Advertisement
kub12

Windows 10 Registry tweaks for mining.bat

Oct 27th, 2019
312
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.57 KB | None | 0 0
  1. @ECHO OFF
  2. COLOR 1F
  3. SET V=1.7
  4. TITLE Windows 10 Registry tweaks for mining (x64) by: jsanzsp
  5. ECHO #########################################################
  6. ECHO # #
  7. ECHO # WINDOWS 10 BUILD 10240 X64 #
  8. ECHO # #
  9. ECHO # #
  10. ECHO # AUTOR: jsanzsp Ethereum Community Forum #
  11. ECHO # #
  12. ECHO #########################################################
  13.  
  14. REM ======================= Registry tweaks =======================
  15. ECHO.
  16. :regstart
  17. set /p registry="Apply Registry tweaks? y/n: "
  18. if '%registry%' == 'n' goto servstart
  19. if /i "%registry%" neq "y" goto regstart
  20.  
  21. :reg0start
  22. set /p reg0="Replace Utilman with CMD? y/n: "
  23. if '%reg0%' == 'n' goto reg1start
  24. if /i "%reg0%" neq "y" goto reg0start
  25. reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe" /v "Debugger" /t REG_SZ /d "cmd.exe" /f > NUL 2>&1
  26.  
  27. :reg1start
  28. set /p reg1="Disable Quick Access as default view in Explorer? y/n: "
  29. if '%reg1%' == 'n' goto reg2start
  30. if /i "%reg1%" neq "y" goto reg1start
  31. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /f /v "LaunchTo" /t REG_DWORD /d 0 > NUL 2>&1
  32.  
  33. :reg2start
  34. set /p reg2="Show computer shortcut on desktop? y/n: "
  35. if '%reg2%' == 'n' goto reg3start
  36. if /i "%reg2%" neq "y" goto reg2start
  37. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{20D04FE0-3AEA-1069-A2D8-08002B30309D}" /t REG_DWORD /d 0 /f > NUL 2>&1
  38.  
  39. :reg3start
  40. set /p reg3="Show file extensions? y/n: "
  41. if '%reg3%' == 'n' goto reg4start
  42. if /i "%reg3%" neq "y" goto reg3start
  43. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f > NUL 2>&1
  44.  
  45. :reg4start
  46. set /p reg4="Disable lockscreen? y/n: "
  47. if '%reg4%' == 'n' goto reg5start
  48. if /i "%reg4%" neq "y" goto reg4start
  49. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "NoLockScreen" /t REG_DWORD /d 1 /f > NUL 2>&1
  50.  
  51. :reg5start
  52. set /p reg5="Enable classic control panel view? y/n: "
  53. if '%reg5%' == 'n' goto reg6start
  54. if /i "%reg5%" neq "y" goto reg5start
  55. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "ForceClassicControlPanel" /t REG_DWORD /d 1 /f > NUL 2>&1
  56.  
  57. :reg6start
  58. set /p reg6="Hide indication for compressed NTFS files? y/n: "
  59. if '%reg6%' == 'n' goto reg7start
  60. if /i "%reg6%" neq "y" goto reg6start
  61. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowCompColor" /t RED_DWORD /d 0 /f > NUL 2>&1
  62.  
  63. :reg7start
  64. set /p reg7="Disable Windows Update sharing? y/n: "
  65. if '%reg7%' == 'n' goto reg8start
  66. if /i "%reg7%" neq "y" goto reg7start
  67. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DownloadMode" /t REG_DWORD /d 0 /f > NUL 2>&1
  68. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f > NUL 2>&1
  69.  
  70. :reg8start
  71. set /p reg8="Remove Pin to start? y/n: "
  72. if '%reg8%' == 'n' goto reg9start
  73. if /i "%reg8%" neq "y" goto reg8start
  74. reg delete "HKEY_CLASSES_ROOT\exefile\shellex\ContextMenuHandlers\PintoStartScreen" /f > NUL 2>&1
  75. reg delete "HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\PintoStartScreen" /f > NUL 2>&1
  76. reg delete "HKEY_CLASSES_ROOT\mscfile\shellex\ContextMenuHandlers\PintoStartScreen" /f > NUL 2>&1
  77.  
  78. :reg9start
  79. set /p reg9="Classic vertical icon spacing? y/n: "
  80. if '%reg9%' == 'n' goto reg10start
  81. if /i "%reg9%" neq "y" goto reg9start
  82. reg add "HKCU\Control Panel\Desktop\WindowMetrics" /v "IconVerticalSpacing" /t REG_SZ /d "-1150" /f > NUL 2>&1
  83.  
