Solved Is this file malicious?

Parkinsond

Level 54
Thread author
Verified
Well-known
Dec 6, 2023
4,389
11,442
5,269
This script is detected only by Kaspersky; the rest of major vendors didn't flag it as malicious?
Should I use it?
2025-05-09_21-26-48.png
 
If even one reputable antivirus flags a file as malicious, it's better to err on the side of caution and not use it. It's possible that other vendors haven't updated their database yet.
 
  • Like
Reactions: Parkinsond
If you downloaded it from the official site (which I won't link as some might say it's piracy), it's completely safe. I'll recommend you to use PowerShell command from the official site instead of running the script manually. You'll get the latest version and always from official source.

Before anyone starts arguing: script is 100% open source, well documented where it explains how it works and what it does. Microsoft is also well aware of the script and their support agents use it, as it was reported by the media.
 
Last edited:
If you downloaded it from the official site (which I won't link as some might say it's piracy), it's completely safe. I'll recommend you to use PowerShell command from the official site instead running the script manually.
It's from the officialy site directly.
It was surprised by K action; it's well-known of being permissive for cracks!
 
  • Like
Reactions: Marko :)
Cracks allowed when they don't harm the system, but this is different... and probably soon that script will be detected by additional antivirus firms...
 
Cracks allowed when they don't harm the system, but this is different... and probably soon that script will be detected by additional antivirus firms...
I'm repeating the check by virustotal daily waiting for that; seems the rest of vendors are still in hibernation.
 
Cracks allowed when they don't harm the system, but this is different... and probably soon that script will be detected by additional antivirus firms...
This isn't even a crack. This is a script that's taking advantage of Microsoft's own activation system and activates Windows using generic keys Microsoft themselves published on their website. It simply fools Microsoft activation servers by using installation ID of genuine key to obtain a digital license, and does everything without any 3rd party component.

If you don't trust the script, they wrote a guide how to do it manually:
1.png 2.png

The script was first released in 2015, not long since Windows 10 was released. Ever since the first version came out, it is hosted on GitHub (owned by Microsoft), Azure DevOps (owned by Microsoft) and their own, self-hosted git. Heck, even Copilot recommended you to activate Windows this way. 🤣

Antivirus didn't detect it for 10 years, why would they suddenly started detecting it now? It's not like it's very unpopular tool. Pretty much everyone I know is using it.
I'm repeating the check by virustotal daily waiting for that; seems the rest of vendors are still in hibernation.
Don't worry, they aren't hibernating. They simply have no reason to detect clean and safe script. It doesn't do anything your Windows installation doesn't do during and after installation. Though, I'd expect Microsoft to flag it as malicious, but even they don't want to do that. So much... about piracy.
 
Last edited:
This isn't even a crack. This is a script that's taking advantage of Microsoft's own activation system and activates Windows using generic keys Microsoft themselves published on their website. It simply fools Microsoft activation servers by using installation ID of genuine key to obtain a digital license, and does everything without any 3rd party component.

If you don't trust the script, they wrote a guide how to do it manually:
View attachment 288504 View attachment 288505

The script was first released in 2015, not long since Windows 10 was released. Ever since the first version it is hosted on Github, Azure DevOps and their own, self-hosted git. Heck, even Copilot recommended you to activate Windows this way. 🤣

Antivirus didn't detect it for 10 years, why would they suddenly started detecting it now? It's not like it's very unpopular tool. Pretty much everyone I know is using it.

Don't worry, they aren't hibernating. They simply have no reason to detect clean and safe script. It doesn't do anything your Windows installation doesn't do during and after installation.
So it can be considered as a false positive by Kaspersky?
 
If you report it as FP, probably They won't change the verdict, I already found a similar situation not so long with a different risktool, and They did not change the verdict, so probably it's not an FP.
 
This script is detected only by Kaspersky; the rest of major vendors didn't flag it as malicious?
Should I use it?View attachment 288502
It bit my arm!

Then again Møøse once bit my sister

Wi nøt trei a høliday in Sweden this yer?

See the løveli lakes

The wonderful telephøne system

And mani interesting furry animals?

We apologise for the fault in this post. Those people responsible who wrote this post have been sacked.
 
  • HaHa
Reactions: Jonny Quest
So it can be considered as a false positive by Kaspersky?
Completely.

Judging by the "threat" name, I'd say Kaspersky is bothered by KMS activation script (no one uses today). Though, activating Windows through KMS is also completely legal. They even created a guide how to create your own KMS (Key Management Service) server.

You could try reporting it to Kaspersky, but I doubt they'll care enough to mark the script safe.
It only hacks Microsoft
It certainly doesn't do that. The way it works is script contacts Microsoft's servers saying "Hey! I have a totally legit key I totally bought in a totally real shop. Can I get a digital license?" and Microsoft's servers reply "I don't care where you got it, and how you got it, here's your permanent digital license you asked for". *boom* your Windows has 100% legit digital license. 🤷‍♂️
 
Last edited:
  • HaHa
Reactions: Parkinsond
Completely.

Judging by the "threat" name, I'd say Kaspersky is bothered by KMS activation script (no one uses today). Though, activating Windows through KMS is also completely legal. They even created a guide how to create your own KMS (Key Management Service) server.

You could try reporting it to Kaspersky, but I doubt they'll care enough to mark the script safe.

It certainly doesn't do that. The way it works is script contacts Microsoft servers saying "Hey! I have a totally legit key I totally bought in a real shop. Can I get a digital license?" and Microsoft's servers reply "I don't care where you got it, and how you got it, here's your permanent digital license you asked for". *boom* your Windows has 100% legit digital license. 🤷‍♂️
Microsoft don't care because it want Windows to be the predominant OS worldwide; revenue comes from corporate sector
 
Microsoft don't care because it want Windows to be the predominant OS worldwide; revenue comes from corporate sector
Exactly! I mean, they are still earning money on users by including ads, sponsored apps and telemetry. You're paying for Windows by using it. Bleeping Computer asked Microsoft about their support agents using MAS for activating troubled systems and they said it's totally against their policy and won't happen again. They still refuse to take the code down from their servers though. 😂

 
  • HaHa
Reactions: Parkinsond
Exactly! I mean, they are still earning money on users by including ads, sponsored apps and telemetry. You're paying for Windows by using it. Bleeping Computer asked Microsoft about their support agents using MAS for activating troubled systems and they said it's totally against their policy and won't happen again. They still refuse to take the code down from their servers though. 😂

For home sector, they get their money from your data, just as Google
 
  • Like
Reactions: Marko :)
This must be a rather new signature on this tool by Kaspersky. This one never in its existence as far as I can remember was detected by Kaspersky. Even ESET whose PUA (not PUP) detection is quite aggressive doesn't detect this.
As mentioned by @Marko :) you should use the PowerShell command instead. BTW, I even used this tool to change my Windows edition from Pro to Enterprise because only in editions like Enterprise and Education, the group policy to disable start menu's recommend section works 🤷‍♂️
 
This must be a rather new signature on this tool by Kaspersky. This one never in its existence as far as I can remember was detected by Kaspersky. Even ESET whose PUA (not PUP) detection is quite aggressive doesn't detect this.
As mentioned by @Marko :) you should use the PowerShell command instead. BTW, I even used this tool to change my Windows edition from Pro to Enterprise because only in editions like Enterprise and Education, the group policy to disable start menu's recommend section works 🤷‍♂️
After starting to use IoT LTSC versions, I didn't come back to Pro, or even Ent
 
This script is detected only by Kaspersky; the rest of major vendors didn't flag it as malicious?
Should I use it?View attachment 288502
Stop pirating software.

Someone here once used a similar activation script and it turned out to be ransomware.

Open the script in Notepad, then copy-pasta the code into Co-Pilot and ask it what the script does.