~dp0rfrshfrwll_9.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_9.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_9_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x86__*"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_x64__*"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\Microsoft.DesktopAppInstaller_*_Arm64__*"
IF NOT EXIST "WindowsPackageManagerServer.exe" GOTO SKIP_10_LBL
SET NM_VR_=App Updater ( Microsoft Store - WinGetServer )
DIR /B /S "WindowsPackageManagerServer.exe"> "%~dp0rfrshfrwll_10.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_10.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_10_LBL

IF %Processor_Architecture%==x86 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x86__*\Dashboard"
IF %Processor_Architecture%==AMD64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_x64__*\Dashboard"
IF %Processor_Architecture%==ARM64 CD /D "C:\PROGRA~1\WindowsApps\MicrosoftWindows.Client.WebExperience_*_Arm64__*\Dashboard"
IF NOT EXIST "Widgets.exe" GOTO SKIP_11_LBL
SET NM_VR_=App Updater ( Widgets 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_17.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.WebExperience | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_17.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Widgets 2 )
DIR /B /S "Widgets.exe"> "%~dp0rfrshfrwll_11.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_11.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_11_LBL

CD /D "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_*"
IF NOT EXIST "SearchHost.exe" GOTO SKIP_12_LBL
SET NM_VR_=App Updater ( Search Host - Cortana 1 )
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%~dp0rfrshfrwll_18.txt' -value (Get-AppxPackage -AllUsers MicrosoftWindows.Client.CBS | Format-Table PackageFamilyName -Wrap -AutoSize | Out-String -Stream | Select-String -Pattern 'PackageFamilyName', '-----------------' -NotMatch)}"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_18.txt") DO (CALL :RFRSH_FRWLL_2_ "%%A")
SET NM_VR_=App Updater ( Search Host - Cortana 2 )
DIR /B /S "SearchHost.exe"> "%~dp0rfrshfrwll_12.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0rfrshfrwll_12.txt") DO (CALL :RFRSH_FRWLL_1_ "%%A")
:SKIP_12_LBL

ECHO ENDLOCAL>> "%~dp0RFRSH_FireWall_.bat"
ECHO DEL /Q "%%~dp0RFRSH_FireWall_.bat" 2^> nul>> "%~dp0RFRSH_FireWall_.bat"

GOTO LST_LNE_

:RFRSH_FRWLL_1_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Program '%~s1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:RFRSH_FRWLL_2_
ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%NM_VR_%' -Enabled False -Profile Any -Package '%~1' -Protocol Any}">> "%~dp0RFRSH_FireWall_.bat"
GOTO :EOF

:LST_LNE_

DEL /Q "%~dp0rfrshfrwll_*.txt" 2> nul
CALL "%~dp0RFRSH_FireWall_.bat"
ENDLOCAL
MOVE NUL 2>&0

REM "Windows Defender Firewall with Advanced Security Administration with Windows PowerShell" -> https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell
REM "Configure network infrastructure to support the NLB ( Network Load Balancing ) operation mode" -> https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-network-to-support-nlb-operation-mode
REM "Service overview and network port requirements for Windows" -> https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/service-overview-and-network-port-requirements
REM "2.2.2.19 Firewall Rule and the Firewall Rule Grammar Rule" -> https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-gpfas/2efe0b76-7b4a-41ff-9050-1023f8196d16
REM "To open Windows Defender Firewall from a command prompt" -> https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security

REM_SKP_LBL_3960_12_PRSE

:LST_LNE_DELAMINATE_3960_12_

SET DLM_SKP_=3654
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_13_PRSE GOTO SKP_SRT_3960_13_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Simple_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_13_
GOTO :LST_LNE_DELAMINATE_3960_13_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

SET FN_VAR[0]_=""
SET FN_VAR[1]_=" "
SET FN_VAR[2]_="#"
SET FN_VAR[3]_="$"
SET FN_VAR[4]_="%"
SET FN_VAR[5]_="&"
SET FN_VAR[6]_="'"
SET FN_VAR[7]_="("
SET FN_VAR[8]_=")"
SET FN_VAR[9]_="*"
SET FN_VAR[10]_="+"
SET FN_VAR[11]_=","
SET FN_VAR[12]_="-"
SET FN_VAR[13]_="."
SET FN_VAR[14]_="/"
SET FN_VAR[15]_=":"
SET FN_VAR[16]_=";"
SET FN_VAR[17]_="<"
SET FN_VAR[18]_="="
SET FN_VAR[19]_=">"
SET FN_VAR[20]_="?"
SET FN_VAR[21]_="@"
SET FN_VAR[22]_="["
SET FN_VAR[23]_="\"
SET FN_VAR[24]_="]"
SET FN_VAR[25]_="^"
SET FN_VAR[26]_="`"
SET FN_VAR[27]_="{"
SET FN_VAR[28]_="|"
SET FN_VAR[29]_="}"
SET FN_VAR[30]_="~"
SET FN_VAR_MXCNT_=30

DEL /Q "%~dp0FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul
DEL /Q "%~dp0FrWll_GENERATOR_TMP_SMPL_*_.txt" 2> nul

SET SMPL_SRTFRWLLVAL_=0
IF [%1]==[] GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_
IF NOT %1==BYPASS GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_
IF [%2]==[] GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_

SET ALS_PRM_FrWll_VAR_=%2
CALL :SRT_TMP_SMPL_FrWll_1_ "%ALS_PRM_FrWll_VAR_%"
IF %TMP_SMPL_VAL_% GTR 0 (GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_)
SET ALS_FrWll_STRT=%ALS_PRM_FrWll_VAR_%

IF [%3]==[] GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_

FOR %%A IN (%*) DO (IF EXIST %%A ((SET SMPL_PTH_TST_FrwllVAR_=%%~sfA)&(IF "!SMPL_PTH_TST_FrwllVAR_:~-1!"=="\" (IF EXIST "!SMPL_PTH_TST_FrwllVAR_:~0,-1!" (SET PTH_FrWll_STRT=!SMPL_PTH_TST_FrwllVAR_:~0,-1!)))&(IF NOT "!SMPL_PTH_TST_FrwllVAR_:~-1!"=="\" (SET PTH_FrWll_STRT=!SMPL_PTH_TST_FrwllVAR_!))&((TYPE "%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt"| FIND "!PTH_FrWll_STRT!" /C>"%~dp0FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1)&(SET /P RNGE_SMPLFRWLL_VAL_CHK_=<"%~dp0FrWll_GENERATOR_RNGE_0_SMPL_.txt")&(IF !RNGE_SMPLFRWLL_VAL_CHK_! EQU 0 (ECHO !PTH_FrWll_STRT!>> "%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt"))))

(TYPE "%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt"| FIND /V "" /C> "%~dp0FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1
SET /P RNGE_SMPLFRWLL_VAL_CHK_=<"%~dp0FrWll_GENERATOR_RNGE_0_SMPL_.txt"
IF %RNGE_SMPLFRWLL_VAL_CHK_% EQU 0 (GOTO SMPLSRTLBL_FRWLL_RL_CRTE_0_)

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt") DO ((DIR /B /S /O:N "%%A\*.exe">> "%~dp0FrWll_GENERATOR_RNGE_1_SMPL_.txt") >nul 2>&1)

SET SMPL_SRTFRWLLVAL_=1
GOTO SMPLSRTLBL_FRWLL_RL_CRTE_1_

:SMPLSRTLBL_FRWLL_RL_CRTE_0_

:RESET_LBL_FRWLL_RL_CRTE_SMPLE_
SET TMP_SMPL_VAL_=0
CLS
ECHO ...SELECT FOLDER NAME AND ALIAS FOR FIREWALL SCRIPT GENERATOR
SET /P PTH_PRM_FrWll_VAR_TMP_="[FOLDER NAME]: "
CALL :CVRT_83_PATH_FRWLL_RL_CRTE_SMPLE_ "%PTH_PRM_FrWll_VAR_TMP_%"
IF NOT EXIST "%PTH_PRM_FrWll_VAR_%" (GOTO RESET_LBL_FRWLL_RL_CRTE_SMPLE_)

SET /P ALS_PRM_FrWll_VAR_="[GROUP/ALIAS]: "
CALL :SRT_TMP_SMPL_FrWll_1_ "%ALS_PRM_FrWll_VAR_%"
IF %TMP_SMPL_VAL_% GTR 0 (GOTO RESET_LBL_FRWLL_RL_CRTE_SMPLE_)

IF "%PTH_PRM_FrWll_VAR_:~-1%"=="\" (IF EXIST "%PTH_PRM_FrWll_VAR_:~0,-1%" (SET PTH_FrWll_STRT=%PTH_PRM_FrWll_VAR_:~0,-1%))
IF NOT "%PTH_PRM_FrWll_VAR_:~-1%"=="\" (SET PTH_FrWll_STRT=%PTH_PRM_FrWll_VAR_%)

SET ALS_FrWll_STRT=%ALS_PRM_FrWll_VAR_%

CHOICE /C YN /N /M "FOLDER PATH: [%PTH_FrWll_STRT%] GROUP/ALIAS: [%ALS_FrWll_STRT%] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO RESET_LBL_FRWLL_RL_CRTE_SMPLE_

(DIR /B /S /O:N "%PTH_FrWll_STRT%\*.exe"> "%~dp0FrWll_GENERATOR_RNGE_1_SMPL_.txt") >nul 2>&1

:SMPLSRTLBL_FRWLL_RL_CRTE_1_

TYPE "%~dp0FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

ECHO @ECHO OFF> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"
ECHO SETLOCAL>> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}">> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"

FOR /F "usebackq tokens=*" %%A IN ("%~dp0FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}">> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((ECHO CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}">> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

ECHO ENDLOCAL>> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"
ECHO MOVE NUL 2^>^&^0>> "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat"

IF %SMPL_SRTFRWLLVAL_% EQU 0 (ECHO ...BATCH FILE CREATED: "%~dp0%ALS_FrWll_STRT%-Firewall_Rule_Generator.bat")
IF %SMPL_SRTFRWLLVAL_% EQU 0 PAUSE

GOTO LST_LNE_FRWLL_RL_CRTE_SMPLE_

:SRT_TMP_SMPL_FrWll_1_
IF %1==%FN_VAR[0]_% (ECHO ^1>> "%~dp0FrWll_GENERATOR_TMP_SMPL_1_.txt")
FOR /L %%A IN (1,1,%FN_VAR_MXCNT_%) DO (((ECHO %1| FIND !FN_VAR[%%A]_! /C)>> "%~dp0FrWll_GENERATOR_TMP_SMPL_1_.txt") >nul 2>&1)
(TYPE "%~dp0FrWll_GENERATOR_TMP_SMPL_1_.txt"| FIND "1" /C> "%~dp0FrWll_GENERATOR_TMP_SMPL_2_.txt") >nul 2>&1
SET /P TMP_SMPL_VAL_=<"%~dp0FrWll_GENERATOR_TMP_SMPL_2_.txt"
DEL /Q "%~dp0FrWll_GENERATOR_TMP_SMPL_*_.txt" 2> nul
GOTO :EOF

:CVRT_83_PATH_FRWLL_RL_CRTE_SMPLE_
SET PTH_PRM_FrWll_VAR_=%~sf1
GOTO :EOF

:LST_LNE_FRWLL_RL_CRTE_SMPLE_

DEL /Q "%~dp0FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_13_PRSE

:LST_LNE_DELAMINATE_3960_13_

SET DLM_SKP_=3794
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_14_PRSE GOTO SKP_SRT_3960_14_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Steam_App_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_14_
GOTO :LST_LNE_DELAMINATE_3960_14_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0Steam_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

REG QUERY "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Steam"| FINDSTR /RC:"UninstallString"> "%~dp0Steam_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Steam_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A)
IF NOT EXIST "%TMP_VAR_:~33,-14%" GOTO STEAM_APP_FR_WLL_LST_LNE

IF [%1]==[] GOTO STEAM_APP_FR_WLL_SKP_LBL_1_
IF %1==BYPASS GOTO STEAM_APP_FR_WLL_SKP_LBL_2_

:STEAM_APP_FR_WLL_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "CREATING FIREWALL RULES FOR: [%TMP_VAR_:~33,-14%] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO STEAM_APP_FR_WLL_LST_LNE
:STEAM_APP_FR_WLL_SKP_LBL_2_

SET ALS_FrWll_STRT=Steam_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

DIR /B /S /O:N "%TMP_VAR_:~33,-14%\*.exe"> "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrA.exe" ECHO C:\Windows\system32\PnkBstrA.exe>> "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrB.exe" ECHO C:\Windows\system32\PnkBstrB.exe>> "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrA.exe" ECHO C:\Windows\SysWOW64\PnkBstrA.exe>> "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrB.exe" ECHO C:\Windows\SysWOW64\PnkBstrB.exe>> "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

TYPE "%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0Steam_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0Steam_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0Steam_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

:STEAM_APP_FR_WLL_LST_LNE

DEL /Q "%~dp0Steam_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_14_PRSE

:LST_LNE_DELAMINATE_3960_14_

SET DLM_SKP_=3850
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_15_PRSE GOTO SKP_SRT_3960_15_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Temp_Firewall_Rule_Generator.bat")
:SKP_SRT_3960_15_
GOTO :LST_LNE_DELAMINATE_3960_15_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

(WMIC PROCESS LIST FULL| FIND "cmd.exe"| FIND "Temp_Firewall_Rule_Generator.bat")> "%~dp0TempFrWll_Initial_Test_Script_1.txt" 2>nul
TYPE "%~dp0TempFrWll_Initial_Test_Script_1.txt" | FIND /V "" /C> "%~dp0TempFrWll_Initial_Test_Script_2.txt"
SET /P INITIAL_RL_TEST=<"%~dp0TempFrWll_Initial_Test_Script_2.txt"
DEL /Q "%~dp0TempFrWll_Initial_Test_Script_*.txt" 2>nul
IF %INITIAL_RL_TEST% GTR 1 GOTO END_LBL_

IF [%1]==[] GOTO SKP_RSTRT_LBL_
IF %1==TMP_RESTART_CHK (SET TMP_RSTRT_VAL=1)
IF %1==TMP_LAST_CHK (SET TMP_LAST_VAL=1)
:SKP_RSTRT_LBL_

IF [%TMP_LAST_VAL%]==[] GOTO SKP_SRT_LNE_0_
IF EXIST "%~dp0Temp_Firewall_Rule_Cleanup.bat" DEL /Q "%~dp0Temp_Firewall_Rule_Cleanup.bat" 2>nul
IF EXIST "%~dp0Temp_Firewall_Rule_Script.bat" DEL /Q "%~dp0Temp_Firewall_Rule_Script.bat" 2>nul
GOTO END_LBL_
:SKP_SRT_LNE_0_

IF [%TMP_RSTRT_VAL%]==[] GOTO SKP_SRT_LNE_1_
GOTO SKP_SRT_LNE_2_
:SKP_SRT_LNE_1_

ECHO @ECHO OFF> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO SETLOCAL>> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO CMD /Q /C START /REALTIME /WAIT /B %%~dp0Temp_Firewall_Rule_Generator.bat TMP_RESTART_CHK>> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO CMD /Q /C START /MIN /REALTIME /WAIT /B %%~dp0Temp_Firewall_Rule_Cleanup.bat>> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO CMD /Q /C START /MIN /REALTIME %%~dp0Temp_Firewall_Rule_Generator.bat TMP_LAST_CHK>> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO ENDLOCAL>> "%~dp0Temp_Firewall_Rule_Script.bat"
ECHO MOVE NUL 2^>^&^0>> "%~dp0Temp_Firewall_Rule_Script.bat"

ECHO @ECHO OFF> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO SETLOCAL>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'TMP_Firewall_Rule_*_'}">> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0Duplicate_Sort_List_Generic_LineCount.txt" DEL /Q "%%~dp0Duplicate_Sort_List_Generic_LineCount.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0Duplicate_Sort_List_Duplicates_*_.txt" DEL /Q "%%~dp0Duplicate_Sort_List_Duplicates_*_.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0Unsorted_FireWall_List.txt" DEL /Q "%%~dp0Unsorted_FireWall_List.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0Sorted_FireWall_List.txt" DEL /Q "%%~dp0Sorted_FireWall_List.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0Sorted_List_TMP_*_.txt" DEL /Q "%%~dp0Sorted_List_TMP_*_.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TMP_SRT" RMDIR /S /Q "%%~dp0TMP_SRT" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Rulelist_*.txt" DEL /Q "%%~dp0TempFrWll_Rulelist_*.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Rule_Test_Script_*.txt" DEL /Q "%%~dp0TempFrWll_Rule_Test_Script_*.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Prcss_LneCnt.txt" DEL /Q "%%~dp0TempFrWll_Prcss_LneCnt.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Rulelist_LneCnt.txt" DEL /Q "%%~dp0TempFrWll_Rulelist_LneCnt.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt" DEL /Q "%%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO IF EXIST "%%~dp0TempFrWll_Implemented_Rule_Cntr.txt" DEL /Q "%%~dp0TempFrWll_Implemented_Rule_Cntr.txt" 2^>nul>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO ENDLOCAL>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"
ECHO MOVE NUL 2^>^&^0>> "%~dp0Temp_Firewall_Rule_Cleanup.bat"

CMD /Q /C START /MIN /REALTIME /WAIT /B %~dp0Temp_Firewall_Rule_Cleanup.bat
CMD /Q /C START /REALTIME %~dp0Temp_Firewall_Rule_Script.bat

GOTO END_LBL_
:SKP_SRT_LNE_2_

SET TMP_IMP_RL_CNTR_=0
SET LAPSE_30_S_=0
(ECHO %TMP_IMP_RL_CNTR_%)> "%~dp0TempFrWll_Implemented_Rule_Cntr.txt" 2>nul
CALL :ERSE_TMPFLS_
CALL :INITIAL_CVRT_

GOTO STRT_FRWLL_LBL_

:INITIAL_CVRT_

(WMIC PROCESS LIST FULL| FINDSTR /BIC:"ExecutablePath=C:\Users\%UserName%\AppData\Local\Temp"&WMIC PROCESS LIST FULL| FINDSTR /BIC:"ExecutablePath=C:\Windows\Temp")> "%~dp0TempFrWll_Rule_Test_Script_0.txt" 2>nul
TYPE "%~dp0TempFrWll_Rule_Test_Script_0.txt"| FIND /V "" /C> "%~dp0TempFrWll_Rule_Test_Script_2.txt"
SET /P MXVL_0_=<"%~dp0TempFrWll_Rule_Test_Script_2.txt"
IF %MXVL_0_% EQU 0 (CALL :SERIAL_FRWLL_RL_CLN_&GOTO STRT_FRWLL_LBL_)
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rule_Test_Script_0.txt") DO (SET TMP_XVERT_1_=%%A&ECHO !TMP_XVERT_1_:~15!>> "%~dp0TempFrWll_Rule_Test_Script_1.txt")
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rule_Test_Script_1.txt") DO (ECHO %%~sfA>> "%~dp0Unsorted_FireWall_List.txt")
DEL /Q "%~dp0TempFrWll_Rule_Test_Script_*.txt" 2>nul
CALL :DUPLICATE_SORT
MOVE /Y "%~dp0Sorted_FireWall_List.txt" "%~dp0TempFrWll_Rulelist_1.txt" >nul
TYPE "%~dp0TempFrWll_Rulelist_1.txt"| FIND /V "" /C> "%~dp0TempFrWll_Rulelist_LneCnt.txt"
SET /P MXVL_1_=<"%~dp0TempFrWll_Rulelist_LneCnt.txt"
DEL /Q "%~dp0TempFrWll_Rulelist_LneCnt.txt" 2>nul
IF %MXVL_1_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rulelist_1.txt") DO (CALL :CRTE_FRWLL_RL "%%A")
GOTO :EOF

:STRT_FRWLL_LBL_

(WMIC PROCESS LIST FULL| FINDSTR /BIC:"ExecutablePath=C:\Users\%UserName%\AppData\Local\Temp"&WMIC PROCESS LIST FULL| FINDSTR /BIC:"ExecutablePath=C:\Windows\Temp")> "%~dp0TempFrWll_Rule_Test_Script_0.txt" 2>nul
TYPE "%~dp0TempFrWll_Rule_Test_Script_0.txt"| FIND /V "" /C> "%~dp0TempFrWll_Rule_Test_Script_2.txt"
SET /P MXVL_0_=<"%~dp0TempFrWll_Rule_Test_Script_2.txt"
IF %MXVL_0_% EQU 0 (SET MXVL_2_=0&GOTO SKP_STRT_FRWLL_LBL_)
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rule_Test_Script_0.txt") DO (SET TMP_XVERT_1_=%%A&ECHO !TMP_XVERT_1_:~15!>> "%~dp0TempFrWll_Rule_Test_Script_1.txt")
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rule_Test_Script_1.txt") DO (ECHO %%~sfA>> "%~dp0Unsorted_FireWall_List.txt")
DEL /Q "%~dp0TempFrWll_Rule_Test_Script_*.txt" 2>nul
CALL :DUPLICATE_SORT
MOVE /Y "%~dp0Sorted_FireWall_List.txt" "%~dp0TempFrWll_Rulelist_2.txt" >nul
TYPE "%~dp0TempFrWll_Rulelist_2.txt"| FIND /V "" /C> "%~dp0TempFrWll_Prcss_LneCnt.txt"
SET /P MXVL_2_=<"%~dp0TempFrWll_Prcss_LneCnt.txt"
DEL /Q "%~dp0TempFrWll_Prcss_LneCnt.txt" 2>nul
:SKP_STRT_FRWLL_LBL_
IF %MXVL_2_% EQU 0 (SET /A LAPSE_30_S_+=1) ELSE (SET LAPSE_30_S_=0)
IF %MXVL_2_% EQU 0 (CALL :SERIAL_FRWLL_RL_CLN_&GOTO LST_FRWLL_LBL_)
IF %MXVL_2_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TempFrWll_Rulelist_2.txt") DO (CALL :SRT_LBL_INERNAL_ "%%A")
IF %MXVL_2_% GTR 0 MOVE /Y "%~dp0TempFrWll_Rulelist_1.txt" "%~dp0Unsorted_FireWall_List.txt" >nul
IF %MXVL_2_% GTR 0 CALL :DUPLICATE_SORT
IF %MXVL_2_% GTR 0 MOVE /Y "%~dp0Sorted_FireWall_List.txt" "%~dp0TempFrWll_Rulelist_1.txt" >nul

:LST_FRWLL_LBL_

IF EXIST "%~dp0TempFrWll_Rulelist_2.txt" DEL /Q "%~dp0TempFrWll_Rulelist_2.txt" 2>nul
CLS
ECHO:
ECHO [TEMPORARY FIREWALL RULES IN EFFECT:] %TMP_IMP_RL_CNTR_%
ECHO [TEMPORARY PROCESSES IN MEMORY:] %MXVL_2_%
ECHO [RESET TIMER 0-30]: %LAPSE_30_S_%
ECHO:
IF %LAPSE_30_S_% EQU 30 (GOTO END_LBL_)

GOTO STRT_FRWLL_LBL_

:SRT_LBL_INERNAL_
(TYPE "%~dp0TempFrWll_Rulelist_1.txt"| FIND "%~1" /C)> "%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt" 2>nul
SET /P TMP_FR_RL_PRCSS_CHK_=<"%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt"
IF %TMP_FR_RL_PRCSS_CHK_% EQU 0 (ECHO %1>> "%~dp0TempFrWll_Rulelist_1.txt")
IF %TMP_FR_RL_PRCSS_CHK_% EQU 0 (CALL :CRTE_FRWLL_RL %1)
GOTO :EOF

:SERIAL_FRWLL_RL_CLN_
IF %TMP_IMP_RL_CNTR_% EQU 0 GOTO SKP_FRWLL_RL_CLN_
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'TMP_Firewall_Rule_*_'}"
SET TMP_IMP_RL_CNTR_=0
(ECHO %TMP_IMP_RL_CNTR_%)> "%~dp0TempFrWll_Implemented_Rule_Cntr.txt" 2>nul
:SKP_FRWLL_RL_CLN_
GOTO :EOF

:CRTE_FRWLL_RL
SET /A TMP_IMP_RL_CNTR_+=1
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'TMP_Firewall_Rule_%TMP_IMP_RL_CNTR_%_' -Profile Any -Program '%1' -Protocol Any}"
(ECHO %TMP_IMP_RL_CNTR_%)> "%~dp0TempFrWll_Implemented_Rule_Cntr.txt" 2>nul
GOTO :EOF

:ERSE_TMPFLS_
IF EXIST "%~dp0TempFrWll_Rulelist_*.txt" DEL /Q "%~dp0TempFrWll_Rulelist_*.txt" 2>nul
IF EXIST "%~dp0TempFrWll_Rule_Test_Script_*.txt" DEL /Q "%~dp0TempFrWll_Rule_Test_Script_*.txt" 2>nul
IF EXIST "%~dp0TempFrWll_Prcss_LneCnt.txt" DEL /Q "%~dp0TempFrWll_Prcss_LneCnt.txt" 2>nul
IF EXIST "%~dp0TempFrWll_Rulelist_LneCnt.txt" DEL /Q "%~dp0TempFrWll_Rulelist_LneCnt.txt" 2>nul
IF EXIST "%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt" DEL /Q "%~dp0TempFrWll_Parsed_PrcssList_LneCnt.txt" 2>nul
GOTO :EOF

:DUPLICATE_SORT
IF EXIST "%~dp0Duplicate_Sort_List_Generic_LineCount.txt" DEL /Q "%~dp0Duplicate_Sort_List_Generic_LineCount.txt" 2>nul
IF EXIST "%~dp0Duplicate_Sort_List_Duplicates_*_.txt" DEL /Q "%~dp0Duplicate_Sort_List_Duplicates_*_.txt" 2>nul
IF EXIST "%~dp0Sorted_List_TMP_*_.txt" DEL /Q "%~dp0Sorted_List_TMP_*_.txt" 2>nul
IF EXIST "%~dp0Sorted_FireWall_List.txt" DEL /Q "%~dp0Sorted_FireWall_List.txt" 2>nul
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Unsorted_FireWall_List.txt") DO (ECHO "%%A">> "%~dp0Sorted_List_TMP_1_.txt")
TYPE "%~dp0Sorted_List_TMP_1_.txt"| SORT /+2 /O "%~dp0Duplicate_Sort_List_Duplicates_1_.txt"
TYPE "%~dp0Duplicate_Sort_List_Duplicates_1_.txt"| FIND "" /V /C> "%~dp0Duplicate_Sort_List_Generic_LineCount.txt"
DEL /Q "%~dp0Sorted_List_TMP_*_.txt" 2>nul
SET /P MX_SRT_VAL_=<"%~dp0Duplicate_Sort_List_Generic_LineCount.txt"
IF EXIST "%~dp0TMP_SRT" RMDIR /S /Q "%~dp0TMP_SRT"
IF NOT EXIST "%~dp0TMP_SRT" MKDIR "%~dp0TMP_SRT"
SET CNTR_NUM=1
FOR /F "usebackq tokens=*" %%A IN ("%~dp0Duplicate_Sort_List_Duplicates_1_.txt") DO (ECHO [!CNTR_NUM!]%%A>> "%~dp0Duplicate_Sort_List_Duplicates_2_.txt"&SET /A CNTR_NUM+=1)
FOR /L %%A IN (1,1,%MX_SRT_VAL_%) DO ((TYPE "%~dp0Duplicate_Sort_List_Duplicates_2_.txt"| FINDSTR /BRC:"\[%%A\]")> "%~dp0TMP_SRT\ENTRY_%%A_SRT.txt" 2>nul)
TYPE "%~dp0TMP_SRT\ENTRY_1_SRT.txt"> "%~dp0Duplicate_Sort_List_Duplicates_5_.txt"
FOR /L %%A IN (2,1,%MX_SRT_VAL_%) DO (CALL :TMP_SRT_ %%A)
FOR /F "usebackq tokens=2 delims=[]" %%A IN ("%~dp0Duplicate_Sort_List_Duplicates_5_.txt") DO (ECHO %%~A>> "%~dp0Sorted_FireWall_List.txt")
GOTO LST_LNE_
:TMP_SRT_
FOR /F "usebackq tokens=2 delims=[]" %%A IN ("%~dp0TMP_SRT\ENTRY_%1_SRT.txt") DO (SET TMP_SRT_VAL_=%%A)
(TYPE "%~dp0Duplicate_Sort_List_Duplicates_5_.txt"| FIND %TMP_SRT_VAL_% /C)> "%~dp0Duplicate_Sort_List_Duplicates_6_.txt" 2>nul
SET /P RNGCHK_[%1]_=<"%~dp0Duplicate_Sort_List_Duplicates_6_.txt"
IF !RNGCHK_[%1]_! LSS 1 (TYPE "%~dp0TMP_SRT\ENTRY_%1_SRT.txt">> "%~dp0Duplicate_Sort_List_Duplicates_5_.txt")
GOTO :EOF
:LST_LNE_
DEL /Q "%~dp0Duplicate_Sort_List_Generic_LineCount.txt" 2>nul
DEL /Q "%~dp0Duplicate_Sort_List_Duplicates_*_.txt" 2>nul
DEL /Q "%~dp0Unsorted_FireWall_List.txt" 2>nul
RMDIR /S /Q "%~dp0TMP_SRT"
GOTO :EOF

:END_LBL_

IF EXIST "%~dp0TempFrWll_Implemented_Rule_Cntr.txt" DEL /Q "%~dp0TempFrWll_Implemented_Rule_Cntr.txt" 2>nul
IF EXIST "%~dp0Unsorted_FireWall_List.txt" DEL /Q "%~dp0Unsorted_FireWall_List.txt" 2>nul
IF EXIST "%~dp0Sorted_FireWall_List.txt" DEL /Q "%~dp0Sorted_FireWall_List.txt" 2>nul

REM CALL Temp_Firewall_Rule_Generator.bat> "Temp_Firewall_Rule_Log.txt" 2>nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_15_PRSE

:LST_LNE_DELAMINATE_3960_15_

SET DLM_SKP_=4047
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_16_PRSE GOTO SKP_SRT_3960_16_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Ubisoft_Connect_App_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_16_
GOTO :LST_LNE_DELAMINATE_3960_16_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
CD /D "%~dp0"
DEL /Q "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

IF NOT EXIST "%LocalAppData%\Ubisoft Game Launcher\settings.yaml" GOTO UBISOFT_LAUNCHER_FR_WLL_LST_LNE
IF NOT EXIST "%ProgramFiles(x86)%\Ubisoft\Ubisoft Game Launcher" GOTO UBISOFT_LAUNCHER_FR_WLL_LST_LNE
IF NOT EXIST "%ProgramData%\Ubisoft\Ubisoft Game Launcher" GOTO UBISOFT_LAUNCHER_FR_WLL_LST_LNE

(TYPE "%LocalAppData%\Ubisoft Game Launcher\settings.yaml"| FIND "game_installation_path"> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1

TYPE "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P UBISOFT_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0UBISOFT_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %UBISOFT_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO UBISOFT_LAUNCHER_FR_WLL_SKP_CHK_0_

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO !TMP_VAR_:~26!> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
CALL :UBISOFT_LAUNCHER_FR_WLL_PRE_SRT_

:UBISOFT_LAUNCHER_FR_WLL_SKP_CHK_0_

(TYPE "%LocalAppData%\Ubisoft Game Launcher\settings.yaml"| FIND "installer_cache_path"> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt") >nul 2>&1

TYPE "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt"| FIND /V "" /C> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
SET /P UBISOFT_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_=<"%~dp0UBISOFT_FrWll_GENERATOR_RNGE_3_SMPL_.txt"
IF %UBISOFT_LAUNCHER_FR_WLL_TST_SRT_VAL_RNGE_% EQU 0 GOTO UBISOFT_LAUNCHER_FR_WLL_SKP_CHK_1_

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A&ECHO !TMP_VAR_:~24!> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
CALL :UBISOFT_LAUNCHER_FR_WLL_PRE_SRT_

:UBISOFT_LAUNCHER_FR_WLL_SKP_CHK_1_

SETLOCAL DisableDelayedExpansion
DEL /Q "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt" 2> nul
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_2_SMPL_.txt") DO (ECHO %%~A>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
SETLOCAL EnableDelayedExpansion

ECHO %ProgramFiles(x86)%\Ubisoft\Ubisoft Game Launcher^\>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
ECHO %ProgramData%\Ubisoft\Ubisoft Game Launcher^\>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO (SET TMP_VAR_=%%A&IF EXIST "!TMP_VAR_:~0,-1!" ((DIR /B /S /O:N "!TMP_VAR_:~0,-1!\*.exe">> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_4_SMPL_.txt") >nul 2>&1))
TYPE "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_4_SMPL_.txt"> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrA.exe" ECHO C:\Windows\system32\PnkBstrA.exe>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\system32\PnkBstrB.exe" ECHO C:\Windows\system32\PnkBstrB.exe>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrA.exe" ECHO C:\Windows\SysWOW64\PnkBstrA.exe>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
IF EXIST "C:\Windows\SysWOW64\PnkBstrB.exe" ECHO C:\Windows\SysWOW64\PnkBstrB.exe>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

IF [%1]==[] GOTO UBISOFT_LAUNCHER_FR_WLL_SKP_LBL_1_
IF %1==BYPASS GOTO UBISOFT_LAUNCHER_FR_WLL_SKP_LBL_2_

:UBISOFT_LAUNCHER_FR_WLL_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "CREATING FIREWALL RULES FOR: [%ProgramFiles(x86)%\Ubisoft\Ubisoft Game Launcher\] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO UBISOFT_LAUNCHER_FR_WLL_LST_LNE
:UBISOFT_LAUNCHER_FR_WLL_SKP_LBL_2_

SET ALS_FrWll_STRT=Ubisoft_Connect_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

TYPE "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P FRWLL_MAX_CNTR_NUM=<"%~dp0UBISOFT_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

GOTO UBISOFT_LAUNCHER_FR_WLL_LST_LNE

:UBISOFT_LAUNCHER_FR_WLL_PRE_SRT_
(SET UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_=)
(SET UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_2_=)

FOR /L %%A IN (1,1,100) DO (CALL :UBISOFT_LAUNCHER_FR_WLL_TST_ %%A)

(ECHO "%UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_2_%")>> "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

GOTO UBISOFT_LAUNCHER_INNR_FRWLL_LST_LNE_
:UBISOFT_LAUNCHER_FR_WLL_TST_
FOR /F "usebackq tokens=%1 delims=/" %%A IN ("%~dp0UBISOFT_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_=!UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_2_!%%A^\)&(SET UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_2_=!UBISOFT_LAUNCHER_FR_WLL_TMP_VAR_!))
GOTO :EOF
:UBISOFT_LAUNCHER_INNR_FRWLL_LST_LNE_
GOTO :EOF

:UBISOFT_LAUNCHER_FR_WLL_LST_LNE

DEL /Q "%~dp0UBISOFT_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_16_PRSE