  84. :reg10start
  85. set /p reg10="Remove versioning tab from properties? y/n: "
  86. if '%reg10%' == 'n' goto reg11start
  87. if /i "%reg10%" neq "y" goto reg10start
  88. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v NoPreviousVersionsPage /t REG_DWORD /d 1 /f > NUL 2>&1
  89.  
  90. :reg11start
  91. set /p reg11="Disable jump lists? y/n: "
  92. if '%reg11%' == 'n' goto reg12start
  93. if /i "%reg11%" neq "y" goto reg11start
  94. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Start_TrackDocs" /t REG_DWORD /d 0 /f > NUL 2>&1
  95.  
  96. :reg12start
  97. set /p reg12="Remove telemetry and data collection? y/n: "
  98. if '%reg12%' == 'n' goto reg13start
  99. if /i "%reg12%" neq "y" goto reg12start
  100. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /v PreventDeviceMetadataFromNetwork /t REG_DWORD /d 1 /f > NUL 2>&1
  101. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f > NUL 2>&1
  102. reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f > NUL 2>&1
  103. reg add "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f > NUL 2>&1
  104. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f > NUL 2>&1
  105. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f > NUL 2>&1
  106. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f > NUL 2>&1
  107. reg add "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /v "f!dss-winrt-telemetry.js" /t REG_DWORD /d 0 /f > NUL 2>&1
  108. reg add "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /v "f!proactive-telemetry.js" /t REG_DWORD /d 0 /f > NUL 2>&1
  109. reg add "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /v "f!proactive-telemetry-event_8ac43a41e5030538" /t REG_DWORD /d 0 /f > NUL 2>&1
  110. reg add "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /v "f!proactive-telemetry-inter_58073761d33f144b" /t REG_DWORD /d 0 /f > NUL 2>&1
  111.  
  112. :reg13start
  113. set /p reg13="Apply Internet Explorer 11 tweaks? y/n: "
  114. if '%reg13%' == 'n' goto reg14start
  115. if /i "%reg13%" neq "y" goto reg13start
  116. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "DoNotTrack" /t REG_DWORD /d 1 /f > NUL 2>&1
  117. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "Search Page" /t REG_SZ /d "http://www.google.es" /f > NUL 2>&1
  118. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "Start Page Redirect Cache" /t REG_SZ /d "http://www.google.es" /f > NUL 2>&1
  119. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "DisableFirstRunCustomize" /t REG_DWORD /d 1 /f > NUL 2>&1
  120. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "RunOnceHasShown" /t REG_DWORD /d 1 /f > NUL 2>&1
  121. reg add "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /v "RunOnceComplete" /t REG_DWORD /d 1 /f > NUL 2>&1
  122. reg add "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "DisableFirstRunCustomize" /t REG_DWORD /d 1 /f > NUL 2>&1
  123. reg add "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "RunOnceHasShown" /t REG_DWORD /d 1 /f > NUL 2>&1
  124. reg add "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "RunOnceComplete" /t REG_DWORD /d 1 /f > NUL 2>&1
  125. reg add "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /v "DisableFirstRunCustomize" /t REG_DWORD /d 1 /f > NUL 2>&1
  126. reg add "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /v "RunOnceHasShown" /t REG_DWORD /d 1 /f > NUL 2>&1
  127. reg add "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /v "RunOnceComplete" /t REG_DWORD /d 1 /f > NUL 2>&1
  128.  
  129. :reg14start
  130. set /p reg14="Disable Cortana, Bing Search and Searchbar? y/n: "
  131. if '%reg14%' == 'n' goto reg15start
  132. if /i "%reg14%" neq "y" goto reg14start
  133. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f > NUL 2>&1
  134. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "CortanaEnabled" /t REG_DWORD /d 0 /f > NUL 2>&1
  135. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f > NUL 2>&1
  136. reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "BingSearchEnabled" /t REG_DWORD /d 0 /f > NUL 2>&1
  137.  
  138. :reg15start
  139. set /p reg15="Change Logon screen background with accent color? y/n: "
  140. if '%reg15%' == 'n' goto reg16start
  141. if /i "%reg15%" neq "y" goto reg15start
  142. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "DisableLogonBackgroundImage" /t REG_DWORD /d 1 /f > NUL 2>&1
  143.  
  144. :reg16start
  145. set /p reg16="Disable Windows Error Reporting? y/n: "
  146. if '%reg16%' == 'n' goto reg17start
  147. if /i "%reg16%" neq "y" goto reg16start
  148. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d 1 /f > NUL 2>&1
  149.  
  150. :reg17start
  151. set /p reg17="Disable automatic Windows Updates? y/n: "
  152. if '%reg17%' == 'n' goto reg18start
  153. if /i "%reg17%" neq "y" goto reg17start
  154. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f > NUL 2>&1
  155.  
