[SysPrepOC]
Component_Name=advpack.dll,LaunchINFSection,INF_FileName,SectionName
;or
Component_Name=setupapi.dll,InstallHinfSection,INF_FileName,SectionName
;;;example
Code: Select all
[SysPrepOC]
Unlocker=advpack.dll,LaunchINFSection,Unlocker.inf,Unlocker
Silverlight=setupapi.dll,InstallHinfSection,MSSlight.inf,Silverlight
[General]
;;;example
Code: Select all
[General]
BuildDate=2010-10-27T11:05:11Z
Description="Freeware tool which overcomes a Windows bug"
Language=English
Title=Unlocker
Version=1.9.0
WebSite=http://ccollomb.free.fr/unlocker/
processorArchitecture=x86 ; --> Warning: this key is used to force addon integration only in a certain system architecture; if present OS architecture is not the one defined in this key, DX WinNt6.x True Integrator skips the AddOn
ForceLang=Italiano ; --> Warning: this key is used to force addon integration only in a certain system language; if present OS language is not the one defined in this key, DX WinNt6.x True Integrator skips the AddOn
ReleaseType=True AddOn
Customizedby=OnePiece
Copyright=CEDRICK 'NITCH' COLLOMB
Company=CEDRICK 'NITCH' COLLOMB
InstallPackageName=Unlocker.inf
LastUpdateTime=2010-10-27T11:05:11Z
about Dirids:
http://msdn.microsoft.com/en-us/library ... 85%29.aspx
about Security Descriptor Definition Language to be used in [SecurityRegistry*Integration] and in [SecurityFiles*Integration]:
http://msdn.microsoft.com/en-us/library ... 85%29.aspx
http://msdn.microsoft.com/en-us/magazine/cc982153.aspx
http://blogs.technet.com/b/askds/archiv ... art-1.aspx
http://technet.microsoft.com/en-us/libr ... 12610.aspx
[SecurityRegistryBeforeIntegration]
;;;example
Code: Select all
[SecurityRegistryBeforeIntegration]
"CLASSES_ROOT\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"CURRENT_USER\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"CURRENT_USER\Software\Classes",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"MACHINE\SOFTWARE\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"MACHINE\SYSTEM\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"MACHINE\SECURITY\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"MACHINE\SAM\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"MACHINE\COMPONENTS\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\.DEFAULT\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\DefaultUsers\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
;;;example
Code: Select all
[SecurityRegistryAfterIntegration]
"USERS\S-1-5-18_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\SystemProfile_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-18\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\SystemProfile\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-19_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\LocalService_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-19\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\LocalService\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-20_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\NetworkService_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-20\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\NetworkService\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-21*_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\UserProfile_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\S-1-5-21*\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\UserProfile\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
"USERS\SMIStoreMachine\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"
Code: Select all
"%MountDir%\Windows\System32\config\SOFTWARE" = %KEY_SOFTWARE%
"%MountDir%\Windows\System32\config\SYSTEM" = %KEY_SYSTEM%
"%MountDir%\Windows\System32\config\SECURITY" = %KEY_SECURITY%
"%MountDir%\Windows\System32\config\SAM" = %KEY_SAM%
"%MountDir%\Windows\System32\config\COMPONENTS" = %KEY_COMPONENTS%
"%MountDir%\Windows\System32\config\DEFAULT" = %KEY_DEFAULT%
"%MountDir%\Users\default\ntuser.dat" = %KEY_NTUSER%
"%MountDir%\Windows\system32\smi\store\Machine\schema.dat" = %KEY_SCHEMA%
"%MountDir%\WINDOWS\system32\config\systemprofile\NTUSER.DAT" = %KEY_NTUSER_SP%
"%MountDir%\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_SP%
"%MountDir%\Windows\ServiceProfiles\LocalService\NTUSER.DAT" = %KEY_NTUSER_LS%
"%MountDir%\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_LS%
"%MountDir%\Windows\ServiceProfiles\NetworkService\NTUSER.DAT" = %KEY_NTUSER_NS%
"%MountDir%\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_NS%
"%MountDir%\Users\Administrator\NTUSER.DAT" = %KEY_NTUSER_ADMIN%
"%MountDir%\Users\Administrator\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_ADMIN%
[SecurityFilesBeforeIntegration]
;;;example
Code: Select all
[SecurityFilesBeforeIntegration]
%11%\FileName.exe,0,"D:P(A;;GA;;;BA)(A;;GR;;;SY)(A;;GR;;;BU)"
%PROGRAMDATA%,0,"D:PAI(A;;0x1200a9;;;SY)(A;OICIIO;GXGR;;;SY)(A;;FA;;;BA)(A;OICIIO;GA;;;BA)(A;;0x1200a9;;;BU)(A;OICIIO;GXGR;;;BU)"
%10%\regedit.exe,0,"D:P(A;CI;GR;;;LS)(A;CI;GR;;;BU)(A;CI;GR;;;PU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"
[SecurityFilesAfterIntegration]
;;;example
Code: Select all
[SecurityFilesAfterIntegration]
%11%\FileName.exe,0,"D:P(A;;GR;;;BA)(A;;GR;;;SY)(A;;GR;;;BU)"
%ALLUSERSPROFILE%,0,"D:P(A;CI;GR;;;BU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"
%16422%,0,"D:P(A;CI;GR;;;BU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"
[TweaksAddReg]
;;;example
Code: Select all
[TweaksAddReg]
HKLM, "%KEY_SOFTWARE%\ProgramName", "Test", %REG_SZ%, "Test....."
