From 206944eb4cb4b2e2e4eb8df34ddd309ebf20a222 Mon Sep 17 00:00:00 2001 From: Bing Sun Date: Sun, 4 Sep 2016 14:05:35 +0800 Subject: [PATCH] cure the 360se tampered clsid --- hik.bat | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/hik.bat b/hik.bat index 981a99f..67c52e0 100644 --- a/hik.bat +++ b/hik.bat @@ -1,8 +1,17 @@ if exist %WinDir%\SysWOW64\mshta.exe ( set MSHTA=%WinDir%\SysWOW64\mshta.exe +set IE="%ProgramFiles(x86)%\Internet Explorer\iexplore.exe" +set CLSROOT=Wow6432Node\CLSID ) else ( set MSHTA=mshta +set IE="%ProgramFiles%\Internet Explorer\iexplore.exe" +set CLSROOT=CLSID ) +REM register the protocol reg add HKCR\hik /v "URL Protocol" /f reg add HKCR\hik\shell\open\command /d "%MSHTA% \"javascript:open('%1'.replace('hik:',''),'ÏÔʾ´°¿Ú','height=600,width=650,location=no,menubar=no,resizable=yes');close()\"" /f + +REM force IE in case that 360se has taken over the control +REM HKCR is the merged view of HKLM\Software\Classes and HKCU\Software\Classes +reg add HKCU\Software\Classes\%CLSROOT%\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 /d %IE% /f