:LST_LNE_DELAMINATE_3960_16_

SET DLM_SKP_=4151
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3960_17_PRSE GOTO SKP_SRT_3960_17_)&&ECHO %%A>> "C:\Patches\Batch_Files\Firewall\Visual_Studio_Firewall_Rule_Creator.bat")
:SKP_SRT_3960_17_
GOTO :LST_LNE_DELAMINATE_3960_17_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" GOTO VS_SRT_FRWLL_LSTLNE_
REG QUERY "HKLM\SOFTWARE\Microsoft\VisualStudio\Setup"| FINDSTR /RC:"SharedInstallationPath"> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (SET TMP_VAR_=%%A)
IF NOT EXIST "%TMP_VAR_:~40%" GOTO VS_SRT_FRWLL_LSTLNE_

SET ALS_FrWll_STRT=Visual_Studio_App

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName '%ALS_FrWll_STRT% * ( * )'}"

"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[15.0^,15.9999^) -requires Microsoft.VisualStudio.Product.Community -property installationPath> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[16.0^,16.9999^) -requires Microsoft.VisualStudio.Product.Community -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[17.0^,17.9999^) -requires Microsoft.VisualStudio.Product.Community -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"

"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[15.0^,15.9999^) -requires Microsoft.VisualStudio.Product.Professional -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[16.0^,16.9999^) -requires Microsoft.VisualStudio.Product.Professional -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[17.0^,17.9999^) -requires Microsoft.VisualStudio.Product.Professional -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"

"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[15.0^,15.9999^) -requires Microsoft.VisualStudio.Product.Enterprise -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[16.0^,16.9999^) -requires Microsoft.VisualStudio.Product.Enterprise -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"
"%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\vswhere.exe" -latest -nocolor -nologo -utf8 -version ^[17.0^,17.9999^) -requires Microsoft.VisualStudio.Product.Enterprise -property installationPath>> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt"

DIR /B /S /O:N "%ProgramFiles(x86)%\Microsoft Visual Studio\Installer\*.exe"> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_0_SMPL_.txt") DO (DIR /B /S /O:N "%%A\*.exe">> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt")
DIR /B /S /O:N "%TMP_VAR_:~40%\*.exe">> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
DIR /B /S /O:N "%ProgramFiles(x86)%\Incredibuild\*.exe">> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt"
DIR /B /S /O:N "%ProgramFiles(x86)%\Microsoft Help Viewer\*.exe">> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt"

TYPE "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt"| FIND /V "" /C> "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_2_SMPL_.txt"
SET /P VS_APP_FRWLL_LNE_CNT_=<"%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_2_SMPL_.txt"

IF [%1]==[] GOTO VS_FRWLL_SRT_SKP_LBL_1_
IF %1==BYPASS GOTO VS_FRWLL_SRT_SKP_LBL_2_

:VS_FRWLL_SRT_SKP_LBL_1_
CLS
CHOICE /C YN /N /M "...CREATING %VS_APP_FRWLL_LNE_CNT_% FIREWALL RULES FOR VISUAL STUDIO <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO VS_SRT_FRWLL_LSTLNE_
:VS_FRWLL_SRT_SKP_LBL_2_

SET FRWLL_CNTR_NUM=1
SET FRWLL_INNR_CNTR_NUM=0
SET FRWLL_MAX_CNTR_NUM=%VS_APP_FRWLL_LNE_CNT_%
(SET FRWLLSRTRNGE_TMP_VAR_=)
(SET FRWLLSRTRNGE_TMP_VAR_2_=)
SET PDVAR_1=^^(
SET PDVAR_2=^^)

FOR /F "usebackq tokens=*" %%A IN ("%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_1_SMPL_.txt") DO ((SET _FRWLL_RL_SRT_=New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName '%ALS_FrWll_STRT% !FRWLL_CNTR_NUM! %PDVAR_1% %%~nA %PDVAR_2%' -Profile Any -Program '%%~sfA' -Protocol Any;)&(SET FRWLLSRTRNGE_TMP_VAR_=!FRWLLSRTRNGE_TMP_VAR_2_!!_FRWLL_RL_SRT_!)&(SET FRWLLSRTRNGE_TMP_VAR_2_=!FRWLLSRTRNGE_TMP_VAR_!)&(SET /A FRWLL_CNTR_NUM+=1)&(SET /A FRWLL_INNR_CNTR_NUM+=1)&(IF !FRWLL_CNTR_NUM! GTR %FRWLL_MAX_CNTR_NUM% (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}"))&(IF !FRWLL_INNR_CNTR_NUM! EQU 25 ((CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {!FRWLLSRTRNGE_TMP_VAR_2_!}")&(SET FRWLLSRTRNGE_TMP_VAR_2_=)&(SET FRWLL_INNR_CNTR_NUM=0))))

:VS_SRT_FRWLL_LSTLNE_

DEL /Q "%~dp0Visual_Studio_FrWll_GENERATOR_RNGE_*_SMPL_.txt" 2> nul

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3960_17_PRSE

:LST_LNE_DELAMINATE_3960_17_

SET DLM_SKP_=4221
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3966_1_PRSE GOTO SKP_SRT_3966_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\ACL\SET_ACL_CnC_ZH.bat")
:SKP_SRT_3966_1_
GOTO :LST_LNE_DELAMINATE_3966_1_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

IF NOT EXIST "%LocalAppData%\Electronic Arts\EA Desktop\user_*.ini" GOTO LST_LNE
IF NOT EXIST "C:\ProgramData\EA Desktop\InstallData\Command and Conquer Generals Zero Hour" GOTO CNCZH_MODIFYACL_LST_LNE_

IF [%1]==[] GOTO CNCZH_MODIFYACL_SKP_LBL_
IF %1==RESET (SET CNCZH_MODIFYACL_TMP_VAR_REV=1)
:CNCZH_MODIFYACL_SKP_LBL_

(TYPE "%LocalAppData%\Electronic Arts\EA Desktop\user_*.ini"| FIND "user.downloadinplacedir"> "%~dp0TMP_SRT_ACL_CNC_ZH_.txt") >nul 2>&1
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0TMP_SRT_ACL_CNC_ZH_.txt") DO (SET TMP_VAR_=%%A&CALL :SRT_ACL_CNC_ZH_1_ "!TMP_VAR_:~24!")

GOTO CNCZH_MODIFYACL_LST_LNE_

:SRT_ACL_CNC_ZH_1_
DEL /Q "%~dp0TMP_SRT_ACL_CNC_ZH_.txt" 2>&1
IF EXIST "%~1Command and Conquer Generals Zero Hour\Command and Conquer Generals\dbghelp.dll" CALL :SRT_ACL_CNC_ZH_2_ "%~1Command and Conquer Generals Zero Hour\Command and Conquer Generals\dbghelp.dll"
IF EXIST "%~1Command and Conquer Generals Zero Hour\Command and Conquer Generals\dbghelp.dll" CALL :SRT_ACL_CNC_ZH_2_ "%~1Command and Conquer Generals Zero Hour\Command and Conquer Generals Zero Hour\dbghelp.dll"
GOTO :EOF

:SRT_ACL_CNC_ZH_2_
TAKEOWN /A /F %1
REM THE FOLLOWING LINE REVERSES THE CHANGES
IF [%CNCZH_MODIFYACL_TMP_VAR_REV%]==[] GOTO CNCZH_MODIFYACL_SKP_LNE_1_
ICACLS %1 /RESET /C /L /Q
GOTO CNCZH_MODIFYACL_SKP_LNE_2_
:CNCZH_MODIFYACL_SKP_LNE_1_
ICACLS %1 /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS %1 /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
:CNCZH_MODIFYACL_SKP_LNE_2_
GOTO :EOF

:CNCZH_MODIFYACL_LST_LNE_

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3966_1_PRSE

:LST_LNE_DELAMINATE_3966_1_
SET DLM_SKP_=4274
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3966_2_PRSE GOTO SKP_SRT_3966_2_)&&ECHO %%A>> "C:\Patches\Batch_Files\ACL\WinPE_8_3_Reset_C_Drive_Wipe_ACL_Disable_ELAM_SmartScreen.bat")
:SKP_SRT_3966_2_
GOTO :LST_LNE_DELAMINATE_3966_2_

@ECHO OFF
SETLOCAL
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++

REM Batch file to reset ACLs to default on WinPE for offline images only:

CD /D "%~dp0"
IF EXIST "ROOT_" RMDIR /S /Q "ROOT_"
MKDIR "ROOT_"

ICACLS "ROOT_" /SETOWNER Administrators /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT SERVICE\TrustedInstaller":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\SYSTEM":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Users":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Administrators":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\Authenticated Users":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL RESTRICTED APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /REMOVE "Everyone" /C /L /Q

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Acl -Path 'ROOT_' | Set-Acl -Path 'C:'}"

RMDIR /S /Q "ROOT_"

DIR /B /A:D C:\| FIND "Documents and Settings" /V> "%~dp0rootlist_.txt"

ECHO @ECHO OFF> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO SETLOCAL>> "%~dp0WinPE_TMP_SCRPT_1_.bat"

ECHO:>> "%~dp0WinPE_TMP_SCRPT_1_.bat"

FOR /F "usebackq tokens=*" %%A IN ("%~dp0rootlist_.txt") DO (ECHO CALL :WINPE_TMP_RST_ "C:\%%A">> "%~dp0WinPE_TMP_SCRPT_1_.bat")

DEL /Q "%~dp0rootlist_.txt" 2> nul
ECHO GOTO LST_LNE_>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO:>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO :WINPE_TMP_RST_>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO:>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO FOR /R "%%~sf1" %%%%A IN (.) DO (TAKEOWN /A /F "%%%%~sfA")>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "CREATOR OWNER" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "NT SERVICE\TrustedInstaller":(OI)(CI)(F) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "NT AUTHORITY\SYSTEM":(OI)(CI)(F) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "BUILTIN\Users" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "BUILTIN\Users":(OI)(CI)(F) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "BUILTIN\Administrators" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "BUILTIN\Administrators":(OI)(CI)(F) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "NT AUTHORITY\Authenticated Users":(OI)(CI)(RX) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "ALL APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /INHERITANCE:R /GRANT:R "ALL RESTRICTED APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ICACLS "%%~sf1" /REMOVE "Everyone" /C /L /Q>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO FOR /R "%%~sf1" %%%%A IN (.) DO (ICACLS "%%%%~sfA" /SETOWNER Administrators /C /L /Q)>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO FOR /R "%%~sf1" %%%%A IN (.) DO (ICACLS "%%%%~sfA" /RESET /C /L /Q)>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO:>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO GOTO :EOF>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO:>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO :LST_LNE_>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO ENDLOCAL>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
ECHO DEL /Q "%%~dp0WinPE_TMP_SCRPT_1_.bat" 2^> nul>> "%~dp0WinPE_TMP_SCRPT_1_.bat"
CALL "%~dp0WinPE_TMP_SCRPT_1_.bat"

IF %Processor_Architecture%==ARM64 (SDELETE64A -ACCEPTEULA -R -S -NOBANNER "C:\$Recycle.Bin\*.*")
IF %Processor_Architecture%==AMD64 (SDELETE64 -ACCEPTEULA -R -S -NOBANNER "C:\$Recycle.Bin\*.*")
IF %Processor_Architecture%==x86 (SDELETE -ACCEPTEULA -R -S -NOBANNER "C:\$Recycle.Bin\*.*")

REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++

REM This batch file disables the default ELAM drivers / Windows Defender / SmartScreen and removes the default ACLs

BCDEDIT /SET {default} QUIETBOOT TRUE
BCDEDIT /SET {default} BOOTLOG FALSE
BCDEDIT /SET {default} BOOTMENUPOLICY LEGACY
BCDEDIT /SET {default} USEPLATFORMCLOCK TRUE
BCDEDIT /SET {default} TPMBOOTENTROPY FORCEENABLE
BCDEDIT /SET {default} TSCSYNCPOLICY ENHANCED
BCDEDIT /SET {default} DISABLEDYNAMICTICK FALSE
BCDEDIT /SET {default} NX OPTOUT
BCDEDIT /SET {default} PAE DEFAULT
BCDEDIT /SET {default} DISABLEELAMDRIVERS TRUE
ICACLS "C:\Windows\System32\smartscreen.exe" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /SETOWNER Administrators /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /SETOWNER Administrators /T /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /RESET /T /C /L /Q
IF %Processor_Architecture%==ARM64 (SDELETE64A -ACCEPTEULA -R -S -NOBANNER "C:\Program Files (x86)\Windows Defender")
IF %Processor_Architecture%==AMD64 (SDELETE64 -ACCEPTEULA -R -S -NOBANNER "C:\Program Files (x86)\Windows Defender")
IF %Processor_Architecture%==x86 (SDELETE -ACCEPTEULA -R -S -NOBANNER "C:\Program Files (x86)\Windows Defender")
MKDIR "C:\Program Files (x86)\Windows Defender"
ICACLS "C:\Program Files (x86)\Windows Defender" /SETOWNER Administrators /T /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Program Files (x86)\Windows Defender" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /SETOWNER Administrators /T /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /RESET /T /C /L /Q
IF %Processor_Architecture%==ARM64 (SDELETE64A -ACCEPTEULA -R -S -NOBANNER "C:\Program Files\Windows Defender")
IF %Processor_Architecture%==AMD64 (SDELETE64 -ACCEPTEULA -R -S -NOBANNER "C:\Program Files\Windows Defender")
IF %Processor_Architecture%==x86 (SDELETE -ACCEPTEULA -R -S -NOBANNER "C:\Program Files\Windows Defender")
MKDIR "C:\Program Files\Windows Defender"
ICACLS "C:\Program Files\Windows Defender" /SETOWNER Administrators /T /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Program Files\Windows Defender" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q

REM CALL WinPE_8_3_Reset_C_Drive_Wipe_ACL_Disable_ELAM_SmartScreen.bat> "WinPE_Reset_ACL_Log.txt" 2>&1

REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
ENDLOCAL

REM_SKP_LBL_3966_2_PRSE

:LST_LNE_DELAMINATE_3966_2_
SET DLM_SKP_=4485
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3966_3_PRSE GOTO SKP_SRT_3966_3_)&&ECHO %%A>> "C:\Patches\Batch_Files\ACL\WinPE_8_3_Reset_Drive_Wipe_ACL.bat")
:SKP_SRT_3966_3_
GOTO :LST_LNE_DELAMINATE_3966_3_

@ECHO OFF
SETLOCAL
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++

REM Batch file to reset ACLs to default for offline images only:

CD /D "%~dp0"
IF EXIST "ROOT_" RMDIR /S /Q "ROOT_"
MKDIR "ROOT_"

ICACLS "ROOT_" /SETOWNER Administrators /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT SERVICE\TrustedInstaller":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\SYSTEM":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Users":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Administrators":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\Authenticated Users":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL RESTRICTED APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /REMOVE "Everyone" /C /L /Q

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Acl -Path 'ROOT_' | Set-Acl -Path '%~d1'}"
CALL :CH_OWN_ "%~d1"
CALL :RES_ST_FLDR "%~d1"
CALL :CH_OWN_FLDR "%~d1"
CALL :RES_ST_FLDR "%~d1"

IF %Processor_Architecture%==ARM64 (SDELETE64A -ACCEPTEULA -R -S -NOBANNER "%~d1\$Recycle.Bin\*.*")
IF %Processor_Architecture%==AMD64 (SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%~d1\$Recycle.Bin\*.*")
IF %Processor_Architecture%==x86 (SDELETE -ACCEPTEULA -R -S -NOBANNER "%~d1\$Recycle.Bin\*.*")

GOTO _LST_LBL

:CH_OWN_
FOR /R "%1" %%A IN (.) DO ( (IF NOT "%%~sfA"=="%~d1\" (TAKEOWN /A /F "%%~sfA")) )
GOTO :EOF

:CH_OWN_FLDR
FOR /R "%1" %%A IN (.) DO ( (IF NOT "%%~sfA"=="%~d1\" (ICACLS "%%~sfA" /SETOWNER Administrators /C /L /Q)) )
GOTO :EOF

:RES_ST_FLDR
FOR /R "%1" %%A IN (.) DO ( (IF NOT "%%~sfA"=="%~d1\" (ICACLS "%%~sfA" /RESET /C /L /Q)) )
GOTO :EOF

:_LST_LBL

RMDIR /S /Q "ROOT_"

REM CALL WinPE_8_3_Reset_Drive_Wipe_ACL.bat INSERT_PATH_HERE> "WinPE_Wipe_ACL_Log.txt" 2>&1

REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
ENDLOCAL

REM_SKP_LBL_3966_3_PRSE

:LST_LNE_DELAMINATE_3966_3_
SET DLM_SKP_=4556
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3966_4_PRSE GOTO SKP_SRT_3966_4_)&&ECHO %%A>> "C:\Patches\Batch_Files\ACL\WinPE_8_3_Reset_Folder_Wipe_ACL.bat")
:SKP_SRT_3966_4_
GOTO :LST_LNE_DELAMINATE_3966_4_

@ECHO OFF
SETLOCAL
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++

REM Batch file to reset ACLs to default on WinPE for offline images only:

CD /D "%~dp0"
IF EXIST "ROOT_" RMDIR /S /Q "ROOT_"
MKDIR "ROOT_"

ICACLS "ROOT_" /SETOWNER Administrators /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "ROOT_" /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "ROOT_" /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT SERVICE\TrustedInstaller":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\SYSTEM":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Users":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "BUILTIN\Administrators":(OI)(CI)(F) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "NT AUTHORITY\Authenticated Users":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /INHERITANCE:R /GRANT:R "ALL RESTRICTED APPLICATION PACKAGES":(OI)(CI)(RX) /C /L /Q
ICACLS "ROOT_" /REMOVE "Everyone" /C /L /Q

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Acl -Path 'ROOT_' | Set-Acl -Path '%~s1'}"
CALL :CH_OWN_ "%~s1\*.*"
CALL :RES_ST_FLDR "%~s1\*.*"
CALL :CH_OWN_FLDR "%~s1\*.*"
CALL :RES_ST_FLDR "%~s1\*.*"

IF NOT EXIST "%~s1\$Recycle.Bin" GOTO _LST_LBL

IF %Processor_Architecture%==ARM64 (SDELETE64A -ACCEPTEULA -R -S -NOBANNER "%~s1\$Recycle.Bin\*.*")
IF %Processor_Architecture%==AMD64 (SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%~s1\$Recycle.Bin\*.*")
IF %Processor_Architecture%==x86 (SDELETE -ACCEPTEULA -R -S -NOBANNER "%~s1\$Recycle.Bin\*.*")

GOTO _LST_LBL

:CH_OWN_
TAKEOWN /R /A /F "%~s1" /D Y
GOTO :EOF

:CH_OWN_FLDR
ICACLS "%~s1" /SETOWNER Administrators /T /C /L /Q
GOTO :EOF

:RES_ST_FLDR
ICACLS "%~s1" /RESET /T /C /L /Q
GOTO :EOF

:_LST_LBL

RMDIR /S /Q "ROOT_"

REM ----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++
REM ++++++++++----------++++++++++----------++++++++++----------++++++++++----------++++++++++----------
ENDLOCAL

REM_SKP_LBL_3966_4_PRSE

:LST_LNE_DELAMINATE_3966_4_
SET DLM_SKP_=4627
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3966_5_PRSE GOTO SKP_SRT_3966_5_)&&ECHO %%A>> "C:\Patches\Batch_Files\ACL\WinPE_Drive_Wipe.bat")
:SKP_SRT_3966_5_
GOTO :LST_LNE_DELAMINATE_3966_5_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
CD /D "%~dp0"
IF %Processor_Architecture%==ARM64 SET SDEL_EXT_=SDELETE64A
IF %Processor_Architecture%==AMD64 SET SDEL_EXT_=SDELETE64
IF %Processor_Architecture%==x86 SET SDEL_EXT_=SDELETE
SET ERSEDRV_VAR_SEL_=0

IF EXIST "%~dp0WIPEDRVSrt_TMP_*_FL_.txt" DEL /Q "%~dp0WIPEDRVSrt_TMP_*_FL_.txt" 2> nul

((WMIC DISKDRIVE GET Index,Model,Size /FORMAT:CSV| SORT| FINDSTR /BLC:"Node" /V)> "%~dp0WIPEDRVSrt_TMP_0_FL_.txt") >nul 2>&1

SET WPDRV_VAL_CNTR_=1
FOR /F "usebackq tokens=2 delims=," %%A IN ("%~dp0WIPEDRVSrt_TMP_0_FL_.txt") DO ((SET WPDRV_VAL_1_[!WPDRV_VAL_CNTR_!]_=%%A)&(SET /A WPDRV_VAL_CNTR_+=1))
SET WPDRV_VAL_CNTR_=1
FOR /F "usebackq tokens=3 delims=," %%A IN ("%~dp0WIPEDRVSrt_TMP_0_FL_.txt") DO ((SET WPDRV_VAL_2_[!WPDRV_VAL_CNTR_!]_=%%A)&(SET /A WPDRV_VAL_CNTR_+=1))
SET WPDRV_VAL_CNTR_=1
FOR /F "usebackq tokens=4 delims=," %%A IN ("%~dp0WIPEDRVSrt_TMP_0_FL_.txt") DO ((SET WPDRV_VAL_3_[!WPDRV_VAL_CNTR_!]_=%%A)&(SET /A WPDRV_VAL_CNTR_+=1))
SET /A WPDRV_VAL_CNTR_-=1

:ERSEDRV_SRT_LBL_0_
CLS
ECHO [WinPE Drive Wipe Script:]
ECHO:
FOR /L %%A IN (1,1,%WPDRV_VAL_CNTR_%) DO (ECHO [INDEX:] !WPDRV_VAL_1_[%%A]_! [MODEL:] !WPDRV_VAL_2_[%%A]_! [SIZE:] !WPDRV_VAL_3_[%%A]_!)
ECHO:
ECHO ...SELECT DRIVE INDEX
SET /P WPDRV_VARINDX_TMP_="[INDEX]: "
(ECHO %WPDRV_VARINDX_TMP_%| FINDSTR /R "[^0-9]") >nul 2>&1
IF %ErrorLevel% EQU 0 (GOTO ERSEDRV_SRT_LBL_0_)
IF %WPDRV_VARINDX_TMP_% GTR %WPDRV_VAL_CNTR_% (GOTO ERSEDRV_SRT_LBL_0_)

SET /A WPDRV_VARINDX_SRT_=(%WPDRV_VARINDX_TMP_%+1)

ECHO:
ECHO [1] [WIPE PARTITIONS AND CLEAN DRIVE] [HINT: FAT8, FAT12, FAT16, FAT32, NTFS]
ECHO [2] [WIPE PARTITIONS AND ZERO DRIVE] [HINT: INCLUDING BUT NOT LIMITED TO: ReFS, BTRFS, EXT, EXT2, EXT3, EXT4, XFS, HSFS, PCFS, UDFS, UFS, ZFS, NFS, SMB, CTFS, FIFOFS, MNTFS, NAMEFS, OBJFS, SHAREFS, SPECFS, SWAPFS, TMPFS, LOFS, PROCFS, CacheFS]
ECHO [3] [EXIT]
ECHO:

CHOICE /C 123 /N /M "CHOOSE FROM THE FOLLOWING..."
IF %ErrorLevel% EQU 255 GOTO ERSEDRV_SRT_LBL_0_
IF %ErrorLevel% EQU 3 GOTO ERSEDRV_SRT_LBL_1_
IF %ErrorLevel% EQU 1 ((SET ERSEDRV_VAR_SEL_=1)&(SET ERSEDRVTMP_SEL_VAR_=[CLEAN DRIVE:] !WPDRV_VAL_2_[%WPDRV_VARINDX_SRT_%]_!))
IF %ErrorLevel% EQU 2 ((SET ERSEDRV_VAR_SEL_=2)&(SET ERSEDRVTMP_SEL_VAR_=[ZERO FREE SPACE:] !WPDRV_VAL_2_[%WPDRV_VARINDX_SRT_%]_!))
CHOICE /C YN /N /M "%ERSEDRVTMP_SEL_VAR_%... <- [Y] YES TO PROCEED [N] NO TO SKIP?"
IF %ErrorLevel% EQU 255 GOTO ERSEDRV_SRT_LBL_0_
IF %ErrorLevel% EQU 2 GOTO ERSEDRV_SRT_LBL_1_

(ECHO SELECT DISK %WPDRV_VARINDX_TMP_%)> "%~dp0Clean_Zero_Drive_Offline.txt"
(ECHO CLEAN)>> "%~dp0Clean_Zero_Drive_Offline.txt"
(ECHO CLEAN)>> "%~dp0Clean_Zero_Drive_Offline.txt"
DISKPART /S "%~dp0Clean_Zero_Drive_Offline.txt"
%SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%~dp0Clean_Zero_Drive_Offline.txt" 2> nul

IF %ERSEDRV_VAR_SEL_% EQU 1 (%SDEL_EXT_% -ACCEPTEULA -Q -C -NOBANNER %WPDRV_VARINDX_TMP_%)
IF %ERSEDRV_VAR_SEL_% EQU 2 (%SDEL_EXT_% -ACCEPTEULA -Q -Z -NOBANNER %WPDRV_VARINDX_TMP_%)

:ERSEDRV_SRT_LBL_1_
DEL /Q "%~dp0WIPEDRVSrt_TMP_*_FL_.txt" 2> nul
(Wpeutil Shutdown) >nul 2>&1

REM NOTE: Only run this on WinPE 10 / 11, as WinPE doesn't automatically create reserved partitions, which would disrupt / complicate the entire process:
REM ReFS Filesystem Only: Example of a file recovery operation where a format / low-level format has not occurred ( somewhat similar to using BOOTSECT / FSUTIL / CHKDSK / RECOVER on FAT32 / NTFS, ) and an ReFS partition has been deleted / or is corrupt, but everything else is left intact:
REM DISKPART:
REM 1.) SELECT DISK <INSERT DISK NUMBER HERE>
REM 2.) CONVERT GPT NOERR
REM 3.) CREATE PARTITION PRIMARY NOERR
REM 4.) ASSIGN NOERR
REM 5A.) refsutil fixboot W: 3 9 4096 -x
REM NOTE: The following step only works if you were using ReFS 3.9, with 4KB Clusters ( based on pre-written command line arguments that were stored at runtime, before the volume was initially created. This is easier to test ahead of time on a VDISK / VHD / VHDX file. )
REM 5B.) refsutil fixboot W: 3 9 4096 -w D:\LOG_REFS_TMP\WRKNG -x
REM 6.) refsutil triage W: /g
REM 7.) refsutil salvage -FS W: D:\LOG_REFS_TMP D:\LOG_REFS_TMP\STORE -m -v -x
REM 8A.) refsutil salvage -C W: D:\LOG_REFS_TMP D:\LOG_REFS_TMP\STORE -m -v -x
REM The following step is the same as the previous one, although it creates an extra log file by capturing the output as a UTF-8 text document:
REM 8B.) ((refsutil salvage -C W: D:\LOG_REFS_TMP D:\LOG_REFS_TMP\BACKUP -m -v -x)> D:\LOG_REFS_TMP\SalvageLog_REFS_.txt) >nul 2>&1

ENDLOCAL DisableDelayedExpansion

REM_SKP_LBL_3966_5_PRSE

:LST_LNE_DELAMINATE_3966_5_
SET DLM_SKP_=4715
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_1_PRSE GOTO SKP_SRT_3969_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\Clear_SelfAssigned_LAN_IP_Address.bat")
:SKP_SRT_3969_1_
GOTO :LST_LNE_DELAMINATE_3969_1_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0CLRSLF_AssignedIP_*_.txt" 2> nul

(REG QUERY "HKLM\SYSTEM\ControlSet001\Control" /F "Nsi" /E| FIND "HKEY_LOCAL_MACHINE"> "%~dp0CLRSLF_AssignedIP_0_.txt") >nul 2>&1
(REG QUERY "HKLM\SYSTEM\ControlSet001\Control\Nsi" /S| FIND "HKEY_LOCAL_MACHINE">> "%~dp0CLRSLF_AssignedIP_0_.txt") >nul 2>&1

(TYPE "%~dp0CLRSLF_AssignedIP_0_.txt"| FIND /V "" /C> "%~dp0CLRSLF_AssignedIP_1_.txt") >nul 2>&1
SET /P CLRSLF_AssignedIP_CNT_=<"%~dp0CLRSLF_AssignedIP_1_.txt"
IF %CLRSLF_AssignedIP_CNT_% EQU 0 GOTO CLRSLFAssignedIP_LST_LNE_

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0CLRSLF_AssignedIP_0_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BA" -q)
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0CLRSLF_AssignedIP_0_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)

netsh winsock reset
netsh interface ipv4 reset
netsh interface ipv6 reset
netsh winsock reset catalog
netsh int ipv4 reset reset.log
netsh int ipv6 reset reset.log

:CLRSLFAssignedIP_LST_LNE_
DEL /Q "%~dp0CLRSLF_AssignedIP_*_.txt" 2> nul
ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_3969_1_PRSE

:LST_LNE_DELAMINATE_3969_1_
SET DLM_SKP_=4750
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_2_PRSE GOTO SKP_SRT_3969_2_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\DNS_.bat")
:SKP_SRT_3969_2_
GOTO :LST_LNE_DELAMINATE_3969_2_

@ECHO OFF
SETLOCAL
REM This script was written to simplify DNS Configuration for NordVPN ( It has to be run right after the VPN connects to a new server )
IF NOT EXIST "%ProgramFiles%\dnscrypt-proxy\dnscrypt-proxy.exe" GOTO SKP_1_
IF NOT EXIST "%ProgramFiles%\dnscrypt-proxy\DNS_Config" MKDIR "%ProgramFiles%\dnscrypt-proxy\DNS_Config"

SET PRCSS_=0
DEL /Q "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_*.txt" 2> nul

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path 'C:\Program Files\dnscrypt-proxy\DNS_Config\DNSTest_Script_3.txt' -value (Get-Process | where Path -Match 'dnscrypt-proxy' | Sort Path | Format-Table Path -Wrap -Autosize -HideTableHeaders |  Out-String -Stream -Width 450 | Select-String -Pattern 'exe')}"

("%ProgramFiles%\dnscrypt-proxy\dnscrypt-proxy.exe" -check)>"%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_1.txt" 2>&1

TYPE "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_1.txt" | FIND "loaded"> "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_2.txt"
TYPE "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_1.txt" | FIND "routing everything">> "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_2.txt"
TYPE "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_1.txt" | FIND "successfully checked">> "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_2.txt"
TYPE "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_2.txt" | FIND /V "" /C>> "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_4.txt"
TYPE "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_3.txt" | FIND /V "" /C>> "%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_5.txt"

SET /P MX_LNE_DNS_1_=<"%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_4.txt"
SET /P MX_LNE_DNS_2_=<"%ProgramFiles%\dnscrypt-proxy\DNS_Config\DNSTest_Script_5.txt"

IF %MX_LNE_DNS_1_% GTR 3 (SET /A PRCSS_+=1)
IF %MX_LNE_DNS_2_% GTR 0 (SET /A PRCSS_+=1)

RMDIR /S /Q "%ProgramFiles%\dnscrypt-proxy\DNS_Config"

IF %PRCSS_% LSS 2 GOTO SKP_1_

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-DnsClientServerAddress -InterfaceAlias NordLynx -ResetServerAddresses;Disable-NetAdapterBinding -Name NordLynx -AllBindings -IncludeHidden -componentid 'ms_netbios';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_tcpip6';Set-DnsClientServerAddress -InterfaceAlias NordLynx -ResetServerAddresses;Disable-NetAdapterBinding -Name NordLynx -AllBindings -IncludeHidden -componentid 'ms_netbios';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_msclient';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_server';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_pacer';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_implat';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_rspndr';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_lldp';Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses;Get-DnsClient | Set-DnsClientServerAddress -ServerAddresses ('127.0.0.1','9.9.9.11');Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"

GOTO SKP_2_

:SKP_1_

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_tcpip6';Disable-NetAdapterBinding -Name NordLynx -AllBindings -IncludeHidden -componentid 'ms_netbios';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_msclient';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_server';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_pacer';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_implat';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_rspndr';Disable-NetAdapterBinding -Name NordLynx -componentid 'ms_lldp';Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"

:SKP_2_

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_2_PRSE

:LST_LNE_DELAMINATE_3969_2_
SET DLM_SKP_=4800
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_3_PRSE GOTO SKP_SRT_3969_3_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\Install_NordVPN_Root_Folder.bat")
:SKP_SRT_3969_3_
GOTO :LST_LNE_DELAMINATE_3969_3_

@ECHO OFF
SETLOCAL
DEL /Q "%~dp0FireWall_List_*.txt" 2> nul
IF NOT EXIST "%~dp0NordVPNInstall.exe" GOTO TMP_SKP_FRWLL_LNE_2_

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Temporary Installer *'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Temporary Installer 1' -Profile Any -Program '%~dp0NordVPNInstall.exe' -Protocol Any}"

ECHO @ECHO OFF> "%~dp0Update_NordVPN_Temp.bat"
ECHO SETLOCAL EnableDelayedExpansion>> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET TMP_FRWLL_CNTR_=^2>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :RESTRT_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO DIR /B /S "%%Temp%%\*.tmp"^| FINDSTR /IC:"NordVPNInstall.tmp"^> "%%~dp0FireWall_List_4.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO TYPE "%%~dp0FireWall_List_4.txt"^| FIND /V "" /C^> "%%~dp0FireWall_List_5.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET /P RTRN_VAL=^<"%%~dp0FireWall_List_5.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO IF %%RTRN_VAL%% EQU 0 GOTO RESTRT_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO FOR /F "usebackq tokens=* delims=" %%%%A IN ("%%~dp0FireWall_List_4.txt") DO (CALL :CRTE_TMP_FRWALL_VAL "%%%%~sfA")>> "%~dp0Update_NordVPN_Temp.bat"
ECHO GOTO TMP_LST_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :CRTE_TMP_FRWALL_VAL>> "%~dp0Update_NordVPN_Temp.bat"
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Temporary Installer %%TMP_FRWLL_CNTR_%%' -Profile Any -Program '%%~1' -Protocol Any}">> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET /A TMP_FRWLL_CNTR_+=^1>> "%~dp0Update_NordVPN_Temp.bat"
ECHO GOTO :EOF>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :TMP_LST_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO ENDLOCAL DisableDelayedExpansion>> "%~dp0Update_NordVPN_Temp.bat"
ECHO MOVE NUL 2^>^&^0>> "%~dp0Update_NordVPN_Temp.bat"

CMD /Q /C START /MIN /REALTIME %~dp0Update_NordVPN_Temp.bat

"%~dp0NordVPNInstall.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /NOCANCEL /NORESTART