HKLM, "Test\Test2", "Test2", %REG_SZ%, "Test2....." [color=green];;;see example in [ProcessesToRun*Integration] where RegHive has been loaded in HKLM\Test[/color]
[TweaksDelReg]
;;;example
Code: Select all
[TweaksDelReg]
HKLM, "%KEY_SOFTWARE%\ProgramName"
SourceFiles = Directory where the addon has been extracted
MountDir = Directory where the image has been mounted Warning: %MountDir% is an optional variable, there's no need for it as MountDir is always DIRID 24 (Root directory of the system disk), so %24%\ is always mount directory destination
[ProcessesToRunBeforeIntegration]
;;;example
Code: Select all
[ProcessesToRunBeforeIntegration]
reg load HKLM\Test "%Mountdir%\Windows\System32\config\RegHive"
"%SourceFiles%\ResHacker.exe" -delete "%16422%\Internet Explorer\iexplore.exe", "%16422%\Internet Explorer\iexplore.exe", Icon,,
"%SourceFiles%\ResHacker.exe" -addoverwrite "%16422%\Internet Explorer\iexplore.exe", "%16422%\Internet Explorer\iexplore.exe", "%SourceFiles%\Icon.res",,,
"%SourceFiles%\ResHacker.exe" -delete "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%MountDir%\Program Files\Internet Explorer\iexplore.exe", Bitmap,,
"%SourceFiles%\ResHacker.exe" -addoverwrite "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%SourceFiles%\Bitmap.res",,,
[ProcessesToRunAfterIntegration]
;;;example
Code: Select all
[ProcessesToRunAfterIntegration]
reg unload HKLM\Test
"%SourceFiles%\ResHacker.exe" -delete "%MountDir%\windows\system32\FileName.exe", "%MountDir%\windows\system32\FileName.exe", Bitmap,,
"%SourceFiles%\ResHacker.exe" -addoverwrite "%MountDir%\windows\system32\FileName.exe", "%MountDir%\windows\system32\FileName.exe", "%SourceFiles%\Bitmap.res",,,
"%SourceFiles%\ResHacker.exe" -delete "%11%\FileName.exe", "%11%\FileName.exe", Icon,,
"%SourceFiles%\ResHacker.exe" -addoverwrite "%11%\FileName.exe", "%11%\FileName.exe", "%SourceFiles%\Icon.res",,,
1 = gives Admin permissions for a file or a directory
2 = when destination is a directory, gives Admin permission for all files and subdirectories of specified directory
3 = when destination is a directory, if it doesn't exist will be automatically created
[FilePermissionsBeforeIntegration]
;;;example
Code: Select all
[b][FilePermissionsBeforeIntegration][/b]
%10%\regedit.exe,1
%COMMONPROGRAMFILES%,1
%16426%\Filename.exe,1
[FilePermissionsAfterIntegration]
;;;example
Code: Select all
[FilePermissionsAfterIntegration]
%10%\test.exe,1
%PROGRAMFILES(X86)%,1
%16428%\Test,3
[AddProgram]
;;;example
Code: Select all
[AddProgram]
Filerefox.exe
[color=Green];or[/color]
