Skip to content

Instantly share code, notes, and snippets.

@mark05e
Last active April 22, 2025 14:17
Show Gist options
  • Save mark05e/2db81671f39a041a5992a64a77748dc7 to your computer and use it in GitHub Desktop.
Save mark05e/2db81671f39a041a5992a64a77748dc7 to your computer and use it in GitHub Desktop.
# ██████╗ ███████╗███╗ ███╗ ██████╗ ██╗ ██╗███████╗ ██╗ ██╗██████╗
# ██╔══██╗██╔════╝████╗ ████║██╔═══██╗██║ ██║██╔════╝ ██║ ██║██╔══██╗
# ██████╔╝█████╗ ██╔████╔██║██║ ██║██║ ██║█████╗ ███████║██████╔╝
# ██╔══██╗██╔══╝ ██║╚██╔╝██║██║ ██║╚██╗ ██╔╝██╔══╝ ██╔══██║██╔═══╝
# ██║ ██║███████╗██║ ╚═╝ ██║╚██████╔╝ ╚████╔╝ ███████╗ ██║ ██║██║
# ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝ ╚═══╝ ╚══════╝ ╚═╝ ╚═╝╚═╝
#
# ██████╗ ██╗ ██████╗ █████╗ ████████╗██╗ ██╗ █████╗ ██████╗ ███████╗
# ██╔══██╗██║ ██╔═══██╗██╔══██╗╚══██╔══╝██║ ██║██╔══██╗██╔══██╗██╔════╝
# ██████╔╝██║ ██║ ██║███████║ ██║ ██║ █╗ ██║███████║██████╔╝█████╗
# ██╔══██╗██║ ██║ ██║██╔══██║ ██║ ██║███╗██║██╔══██║██╔══██╗██╔══╝
# ██████╔╝███████╗╚██████╔╝██║ ██║ ██║ ╚███╔███╔╝██║ ██║██║ ██║███████╗
# ╚═════╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝
#
# ██████╗ ███████╗████████╗ █████╗
# ██╔══██╗██╔════╝╚══██╔══╝██╔══██╗
# ██████╔╝█████╗ ██║ ███████║
# ██╔══██╗██╔══╝ ██║ ██╔══██║
# ██████╔╝███████╗ ██║ ██║ ██║
# ╚═════╝ ╚══════╝ ╚═╝ ╚═╝ ╚═╝
#
# Remove HP bloatware / crapware - BETA version
#
# -- source : https://gist.github.com/mark05e/a79221b4245962a477a49eb281d97388
# -- contrib: francishagyard2, mark05E, erottier, JoachimBerghmans, sikkepitje, Ithendyr
# -- note : this script could use your improvements. contributions welcome!
# List of built-in apps to remove
$UninstallPackages = @(
"AD2F1837.HPJumpStarts"
"AD2F1837.HPPCHardwareDiagnosticsWindows"
"AD2F1837.HPPowerManager"
"AD2F1837.HPPrivacySettings"
"AD2F1837.HPSupportAssistant"
"AD2F1837.HPSureShieldAI"
"AD2F1837.HPSystemInformation"
"AD2F1837.HPQuickDrop"
"AD2F1837.HPWorkWell"
"AD2F1837.myHP"
"AD2F1837.HPDesktopSupportUtilities"
"AD2F1837.HPQuickTouch"
"AD2F1837.HPEasyClean"
"AD2F1837.HPSystemInformation"
)
# List of programs to uninstall
$UninstallPrograms = @(
"HP Device Access Manager"
"HP Client Security Manager"
"HP Connection Optimizer"
"HP Documentation"
"HP MAC Address Manager"
"HP Notifications"
"HP System Info HSA Service"
"HP Security Update Service"
"HP System Default Settings"
"HP Sure Click"
"HP Sure Click Security Browser"
"HP Sure Run"
"HP Sure Run Module"
"HP Sure Recover"
"HP Sure Sense"
"HP Sure Sense Installer"
"HP Wolf Security"
"HP Wolf Security - Console"
"HP Wolf Security Application Support for Sure Sense"
"HP Wolf Security Application Support for Windows"
)
$HPidentifier = "AD2F1837"
$InstalledPackages = Get-AppxPackage -AllUsers `
| Where-Object {($UninstallPackages -contains $_.Name) -or ($_.Name -match "^$HPidentifier")}
$ProvisionedPackages = Get-AppxProvisionedPackage -Online `
| Where-Object {($UninstallPackages -contains $_.DisplayName) -or ($_.DisplayName -match "^$HPidentifier")}
$InstalledPrograms = Get-Package | Where-Object {$UninstallPrograms -contains $_.Name}
# Stop HP Services
Function StopDisableService($name) {
if (Get-Service -Name $name -ea SilentlyContinue) {
Stop-Service -Name $name -Force -Confirm:$False
Set-Service -Name $name -StartupType Disabled
}
}
StopDisableService -name "HotKeyServiceUWP"
StopDisableService -name "HPAppHelperCap"