DEL /Q "%~dp0Update_NordVPN_Temp.bat" 2> nul

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Temporary Installer *'}"

sc failureflag nordvpn-service 1
sc config nordvpn-service displayname= "NordVPN Service"
sc failure nordvpn-service reset= 1 actions= restart/1000/restart/1000/restart/1000/
sc config NordUpdaterService start=disabled
net stop NordUpdaterService
net start nordvpn-service
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Advanced EEE' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Lite' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Green Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Power Saving Mode' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Flow Control' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'IPv4 Checksum Offload' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '4'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'ARP Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'NS Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'VLAN ID' -DisplayValue '0'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Packet Priority & VLAN' -DisplayValue 'Packet Priority & VLAN Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'PTP Hardware Timestamp' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '512'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Side Scaling' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Software Timestamp' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Speed & Duplex' -DisplayValue '1.0 Gbps Full Duplex'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wait for Link' -DisplayValue 'On'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '128'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Adaptive Inter-Frame Spacing' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy-Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Off'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Enable PME' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Adaptive'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Log Link State Event' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Master Slave Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Network Address'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Locally Administered Address' -DisplayValue ''}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit PHY Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'WOL & Shutdown Link Speed' -DisplayValue 'Not Speed Down'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Reduce Speed On Power Down' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Shutdown Wake-On-Lan' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Link Settings' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Sleep on WoWLAN Disconnect' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Packet Coalescing' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'ARP offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'NS offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'GTK rekeying for WoWLAN' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 2.4GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 5GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Mixed Mode Protection' -DisplayValue 'RTS/CTS Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Fat Channel Intolerant' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Transmit Power' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11n/ac Wireless Mode' -DisplayValue '802.11ac'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'MIMO Power Save Mode' -DisplayValue 'Auto SMPS'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Roaming Aggressiveness' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Preferred Band' -DisplayValue '3. Prefer 5GHz band'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Throughput Booster' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'U-APSD support' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11a/b/g Wireless Mode' -DisplayValue '6. Dual Band 802.11a/b/g'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetIPInterface}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Enable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_tcpip6'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_msclient'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_server'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_pacer'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_implat'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_lldp'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_rspndr'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Service'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN ( OpenVPN )'}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Service' -Profile Any -Program '%ProgramFiles%\NordVPN\nordvpn-service.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN' -Profile Any -Program '%ProgramFiles%\NordVPN\NordVPN.exe' -Protocol Any}"
DIR /B /A:D /O:N "%ProgramFiles%\NordVPN"> "%~dp0FireWall_List_1.txt"
TYPE "%~dp0FireWall_List_1.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*"> "%~dp0FireWall_List_2.txt"
TYPE "%~dp0FireWall_List_2.txt" | FIND /V "" /C> "%~dp0FireWall_List_3.txt"
SET /P MX_LNE_FRWLL_1_=<"%~dp0FireWall_List_3.txt"
IF %MX_LNE_FRWLL_1_% EQU 1 GOTO TMP_SKP_FRWLL_LNE_1_
SET /A MX_LNE_FRWLL_1_-=1
FOR /F "usebackq skip=%MX_LNE_FRWLL_1_% tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
GOTO TMP_SKP_FRWLL_LNE_2_
:TMP_SKP_FRWLL_LNE_1_
FOR /F "usebackq tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
:TMP_SKP_FRWLL_LNE_2_
DEL /Q "%~dp0FireWall_List_*.txt" 2> nul
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_3_PRSE

:LST_LNE_DELAMINATE_3969_3_
SET DLM_SKP_=4950
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_4_PRSE GOTO SKP_SRT_3969_4_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\Network_Configure_Latency.bat")
:SKP_SRT_3969_4_
GOTO :LST_LNE_DELAMINATE_3969_4_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Off'}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_4_PRSE

:LST_LNE_DELAMINATE_3969_4_
SET DLM_SKP_=4969
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_5_PRSE GOTO SKP_SRT_3969_5_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\Network_Configure_Throughput.bat")
:SKP_SRT_3969_5_
GOTO :LST_LNE_DELAMINATE_3969_5_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet' -DisplayValue '9014'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame' -DisplayValue '9014'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame' -DisplayValue '9014 Bytes'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '512'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '2'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '4'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Extreme'}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_5_PRSE

:LST_LNE_DELAMINATE_3969_5_
SET DLM_SKP_=4991
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_6_PRSE GOTO SKP_SRT_3969_6_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\NordVPN_Cleanup.bat")
:SKP_SRT_3969_6_
GOTO :LST_LNE_DELAMINATE_3969_6_

@ECHO OFF
SETLOCAL
IF NOT EXIST "%ProgramFiles%\NordVPN" GOTO LST_LBL
TAKEOWN /R /A /F "%ProgramFiles%\NordVPN" /D Y
ICACLS "%ProgramFiles%\NordVPN" /RESET /T /C /L /Q
IF EXIST "%ProgramFiles%\NordUpdater" TAKEOWN /R /A /F "%ProgramFiles%\NordUpdater" /D Y
IF EXIST "%ProgramFiles%\NordUpdater" ICACLS "%ProgramFiles%\NordUpdater" /RESET /T /C /L /Q
SET NLVAL_COUNTER=0
DIR /B /A:D "%ProgramFiles%\NordVPN"> "%~dp0VPN_Script_Cleanup_List_1.txt"
DIR /B /A:D "%ProgramFiles%\NordVPN\NordSec ThreatProtection"> "%~dp0VPN_Script_Cleanup_List_2.txt"
DIR /B /A:D "%ProgramFiles%\NordUpdater"> "%~dp0VPN_Script_Cleanup_List_3.txt"

TYPE "%~dp0VPN_Script_Cleanup_List_1.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_4.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_2.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_5.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_3.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_6.txt"

TYPE "%~dp0VPN_Script_Cleanup_List_4.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_7.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_5.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_8.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_6.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_9.txt"

SET /P MX_LNE_VPN_1_=<"%~dp0VPN_Script_Cleanup_List_7.txt"
SET /P MX_LNE_VPN_2_=<"%~dp0VPN_Script_Cleanup_List_8.txt"
SET /P MX_LNE_VPN_3_=<"%~dp0VPN_Script_Cleanup_List_9.txt"

IF %MX_LNE_VPN_1_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %MX_LNE_VPN_2_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %MX_LNE_VPN_3_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %NLVAL_COUNTER% GTR 2 GOTO LST_LBL

ECHO @ECHO OFF> "%~dp0RMV_VPN_OLD_VER.bat"
ECHO SETLOCAL>> "%~dp0RMV_VPN_OLD_VER.bat"

IF %MX_LNE_VPN_1_% LSS 2 GOTO SKP_1_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_4.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordVPN\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_1_

IF %MX_LNE_VPN_2_% LSS 2 GOTO SKP_2_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_5.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordVPN\NordSec ThreatProtection\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_2_

IF %MX_LNE_VPN_3_% LSS 2 GOTO SKP_3_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_6.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordUpdater\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_3_

ECHO ENDLOCAL>> "%~dp0RMV_VPN_OLD_VER.bat"
ECHO DEL /Q "%%~dp0RMV_VPN_OLD_VER.bat">> "%~dp0RMV_VPN_OLD_VER.bat"
CALL "%~dp0RMV_VPN_OLD_VER.bat"
DEL /Q "%~dp0VPN_Script_Cleanup_List_*.txt" 2> nul
:LST_LBL
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_6_PRSE

:LST_LNE_DELAMINATE_3969_6_
SET DLM_SKP_=5057
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_7_PRSE GOTO SKP_SRT_3969_7_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\One_Button_Network_Configure.bat")
:SKP_SRT_3969_7_
GOTO :LST_LNE_DELAMINATE_3969_7_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Advanced EEE' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Lite' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Green Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Power Saving Mode' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Flow Control' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'IPv4 Checksum Offload' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '4'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'ARP Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'NS Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'VLAN ID' -DisplayValue '0'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Packet Priority & VLAN' -DisplayValue 'Packet Priority & VLAN Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'PTP Hardware Timestamp' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '512'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Side Scaling' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Software Timestamp' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Speed & Duplex' -DisplayValue '1.0 Gbps Full Duplex'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wait for Link' -DisplayValue 'On'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '128'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Adaptive Inter-Frame Spacing' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy-Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Off'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Enable PME' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Adaptive'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Log Link State Event' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Master Slave Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Network Address'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Locally Administered Address' -DisplayValue ''}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit PHY Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'WOL & Shutdown Link Speed' -DisplayValue 'Not Speed Down'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Reduce Speed On Power Down' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Shutdown Wake-On-Lan' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Link Settings' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Sleep on WoWLAN Disconnect' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Packet Coalescing' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'ARP offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'NS offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'GTK rekeying for WoWLAN' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 2.4GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 5GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Mixed Mode Protection' -DisplayValue 'RTS/CTS Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Fat Channel Intolerant' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Transmit Power' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11n/ac Wireless Mode' -DisplayValue '802.11ac'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'MIMO Power Save Mode' -DisplayValue 'Auto SMPS'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Roaming Aggressiveness' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Preferred Band' -DisplayValue '3. Prefer 5GHz band'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Throughput Booster' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'U-APSD support' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11a/b/g Wireless Mode' -DisplayValue '6. Dual Band 802.11a/b/g'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapter | Enable-NetAdapter}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetIPInterface}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Enable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_tcpip6'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_msclient'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_server'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_pacer'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_implat'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_lldp'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_rspndr'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_7_PRSE

:LST_LNE_DELAMINATE_3969_7_
SET DLM_SKP_=5153
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_8_PRSE GOTO SKP_SRT_3969_8_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\One_Button_Network_Configure_Jumbo_Frames_Packet.bat")
:SKP_SRT_3969_8_
GOTO :LST_LNE_DELAMINATE_3969_8_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Advanced EEE' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Lite' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Green Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Power Saving Mode' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Flow Control' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'IPv4 Checksum Offload' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Packet' -DisplayValue '9014'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame' -DisplayValue '9014'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Jumbo Frame' -DisplayValue '9014 Bytes'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Large Send Offload V2 (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Maximum Number of RSS Queues' -DisplayValue '4'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'ARP Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'NS Offload' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'VLAN ID' -DisplayValue '0'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Packet Priority & VLAN' -DisplayValue 'Packet Priority & VLAN Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'PTP Hardware Timestamp' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '512'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Receive Side Scaling' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv4)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Recv Segment Coalescing (IPv6)' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Software Timestamp' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Speed & Duplex' -DisplayValue '1.0 Gbps Full Duplex'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wait for Link' -DisplayValue 'On'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'TCP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '128'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Transmit Buffers' -DisplayValue '2048'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv4)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'UDP Checksum Offload (IPv6)' -DisplayValue 'Rx & Tx Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Adaptive Inter-Frame Spacing' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy-Efficient Ethernet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Energy Efficient Ethernet' -DisplayValue 'Off'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Enable PME' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Interrupt Moderation Rate' -DisplayValue 'Adaptive'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Log Link State Event' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit Master Slave Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Reset-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Network Address'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Locally Administered Address' -DisplayValue ''}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Gigabit PHY Mode' -DisplayValue 'Auto Detect'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'WOL & Shutdown Link Speed' -DisplayValue 'Not Speed Down'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Reduce Speed On Power Down' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Shutdown Wake-On-Lan' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -DisplayName 'Wake on Link Settings' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Ethernet*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Sleep on WoWLAN Disconnect' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Packet Coalescing' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'ARP offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'NS offload for WoWLAN' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'GTK rekeying for WoWLAN' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Magic Packet' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Wake on Pattern Match' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 2.4GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Channel Width for 5GHz' -DisplayValue 'Auto'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Mixed Mode Protection' -DisplayValue 'RTS/CTS Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Fat Channel Intolerant' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Transmit Power' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11n/ac Wireless Mode' -DisplayValue '802.11ac'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'MIMO Power Save Mode' -DisplayValue 'Auto SMPS'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Roaming Aggressiveness' -DisplayValue '1. Lowest'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Preferred Band' -DisplayValue '3. Prefer 5GHz band'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'Throughput Booster' -DisplayValue 'Enabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName 'U-APSD support' -DisplayValue 'Disabled'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -DisplayName '802.11a/b/g Wireless Mode' -DisplayValue '6. Dual Band 802.11a/b/g'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetAdapterAdvancedProperty -Name 'Wi-Fi*' -IncludeHidden -AllProperties -RegistryKeyword 'PnPCapabilities' -RegistryValue '24'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapter | Enable-NetAdapter}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-NetIPInterface}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Enable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -AllBindings -IncludeHidden -componentid 'ms_netbios'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_tcpip6'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_msclient'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_server'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_pacer'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_implat'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_lldp'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetAdapterBinding | Disable-NetAdapterBinding -componentid 'ms_rspndr'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DnsClientServerAddress -ResetServerAddresses}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-DnsClient | Set-DNSClient -RegisterThisConnectionsAddress $False -UseSuffixWhenRegistering $False -ConnectionSpecificSuffix ' '}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_8_PRSE

:LST_LNE_DELAMINATE_3969_8_
SET DLM_SKP_=5250
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3969_9_PRSE GOTO SKP_SRT_3969_9_)&&ECHO %%A>> "C:\Patches\Batch_Files\Networking\Update_NordVPN_Root_Folder.bat")
:SKP_SRT_3969_9_
GOTO :LST_LNE_DELAMINATE_3969_9_

@ECHO OFF
SETLOCAL
DEL /Q "%~dp0FireWall_List_*.txt" 2> nul
IF NOT EXIST "%~dp0NordVPNInstall.exe" GOTO TMP_SKP_FRWLL_LNE_2_

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Temporary Installer *'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Temporary Installer 1' -Profile Any -Program '%~dp0NordVPNInstall.exe' -Protocol Any}"

ECHO @ECHO OFF> "%~dp0Update_NordVPN_Temp.bat"
ECHO SETLOCAL EnableDelayedExpansion>> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET TMP_FRWLL_CNTR_=^2>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :RESTRT_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO DIR /B /S "%%Temp%%\*.tmp"^| FINDSTR /IC:"NordVPNInstall.tmp"^> "%%~dp0FireWall_List_4.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO TYPE "%%~dp0FireWall_List_4.txt"^| FIND /V "" /C^> "%%~dp0FireWall_List_5.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET /P RTRN_VAL=^<"%%~dp0FireWall_List_5.txt">> "%~dp0Update_NordVPN_Temp.bat"
ECHO IF %%RTRN_VAL%% EQU 0 GOTO RESTRT_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO FOR /F "usebackq tokens=* delims=" %%%%A IN ("%%~dp0FireWall_List_4.txt") DO (CALL :CRTE_TMP_FRWALL_VAL "%%%%~sfA")>> "%~dp0Update_NordVPN_Temp.bat"
ECHO GOTO TMP_LST_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :CRTE_TMP_FRWALL_VAL>> "%~dp0Update_NordVPN_Temp.bat"
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Temporary Installer %%TMP_FRWLL_CNTR_%%' -Profile Any -Program '%%~1' -Protocol Any}">> "%~dp0Update_NordVPN_Temp.bat"
ECHO SET /A TMP_FRWLL_CNTR_+=^1>> "%~dp0Update_NordVPN_Temp.bat"
ECHO GOTO :EOF>> "%~dp0Update_NordVPN_Temp.bat"
ECHO :TMP_LST_LBL_>> "%~dp0Update_NordVPN_Temp.bat"
ECHO ENDLOCAL DisableDelayedExpansion>> "%~dp0Update_NordVPN_Temp.bat"
ECHO MOVE NUL 2^>^&^0>> "%~dp0Update_NordVPN_Temp.bat"

CMD /Q /C START /MIN /REALTIME %~dp0Update_NordVPN_Temp.bat

"%~dp0NordVPNInstall.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /NOCANCEL /NORESTART

DEL /Q "%~dp0Update_NordVPN_Temp.bat" 2> nul

PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Temporary Installer *'}"

sc failureflag nordvpn-service 1
sc config nordvpn-service displayname= "NordVPN Service"
sc failure nordvpn-service reset= 1 actions= restart/1000/restart/1000/restart/1000/
sc config NordUpdaterService start=disabled
net stop NordUpdaterService
net start nordvpn-service
IF NOT EXIST "%ProgramFiles%\NordVPN" GOTO LST_LBL
TAKEOWN /R /A /F "%ProgramFiles%\NordVPN" /D Y
ICACLS "%ProgramFiles%\NordVPN" /RESET /T /C /L /Q
IF EXIST "%ProgramFiles%\NordUpdater" TAKEOWN /R /A /F "%ProgramFiles%\NordUpdater" /D Y
IF EXIST "%ProgramFiles%\NordUpdater" ICACLS "%ProgramFiles%\NordUpdater" /RESET /T /C /L /Q
SET NLVAL_COUNTER=0
DIR /B /A:D "%ProgramFiles%\NordVPN"> "%~dp0VPN_Script_Cleanup_List_1.txt"
DIR /B /A:D "%ProgramFiles%\NordVPN\NordSec ThreatProtection"> "%~dp0VPN_Script_Cleanup_List_2.txt"
DIR /B /A:D "%ProgramFiles%\NordUpdater"> "%~dp0VPN_Script_Cleanup_List_3.txt"

TYPE "%~dp0VPN_Script_Cleanup_List_1.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_4.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_2.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_5.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_3.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*" | SORT /R> "%~dp0VPN_Script_Cleanup_List_6.txt"

TYPE "%~dp0VPN_Script_Cleanup_List_4.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_7.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_5.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_8.txt"
TYPE "%~dp0VPN_Script_Cleanup_List_6.txt" | FIND /V "" /C> "%~dp0VPN_Script_Cleanup_List_9.txt"

SET /P MX_LNE_VPN_1_=<"%~dp0VPN_Script_Cleanup_List_7.txt"
SET /P MX_LNE_VPN_2_=<"%~dp0VPN_Script_Cleanup_List_8.txt"
SET /P MX_LNE_VPN_3_=<"%~dp0VPN_Script_Cleanup_List_9.txt"

IF %MX_LNE_VPN_1_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %MX_LNE_VPN_2_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %MX_LNE_VPN_3_% EQU 0 SET /A NLVAL_COUNTER+=1
IF %NLVAL_COUNTER% GTR 2 GOTO LST_LBL

ECHO @ECHO OFF> "%~dp0RMV_VPN_OLD_VER.bat"
ECHO SETLOCAL>> "%~dp0RMV_VPN_OLD_VER.bat"

IF %MX_LNE_VPN_1_% LSS 2 GOTO SKP_1_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_4.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordVPN\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_1_

IF %MX_LNE_VPN_2_% LSS 2 GOTO SKP_2_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_5.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordVPN\NordSec ThreatProtection\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_2_

IF %MX_LNE_VPN_3_% LSS 2 GOTO SKP_3_

FOR /F "usebackq skip=1 tokens=*" %%A IN ("%~dp0VPN_Script_Cleanup_List_6.txt") DO (ECHO CMD /Q /C START /MIN SDELETE64 -ACCEPTEULA -R -S -NOBANNER "%%ProgramFiles%%\NordUpdater\%%A">> "%~dp0RMV_VPN_OLD_VER.bat")

:SKP_3_

ECHO ENDLOCAL>> "%~dp0RMV_VPN_OLD_VER.bat"
ECHO DEL /Q "%%~dp0RMV_VPN_OLD_VER.bat">> "%~dp0RMV_VPN_OLD_VER.bat"
CALL "%~dp0RMV_VPN_OLD_VER.bat"
DEL /Q "%~dp0VPN_Script_Cleanup_List_*.txt" 2> nul
:LST_LBL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN Service'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN'}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Remove-NetFirewallRule -DisplayName 'NordVPN ( OpenVPN )'}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN Service' -Profile Any -Program '%ProgramFiles%\NordVPN\nordvpn-service.exe' -Protocol Any}"
CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN' -Profile Any -Program '%ProgramFiles%\NordVPN\NordVPN.exe' -Protocol Any}"
DIR /B /A:D /O:N "%ProgramFiles%\NordVPN"> "%~dp0FireWall_List_1.txt"
TYPE "%~dp0FireWall_List_1.txt" | FINDSTR /R "[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*"> "%~dp0FireWall_List_2.txt"
TYPE "%~dp0FireWall_List_2.txt" | FIND /V "" /C> "%~dp0FireWall_List_3.txt"
SET /P MX_LNE_FRWLL_1_=<"%~dp0FireWall_List_3.txt"
IF %MX_LNE_FRWLL_1_% EQU 1 GOTO TMP_SKP_FRWLL_LNE_1_
SET /A MX_LNE_FRWLL_1_-=1
FOR /F "usebackq skip=%MX_LNE_FRWLL_1_% tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
GOTO TMP_SKP_FRWLL_LNE_2_
:TMP_SKP_FRWLL_LNE_1_
FOR /F "usebackq tokens=*" %%A IN ("%~dp0FireWall_List_2.txt") DO (CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {New-NetFirewallRule -Action Allow -Direction Outbound -DisplayName 'NordVPN ( OpenVPN )' -Profile Any -Program '%ProgramFiles%\NordVPN\%%A\Resources\Binaries\64bit\openvpn-nordvpn.exe' -Protocol Any}")
:TMP_SKP_FRWLL_LNE_2_
DEL /Q "%~dp0FireWall_List_*.txt" 2> nul
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3969_9_PRSE

:LST_LNE_DELAMINATE_3969_9_
SET DLM_SKP_=5371
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_1_PRSE GOTO SKP_SRT_10705_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\Clear_Default_Cache_Win10_11.bat")
:SKP_SRT_10705_1_
GOTO :LST_LNE_DELAMINATE_10705_1_

@ECHO OFF
SETLOCAL
REM BEFORE RUNNING THIS SCRIPT, MAKE SURE THAT THE FOLLOWING PROGRAMS ARE NOT IN USE: WINDOWS EXPLORER ( FILE EXPLORER ) AND BOTH CALCULATOR AND NOTEPAD ( UWP APPS, NOT THE CLASSIC VERSIONS )
CD /D "%~dp0"
IF %Processor_Architecture%==ARM64 SET SDEL_EXT_=SDELETE64A
IF %Processor_Architecture%==AMD64 SET SDEL_EXT_=SDELETE64
IF %Processor_Architecture%==x86 SET SDEL_EXT_=SDELETE
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsNotepad | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsCalculator | Reset-AppxPackage}"
IF EXIST "C:\MYSYS2\home\%UserName%" %SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "C:\MYSYS2\home\%UserName%\.bash_history"
DIR /B /S /O:-S "%ProgramFiles%\chrome_BITS_*_*"> "%~dp0Default_Folders_Clear.txt"
DIR /B /S /O:-S "%SystemRoot%\System32\config\systemprofile\AppData\Local\*.tmp">> "%~dp0Default_Folders_Clear.txt"
FOR /F "usebackq tokens=*" %%A IN ("%~dp0Default_Folders_Clear.txt") DO CMD /Q /C START /MIN %SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%%A"
%SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%~dp0Default_Folders_Clear.txt"
IF EXIST "%UserProfile%\Desktop\TEMP_DELETE" CMD /Q /C START /MIN %SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%UserProfile%\Desktop\TEMP_DELETE\*.*"
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\WebCache" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\History" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\IECompatCache" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\IECompatUaCache" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\IEDownloadHistory" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\INetCache" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\INetCookies" /D Y
TAKEOWN /R /A /F "%LocalAppData%\Temp" /D Y
TAKEOWN /R /A /F "%SystemRoot%\Temp" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatCache" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatUaCache" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IEDownloadHistory" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache" /D Y
TAKEOWN /R /A /F "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies" /D Y
ICACLS "%LocalAppData%\Microsoft\Windows\WebCache" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\History" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\IECompatCache" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\IECompatUaCache" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\IEDownloadHistory" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\INetCache" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Microsoft\Windows\INetCookies" /RESET /T /C /L /Q
ICACLS "%LocalAppData%\Temp" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\Temp" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatCache" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatUaCache" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IEDownloadHistory" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache" /RESET /T /C /L /Q
ICACLS "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies" /RESET /T /C /L /Q
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\WebCache"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\History"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\IECompatCache"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\IECompatUaCache"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\IEDownloadHistory"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\INetCache"
ATTRIB -R -S -H /S /D /L "%LocalAppData%\Microsoft\Windows\INetCookies"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatCache"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatUaCache"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IEDownloadHistory"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache"
ATTRIB -R -S -H /S /D /L "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies"
TAKEOWN /R /A /F "%ProgramData%\USOShared" /D Y
ICACLS "%ProgramData%\USOShared" /RESET /T /C /L /Q
TAKEOWN /R /A /F "%SystemRoot%\Logs" /D Y
ICACLS "%SystemRoot%\Logs" /RESET /T /C /L /Q
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\CrashDumps\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\Caches\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\Caches\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Temp\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Notepad\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\WebCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\WebCache.Old\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\History\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\IECompatCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\IECompatUaCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\IEDownloadHistory\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\INetCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%LocalAppData%\Microsoft\Windows\INetCookies\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache.Old\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IECompatUaCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\IEDownloadHistory\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\Temp\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\Downloaded Program Files\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%SystemRoot%\Offline Web Pages\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -S -NOBANNER "%ProgramData%\USOShared\Logs\*.*"
%SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%AppData%\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt"
DEL /F /S /Q "%SystemRoot%\Logs\*.*"
DEL /F /S /Q "%SystemRoot%\security\logs\*.*"
DEL /F /S /Q "%SystemRoot%\System32\winevt\Logs\*.*"
DEL /F /S /Q "%ProgramData%\Microsoft\Windows\WER\*.*"
DEL /Q "%ProgramData%\Microsoft\Search\Data\Applications\Windows\Windows.edb"
DEL /Q "%ProgramData%\Microsoft\Search\Data\Applications\Windows\Windows.jfm"
REM Sometimes you have to kill ( close ) the process explorer.exe ( in memory, ) delete the thumbnail cache, and then restart Explorer, which on some older versions of windows, may often cause some system tray icons to disappear, or even cause the start menu / taskbar to freeze ( On Windows 11 this is not really an issue. )
TASKKILL /F /IM explorer.exe
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\Explorer\thumbcache_*.db" /D Y
ICACLS "%LocalAppData%\Microsoft\Windows\Explorer\thumbcache_*.db" /RESET /T /C /L /Q
ATTRIB -R -S -H /L "%LocalAppData%\Microsoft\Windows\Explorer\thumbcache_*.db"
TAKEOWN /R /A /F "%LocalAppData%\Microsoft\Windows\Explorer\iconcache_*.db" /D Y
ICACLS "%LocalAppData%\Microsoft\Windows\Explorer\iconcache_*.db" /RESET /T /C /L /Q
ATTRIB -R -S -H /L "%LocalAppData%\Microsoft\Windows\Explorer\iconcache_*.db"
%SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%LocalAppData%\Microsoft\Windows\Explorer\thumbcache_*.db"
%SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER "%LocalAppData%\Microsoft\Windows\Explorer\iconcache_*.db"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Clipboard;Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\AppBadgeUpdated';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\AppLaunch';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\AppSwitched';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU';Clear-Item -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\ShowJumpView';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\JumplistData';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\UFH\SHC';Remove-Item -Path 'HKLM:\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications' -Recurse -Force;New-Item -Path 'HKLM:\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications';Remove-Item -Path 'HKLM:\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\ReflectionApplications' -Recurse -Force;New-Item -Path 'HKLM:\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\ReflectionApplications';Remove-Item -Path 'HKLM:\SOFTWARE\Microsoft\Tracing' -Recurse -Force;New-Item -Path 'HKLM:\SOFTWARE\Microsoft\Tracing';Clear-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Regedit' -Name 'LastKey';Clear-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Regedit' -Name 'View';Clear-Item -Path 'HKCU:\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache';Remove-Item -Path 'HKCU:\SOFTWARE\Classes\Local Settings\ImmutableMuiCache' -Recurse -Force;New-Item -Path 'HKCU:\SOFTWARE\Classes\Local Settings\ImmutableMuiCache';Remove-Item -Path 'HKCU:\SOFTWARE\Classes\Local Settings\MuiCache' -Recurse -Force;New-Item -Path 'HKCU:\SOFTWARE\Classes\Local Settings\MuiCache';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Wordpad\Recent File List';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List';Clear-Item -Path 'HKCU:\SOFTWARE\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles';Clear-Item -Path 'HKCU:\SOFTWARE\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFolders';Clear-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Notepad' -Name 'searchString';Clear-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Notepad' -Name 'replaceString';Clear-Item -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery' -Name 'DisableSearchBoxSuggestions' -PropertyType DWord -Value '00000001';Clear-RecycleBin -Force}"
%SYSTEMROOT%\System32\CMD.EXE /Q /C START /REALTIME explorer.exe
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_1_PRSE

:LST_LNE_DELAMINATE_10705_1_
SET DLM_SKP_=5493
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_2_PRSE GOTO SKP_SRT_10705_2_)&&ECHO %%A>> "C:\Patches\Batch_Files\Create_Driver_Backup.bat")
:SKP_SRT_10705_2_
GOTO :LST_LNE_DELAMINATE_10705_2_

@ECHO OFF
SETLOCAL

IF NOT EXIST "C:\DISM_Drivers" GOTO DRVR_BCKP_SRT_LBL_2_

IF [%1]==[] GOTO DRVR_BCKP_SRT_LBL_1_
IF %1==BYPASS GOTO DRVR_BCKP_SRT_SKP_LBL_1_

:DRVR_BCKP_SRT_LBL_1_
CLS
CHOICE /C YN /N /M "...THE FOLLOWING FOLDER WILL BE ERASED / DELETED / OVERWRITTEN: [C:\DISM_Drivers] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 255 GOTO DRVR_BCKP_SRT_LBL_1_
IF %ErrorLevel% EQU 2 GOTO DRVR_BCKP_SRT_LBL_3_
:DRVR_BCKP_SRT_SKP_LBL_1_
RMDIR /S /Q "C:\DISM_Drivers" >nul 2>&1
:DRVR_BCKP_SRT_LBL_2_

IF EXIST "C:\DISM_Drivers\TEMP" RMDIR /S /Q "C:\DISM_Drivers\TEMP" >nul 2>&1
(IF NOT EXIST "C:\DISM_Drivers\TEMP" MKDIR "C:\DISM_Drivers\TEMP")&(PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path 'C:\DISM_Drivers\TEMP\List.txt' -value (Export-WindowsDriver -Online -Destination "C:\DISM_Drivers\TEMP" | Sort ProviderName | Format-Table -Wrap -AutoSize -Property Driver,ProviderName,ClassName,BootCritical,OriginalFileName | Out-String -Stream -Width 32767)}")
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Corsair">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Google">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "HyperX">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Lexmark">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "Modem">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "Modem">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "Ports">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "Ports">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "USB ">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "USB ">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "Net">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "Net">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "LG Devices">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "LG Devices">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "USBDevice">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "USBDevice">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LG Electronics"| FIND "WPD">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "LGE Electronics"| FIND "WPD">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Logitech">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Microsoft"| FIND "Printer"| FIND "prnms009">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Microsoft"| FIND "Printer"| FIND "ntprint">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Oculus">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Oracle">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Razer">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "NZXT">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "SteelSeries">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "TAP-NordVPN">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "TAP-Windows">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "Wintun">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
(TYPE "C:\DISM_Drivers\TEMP\List.txt"| FIND "\"| FIND "WireGuard LLC">> "C:\DISM_Drivers\TEMP\List_Old_.txt") >nul 2>&1
FOR /F "usebackq tokens=* delims=" %%A IN ("C:\DISM_Drivers\TEMP\List.txt") DO (ECHO %%A>>"C:\DISM_Drivers\TEMP\List_New_.txt")
FOR /F "usebackq tokens=* delims=" %%A IN ("C:\DISM_Drivers\TEMP\List_Old_.txt") DO ((TYPE "C:\DISM_Drivers\TEMP\List_New_.txt"| FIND "%%A" /V> "C:\DISM_Drivers\TEMP\List_Del_.txt"&COPY /V /Y /L "C:\DISM_Drivers\TEMP\List_Del_.txt" "C:\DISM_Drivers\TEMP\List_New_.txt") >nul 2>&1)
FOR /F "usebackq tokens=6 delims=\" %%A IN ("C:\DISM_Drivers\TEMP\List_New_.txt") DO (XCOPY "C:\DISM_Drivers\TEMP\%%A\*.*" "C:\DISM_Drivers\%%A\*.*" /E /C /I /Q /G /H /R /Y /B /J >nul 2>&1)
XCOPY "C:\DISM_Drivers\TEMP\List_New_.txt" "C:\DISM_Drivers\Driver_List.txt" /C /-I /Q /G /H /R /Y /B /J >nul 2>&1
RMDIR /S /Q "C:\DISM_Drivers\TEMP" >nul 2>&1

ECHO @ECHO OFF> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO SETLOCAL>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO CD /D "%%~dp0">> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO REM Create Locked Archive With BLAKE2 HASH / Checksum>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO IF EXIST "%%~dp0RAR_FILENAME_DATE_.txt" DEL /Q "%%~dp0RAR_FILENAME_DATE_.txt" 2^> nul>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-Content -Path '%%~dp0RAR_FILENAME_DATE_.txt' -value (Get-Date -Format _MM-dd-yyyy)}">> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO SET /P RAR_FL_NM_DATE_=^<"%%~dp0RAR_FILENAME_DATE_.txt">> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO DEL /Q "%%~dp0RAR_FILENAME_DATE_.txt" 2^> nul>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO IF EXIST "%%UserProfile%%\Desktop\TEMP_DELETE" "%%ProgramFiles%%\WinRAR\Rar.exe" a -oi -oni -ow -k -htb -m5 -ma5 "%%UserProfile%%\Desktop\TEMP_DELETE\Win_10_11_%%Processor_Architecture%%_Drivers%%RAR_FL_NM_DATE_%%.rar" -r "..\DISM_Drivers\*.*">> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO IF NOT EXIST "%%UserProfile%%\Desktop\TEMP_DELETE" "%%ProgramFiles%%\WinRAR\Rar.exe" a -oi -oni -ow -k -htb -m5 -ma5 "%%UserProfile%%\Desktop\Win_10_11_%%Processor_Architecture%%_Drivers%%RAR_FL_NM_DATE_%%.rar" -r "..\DISM_Drivers\*.*">> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO ENDLOCAL>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"
ECHO MOVE NUL 2^>^&^0>> "C:\DISM_Drivers\Win_10_11_Drivers_Create_RAR.bat"

:DRVR_BCKP_SRT_LBL_3_

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_2_PRSE

:LST_LNE_DELAMINATE_10705_2_
SET DLM_SKP_=5574
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_3_PRSE GOTO SKP_SRT_10705_3_)&&ECHO %%A>> "C:\Patches\Batch_Files\Dependency_Auto_Updater.bat")
:SKP_SRT_10705_3_
GOTO :LST_LNE_DELAMINATE_10705_3_

