This is for users who want to perform manual activation. If you need help with a tool for you to do this, then check here.
We can divide the manual activation process into two parts.
1 - From a ready-made batch file
- Make sure the internet is enabled.
- Open Windows Powershell as an administrator and enter the following to list the commands in the order they are given.
- Enter the key, (replace with the key from the list above) using the following command
<key></key>
slmgr /ipk < ;key>
- Download the universal ticket from here and extract the downloaded file.
- Now enter the following code in Powershell
(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\ProductOptions).OSProductPfn
- This command will show you some text like
Microsoft.Windows.48.X19-98841_8wekyb3d8bbwe
- You need to find the ticket file with the exact same name in the folder you had before extracted.
- Copy the ticket file and paste it into the following folder
C:\ProgramData\Microsoft\Windows\ClipSVC\GenuineTicket
- Now in Powershell Run the following command to apply the ticket
clipup -v -o
- Activate the window using the following command
slmgr /ato
- Check the activation status using the following command
slmgr /xpr
- Complete
2 - Start from scratch
During this process we will perform activation from scratch. This is based on the universal ticket approach. Here we will create the same ticket used in the MAS HWID script and activate the system using it.
- Download the file from the official MS link below and unzip the .cab file.
https://download.microsoft.com/download/9/A/E/9AE69DD5-BA93-44E0-864E-180F5E700AB4/adk/Installers/14f4df8a2a7fc82a4f415cf6a341415d.cab - Find the named file and install Rename it to
filf8377e82b29deadca67bc4858ed3fba9
gatherosstate.exe
- Create a folder named after the C drive and copy the files in that folder.
Files
C:\Files
gatherosstate.exe
- Make sure the Internet is enabled.
- Open Windows Powershell as an administrator and enter the following to list the commands in the order they are given.
- Enter the key, (replace with the key from the list above) using the following command
<key></key>
slmgr /ipk < ;key>
- Copy the following code one at a time and enter it into PowerShell to modify the file. This code modification file is based on GamersOsState.
gatherosstate.exe
$bytes= [System.IO.File]::ReadAllBytes("C:\Files\gatherosstate.exe")$bytes[320] = 0xf8$bytes[321] = 0xfb$bytes[322] = 0x05$bytes[324] = 0x03$bytes[13672] = 0x25$bytes[13674] = 0x73$bytes[13676] = 0x3b$bytes[13678] = 0x00$bytes[13680] = 0x00$bytes[13682] = 0x00$bytes[13684] = 0x00$bytes[32748] = 0xe9$bytes[32749] = 0x9e$bytes[32750] = 0x00$bytes[32751] = 0x00$bytes[32752] = 0x00$bytes[32894] = 0x8b$bytes[32895] = 0x44$bytes[32897] = 0x64$bytes[32898] = 0x85$bytes[32899] = 0xc0$bytes[32900] = 0x0f$bytes[32901] = 0x85$bytes[32902] = 0x1c$bytes[32903] = 0x02$bytes[32904] = 0x00$bytes[32906] = 0xe9$bytes[32907] = 0x3c$bytes[32908] = 0x01$bytes[32909] = 0x00$bytes[32910] = 0x00$bytes[32911] = 0x85$bytes[32912] = 0xdb$bytes[32913] = 0x75$bytes[32914] = 0xeb$bytes[32915] = 0xe9$bytes[32916] = 0x69$bytes[32917] = 0xff$bytes[32918] = 0xff$bytes[32919] = 0xff$bytes[33094] = 0xe9$bytes[33095] = 0x80$bytes[33096] = 0x00$bytes[33097] = 0x00$bytes[33098] = 0x00$bytes[33449] = 0x64$bytes[33576] = 0x8d$bytes[33577] = 0x54$bytes[33579] = 0x24$bytes[33580] = 0xe9$bytes[33581] = 0x55$bytes[33582] = 0x01$bytes[33583] = 0x00$bytes[33584] = 0x00$bytes[33978] = 0xc3$bytes[34189] = 0x59$bytes[34190] = 0xeb$bytes[34191] = 0x28$bytes[34238] = 0xe9$bytes[34239] = 0x4f$bytes[34240] = 0x00$bytes[34241] = 0x00$bytes[34242] = 0x00$bytes[34346] = 0x24$bytes[34376] = 0xeb$bytes[34377] = 0x63[System.IO.File]::WriteAllBytes("C:\Files\gatherosstatemodified.exe", $bytes)
- Now right click on the file and go to properties and set compatibility to Windows XP SP3.
gatherosstatemodified.exe
- Now we need to generate a ticket, for this enter the following command.
$value = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\ProductOptions).OSProductPfnC:\Files\gatherosstatemodified.exe /c Pfn=$value`;PKeyIID=465145217131314304264339481117862266242033457260311819664735280
- A GenuineTicket.xml file should now be created in the folder, let’s apply it.
C:\Files\
##clipup -v -o -altto C:\Files\
- Use the following command Activation window
slmgr /ato
- Check the activation status using the following command
slmgr /xpr
- Complete
Notes:
- If the system has been activated, the ticket created will be A lockbox ticket, if not then it will be an underlying ticket.
- To make the exact ticket used in the MAS HWID script, make sure the system is activated and use the following power shell repair time command and then start the ticket generation process as mentioned above.
-
Set-TimeZone -Id "UTC"; $date=[datetime]"2022/10/11 12:00";while($true){set-date $date; start-sleep -milliseconds 10 }
The above is the detailed content of HWID V 2.2 manual activation methods and tutorials. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.