I have finally done a new one. Extract the .zip to somewhere with a short path, e.g. c:\parpev18 https://www.dropbox.com/s/bd188ucb9ml0v33/PARPE-v18.zip Then rt click and run as admin on Run-me-as-admin.cmd. Works on 7 and newer, 32 and 64 bit. Also works on Vista ( think it works on xp - untested). note: Vista and Xp users need 2 things; 1) MStools ( only about 12 mb which it will download for you ) 2) Bootable wim file. You can supply your own - copy boot.wim or winre.wim from Vista or newer installation media into the parpev18 folder, right next to run-me-as-admin.cmd. Then rt click and run as admin on the cmd file. OR if you don't supply the bootable wim, it will download it for you from MS.
I believe that has happened before with your software but my current and new antivirus software detects your latest download as infected with Pua.Downloadmr.Gen.
SIW2, I've been a bit busy lately, only now have I noticed your new Aomei and Paragon PE makers (or are there even more?). I'm looking forward to testing them, your scripts/ batches are very "educational" and interesting, I always learn a lot from them. So thanks again, and I hope you'll continue your work!!
in I'm using Webroot and discovered a bit more. Webroot which I've had for couple of months is much different than most other AVs and doesn't or suggest using a full scan which can take hours. I did one anyway and that's when it caught your zip file. A quick or deep scan doesn't catch it but only a full scan or a scan of the file itself will. It could very well be a false positive. I also recovered the previous version of your zip file that I deleted and it detected it as well. I just unzipped it and Webroot hits on "booticex64.exe" and blocked the file from being written to the folder. I can scan the folder then without that file being there and get no hits. ***EDIT*** I turned in a support ticket with Webroot, within five minutes they replied that it was a false positive and they have updated their security list.