@ECHO OFF
SETLOCAL
sc config BITS start= delayed-auto
sc config EventLog start= auto
sc config UsoSvc start= auto
sc config wuauserv start= auto
net start BITS
net start EventLog
net start UsoSvc
net start wuauserv
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Set-PSReadLineOption -HistorySaveStyle SaveNothing -MaximumHistoryCount 1}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Write-Output 'Remove-Module PSReadline' | New-Item -Path $PROFILE -Type File -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls13}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Install-PackageProvider -Name PowerShellGet -Scope AllUsers -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Install-PackageProvider -Name NuGet -Scope AllUsers -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Install-PackageProvider -Name WinGet -Scope AllUsers -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Register-PackageSource -Name 'Nuget Gallery' -Location https://api.nuget.org/v3/index.json -Trusted -Force -ProviderName NuGet}"
DISM /Online /Enable-Feature /FeatureName:LegacyComponents
DISM /Online /Enable-Feature /FeatureName:DirectPlay
DISM /Online /Enable-Feature /FeatureName:NetFx3
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Install-Package Microsoft.XAudio2.Redist -Scope AllUsers -Force}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Install-Package Microsoft.Direct3D.D3D12 -Scope AllUsers -Force}"

REM "WinGet Settings" ( https://aka.ms/winget-settings )
ECHO {"$id": "https://aka.ms/winget-settings.schema.json",> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "$schema": "https://json-schema.org/draft/2019-09/schema#",>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "title": "Microsoft's Windows Package Manager Settings Profile Schema",>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "definitions":{"source": {"autoUpdateIntervalInMinutes":3},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "visual": {"progressBar":"rainbow"},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"disableInstallNotes":true},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"preferences":{"scope":"machine"}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "installBehavior":{"preferences":{"locale":["en-US"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==ARM64 ECHO "installBehavior":{"preferences":{"architectures":["Arm64"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==AMD64 ECHO "installBehavior":{"preferences":{"architectures":["x64"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
IF %Processor_Architecture%==x86 ECHO "installBehavior":{"preferences":{"architectures":["x86"]}},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "telemetry":{"disable":true},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "logging":{"level":["critical"]},>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json
ECHO "experimentalFeatures":{"directMSI":true},}}>> %LocalAppData%\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\LocalState\settings.json

winget install 9NBLGGH4NNS1 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2005.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2005.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2008.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2008.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2010.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2010.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2012.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2012.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2013.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2013.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2015+.x86 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.VCRedist.2015+.x64 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.DotNet.Runtime.3_1 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.DotNet.Runtime.5 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.DotNet.Runtime.6 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.DotNet.Runtime.7 --silent --accept-package-agreements --accept-source-agreements
winget install Microsoft.DotNet.Runtime.8 --silent --accept-package-agreements --accept-source-agreements
ECHO Creating Offline Installers on the Desktop... ( Press CTRL+C to END ) && PAUSE
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.arm64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/highdpimfc2013x86enu" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/highdpimfc2013x64enu" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.exe"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/B/16B06F60-3B20-4FF2-B699-5E9B7962F9AE/VSU_4/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/B/16B06F60-3B20-4FF2-B699-5E9B7962F9AE/VSU_4/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/5/165255E7-1014-4D0A-B094-B6A430A6BFFC/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/5/165255E7-1014-4D0A-B094-B6A430A6BFFC/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/5/D/8/5D8C65CB-C849-4025-8E95-C3966CAFD8AE/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/5/D/8/5D8C65CB-C849-4025-8E95-C3966CAFD8AE/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_IA64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.EXE" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.EXE" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.EXE"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/4/A/84A35BF1-DAFE-4AE8-82AF-AD2AE20B6B14/directx_Jun2010_redist.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes\directx_Jun2010_redist.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes\directx_Jun2010_redist.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes\directx_Jun2010_redist.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/3/a/5/3a5925ac-e779-4b1c-bb01-af67dc2f96fc/VisualBasic6-KB896559-v1-ENU.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.exe"
curl --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://sdk.lunarg.com/sdk/download/latest/windows/vulkan-runtime.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT\VulkanRT_Installer.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT\VulkanRT_Installer.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT\VulkanRT_Installer.exe"
ECHO Installing DirectX 9 Redistributable / Vulkan Runtime... ( Press CTRL+C to END ) && PAUSE
IF NOT EXIST "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1" MKDIR "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes\directx_Jun2010_redist.exe" /Q /T:"%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1\DXSETUP.exe" /silent
RMDIR /S /Q "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT\VulkanRT_Installer.exe" /S

REM Microsoft Visual C++ Redistributable latest supported downloads ->
REM Notes: Windows XP Support: ->
REM https://learn.microsoft.com/en-us/cpp/windows/latest-supported-vc-redist?#notes
REM Reset / Repair Apps:
REM Settings -> System -> Other troubleshooters -> Windows Store Apps (Run)
REM Settings -> System -> Other troubleshooters -> Windows Update (Run)
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_3_PRSE

:LST_LNE_DELAMINATE_10705_3_
SET DLM_SKP_=5693
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_4_PRSE GOTO SKP_SRT_10705_4_)&&ECHO %%A>> "C:\Patches\Batch_Files\Duplicate_Sort.bat")
:SKP_SRT_10705_4_
GOTO :LST_LNE_DELAMINATE_10705_4_

@ECHO OFF
SETLOCAL EnableDelayedExpansion

DEL /Q "%~dp0Duplicate_Sort_List_Generic_LineCount.txt" 2> nul
DEL /Q "%~dp0Duplicate_Sort_List_Duplicates_*_.txt" 2> nul
DEL /Q "%~dp0Sorted_List_TMP_*_.txt" 2> nul
DEL /Q "%~dp0Sorted_List.txt" 2> nul

FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Unsorted_List.txt") DO (ECHO "%%A">> "%~dp0Sorted_List_TMP_1_.txt")
TYPE "%~dp0Sorted_List_TMP_1_.txt"| SORT /+2 /O "%~dp0Duplicate_Sort_List_Duplicates_1_.txt"
TYPE "%~dp0Duplicate_Sort_List_Duplicates_1_.txt"| FIND "" /V /C> "%~dp0Duplicate_Sort_List_Generic_LineCount.txt"
DEL /Q "%~dp0Sorted_List_TMP_*_.txt" 2> nul

SET /P MX_SRT_VAL_=<"%~dp0Duplicate_Sort_List_Generic_LineCount.txt"

IF EXIST "%~dp0TMP_SRT" RMDIR /S /Q "%~dp0TMP_SRT"
IF NOT EXIST "%~dp0TMP_SRT" MKDIR "%~dp0TMP_SRT"

SET CNTR_NUM=1
FOR /F "usebackq tokens=*" %%A IN ("%~dp0Duplicate_Sort_List_Duplicates_1_.txt") DO (ECHO [!CNTR_NUM!]%%A>> "%~dp0Duplicate_Sort_List_Duplicates_2_.txt"&SET /A CNTR_NUM+=1)

FOR /L %%A IN (1,1,%MX_SRT_VAL_%) DO (TYPE "%~dp0Duplicate_Sort_List_Duplicates_2_.txt"| FINDSTR /BRC:"\[%%A\]"> "%~dp0TMP_SRT\ENTRY_%%A_SRT.txt")

TYPE "%~dp0TMP_SRT\ENTRY_1_SRT.txt"> "%~dp0Duplicate_Sort_List_Duplicates_5_.txt"

FOR /L %%A IN (2,1,%MX_SRT_VAL_%) DO (CALL :TMP_SRT_ %%A)

FOR /F "usebackq tokens=2 delims=[]" %%A IN ("%~dp0Duplicate_Sort_List_Duplicates_5_.txt") DO (ECHO %%~A>> "%~dp0Sorted_List.txt")

GOTO LST_LNE_

:TMP_SRT_
FOR /F "usebackq tokens=2 delims=[]" %%A IN ("%~dp0TMP_SRT\ENTRY_%1_SRT.txt") DO (SET TMP_SRT_VAL_=%%A)
TYPE "%~dp0Duplicate_Sort_List_Duplicates_5_.txt"| FIND %TMP_SRT_VAL_% /C> "%~dp0Duplicate_Sort_List_Duplicates_6_.txt"
SET /P RNGCHK_[%1]_=<"%~dp0Duplicate_Sort_List_Duplicates_6_.txt"
IF !RNGCHK_[%1]_! LSS 1 (TYPE "%~dp0TMP_SRT\ENTRY_%1_SRT.txt">> "%~dp0Duplicate_Sort_List_Duplicates_5_.txt")
GOTO :EOF

:LST_LNE_

DEL /Q "%~dp0Duplicate_Sort_List_Generic_LineCount.txt" 2> nul
DEL /Q "%~dp0Duplicate_Sort_List_Duplicates_*_.txt" 2> nul
RMDIR /S /Q "%~dp0TMP_SRT"

ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_10705_4_PRSE

:LST_LNE_DELAMINATE_10705_4_
SET DLM_SKP_=5748
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_5_PRSE GOTO SKP_SRT_10705_5_)&&ECHO %%A>> "C:\Patches\Batch_Files\Generate_Line_Count.bat")
:SKP_SRT_10705_5_
GOTO :LST_LNE_DELAMINATE_10705_5_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
CD /D "%~dp0"
SET CNTR_NUM=1

IF EXIST "%~dp0PowerShell_Output_Script.txt" DEL /Q "%~dp0PowerShell_Output_Script.txt" 2> nul
TYPE "%~dp0PowerShell_Input_Script.txt"| SORT /O "%~dp0PowerShell_Output_Script.txt"
TYPE "%~dp0PowerShell_Output_Script.txt"> "%~dp0PowerShell_Input_Script.txt"
IF EXIST "%~dp0PowerShell_Output_Script.txt" DEL /Q "%~dp0PowerShell_Output_Script.txt" 2> nul

ECHO @ECHO OFF> "%~dp0PowerShell_Output_Script.txt"
ECHO SETLOCAL EnableDelayedExpansion>> "%~dp0PowerShell_Output_Script.txt"

FOR /F "usebackq tokens=*" %%A IN ("%~dp0PowerShell_Input_Script.txt") DO (ECHO SET DNS_SRT_[!CNTR_NUM!]_='%%A'>> "%~dp0PowerShell_Output_Script.txt"&SET /A CNTR_NUM+=1)
SET /A CNTR_NUM-=1

ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET DNS_SRT_MINVL_=^1>> "%~dp0PowerShell_Output_Script.txt"
(ECHO SET DNS_SRT_MAXVL_=%CNTR_NUM%)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO ^(SET _DNSSRT_1STHALF_=Resolve-DnsName -Name ^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO ^(SET _DNSSRT_2NDHALF_= -Server 127.0.0.1 -Type A -DnsOnly -DnssecOk -NoHostsFile;^)>> "%~dp0PowerShell_Output_Script.txt"
(ECHO SET DNS_SRT_INC_VL_=50)>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET DNS_SRT_CTRVL_1_=^1>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET DNS_SRT_CTRVL_2_=%%DNS_SRT_INC_VL_%%>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET /A DNS_SRT_TSTVL_1_=^(%%DNS_SRT_CTRVL_2_%%+%%DNS_SRT_INC_VL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET /A DNS_SRT_TSTVL_2_=^(%%DNS_SRT_MAXVL_%%-%%DNS_SRT_INC_VL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO :DNSSRTPRCSS_LBL_1_>> "%~dp0PowerShell_Output_Script.txt"
ECHO IF %%DNS_SRT_CTRVL_2_%% EQU %%DNS_SRT_MAXVL_%% ^(GOTO DNSSRTPRCSS_LSTLNE_^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO IF %%DNS_SRT_TSTVL_1_%% GTR %%DNS_SRT_MAXVL_%% ^(SET DNS_SRT_CTRVL_2_=%%DNS_SRT_MAXVL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO ^(SET DNSSRTRNGE_TMP_VAR_=^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO ^(SET DNSSRTRNGE_TMP_VAR_2_=^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO FOR /L %%%%A IN ^(%%DNS_SRT_CTRVL_1_%%,1,%%DNS_SRT_CTRVL_2_%%^) DO ^(^(SET DNSSRTRNGE_TMP_VAR_=^^!DNSSRTRNGE_TMP_VAR_2_^^!%%_DNSSRT_1STHALF_%%^^!DNS_SRT_[%%%%A]_^^!%%_DNSSRT_2NDHALF_%%^)^&^(SET DNSSRTRNGE_TMP_VAR_2_=^^!DNSSRTRNGE_TMP_VAR_^^!^)^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO ^(CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {%%DNSSRTRNGE_TMP_VAR_2_%%}"^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET /A DNS_SRT_TSTVL_1_=^(%%DNS_SRT_CTRVL_2_%%+%%DNS_SRT_INC_VL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO SET /A DNS_SRT_TSTVL_2_=^(%%DNS_SRT_MAXVL_%%-%%DNS_SRT_INC_VL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO IF %%DNS_SRT_CTRVL_1_%% LSS %%DNS_SRT_TSTVL_2_%% ^(SET /A DNS_SRT_CTRVL_1_=%%DNS_SRT_CTRVL_2_%%+1^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO IF %%DNS_SRT_MAXVL_%% GTR %%DNS_SRT_TSTVL_1_%% ^(SET /A DNS_SRT_CTRVL_2_+=%%DNS_SRT_INC_VL_%%^)>> "%~dp0PowerShell_Output_Script.txt"
ECHO:>> "%~dp0PowerShell_Output_Script.txt"
ECHO GOTO DNSSRTPRCSS_LBL_1_>> "%~dp0PowerShell_Output_Script.txt"
ECHO :DNSSRTPRCSS_LSTLNE_>> "%~dp0PowerShell_Output_Script.txt"
ECHO ENDLOCAL DisableDelayedExpansion>> "%~dp0PowerShell_Output_Script.txt"
ECHO MOVE NUL 2^>^&^0>> "%~dp0PowerShell_Output_Script.txt"

ENDLOCAL DisableDelayedExpansion

REM_SKP_LBL_10705_5_PRSE

:LST_LNE_DELAMINATE_10705_5_
SET DLM_SKP_=5807
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_6_PRSE GOTO SKP_SRT_10705_6_)&&ECHO %%A>> "C:\Patches\Batch_Files\Install_VC_DirectX_Vulkan_Offline.bat")
:SKP_SRT_10705_6_
GOTO :LST_LNE_DELAMINATE_10705_6_

@ECHO OFF
SETLOCAL
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_8_2005_IA64" MKDIR "%Temp%\VC++_NET_Runtimes\VC_8_2005_IA64"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VB_6_Controls" MKDIR "%Temp%\VC++_NET_Runtimes\VB_6_Controls"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_8_2005_64" MKDIR "%Temp%\VC++_NET_Runtimes\VC_8_2005_64"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_8_2005_86" MKDIR "%Temp%\VC++_NET_Runtimes\VC_8_2005_86"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_9_2008_64" MKDIR "%Temp%\VC++_NET_Runtimes\VC_9_2008_64"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_9_2008_86" MKDIR "%Temp%\VC++_NET_Runtimes\VC_9_2008_86"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_10_2010_64" MKDIR "%Temp%\VC++_NET_Runtimes\VC_10_2010_64"
IF NOT EXIST "%Temp%\VC++_NET_Runtimes\VC_10_2010_86" MKDIR "%Temp%\VC++_NET_Runtimes\VC_10_2010_86"
IF %Processor_Architecture%==IA64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.EXE" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_8_2005_IA64"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.exe" /Q /T:"%Temp%\VC++_NET_Runtimes\VB_6_Controls"
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.EXE" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_8_2005_64"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.EXE" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_8_2005_86"
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.exe" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_9_2008_64"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.exe" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_9_2008_86"
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.exe" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_10_2010_64"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.exe" /Q /T:"%Temp%\VC++_NET_Runtimes\VC_10_2010_86"
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.exe" /install /quiet /norestart
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.exe" /install /quiet /norestart
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.exe" /install /quiet /norestart
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.exe" /install /quiet /norestart
IF %Processor_Architecture%==ARM64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.exe" /install /quiet /norestart
IF %Processor_Architecture%==AMD64 "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.exe" /install /quiet /norestart
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.exe" /install /quiet /norestart
RMDIR /S /Q "%Temp%\VC++_NET_Runtimes"
IF NOT EXIST "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1" MKDIR "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes\directx_Jun2010_redist.exe" /Q /T:"%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1\DXSETUP.exe" /silent
RMDIR /S /Q "%Temp%\WinGet\Microsoft.DirectX.9.29.1974.1"
"%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT\VulkanRT_Installer.exe" /S
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_6_PRSE

:LST_LNE_DELAMINATE_10705_6_
SET DLM_SKP_=5849
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_7_PRSE GOTO SKP_SRT_10705_7_)&&ECHO %%A>> "C:\Patches\Batch_Files\Registry_Patch_Win10_11.bat")
:SKP_SRT_10705_7_
GOTO :LST_LNE_DELAMINATE_10705_7_