StopDisableService -name "HP Comm Recover"
StopDisableService -name "HPDiagsCap"
StopDisableService -name "HotKeyServiceUWP"
StopDisableService -name "LanWlanWwanSwitchgingServiceUWP" # do we need to stop this?
StopDisableService -name "HPNetworkCap"
StopDisableService -name "HPSysInfoCap"
StopDisableService -name "HP TechPulse Core"
# Remove installed programs
$InstalledPrograms | ForEach-Object {
Write-Host -Object "Attempting to uninstall: [$($_.Name)]..."
Try {
$Null = $_ | Uninstall-Package -AllVersions -Force -ErrorAction Stop
Write-Host -Object "Successfully uninstalled: [$($_.Name)]"
}
Catch {
Write-Warning -Message "Failed to uninstall: [$($_.Name)]"
Write-Host -Object "Attempting to uninstall as MSI package: [$($_.Name)]..."
Try {
$product = Get-WmiObject win32_product | where { $_.name -like "$($_.Name)" }
if ($_ -ne $null) {
msiexec /x $product.IdentifyingNumber /quiet /noreboot
}
else { Write-Warning -Message "Can't find MSI package: [$($_.Name)]" }
}
Catch { Write-Warning -Message "Failed to uninstall MSI package: [$($_.Name)]" }
}
}
# Fallback attempt 1 to remove HP Wolf Security using msiexec
Try {
MsiExec /x "{0E2E04B0-9EDD-11EB-B38C-10604B96B11E}" /qn /norestart
Write-Host -Object "Fallback to MSI uninistall for HP Wolf Security initiated"
}
Catch {
Write-Warning -Object "Failed to uninstall HP Wolf Security using MSI - Error message: $($_.Exception.Message)"
}
# Fallback attempt 2 to remove HP Wolf Security using msiexec
Try {
MsiExec /x "{4DA839F0-72CF-11EC-B247-3863BB3CB5A8}" /qn /norestart
Write-Host -Object "Fallback to MSI uninistall for HP Wolf 2 Security initiated"
}
Catch {
Write-Warning -Object "Failed to uninstall HP Wolf Security 2 using MSI - Error message: $($_.Exception.Message)"
}
# Remove appx provisioned packages - AppxProvisionedPackage
ForEach ($ProvPackage in $ProvisionedPackages) {
Write-Host -Object "Attempting to remove provisioned package: [$($ProvPackage.DisplayName)]..."
Try {
$Null = Remove-AppxProvisionedPackage -PackageName $ProvPackage.PackageName -Online -ErrorAction Stop
Write-Host -Object "Successfully removed provisioned package: [$($ProvPackage.DisplayName)]"
}
Catch {Write-Warning -Message "Failed to remove provisioned package: [$($ProvPackage.DisplayName)]"}
}
# Remove appx packages - AppxPackage
ForEach ($AppxPackage in $InstalledPackages) {
Write-Host -Object "Attempting to remove Appx package: [$($AppxPackage.Name)]..."
Try {
$Null = Remove-AppxPackage -Package $AppxPackage.PackageFullName -AllUsers -ErrorAction Stop
Write-Host -Object "Successfully removed Appx package: [$($AppxPackage.Name)]"
}
Catch {Write-Warning -Message "Failed to remove Appx package: [$($AppxPackage.Name)]"}
}
# # Uncomment this section to see what is left behind
# Write-Host "Checking stuff after running script"
# Write-Host "For Get-AppxPackage -AllUsers"
# Get-AppxPackage -AllUsers | where {$_.Name -like "*HP*"}
# Write-Host "For Get-AppxProvisionedPackage -Online"
# Get-AppxProvisionedPackage -Online | where {$_.DisplayName -like "*HP*"}
# Write-Host "For Get-Package"
# Get-Package | select Name, FastPackageReference, ProviderName, Summary | Where {$_.Name -like "*HP*"} | Format-List
# # Feature - Ask for reboot after running the script
# $input = Read-Host "Restart computer now [y/n]"
# switch($input){
# y{Restart-computer -Force -Confirm:$false}
# n{exit}
# default{write-warning "Skipping reboot."}
# }
@frogzoid
Copy link

