It asks for the files to patch. You must search them manually Common locations: x64 C:\Program Files (x86)\Acronis\TrueImageHome\ti_managers.dll C:\Program Files (x86)\Acronis\TrueImageHome\TrueImageTools.exe C:\Program Files (x86)\Common Files\Acronis\TrueImageHome\TrueImageHomeService.exe x86 C:\Program Files\Acronis\TrueImageHome\ti_managers.dll C:\Program Files\Acronis\TrueImageHome\TrueImageTools.exe C:\Program Files\Common Files\Acronis\TrueImageHome\TrueImageHomeService.exe
No, there ask for the *UNPATCHED* original files! At the moment, you have to navigate to the right folder and have to select the correct file: Example for file 1:
acronis must be installed. you can see the files to be patched in the bat file. x86 system: C:\Program Files\Acronis\TrueImageHome\ti_managers.dll C:\Program Files\Acronis\TrueImageHome\TrueImageTools.exe C:\Program Files\Common Files\Acronis\TrueImageHome\TrueImageHomeService.exe x64 system: C:\Program Files (x86)\Acronis\TrueImageHome\ti_managers.dll C:\Program Files (x86)\Acronis\TrueImageHome\TrueImageTools.exe C:\Program Files (x86)\Common Files\Acronis\TrueImageHome\TrueImageHomeService.exe edit: sorry hadn't scrolled to the end and seen that the question was answered
The new bat file to patch looks good, I'm amazed about how you patch the files with simple for loop nice. @skyteddy I want to ask about the compatibility of a 27500 version with a new Windows 2004, which was released today, do anybody have already upgraded and installed ATU on this Windows?
Open as txt file the ActivationScript.bat.txt and read in after the: :step2 echo. echo Path to files when the ActivationScript is operating, browse to the indicated files path
I have just redone the entire script! Major changes from the previous work: # -y switch: run the patch unattended, very useful for automated setups; # hosts file is also patched to prevent inadverted access to some Acronis domains; # no need to manually browse and select each file to patch; # easier to add new files and changes to the binary patch for future versions; # binary patching is MUCH faster! I also see no reason for it to not work in Powershell 2.0, but could not test it. If someone could please test it and report the results here I'd appreciate. Any suggestion to make the script better is welcome, but please make it public.
Hello ZORAXbr, 10 minutes before your post, I also started rewriting the script. When I saw your finished script, I stopped immediately. Today I had time to test your script. I like your script very much and it works perfectly. Nice that you also thought about modifying the hosts file! It's a pity that you removed the color from the warning messages, but that's a matter of taste and probably not everyone likes it anyway. Thanks for your reworked script! skyteddy
My Man! Disconnected the Internet, Ran to Ture image setup, After setting up finished, I close the window, Ran the bat file! Bat file finished with no errors. Reboot, OpenTrue image, And it was activated, no errors! Good work!!! Yes Yes!!!!
Guys, I'm glad you liked the new script. I'm already working in some improvements. In the meantime, can someone please fetch me the correct MD5 checksums for ALREADY PATCHED files on versions 20770, 21400, and 22510?
Here we go: md5 of PATCHED files: v24.5.1.22510: Datei: ti_managers.dll MD5: 15d60c5b2276d3d3273df5344f958a5c Datei: TrueImageHomeService.exe MD5: 6ec84908a47c4ed094ab055c5cbd9615 Datei: TrueImageTools.exe MD5: ac2e67bcfea56b481ab527bbfa998e18 v24.4.1.21400: Datei: ti_managers.dll MD5: adcf933e12750f78de7d5b584180195e Datei: TrueImageHomeService.exe MD5: f029db765d648810978a8ad81e5ece61 Datei: TrueImageTools.exe MD5: bcbd60e2bb85e63a26eb1612e4fcac76 v24.3.1.20770: Datei: ti_managers.dll MD5: 939cc6122930760b6817224d4a82f045 Datei: TrueImageHomeService.exe MD5: 0ba543b8e25b0b0cff304a5e891db007 Datei: TrueImageTools.exe MD5: 39de85ab38a24b52bcbc9e872c218032 v24.3.1.20600: Datei: ti_managers.dll MD5: 73f515c74f06bc6539671c42dac88ec6 Datei: TrueImageHomeService.exe MD5: cd8ae5cfc413b3edd53e45f8c16f3f6a Datei: TrueImageTools.exe MD5: bed7081a2f2181f4efaf37c0701d4cf9 edit: incorrect 24.3.1.21400 -> 24.4.1.21400
New release for the Activator. Changes: - Works with previous versions from 20770 up to 25700, so no need to have a separate script for each version anymore! - The script will auto detect the installed version from uninstall registry info. - Added checksums for already patched files (thanks @skyteddy), so you just run the script again to check if the binaries were patched ok. - Font color galore (for Windows 10 users - LOL!); feel free to change it the way you like! I still need someone to test it on Windows 7 with Powershell 2.0, please report the results.
Waoh, great job! Many thanks for this script! I added the initial version 24.3.1.20600 and made tiny modifications. See below. Perfect! I like the colors you chose! In 3 (error-)lines I just added the color red. One suggestion: When the script is started, the script checks the following things: - Administrator rights available? - Is Acronis installed? - Is the Acronis version supported? Whether the Acronis files have already been patched is checked only after pressing "y". Is it much effort to add this check before?
I'm glad you liked. From now on one can easely add new versions to the same script, just like you did. That would mean transfering the entire file hashing procedure from PS to the batch code. Is that what you want?
No, that was not my intention! Maybe a simple check if the *.bak files exist is enough? And if so, issue a warning that Acronis might already be patched. Instead of the sentence "Backups (.bak) will be created before patching and saved in same location"? So before the sentences "A checksum routine prevents ..." and "You may run the script...". I'm not really happy about that either, but maybe you have a better idea.
You are right. The WMIC query was bogus and complicated, so I rewrote it. Can you please test it again? I also added a /debug option, so if anyone encounter errors during the script please create a log file using /y /debug >log.txt and attach it here.