@ECHO OFF
SETLOCAL
BCDEDIT /SET {current} QUIETBOOT TRUE
BCDEDIT /SET {current} BOOTLOG FALSE
BCDEDIT /SET {current} BOOTMENUPOLICY LEGACY
BCDEDIT /SET {current} USEPLATFORMCLOCK TRUE
BCDEDIT /SET {current} TPMBOOTENTROPY FORCEENABLE
BCDEDIT /SET {current} TSCSYNCPOLICY ENHANCED
BCDEDIT /SET {current} DISABLEDYNAMICTICK FALSE
BCDEDIT /SET {current} NX OPTOUT
BCDEDIT /SET {current} PAE DEFAULT
BCDEDIT /SET {current} DISABLEELAMDRIVERS TRUE
IF EXIST "C:\Windows\System32\smartscreen.exe" TAKEOWN /A /F "C:\Windows\System32\smartscreen.exe"
IF EXIST "C:\Windows\System32\WaaSMedicAgent.exe" TAKEOWN /A /F "C:\Windows\System32\WaaSMedicAgent.exe"
IF EXIST "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" TAKEOWN /A /F "C:\Windows\UUS\amd64\WaaSMedicAgent.exe"
IF EXIST "C:\Windows\System32\drivers\WdNisDrv.sys" TAKEOWN /A /F "C:\Windows\System32\drivers\WdNisDrv.sys"
IF EXIST "C:\Windows\System32\Drivers\WdFilter.sys" TAKEOWN /A /F "C:\Windows\System32\Drivers\WdFilter.sys"
IF EXIST "C:\Windows\System32\Drivers\WdBoot.sys" TAKEOWN /A /F "C:\Windows\System32\Drivers\WdBoot.sys"
IF EXIST "C:\Windows\System32\Drivers\WdDevFlt.sys" TAKEOWN /A /F "C:\Windows\System32\Drivers\WdDevFlt.sys"
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\smartscreen.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\UUS\amd64\WaaSMedicAgent.exe" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\drivers\WdNisDrv.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdFilter.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdBoot.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "ALL RESTRICTED APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "ALL APPLICATION PACKAGES" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "CREATOR OWNER" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\Authenticated Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT SERVICE\TrustedInstaller" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "NT AUTHORITY\SYSTEM" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "BUILTIN\Users" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "BUILTIN\Administrators" /C /L /Q
ICACLS "C:\Windows\System32\Drivers\WdDevFlt.sys" /INHERITANCE:D /REMOVE "Everyone" /C /L /Q
SETLOCAL EnableDelayedExpansion
SET RGSRT_[1]_="HKLM\SYSTEM"
SET RGSRT_[2]_="HKLM\SOFTWARE"
SET RGSRT_[3]_="HKLM\SOFTWARE\Microsoft"
SET RGSRT_[4]_="HKLM\SOFTWARE\Microsoft\Windows NT"
SET RGSRT_[5]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion"
SET RGSRT_[6]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule"
SET RGSRT_[7]_="HKLM\SYSTEM\ControlSet001"
SET RGSRT_[8]_="HKLM\SYSTEM\ControlSet001\Services"
SET RGSRT_[9]_="HKLM\SOFTWARE\Policies\Microsoft\MRT"
SET RGSRT_[10]_="HKLM\SOFTWARE\Policies\Microsoft\Windows Defender"
SET RGSRT_[11]_="HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings"
SET RGSRT_[12]_="HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery"
SET RGSRT_[13]_="HKLM\SOFTWARE\Microsoft\Command Processor"
SET RGSRT_[14]_="HKLM\SYSTEM\Setup\MoSetup"
SET RGSRT_[15]_="HKLM\SYSTEM\Setup\LabConfig"
SET RGSRT_[16]_="HKLM\SOFTWARE\Classes\Directory\ShellEx\ContextMenuHandlers\EPP"
SET RGSRT_[17]_="HKLM\SOFTWARE\Classes\Drive\ShellEx\ContextMenuHandlers\EPP"
SET RGSRT_[18]_="HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP"
SET RGSRT_[19]_="HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
SET RGSRT_[20]_="HKLM\SOFTWARE\Classes\CompressedFolder\CLSID"
SET RGSRT_[21]_="HKLM\SOFTWARE\Classes\SystemFileAssociations\.zip\CLSID"
SET RGSRT_[22]_="HKLM\SOFTWARE\Classes\SystemFileAssociations\image\shell\print"
SET RGSRT_[23]_="HKLM\SOFTWARE\Classes\SystemFileAssociations\text\shell\print"
SET RGSRT_[24]_="HKLM\SOFTWARE\Classes\batfile\shell\print"
SET RGSRT_[25]_="HKLM\SOFTWARE\Classes\cmdfile\shell\print"
SET RGSRT_[26]_="HKLM\SOFTWARE\Classes\docfile\shell\print"
SET RGSRT_[27]_="HKLM\SOFTWARE\Classes\fonfile\shell\print"
SET RGSRT_[28]_="HKLM\SOFTWARE\Classes\htmlfile\shell\print"
SET RGSRT_[29]_="HKLM\SOFTWARE\Classes\inffile\shell\print"
SET RGSRT_[30]_="HKLM\SOFTWARE\Classes\inifile\shell\print"
SET RGSRT_[31]_="HKLM\SOFTWARE\Classes\JSEFile\shell\print"
SET RGSRT_[32]_="HKLM\SOFTWARE\Classes\JSFile\shell\print"
SET RGSRT_[33]_="HKLM\SOFTWARE\Classes\MSInfo.Document\shell\print"
SET RGSRT_[34]_="HKLM\SOFTWARE\Classes\otffile\shell\print"
SET RGSRT_[35]_="HKLM\SOFTWARE\Classes\pfmfile\shell\print"
SET RGSRT_[36]_="HKLM\SOFTWARE\Classes\regfile\shell\print"
SET RGSRT_[37]_="HKLM\SOFTWARE\Classes\rtffile\shell\print"
SET RGSRT_[38]_="HKLM\SOFTWARE\Classes\ttcfile\shell\print"
SET RGSRT_[39]_="HKLM\SOFTWARE\Classes\ttffile\shell\print"
SET RGSRT_[40]_="HKLM\SOFTWARE\Classes\txtfile\shell\print"
SET RGSRT_[41]_="HKLM\SOFTWARE\Classes\VBEFile\shell\print"
SET RGSRT_[42]_="HKLM\SOFTWARE\Classes\VBSFile\shell\print"
SET RGSRT_[43]_="HKLM\SOFTWARE\Classes\Wordpad.Document.1\shell\print"
SET RGSRT_[44]_="HKLM\SOFTWARE\Classes\WPEDoc\shell\print"
SET RGSRT_[45]_="HKLM\SOFTWARE\Classes\WPSDoc\shell\print"
SET RGSRT_[46]_="HKLM\SOFTWARE\Classes\wrifile\shell\print"
SET RGSRT_[47]_="HKLM\SOFTWARE\Classes\WSFFile\shell\print"
SET RGSRT_[48]_="HKLM\SYSTEM\ControlSet001\Services\AxInstSV"
SET RGSRT_[49]_="HKLM\SYSTEM\ControlSet001\Services\AJRouter"
SET RGSRT_[50]_="HKLM\SYSTEM\ControlSet001\Services\AppReadiness"
SET RGSRT_[51]_="HKLM\SYSTEM\ControlSet001\Services\Appinfo"
SET RGSRT_[52]_="HKLM\SYSTEM\ControlSet001\Services\ALG"
SET RGSRT_[53]_="HKLM\SYSTEM\ControlSet001\Services\tzautoupdate"
SET RGSRT_[54]_="HKLM\SYSTEM\ControlSet001\Services\BITS"
SET RGSRT_[55]_="HKLM\SYSTEM\ControlSet001\Services\bthserv"
SET RGSRT_[56]_="HKLM\SYSTEM\ControlSet001\Services\CertPropSvc"
SET RGSRT_[57]_="HKLM\SYSTEM\ControlSet001\Services\KeyIso"
SET RGSRT_[58]_="HKLM\SYSTEM\ControlSet001\Services\EventSystem"
SET RGSRT_[59]_="HKLM\SYSTEM\ControlSet001\Services\COMSysApp"
SET RGSRT_[60]_="HKLM\SYSTEM\ControlSet001\Services\Browser"
SET RGSRT_[61]_="HKLM\SYSTEM\ControlSet001\Services\CDPSvc"
SET RGSRT_[62]_="HKLM\SYSTEM\ControlSet001\Services\DiagTrack"
SET RGSRT_[63]_="HKLM\SYSTEM\ControlSet001\Services\VaultSvc"
SET RGSRT_[64]_="HKLM\SYSTEM\ControlSet001\Services\CryptSvc"
SET RGSRT_[65]_="HKLM\SYSTEM\ControlSet001\Services\DsSvc"
SET RGSRT_[66]_="HKLM\SYSTEM\ControlSet001\Services\DeviceAssociationService"
SET RGSRT_[67]_="HKLM\SYSTEM\ControlSet001\Services\DeviceInstall"
SET RGSRT_[68]_="HKLM\SYSTEM\ControlSet001\Services\DmEnrollmentSvc"
SET RGSRT_[69]_="HKLM\SYSTEM\ControlSet001\Services\DsmSvc"
SET RGSRT_[70]_="HKLM\SYSTEM\ControlSet001\Services\DevQueryBroker"
SET RGSRT_[71]_="HKLM\SYSTEM\ControlSet001\Services\Dhcp"
SET RGSRT_[72]_="HKLM\SYSTEM\ControlSet001\Services\MSDTC"
SET RGSRT_[73]_="HKLM\SYSTEM\ControlSet001\Services\dmwappushservice"
SET RGSRT_[74]_="HKLM\SYSTEM\ControlSet001\Services\MapsBroker"
SET RGSRT_[75]_="HKLM\SYSTEM\ControlSet001\Services\EFS"
SET RGSRT_[76]_="HKLM\SYSTEM\ControlSet001\Services\EapHost"
SET RGSRT_[77]_="HKLM\SYSTEM\ControlSet001\Services\fdPHost"
SET RGSRT_[78]_="HKLM\SYSTEM\ControlSet001\Services\FDResPub"
SET RGSRT_[79]_="HKLM\SYSTEM\ControlSet001\Services\lfsvc"
SET RGSRT_[80]_="HKLM\SYSTEM\ControlSet001\Services\hidserv"
SET RGSRT_[81]_="HKLM\SYSTEM\ControlSet001\Services\HvHost"
SET RGSRT_[82]_="HKLM\SYSTEM\ControlSet001\Services\vmickvpexchange"
SET RGSRT_[83]_="HKLM\SYSTEM\ControlSet001\Services\vmicguestinterface"
SET RGSRT_[84]_="HKLM\SYSTEM\ControlSet001\Services\vmicshutdown"
SET RGSRT_[85]_="HKLM\SYSTEM\ControlSet001\Services\vmicheartbeat"
SET RGSRT_[86]_="HKLM\SYSTEM\ControlSet001\Services\vmicvmsession"
SET RGSRT_[87]_="HKLM\SYSTEM\ControlSet001\Services\vmicrdv"
SET RGSRT_[88]_="HKLM\SYSTEM\ControlSet001\Services\vmictimesync"
SET RGSRT_[89]_="HKLM\SYSTEM\ControlSet001\Services\vmicvss"
SET RGSRT_[90]_="HKLM\SYSTEM\ControlSet001\Services\IKEEXT"
SET RGSRT_[91]_="HKLM\SYSTEM\ControlSet001\Services\SharedAccess"
SET RGSRT_[92]_="HKLM\SYSTEM\ControlSet001\Services\iphlpsvc"
SET RGSRT_[93]_="HKLM\SYSTEM\ControlSet001\Services\PolicyAgent"
SET RGSRT_[94]_="HKLM\SYSTEM\ControlSet001\Services\KtmRm"
SET RGSRT_[95]_="HKLM\SYSTEM\ControlSet001\Services\lltdsvc"
SET RGSRT_[96]_="HKLM\SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service"
SET RGSRT_[97]_="HKLM\SYSTEM\ControlSet001\Services\wlidsvc"
SET RGSRT_[98]_="HKLM\SYSTEM\ControlSet001\Services\MSiSCSI"
SET RGSRT_[99]_="HKLM\SYSTEM\ControlSet001\Services\swprv"
SET RGSRT_[100]_="HKLM\SYSTEM\ControlSet001\Services\smphost"
SET RGSRT_[101]_="HKLM\SYSTEM\ControlSet001\Services\NetTcpPortSharing"
SET RGSRT_[102]_="HKLM\SYSTEM\ControlSet001\Services\Netlogon"
SET RGSRT_[103]_="HKLM\SYSTEM\ControlSet001\Services\NcbService"
SET RGSRT_[104]_="HKLM\SYSTEM\ControlSet001\Services\Netman"
SET RGSRT_[105]_="HKLM\SYSTEM\ControlSet001\Services\NcaSvc"
SET RGSRT_[106]_="HKLM\SYSTEM\ControlSet001\Services\netprofm"
SET RGSRT_[107]_="HKLM\SYSTEM\ControlSet001\Services\NlaSvc"
SET RGSRT_[108]_="HKLM\SYSTEM\ControlSet001\Services\NetSetupSvc"
SET RGSRT_[109]_="HKLM\SYSTEM\ControlSet001\Services\nsi"
SET RGSRT_[110]_="HKLM\SYSTEM\ControlSet001\Services\defragsvc"
SET RGSRT_[111]_="HKLM\SYSTEM\ControlSet001\Services\PerfHost"
SET RGSRT_[112]_="HKLM\SYSTEM\ControlSet001\Services\pla"
SET RGSRT_[113]_="HKLM\SYSTEM\ControlSet001\Services\PhoneSvc"
SET RGSRT_[114]_="HKLM\SYSTEM\ControlSet001\Services\PlugPlay"
SET RGSRT_[115]_="HKLM\SYSTEM\ControlSet001\Services\WPDBusEnum"
SET RGSRT_[116]_="HKLM\SYSTEM\ControlSet001\Services\Power"
SET RGSRT_[117]_="HKLM\SYSTEM\ControlSet001\Services\Spooler"
SET RGSRT_[118]_="HKLM\SYSTEM\ControlSet001\Services\PrintNotify"
SET RGSRT_[119]_="HKLM\SYSTEM\ControlSet001\Services\wercplsupport"
SET RGSRT_[120]_="HKLM\SYSTEM\ControlSet001\Services\PcaSvc"
SET RGSRT_[121]_="HKLM\SYSTEM\ControlSet001\Services\QWAVE"
SET RGSRT_[122]_="HKLM\SYSTEM\ControlSet001\Services\RmSvc"
SET RGSRT_[123]_="HKLM\SYSTEM\ControlSet001\Services\RasAuto"
SET RGSRT_[124]_="HKLM\SYSTEM\ControlSet001\Services\RasMan"
SET RGSRT_[125]_="HKLM\SYSTEM\ControlSet001\Services\SessionEnv"
SET RGSRT_[126]_="HKLM\SYSTEM\ControlSet001\Services\TermService"
SET RGSRT_[127]_="HKLM\SYSTEM\ControlSet001\Services\UmRdpService"
SET RGSRT_[128]_="HKLM\SYSTEM\ControlSet001\Services\RpcLocator"
SET RGSRT_[129]_="HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry"
SET RGSRT_[130]_="HKLM\SYSTEM\ControlSet001\Services\RemoteAccess"
SET RGSRT_[131]_="HKLM\SYSTEM\ControlSet001\Services\seclogon"
SET RGSRT_[132]_="HKLM\SYSTEM\ControlSet001\Services\SstpSvc"
SET RGSRT_[133]_="HKLM\SYSTEM\ControlSet001\Services\SensorDataService"
SET RGSRT_[134]_="HKLM\SYSTEM\ControlSet001\Services\SensrSvc"
SET RGSRT_[135]_="HKLM\SYSTEM\ControlSet001\Services\SensorService"
SET RGSRT_[136]_="HKLM\SYSTEM\ControlSet001\Services\LanmanServer"
SET RGSRT_[137]_="HKLM\SYSTEM\ControlSet001\Services\ShellHWDetection"
SET RGSRT_[138]_="HKLM\SYSTEM\ControlSet001\Services\SCardSvr"
SET RGSRT_[139]_="HKLM\SYSTEM\ControlSet001\Services\ScDeviceEnum"
SET RGSRT_[140]_="HKLM\SYSTEM\ControlSet001\Services\SCPolicySvc"
SET RGSRT_[141]_="HKLM\SYSTEM\ControlSet001\Services\SNMPTRAP"
SET RGSRT_[142]_="HKLM\SYSTEM\ControlSet001\Services\svsvc"
SET RGSRT_[143]_="HKLM\SYSTEM\ControlSet001\Services\SSDPSRV"
SET RGSRT_[144]_="HKLM\SYSTEM\ControlSet001\Services\WiaRpc"
SET RGSRT_[145]_="HKLM\SYSTEM\ControlSet001\Services\StorSvc"
SET RGSRT_[146]_="HKLM\SYSTEM\ControlSet001\Services\TieringEngineService"
SET RGSRT_[147]_="HKLM\SYSTEM\ControlSet001\Services\SysMain"
SET RGSRT_[148]_="HKLM\SYSTEM\ControlSet001\Services\SENS"
SET RGSRT_[149]_="HKLM\SYSTEM\ControlSet001\Services\lmhosts"
SET RGSRT_[150]_="HKLM\SYSTEM\ControlSet001\Services\TapiSrv"
SET RGSRT_[151]_="HKLM\SYSTEM\ControlSet001\Services\Themes"
SET RGSRT_[152]_="HKLM\SYSTEM\ControlSet001\Services\UsoSvc"
SET RGSRT_[153]_="HKLM\SYSTEM\ControlSet001\Services\upnphost"
SET RGSRT_[154]_="HKLM\SYSTEM\ControlSet001\Services\UserManager"
SET RGSRT_[155]_="HKLM\SYSTEM\ControlSet001\Services\ProfSvc"
SET RGSRT_[156]_="HKLM\SYSTEM\ControlSet001\Services\vds"
SET RGSRT_[157]_="HKLM\SYSTEM\ControlSet001\Services\VSS"
SET RGSRT_[158]_="HKLM\SYSTEM\ControlSet001\Services\WalletService"
SET RGSRT_[159]_="HKLM\SYSTEM\ControlSet001\Services\Audiosrv"
SET RGSRT_[160]_="HKLM\SYSTEM\ControlSet001\Services\AudioEndpointBuilder"
SET RGSRT_[161]_="HKLM\SYSTEM\ControlSet001\Services\WbioSrvc"
SET RGSRT_[162]_="HKLM\SYSTEM\ControlSet001\Services\FrameServer"
SET RGSRT_[163]_="HKLM\SYSTEM\ControlSet001\Services\Wcmsvc"
SET RGSRT_[164]_="HKLM\SYSTEM\ControlSet001\Services\WEPHOSTSVC"
SET RGSRT_[165]_="HKLM\SYSTEM\ControlSet001\Services\Wecsvc"
SET RGSRT_[166]_="HKLM\SYSTEM\ControlSet001\Services\FontCache"
SET RGSRT_[167]_="HKLM\SYSTEM\ControlSet001\Services\stisvc"
SET RGSRT_[168]_="HKLM\SYSTEM\ControlSet001\Services\wisvc"
SET RGSRT_[169]_="HKLM\SYSTEM\ControlSet001\Services\LicenseManager"
SET RGSRT_[170]_="HKLM\SYSTEM\ControlSet001\Services\Winmgmt"
SET RGSRT_[171]_="HKLM\SYSTEM\ControlSet001\Services\icssvc"
SET RGSRT_[172]_="HKLM\SYSTEM\ControlSet001\Services\WpnService"
SET RGSRT_[173]_="HKLM\SYSTEM\ControlSet001\Services\WinRM"
SET RGSRT_[174]_="HKLM\SYSTEM\ControlSet001\Services\WSearch"
SET RGSRT_[175]_="HKLM\SYSTEM\ControlSet001\Services\W32Time"
SET RGSRT_[176]_="HKLM\SYSTEM\ControlSet001\Services\dot3svc"
SET RGSRT_[177]_="HKLM\SYSTEM\ControlSet001\Services\wmiApSrv"
SET RGSRT_[178]_="HKLM\SYSTEM\ControlSet001\Services\LanmanWorkstation"
SET RGSRT_[179]_="HKLM\SYSTEM\ControlSet001\Services\XblAuthManager"
SET RGSRT_[180]_="HKLM\SYSTEM\ControlSet001\Services\XblGameSave"
SET RGSRT_[181]_="HKLM\SYSTEM\ControlSet001\Services\BcastDVRUserService"
SET RGSRT_[182]_="HKLM\SYSTEM\ControlSet001\Services\BluetoothUserService"
SET RGSRT_[183]_="HKLM\SYSTEM\ControlSet001\Services\CaptureService"
SET RGSRT_[184]_="HKLM\SYSTEM\ControlSet001\Services\CDPUserSvc"
SET RGSRT_[185]_="HKLM\SYSTEM\ControlSet001\Services\DevicePickerUserSvc"
SET RGSRT_[186]_="HKLM\SYSTEM\ControlSet001\Services\DevicesFlowUserSvc"
SET RGSRT_[187]_="HKLM\SYSTEM\ControlSet001\Services\MessagingService"
SET RGSRT_[188]_="HKLM\SYSTEM\ControlSet001\Services\OneSyncSvc"
SET RGSRT_[189]_="HKLM\SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc"
SET RGSRT_[190]_="HKLM\SYSTEM\ControlSet001\Services\UnistoreSvc"
SET RGSRT_[191]_="HKLM\SYSTEM\ControlSet001\Services\UserDataSvc"
SET RGSRT_[192]_="HKLM\SYSTEM\ControlSet001\Services\WpnUserService"
SET RGSRT_[193]_="HKLM\SYSTEM\ControlSet001\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity"
SET RGSRT_[194]_="HKLM\SYSTEM\ControlSet001\Control\FileSystem"
SET RGSRT_[195]_="HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc"
SET RGSRT_[196]_="HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc"
SET RGSRT_[197]_="HKLM\SYSTEM\ControlSet001\Services\wscsvc"
SET RGSRT_[198]_="HKLM\SYSTEM\ControlSet001\Services\sedsvc"
SET RGSRT_[199]_="HKLM\SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc"
SET RGSRT_[200]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdate"
SET RGSRT_[201]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdate\TriggerInfo"
SET RGSRT_[202]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdate\TriggerInfo\0"
SET RGSRT_[203]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdatem"
SET RGSRT_[204]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdatem\TriggerInfo"
SET RGSRT_[205]_="HKLM\SYSTEM\ControlSet001\Services\edgeupdatem\TriggerInfo\0"
SET RGSRT_[206]_="HKLM\SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService"
SET RGSRT_[207]_="HKLM\SYSTEM\ControlSet001\Services\WMPNetworkSvc"
SET RGSRT_[208]_="HKLM\SYSTEM\ControlSet001\Services\lmhosts"
SET RGSRT_[209]_="HKLM\SYSTEM\ControlSet001\Services\WpcMonSvc"
SET RGSRT_[210]_="HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc"
SET RGSRT_[211]_="HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc\Parameters"
SET RGSRT_[212]_="HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc\Security"
SET RGSRT_[213]_="HKLM\SYSTEM\ControlSet001\Services\uhssvc"
SET RGSRT_[214]_="HKLM\SYSTEM\ControlSet001\Services\BITS"
SET RGSRT_[215]_="HKLM\SYSTEM\ControlSet001\Services\BITS\Parameters"
SET RGSRT_[216]_="HKLM\SYSTEM\ControlSet001\Services\BITS\Performance"
SET RGSRT_[217]_="HKLM\SYSTEM\ControlSet001\Services\BITS\Security"
SET RGSRT_[218]_="HKLM\SYSTEM\ControlSet001\Services\EventLog"
SET RGSRT_[219]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application"
SET RGSRT_[220]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Application"
SET RGSRT_[221]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Application Error"
SET RGSRT_[222]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Application Hang"
SET RGSRT_[223]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Application-Addon-Event-Provider"
SET RGSRT_[224]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\CardSpace 4.0.0.0"
SET RGSRT_[225]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Chkdsk"
SET RGSRT_[226]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\COM"
SET RGSRT_[227]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\COM+"
SET RGSRT_[228]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Desktop Window Manager"
SET RGSRT_[229]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\DiskQuota"
SET RGSRT_[230]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Dwminit"
SET RGSRT_[231]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Error Instrument"
SET RGSRT_[232]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\ESENT"
SET RGSRT_[233]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\EventSystem"
SET RGSRT_[234]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Folder Redirection"
SET RGSRT_[235]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AAD"
SET RGSRT_[236]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ApplicationExperienceInfrastructure"
SET RGSRT_[237]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AppModel-Runtime"
SET RGSRT_[238]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AppModel-State"
SET RGSRT_[239]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ASN1"
SET RGSRT_[240]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Audio"
SET RGSRT_[241]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Audit-CVE"
SET RGSRT_[242]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-AxInstallService"
SET RGSRT_[243]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Backup"
SET RGSRT_[244]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CAPI2"
SET RGSRT_[245]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient"
SET RGSRT_[246]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-AutoEnrollment"
SET RGSRT_[247]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-CertEnroll"
SET RGSRT_[248]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificateServicesClient-CredentialRoaming"
SET RGSRT_[249]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-CertificationAuthorityClient-CertCli"
SET RGSRT_[250]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-COMRuntime"
SET RGSRT_[251]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-BCrypt"
SET RGSRT_[252]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-CNG"
SET RGSRT_[253]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-DPAPI"
SET RGSRT_[254]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-DSSEnh"
SET RGSRT_[255]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-NCrypt"
SET RGSRT_[256]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-RNG"
SET RGSRT_[257]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Crypto-RSAEnh"
SET RGSRT_[258]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DeliveryOptimization"
SET RGSRT_[259]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DeviceGuard"
SET RGSRT_[260]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DirectShow-Core"
SET RGSRT_[261]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-DirectShow-KernelSupport"
SET RGSRT_[262]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EapHost"
SET RGSRT_[263]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EFS"
SET RGSRT_[264]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-EventCollector"
SET RGSRT_[265]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Folder Redirection"
SET RGSRT_[266]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Immersive-Shell"
SET RGSRT_[267]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-KdsSvc"
SET RGSRT_[268]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-LiveId"
SET RGSRT_[269]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PDH"
SET RGSRT_[270]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfDisk"
SET RGSRT_[271]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Perflib"
SET RGSRT_[272]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfNet"
SET RGSRT_[273]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfOS"
SET RGSRT_[274]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-PerfProc"
SET RGSRT_[275]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-ProcessExitMonitor"
SET RGSRT_[276]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RemoteApp and Desktop Connections"
SET RGSRT_[277]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RemoteAssistance"
SET RGSRT_[278]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RestartManager"
SET RGSRT_[279]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-RPC-Events"
SET RGSRT_[280]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Search"
SET RGSRT_[281]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-EnterpriseData-FileRevocationManager"
SET RGSRT_[282]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-Netlogon"
SET RGSRT_[283]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Security-SPP"
SET RGSRT_[284]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SmartCard-DeviceEnum"
SET RGSRT_[285]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SoftwareRestrictionPolicies"
SET RGSRT_[286]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Spell-Checking"
SET RGSRT_[287]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-SpellChecker"
SET RGSRT_[288]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Spellchecking-Host"
SET RGSRT_[289]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-System-Restore"
SET RGSRT_[290]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-TerminalServices-ClientActiveXCore"
SET RGSRT_[291]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User Profiles General"
SET RGSRT_[292]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User Profiles Service"
SET RGSRT_[293]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-User-Loader"
SET RGSRT_[294]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Video-For-Windows"
SET RGSRT_[295]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WBioSrvc"
SET RGSRT_[296]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WindowsSystemAssessmentTool"
SET RGSRT_[297]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-Winsrv"
SET RGSRT_[298]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-WMI"
SET RGSRT_[299]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft-Windows-XWizards"
SET RGSRT_[300]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Microsoft.Transactions.Bridge 4.0.0.0"
SET RGSRT_[301]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC"
SET RGSRT_[302]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC 2"
SET RGSRT_[303]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC Client"
SET RGSRT_[304]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\MSDTC Client 2"
SET RGSRT_[305]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Process Exit Monitor"
SET RGSRT_[306]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Profsvc"
SET RGSRT_[307]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\SceCli"
SET RGSRT_[308]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\SceSrv"
SET RGSRT_[309]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\SecurityCenter"
SET RGSRT_[310]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\ServiceModel Audit 4.0.0.0"
SET RGSRT_[311]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\SideBySide"
SET RGSRT_[312]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Software Protection Platform Service"
SET RGSRT_[313]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\SpeechRuntime"
SET RGSRT_[314]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Standard TCP/IP Port"
SET RGSRT_[315]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\System.IdentityModel 4.0.0.0"
SET RGSRT_[316]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\System.IO.Log 4.0.0.0"
SET RGSRT_[317]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\System.Runtime.Serialization 4.0.0.0"
SET RGSRT_[318]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\System.ServiceModel 4.0.0.0"
SET RGSRT_[319]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\usbperf"
SET RGSRT_[320]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Userenv"
SET RGSRT_[321]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\VBRuntime"
SET RGSRT_[322]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Windows Error Reporting"
SET RGSRT_[323]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Wininit"
SET RGSRT_[324]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Winlogon"
SET RGSRT_[325]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\WinMgmt"
SET RGSRT_[326]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Wlclntfy"
SET RGSRT_[327]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\WMI.NET Provider Extension"
SET RGSRT_[328]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\Wow64 Emulation Layer"
SET RGSRT_[329]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Application\WSH"
SET RGSRT_[330]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\HardwareEvents"
SET RGSRT_[331]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Internet Explorer"
SET RGSRT_[332]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Key Management Service"
SET RGSRT_[333]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Key Management Service\KmsRequests"
SET RGSRT_[334]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Parameters"
SET RGSRT_[335]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security"
SET RGSRT_[336]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\DS"
SET RGSRT_[337]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\DS\ObjectNames"
SET RGSRT_[338]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\LSA"
SET RGSRT_[339]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\LSA\ObjectNames"
SET RGSRT_[340]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Microsoft-Windows-Eventlog"
SET RGSRT_[341]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Microsoft-Windows-Security-Auditing"
SET RGSRT_[342]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\SC Manager"
SET RGSRT_[343]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\SC Manager\ObjectNames"
SET RGSRT_[344]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Security"
SET RGSRT_[345]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Security\ObjectNames"
SET RGSRT_[346]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Security Account Manager"
SET RGSRT_[347]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Security Account Manager\ObjectNames"
SET RGSRT_[348]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\ServiceModel 4.0.0.0"
SET RGSRT_[349]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Spooler"
SET RGSRT_[350]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\Spooler\ObjectNames"
SET RGSRT_[351]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\TCP/IP"
SET RGSRT_[352]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\TCP/IP\ObjectNames"
SET RGSRT_[353]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Security\VSSAudit"
SET RGSRT_[354]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System"
SET RGSRT_[355]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\3ware"
SET RGSRT_[356]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ACPI"
SET RGSRT_[357]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ADP80XX"
SET RGSRT_[358]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AFD"
SET RGSRT_[359]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AMD Crash Defender Service"
SET RGSRT_[360]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AmdK8"
SET RGSRT_[361]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AmdPPM"
SET RGSRT_[362]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\amdsata"
SET RGSRT_[363]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\amdsbs"
SET RGSRT_[364]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\amdxata"
SET RGSRT_[365]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AppleSSD"
SET RGSRT_[366]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Application Popup"
SET RGSRT_[367]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\arcsas"
SET RGSRT_[368]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\AsyncMac"
SET RGSRT_[369]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\atapi"
SET RGSRT_[370]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\b06bdrv"
SET RGSRT_[371]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BasicRender"
SET RGSRT_[372]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\beep"
SET RGSRT_[373]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BthEnum"
SET RGSRT_[374]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BthLEEnum"
SET RGSRT_[375]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BthMini"
SET RGSRT_[376]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BTHPORT"
SET RGSRT_[377]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BTHUSB"
SET RGSRT_[378]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\BugCheck"
SET RGSRT_[379]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\cdrom"
SET RGSRT_[380]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\cht4iscsi"
SET RGSRT_[381]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\cht4vbd"
SET RGSRT_[382]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\DCOM"
SET RGSRT_[383]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\DfsSvc"
SET RGSRT_[384]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Dhcp"
SET RGSRT_[385]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Dhcpv6"
SET RGSRT_[386]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\disk"
SET RGSRT_[387]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Display"
SET RGSRT_[388]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Dnsapi"
SET RGSRT_[389]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Dnscache"
SET RGSRT_[390]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ebdrv"
SET RGSRT_[391]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ebdrv0"
SET RGSRT_[392]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\EventLog"
SET RGSRT_[393]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\exFAT"
SET RGSRT_[394]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\FltMgr"
SET RGSRT_[395]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\fvevol"
SET RGSRT_[396]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\HidBth"
SET RGSRT_[397]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\hidi2c"
SET RGSRT_[398]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\hidspi"
SET RGSRT_[399]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\HpSAMD"
SET RGSRT_[400]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Http"
SET RGSRT_[401]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\hvservice"
SET RGSRT_[402]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\i8042prt"
SET RGSRT_[403]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\iaStorAVC"
SET RGSRT_[404]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\iaStorV"
SET RGSRT_[405]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ibbus"
SET RGSRT_[406]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS-GPIO"
SET RGSRT_[407]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS-I2C"
SET RGSRT_[408]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS2-GPIO2"
SET RGSRT_[409]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Intel-iaLPSS2-I2C"
SET RGSRT_[410]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\intelppm"
SET RGSRT_[411]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\IPMGM"
SET RGSRT_[412]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\IPMIDRV"
SET RGSRT_[413]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\IPNATHLP"
SET RGSRT_[414]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\IPRouterManager"
SET RGSRT_[415]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\IPxlatCfg"
SET RGSRT_[416]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\isapnp"
SET RGSRT_[417]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\iScsiPrt"
SET RGSRT_[418]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ItSas35i"
SET RGSRT_[419]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\kbdclass"
SET RGSRT_[420]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\kbdhid"
SET RGSRT_[421]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\kdnic"
SET RGSRT_[422]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Lfsvc"
SET RGSRT_[423]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\lltdio"
SET RGSRT_[424]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\LmHosts"
SET RGSRT_[425]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\LsaSrv"
SET RGSRT_[426]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS"
SET RGSRT_[427]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS2i"
SET RGSRT_[428]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\LSI_SAS3i"
SET RGSRT_[429]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\megasas2i"
SET RGSRT_[430]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\megasas35i"
SET RGSRT_[431]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\megasr"
SET RGSRT_[432]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Audit-CVE"
SET RGSRT_[433]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-BitLocker-API"
SET RGSRT_[434]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-BitLocker-Driver"
SET RGSRT_[435]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Bits-Client"
SET RGSRT_[436]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Bluetooth-BthLEPrepairing"
SET RGSRT_[437]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CoreSystem-InitMachineConfig"
SET RGSRT_[438]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CoreSystem-NetProvision-JoinProviderOnline"
SET RGSRT_[439]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CorruptedFileRecovery-Client"
SET RGSRT_[440]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-CorruptedFileRecovery-Server"
SET RGSRT_[441]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Devices-Background"
SET RGSRT_[442]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DfsSvc"
SET RGSRT_[443]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Dhcp-Client"
SET RGSRT_[444]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DHCPv6-Client"
SET RGSRT_[445]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Diagnostics-Networking"
SET RGSRT_[446]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Directory-Services-SAM"
SET RGSRT_[447]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DiskDiagnostic"
SET RGSRT_[448]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DistributedCOM"
SET RGSRT_[449]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DNS-Client"
SET RGSRT_[450]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-DriverFrameworks-UserMode"
SET RGSRT_[451]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-EnhancedStorage-EhStorTcgDrv"
SET RGSRT_[452]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-EventCollector"
SET RGSRT_[453]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Eventlog"
SET RGSRT_[454]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-exFAT-SQM"
SET RGSRT_[455]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FailoverClustering-Client"
SET RGSRT_[456]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Fat-SQM"
SET RGSRT_[457]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Fault-Tolerant-Heap"
SET RGSRT_[458]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FilterManager"
SET RGSRT_[459]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Firewall"
SET RGSRT_[460]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FMS"
SET RGSRT_[461]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-FunctionDiscoveryHost"
SET RGSRT_[462]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-GPIO-ClassExtension"
SET RGSRT_[463]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-GroupPolicy"
SET RGSRT_[464]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HAL"
SET RGSRT_[465]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HttpEvent"
SET RGSRT_[466]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-HttpService"
SET RGSRT_[467]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Hyper-V-Hypervisor"
SET RGSRT_[468]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Iphlpsvc"
SET RGSRT_[469]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Iphlpsvc-Trace"
SET RGSRT_[470]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-IsolatedUserMode"
SET RGSRT_[471]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Boot"
SET RGSRT_[472]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-General"
SET RGSRT_[473]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Interrupt-Steering"
SET RGSRT_[474]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-IO"
SET RGSRT_[475]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-PnP"
SET RGSRT_[476]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Power"
SET RGSRT_[477]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Processor-Power"
SET RGSRT_[478]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-Tm"
SET RGSRT_[479]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-WHEA"
SET RGSRT_[480]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Kernel-XDV"
SET RGSRT_[481]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-LanguagePackSetup"
SET RGSRT_[482]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Memory-Diagnostic-Task-Handler"
SET RGSRT_[483]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MemoryDiagnostics-Results"
SET RGSRT_[484]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MemoryDiagnostics-Schedule"
SET RGSRT_[485]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-MountMgr"
SET RGSRT_[486]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NDIS"
SET RGSRT_[487]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NdisImPlatformSysEvtProvider"
SET RGSRT_[488]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Network-ExecutionContext"
SET RGSRT_[489]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-NetworkBridge"
SET RGSRT_[490]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Ntfs"
SET RGSRT_[491]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Ntfs-UBPM"
SET RGSRT_[492]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-OverlayFilter"
SET RGSRT_[493]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-PersistentMemory-Nvdimm"
SET RGSRT_[494]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-PersistentMemory-PmemDisk"
SET RGSRT_[495]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Power-Meter-Polling"
SET RGSRT_[496]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Power-Troubleshooter"
SET RGSRT_[497]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ReFS"
SET RGSRT_[498]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ReFS-v1"
SET RGSRT_[499]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ResetEng"
SET RGSRT_[500]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Resource-Exhaustion-Detector"
SET RGSRT_[501]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-ResourcePublication"
SET RGSRT_[502]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SCPNP"
SET RGSRT_[503]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Serial-ClassExtension"
SET RGSRT_[504]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Serial-ClassExtension-V2"
SET RGSRT_[505]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Setup"
SET RGSRT_[506]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SetupPlatform"
SET RGSRT_[507]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SPB-ClassExtension"
SET RGSRT_[508]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SPB-HIDI2C"
SET RGSRT_[509]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Spell-Checking"
SET RGSRT_[510]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-SpellChecker"
SET RGSRT_[511]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-StartupRepair"
SET RGSRT_[512]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Subsys-SMSS"
SET RGSRT_[513]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TaskScheduler"
SET RGSRT_[514]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TerminalServices-LocalSessionManager"
SET RGSRT_[515]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TerminalServices-RemoteConnectionManager"
SET RGSRT_[516]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Time-Service"
SET RGSRT_[517]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-TPM-WMI"
SET RGSRT_[518]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-CCID"
SET RGSRT_[519]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-MAUSBHOST"
SET RGSRT_[520]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USB4DeviceRouter-EventLogs"
SET RGSRT_[521]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USBHUB3"
SET RGSRT_[522]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-USB-USBXHCI"
SET RGSRT_[523]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-UserModePowerService"
SET RGSRT_[524]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-UserPnp"
SET RGSRT_[525]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WER-SystemErrorReporting"
SET RGSRT_[526]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WHEA-Logger"
SET RGSRT_[527]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Windows Firewall With Advanced Security"
SET RGSRT_[528]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WindowsToGo-StartupOptions"
SET RGSRT_[529]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WindowsUpdateClient"
SET RGSRT_[530]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Wininit"
SET RGSRT_[531]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-Winlogon"
SET RGSRT_[532]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WLAN-AutoConfig"
SET RGSRT_[533]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Microsoft-Windows-WMPNSS-Service"
SET RGSRT_[534]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mlx4_bus"
SET RGSRT_[535]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mouclass"
SET RGSRT_[536]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mouhid"
SET RGSRT_[537]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mpi3drvi"
SET RGSRT_[538]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\MsBridge"
SET RGSRT_[539]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mshidumdf"
SET RGSRT_[540]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\MSiSCSI"
SET RGSRT_[541]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\MTConfig"
SET RGSRT_[542]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Mup"
SET RGSRT_[543]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\mvumis"
SET RGSRT_[544]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NdisImPlatform"
SET RGSRT_[545]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NdisImPlatformSysEvtProvider"
SET RGSRT_[546]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NdisWan"
SET RGSRT_[547]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\ndiswanlegacy"
SET RGSRT_[548]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NetBIOS"
SET RGSRT_[549]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NetBT"
SET RGSRT_[550]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\NetJoin"
SET RGSRT_[551]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Netlogon"
SET RGSRT_[552]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Ntfs"
SET RGSRT_[553]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\nvdimm"
SET RGSRT_[554]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\nvmedisk"
SET RGSRT_[555]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\nvstor"
SET RGSRT_[556]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\P2PIMSvc"
SET RGSRT_[557]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Parport"
SET RGSRT_[558]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\pcmcia"
SET RGSRT_[559]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\percsas2i"
SET RGSRT_[560]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\percsas3i"
SET RGSRT_[561]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\pmem"
SET RGSRT_[562]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\PNPMEM"
SET RGSRT_[563]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\PNRPSvc"
SET RGSRT_[564]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Power"
SET RGSRT_[565]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\PptpMiniport"
SET RGSRT_[566]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Print"
SET RGSRT_[567]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\PrintFilterPipelineSvc"
SET RGSRT_[568]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Processor"
SET RGSRT_[569]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\pvscsi"
SET RGSRT_[570]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\RasAuto"
SET RGSRT_[571]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\RasCfg"
SET RGSRT_[572]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Rasman"
SET RGSRT_[573]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\RemoteAccess"
SET RGSRT_[574]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\RFCOMM"
SET RGSRT_[575]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\rhproxy"
SET RGSRT_[576]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\rspndr"
SET RGSRT_[577]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SAM"
SET RGSRT_[578]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\sbp2port"
SET RGSRT_[579]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Schannel"
SET RGSRT_[580]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\scmbus"
SET RGSRT_[581]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\sercx"
SET RGSRT_[582]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\sercx2"
SET RGSRT_[583]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Serial"
SET RGSRT_[584]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\sermouse"
SET RGSRT_[585]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Server"
SET RGSRT_[586]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Service Control Manager"
SET RGSRT_[587]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SiSRaid2"
SET RGSRT_[588]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SiSRaid4"
SET RGSRT_[589]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SmartSAMD"
SET RGSRT_[590]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SMSvcHost 4.0.0.0"
SET RGSRT_[591]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\SNMPTRAP"
SET RGSRT_[592]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\spaceport"
SET RGSRT_[593]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\spbcx"
SET RGSRT_[594]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Srv"
SET RGSRT_[595]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\stexstor"
SET RGSRT_[596]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\StillImage"
SET RGSRT_[597]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\storahci"
SET RGSRT_[598]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\stornvme"
SET RGSRT_[599]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\System"
SET RGSRT_[600]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Tcpip"
SET RGSRT_[601]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Tcpip6"
SET RGSRT_[602]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\TCPMon"
SET RGSRT_[603]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\TPM"
SET RGSRT_[604]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\tsusbflt"
SET RGSRT_[605]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\tunnel"
SET RGSRT_[606]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\UASPStor"
SET RGSRT_[607]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\UmRdpService"
SET RGSRT_[608]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\usbaudio2"
SET RGSRT_[609]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\usbehci"
SET RGSRT_[610]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\usbser"
SET RGSRT_[611]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\User32"
SET RGSRT_[612]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\volmgr"
SET RGSRT_[613]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Volsnap"
SET RGSRT_[614]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\vpci"
SET RGSRT_[615]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\vsmraid"
SET RGSRT_[616]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\VSTXRAID"
SET RGSRT_[617]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\W32Time"
SET RGSRT_[618]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WacomPen"
SET RGSRT_[619]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\wdf01000"
SET RGSRT_[620]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WinDefend"
SET RGSRT_[621]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Windows Disk Diagnostic"
SET RGSRT_[622]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\Windows Script Host"
SET RGSRT_[623]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WinHttpAutoProxySvc"
SET RGSRT_[624]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WinNat"
SET RGSRT_[625]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WinRM"
SET RGSRT_[626]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WMPNetworkSvc"
SET RGSRT_[627]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\System\WPDClassInstaller"
SET RGSRT_[628]_="HKLM\SYSTEM\ControlSet001\Services\EventLog\Windows PowerShell"
SET RGSRT_[629]_="HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService"
SET RGSRT_[630]_="HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService\Security"
SET RGSRT_[631]_="HKLM\SYSTEM\ControlSet001\Services\SgrmAgent"
SET RGSRT_[632]_="HKLM\SYSTEM\ControlSet001\Services\SgrmAgent\Security"
SET RGSRT_[633]_="HKLM\SYSTEM\ControlSet001\Services\SgrmBroker"
SET RGSRT_[634]_="HKLM\SYSTEM\ControlSet001\Services\SgrmBroker\TriggerInfo"
SET RGSRT_[635]_="HKLM\SYSTEM\ControlSet001\Services\SgrmBroker\TriggerInfo\0"
SET RGSRT_[636]_="HKLM\SYSTEM\ControlSet001\Services\WdNisDrv"
SET RGSRT_[637]_="HKLM\SYSTEM\ControlSet001\Services\WdNisDrv\Security"
SET RGSRT_[638]_="HKLM\SYSTEM\ControlSet001\Services\WdNisSvc"
SET RGSRT_[639]_="HKLM\SYSTEM\ControlSet001\Services\WdNisSvc\Parameters"
SET RGSRT_[640]_="HKLM\SYSTEM\ControlSet001\Services\WdNisSvc\Security"
SET RGSRT_[641]_="HKLM\SYSTEM\ControlSet001\Services\WinDefend"
SET RGSRT_[642]_="HKLM\SYSTEM\ControlSet001\Services\WinDefend\Security"
SET RGSRT_[643]_="HKLM\SYSTEM\ControlSet001\Services\wuauserv"
SET RGSRT_[644]_="HKLM\SYSTEM\ControlSet001\Services\wuauserv\Parameters"
SET RGSRT_[645]_="HKLM\SYSTEM\ControlSet001\Services\wuauserv\Security"
SET RGSRT_[646]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore"
SET RGSRT_[647]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA"
SET RGSRT_[648]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
SET RGSRT_[649]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
SET RGSRT_[650]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\ProgramDataUpdater"
SET RGSRT_[651]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic"
SET RGSRT_[652]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic\PerformRemediation"
SET RGSRT_[653]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore"
SET RGSRT_[654]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore\SR"
SET RGSRT_[655]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitor"
SET RGSRT_[656]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitorToastTask"
SET RGSRT_[657]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefresh"
SET RGSRT_[658]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefreshTask"
SET RGSRT_[659]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\IndexerAutomaticMaintenance"
SET RGSRT_[660]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender"
SET RGSRT_[661]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
SET RGSRT_[662]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
SET RGSRT_[663]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
SET RGSRT_[664]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Verification"
SET RGSRT_[665]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan"
SET RGSRT_[666]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Check And Scan"
SET RGSRT_[667]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Scan"
SET RGSRT_[668]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Data Integrity Scan\Data Integrity Scan for Crash Recovery"
SET RGSRT_[669]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient"
SET RGSRT_[670]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck"
SET RGSRT_[671]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService"
SET RGSRT_[672]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\RestoreDevice"
SET RGSRT_[673]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\SmartRetry"
SET RGSRT_[674]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdates"
SET RGSRT_[675]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdatesAsUser"
SET RGSRT_[676]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates"
SET RGSRT_[677]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate"
SET RGSRT_[678]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Scheduled Start"
SET RGSRT_[679]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Automatic App Update"
SET RGSRT_[680]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Refresh Group Policy Cache"
SET RGSRT_[681]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihboot"
SET RGSRT_[682]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihpostreboot"
SET RGSRT_[683]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sih"
SET RGSRT_[684]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator"
SET RGSRT_[685]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Retry Scan"
SET RGSRT_[686]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
SET RGSRT_[687]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
SET RGSRT_[688]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot"
SET RGSRT_[689]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"
SET RGSRT_[690]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Backup Scan"
SET RGSRT_[691]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_AC"
SET RGSRT_[692]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_Battery"
SET RGSRT_[693]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task"
SET RGSRT_[694]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask"
SET RGSRT_[695]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker"
SET RGSRT_[696]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Report policies"
SET RGSRT_[697]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work"
SET RGSRT_[698]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work"
SET RGSRT_[699]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Work"
SET RGSRT_[700]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Start Oobe Expedite Work"
SET RGSRT_[701]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan"
SET RGSRT_[702]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_LicenseAccepted"
SET RGSRT_[703]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_OobeAppReady"
SET RGSRT_[704]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScanAfterUpdate"
SET RGSRT_[705]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UUS Failover Task"
SET RGSRT_[706]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maintenance\WinSAT"
SET RGSRT_[707]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Error Reporting\QueueReporting"
SET RGSRT_[708]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Diagnosis\Scheduled"
SET RGSRT_[709]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maps\MapsUpdateTask"
SET RGSRT_[710]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
SET RGSRT_[711]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\rempl\shell"
SET RGSRT_[712]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask"
SET RGSRT_[713]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskLogon"
SET RGSRT_[714]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskNetwork"
SET RGSRT_[715]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector"
SET RGSRT_[716]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
SET RGSRT_[717]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh"
SET RGSRT_[718]_="HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\RemovalTools\MRT_ERROR_HB"
FOR /L %%A IN (1,1,718) DO (SetObjectSecurity KEY !RGSRT_[%%A]_! "O:BA" -q)
FOR /L %%A IN (1,1,718) DO (SetObjectSecurity KEY !RGSRT_[%%A]_! "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)
(REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree" /F "MicrosoftEdgeUpdateTaskMachine"| FIND "HKEY_LOCAL_MACHINE"> "%~dp0RGSrt_TMP_0_FL_.txt") >nul 2>&1
TYPE "%~dp0RGSrt_TMP_0_FL_.txt"| FIND /V "" /C> "%~dp0RGSrt_TMP_1_FL_.txt"
SET /P REGSRT_TSTVAL_RNGE_=<"%~dp0RGSrt_TMP_1_FL_.txt"
IF %REGSRT_TSTVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0RGSrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BA" -q)
IF %REGSRT_TSTVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0RGSrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)
IF %REGSRT_TSTVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0RGSrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&REG DELETE "HKLM!TMP_VAR_:~18!" /F)
DEL /Q "%~dp0RGSrt_TMP_*_FL_.txt" 2> nul
SETLOCAL DisableDelayedExpansion
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\FindMyDevice /V AllowFindMyDevice /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PreviewBuilds /V AllowBuildPreview /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Mail" /V ManualLaunchAllowed /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator /V NoActiveProbe /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps /V AllowUntriggeredNetworkTrafficOnSettingsPage /T REG_DWORD /D 00000000 /F 
REG ADD HKLM\SOFTWARE\Microsoft\OneDrive /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\FindMyDevice\AllowFindMyDevice /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\PreviewBuilds /V AllowBuildPreview /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Mail" /V ManualLaunchAllowed /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator /V NoActiveProbe /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps /V AllowUntriggeredNetworkTrafficOnSettingsPage /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\OneDrive /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo /V Enabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo /V Enabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost /V EnableWebContentEvaluation /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors /V DisableLocation /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications /V NoCloudApplicationNotification /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy /V HasAccepted /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\MicrosoftSpeech /V AllowSpeechModelUpdate /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\Messaging /V AllowMessageSync /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection /V DoNotShowFeedbackNotifications /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection /V AllowTelemetry /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Siuf\Rules /V PeriodInNanoSeconds /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Siuf\Rules /V NumberOfSIUFInPeriod /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsConsumerFeatures /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\InputPersonalization /V AllowInputPersonalization /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitTextCollection /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitInkCollection /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /V EnableFeeds /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\StorageHealth /V AllowDiskHealthModelUpdates /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\SettingSync /V DisableSettingSync /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\SettingSync /V DisableSettingSyncUserOverride /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Messaging /V CloudServiceSyncEnabled /T REG_DWORD /D 00000000 /F
REG DELETE HKLM\SOFTWARE\Policies\Microsoft\Windows\TCPIP\v6Transition /V Teredo_State /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V DefinitionUpdateFileSharesSources /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableCloudOptimizedContent /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\MicrosoftWindowsStore /V AutoDownload /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate /V AutoDownload /T REG_DWORD /D 00000005 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection /V DisableOneSettingsDownloads /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSyncProviderNotifications /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackDocs /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackProgs /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V EnableFontProviders /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V EnableCdp /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V AllowAutoAcceptPairingAndPrivacyConsentPrompts /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V AllowCrossDeviceClipboard /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V EnableActivityFeed /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V AllowUserInfoAccess /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V PublishUserActivities /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V UploadUserActivities /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\System /V EnableSmartScreen /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /V DisableConfig /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\OOBE /V DisablePrivacyExperience /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableAntiSpyware /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V ServiceKeepAlive /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /V ForceDefenderPassiveMode /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SpyNetReporting /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SubmitSamplesConsent /T REG_DWORD /D 00000002 /F
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Updates" /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /V DisableRealtimeMonitoring /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /V DisableBehaviorMonitoring /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /V DisableRestorePoint /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V FallbackOrder /T REG_SZ /D FileShares /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V UpdateOnStartUp /T REG_DWORD /D 00000000 /F
REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /V DefinitionUpdateFileSharesSources /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /V DisableEnhancedNotifications /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /V ConfigureAppInstallControlEnabled /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /V ConfigureAppInstallControl /T REG_SZ /D "Anywhere" /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\MRT /V DontReportInfectionInformation /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\MRT /V DontOfferThroughWUAU /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\Explorer /V HideRecommendedPersonalizedSites /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCortana /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowSearchToUseLocation /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V DisableWebSearch /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWeb /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Mobility /V OptedIn /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer /V HideRecommendedPersonalizedSites /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\PCHC /V UpgradeEligibility /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V ShowSyncProviderNotifications /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackDocs /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced /V Start_TrackProgs /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-310093Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338387Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338393Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353694Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353696Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\UserProfileEngagement /V ScoobeSystemSettingEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableSoftLanding /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsConsumerFeatures /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableCloudOptimizedContent /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Policies\Microsoft\Windows\WindowsCopilot /V TurnOffWindowsCopilot /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings /V AutoOpenCopilotLargeScreens /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SmartActionPlatform\SmartClipboard /V Disabled /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost /V EnableWebContentEvaluation /T REG_DWORD /D 00000000 /F
REG ADD "HKCU\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy /V HasAccepted /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Siuf\Rules /V PeriodInNanoSeconds /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\Siuf\Rules /V NumberOfSIUFInPeriod /T REG_DWORD /D 00000000 /F
REG ADD HKCU\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitTextCollection /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\InputPersonalization /V RestrictImplicitInkCollection /T REG_DWORD /D 00000001 /F
REG ADD HKCU\SOFTWARE\Microsoft\Messaging /V CloudServiceSyncEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessAccountInfo_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCalendar_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCallHistory_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessCamera_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessContacts_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessEmail_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGazeInput_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureProgrammatic_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessGraphicsCaptureWithoutBorder_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessHumanPresence_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessLocation_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMessaging_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMicrophone_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessMotion_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessNotifications_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessPhone_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessRadios_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTasks_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsAccessTrustedDevices_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsActivateWithVoice /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsActivateWithVoiceAboveLock /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsGetDiagnosticInfo_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsRunInBackground_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_ForceAllowTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_ForceDenyTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy /V LetAppsSyncWithDevices_UserInControlOfTheseApps /T REG_DWORD /D 00000002 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\downloadsFolder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureProgrammatic\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\graphicsCaptureWithoutBorder\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\musicLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\wifiData\NonPackaged /V "Value" /T REG_SZ /D "Deny" /F
REG ADD HKCU\Software\Sysinternals\AccessChk /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD "HKCU\Software\Sysinternals\Active Directory Explorer" /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\ADInsight /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\AdRestore /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Autologon /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Autoruns /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\BGInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\CacheSet /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\ClockRes /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Contig /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Coreinfo /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\CPUSTRES /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\DbgView /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Desktops /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Disk2Vhd /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\DiskExt /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Diskmon /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\DiskView /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Du /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\FindLinks /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Handle /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Hex2Dec /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Junction /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\ListDLLs /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\LiveKd /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\LoadOrder /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\LogonSessions /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Movefile /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\NotMyFault /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\nTestlimit /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\NTFSInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PendMove /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PipeList /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\ProcDump /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD "HKCU\Software\Sysinternals\Process Explorer" /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD "HKCU\Software\Sysinternals\Process Monitor" /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsExec /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsFile /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsGetSid /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsInfo /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsKill /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsList /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsLoggedon /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsLoglist /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsPasswd /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsPing /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsService /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsShutdown /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\PsSuspend /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\RamMap /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\RegDelNull /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Regsize /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\SDelete /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD "HKCU\Software\Sysinternals\Share Enum" /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\sigcheck /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Streams /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Strings /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Sync /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\TCPView /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\VMMap /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\VolumeID /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\Whois /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\WinObj /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD HKCU\Software\Sysinternals\ZoomIt /V EulaAccepted /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client" /V DisabledByDefault /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client" /V Enabled /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server" /V DisabledByDefault /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server" /V Enabled /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client" /V DisabledByDefault /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client" /V Enabled /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server" /V DisabledByDefault /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server" /V Enabled /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableHttp2Tls /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableHttp3 /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\HTTP\Parameters /V EnableAltSvc /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SmartActionPlatform\SmartClipboard /V Disabled /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V DisableCachingOfSSLPages /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V EnableNegotiate /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V ProxyEnable /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V MigrateProxy /T REG_DWORD /D 00000001 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V WarnonZoneCrossing /T REG_DWORD /D 00000000 /F
REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /V SyncMode5 /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery /V DisableSearchBoxSuggestions /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\PCHC /V UpgradeEligibility /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\MoSetup /V AllowUpgradesWithUnsupportedTPMOrCPU /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassCPUCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassDiskCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassRAMCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassSecureBootCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassStorageCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\Setup\LabConfig /V BypassTPMCheck /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Mobility /V OptedIn /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings /V IsContinuousInnovationOptedIn /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /T REG_SZ /D "0" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 2 /T REG_SZ /D "time.windows.com" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 1 /T REG_SZ /D "time.nist.gov" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers /V 0 /T REG_SZ /D "time.cloudflare.com" /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-310093Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338387Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-338393Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353694Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager /V "SubscribedContent-353696Enabled" /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableSoftLanding /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\UserProfileEngagement /V ScoobeSystemSettingEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo /V DisabledByGroupPolicy /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\CloudContent /V DisableTailoredExperiencesWithDiagnosticData /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\ControlSet001\Control\CI\Policy /V VerifiedAndReputablePolicyState /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsCopilot /V TurnOffWindowsCopilot /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings /V AutoOpenCopilotLargeScreens /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Privacy /V TailoredExperiencesWithDiagnosticDataEnabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection /V AllowTelemetry /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V BypassNRO /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V DisableVoice /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V PrivacyConsentStatus /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /V ProtectYourPC /T REG_DWORD /D 00000003 /F
REG DELETE HKLM\SOFTWARE\Classes\Directory\ShellEx\ContextMenuHandlers\EPP /F
REG DELETE HKLM\SOFTWARE\Classes\Drive\ShellEx\ContextMenuHandlers\EPP /F
REG DELETE HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP /F
REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SecurityHealth /F 
REG DELETE HKLM\SOFTWARE\Classes\CompressedFolder\CLSID /F
REG DELETE HKLM\SOFTWARE\Classes\SystemFileAssociations\.zip\CLSID /F
REG DELETE HKLM\SOFTWARE\Classes\SystemFileAssociations\image\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\SystemFileAssociations\text\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\batfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\cmdfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\docfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\fonfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\htmlfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\inffile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\inifile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\JSEFile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\JSFile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\MSInfo.Document\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\otffile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\pfmfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\regfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\rtffile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\ttcfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\ttffile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\txtfile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\VBEFile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\VBSFile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\Wordpad.Document.1\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\WPEDoc\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\WPSDoc\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\wrifile\shell\print /F
REG DELETE HKLM\SOFTWARE\Classes\WSFFile\shell\print /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\AxInstSV /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\AxInstSV /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\tzautoupdate /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\tzautoupdate /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\Browser /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\Browser /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\CDPSvc /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\CDPSvc /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\DiagTrack /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\DiagTrack /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\diagnosticshub.standardcollector.service /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\wercplsupport /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\wercplsupport /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\PcaSvc /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\PcaSvc /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SessionEnv /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\SessionEnv /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\TermService /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\TermService /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\UmRdpService /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\UmRdpService /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\RemoteRegistry /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\RemoteAccess /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\RemoteAccess /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\LanmanServer /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\LanmanServer /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SCardSvr /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\SCardSvr /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SSDPSRV /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\SSDPSRV /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\lmhosts /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\lmhosts /V ErrorControl /T REG_DWORD /D 00000000 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\lmhosts /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\UsoSvc /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\UsoSvc /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WalletService /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WalletService /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\FrameServer /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\FrameServer /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WpnService /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WpnService /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinRM /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WinRM /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WSearch /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WSearch /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\XblAuthManager /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\XblAuthManager /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\XblGameSave /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\XblGameSave /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\CDPUserSvc /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\CDPUserSvc /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\PimIndexMaintenanceSvc /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WpnUserService /V Start /T REG_DWORD /D 00000004 /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WpnUserService /V DelayedAutostart /F
REG ADD HKLM\SYSTEM\ControlSet001\Control\CI\Config /V VulnerableDriverBlocklistEnable /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity /V Enabled /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Control\FileSystem /V LongPathsEnabled /T REG_DWORD /D 00000001 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\lfsvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\lfsvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\lfsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinDefend /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinDefend /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinDefend /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\webthreatdefusersvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\wscsvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\wscsvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WdNisDrv /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WdNisDrv /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WdNisSvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WdNisSvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WdNisSvc /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\uhssvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SgrmBroker /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SgrmBroker /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\SgrmBroker /V LaunchProtected /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WinHttpAutoProxySvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\edgeupdate /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\edgeupdate /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\edgeupdatem /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\edgeupdatem /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\MicrosoftEdgeElevationService /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WMPNetworkSvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WMPNetworkSvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WpcMonSvc /V Start /T REG_DWORD /D 00000004 /F
REG ADD HKLM\SYSTEM\ControlSet001\Services\WpcMonSvc /V ErrorControl /T REG_DWORD /D 00000000 /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Media Sharing\UpdateLibrary" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\ProgramDataUpdater" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WaaSMedic\PerformRemediation" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SystemRestore\SR" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitor" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyMonitorToastTask" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefresh" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\FamilySafetyRefreshTask" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Shell\IndexerAutomaticMaintenance" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Defender\Windows Defender Verification" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\RestoreDevice" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\SmartRetry" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdates" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\ScanForUpdatesAsUser" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Scheduled Start" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Automatic App Update" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\Refresh Group Policy Cache" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihboot" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sihpostreboot" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\sih" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Retry Scan" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Backup Scan" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_AC" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Reboot_Battery" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Report policies" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Work" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Start Oobe Expedite Work" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_LicenseAccepted" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScan_OobeAppReady" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\StartOobeAppsScanAfterUpdate" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\UUS Failover Task" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maintenance\WinSAT" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Diagnosis\Scheduled" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maps\MapsUpdateTask" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\rempl\shell" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskLogon" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskNetwork" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /F
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\RemovalTools\MRT_ERROR_HB" /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\BITS\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\EventLog\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WaaSMedicSvc\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\SgrmAgent\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WdNisDrv\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WdNisSvc\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\WinDefend\Security /V Security /F
REG DELETE HKLM\SYSTEM\ControlSet001\Services\wuauserv\Security /V Security /F
sc delete WaaSMedicSvc
sc delete WinDefend
REM CALL Registry_Patch_Win10_11.bat> "Registry_Patch_Win10_11_Log.txt" 2>&1
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_7_PRSE