can someone explain how to get this working current day in one message?
i'm super overwhelmed and paranoid of breaking my computer

@Jordinthecloud
Copy link

I agree, this is an absolute mess and not usable.

@kmt7br6
Copy link

kmt7br6 commented Feb 27, 2025

can someone explain how to get this working current day in one message? i'm super overwhelmed and paranoid of breaking my computer
I agree, this is an absolute mess and not usable.

where are you guys failing? I run this code (or at least something based on it) from intunes on all my managed devices (+100) and our users don't even know it's happening

The only part that keeps breaking after a while for me is the stupid HP Wolf Security software

@Jordinthecloud
Copy link

Jordinthecloud commented Feb 27, 2025

Well, I see comments from 2022, how do I know if the script in the first post is golden?

eg. The comment from 13th september isn't incorporated in the first post.

@kmt7br6
Copy link

kmt7br6 commented Feb 27, 2025

most of the original script is just about uninstalling a "store app" or "msi"
The list of apps that's available in the first post is what you will need to check/adapt/update
(for ex. I added some additional microsoft apps to the list)

A lot of the replies i see here, are additions to the original script.
Or are related to specific issues users have encountered.
(i did not scroll trough the entire history)

@ll4mat
Copy link

ll4mat commented Apr 1, 2025

Hi @mark05e,

thank you for the great starting point - I've forked and quite heavily modified your script to accommodate additional use cases in enterprise environments.

Key extensions I made:

  • Added granular parameterization for selective removal (e.g. -RemoveHotKeyService, -RemoveOtherServices, -RemoveM365Apps, etc.)
  • Implemented full DryRun support
  • Added / Reworked Microsoft 365 removal logic using ODT (setup.exe + UninstallOffice.xml) with fallback for OneNoteFreeRetail via OfficeClickToRun.exe
  • Added registry-based cleanup for leftover Click-to-Run apps
  • Modularized everything into dedicated functions for easier maintenance
  • Extended documentation and logging (incl. usage examples, parameter help, error handling)

My updated version is available here if others find it useful:
https://gist.github.com/ll4mat/c1bbe8dc096a207680df29931cffed21

Thanks again to all contributors for your solid groundwork - it saved me a lot of time!

@Ar5had07
Copy link

Hi @mark05e,

thank you for the great starting point - I've forked and quite heavily modified your script to accommodate additional use cases in enterprise environments.

Key extensions I made:

  • Added granular parameterization for selective removal (e.g. -RemoveHotKeyService, -RemoveOtherServices, -RemoveM365Apps, etc.)
  • Implemented full DryRun support
  • Added / Reworked Microsoft 365 removal logic using ODT (setup.exe + UninstallOffice.xml) with fallback for OneNoteFreeRetail via OfficeClickToRun.exe
  • Added registry-based cleanup for leftover Click-to-Run apps
  • Modularized everything into dedicated functions for easier maintenance
  • Extended documentation and logging (incl. usage examples, parameter help, error handling)

My updated version is available here if others find it useful: https://gist.github.com/ll4mat/c1bbe8dc096a207680df29931cffed21

Thanks again to all contributors for your solid groundwork - it saved me a lot of time!