install_flash_player.exe -install -force
"SetUp XXX.exe" /S
[String]
;;;example
Code: Select all
[Strings]
LANGNAME = "English"
LANGUAGE = "ENU"
MuiCultureDirectory = "en-US"
LangIdHex = "409"
Lang = "EN"
LCID = "0409"
UnlockerTip = "Freeware tool to overcome a Windows bug"
about International INF Files http://msdn.microsoft.com/en-us/library ... 85%29.aspx
Code: Select all
[Strings.0409]
LANGNAME = "English"
LANGUAGE = "ENU"
MuiCultureDirectory = "en-US"
LangIdHex = "409"
Lang = "EN"
LCID = "0409"
UnlockerTip = "Freeware tool to overcome a Windows bug"
[Strings.0410]
LANGNAME = "Italiano"
LANGUAGE = "ITA"
MuiCultureDirectory = "it-IT"
LangIdHex = "410"
Lang = "IT"
LCID = "0410"
UnlockerTip = "Strumento freeware per superare un bug di Windows"
Code: Select all
REG_SZ = 0x00000000
REG_EXPAND_SZ = 0x00020000
REG_DWORD = 0x00010001
REG_QWORD = 0x000B0001
REG_BINARY = 0x00000001
REG_MULTI_SZ = 0x00010000
REG_NONE = 0x00020001
REG_KEYONLY = 0x00000010
REG_KEYONLY_COMMON = 0x00002000
REG_UNKNOWN = 0x00030001
REG_NOCLOBBER = 0x00000002
REG_DELVAL = 0x00000004
REG_OVERWRITEONLY = 0x00000020
REG_APPEND = 0x00000008 ;Append a given value to that of an existing named value entry. This flag is valid only if FLG_ADDREG_TYPE_MULTI_SZ is also set. The specified string value is not appended if it already exists.
REG_64BITKEY = 0x00001000
REG_32BITKEY = 0x00004000
REG_SZ_64BITKEY = 0x00001000
REG_SZ_32BITKEY = 0x00004000
REG_SZ_NOCLOBBER = 0x00000002
REG_SZ_NOCLOBBER_64BITKEY = 0x00001002
REG_SZ_NOCLOBBER_32BITKEY = 0x00004002
REG_SZ_DELVAL = 0x00000004
REG_SZ_DELVAL_64BITKEY = 0x00001004
REG_SZ_DELVAL_32BITKEY = 0x00004004
REG_SZ_OVERWRITEONLY = 0x00000020
REG_SZ_OVERWRITEONLY_64BITKEY = 0x00001020
REG_SZ_OVERWRITEONLY_32BITKEY = 0x00004020
REG_EXPAND_SZ_64BITKEY = 0x00021000
REG_EXPAND_SZ_32BITKEY = 0x00024000
REG_EXPAND_SZ_NOCLOBBER = 0x00020002
REG_EXPAND_SZ_NOCLOBBER_64BITKEY = 0x00021002
REG_EXPAND_SZ_NOCLOBBER_32BITKEY = 0x00024002
REG_EXPAND_SZ_DELVAL = 0x00020004
REG_EXPAND_SZ_DELVAL_64BITKEY = 0x00021004
REG_EXPAND_SZ_DELVAL_32BITKEY = 0x00024004
REG_EXPAND_SZ_OVERWRITEONLY = 0x00020020
REG_EXPAND_SZ_OVERWRITEONLY_64BITKEY = 0x00021020
REG_EXPAND_SZ_OVERWRITEONLY_32BITKEY = 0x00024020
REG_DWORD_64BITKEY = 0x00011001
REG_DWORD_32BITKEY = 0x00014001
REG_DWORD_NOCLOBBER = 0x00010003
REG_DWORD_NOCLOBBER_64BITKEY = 0x00011003
REG_DWORD_NOCLOBBER_32BITKEY = 0x00014003
REG_DWORD_DELVAL = 0x00010005
REG_DWORD_DELVAL_64BITKEY = 0x00011005
REG_DWORD_DELVAL_32BITKEY = 0x00014005
REG_DWORD_OVERWRITEONLY = 0x00010021
REG_DWORD_OVERWRITEONLY_64BITKEY = 0x00011021