:LST_LNE_DELAMINATE_10705_7_
SET DLM_SKP_=7292
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_8_PRSE GOTO SKP_SRT_10705_8_)&&ECHO %%A>> "C:\Patches\Batch_Files\Reinstall_Apps_Win10.bat")
:SKP_SRT_10705_8_
GOTO :LST_LNE_DELAMINATE_10705_8_

@ECHO OFF
SETLOCAL
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers -Publisher '*Microsoft*' -PackageTypeFilter Main | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register \"$($_.InstallLocation)\AppXManifest.xml\"}}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_8_PRSE

:LST_LNE_DELAMINATE_10705_8_
SET DLM_SKP_=7306
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_9_PRSE GOTO SKP_SRT_10705_9_)&&ECHO %%A>> "C:\Patches\Batch_Files\Remove_Microsoft_Edge.bat")
:SKP_SRT_10705_9_
GOTO :LST_LNE_DELAMINATE_10705_9_

@ECHO OFF
SETLOCAL

IF EXIST "%~dp0RMV_MS_EDGE_.bat" DEL /Q "%~dp0RMV_MS_EDGE_.bat" 2> nul
IF EXIST "%~dp0RMV_MS_Edge_TMP_*_.txt" DEL /Q "%~dp0RMV_MS_Edge_TMP_*_.txt" 2> nul

IF [%1]==[] GOTO MSEDGERMV_SKIP_SRT_LBL_0_
IF NOT %1==BYPASS GOTO MSEDGERMV_SKIP_SRT_LBL_0_
IF [%2]==[] GOTO MSEDGERMV_SKIP_SRT_LBL_0_
IF %2==1 ((SET MSEDGERMV_VAR_SEL_=1)&(GOTO MSEDGERMV_SKIP_SRT_LBL_1_))
IF %2==2 ((SET MSEDGERMV_VAR_SEL_=2)&(GOTO MSEDGERMV_SKIP_SRT_LBL_1_))
IF %2==3 ((SET MSEDGERMV_VAR_SEL_=3)&(GOTO MSEDGERMV_SKIP_SRT_LBL_1_))
IF %2==4 ((SET MSEDGERMV_VAR_SEL_=4)&(GOTO MSEDGERMV_SKIP_SRT_LBL_1_))

:MSEDGERMV_SKIP_SRT_LBL_0_
CLS
ECHO [MS EDGE REMOVAL SCRIPT:]
ECHO:
ECHO [1] [RECOMMENDED:] [MSEdge]
ECHO [2] [OPTIONAL:] [MSEdgeWebView]
ECHO [3] [OPTIONAL:] [MSEdgeCore]
ECHO [4] [SCAN ^& REMOVE All]
ECHO [5] [NONE / SKIP]
ECHO:
CHOICE /C 12345 /N /M "CHOOSE FROM THE FOLLOWING..."
IF %ErrorLevel% EQU 255 GOTO MSEDGERMV_SKIP_SRT_LBL_0_
IF %ErrorLevel% EQU 5 GOTO MSEDGERMVLSTLNE_
IF %ErrorLevel% EQU 1 ((SET MSEDGERMV_VAR_SEL_=1)&(SET MSEDGERMVTMP_SEL_VAR_=[MSEdge]))
IF %ErrorLevel% EQU 2 ((SET MSEDGERMV_VAR_SEL_=2)&(SET MSEDGERMVTMP_SEL_VAR_=[MSEdgeWebView]))
IF %ErrorLevel% EQU 3 ((SET MSEDGERMV_VAR_SEL_=3)&(SET MSEDGERMVTMP_SEL_VAR_=[MSEdgeCore]))
IF %ErrorLevel% EQU 4 ((SET MSEDGERMV_VAR_SEL_=4)&(SET MSEDGERMVTMP_SEL_VAR_=[MSEdge] + [MSEdgeWebView] + [MSEdgeCore]))

CHOICE /C YN /N /M "REMOVING: %MSEDGERMVTMP_SEL_VAR_%... <- [Y] YES TO PROCEED [N] NO TO SKIP?"
IF %ErrorLevel% EQU 255 GOTO MSEDGERMV_SKIP_SRT_LBL_0_
IF %ErrorLevel% EQU 2 GOTO MSEDGERMVLSTLNE_

:MSEDGERMV_SKIP_SRT_LBL_1_
SET MSEDGERMV_CNTR_=0

ECHO @ECHO OFF> "%~dp0RMV_MS_EDGE_.bat"
ECHO SETLOCAL>> "%~dp0RMV_MS_EDGE_.bat"

IF %MSEDGERMV_VAR_SEL_% EQU 1 GOTO MSEDGERMV_SKIP_1_LBL
IF %MSEDGERMV_VAR_SEL_% EQU 3 GOTO MSEDGERMV_SKIP_2_LBL

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\EdgeWebView" GOTO MSEDGERMV_SKIP_1_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\EdgeWebView\Application"
(DIR /B /S *setup*> "%~dp0RMV_MS_Edge_TMP_1_.txt") >nul 2>&1
(TYPE "%~dp0RMV_MS_Edge_TMP_1_.txt"| FIND /V "" /C> "%~dp0RMV_MS_Edge_TMP_0_.txt") >nul 2>&1
SET /P RNGE_SMPLFRWLL_VAL_CHK_=<"%~dp0RMV_MS_Edge_TMP_0_.txt"
IF %RNGE_SMPLFRWLL_VAL_CHK_% EQU 0 ((SET /A MSEDGERMV_CNTR_+=1)&(GOTO MSEDGERMV_SKIP_1_LBL))
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0RMV_MS_Edge_TMP_1_.txt") DO (CALL :EDGE_RMV_1_ "%%A")
:MSEDGERMV_SKIP_1_LBL

IF %MSEDGERMV_VAR_SEL_% EQU 2 GOTO MSEDGERMV_SKIP_3_LBL

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\Edge" GOTO MSEDGERMV_SKIP_2_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\Edge\Application"
(DIR /B /S *setup*> "%~dp0RMV_MS_Edge_TMP_2_.txt") >nul 2>&1
(TYPE "%~dp0RMV_MS_Edge_TMP_2_.txt"| FIND /V "" /C> "%~dp0RMV_MS_Edge_TMP_0_.txt") >nul 2>&1
SET /P RNGE_SMPLFRWLL_VAL_CHK_=<"%~dp0RMV_MS_Edge_TMP_0_.txt"
IF %RNGE_SMPLFRWLL_VAL_CHK_% EQU 0 ((SET /A MSEDGERMV_CNTR_+=1)&(GOTO MSEDGERMV_SKIP_2_LBL))
FOR /F "usebackq tokens=* delims=" %%B IN ("%~dp0RMV_MS_Edge_TMP_2_.txt") DO (CALL :EDGE_RMV_2_ "%%B")
:MSEDGERMV_SKIP_2_LBL

IF %MSEDGERMV_VAR_SEL_% EQU 1 GOTO MSEDGERMV_SKIP_3_LBL

IF NOT EXIST "%ProgramFiles(x86)%\Microsoft\EdgeCore" GOTO MSEDGERMV_SKIP_3_LBL
CD /D "%ProgramFiles(x86)%\Microsoft\EdgeCore"
(DIR /B /S *setup*> "%~dp0RMV_MS_Edge_TMP_3_.txt") >nul 2>&1
(TYPE "%~dp0RMV_MS_Edge_TMP_3_.txt"| FIND /V "" /C> "%~dp0RMV_MS_Edge_TMP_0_.txt") >nul 2>&1
SET /P RNGE_SMPLFRWLL_VAL_CHK_=<"%~dp0RMV_MS_Edge_TMP_0_.txt"
IF %RNGE_SMPLFRWLL_VAL_CHK_% EQU 0 ((SET /A MSEDGERMV_CNTR_+=1)&(GOTO MSEDGERMV_SKIP_3_LBL))
FOR /F "usebackq tokens=* delims=" %%C IN ("%~dp0RMV_MS_Edge_TMP_3_.txt") DO (CALL :EDGE_RMV_2_ "%%C")
:MSEDGERMV_SKIP_3_LBL

ECHO ENDLOCAL>> "%~dp0RMV_MS_EDGE_.bat"
ECHO DEL /Q "%%~dp0RMV_MS_EDGE_.bat">> "%~dp0RMV_MS_EDGE_.bat"

IF %MSEDGERMV_CNTR_% EQU 3 GOTO MSEDGERMVLSTLNE_

CALL "%~dp0RMV_MS_EDGE_.bat" 

IF %MSEDGERMV_VAR_SEL_% NEQ 4 GOTO MSEDGERMVLSTLNE_

(((sc config edgeupdate start= disabled)&(sc config edgeupdatem start= disabled))&((net stop edgeupdate)&(net stop edgeupdatem))&((sc delete edgeupdate)&(sc delete edgeupdatem)))

SETLOCAL EnableDelayedExpansion
(REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree" /F "MicrosoftEdgeUpdateTaskMachine"| FIND "HKEY_LOCAL_MACHINE"> "%~dp0MSEDGESrt_TMP_0_FL_.txt") >nul 2>&1
TYPE "%~dp0MSEDGESrt_TMP_0_FL_.txt"| FIND /V "" /C> "%~dp0MSEDGESrt_TMP_1_FL_.txt"
SET /P MSEDGE_RMVVAL_RNGE_=<"%~dp0MSEDGESrt_TMP_1_FL_.txt"
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BA" -q)
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&REG DELETE "HKLM!TMP_VAR_:~18!" /F)
DEL /Q "%~dp0MSEDGESrt_TMP_*_FL_.txt" 2> nul
SETLOCAL DisableDelayedExpansion

RMDIR /S /Q "%ProgramFiles%\Microsoft\EdgeUpdater"
RMDIR /S /Q "%ProgramFiles(x86)%\Microsoft\EdgeWebView"
RMDIR /S /Q "%ProgramFiles(x86)%\Microsoft\Edge"
RMDIR /S /Q "%ProgramFiles(x86)%\Microsoft\EdgeCore"
RMDIR /S /Q "%ProgramData%\Microsoft\EdgeUpdate"
RMDIR /S /Q "%AppData%\Microsoft\Edge"
RMDIR /S /Q "%LocalAppData%\Microsoft\Edge"

CMD /Q /C START /MIN PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-NetFirewallRule -DisplayName 'Microsoft Edge' | Remove-NetFirewallRule}"

GOTO MSEDGERMVLSTLNE_

:EDGE_RMV_1_
ECHO %~s1 --uninstall --msedgewebview --system-level --force-uninstall>> "%~dp0RMV_MS_EDGE_.bat"
GOTO :EOF
:EDGE_RMV_2_
ECHO %~s1 --uninstall --system-level --force-uninstall>> "%~dp0RMV_MS_EDGE_.bat"
GOTO :EOF

:MSEDGERMVLSTLNE_

IF EXIST "%~dp0RMV_MS_Edge_TMP_*_.txt" DEL /Q "%~dp0RMV_MS_Edge_TMP_*_.txt" 2> nul
IF EXIST "%~dp0RMV_MS_EDGE_.bat" DEL /Q "%~dp0RMV_MS_EDGE_.bat" 2> nul

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_9_PRSE

:LST_LNE_DELAMINATE_10705_9_
SET DLM_SKP_=7438
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_10_PRSE GOTO SKP_SRT_10705_10_)&&ECHO %%A>> "C:\Patches\Batch_Files\Remove_Microsoft_Edge_Update_Service.bat")
:SKP_SRT_10705_10_
GOTO :LST_LNE_DELAMINATE_10705_10_

@ECHO OFF
SETLOCAL EnableDelayedExpansion
IF EXIST "%~dp0RMV_MS_Edge_TMP_*_.txt" DEL /Q "%~dp0RMV_MS_Edge_TMP_*_.txt" 2> nul
(((sc config edgeupdate start= disabled)&(sc config edgeupdatem start= disabled))&((net stop edgeupdate)&(net stop edgeupdatem))&((sc delete edgeupdate)&(sc delete edgeupdatem)))
(REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree" /F "MicrosoftEdgeUpdateTaskMachine"| FIND "HKEY_LOCAL_MACHINE"> "%~dp0MSEDGESrt_TMP_0_FL_.txt") >nul 2>&1
TYPE "%~dp0MSEDGESrt_TMP_0_FL_.txt"| FIND /V "" /C> "%~dp0MSEDGESrt_TMP_1_FL_.txt"
SET /P MSEDGE_RMVVAL_RNGE_=<"%~dp0MSEDGESrt_TMP_1_FL_.txt"
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BA" -q)
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&SetObjectSecurity KEY "HKLM!TMP_VAR_:~18!" "O:BAG:SYD:PAI(A;CI;KR;;;RC)(A;CI;KA;;;SY)(A;CI;KA;;;BA)(A;CI;KA;;;BU)(A;;KR;;;AC)" -q)
IF %MSEDGE_RMVVAL_RNGE_% GTR 0 FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0MSEDGESrt_TMP_0_FL_.txt") DO (SET TMP_VAR_=%%A&REG DELETE "HKLM!TMP_VAR_:~18!" /F)
DEL /Q "%~dp0MSEDGESrt_TMP_*_FL_.txt" 2> nul
ENDLOCAL DisableDelayedExpansion
MOVE NUL 2>&0

REM_SKP_LBL_10705_10_PRSE

:LST_LNE_DELAMINATE_10705_10_
SET DLM_SKP_=7460
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_11_PRSE GOTO SKP_SRT_10705_11_)&&ECHO %%A>> "C:\Patches\Batch_Files\Reset_Apps_Win11.bat")
:SKP_SRT_10705_11_
GOTO :LST_LNE_DELAMINATE_10705_11_

@ECHO OFF
SETLOCAL
REM "System apps installed with the Windows client OS" -> https://learn.microsoft.com/en-us/windows/application-management/system-apps-windows-client-os
REM "Troubleshooting packaging, deployment, and query of Windows apps" -> https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Clipchamp.Clipchamp | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.549981C3F5F10 | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.BingNews | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.BingWeather | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.DesktopAppInstaller | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.GamingApp | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.GetHelp | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Getstarted | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.HEIFImageExtension | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.HEVCVideoExtension | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftEdge.Stable | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftOfficeHub | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftSolitaireCollection | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftStickyNotes | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Paint | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.People | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.PowerAutomateDesktop | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.RawImageExtension | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ScreenSketch | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.SecHealthUI | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.StorePurchaseApp | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Todos | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.UI.Xaml.2.4 | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.VCLibs.140.00 | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.VP9VideoExtensions | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WebMediaExtensions | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WebpImageExtension | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Windows.Photos | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsAlarms | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsCalculator | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsCamera | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.windowscommunicationsapps | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsFeedbackHub | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsMaps | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsNotepad | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsSoundRecorder | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsStore | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsTerminal | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Xbox.TCUI | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.XboxGameOverlay | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.XboxGamingOverlay | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.XboxIdentityProvider | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.XboxSpeechToTextOverlay | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.YourPhone | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ZuneMusic | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ZuneVideo | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftCorporationII.MicrosoftFamily | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftCorporationII.QuickAssist | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftTeams | Reset-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftWindows.Client.WebExperience | Reset-AppxPackage}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_11_PRSE

:LST_LNE_DELAMINATE_10705_11_
SET DLM_SKP_=7525
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_12_PRSE GOTO SKP_SRT_10705_12_)&&ECHO %%A>> "C:\Patches\Batch_Files\Selective_Removal_Win10_11_Apps.bat")
:SKP_SRT_10705_12_
GOTO :LST_LNE_DELAMINATE_10705_12_

@ECHO OFF
SETLOCAL
REM "System apps installed with the Windows client OS" -> https://learn.microsoft.com/en-us/windows/application-management/system-apps-windows-client-os
REM "Troubleshooting packaging, deployment, and query of Windows apps" -> https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.549981C3F5F10 | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Clipchamp.Clipchamp | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.BingNews | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.BingWeather | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.GetHelp | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Getstarted | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftEdge.Stable | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftOfficeHub | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftSolitaireCollection | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.MicrosoftStickyNotes | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.People | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ScreenSketch | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Todos | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.Windows.Photos | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsAlarms | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsCamera | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsMaps | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.WindowsSoundRecorder | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.YourPhone | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ZuneMusic | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers Microsoft.ZuneVideo | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftCorporationII.MicrosoftFamily | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftCorporationII.QuickAssist | Remove-AppxPackage}"
PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Get-AppxPackage -AllUsers MicrosoftTeams | Remove-AppxPackage}"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_12_PRSE

:LST_LNE_DELAMINATE_10705_12_
SET DLM_SKP_=7564
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_13_PRSE GOTO SKP_SRT_10705_13_)&&ECHO %%A>> "C:\Patches\Batch_Files\Update_VC++_Direct_X_Installers.bat")
:SKP_SRT_10705_13_
GOTO :LST_LNE_DELAMINATE_10705_13_

@ECHO OFF
SETLOCAL
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)"
IF NOT EXIST "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022" MKDIR "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.arm64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.arm64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/vs/17/release/vc_redist.x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2015_2017_2019_2022\vc_redist.x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/highdpimfc2013x86enu" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://aka.ms/highdpimfc2013x64enu" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2013_(VC++_12.0)\vcredist_x64.exe"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/B/16B06F60-3B20-4FF2-B699-5E9B7962F9AE/VSU_4/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/B/16B06F60-3B20-4FF2-B699-5E9B7962F9AE/VSU_4/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2012_(VC++_11.0)_Update_4\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/5/165255E7-1014-4D0A-B094-B6A430A6BFFC/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/1/6/5/165255E7-1014-4D0A-B094-B6A430A6BFFC/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2010_(VC++_10.0)_SP1\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/5/D/8/5D8C65CB-C849-4025-8E95-C3966CAFD8AE/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x86.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/5/D/8/5D8C65CB-C849-4025-8E95-C3966CAFD8AE/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2008_(VC++_9.0)_SP1\vcredist_x64.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_IA64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_IA64.EXE" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_x64.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x64.EXE" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/B/4/8B42259F-5D70-43F4-AC2E-4B208FD8D66A/vcredist_x86.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Visual_Studio_2005_(VC++_8.0)_SP1\vcredist_x86.EXE"
curl --parallel-immediate --parallel-max 100 --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/8/4/A/84A35BF1-DAFE-4AE8-82AF-AD2AE20B6B14/directx_Jun2010_redist.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes\directx_Jun2010_redist.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\DirectX_End_User_Runtimes\directx_Jun2010_redist.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\DirectX_End_User_Runtimes\directx_Jun2010_redist.exe" --next ^
--parallel-immediate --progress-bar --ssl-no-revoke --tlsv1.2 -LZRA "" "https://download.microsoft.com/download/3/a/5/3a5925ac-e779-4b1c-bb01-af67dc2f96fc/VisualBasic6-KB896559-v1-ENU.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\VB6_Common_Controls\VisualBasic6-KB896559-v1-ENU.exe"
curl --progress-bar --ssl-no-revoke --tlsv1.3 -LZRA "" "https://sdk.lunarg.com/sdk/download/latest/windows/vulkan-runtime.exe" --etag-compare "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT\VulkanRT_Installer.txt" --etag-save "%UserProfile%\Desktop\VC++_NET_Runtimes\ETag_Cache\Vulkan_RT\VulkanRT_Installer.txt" -o "%UserProfile%\Desktop\VC++_NET_Runtimes\Downloads\Vulkan_RT\VulkanRT_Installer.exe"
ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_13_PRSE

:LST_LNE_DELAMINATE_10705_13_
SET DLM_SKP_=7612
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_10705_14_PRSE GOTO SKP_SRT_10705_14_)&&ECHO %%A>> "C:\Patches\Batch_Files\Win10_11_DirectX_App_Compatibility_Fix.bat")
:SKP_SRT_10705_14_
GOTO :LST_LNE_DELAMINATE_10705_14_

@ECHO OFF
SETLOCAL

IF [%1]==[] GOTO DXAPP_COMPAT_FX_LST_LNE_
IF NOT %1==BYPASS GOTO DXAPP_COMPAT_FX_SRT_LBL_1_
IF [%2]==[] GOTO DXAPP_COMPAT_FX_LST_LNE_

IF [%3]==[] GOTO DXAPP_COMPAT_FX_SRT_LBL_0_
FOR %%A IN (%*) DO (IF EXIST %%A (IF /I [%%~xA]==[.EXE] (((REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /V %%A /T REG_SZ /D "8And16BitAggregateBlts 8And16BitGDIRedraw AccelGdipFlush AoaMp4Converter CorrectCreateBrushIndirectHatch DetectorDWM8And16Bit DisableDWM DisableFadeAnimations DisableThemeMenus DWM8And16BitMitigation" /F)&(REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /V %%A /T REG_SZ /D "~ HIGHDPIAWARE WIN7RTM" /F)) >nul 2>&1)))
GOTO DXAPP_COMPAT_FX_LST_LNE_

:DXAPP_COMPAT_FX_SRT_LBL_0_

(IF NOT EXIST %2 GOTO DXAPP_COMPAT_FX_LST_LNE_)
(IF /I NOT [%~x2]==[.EXE] GOTO DXAPP_COMPAT_FX_LST_LNE_)
(SET DXAPPCOMPAT_FX_SRTVAR_=%2)
GOTO DXAPP_COMPAT_FX_SRT_LBL_2_

:DXAPP_COMPAT_FX_SRT_LBL_1_

(IF NOT EXIST %1 GOTO DXAPP_COMPAT_FX_LST_LNE_)
(IF /I NOT [%~x1]==[.EXE] GOTO DXAPP_COMPAT_FX_LST_LNE_)
(SET DXAPPCOMPAT_FX_SRTVAR_=%1)

:DXAPP_COMPAT_FX_SRT_LBL_2_

(((REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /V %DXAPPCOMPAT_FX_SRTVAR_% /T REG_SZ /D "8And16BitAggregateBlts 8And16BitGDIRedraw AccelGdipFlush AoaMp4Converter CorrectCreateBrushIndirectHatch DetectorDWM8And16Bit DisableDWM DisableFadeAnimations DisableThemeMenus DWM8And16BitMitigation" /F)&(REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /V %DXAPPCOMPAT_FX_SRTVAR_% /T REG_SZ /D "~ HIGHDPIAWARE WIN7RTM" /F)) >nul 2>&1)

IF %1==BYPASS GOTO DXAPP_COMPAT_FX_LST_LNE_

CLS
ECHO ...Compatibility Settings For The Following Application Were Added For All Users:
ECHO:
ECHO %1...
ECHO:
ECHO [Disabled:] Display Scaling On High DPI Settings
ECHO [Enabled:] Legacy DirectX Compatibility Fixes: 8And16BitAggregateBlts 8And16BitGDIRedraw AccelGdipFlush AoaMp4Converter CorrectCreateBrushIndirectHatch DetectorDWM8And16Bit DisableDWM DisableFadeAnimations DisableThemeMenus DWM8And16BitMitigation
ECHO:
PAUSE

:DXAPP_COMPAT_FX_LST_LNE_

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_10705_14_PRSE

:LST_LNE_DELAMINATE_10705_14_
SET DLM_SKP_=7665
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_3976_1_PRSE GOTO SKP_SRT_3976_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\Misc\Batch_File_ReWrapper.bat")
:SKP_SRT_3976_1_
GOTO :LST_LNE_DELAMINATE_3976_1_

