2023-11-29 23:07:26 +07:00
|
|
|
# Check the instructions here on how to use it https://massgrave.dev/idm-activation-script
|
|
|
|
|
2023-08-10 05:52:29 +07:00
|
|
|
$ErrorActionPreference = "Stop"
|
|
|
|
# Enable TLSv1.2 for compatibility with older clients
|
|
|
|
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
|
|
|
|
|
|
|
|
$DownloadURL = 'https://raw.githubusercontent.com/WindowsAddict/IDM-Activation-Script/main/IAS.cmd'
|
2023-11-29 23:07:26 +07:00
|
|
|
$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/idm-activation-script/raw/main/IAS.cmd'
|
2023-08-10 05:52:29 +07:00
|
|
|
|
2023-11-29 23:07:26 +07:00
|
|
|
$rand = Get-Random -Maximum 99999999
|
2023-08-10 05:52:29 +07:00
|
|
|
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
|
|
|
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\IAS_$rand.cmd" } else { "$env:TEMP\IAS_$rand.cmd" }
|
|
|
|
|
2023-11-29 23:07:26 +07:00
|
|
|
try {
|
|
|
|
$response = Invoke-WebRequest -Uri $DownloadURL -UseBasicParsing
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
$response = Invoke-WebRequest -Uri $DownloadURL2 -UseBasicParsing
|
|
|
|
}
|
2023-08-10 05:52:29 +07:00
|
|
|
|
|
|
|
$ScriptArgs = "$args "
|
|
|
|
$prefix = "@REM $rand `r`n"
|
|
|
|
$content = $prefix + $response
|
|
|
|
Set-Content -Path $FilePath -Value $content
|
|
|
|
|
|
|
|
Start-Process $FilePath $ScriptArgs -Wait
|
|
|
|
|
|
|
|
$FilePaths = @("$env:TEMP\IAS*.cmd", "$env:SystemRoot\Temp\IAS*.cmd")
|
|
|
|
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|