REG_DWORD_OVERWRITEONLY_32BITKEY = 0x00014021
REG_QWORD_64BITKEY = 0x000B1001
REG_QWORD_32BITKEY = 0x000B4001
REG_QWORD_NOCLOBBER = 0x000B0003
REG_QWORD_NOCLOBBER_64BITKEY = 0x000B1003
REG_QWORD_NOCLOBBER_32BITKEY = 0x000B4003
REG_QWORD_DELVAL = 0x000B0005
REG_QWORD_DELVAL_64BITKEY = 0x000B1005
REG_QWORD_DELVAL_32BITKEY = 0x000B4005
REG_QWORD_OVERWRITEONLY = 0x000B0021
REG_QWORD_OVERWRITEONLY_64BITKEY = 0x000B1021
REG_QWORD_OVERWRITEONLY_32BITKEY = 0x000B4021
REG_BINARY_64BITKEY = 0x00001001
REG_BINARY_32BITKEY = 0x00004001
REG_BINARY_NOCLOBBER = 0x00000003
REG_BINARY_NOCLOBBER_64BITKEY = 0x00001003
REG_BINARY_NOCLOBBER_32BITKEY = 0x00004003
REG_BINARY_DELVAL = 0x00000005
REG_BINARY_DELVAL_64BITKEY = 0x00001005
REG_BINARY_DELVAL_32BITKEY = 0x00004005
REG_BINARY_OVERWRITEONLY = 0x00000021
REG_BINARY_OVERWRITEONLY_64BITKEY = 0x00001021
REG_BINARY_OVERWRITEONLY_32BITKEY = 0x00004021
REG_MULTI_SZ_64BITKEY = 0x00011000
REG_MULTI_SZ_32BITKEY = 0x00014000
REG_MULTI_SZ_APPEND = 0x00010008
REG_MULTI_SZ_APPEND_64BITKEY = 0x00011008
REG_MULTI_SZ_APPEND_32BITKEY = 0x00014008
REG_MULTI_SZ_NOCLOBBER = 0x00010002
REG_MULTI_SZ_NOCLOBBER_64BITKEY = 0x00011002
REG_MULTI_SZ_NOCLOBBER_32BITKEY = 0x00014002
REG_MULTI_SZ_DELVAL = 0x00010004
REG_MULTI_SZ_DELVAL_64BITKEY = 0x00011004
REG_MULTI_SZ_DELVAL_32BITKEY = 0x00014004
REG_MULTI_SZ_OVERWRITEONLY = 0x00010020
REG_MULTI_SZ_OVERWRITEONLY_64BITKEY = 0x00011020
REG_MULTI_SZ_OVERWRITEONLY_32BITKEY = 0x00014020
REG_NONE_64BITKEY = 0x00021001
REG_NONE_32BITKEY = 0x00022001
REG_NONE_NOCLOBBER = 0x00020003
REG_NONE_NOCLOBBER_64BITKEY = 0x00021003
REG_NONE_NOCLOBBER_32BITKEY = 0x00024003
REG_NONE_DELVAL = 0x00020005
REG_NONE_DELVAL_64BITKEY = 0x00021005
REG_NONE_DELVAL_32BITKEY = 0x00024005
REG_NONE_OVERWRITEONLY = 0x00020021
REG_NONE_OVERWRITEONLY_64BITKEY = 0x00021021
REG_NONE_OVERWRITEONLY_32BITKEY = 0x00024021
REG_KEYONLY_64BITKEY = 0x00001010
REG_KEYONLY_32BITKEY = 0x00004010
REG_KEYONLY_NOCLOBBER = 0x00000012
REG_KEYONLY_NOCLOBBER_64BITKEY = 0x00001012
REG_KEYONLY_NOCLOBBER_32BITKEY = 0x00004012
REG_KEYONLY_DELVAL = 0x00000015
REG_KEYONLY_DELVAL_64BITKEY = 0x00001015
REG_KEYONLY_DELVAL_32BITKEY = 0x00004015
REG_KEYONLY_OVERWRITEONLY = 0x00000030
REG_KEYONLY_OVERWRITEONLY_64BITKEY = 0x00001030
REG_KEYONLY_OVERWRITEONLY_32BITKEY = 0x00004030
REG_KEYONLY_COMMON_64BITKEY = 0x00003000
REG_KEYONLY_COMMON_32BITKEY = 0x00006000
REG_KEYONLY_COMMON_NOCLOBBER = 0x00002002
REG_KEYONLY_COMMON_NOCLOBBER_64BITKEY = 0x00003002
REG_KEYONLY_COMMON_NOCLOBBER_32BITKEY = 0x00006002
REG_KEYONLY_COMMON_DELVAL = 0x00002005