@ECHO OFF
SETLOCAL

CD /D "%~dp0"
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

SET BATCHSRT_VAR[0]_=""
SET BATCHSRT_VAR[1]_=" "
SET BATCHSRT_VAR[2]_="#"
SET BATCHSRT_VAR[3]_="$"
SET BATCHSRT_VAR[4]_="%"
SET BATCHSRT_VAR[5]_="&"
SET BATCHSRT_VAR[6]_="'"
SET BATCHSRT_VAR[7]_="("
SET BATCHSRT_VAR[8]_=")"
SET BATCHSRT_VAR[9]_="*"
SET BATCHSRT_VAR[10]_="+"
SET BATCHSRT_VAR[11]_=","
SET BATCHSRT_VAR[12]_="-"
SET BATCHSRT_VAR[13]_="."
SET BATCHSRT_VAR[14]_="/"
SET BATCHSRT_VAR[15]_=":"
SET BATCHSRT_VAR[16]_=";"
SET BATCHSRT_VAR[17]_="<"
SET BATCHSRT_VAR[18]_="="
SET BATCHSRT_VAR[19]_=">"
SET BATCHSRT_VAR[20]_="?"
SET BATCHSRT_VAR[21]_="@"
SET BATCHSRT_VAR[22]_="["
SET BATCHSRT_VAR[23]_="\"
SET BATCHSRT_VAR[24]_="]"
SET BATCHSRT_VAR[25]_="^"
SET BATCHSRT_VAR[26]_="`"
SET BATCHSRT_VAR[27]_="{"
SET BATCHSRT_VAR[28]_="|"
SET BATCHSRT_VAR[29]_="}"
SET BATCHSRT_VAR[30]_="~"
SET BATCHSRT_VAR_MXCNT_=30

SET RNDCNTR=%RANDOM%
SET BATCH_INVALIDCHAR_CNT_=0
SET BATCH_SKP_CNTR_OFFSET=8
SET PTH_BATCH_FL_=%%~dp0
SET PTH_SLSHCHR_=\
SET HEADLESS_SRT_=0

REM (1) BYPASS (2) SORTMODE (3) BATCHFILENAME (4) FOLDERNAME
REM (1) BYPASS / NOBYPASS / BYPASS_NOHEADER / TEST
REM (2) 1-8
REM (3) 1-4 ( BATCHFILE ) 5-8 ( APPENDFILE ) - MUST BE ENCLOSED IN DOUBLE QUOTES
REM (4) 1,3,5,7 ( DEFAULT ) 2,4,6,8 ( CUSTOM ) - MUST BE ENCLOSED IN DOUBLE QUOTES
REM SORTMODE:
REM 1 - NOAPPEND, DEFAULT ROOT FOLDER
REM 2 - NOAPPEND, CUSTOM ROOT FOLDER
REM 3 - APPEND, DEFAULT ROOT FOLDER
REM 4 - APPEND, CUSTOM ROOT FOLDER
REM 5 - APPEND, DEFAULT ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 6 - APPEND, CUSTOM ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 7 - NOAPPEND, DEFAULT ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 8 - NOAPPEND, CUSTOM ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )

SET BYPASS_1ST_ENTRY_=NOBYPASS
SET BYPASS_2ND_ENTRY_=VOID
SET BYPASS_3RD_ENTRY_=VOID
SET BYPASS_4TH_ENTRY_=VOID

REM NOTE: THE ONLY ACCEPTED FORMAT FOR THE APPEND FILE IS UTF-8 ( NO BOM ), AND THE LAST LINE OF THE FILE SHOULD NOT HAVE ANY WHITESPACE CARRIAGE RETURN, LINE FEED CHARACTERS, OR AN EMPTY LINE ( IT WILL AFFECT THE STARTING OFFSET VALUE )

REM STARTLINE
REM 1.) Batch_File_ReWrapper.bat BYPASS 3 "Append_Example_File.bat"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_ReWrapper.bat BYPASS 5 "Append_Example_File.bat" "C:\Example_Folder\"
REM 2.) Batch_File_ReWrapper.bat BYPASS_NOHEADER 5 "Append_Example_File.bat"
REM 3.) Batch_File_ReWrapper.bat BYPASS_NOHEADER 3 "Append_Example_File.bat"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_ReWrapper.bat BYPASS 4 "Append_Example_File.bat" "C:\Example_Folder\"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_ReWrapper.bat BYPASS 6 "Append_Example_File.bat" "C:\Example_Folder\"
REM 2.) Batch_File_ReWrapper.bat BYPASS_NOHEADER 6 "Append_Example_File.bat" "C:\Example_Folder\"
REM 3.) Batch_File_ReWrapper.bat BYPASS_NOHEADER 4 "Append_Example_File.bat" "C:\Example_Folder\"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_ReWrapper.bat TEST "Append_Example_File.bat"
REM FINISHLINE

IF [%1]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT %1==TEST GOTO SKP_GENERIC_WRAPPER_TEST_
IF NOT EXIST "%~sf2" GOTO LST_LNE_SRT_BATCH_
TYPE "%~sf2"| FIND "SET DLM_SKP_" /N| FIND "ALS_BATCH_FILE_TMP_VAR_" /V> "%~dp0Batch_SRT_LST_0.txt"
ENDLOCAL
SETLOCAL EnableDelayedExpansion
SET CNTR=1
FOR /F "usebackq tokens=1 delims=[]" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (SET RANGECHK_[!CNTR!]_=4&SET FRST_NUM_[!CNTR!]_=%%A&SET /A RANGECHK_[!CNTR!]_+=%%A&SET /A CNTR+=1)
SET MXCNTR=-1
SET /A MXCNTR+=%CNTR%
SET CNTR=1
FOR /F "usebackq tokens=3 delims=_^=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (SET SCND_NUM_[!CNTR!]_=%%A&SET /A CNTR+=1)
CLS
FOR /L %%A IN (1,1,%MXCNTR%) DO (IF !RANGECHK_[%%A]_!==!SCND_NUM_[%%A]_! (ECHO [PASS] [COUNTER:] %%A - [FIRST:] !FRST_NUM_[%%A]_! [SECOND:] !SCND_NUM_[%%A]_! [COMPARE:] !RANGECHK_[%%A]_!) ELSE (ECHO [FAIL] [COUNTER:] %%A - [FIRST:] !FRST_NUM_[%%A]_! [SECOND:] !SCND_NUM_[%%A]_! [COMPARE:] !RANGECHK_[%%A]_!))
PAUSE
SETLOCAL DisableDelayedExpansion
DEL /Q "%~dp0Batch_SRT_LST_0.txt" 2> nul
GOTO LST_LNE_SRT_BATCH_
:SKP_GENERIC_WRAPPER_TEST_
IF %1==BYPASS_NOHEADER (SET HEADLESS_SRT_=1&SET BATCH_SKP_CNTR_OFFSET=5&GOTO HEADER_CHECK_BATCH_SRT_)
IF NOT %1==BYPASS GOTO BATCH_SRT_SKP_LBL_
:HEADER_CHECK_BATCH_SRT_
SET BYPASS_1ST_ENTRY_=BYPASS

IF [%2]==[] GOTO BATCH_SRT_SKP_LBL_
IF %2 LSS 1 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
IF %2 GTR 8 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
SET BYPASS_2ND_ENTRY_=%2

IF [%3]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT EXIST "%~dp0%~3" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
SET BYPASS_3RD_ENTRY_=%~3
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET BATCH_APPEND_FLG_=1))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET ALS_BATCH_FILE_TMP_VAR_=%BYPASS_3RD_ENTRY_%))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %HEADLESS_SRT_% EQU 1 GOTO NOHEADER_LBL_3RD_ENTRY_)
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "EXIT" /C>> "%~dp0Batch_SRT_LST_0.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "MOVE NUL 2>&0" /C>> "%~dp0Batch_SRT_LST_0.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET /P BATCH_INVALIDCHAR_CNT_=<"%~dp0Batch_SRT_LST_1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (IF %BATCH_INVALIDCHAR_CNT_% GTR 0 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)))
:NOHEADER_LBL_3RD_ENTRY_
GOTO _INVALIDRND_CNTR_2_
:_INVALIDRND_CNTR_1_
SET RNDCNTR=%RANDOM%
:_INVALIDRND_CNTR_2_
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":LST_LNE_DELAMINATE_%RNDCNTR%_"> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":SKP_SRT_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:"REM_SKP_LBL_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%~dp0Batch_SRT_LST_RND1.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_RND2.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET /P BATCH_INVALIDRND_CNT_=<"%~dp0Batch_SRT_LST_RND2.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (IF %BATCH_INVALIDRND_CNT_% GTR 0 GOTO _INVALIDRND_CNTR_1_))

IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 2 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 4 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 6 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 8 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
IF %BYPASS_2ND_ENTRY_% EQU 2 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 4 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 6 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 8 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
SET BYPASS_4TH_ENTRY_=%~4
SET BATCH_FILE_FLDR_VAR_=%BYPASS_4TH_ENTRY_%

IF NOT "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%%PTH_SLSHCHR_%)
IF "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%)

:BATCH_SRT_SKP_LBL_

GOTO SKPDEBUG_LBL_
ECHO SKIP HEADER: %HEADLESS_SRT_%
ECHO 1st: %BYPASS_1ST_ENTRY_%
ECHO 2nd: %BYPASS_2ND_ENTRY_%
ECHO 3rd: %BYPASS_3RD_ENTRY_%
ECHO 4th: %BYPASS_4TH_ENTRY_% ( "%PTH_BATCH_FL_%" )
PAUSE
:SKPDEBUG_LBL_

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (GOTO BYPASS_MODE_LBL_1_)))
IF %BYPASS_1ST_ENTRY_%==BYPASS GOTO BYPASS_MODE_LBL_2_

:RST_LAMINATE_DELAMINATE_LBL_1_
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul
SET BATCH_INVALIDCHAR_CNT_=0
SET BATCH_APPEND_FLG_=1
SET PTH_BATCH_FL_=%%~dp0
CLS

CHOICE /C YN /N /M "APPEND BATCH FILE EXPANDER SCRIPT TO ANOTHER BATCH FILE IN THE ROOT FOLDER?... [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO RST_LAMINATE_DELAMINATE_LBL_2_

SET /P ALS_BATCH_FILE_TMP_VAR_="[SELECT FILENAME OF BATCH FILE]: "
IF NOT EXIST "%~dp0%ALS_BATCH_FILE_TMP_VAR_%" (GOTO RST_LAMINATE_DELAMINATE_LBL_1_)

TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "EXIT" /C>> "%~dp0Batch_SRT_LST_0.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "MOVE NUL 2>&0" /C>> "%~dp0Batch_SRT_LST_0.txt"
TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_1.txt"
SET /P BATCH_INVALIDCHAR_CNT_=<"%~dp0Batch_SRT_LST_1.txt"
IF %BATCH_INVALIDCHAR_CNT_% GTR 0 (GOTO RST_LAMINATE_DELAMINATE_LBL_2_)

GOTO _INVALIDRND_CNTR_4_
:_INVALIDRND_CNTR_3_
SET RNDCNTR=%RANDOM%
:_INVALIDRND_CNTR_4_
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":LST_LNE_DELAMINATE_%RNDCNTR%_"> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":SKP_SRT_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:"REM_SKP_LBL_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%~dp0Batch_SRT_LST_RND1.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_RND2.txt"
SET /P BATCH_INVALIDRND_CNT_=<"%~dp0Batch_SRT_LST_RND2.txt"
IF %BATCH_INVALIDRND_CNT_% GTR 0 GOTO _INVALIDRND_CNTR_3_

:BYPASS_MODE_LBL_1_
SET /P BATCH_SKP_CNTR_APPEND_OFFSET=<"%~dp0Batch_SRT_LST_CNT.txt"
SET /A BATCH_SKP_CNTR_OFFSET+=%BATCH_SKP_CNTR_APPEND_OFFSET%

GOTO RST_LAMINATE_DELAMINATE_LBL_3_

:RST_LAMINATE_DELAMINATE_LBL_2_
:BYPASS_MODE_LBL_2_
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

SET TMP_BATCH_SRT_VAL_=0
SET BATCH_APPEND_FLG_=0
CLS

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% LSS 3 (SET ALS_BATCH_TMP_VAR_=%BYPASS_3RD_ENTRY_%&GOTO BYPASS_MODE_LBL_3_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 6 (SET ALS_BATCH_TMP_VAR_=%BYPASS_3RD_ENTRY_%&GOTO BYPASS_MODE_LBL_3_))

IF %BATCH_INVALIDCHAR_CNT_% GTR 0 ECHO NOTE: UNABLE TO APPEND BATCH FILE EXPANDER SCRIPT TO FILE [SKIPPED]...
SET /P ALS_BATCH_TMP_VAR_="...[ALIAS/FILENAME FOR BATCH FILE EXPANDER IN ROOT DIRECTORY]: "
CALL :SRT_BATCH_FILE_TMP_SMPL_ "%ALS_BATCH_TMP_VAR_%"
IF %TMP_BATCH_SRT_VAL_% GTR 0 (GOTO RST_LAMINATE_DELAMINATE_LBL_2_)

CHOICE /C YN /N /M "ALIAS/FILENAME: [%ALS_BATCH_TMP_VAR_%_Batch_File_Expand.bat] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO RST_LAMINATE_DELAMINATE_LBL_2_
:BYPASS_MODE_LBL_3_
SET ALS_BATCH_FILE_TMP_VAR_=%ALS_BATCH_TMP_VAR_%_Batch_File_Expand.bat

:RST_LAMINATE_DELAMINATE_LBL_3_

DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

IF %BATCH_APPEND_FLG_% EQU 0 DIR /B "%~dp0*.bat"| FIND "Batch_File_ReWrapper.bat" /V> "%~dp0Batch_SRT_LST_0.txt"
IF %BATCH_APPEND_FLG_% EQU 1 DIR /B "%~dp0*.bat"| FIND "Batch_File_ReWrapper.bat" /V| FIND "%ALS_BATCH_FILE_TMP_VAR_%" /V> "%~dp0Batch_SRT_LST_0.txt"

TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
SET /P BATCH_SRT_CNTR_=<"%~dp0Batch_SRT_LST_CNT.txt"
IF %BATCH_SRT_CNTR_% EQU 0 GOTO LST_LNE_SRT_BATCH_

:RST_LAMINATE_DELAMINATE_LBL_4_
CLS

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 2 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 4 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 6 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 8 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (GOTO RST_LAMINATE_DELAMINATE_LBL_5_)

CHOICE /C YN /N /M "USE DEFAULT ROOT FOLDER FOR OUTPUT DIRECTORY?... [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 1 GOTO RST_LAMINATE_DELAMINATE_LBL_5_

SET /P BATCH_FILE_FLDR_VAR_="[SELECT ALTERNATE ROOT FOLDER FOR OUTPUT DIRECTORY]: "
IF NOT EXIST "%BATCH_FILE_FLDR_VAR_%" (GOTO RST_LAMINATE_DELAMINATE_LBL_4_)

IF NOT "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%%PTH_SLSHCHR_%)
IF "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%)

:BYPASS_MODE_LBL_4_

REM FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (CALL :FLDR_SRT_BATCH_FL_ "%%A")

:RST_LAMINATE_DELAMINATE_LBL_5_

SET BATCH_CNTR_=1
SET BATCH_SKP_CNTR=%BATCH_SKP_CNTR_OFFSET%
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (CALL :LAMINATE_BATCH_FL_ "%%A")

GOTO LST_LNE_SRT_BATCH_

:SRT_BATCH_FILE_TMP_SMPL_
SETLOCAL EnableDelayedExpansion
IF %1==%BATCHSRT_VAR[0]_% (ECHO ^1>> "%~dp0Batch_SRT_LST_1.txt")
FOR /L %%A IN (1,1,%BATCHSRT_VAR_MXCNT_%) DO ( (ECHO %1| FIND !BATCHSRT_VAR[%%A]_! /C)>> "%~dp0Batch_SRT_LST_1.txt")
TYPE "%~dp0Batch_SRT_LST_1.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_2.txt"
SET /P TMP_BATCH_SRT_VAL_=<"%~dp0Batch_SRT_LST_2.txt"
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul
SETLOCAL DisableDelayedExpansion
GOTO :EOF

:LAMINATE_BATCH_FL_

TYPE "%~dp0%~1"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
SET /P BATCH_FILE_SRT_CNTR_=<"%~dp0Batch_SRT_LST_CNT.txt"
IF %BATCH_FILE_SRT_CNTR_% EQU 0 GOTO SEC_LST_LNE_SRT_BATCH_

IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_APPEND_FLG_% EQU 1 (IF %BATCH_CNTR_% EQU 1 ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"&ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"))

IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_APPEND_FLG_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO @ECHO OFF> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"))
IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO SETLOCAL DisableDelayedExpansion>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")
IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO CD /D "%%~dp0">> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")

(ECHO SET DLM_SKP_=%BATCH_SKP_CNTR%)>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO FOR /F "usebackq skip=%%DLM_SKP_%% tokens=* delims=" %%%%A IN ^("%%~dp0%ALS_BATCH_FILE_TMP_VAR_%"^) DO ^(^(IF %%%%A==REM_SKP_LBL_%RNDCNTR%_%BATCH_CNTR_%_PRSE GOTO SKP_SRT_%RNDCNTR%_%BATCH_CNTR_%_^)^&^&ECHO %%%%A^>^> "%PTH_BATCH_FL_%%~1"^)>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO :SKP_SRT_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO GOTO :LST_LNE_DELAMINATE_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
TYPE "%~dp0%~1"| FIND "" /V>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO REM_SKP_LBL_%RNDCNTR%_%BATCH_CNTR_%_PRSE>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO :LST_LNE_DELAMINATE_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
IF %HEADLESS_SRT_% EQU 0 (ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 4 (GOTO BYPASS_MODE_LBL_5_))

IF %HEADLESS_SRT_% EQU 1 (IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")
IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO ENDLOCAL>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO MOVE NUL 2^>^&^0>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"

:BYPASS_MODE_LBL_5_

IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% GOTO LST_LNE_SRT_BATCH_

SET /A BATCH_CNTR_+=1
IF %HEADLESS_SRT_% EQU 0 (SET /A BATCH_SKP_CNTR+=10)
IF %HEADLESS_SRT_% EQU 1 (SET /A BATCH_SKP_CNTR+=9)
SET /A BATCH_SKP_CNTR+=%BATCH_FILE_SRT_CNTR_%

:SEC_LST_LNE_SRT_BATCH_

GOTO :EOF

:FLDR_SRT_BATCH_FL_
GOTO :EOF

:LST_LNE_SRT_BATCH_

DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_3976_1_PRSE

:LST_LNE_DELAMINATE_3976_1_
SET DLM_SKP_=8006
FOR /F "usebackq skip=%DLM_SKP_% tokens=* delims=" %%A IN ("%~dp0Win10_11_ISO_Image_Generator.bat") DO ((IF %%A==REM_SKP_LBL_32202_1_PRSE GOTO SKP_SRT_32202_1_)&&ECHO %%A>> "C:\Patches\Batch_Files\Misc\Batch_File_Wrapper.bat")
:SKP_SRT_32202_1_
GOTO :LST_LNE_DELAMINATE_32202_1_

@ECHO OFF
SETLOCAL

CD /D "%~dp0"
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

SET BATCHSRT_VAR[0]_=""
SET BATCHSRT_VAR[1]_=" "
SET BATCHSRT_VAR[2]_="#"
SET BATCHSRT_VAR[3]_="$"
SET BATCHSRT_VAR[4]_="%"
SET BATCHSRT_VAR[5]_="&"
SET BATCHSRT_VAR[6]_="'"
SET BATCHSRT_VAR[7]_="("
SET BATCHSRT_VAR[8]_=")"
SET BATCHSRT_VAR[9]_="*"
SET BATCHSRT_VAR[10]_="+"
SET BATCHSRT_VAR[11]_=","
SET BATCHSRT_VAR[12]_="-"
SET BATCHSRT_VAR[13]_="."
SET BATCHSRT_VAR[14]_="/"
SET BATCHSRT_VAR[15]_=":"
SET BATCHSRT_VAR[16]_=";"
SET BATCHSRT_VAR[17]_="<"
SET BATCHSRT_VAR[18]_="="
SET BATCHSRT_VAR[19]_=">"
SET BATCHSRT_VAR[20]_="?"
SET BATCHSRT_VAR[21]_="@"
SET BATCHSRT_VAR[22]_="["
SET BATCHSRT_VAR[23]_="\"
SET BATCHSRT_VAR[24]_="]"
SET BATCHSRT_VAR[25]_="^"
SET BATCHSRT_VAR[26]_="`"
SET BATCHSRT_VAR[27]_="{"
SET BATCHSRT_VAR[28]_="|"
SET BATCHSRT_VAR[29]_="}"
SET BATCHSRT_VAR[30]_="~"
SET BATCHSRT_VAR_MXCNT_=30

SET RNDCNTR=%RANDOM%
SET BATCH_INVALIDCHAR_CNT_=0
SET BATCH_SKP_CNTR_OFFSET=8
SET PTH_BATCH_FL_=%%~dp0
SET PTH_SLSHCHR_=\
SET HEADLESS_SRT_=0

REM (1) BYPASS (2) SORTMODE (3) BATCHFILENAME (4) FOLDERNAME
REM (1) BYPASS / NOBYPASS / BYPASS_NOHEADER / TEST
REM (2) 1-8
REM (3) 1-4 ( BATCHFILE ) 5-8 ( APPENDFILE ) - MUST BE ENCLOSED IN DOUBLE QUOTES
REM (4) 1,3,5,7 ( DEFAULT ) 2,4,6,8 ( CUSTOM ) - MUST BE ENCLOSED IN DOUBLE QUOTES
REM SORTMODE:
REM 1 - NOAPPEND, DEFAULT ROOT FOLDER
REM 2 - NOAPPEND, CUSTOM ROOT FOLDER
REM 3 - APPEND, DEFAULT ROOT FOLDER
REM 4 - APPEND, CUSTOM ROOT FOLDER
REM 5 - APPEND, DEFAULT ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 6 - APPEND, CUSTOM ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 7 - NOAPPEND, DEFAULT ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )
REM 8 - NOAPPEND, CUSTOM ROOT FOLDER, INCOMPLETE ( SKIP ENDLOCAL, MOV )

SET BYPASS_1ST_ENTRY_=NOBYPASS
SET BYPASS_2ND_ENTRY_=VOID
SET BYPASS_3RD_ENTRY_=VOID
SET BYPASS_4TH_ENTRY_=VOID

REM NOTE: THE ONLY ACCEPTED FORMAT FOR THE APPEND FILE IS UTF-8 ( NO BOM ), AND THE LAST LINE OF THE FILE SHOULD NOT HAVE ANY WHITESPACE CARRIAGE RETURN, LINE FEED CHARACTERS, OR AN EMPTY LINE ( IT WILL AFFECT THE STARTING OFFSET VALUE )

REM STARTLINE
REM 1.) Batch_File_Wrapper.bat BYPASS 3 "Append_Example_File.bat"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_Wrapper.bat BYPASS 5 "Append_Example_File.bat" "C:\Example_Folder\"
REM 2.) Batch_File_Wrapper.bat BYPASS_NOHEADER 5 "Append_Example_File.bat"
REM 3.) Batch_File_Wrapper.bat BYPASS_NOHEADER 3 "Append_Example_File.bat"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_Wrapper.bat BYPASS 4 "Append_Example_File.bat" "C:\Example_Folder\"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_Wrapper.bat BYPASS 6 "Append_Example_File.bat" "C:\Example_Folder\"
REM 2.) Batch_File_Wrapper.bat BYPASS_NOHEADER 6 "Append_Example_File.bat" "C:\Example_Folder\"
REM 3.) Batch_File_Wrapper.bat BYPASS_NOHEADER 4 "Append_Example_File.bat" "C:\Example_Folder\"
REM FINISHLINE
REM STARTLINE
REM 1.) Batch_File_Wrapper.bat TEST "Append_Example_File.bat"
REM FINISHLINE

IF [%1]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT %1==TEST GOTO SKP_GENERIC_WRAPPER_TEST_
IF NOT EXIST "%~sf2" GOTO LST_LNE_SRT_BATCH_
TYPE "%~sf2"| FIND "SET DLM_SKP_" /N| FIND "ALS_BATCH_FILE_TMP_VAR_" /V> "%~dp0Batch_SRT_LST_0.txt"
ENDLOCAL
SETLOCAL EnableDelayedExpansion
SET CNTR=1
FOR /F "usebackq tokens=1 delims=[]" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (SET RANGECHK_[!CNTR!]_=4&SET FRST_NUM_[!CNTR!]_=%%A&SET /A RANGECHK_[!CNTR!]_+=%%A&SET /A CNTR+=1)
SET MXCNTR=-1
SET /A MXCNTR+=%CNTR%
SET CNTR=1
FOR /F "usebackq tokens=3 delims=_^=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (SET SCND_NUM_[!CNTR!]_=%%A&SET /A CNTR+=1)
CLS
FOR /L %%A IN (1,1,%MXCNTR%) DO (IF !RANGECHK_[%%A]_!==!SCND_NUM_[%%A]_! (ECHO [PASS] [COUNTER:] %%A - [FIRST:] !FRST_NUM_[%%A]_! [SECOND:] !SCND_NUM_[%%A]_! [COMPARE:] !RANGECHK_[%%A]_!) ELSE (ECHO [FAIL] [COUNTER:] %%A - [FIRST:] !FRST_NUM_[%%A]_! [SECOND:] !SCND_NUM_[%%A]_! [COMPARE:] !RANGECHK_[%%A]_!))
PAUSE
SETLOCAL DisableDelayedExpansion
DEL /Q "%~dp0Batch_SRT_LST_0.txt" 2> nul
GOTO LST_LNE_SRT_BATCH_
:SKP_GENERIC_WRAPPER_TEST_
IF %1==BYPASS_NOHEADER (SET HEADLESS_SRT_=1&SET BATCH_SKP_CNTR_OFFSET=5&GOTO HEADER_CHECK_BATCH_SRT_)
IF NOT %1==BYPASS GOTO BATCH_SRT_SKP_LBL_
:HEADER_CHECK_BATCH_SRT_
SET BYPASS_1ST_ENTRY_=BYPASS

IF [%2]==[] GOTO BATCH_SRT_SKP_LBL_
IF %2 LSS 1 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
IF %2 GTR 8 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
SET BYPASS_2ND_ENTRY_=%2

IF [%3]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT EXIST "%~dp0%~3" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
SET BYPASS_3RD_ENTRY_=%~3
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET BATCH_APPEND_FLG_=1))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET ALS_BATCH_FILE_TMP_VAR_=%BYPASS_3RD_ENTRY_%))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %HEADLESS_SRT_% EQU 1 GOTO NOHEADER_LBL_3RD_ENTRY_)
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "EXIT" /C>> "%~dp0Batch_SRT_LST_0.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "MOVE NUL 2>&0" /C>> "%~dp0Batch_SRT_LST_0.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET /P BATCH_INVALIDCHAR_CNT_=<"%~dp0Batch_SRT_LST_1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (IF %BATCH_INVALIDCHAR_CNT_% GTR 0 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)))
:NOHEADER_LBL_3RD_ENTRY_
GOTO _INVALIDRND_CNTR_2_
:_INVALIDRND_CNTR_1_
SET RNDCNTR=%RANDOM%
:_INVALIDRND_CNTR_2_
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":LST_LNE_DELAMINATE_%RNDCNTR%_"> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":SKP_SRT_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:"REM_SKP_LBL_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (TYPE "%~dp0Batch_SRT_LST_RND1.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_RND2.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (SET /P BATCH_INVALIDRND_CNT_=<"%~dp0Batch_SRT_LST_RND2.txt"))
IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (IF %BATCH_INVALIDRND_CNT_% GTR 0 GOTO _INVALIDRND_CNTR_1_))

IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 2 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 4 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 6 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] (IF %BYPASS_2ND_ENTRY_% EQU 8 (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF [%4]==[] GOTO BATCH_SRT_SKP_LBL_
IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_)
IF %BYPASS_2ND_ENTRY_% EQU 2 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 4 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 6 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
IF %BYPASS_2ND_ENTRY_% EQU 8 (IF NOT EXIST "%~4" (SET BYPASS_1ST_ENTRY_=NOBYPASS&GOTO BATCH_SRT_SKP_LBL_))
SET BYPASS_4TH_ENTRY_=%~4
SET BATCH_FILE_FLDR_VAR_=%BYPASS_4TH_ENTRY_%

IF NOT "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%%PTH_SLSHCHR_%)
IF "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%)

:BATCH_SRT_SKP_LBL_

GOTO SKPDEBUG_LBL_
ECHO SKIP HEADER: %HEADLESS_SRT_%
ECHO 1st: %BYPASS_1ST_ENTRY_%
ECHO 2nd: %BYPASS_2ND_ENTRY_%
ECHO 3rd: %BYPASS_3RD_ENTRY_%
ECHO 4th: %BYPASS_4TH_ENTRY_% ( "%PTH_BATCH_FL_%" )
PAUSE
:SKPDEBUG_LBL_

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 2 (IF %BYPASS_2ND_ENTRY_% LSS 7 (GOTO BYPASS_MODE_LBL_1_)))
IF %BYPASS_1ST_ENTRY_%==BYPASS GOTO BYPASS_MODE_LBL_2_

:RST_LAMINATE_DELAMINATE_LBL_1_
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul
SET BATCH_INVALIDCHAR_CNT_=0
SET BATCH_APPEND_FLG_=1
SET PTH_BATCH_FL_=%%~dp0
CLS

CHOICE /C YN /N /M "APPEND BATCH FILE EXPANDER SCRIPT TO ANOTHER BATCH FILE IN THE ROOT FOLDER?... [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO RST_LAMINATE_DELAMINATE_LBL_2_

SET /P ALS_BATCH_FILE_TMP_VAR_="[SELECT FILENAME OF BATCH FILE]: "
IF NOT EXIST "%~dp0%ALS_BATCH_FILE_TMP_VAR_%" (GOTO RST_LAMINATE_DELAMINATE_LBL_1_)

TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "EXIT" /C>> "%~dp0Batch_SRT_LST_0.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FIND "MOVE NUL 2>&0" /C>> "%~dp0Batch_SRT_LST_0.txt"
TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_1.txt"
SET /P BATCH_INVALIDCHAR_CNT_=<"%~dp0Batch_SRT_LST_1.txt"
IF %BATCH_INVALIDCHAR_CNT_% GTR 0 (GOTO RST_LAMINATE_DELAMINATE_LBL_2_)

GOTO _INVALIDRND_CNTR_4_
:_INVALIDRND_CNTR_3_
SET RNDCNTR=%RANDOM%
:_INVALIDRND_CNTR_4_
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":LST_LNE_DELAMINATE_%RNDCNTR%_"> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:":SKP_SRT_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%ALS_BATCH_FILE_TMP_VAR_%"| FINDSTR /BLC:"REM_SKP_LBL_%RNDCNTR%_">> "%~dp0Batch_SRT_LST_RND1.txt"
TYPE "%~dp0Batch_SRT_LST_RND1.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_RND2.txt"
SET /P BATCH_INVALIDRND_CNT_=<"%~dp0Batch_SRT_LST_RND2.txt"
IF %BATCH_INVALIDRND_CNT_% GTR 0 GOTO _INVALIDRND_CNTR_3_

:BYPASS_MODE_LBL_1_
SET /P BATCH_SKP_CNTR_APPEND_OFFSET=<"%~dp0Batch_SRT_LST_CNT.txt"
SET /A BATCH_SKP_CNTR_OFFSET+=%BATCH_SKP_CNTR_APPEND_OFFSET%

GOTO RST_LAMINATE_DELAMINATE_LBL_3_

:RST_LAMINATE_DELAMINATE_LBL_2_
:BYPASS_MODE_LBL_2_
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

SET TMP_BATCH_SRT_VAL_=0
SET BATCH_APPEND_FLG_=0
CLS

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% LSS 3 (SET ALS_BATCH_TMP_VAR_=%BYPASS_3RD_ENTRY_%&GOTO BYPASS_MODE_LBL_3_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 6 (SET ALS_BATCH_TMP_VAR_=%BYPASS_3RD_ENTRY_%&GOTO BYPASS_MODE_LBL_3_))

IF %BATCH_INVALIDCHAR_CNT_% GTR 0 ECHO NOTE: UNABLE TO APPEND BATCH FILE EXPANDER SCRIPT TO FILE [SKIPPED]...
SET /P ALS_BATCH_TMP_VAR_="...[ALIAS/FILENAME FOR BATCH FILE EXPANDER IN ROOT DIRECTORY]: "
CALL :SRT_BATCH_FILE_TMP_SMPL_ "%ALS_BATCH_TMP_VAR_%"
IF %TMP_BATCH_SRT_VAL_% GTR 0 (GOTO RST_LAMINATE_DELAMINATE_LBL_2_)

CHOICE /C YN /N /M "ALIAS/FILENAME: [%ALS_BATCH_TMP_VAR_%_Batch_File_Expand.bat] <- [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 2 GOTO RST_LAMINATE_DELAMINATE_LBL_2_
:BYPASS_MODE_LBL_3_
SET ALS_BATCH_FILE_TMP_VAR_=%ALS_BATCH_TMP_VAR_%_Batch_File_Expand.bat

:RST_LAMINATE_DELAMINATE_LBL_3_

DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

IF %BATCH_APPEND_FLG_% EQU 0 DIR /B "%~dp0*.bat"| FIND "Batch_File_Wrapper.bat" /V> "%~dp0Batch_SRT_LST_0.txt"
IF %BATCH_APPEND_FLG_% EQU 1 DIR /B "%~dp0*.bat"| FIND "Batch_File_Wrapper.bat" /V| FIND "%ALS_BATCH_FILE_TMP_VAR_%" /V> "%~dp0Batch_SRT_LST_0.txt"

TYPE "%~dp0Batch_SRT_LST_0.txt"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
SET /P BATCH_SRT_CNTR_=<"%~dp0Batch_SRT_LST_CNT.txt"
IF %BATCH_SRT_CNTR_% EQU 0 GOTO LST_LNE_SRT_BATCH_

:RST_LAMINATE_DELAMINATE_LBL_4_
CLS

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 2 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 4 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 6 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% EQU 8 (GOTO BYPASS_MODE_LBL_4_))
IF %BYPASS_1ST_ENTRY_%==BYPASS (GOTO RST_LAMINATE_DELAMINATE_LBL_5_)

CHOICE /C YN /N /M "USE DEFAULT ROOT FOLDER FOR OUTPUT DIRECTORY?... [Y/N] TO PROCEED?"
IF %ErrorLevel% EQU 1 GOTO RST_LAMINATE_DELAMINATE_LBL_5_

SET /P BATCH_FILE_FLDR_VAR_="[SELECT ALTERNATE ROOT FOLDER FOR OUTPUT DIRECTORY]: "
IF NOT EXIST "%BATCH_FILE_FLDR_VAR_%" (GOTO RST_LAMINATE_DELAMINATE_LBL_4_)

IF NOT "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%%PTH_SLSHCHR_%)
IF "%BATCH_FILE_FLDR_VAR_:~-1%"=="\" (SET PTH_BATCH_FL_=%BATCH_FILE_FLDR_VAR_%)

:BYPASS_MODE_LBL_4_

REM FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (CALL :FLDR_SRT_BATCH_FL_ "%%A")

:RST_LAMINATE_DELAMINATE_LBL_5_

SET BATCH_CNTR_=1
SET BATCH_SKP_CNTR=%BATCH_SKP_CNTR_OFFSET%
FOR /F "usebackq tokens=* delims=" %%A IN ("%~dp0Batch_SRT_LST_0.txt") DO (CALL :LAMINATE_BATCH_FL_ "%%A")