  156. :reg18start
  157. set /p reg18="Disable Hibernation? y/n: "
  158. if '%reg18%' == 'n' goto servstart
  159. if /i "%reg18%" neq "y" goto reg18start
  160. reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f > NUL 2>&1
  161.  
  162. ECHO Done...
  163.  
  164. REM ======================= Removing services =======================
  165. ECHO.
  166. :servstart
  167. set /p services="Apply Registry tweaks? y/n: "
  168. if '%services%' == 'n' goto schedstart
  169. if /i "%services%" neq "n" if /i "%services%" neq "y" goto servstart
  170.  
  171. :serv0start
  172. set /p serv0="Disable tracking services? y/n: "
  173. if '%serv0%' == 'n' goto serv1start
  174. if /i "%serv0%" neq "y" goto serv0start
  175. sc config DiagTrack start= disabled > NUL 2>&1
  176. sc config diagnosticshub.standardcollector.service start= disabled > NUL 2>&1
  177. sc config TrkWks start= disabled > NUL 2>&1
  178. sc config WMPNetworkSvc start= disabled > NUL 2>&1
  179.  
  180. :serv1start
  181. set /p serv1="Disable WAP Push Message Routing Service? y/n: "
  182. if '%serv1%' == 'n' goto serv2start
  183. if /i "%serv1%" neq "y" goto serv1start
  184. sc config dmwappushservice start= disabled > NUL 2>&1
  185.  
  186. :serv2start
  187. set /p serv2="Disable Windows Search? y/n: "
  188. if '%serv2%' == 'n' goto serv3start
  189. if /i "%serv2%" neq "y" goto serv2start
  190. sc config WSearch start= disabled > NUL 2>&1
  191. del "C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb" /s > NUL 2>&1
  192.  
  193. :serv3start
  194. set /p serv3="Disable Superfetch? y/n: "
  195. if '%serv3%' == 'n' goto serv4start
  196. if /i "%serv3%" neq "y" goto serv3start
  197. sc config SysMain start= disabled > NUL 2>&1
  198.  
  199. :serv4start
  200. set /p serv4="Disable Windows Defender? y/n: "
  201. if '%serv4%' == 'n' goto schedstart
  202. if /i "%serv4%" neq "y" goto serv4start
  203. sc config WinDefend start= disabled > NUL 2>&1
  204. sc config WdNisSvc start= disabled > NUL 2>&1
  205. reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f > NUL 2>&1
  206. schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable > NUL 2>&1
  207. schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable > NUL 2>&1
  208. schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable > NUL 2>&1
  209. schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable > NUL 2>&1
  210. del "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache*" /s > NUL 2>&1
  211.  
  212. ECHO Done...
  213.  
  214. REM ======================= Removing scheduled tasks =======================
  215. ECHO.
  216. :schedstart
  217. set /p schedules="Removing scheduled tasks? y/n: "
  218. if '%schedules%' == 'n' goto winappstart
  219. if /i "%schedules%" neq "n" if /i "%schedules%" neq "y" goto schedstart
  220.  
  221. schtasks /Change /TN "Microsoft\Windows\AppID\SmartScreenSpecific" /Disable > NUL 2>&1
  222. schtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable > NUL 2>&1
  223. schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable > NUL 2>&1
  224. schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /Disable > NUL 2>&1
  225. schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable > NUL 2>&1
  226. schtasks /Change /TN "Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /Disable > NUL 2>&1
  227. schtasks /Change /TN "Microsoft\Windows\NetTrace\GatherNetworkInfo" /Disable > NUL 2>&1
  228. schtasks /Change /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" /Disable > NUL 2>&1
  229.  
  230. ECHO Done...
  231.  
  232. REM ======================= Removing Windows default apps =======================
  233. ECHO.
  234. :winappstart
  235. set /p winapps="Removing Windows default apps? y/n: "
  236. if '%winapps%' == 'n' goto odrivestart
  237. if /i "%winapps%" neq "n" if /i "%winapps%" neq "y" goto winappstart
  238.  