REG_KEYONLY_COMMON_DELVAL_64BITKEY = 0x00003005
REG_KEYONLY_COMMON_DELVAL_32BITKEY = 0x00006005
REG_KEYONLY_COMMON_OVERWRITEONLY = 0x00002020
REG_KEYONLY_COMMON_OVERWRITEONLY_64BITKEY = 0x00003020
REG_KEYONLY_COMMON_OVERWRITEONLY_32BITKEY = 0x00006020
REG_UNKNOWN_64BITKEY = 0x00031001
REG_UNKNOWN_32BITKEY = 0x00032001
REG_UNKNOWN_NOCLOBBER = 0x00030003
REG_UNKNOWN_NOCLOBBER_64BITKEY = 0x00031003
REG_UNKNOWN_NOCLOBBER_32BITKEY = 0x00034003
REG_UNKNOWN_DELVAL = 0x00030005
REG_UNKNOWN_DELVAL_64BITKEY = 0x00031005
REG_UNKNOWN_DELVAL_32BITKEY = 0x00034005
REG_UNKNOWN_OVERWRITEONLY = 0x00030021
REG_UNKNOWN_OVERWRITEONLY_64BITKEY = 0x00031021
REG_UNKNOWN_OVERWRITEONLY_32BITKEY = 0x00034021
; ServiceType values
SERVICE_KERNEL_DRIVER = 0x00000001
SERVICE_FILE_SYSTEM_DRIVER = 0x00000002
SERVICE_ADAPTER = 0x00000004
SERVICE_RECOGNIZER_DRIVER = 0x00000008
SERVICE_WIN32_OWN_PROCESS = 0x00000010
SERVICE_WIN32_SHARE_PROCESS = 0x00000020
SERVICE_INTERACTIVE_PROCESS = 0x00000100
SERVICE_INTERACTIVE_SHARE_PROCESS = 0x00000120
; StartType values
SERVICE_BOOT_START = 0x00000000
SERVICE_SYSTEM_START = 0x00000001
SERVICE_AUTO_START = 0x00000002
SERVICE_DEMAND_START = 0x00000003
SERVICE_DISABLED = 0x00000004
; ErrorControl values
SERVICE_ERROR_IGNORE = 0x00000000
SERVICE_ERROR_NORMAL = 0x00000001
SERVICE_ERROR_SEVERE = 0x00000002
SERVICE_ERROR_CRITICAL = 0x00000003
SPSVCINST_TAGTOFRONT = 0x00000001
SPSVCINST_ASSOCSERVICE = 0x00000002
SPSVCINST_DELETEEVENTLOGENTRY = 0x00000004
SPSVCINST_NOCLOBBER_DISPLAYNAME = 0x00000008
SPSVCINST_NOCLOBBER_STARTTYPE = 0x00000010
SPSVCINST_NOCLOBBER_ERRORCONTROL = 0x00000020
SPSVCINST_NOCLOBBER_LOADORDERGROUP = 0x00000040
SPSVCINST_NOCLOBBER_DEPENDENCIES = 0x00000080
SPSVCINST_NOCLOBBER_DESCRIPTION = 0x00000100
COPYFLG_WARN_IF_SKIP = 0x00000001
COPYFLG_NOSKIP = 0x00000002
COPYFLG_NOVERSIONCHECK = 0x00000004
COPYFLG_FORCE_FILE_IN_USE = 0x00000008
COPYFLG_NO_OVERWRITE = 0x00000010
COPYFLG_NO_VERSION_DIALOG = 0x00000020
COPYFLG_OVERWRITE_OLDER_ONLY = 0x00000040
COPYFLG_REPLACEONLY = 0x00000400
COPYFLG_REPLACE_BOOT_FILE = 0x00001000
COPYFLG_NOPRUNE = 0x00002000
this is the integration sequence as executed by DX WinNT6.x True Integrator
1 [FilePermissionsBeforeIntegration]
2 [SecurityFilesBeforeIntegration]
3 [ProcessesToRunBeforeIntegration]
4 [SecurityRegistryBeforeIntegration]
5 Offline Install Execution (installs addon AddOn)
6 [TweaksAddReg]
7 [TweaksDelReg]
8 [SecurityRegistryAfterIntegration]
9 [ProcessesToRunAfterIntegration]
10 [SecurityFilesBeforeIntegration]
11 [FilePermissionsAfterIntegration]