ExplorerPatcher, the beloved UI-tweaking application for Windows 11, has rolled out a significant update, version 22621.4317.67.1, now accessible on GitHub. This latest iteration addresses several critical issues that have been affecting users, particularly those related to the Win X menu and Start menu functionality.
Changelog Highlights
The official changelog outlines the enhancements and fixes implemented in this update:
- Taskbar10: The Win+X shortcut is once again operational on builds 226xx.4317 and above.
- Start10: Resolved an issue where the resource loader malfunctioned when the boot drive was not designated as C:.
- Start10: Fixed crashes occurring in the Start menu when accessing context menus for items with jump list entries on builds 226xx.4391 and 261xx.2130.
- ep_taskbar: Improved handling of “Not responding” windows.
- ep_taskbar: Taskbar items now feature animated flashing.
- ep_taskbar: The Narrator now provides descriptions for the “Show desktop” button.
- ep_taskbar: The TrayUI class is now available for export.
- Localization: Added Portuguese (Brazil) translations.
Users can download ExplorerPatcher directly from its GitHub repository. However, it’s important to be aware that Windows Defender and various antivirus programs may flag the application. The executable download often triggers Windows Defender to automatically delete the file. The developer attributes this behavior not to any infection but rather to what they describe as “Microsoft’s disdain for this software.”
Earlier this year, Microsoft initiated measures against ExplorerPatcher and similar UI customization tools by restricting their functionality in Windows 11 version 24H2. As developers have sought ways to circumvent these restrictions, Microsoft has reportedly begun labeling them as malware, a claim made by the developer that raises eyebrows.
For those encountering false positives with Windows Defender, the developer suggests adding specific paths to the exclusion list:
- C:Program FilesExplorerPatcher
- %APPDATA%ExplorerPatcher
- C:Windowsdxgi.dll
- C:WindowsSystemAppsMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy
- C:WindowsSystemAppsShellExperienceHost_cw5n1h2txyewy
Windows Defender users can implement the following PowerShell script to add these exclusions:
Add-MpPreference -ExclusionPath "C:Program FilesExplorerPatcher" Add-MpPreference -ExclusionPath "$env:APPDATAExplorerPatcher" Add-MpPreference -ExclusionPath "C:Windowsdxgi.dll" Add-MpPreference -ExclusionPath "C:WindowsSystemAppsMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy" Add-MpPreference -ExclusionPath "C:WindowsSystemAppsShellExperienceHost_cw5n1h2txyewy"
For further details regarding ExplorerPatcher and its interactions with antivirus software, additional information is available through the developer’s resources.