GOTO LST_LNE_SRT_BATCH_

:SRT_BATCH_FILE_TMP_SMPL_
SETLOCAL EnableDelayedExpansion
IF %1==%BATCHSRT_VAR[0]_% (ECHO ^1>> "%~dp0Batch_SRT_LST_1.txt")
FOR /L %%A IN (1,1,%BATCHSRT_VAR_MXCNT_%) DO ( (ECHO %1| FIND !BATCHSRT_VAR[%%A]_! /C)>> "%~dp0Batch_SRT_LST_1.txt")
TYPE "%~dp0Batch_SRT_LST_1.txt"| FIND "1" /C> "%~dp0Batch_SRT_LST_2.txt"
SET /P TMP_BATCH_SRT_VAL_=<"%~dp0Batch_SRT_LST_2.txt"
DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul
SETLOCAL DisableDelayedExpansion
GOTO :EOF

:LAMINATE_BATCH_FL_

TYPE "%~dp0%~1"| FIND "" /V /C> "%~dp0Batch_SRT_LST_CNT.txt"
SET /P BATCH_FILE_SRT_CNTR_=<"%~dp0Batch_SRT_LST_CNT.txt"
IF %BATCH_FILE_SRT_CNTR_% EQU 0 GOTO SEC_LST_LNE_SRT_BATCH_

IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_APPEND_FLG_% EQU 1 (IF %BATCH_CNTR_% EQU 1 ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"&ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"))

IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_APPEND_FLG_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO @ECHO OFF> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"))
IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO SETLOCAL DisableDelayedExpansion>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")
IF %HEADLESS_SRT_% EQU 0 (IF %BATCH_CNTR_% EQU 1 ECHO CD /D "%%~dp0">> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")

(ECHO SET DLM_SKP_=%BATCH_SKP_CNTR%)>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO FOR /F "usebackq skip=%%DLM_SKP_%% tokens=* delims=" %%%%A IN ^("%%~dp0%ALS_BATCH_FILE_TMP_VAR_%"^) DO ^(^(IF %%%%A==REM_SKP_LBL_%RNDCNTR%_%BATCH_CNTR_%_PRSE GOTO SKP_SRT_%RNDCNTR%_%BATCH_CNTR_%_^)^&^&ECHO %%%%A^>^> "%PTH_BATCH_FL_%%~1"^)>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO :SKP_SRT_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO GOTO :LST_LNE_DELAMINATE_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
TYPE "%~dp0%~1"| FIND "" /V>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO REM_SKP_LBL_%RNDCNTR%_%BATCH_CNTR_%_PRSE>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
ECHO :LST_LNE_DELAMINATE_%RNDCNTR%_%BATCH_CNTR_%_>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
IF %HEADLESS_SRT_% EQU 0 (ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")

IF %BYPASS_1ST_ENTRY_%==BYPASS (IF %BYPASS_2ND_ENTRY_% GTR 4 (GOTO BYPASS_MODE_LBL_5_))

IF %HEADLESS_SRT_% EQU 1 (IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO:>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%")
IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO ENDLOCAL>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"
IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% ECHO MOVE NUL 2^>^&^0>> "%~dp0%ALS_BATCH_FILE_TMP_VAR_%"

:BYPASS_MODE_LBL_5_

IF %BATCH_SRT_CNTR_%==%BATCH_CNTR_% GOTO LST_LNE_SRT_BATCH_

SET /A BATCH_CNTR_+=1
IF %HEADLESS_SRT_% EQU 0 (SET /A BATCH_SKP_CNTR+=10)
IF %HEADLESS_SRT_% EQU 1 (SET /A BATCH_SKP_CNTR+=9)
SET /A BATCH_SKP_CNTR+=%BATCH_FILE_SRT_CNTR_%

:SEC_LST_LNE_SRT_BATCH_

GOTO :EOF

:FLDR_SRT_BATCH_FL_
GOTO :EOF

:LST_LNE_SRT_BATCH_

DEL /Q "%~dp0Batch_SRT_LST_*.txt" 2> nul

ENDLOCAL
MOVE NUL 2>&0

REM_SKP_LBL_32202_1_PRSE

:LST_LNE_DELAMINATE_32202_1_

:LST_LNE_WIN_SRT_2_

ENDLOCAL
MOVE NUL 2>&0

 

NOTE: The following text documents organize each stage of the ISO image creation process:

 

WINDOWS 10 22H2 32-BIT: C:\Patches\Win10\CheckList_W10_x86.txt
WINDOWS 10 22H2 64-BIT: C:\Patches\Win10\CheckList_W10_x64.txt
WINDOWS 11 22H2 64-BIT: C:\Patches\Win11\CheckList_W11_x64.txt

NOTE: Currently no official download sources exist for Windows 10 / 11 64-bit ARM ISO Images:

WINDOWS 10 22H2 ARM 64-BIT: "C:\Patches\Win10\CheckList_W10_x64_ARM.txt"
WINDOWS 11 22H2 ARM 64-BIT: "C:\Patches\Win11\CheckList_W11_x64_ARM.txt"

 

(3.) After installing the operating system, you will have to reset the DACL, which requires Sdelete / Sdelete64 /Sdelete64a ( Sysinternals )

 

This should only be run from a bootable WinPE ISO Image:

 

C:\Patches\Batch_Files\ACL\WinPE_8_3_Reset_C_Drive_Wipe_ACL_Disable_ELAM_SmartScreen.bat

 

This batch file is best used, from within the WinPE environment, to reset file permissions to default on any drive that isn't a system volume:

 

C:\Patches\Batch_Files\ACL\WinPE_8_3_Reset_Drive_Wipe_ACL.bat

 

Open the Command Prompt -> Start Menu -> Run -> taskmgr -> File -> Run new Task -> %SystemRoot%\System32\cmd.exe -> Select "Create this task with administrative privileges." -> Click OK.

 

(4.) After rebooting, the default Windows Apps have to be reset on Windows 11, and reinstalled on Windows 10, due to the removal of Orphaned SIDs and the DACL being reset:

 

Windows 10:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Reinstall_Apps_Win10.bat

 

Windows 11:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Reset_Apps_Win11.bat

 

(5A.) Configure the Firewall and Network Stack:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Firewall\Generic_Win10_11_Firewall_Settings.bat

 

(5B.) Alternate: My current setup looks similar to this, aside from the folder layout. I have hardened the network stack, and replaced the built-in unicast / multicast DNS with an Encrypted Stub Resolver:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Networking\One_Button_Network_Configure.bat
CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Networking\Network_Configure_Latency.bat
CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Networking\DNS_.bat
CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Firewall\Configure_Win10_11_Firewall.bat RESET

 

The following script enables Windows Update / Microsoft Store Updates:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Firewall\Enable_Windows_App_Update_Firewall.bat

 

The following script disables Windows Update / Microsoft Store Updates:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Firewall\Disable_Windows_App_Update_Firewall.bat

 

The following script creates temporary firewall rules for installing software, which expire after approximately thirty seconds of no activity:

 

CMD /Q /C START /MIN /REALTIME C:\Patches\Batch_Files\Firewall\Temp_Firewall_Rule_Generator.bat

 

The most common problem after patching / updating Windows, is the fact that you often have to modify / delete any new registry entries the patches or services create, that bypass security rules / security policies you have set in place:

 

CMD /Q /C START /MIN /REALTIME C:\Patches\Batch_Files\Registry_Patch_Win10_11.bat

 

To remove unwanted apps, edit this batch file based on your needs:

 

CMD /Q /C START /MIN /REALTIME /WAIT /B C:\Patches\Batch_Files\Selective_Removal_Win10_11_Apps.bat

 

The following batch file erases the Command Line history, MUI Cache, Jumplists, as well as most Temporary Files on the System Drive:

 

CMD /Q /C START /MIN /REALTIME C:\Patches\Batch_Files\Clear_Default_Cache_Win10_11.bat

 

Miscellaneous Examples For Migrating Offline Images To USB Drives Or Another Type Of External Mass Storage Device / Storage Medium:


Checklist:
1.) Capture Image
2.) Apply Image
3.) Reset ACL
4.) Run Component Cleanup
5.) Create New Bootloader Entries ( Run BCDBOOT Twice To Erase / Clear Old Entries )
6.) Update The Boot Sector ( BOOTSECT )
7.) Modify The Bootloader Configuration

 

NOTE: Modify The Syntax / Command Line Arguments By Changing The Folder Layout And File Names Based On Your Needs:

 

1A.)

IF NOT EXIST "D:\Scrtch" MKDIR "D:\Scrtch"
DISM /Capture-Image /Scratchdir:"D:\Scrtch" /ImageFile="D:\ISO\Win_10_11_USB.wim" /CaptureDir:C:\ /Name:"Win_10_11_USB"
RMDIR /Q /S "D:\Scrtch"

1B.)

IF NOT EXIST "D:\Scrtch" MKDIR "D:\Scrtch"
DISM /Capture-Image /Scratchdir:"D:\Scrtch" /ImageFile="D:\ISO\Win_10_11_USB.wim" /CaptureDir:C:\ /Name:"Win_10_11_USB" /EA
RMDIR /Q /S "D:\Scrtch"

2A.)

DISM /Apply-Image /ImageFile=D:\ISO\Win_10_11_USB.wim /Index:1 /ApplyDir:C:\

2B.)

DISM /Apply-Image /ImageFile=D:\ISO\Win_10_11_USB.wim /Index:1 /ApplyDir:C:\ /EA

2C.)

DISM /Apply-Image /ImageFile=D:\ISO\Win_10_11_USB.wim /Index:1 /ApplyDir:C:\ /EA /Compact

3A.) WinPE_8_3_Reset_C_Drive_Wipe_ACL_Disable_ELAM_SmartScreen.bat

3B.) In most situations, you can save time when resetting the ACL, by mounting the image on a running operating system first, and then committing the changes before you re-apply the offline image to an external device utilizing WinPE:

@ECHO OFF
CD /D "%~dp0"
IF NOT EXIST "C:\Scrtch_WinPE" MKDIR "C:\Scrtch_WinPE"
IF NOT EXIST "C:\Mount_WinPE" MKDIR "C:\Mount_WinPE"
DISM /Mount-Image /ImageFile="D:\ISO\Win_10_11_USB.wim" /Index:1 /MountDir:"C:\Mount_WinPE"
CALL WinPE_8_3_Reset_Folder_Wipe_ACL.bat "C:\Mount_WinPE"
DISM /Unmount-Image /MountDir:"C:\Mount_WinPE" /Commit
DISM /Cleanup-Mountpoints
RMDIR /S /Q "C:\Scrtch_WinPE"
RMDIR /S /Q "C:\Mount_WinPE"

4.)

IF NOT EXIST "C:\Scrtch" MKDIR "C:\Scrtch"
DISM /Image:C:\ /ScratchDir:"C:\Scrtch" /Cleanup-Image /StartComponentCleanup /ResetBase
RMDIR /Q /S "C:\Scrtch"

5A.)

BCDBOOT C:\Windows /s C: /f BIOS

5B.)

BCDBOOT C:\Windows /s S: /f UEFI




Example DiskPart Script: 


NOTE: When using certain types of removable mass storage devices, it doesn't allow you to configure the bootloader on the EFI partition, unless it's on an online operating system image. Sometimes to get around this, you have to manually recreate the EFI partition as a regular FAT32 partition first, assign a volume letter ( whatever you have in mind, maybe the volume letter S in this instance, ) apply the offline image, install and configure the bootloader, and then use the SET ID command in DiskPart to update the partition ID.

CONVERT GPT NOERR
SELECT PARTITION 1
DELETE PARTITION OVERRIDE NOERR
CREATE PARTITION PRIMARY SIZE=260 NOERR
FORMAT FS=FAT32 QUICK NOERR
SET ID="C12A7328-F81F-11D2-BA4B-00A0C93EC93B" NOERR
CREATE PARTITION MSR SIZE=128 NOERR
CREATE PARTITION PRIMARY NOERR
FORMAT FS=NTFS UNIT=4096 QUICK NOERR




6.)

BOOTSECT /NT60 C: /FORCE

7A.)

BCDEDIT /SET {default} QUIETBOOT TRUE
BCDEDIT /SET {default} BOOTLOG FALSE
BCDEDIT /SET {default} BOOTMENUPOLICY LEGACY
BCDEDIT /SET {default} USEPLATFORMCLOCK TRUE
BCDEDIT /SET {default} TPMBOOTENTROPY FORCEENABLE
BCDEDIT /SET {default} TSCSYNCPOLICY ENHANCED
BCDEDIT /SET {default} DISABLEDYNAMICTICK FALSE
BCDEDIT /SET {default} NX OPTOUT
BCDEDIT /SET {default} PAE DEFAULT
BCDEDIT /SET {default} DISABLEELAMDRIVERS TRUE

7B.) MBR / BIOS Configurations:

BCDEDIT /STORE C:\Boot\BCD /SET {default} QUIETBOOT TRUE
BCDEDIT /STORE C:\Boot\BCD /SET {default} BOOTLOG FALSE
BCDEDIT /STORE C:\Boot\BCD /SET {default} BOOTMENUPOLICY LEGACY
BCDEDIT /STORE C:\Boot\BCD /SET {default} USEPLATFORMCLOCK TRUE
BCDEDIT /STORE C:\Boot\BCD /SET {default} TPMBOOTENTROPY FORCEENABLE
BCDEDIT /STORE C:\Boot\BCD /SET {default} TSCSYNCPOLICY ENHANCED
BCDEDIT /STORE C:\Boot\BCD /SET {default} DISABLEDYNAMICTICK FALSE
BCDEDIT /STORE C:\Boot\BCD /SET {default} NX OPTOUT
BCDEDIT /STORE C:\Boot\BCD /SET {default} PAE DEFAULT
BCDEDIT /STORE C:\Boot\BCD /SET {default} DISABLEELAMDRIVERS TRUE

7C.) EFI / UEFI Configurations:

BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} QUIETBOOT TRUE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} BOOTLOG FALSE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} BOOTMENUPOLICY LEGACY
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} USEPLATFORMCLOCK TRUE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} TPMBOOTENTROPY FORCEENABLE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} TSCSYNCPOLICY ENHANCED
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} DISABLEDYNAMICTICK FALSE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} NX OPTOUT
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} PAE DEFAULT
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} DISABLEELAMDRIVERS TRUE


Misc Examples Not Related To Step #7 ( Avoid Using These With CompactOS Enabled )


BCDEDIT /V
BCDEDIT /ENUM ACTIVE
BCDEDIT /ENUM {current}
BCDEDIT /ENUM {default}

BCDEDIT /SET {bootmgr} device partition=C:
BCDEDIT /SET {default} device partition=C:
BCDEDIT /SET {default} osdevice partition=C:

BCDEDIT /SET {bootmgr} device partition=\Device\HarddiskVolume1
BCDEDIT /SET {default} device partition=\Device\HarddiskVolume1
BCDEDIT /SET {default} osdevice partition=\Device\HarddiskVolume1

BCDEDIT /STORE C:\Boot\BCD /V
BCDEDIT /STORE C:\Boot\BCD /ENUM ACTIVE
BCDEDIT /STORE C:\Boot\BCD /ENUM {current}
BCDEDIT /STORE C:\Boot\BCD /ENUM {default}

BCDEDIT /STORE C:\Boot\BCD /SET {bootmgr} device partition=C:
BCDEDIT /STORE C:\Boot\BCD /SET {default} device partition=C:
BCDEDIT /STORE C:\Boot\BCD /SET {default} osdevice partition=C:

BCDEDIT /STORE C:\Boot\BCD /SET {bootmgr} device partition=\Device\HarddiskVolume1
BCDEDIT /STORE C:\Boot\BCD /SET {default} device partition=\Device\HarddiskVolume1
BCDEDIT /STORE C:\Boot\BCD /SET {default} osdevice partition=\Device\HarddiskVolume1

BCDEDIT /SET {bootmgr} device partition=S:
BCDEDIT /SET {default} device partition=C:
BCDEDIT /SET {default} osdevice partition=C:

BCDEDIT /SET {bootmgr} device partition=\Device\HarddiskVolume2
BCDEDIT /SET {default} device partition=\Device\HarddiskVolume1
BCDEDIT /SET {default} osdevice partition=\Device\HarddiskVolume1

BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /V
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /ENUM ACTIVE
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /ENUM {current}
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /ENUM {default}

BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {bootmgr} device partition=S:
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} device partition=C:
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} osdevice partition=C:

BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {bootmgr} device partition=\Device\HarddiskVolume2
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} device partition=\Device\HarddiskVolume1
BCDEDIT /STORE S:\EFI\Microsoft\Boot\BCD /SET {default} osdevice partition=\Device\HarddiskVolume1


"OEM Deployment of Windows 11 desktop editions" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/oem-deployment-of-windows-desktop-editions
"Launch the Windows Settings app" -> https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app
"Add and Remove Drivers to an offline Windows Image" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/add-and-remove-drivers-to-an-offline-windows-image
"Add a Driver Online in Audit Mode" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/add-a-driver-online-in-audit-mode
"Use Answer Files with Sysprep" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/use-answer-files-with-sysprep
"Capture and apply a Windows image using a single .WIM file" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/capture-and-apply-windows-using-a-single-wim
"Sample scripts" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-deployment-sample-scripts-sxs
"PARTITION_INFORMATION_GPT structure (winioctl.h)" -> https://learn.microsoft.com/en-us/windows/win32/api/winioctl/ns-winioctl-partition_information_gpt
"UEFI/GPT-based hard drive partitions" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/configure-uefigpt-based-hard-drive-partitions
"Understanding Disk Partitions ( Windows 7 )" -> https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-7/dd799232(v=ws.10)?redirectedfrom=MSDN
"Windows and GPT FAQ ( legacy )" -> https://learn.microsoft.com/en-us/previous-versions/windows/hardware/design/dn640535(v=vs.85)
"WinPE: Store or split images to deploy Windows using a single USB drive" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/winpe--use-a-single-usb-key-for-winpe-and-a-wim-file---wim
"Boot to UEFI Mode or legacy BIOS mode" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/boot-to-uefi-mode-or-legacy-bios-mode
"UEFI in Windows" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/uefi-in-windows
"UEFI protocols for Windows" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/uefi-protocols-for-windows
"Boot and UEFI" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/bringup/boot-and-uefi
"UEFI Firmware" -> https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/hh824898(v=win.10)?redirectedfrom=MSDN
"Windows support of UEFI" -> https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/hh824898(v=win.10)?redirectedfrom=MSDN#windows-support-of-uefi
"Unattended Windows Setup Reference" -> https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/
"Windows Setup Technical Reference" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-technical-reference
"Windows Setup Command-Line Options" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-command-line-options
"Windows System Image Manager Technical Reference" -> https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/windows-system-image-manager-technical-reference
"Sysprep (Generalize) a Windows installation" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/sysprep--generalize--a-windows-installation
"Sysprep (System Preparation) Overview" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/sysprep--system-preparation--overview
"Sysprep Command-Line Options" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/sysprep-command-line-options
"Capture, apply, and work with Windows images" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/work-with-windows-images
"Compact OS Size comparisons" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/compact-os#size-comparisons
"Capturing and applying independent applications" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/siloed-provisioning-packages#capturing-and-applying-independent-applications
"/WimBoot is for configuring an offline image for installing on a WIMBoot system." -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14#optimize-image
"To Create a Windows Image for Multiple Architecture Types" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/create-a-wim-for-multiple-architecture-types-using-dism#to-create-a-windows-image-for-multiple-architecture-types
"Windows Configuration Designer provisioning settings (reference)" -> https://learn.microsoft.com/en-us/windows/configuration/wcd/wcd
"ScanState Syntax" -> https://learn.microsoft.com/en-us/windows/deployment/usmt/usmt-scanstate-syntax
"LoadState syntax" -> https://learn.microsoft.com/en-us/windows/deployment/usmt/usmt-loadstate-syntax
"User State Migration Tool (USMT) overview" -> https://learn.microsoft.com/en-us/windows/deployment/usmt/usmt-overview
"USMT common issues" -> https://learn.microsoft.com/en-us/troubleshoot/windows-client/deployment/usmt-common-issues
"USMT return codes" -> https://learn.microsoft.com/en-us/troubleshoot/windows-client/deployment/usmt-return-codes
"Offline Migration Reference" -> https://learn.microsoft.com/en-us/windows/deployment/usmt/offline-migration-reference
"How provisioning works in Windows" -> https://learn.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-how-it-works#precedence-for-provisioning-packages
"OOBE (Windows Configuration Designer reference)" -> https://learn.microsoft.com/en-us/windows/configuration/wcd/wcd-oobe
"Customize the Windows 10 Out of Box Experience (OOBE)" -> https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/customize-oobe
"Automate OOBE" -> https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/automate-oobe
"Provision PCs with common settings for initial deployment (desktop wizard)" -> https://learn.microsoft.com/en-us/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment
"Advanced settings configuration in WSL" -> https://learn.microsoft.com/en-us/windows/wsl/wsl-config#configure-per-distro-launch-settings-with-wslconf
"DISM Default Application Association Servicing Command-Line Options" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-default-application-association-servicing-command-line-options
"Export or Import Default Application Associations" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/export-or-import-default-application-associations
"DISM Operating System Package (.cab or .msu) Servicing Command-Line Options" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options
"Add or Remove Packages Offline Using DISM" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/add-or-remove-packages-offline-using-dism
"Enable or Disable Windows Features Using DISM" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/enable-or-disable-windows-features-using-dism
"DISM Capabilities Package Servicing Command-Line Options" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-capabilities-package-servicing-command-line-options
"Available Features on Demand" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod
"Create a provisioning package with multivariant settings" -> https://learn.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-multivariant
"Use a script to install a desktop app in provisioning packages" -> https://learn.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-script-to-install-app
"Siloed provisioning packages" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/siloed-provisioning-packages
"Work with siloed provisioning packages" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/siloed-provisioning-packages?view=windows-11#work-with-siloed-provisioning-packages"
"Apply siloed provisioning packages" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/siloed-provisioning-packages?view=windows-11#apply-siloed-provisioning-packages
"DISM /Apply-SiloedPackage" -> https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-image-management-command-line-options-s14?view=windows-11#apply-siloedpackage
"Settings changed when you uninstall a provisioning package" -> https://learn.microsoft.com/en-us/windows/configuration/provisioning-packages/provisioning-uninstall-package
"Windows.UI.ApplicationSettings Namespace" -> https://learn.microsoft.com/en-us/uwp/api/windows.ui.applicationsettings?view=winrt-22621
"Guidelines for app settings" -> https://learn.microsoft.com/en-us/windows/apps/design/app-settings/guidelines-for-app-settings
"Store and retrieve settings and other app data" -> https://learn.microsoft.com/en-us/windows/apps/design/app-settings/store-and-retrieve-app-data
"Group policy settings for Desktop Analytics" -> https://learn.microsoft.com/en-us/mem/configmgr/desktop-analytics/group-policy-settings
"Use Windows 10/11 templates to configure group policy settings in Microsoft Intune" -> https://learn.microsoft.com/en-us/mem/intune/configuration/administrative-templates-windows
"Windows Privacy Compliance: A Guide for IT and Compliance Professionals" -> https://learn.microsoft.com/en-us/windows/privacy/windows-10-and-privacy-compliance
"Win32 and Desktop Bridge app ADMX policy Ingestion" -> https://learn.microsoft.com/en-us/windows/client-management/win32-and-centennial-app-policy-configuration
"Policy CSP" -> https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-configuration-service-provider
"Find the Application User Model ID of an installed app" -> https://learn.microsoft.com/en-us/windows/configuration/find-the-application-user-model-id-of-an-installed-app
"Microsoft Store Apps fail to start if default registry or file permissions modified" -> https://learn.microsoft.com/en-us/troubleshoot/windows-client/shell-experience/microsoft-store-apps-fail-to-start
"Application User Model IDs (AppUserModelIDs)" -> https://learn.microsoft.com/en-us/windows/win32/shell/appids#registering-an-application-as-a-host-process
"Using Registry String Redirection" -> https://learn.microsoft.com/en-us/windows/win32/intl/using-registry-string-redirection
"The Windows Shell" -> https://learn.microsoft.com/en-us/windows/win32/api/_shell/
"Dynamic-Link Library Redirection" -> https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-redirection
"Verbs and File Associations" -> https://learn.microsoft.com/en-us/windows/win32/shell/fa-verbs
"Application Registration" -> https://learn.microsoft.com/en-us/windows/win32/shell/app-registration
"Shell (COM)" -> https://learn.microsoft.com/en-us/windows/win32/com/shell
"Application Registration" -> https://learn.microsoft.com/en-us/windows/win32/shell/app-registration
"Programmatic Identifiers" -> https://learn.microsoft.com/en-us/windows/win32/shell/fa-progids
"Registry Reference" -> https://learn.microsoft.com/en-us/windows/win32/sysinfo/registry-reference
"reg commands" -> https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/reg
"regini" -> https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/regini
"about_Registry_Provider (PowerShell)" -> https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_registry_provider
"Windows registry information for advanced users" -> https://learn.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users
"Registry Hives" -> https://learn.microsoft.com/en-us/windows/win32/sysinfo/registry-hives
"How to change registry values or permissions from a command line or a script" -> https://learn.microsoft.com/en-us/troubleshoot/windows-client/application-management/change-registry-values-permissions
"Working with registry keys" -> https://learn.microsoft.com/en-us/powershell/scripting/samples/working-with-registry-keys
"New-ItemProperty - Property Types Of Registry Keys / Registry Key Items" -> https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/new-itemproperty#-propertytype
"Create an MSIX package from any desktop installer (MSI, EXE, ClickOnce, or App-V)" -> https://learn.microsoft.com/en-us/windows/msix/packaging-tool/create-app-package
"How to move your existing installers to MSIX" -> https://learn.microsoft.com/en-us/windows/msix/packaging-tool/create-an-msix-overview
"MSIX Toolkit" -> https://learn.microsoft.com/en-us/windows/msix/toolkit/msix-toolkit-overview
"Reset or Repair MSIX apps" -> https://learn.microsoft.com/en-us/windows/msix/desktop/managing-your-msix-reset-and-repair
"Creating a Cabinet File" -> https://learn.microsoft.com/en-us/previous-versions/windows/desktop/wintt/creating-a-cabinet-file
"Microsoft Cabinet Format" -> https://learn.microsoft.com/en-us/previous-versions/bb417343(v=msdn.10)
"Using Cabinets and Compressed Sources" -> https://learn.microsoft.com/en-us/windows/win32/msi/using-cabinets-and-compressed-sources
"How to Prepare Updatable Help CAB Files" -> https://learn.microsoft.com/en-us/powershell/scripting/developer/help/how-to-prepare-updatable-help-cab-files
"How to Create and Upload CAB Files" -> https://learn.microsoft.com/en-us/powershell/scripting/developer/help/how-to-create-and-upload-cab-files
"Extracting Files from Cabinets" -> https://learn.microsoft.com/en-us/windows/win32/setupapi/extracting-files-from-cabinets
"Cabinet File Reference" -> https://learn.microsoft.com/en-us/windows/win32/setupapi/cabinet-file-reference
"Windows Installer" -> https://learn.microsoft.com/en-us/windows/win32/msi/windows-installer-portal
"Use the winget tool to install and manage applications" -> https://learn.microsoft.com/en-us/windows/package-manager/winget/
"Role-based Guide to Windows Installer Documentation" -> https://learn.microsoft.com/en-us/windows/win32/msi/role-based-guide-to-windows-installer-documentation
"Windows Installer Reference "-> https://learn.microsoft.com/en-us/windows/win32/msi/windows-installer-reference
"WinGet settings" -> https://aka.ms/winget-settings


"AMD Auto-Detect and Install for Windows 10/11" -> https://www.amd.com/en/support

"AMD Socket AM5 Chipset Drivers" -> https://www.amd.com/en/support/chipsets/amd-socket-am5/x670

"AMD Socket AM4 Chipset Drivers / StoreMI" -> https://www.amd.com/en/support/chipsets/amd-socket-am4/x570

"Intel Driver & Support Assistant" -> https://www.intel.com/content/www/us/en/support/detect.html

"Chipset INF Utility" -> https://www.intel.com/content/www/us/en/download/19347/chipset-inf-utility.html

"Intel Graphics Driver for Windows [15.40]" -> https://www.intel.com/content/www/us/en/download/18369/intel-graphics-driver-for-windows-15-40.html

"Intel Graphics Driver for Windows [15.45]" -> https://www.intel.com/content/www/us/en/download/18799/intel-graphics-driver-for-windows-15-45.html

"Intel Graphics - Windows DCH Drivers" -> https://www.intel.com/content/www/us/en/download/19344/intel-graphics-windows-dch-drivers.html

"Intel Arc & Iris Xe Graphics Drivers - Windows" -> https://www.intel.com/content/www/us/en/download/785597/intel-arc-iris-xe-graphics-windows.html

"Intel Management Engine Drivers for Windows 10 and Windows 11" -> https://www.intel.com/content/www/us/en/download/682431/intel-management-engine-drivers-for-windows-10-and-windows-11.html

"How to Check What Version of the Intel Rapid Storage Technology (Intel RST) Driver is Installed in the System" -> https://www.intel.com/content/www/us/en/support/articles/000031599/memory-and-storage.html

"Support for Intel Rapid Storage Technology (Intel RST)" -> https://www.intel.com/content/www/us/en/support/products/55005/technologies/intel-rapid-storage-technology-intel-rst.html

"Intel Rapid Storage Technology (Intel RST) User Interface and Driver" -> https://www.intel.com/content/www/us/en/download/15667/intel-rapid-storage-technology-intel-rst-user-interface-and-driver.html

"Intel Rapid Storage Technology Driver Installation Software with Intel Optane Memory (8th and 9th Gen Platforms)" -> https://www.intel.com/content/www/us/en/download/19755/intel-rapid-storage-technology-driver-installation-software-with-intel-optane-memory-8th-and-9th-gen-platforms.html

"Intel Rapid Storage Technology Driver Installation Software with Intel Optane Memory (10th and 11th Gen Platforms)" -> https://www.intel.com/content/www/us/en/download/19512/intel-rapid-storage-technology-driver-installation-software-with-intel-optane-memory-10th-and-11th-gen-platforms.html

"Intel Rapid Storage Technology Driver Installation Software with Intel Optane Memory (11th and 12th Gen Platforms)" -> https://www.intel.com/content/www/us/en/download/720755/intel-rapid-storage-technology-driver-installation-software-with-intel-optane-memory-11th-and-12th-gen-platforms.html

"Intel Rapid Storage Technology Driver Installation Software with Intel Optane Memory (11th up to 13th Gen Platforms)" -> https://www.intel.com/content/www/us/en/download/720755/intel-rapid-storage-technology-driver-installation-software-with-intel-optane-memory-11th-up-to-13th-gen-platforms.html

"Intel Products" -> https://www.intel.com/content/www/us/en/products/overview.html


"fsutil behavior - Examples - To query the system to see if TRIM is enabled or not" -> https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior#examples
"Example 1: Perform TRIM optimization" -> https://learn.microsoft.com/en-us/powershell/module/storage/optimize-volume#example-1-perform-trim-optimization
"ReFSUtil" -> https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/refsutil
"File System Functionality Comparison" -> https://learn.microsoft.com/en-us/windows/win32/fileio/filesystem-functionality-comparison#journaling-and-change-log
"NTFS vs ReFS ( Feature Comparison )" -> https://learn.microsoft.com/en-us/windows-server/storage/refs/refs-overview#feature-comparison
"Windows Offloaded Data Transfers" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/offloaded-data-transfers
"Deploy Windows Offloaded Data Transfers" -> https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj200627(v=ws.11)
"Naming Files, Paths, and Namespaces" -> https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file
"Hard Links and Junctions" -> https://learn.microsoft.com/en-us/windows/win32/fileio/hard-links-and-junctions
"Symbolic Links" -> https://learn.microsoft.com/en-us/windows/win32/fileio/symbolic-links
"Overview of NDIS driver types" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/network/ndis-drivers
"Filter Manager Concepts" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/filter-manager-concepts
"API reference docs for Windows Driver Kit (WDK)" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/ddi/
"Tools for minifilter development and testing" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/development-and-testing-tools
"File system filter drivers are not device drivers" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/about-file-system-filter-drivers
"Storage Spaces Direct overview" -> https://learn.microsoft.com/en-us/azure-stack/hci/concepts/storage-spaces-direct-overview
"Access tiers for blob data" -> https://learn.microsoft.com/en-us/azure/storage/blobs/access-tiers-overview?tabs=azure-portal
"AM Driver Initialization ( ELAM Driver Requirements )" -> https://learn.microsoft.com/en-us/windows-hardware/drivers/install/elam-driver-requirements#am-driver-initialization
"Manage connections from Windows 10 and Windows 11 operating system components to Microsoft services - 24. Microsoft Defender Antivirus" -> https://learn.microsoft.com/en-us/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services#24-microsoft-defender-antivirus
"Microsoft Defender Antivirus on Windows Server - Passive mode and Windows Server" -> https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-on-windows-server?view=o365-worldwide#passive-mode-and-windows-server
"Protecting anti-malware services" -> https://learn.microsoft.com/en-us/windows/win32/services/protecting-anti-malware-services-
"Turn tamper protection on (or off) for an individual device" -> https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide#manage-tamper-protection-on-an-individual-device
"DisableAntiSpyware" -> https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware
"Manage Copilot in Windows" -> https://learn.microsoft.com/en-us/windows/client-management/manage-windows-copilot
"Manage Copilot" -> https://learn.microsoft.com/en-us/copilot/manage
"Using the Sdbinst.exe Command-Line Tool" -> https://learn.microsoft.com/en-us/windows/deployment/planning/using-the-sdbinstexe-command-line-tool
"How to grant users rights to manage services" -> https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/grant-users-rights-manage-services
"Security policy settings" -> https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/security-policy-settings
"Administer security policy settings" -> https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings
"SID Strings" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/sid-strings
"Well-known SIDs" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids
"Security Descriptor String Format" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/security-descriptor-string-format
"Security Descriptor Definition Language for Conditional ACEs" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/security-descriptor-definition-language-for-conditional-aces-
"DACLs and ACEs" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/dacls-and-aces
"Order of ACEs in a DACL" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/order-of-aces-in-a-dacl
"ConvertFrom-SddlString" -> https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/convertfrom-sddlstring
"How AccessCheck Works" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/how-dacls-control-access-to-an-object
"C2-level Security" -> https://learn.microsoft.com/en-us/windows/win32/secauthz/c2-level-security
"STIG Viewer 3.x" -> https://public.cyber.mil/stigs/srg-stig-tools/
"NCP - National Checklist Program Checklist Repository - Windows Server 2022" -> https://ncp.nist.gov/repository?product=Microsoft+Windows+Server+2022
"Per-user services in Windows" -> https://learn.microsoft.com/en-us/windows/application-management/per-user-services-in-windows
"Guidance on disabling system services on Windows Server with Desktop Experience" -> https://learn.microsoft.com/en-us/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server

 

0 Replies