Recently in an XP upgrade to Win7 project, after the client upgrade Win7 installation of operating system initialization when there is an error
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/8B/EC/wKioL1hcz-OT9T1BAAEJT6skwv0809.jpg "title=" 17 (2). JPG "width=" "height=" 451 "border=" 0 "hspace=" 0 "vspace=" 0 "style=" width:600px;height:451px; "alt=" Wkiol1hcz-ot9t1baaejt6skwv0809.jpg "/>
Because the client used to crawl the WIM file is used by the customer before, there will be some spam (account and configuration file), only in the Computer Management before the capture of the account delete (only delete the account without clearing the configuration file) but the registry will still have account information, At this point, if you remove the registry information again with the client to re-grab the package will be more troublesome, there is an easy way to share to everyone
What we're using is that ADK8.0 comes with the command line. ImageX command, first we open the ADK command line
650) this.width=650; "src=" http://s2.51cto.com/wyfs02/M01/8B/EC/wKioL1hc0IHgVIDWAACFSTFahc8195.jpg "title=" 1.jpg " alt= "Wkiol1hc0ihgvidwaacfstfahc8195.jpg"/>
Enter imagex/mountrw "Existing WIM file path" 1 C:\Mount(1 indicates that the WIM file contains only a basic image to determine the number in your WIM file can be viewed using imagex/info )
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/8B/EC/wKioL1hc0QbQN9bYAACDkQiPQng489.jpg "style=" width : 660px;height:458px; "title=" 2.jpg "width=" 660 "height=" 458 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiol1hc0qbqn9byaacdkqipqng489.jpg "/>
When Mount finishes, we can see that the contents of the C:\Mount folder are the files of the C packing directory of the client that grabbed the packet.
650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M00/8B/F0/wKiom1hc0QeDt3CVAAENhOdQgtc259.jpg "style=" width : 660px;height:485px; "title=" 3.jpg "width=" 660 "height=" 485 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiom1hc0qedt3cvaaenhodqgtc259.jpg "/>
Show hidden files
650) this.width=650; "src=" http://s1.51cto.com/wyfs02/M00/8B/EC/wKioL1hc0QezM3dLAADJegq4rZE654.jpg "style=" float: none; "title=" 4.jpg "alt=" Wkiol1hc0qezm3dlaadjegq4rze654.jpg "/>
Open the registry and navigate to HKEY_LOCAL_MACHINE
650) this.width=650; "src=" http://s1.51cto.com/wyfs02/M01/8B/F0/wKiom1hc0QjDDsfNAAA_USBhdBA595.jpg "style=" float: none; "title=" 5.jpg "alt=" Wkiom1hc0qjddsfnaaa_usbhdba595.jpg "/>
Click on the file, " Load Hive "
650) this.width=650; "src=" http://s2.51cto.com/wyfs02/M00/8B/F0/wKiom1hc0QjTDWU3AAA5GfXMpsk802.jpg "style=" float: none; "title=" 6.jpg "alt=" Wkiom1hc0qjtdwu3aaa5gfxmpsk802.jpg "/>
Select c:\mount\Windows\system32\config\software file
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M00/8B/EC/wKioL1hc0QmzQ3HZAAEovutkERY552.jpg "style=" width : 660px;height:423px; "title=" 7.jpg "width=" 660 "height=" 423 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiol1hc0qmzq3hzaaeovutkery552.jpg "/>
Name the c:\mount\Windows\system32\config\software file
650) this.width=650; "src=" http://s2.51cto.com/wyfs02/M01/8B/EC/wKioL1hc0QmwIFx4AAA_n5xELds763.jpg "style=" float: none; "title=" 8.jpg "alt=" Wkiol1hc0qmwifx4aaa_n5xelds763.jpg "/>
Navigate to Hkey_local_machine\123\microsoft\windows\currentversion\group Policy , preserving the SID of the Administrator, All others are deleted (Win7 The SID end of administrator is-500, other versions please self-proofread)
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/8B/F0/wKiom1hc0QrSItQ3AAFi8z_6T-I960.jpg "style=" width : 660px;height:452px; "title=" 9.jpg "width=" 660 "height=" 452 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiom1hc0qrsitq3aafi8z_6t-i960.jpg "/>
650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/8B/EC/wKioL1hc0QqBaztaAABaTZTut-8074.jpg "style=" width : 660px;height:267px; "title=" 10.jpg "width=" 660 "height=" 267 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiol1hc0qqbaztaaabatztut-8074.jpg "/>
Results are displayed after deletion
650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M02/8B/F0/wKiom1hc0QvTdbTmAAEVlqkwUi4286.jpg "style=" width : 660px;height:440px; "title=" 11.jpg "width=" 660 "height=" "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiom1hc0qvtdbtmaaevlqkwui4286.jpg "/>
Also navigate to hkey_local_machine\123\microsoft\windowsnt\currentversion\profilelist , delete other SIDs
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/8B/F0/wKiom1hc0QzwuAvaAAGeTYnjnpM992.jpg "style=" width : 660px;height:443px; "title=" 12.jpg "width=" 660 "height=" 443 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiom1hc0qzwuavaaagetynjnpm992.jpg "/>
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/8B/EC/wKioL1hc0Q2AXqlsAAFeEeWE5lc089.jpg "style=" width : 660px;height:443px; "title=" 13.jpg "width=" 660 "height=" 443 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiol1hc0q2axqlsaafeeewe5lc089.jpg "/>
Select File " Unload Hive "
650) this.width=650; "src=" http://s5.51cto.com/wyfs02/M02/8B/EC/wKioL1hc0Q3ipFAEAAA3jW93hIk576.jpg "style=" float: none; "title=" 14.jpg "alt=" Wkiol1hc0q3ipfaeaaa3jw93hik576.jpg "/>
Open the ADK command line, enter imagex/unmount C:\Mount, and so on 100% when the c:\mount folder is empty, the change is complete
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/8B/EC/wKioL1hc0Q7w0cDhAACo_4IrhpQ443.jpg "style=" width : 660px;height:244px; "title=" 16.jpg "width=" 660 "height=" 244 "border=" 0 "hspace=" 0 "vspace=" 0 "alt=" Wkiol1hc0q7w0cdhaaco_4irhpq443.jpg "/>
To change the registry additional information, please load the corresponding registry file
When you run IMAGEX/MOUNTRW again, first use Imagex/cleaup to clear the original mount information.
After the query, the cause of this problem is many (ie settings, other software settings, spam accounts), the problem encountered in this article is caused by the spam account, specific reasons need to be specific analysis, this article only for the removal of spam accounts effective
This article is from the "Little PUI Technical Notes" blog, please be sure to keep this source http://caobei.blog.51cto.com/7335197/1885551
Windows cannot parse or process the unattended answer file for pass ...