{"id":1757,"date":"2016-12-09T01:46:00","date_gmt":"2016-12-09T00:46:00","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=1757"},"modified":"2022-06-23T20:58:11","modified_gmt":"2022-06-23T18:58:11","slug":"activate-build-in-administrator-account-in-windows-ii","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2016\/12\/09\/activate-build-in-administrator-account-in-windows-ii\/","title":{"rendered":"Activate Build-in Administrator account in Windows &#8211; II"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"http:\/\/www.borncity.com\/blog\/2013\/01\/26\/vom-windows-administratorkonto-ausgesperrt-ii\/\">German<\/a>]In <a href=\"https:\/\/borncity.com\/win\/?p=1747\">part 1<\/a> I've shown, how to activate the Windows build-in account \"Administrator\" using registry editor within Windows PE. In case that doesn't fit, you can also use the approach discussed below, to activate the administrator account and repair Windows.<\/p>\n<p><!--more--><\/p>\n<p>Again: This 'how to' shall work in Windows 7, Windows 8.1 and Windows 10 (and its corresponding Server versions).<\/p>\n<blockquote><p>Note: This is not a guide to hack third party computer systems, because this is illegal. I won't introduce password cracker therefor. The how to is just a \"last resort to avoid a Windows re-install, in case admin rights are lost\".<\/p><\/blockquote>\n<h3>Enable build-in Administrator account<\/h3>\n<p>If the registry hack shown in <a href=\"http:\/\/www.borncity.com\/blog\/2013\/01\/26\/vom-windows-administratorkonto-ausgesperrt-ii\/\">part 1<\/a> is to complicated, use the steps outlined below to activate the build-in Administrator account.<\/p>\n<p>1. Boot your machine with Windows RE (use a setup DVD or a system repair disk) and open command prompt window (<a href=\"https:\/\/web.archive.org\/web\/20210425151046\/https:\/\/www.sevenforums.com\/tutorials\/682-command-prompt-startup.html\" target=\"_blank\" rel=\"noopener\">see<\/a>).<\/p>\n<p>2. Rename the files <em>cmd.exe <\/em>and <em>magnify.exe <\/em>within the command prompt windows using the command given below.<\/p>\n<blockquote><p>The only difficulty is to locate the logical drive for your Windows installation. Drive X: is the RAM disk with Windows PE. I invoke Windows editor using the command <em>notepad.exe. <\/em>Then I I select <em>File \u2013 Open <\/em>and use the <em>Open <\/em>dialog box as a mini file manager to identify my Windows drive number.<\/p><\/blockquote>\n<p>After I know the drive letter for Windows, I use the following command within my command prompt window:<\/p>\n<p>C:<\/p>\n<p>The letter C: stands here for the Windows drive. The we can use the following commands within the command prompt window, to rename <em>cmd.exe <\/em>and <em>magnify.exe<\/em>.<\/p>\n<p><em>CD Windows\\system32<br \/>\n<\/em><em>ren cmd.exe cmd.old<br \/>\n<\/em><em>ren magnify.exe cmd.exe<br \/>\n<\/em><em>ren cmd.old magnify.exe<\/em><\/p>\n<p>The command sequence exchange magnifier with Windows command processor <em>cmd.exe<\/em>. Then you can remove the boot media and restart the machine, to boot Windows again.<\/p>\n<blockquote><p>In case of doubt, the steps are also discussed for Windows 7 at sevenforums.com within <a href=\"https:\/\/web.archive.org\/web\/20210417115336\/https:\/\/www.sevenforums.com\/tutorials\/56864-user-account-password-change-winre.html\">this tutorial<\/a>. The trick works also in Windows 8, 8.1 and 10.<\/p><\/blockquote>\n<h3>Enable the Administrator account<\/h3>\n<p>After booting Windows successful, it's mandatory, to enable the build-in <em>Administrator<\/em> account.<\/p>\n<p>1. Click to the Accessibility button shown in the lower left of your login screen (below is a Windows 8 login screen shown, but Windows 7, Windows 8.1 and Windows 10 comes with a Accessibility button too).<\/p>\n<p>2. Select the command\u00a0 <em>Magnifier <\/em>(German <em>Bildschirmlupe<\/em>) shown within the open menu.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Login screen\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2014\/04\/Login01.jpg\" alt=\"Login screen\" width=\"630\" height=\"377\" \/><\/p>\n<p>Because we have exchanges <em>cmd.exe <\/em>and magnifier.exe during our rename operation, the <em>Magnifier <\/em>menu entry opens the command prompt windows. And within this command prompt windows we have administrative user rights.<\/p>\n<p>3. Now enter the commands given below to activate the build-in Administrator account:<\/p>\n<p><em>net user administrator \/active:yes<\/em><\/p>\n<p>Press &lt;enter&gt; to execute the command, remove the boot media and reboot your machine. After successful loading the installed Windows, the login screen shall show also the account <em>Administrator<\/em>. The account <em>Administrator <\/em>doesn't has a password by default.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Login screen\" src=\"https:\/\/web.archive.org\/web\/20191010205316\/http:\/\/c04.imgup.net\/Login025a42.jpg\" alt=\"Login screen\" width=\"640\" height=\"382\" \/><\/p>\n<p>Login to the new account <em>Administrator<\/em> &#8211; the account <em>Administrator <\/em>doesn't has a password by default.<\/p>\n<ul>\n<li>Go to control panel (or <em>settings <\/em>app in Windows 10) and try to reset the password of the broken admin account.<\/li>\n<li>If you have uses a Microsoft account, try to use <em>settings <\/em>to change the account to a local account.<\/li>\n<li>If the profile is damaged, create a 2nd administrator account, log of, and log into the 2nd admin account. Test whether user account control is working now.<\/li>\n<li>To reset a user profile, backup all user files, delete the user's account \u2013 let Windows delete all user account files &#8211; and create a new local account, using the same name and the same group (default users or administrator). Restore your user files from backup.<\/li>\n<\/ul>\n<p>After repair, test your default accounts and your administrator account. If everything works well, log into the repaired administrator account. Open an administrative command prompt (Run as administrator) and enter the following command.<\/p>\n<p><em>net user administrator \/active:no<\/em><\/p>\n<p>This command disables the build-in account <em>Administrator<\/em>. Then boot again into Windows PE, open command prompt windows and exchange the files <em>cmd.exe <\/em>and <em>magnifier.exe<\/em> using the commands below.<\/p>\n<p><em>C:<br \/>\n<\/em><em>CD Windows\\system32<br \/>\n<\/em><em>ren magnify.exe cmd.old<br \/>\n<\/em><em>ren cmd.exe magnify.exe<br \/>\n<\/em><em>ren cmd.old cmd.exe<br \/>\n<\/em><em>exit<\/em><\/p>\n<p>Again C stands for the Windows system drive. After renaming both files in a proper order, the Accessibility menu command <em>Magnifier <\/em>should launch the magnifier again. Remove the boot media, reboot the machine and test, whether your repair was successful.<\/p>\n<p>Tomorrow I will cover an issue, where Windows reports a\u00a0file system error (-1073741819) and UAC doesn't work anymore.<\/p>\n<h2>Addendum: The renaming hack won't work anymore<\/h2>\n<p>I've mentioned within my article\u00a0<a href=\"https:\/\/borncity.com\/win\/2018\/09\/08\/windows-defender-reports-osk-exe-as-malware\/\" rel=\"bookmark\">Windows Defender reports osk.exe as malware<\/a>, that Windows Defender reports manipulated system files (for instance a cmd.exe to <em>utilman.exe<\/em> or <em>magnify.exe\u00a0<\/em>and blocks it for security reasons).<\/p>\n<p><strong>Articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/?p=1747\">Activate Build-in Administrator account in Windows<\/a> &#8211; I<br \/>\n<a href=\"https:\/\/borncity.com\/win\/?p=1757\">Activate Build-in Administrator account in Windows<\/a> \u2013 II<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/win10-wiki\/\">Win10 Wiki<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210512202711\/https:\/\/borncity.com\/win\/2016\/07\/06\/windows10-open-command-prompt-window-as-administrator\/\">Windows 10: Open command prompt window as administrator<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2016\/07\/08\/check-and-repair-windows-system-files-and-component-store\/\">Check and repair Windows system files and component store<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]In part 1 I've shown, how to activate the Windows build-in account \"Administrator\" using registry editor within Windows PE. In case that doesn't fit, you can also use the approach discussed below, to activate the administrator account and repair Windows.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[267,30,194],"class_list":["post-1757","post","type-post","status-publish","format-standard","hentry","category-windows","tag-administrator","tag-tip","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/1757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/1757\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=1757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=1757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}