30 lines
1.2 KiB
PowerShell
30 lines
1.2 KiB
PowerShell
|
# Check the instructions here on how to use it https://massgrave.dev/idm-activation-script
|
||
|
|
||
|
$ErrorActionPreference = "Stop"
|
||
|
# Enable TLSv1.2 for compatibility with older clients
|
||
|
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
|
||
|
|
||
|
$DownloadURL = 'https://raw.githubusercontent.com/WindowsAddict/IDM-Activation-Script/main/IAS.cmd'
|
||
|
$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/idm-activation-script/raw/main/IAS.cmd'
|
||
|
|
||
|
$rand = Get-Random -Maximum 99999999
|
||
|
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
||
|
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\IAS_$rand.cmd" } else { "$env:TEMP\IAS_$rand.cmd" }
|
||
|
|
||
|
try {
|
||
|
$response = Invoke-WebRequest -Uri $DownloadURL -UseBasicParsing
|
||
|
}
|
||
|
catch {
|
||
|
$response = Invoke-WebRequest -Uri $DownloadURL2 -UseBasicParsing
|
||
|
}
|
||
|
|
||
|
$ScriptArgs = "$args "
|
||
|
$prefix = "@REM $rand `r`n"
|
||
|
$content = $prefix + $response
|
||
|
Set-Content -Path $FilePath -Value $content
|
||
|
|
||
|
Start-Process $FilePath $ScriptArgs -Wait
|
||
|
|
||
|
$FilePaths = @("$env:TEMP\IAS*.cmd", "$env:SystemRoot\Temp\IAS*.cmd")
|
||
|
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|