mirror of
https://github.com/massgravel/Microsoft-Activation-Scripts.git
synced 2024-11-21 22:32:40 +01:00
Remove update registry check in malware detection
This commit is contained in:
parent
1f0e04519a
commit
d76b2ea57e
5 changed files with 0 additions and 45 deletions
|
@ -1311,15 +1311,6 @@ for %%# in (avira.com kaspersky.com virustotal.com mcafee.com) do (
|
||||||
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
||||||
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
||||||
|
|
||||||
set wucount=0
|
|
||||||
for %%# in (wuauserv) do (
|
|
||||||
set _corrupt=
|
|
||||||
for %%G in (DependOnService Description DisplayName ErrorControl ImagePath ObjectName Start Type) do if not defined _corrupt (
|
|
||||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\%%# /v %%G %nul% || (set _corrupt=1 & set /a wucount+=1)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
if %wucount% GEQ 1 set "results=%results%[Windows Update registry is corrupt]"
|
|
||||||
|
|
||||||
sc start sppsvc %nul%
|
sc start sppsvc %nul%
|
||||||
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
||||||
set "results=%results%[Likely File Infector]"
|
set "results=%results%[Likely File Infector]"
|
||||||
|
|
|
@ -1074,15 +1074,6 @@ for %%# in (avira.com kaspersky.com virustotal.com mcafee.com) do (
|
||||||
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
||||||
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
||||||
|
|
||||||
set wucount=0
|
|
||||||
for %%# in (wuauserv) do (
|
|
||||||
set _corrupt=
|
|
||||||
for %%G in (DependOnService Description DisplayName ErrorControl ImagePath ObjectName Start Type) do if not defined _corrupt (
|
|
||||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\%%# /v %%G %nul% || (set _corrupt=1 & set /a wucount+=1)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
if %wucount% GEQ 1 set "results=%results%[Windows Update registry is corrupt]"
|
|
||||||
|
|
||||||
sc start sppsvc %nul%
|
sc start sppsvc %nul%
|
||||||
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
||||||
set "results=%results%[Likely File Infector]"
|
set "results=%results%[Likely File Infector]"
|
||||||
|
|
|
@ -1228,15 +1228,6 @@ for %%# in (avira.com kaspersky.com virustotal.com mcafee.com) do (
|
||||||
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
||||||
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
||||||
|
|
||||||
set wucount=0
|
|
||||||
for %%# in (wuauserv) do (
|
|
||||||
set _corrupt=
|
|
||||||
for %%G in (DependOnService Description DisplayName ErrorControl ImagePath ObjectName Start Type) do if not defined _corrupt (
|
|
||||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\%%# /v %%G %nul% || (set _corrupt=1 & set /a wucount+=1)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
if %wucount% GEQ 1 set "results=%results%[Windows Update registry is corrupt]"
|
|
||||||
|
|
||||||
sc start sppsvc %nul%
|
sc start sppsvc %nul%
|
||||||
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
||||||
set "results=%results%[Likely File Infector]"
|
set "results=%results%[Likely File Infector]"
|
||||||
|
|
|
@ -1554,15 +1554,6 @@ for %%# in (avira.com kaspersky.com virustotal.com mcafee.com) do (
|
||||||
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
||||||
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
||||||
|
|
||||||
set wucount=0
|
|
||||||
for %%# in (wuauserv) do (
|
|
||||||
set _corrupt=
|
|
||||||
for %%G in (DependOnService Description DisplayName ErrorControl ImagePath ObjectName Start Type) do if not defined _corrupt (
|
|
||||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\%%# /v %%G %nul% || (set _corrupt=1 & set /a wucount+=1)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
if %wucount% GEQ 1 set "results=%results%[Windows Update registry is corrupt]"
|
|
||||||
|
|
||||||
sc start sppsvc %nul%
|
sc start sppsvc %nul%
|
||||||
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
||||||
set "results=%results%[Likely File Infector]"
|
set "results=%results%[Likely File Infector]"
|
||||||
|
|
|
@ -2640,15 +2640,6 @@ for %%# in (avira.com kaspersky.com virustotal.com mcafee.com) do (
|
||||||
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
find /i "%%#" %SysPath%\drivers\etc\hosts %nul% && set /a hcount+=1)
|
||||||
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
if %hcount%==4 set "results=[Antivirus URLs are blocked in hosts]"
|
||||||
|
|
||||||
set wucount=0
|
|
||||||
for %%# in (wuauserv) do (
|
|
||||||
set _corrupt=
|
|
||||||
for %%G in (DependOnService Description DisplayName ErrorControl ImagePath ObjectName Start Type) do if not defined _corrupt (
|
|
||||||
reg query HKLM\SYSTEM\CurrentControlSet\Services\%%# /v %%G %nul% || (set _corrupt=1 & set /a wucount+=1)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
if %wucount% GEQ 1 set "results=%results%[Windows Update registry is corrupt]"
|
|
||||||
|
|
||||||
sc start sppsvc %nul%
|
sc start sppsvc %nul%
|
||||||
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
echo "%errorlevel%" | findstr "577 225" %nul% && (
|
||||||
set "results=%results%[Likely File Infector]"
|
set "results=%results%[Likely File Infector]"
|
||||||
|
|
Loading…
Reference in a new issue