massgrave.dev/ias.ps1

30 lines
1.2 KiB
PowerShell
Raw Normal View History

2023-11-29 17:07:26 +01:00
# Check the instructions here on how to use it https://massgrave.dev/idm-activation-script
2023-08-10 00:52:29 +02:00
$ErrorActionPreference = "Stop"
# Enable TLSv1.2 for compatibility with older clients
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
$DownloadURL = 'https://raw.githubusercontent.com/WindowsAddict/IDM-Activation-Script/main/IAS.cmd'
2023-11-29 17:07:26 +01:00
$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/idm-activation-script/raw/main/IAS.cmd'
2023-08-10 00:52:29 +02:00
2023-11-29 17:07:26 +01:00
$rand = Get-Random -Maximum 99999999
2023-08-10 00:52:29 +02:00
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\IAS_$rand.cmd" } else { "$env:TEMP\IAS_$rand.cmd" }
2023-11-29 17:07:26 +01:00
try {
$response = Invoke-WebRequest -Uri $DownloadURL -UseBasicParsing
}
catch {
$response = Invoke-WebRequest -Uri $DownloadURL2 -UseBasicParsing
}
2023-08-10 00:52:29 +02:00
$ScriptArgs = "$args "
$prefix = "@REM $rand `r`n"
$content = $prefix + $response
Set-Content -Path $FilePath -Value $content
Start-Process $FilePath $ScriptArgs -Wait
$FilePaths = @("$env:TEMP\IAS*.cmd", "$env:SystemRoot\Temp\IAS*.cmd")
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }