This is for users who want to perform manual activation. If you need help with a tool for you to do this, then check here.
We can divide the manual activation process into two parts.
1 - From a ready-made batch file
- Make sure the internet is enabled.
- Open Windows Powershell as an administrator and enter the following to list the commands in the order they are given.
- Enter the key, (replace with the key from the list above) using the following command
<key></key>
slmgr /ipk < ;key>
- Download the universal ticket from here and extract the downloaded file.
- Now enter the following code in Powershell
(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\ProductOptions).OSProductPfn
- This command will show you some text like
Microsoft.Windows.48.X19-98841_8wekyb3d8bbwe
- You need to find the ticket file with the exact same name in the folder you had before extracted.
- Copy the ticket file and paste it into the following folder
C:\ProgramData\Microsoft\Windows\ClipSVC\GenuineTicket
- Now in Powershell Run the following command to apply the ticket
clipup -v -o
- Activate the window using the following command
slmgr /ato
- Check the activation status using the following command
slmgr /xpr
- Complete
2 - Start from scratch
During this process we will perform activation from scratch. This is based on the universal ticket approach. Here we will create the same ticket used in the MAS HWID script and activate the system using it.
- Download the file from the official MS link below and unzip the .cab file.
https://download.microsoft.com/download/9/A/E/9AE69DD5-BA93-44E0-864E-180F5E700AB4/adk/Installers/14f4df8a2a7fc82a4f415cf6a341415d.cab - Find the named file and install Rename it to
filf8377e82b29deadca67bc4858ed3fba9
gatherosstate.exe
- Create a folder named after the C drive and copy the files in that folder.
Files
C:\Files
gatherosstate.exe
- Make sure the Internet is enabled.
- Open Windows Powershell as an administrator and enter the following to list the commands in the order they are given.
- Enter the key, (replace with the key from the list above) using the following command
<key></key>
slmgr /ipk < ;key>
- Copy the following code one at a time and enter it into PowerShell to modify the file. This code modification file is based on GamersOsState.
gatherosstate.exe
$bytes= [System.IO.File]::ReadAllBytes("C:\Files\gatherosstate.exe")$bytes[320] = 0xf8$bytes[321] = 0xfb$bytes[322] = 0x05$bytes[324] = 0x03$bytes[13672] = 0x25$bytes[13674] = 0x73$bytes[13676] = 0x3b$bytes[13678] = 0x00$bytes[13680] = 0x00$bytes[13682] = 0x00$bytes[13684] = 0x00$bytes[32748] = 0xe9$bytes[32749] = 0x9e$bytes[32750] = 0x00$bytes[32751] = 0x00$bytes[32752] = 0x00$bytes[32894] = 0x8b$bytes[32895] = 0x44$bytes[32897] = 0x64$bytes[32898] = 0x85$bytes[32899] = 0xc0$bytes[32900] = 0x0f$bytes[32901] = 0x85$bytes[32902] = 0x1c$bytes[32903] = 0x02$bytes[32904] = 0x00$bytes[32906] = 0xe9$bytes[32907] = 0x3c$bytes[32908] = 0x01$bytes[32909] = 0x00$bytes[32910] = 0x00$bytes[32911] = 0x85$bytes[32912] = 0xdb$bytes[32913] = 0x75$bytes[32914] = 0xeb$bytes[32915] = 0xe9$bytes[32916] = 0x69$bytes[32917] = 0xff$bytes[32918] = 0xff$bytes[32919] = 0xff$bytes[33094] = 0xe9$bytes[33095] = 0x80$bytes[33096] = 0x00$bytes[33097] = 0x00$bytes[33098] = 0x00$bytes[33449] = 0x64$bytes[33576] = 0x8d$bytes[33577] = 0x54$bytes[33579] = 0x24$bytes[33580] = 0xe9$bytes[33581] = 0x55$bytes[33582] = 0x01$bytes[33583] = 0x00$bytes[33584] = 0x00$bytes[33978] = 0xc3$bytes[34189] = 0x59$bytes[34190] = 0xeb$bytes[34191] = 0x28$bytes[34238] = 0xe9$bytes[34239] = 0x4f$bytes[34240] = 0x00$bytes[34241] = 0x00$bytes[34242] = 0x00$bytes[34346] = 0x24$bytes[34376] = 0xeb$bytes[34377] = 0x63[System.IO.File]::WriteAllBytes("C:\Files\gatherosstatemodified.exe", $bytes)
- Now right click on the file and go to properties and set compatibility to Windows XP SP3.
gatherosstatemodified.exe
- Now we need to generate a ticket, for this enter the following command.
$value = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\ProductOptions).OSProductPfnC:\Files\gatherosstatemodified.exe /c Pfn=$value`;PKeyIID=465145217131314304264339481117862266242033457260311819664735280
- A GenuineTicket.xml file should now be created in the folder, let’s apply it.
C:\Files\
##clipup -v -o -altto C:\Files\
- Use the following command Activation window
slmgr /ato
- Check the activation status using the following command
slmgr /xpr
- Complete
Notes:
- If the system has been activated, the ticket created will be A lockbox ticket, if not then it will be an underlying ticket.
- To make the exact ticket used in the MAS HWID script, make sure the system is activated and use the following power shell repair time command and then start the ticket generation process as mentioned above.
-
Set-TimeZone -Id "UTC"; $date=[datetime]"2022/10/11 12:00";while($true){set-date $date; start-sleep -milliseconds 10 }
The above is the detailed content of HWID V 2.2 manual activation methods and tutorials. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

Dreamweaver Mac version
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software