@@ -846,7 +846,7 @@ function waRunCommand() {
846846 -wallpaper \
847847 $RDP_KBD \
848848 $RDP_FLAGS \
849- /app:program:powershell.exe,cmd:' -ExecutionPolicy Bypass -File C:\\OEM\\UpdateWindows.ps1' \
849+ /app:program:powershell.exe,cmd:" -ExecutionPolicy Bypass -File C:\\ OEM\\ UpdateWindows.ps1" \
850850 /v:" $RDP_IP :$RDP_PORT " & > /dev/null &
851851
852852 # Capture the process ID.
@@ -866,7 +866,7 @@ function waRunCommand() {
866866 -wallpaper \
867867 $RDP_KBD \
868868 $RDP_FLAGS \
869- /app:program:powershell.exe,cmd:' -ExecutionPolicy Bypass -File C:\\OEM\\RegistryOverride.ps1' \
869+ /app:program:powershell.exe,cmd:" -ExecutionPolicy Bypass -File C:\\ OEM\\ RegistryOverride.ps1" \
870870 /v:" $RDP_IP :$RDP_PORT " & > /dev/null &
871871
872872 # Capture the process ID.
@@ -886,7 +886,7 @@ function waRunCommand() {
886886 -wallpaper \
887887 $RDP_KBD \
888888 $RDP_FLAGS \
889- /app:program:cmd.exe,cmd:' /c C:\\OEM\\dns_off.bat' \
889+ /app:program:cmd.exe,cmd:" /c C:\\ OEM\\ dns_off.bat" \
890890 /v:" $RDP_IP :$RDP_PORT " & > /dev/null &
891891
892892 # Capture the process ID.
@@ -906,7 +906,7 @@ function waRunCommand() {
906906 -wallpaper \
907907 $RDP_KBD \
908908 $RDP_FLAGS \
909- /app:program:cmd.exe,cmd:' /c C:\\OEM\\dns_on.bat' \
909+ /app:program:cmd.exe,cmd:" /c C:\\ OEM\\ dns_on.bat" \
910910 /v:" $RDP_IP :$RDP_PORT " & > /dev/null &
911911
912912 # Capture the process ID.
0 commit comments