I tried it during Autopilot, it didn't remove anything. It prompted for incorrect usage of MSI pop up and carried on. All HP stuff are still present.

image

@Ar5had07
Copy link

@mark05e @mark05e getting this MSI pop up during uninstallation - there is no logging, so I can't see what's happening.

image

@Jordinthecloud
Copy link

Jordinthecloud commented Apr 20, 2025

Hi @mark05e,
thank you for the great starting point - I've forked and quite heavily modified your script to accommodate additional use cases in enterprise environments.
Key extensions I made:

  • Added granular parameterization for selective removal (e.g. -RemoveHotKeyService, -RemoveOtherServices, -RemoveM365Apps, etc.)
  • Implemented full DryRun support
  • Added / Reworked Microsoft 365 removal logic using ODT (setup.exe + UninstallOffice.xml) with fallback for OneNoteFreeRetail via OfficeClickToRun.exe
  • Added registry-based cleanup for leftover Click-to-Run apps
  • Modularized everything into dedicated functions for easier maintenance
  • Extended documentation and logging (incl. usage examples, parameter help, error handling)

My updated version is available here if others find it useful: https://gist.github.com/ll4mat/c1bbe8dc096a207680df29931cffed21
Thanks again to all contributors for your solid groundwork - it saved me a lot of time!

I tried it during Autopilot, it didn't remove anything. It prompted for incorrect usage of MSI pop up and carried on. All HP stuff are still present.

image

Same thing here. Did you find a solution?

@mark05e @mark05e getting this MSI pop up during uninstallation - there is no logging, so I can't see what's happening.

image

Same thing as well, I never managed to remove HP Wolf with this script because of the always changing GUIDs

@Ar5had07
Copy link

Ar5had07 commented Apr 20, 2025

Hi @mark05e,
thank you for the great starting point - I've forked and quite heavily modified your script to accommodate additional use cases in enterprise environments.
Key extensions I made:

  • Added granular parameterization for selective removal (e.g. -RemoveHotKeyService, -RemoveOtherServices, -RemoveM365Apps, etc.)
  • Implemented full DryRun support
  • Added / Reworked Microsoft 365 removal logic using ODT (setup.exe + UninstallOffice.xml) with fallback for OneNoteFreeRetail via OfficeClickToRun.exe
  • Added registry-based cleanup for leftover Click-to-Run apps
  • Modularized everything into dedicated functions for easier maintenance
  • Extended documentation and logging (incl. usage examples, parameter help, error handling)

My updated version is available here if others find it useful: https://gist.github.com/ll4mat/c1bbe8dc096a207680df29931cffed21
Thanks again to all contributors for your solid groundwork - it saved me a lot of time!

I tried it during Autopilot, it didn't remove anything. It prompted for incorrect usage of MSI pop up and carried on. All HP stuff are still present.
image

Same thing here. Did you find a solution?

@mark05e @mark05e getting this MSI pop up during uninstallation - there is no logging, so I can't see what's happening.
image

Same thing as well, I never managed to remove HP Wolf with this script because of the always changing GUIDs

I ended using this script instead - so far uninstalled all HP bloats except 'HP Performance Advisor'. I will add it to the script.

https://github.com/andrew-s-taylor/public/blob/main/De-Bloat/RemoveBloat.ps1

@ll4mat
Copy link

ll4mat commented Apr 22, 2025

@Ar5had07 @Jordinthecloud

Since you are quoting my forked and significantly modified script here, I don't quite understand why you are addressing mark05e?

Regarding the error in the MSI arguments...
I have now adjusted the corresponding function (HP Wolf Fallback) in my fork, especially since I didn't like having to work with hardcoded GUIDs and blindly trying "msiexec /x {GUID} /qn /norestart" anyway.

The output of the MSI itself is now also logged to "C:\Windows\Temp\HPWolfUninstall_.log". Maybe you would like to try again.
I can't really test it at the moment - due to the lack of a suitable system.

Or jeah... use the version from @andrew-s-taylor linked above.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment