#!/usr/bin/env python
# coding: utf-8

# In[1]:



ps_content=r'''
Get-appxpackage -allusers SpotifyAB.SpotifyMusic | Remove-AppxPackage;
Get-appxpackage -allusers king.com.CandyCrushFriends | Remove-AppxPackage;
Get-appxpackage -allusers king.com.CandyCrushSaga | Remove-AppxPackage;
Get-appxpackage -allusers Microsoft.Wallet | Remove-AppxPackage;
Get-AppxPackage -AllUsers | Select Name > C:\Windows\Temp\log.txt;
'''

import os

def ecmd(command):
    import ctypes
    from subprocess import PIPE, Popen
    
    class disable_file_system_redirection:
        _disable = ctypes.windll.kernel32.Wow64DisableWow64FsRedirection
        _revert = ctypes.windll.kernel32.Wow64RevertWow64FsRedirection
        def __enter__(self):
            self.old_value = ctypes.c_long()
            self.success = self._disable(ctypes.byref(self.old_value))
        def __exit__(self, type, value, traceback):
            if self.success:
                self._revert(self.old_value)
    
    with disable_file_system_redirection():
        obj = Popen(command, shell = True, stdout = PIPE, stderr = PIPE)
    out, err = obj.communicate()
    ret=obj.returncode
    if ret==0:
        if out:
            return out.strip()
        else:
            return ret
    else:
        if err:
            return err.strip()
        else:
            return ret

file_name='powershell_file.ps1'
file_path=os.path.join(os.environ['TEMP'], file_name)
with open(file_path, 'wb') as wr:
    wr.write(ps_content)

ecmd('powershell "Set-ExecutionPolicy RemoteSigned"')
print ecmd('powershell "%s"'%file_path)
print("Log file are saved in C:\Windows\Temp\log.txt")
os.remove(file_path)


# In[ ]:




