summaryrefslogtreecommitdiff
path: root/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
diff options
context:
space:
mode:
authorWindowsAddict2024-07-13 20:59:11 +0000
committerWindowsAddict2024-07-13 20:59:11 +0000
commit211835666b600793330f7895471acb14d0c2f576 (patch)
treecde3a52ef91eb2f332be16c1f4099f5feca32976 /MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
parentbdb9875a6baf64321fb6789faf13f648c2a7854a (diff)
downloadMicrosoft-Activation-Scripts-211835666b600793330f7895471acb14d0c2f576.zip
Separate label for malware check
To also call it at the start
Diffstat (limited to 'MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd')
-rw-r--r--MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd16
1 files changed, 11 insertions, 5 deletions
diff --git a/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd b/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
index 6f330e2..0465429 100644
--- a/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
+++ b/MAS/Separate-Files-Version/Activators/KMS38_Activation.cmd
@@ -352,6 +352,7 @@ title KMS38 Activation %masver%
echo:
echo Initializing...
+call :dk_chkmal
if exist "%SystemRoot%\Servicing\Packages\Microsoft-Windows-Server*CorEdition~*.mum" if not exist "%SysPath%\clipup.exe" set a_cor=1
if not exist %SysPath%\sppsvc.exe (set _fmiss=sppsvc.exe)
@@ -486,7 +487,7 @@ if defined altkey (set key=%altkey%&set changekey=1)
set /a UBR=0
if %osSKU%==191 if defined altkey if defined altedition (
for /f "skip=2 tokens=2*" %%a in ('reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v UBR %nul6%') do if not errorlevel 1 set /a UBR=%%b
-if %winbuild% GEQ 19044 if !UBR! LSS 2788 (
+if %winbuild% LSS 22598 if !UBR! LSS 2788 (
call :dk_color %Blue% "Windows must to be updated to build 19044.2788 or higher for IotEnterpriseS KMS38 activation."
)
)
@@ -1195,14 +1196,13 @@ exit /b
::========================================================================================================================================
-:dk_errorcheck
-
-set w=
-set showfix=
+:dk_chkmal
:: Many users unknowingly download mal-ware by using activators found through Google search.
:: This code aims to notify users that their system has been affected by mal-ware.
+set w=
+set results=
if exist "%ProgramFiles%\KM%w%Spico" set pupfound1= KM%w%Spico
if exist "%SysPath%\Tasks\R@1n-KMS" set pupfound2= R@inKMS
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\taskcache\tasks" /f Path /s | find /i "AutoPico" %nul% && set pupfound1= KM%w%Spico
@@ -1233,9 +1233,15 @@ set fixes=%fixes% %mas%remove_mal%w%ware
call :dk_color2 %Blue% "Help - " %_Yellow% " %mas%remove_mal%w%ware"
echo:
)
+exit /b
::========================================================================================================================================
+:dk_errorcheck
+
+set showfix=
+call :dk_chkmal
+
:: Check corrupt services
set serv_cor=