Windows Defender detects activation scripts as “HackTool:BAT/AutoKMS”

Based on testing on some Windows devices, I have just realized that Microsoft disallowed to use KMS scripts in the recent update. To reconfirm this, I uploaded a batch script file to VirusTotal and here is the result.
There is no official reason or notification and it just was a quiet event. I think many you guys here were surprised, even shocked as soon as you heard this news. However, Microsoft’s move this time is easy to understand.

1. Batch script is not recommend anymore

KMS commands are developed by Microsoft but the batch scripts are not. They are just contain a batch of KMS commands and written by individuals like me. My purpose of creating the scripts is help you guys save your time instead of running all commands, one by one in the command prompt or Windows power shell. But this method has never been treated as an official method because opening batch file with admin rights is not recommended by Microsoft. For example, if the author inserts the command formatting disk into the script, all you data will be lost.

2. Batch script is used to fleece others

Someone has used my name to create an online shop and sell all my scripts. He told buyers a brazen lie that the scripts he sold is the new generation of digital license. It goes without saying people who are willing to spend a few dozen of dollars to order them have never known my site and my work. And they are willing to report the author of the scripts too when they realized the truth without finding out carefully. 🙁
The move of Microsoft will clear all opportunists and swindlers and I’m all for it. I will replace the KMS scripts from all my posts with the manual method in the coming time. Finally, I would like to thank you guys for always standing by my side. Your support and your encouragement mean a lot to me. It only remains for me to thank.
If you would have any questions or concerns, please leave your comments. I would be glad to explain in more details. Thank you so much for all your feedback and support!
About AutoKMS
AutoKMS stands for Automatic Key Management System Bypass
Most antivirus programs identify AutoKMS.exe as malware—such as Microsoft identifies it as HackTool:Win32/Keygen or HackTool:Win32/Vigorf.A, and Symantec identifies it as Trojan.Gen.
The AutoKMS.exe file is a software component of AutoKMS.
"AutoKMS.exe" was coded by two anonymous developers in or before 2010. It usually installs in "C:\Windows\AutoKMS\AutoKMS.exe", sometimes "C:\Windows\AutoKMS.exe". It enables users of "cracked" volume-licensed copies of Microsoft Office to keep them activated. Microsoft's volume licensing reduces costs for businesses and universities to provide Windows and Office to employees. One KMS activation key is supplied to the client. An administrator installs that key and multiple "host license files" on a computer or server and client copies send activation requests to this "KMS host." Programs such as "AutoKMS.exe" intercept and "satisfy" these requests when there is no legitimate KMS Host to receive them. "AutoKMS.exe" can be deleted but downloading "keygen" or "KMS emulator" software from sublegal sources often brings along other malware with it and can attract hijacking or ransomware attacks.

The process known as AutoKMS or Office 2010 KMS Activation At Startup belongs to software AutoKMS or Windows Loader by Microsoft (www.microsoft.com).


Windows Task Manager with AutoKMS

What is AutoKMS?
Is AutoKMS safe?
What is HackTool AutoKMS?
Can I remove AutoKMS after activation?

Popular posts from this blog

Activating all versions of Windows Server without a product key

How to Activate Microsoft Office 2010 without Product Key for Free

How to Troubleshoot “connection to KMS server failed” error | KMS Server failed [Solved]