  239. powershell "Get-AppxPackage *3d* | Remove-AppxPackage" > NUL 2>&1
  240. powershell "Get-AppxPackage *bing* | Remove-AppxPackage" > NUL 2>&1
  241. powershell "Get-AppxPackage *zune* | Remove-AppxPackage" > NUL 2>&1
  242. powershell "Get-AppxPackage *photo* | Remove-AppxPackage" > NUL 2>&1
  243. powershell "Get-AppxPackage *communi* | Remove-AppxPackage" > NUL 2>&1
  244. powershell "Get-AppxPackage *solit* | Remove-AppxPackage" > NUL 2>&1
  245. powershell "Get-AppxPackage *phone* | Remove-AppxPackage" > NUL 2>&1
  246. powershell "Get-AppxPackage *soundrec* | Remove-AppxPackage" > NUL 2>&1
  247. powershell "Get-AppxPackage *camera* | Remove-AppxPackage" > NUL 2>&1
  248. powershell "Get-AppxPackage *people* | Remove-AppxPackage" > NUL 2>&1
  249. powershell "Get-AppxPackage *office* | Remove-AppxPackage" > NUL 2>&1
  250. powershell "Get-AppxPackage *xbox* | Remove-AppxPackage" > NUL 2>&1
  251.  
  252. ECHO Done...
  253.  
  254. REM ======================= Disable / Remove OneDrive =======================
  255. ECHO.
  256. :odrivestart
  257. set /p onedrive="Disable OneDrive? y/n: "
  258. if '%onedrive%' == 'n' goto hoststart
  259. if /i "%onedrive%" neq "y" goto odrivestart
  260. reg add "HKLM\Software\Policies\Microsoft\Windows\OneDrive" /v DisableFileSyncNGSC /t REG_DWORD /d 1 /f > NUL 2>&1
  261.  
  262. ECHO Done...
  263.  
  264. REM ======================= Blocking Telemetry Servers =======================
  265. ECHO.
  266. :hoststart
  267. set /p hostsblock="Blocking Telemetry Servers? y/n: "
  268. if '%hostsblock%' == 'n' goto finish
  269. if /i "%hostsblock%" neq "n" if /i "%hostsblock%" neq "y" goto hoststart
  270.  
  271. copy "%WINDIR%\system32\drivers\etc\hosts" "%WINDIR%\system32\drivers\etc\hosts.bak" > NUL 2>&1
  272. attrib -r "%WINDIR%\system32\drivers\etc\hosts" > NUL 2>&1
  273. FIND /C /I "vortex.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  274. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 vortex.data.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  275. FIND /C /I "vortex-win.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  276. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 vortex-win.data.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  277. FIND /C /I "telecommand.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  278. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telecommand.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  279. FIND /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts
  280. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%WINDIR%\system32\drivers\etc\hosts
  281. FIND /C /I "oca.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  282. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 oca.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  283. FIND /C /I "oca.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts
  284. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%WINDIR%\system32\drivers\etc\hosts
  285. FIND /C /I "sqm.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  286. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 sqm.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  287. FIND /C /I "sqm.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts
  288. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%WINDIR%\system32\drivers\etc\hosts
  289. FIND /C /I "watson.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  290. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 watson.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  291. FIND /C /I "watson.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts
  292. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%WINDIR%\system32\drivers\etc\hosts
  293. FIND /C /I "redir.metaservices.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  294. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 redir.metaservices.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  295. FIND /C /I "choice.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  296. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 choice.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  297. FIND /C /I "choice.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts
  298. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 choice.microsoft.com.nsatc.net>>%WINDIR%\system32\drivers\etc\hosts
  299. FIND /C /I "df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  300. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 df.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  301. FIND /C /I "reports.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  302. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  303. FIND /C /I "services.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  304. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 services.wes.df.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  305. FIND /C /I "sqm.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  306. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 sqm.df.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  307. FIND /C /I "telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  308. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  309. FIND /C /I "watson.ppe.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  310. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 watson.ppe.telemetry.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  311. FIND /C /I "telemetry.appex.bing.net" %WINDIR%\system32\drivers\etc\hosts
  312. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telemetry.appex.bing.net>>%WINDIR%\system32\drivers\etc\hosts
  313. FIND /C /I "telemetry.urs.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  314. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telemetry.urs.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  315. FIND /C /I "telemetry.appex.bing.net:443" %WINDIR%\system32\drivers\etc\hosts
  316. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 telemetry.appex.bing.net:443>>%WINDIR%\system32\drivers\etc\hosts
  317. FIND /C /I "settings-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  318. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 settings-sandbox.data.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  319. FIND /C /I "vortex-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts
  320. IF %ERRORLEVEL% NEQ 0 ECHO ^0.0.0.0 vortex-sandbox.data.microsoft.com>>%WINDIR%\system32\drivers\etc\hosts
  321. attrib +r "%WINDIR%\system32\drivers\etc\hosts" > NUL 2>&1
  322.  
  323. :finish
  324. CLS
  325. ECHO #########################################################
  326. ECHO # #
  327. ECHO # WINDOWS 10 BUILD 10240 X64 #
  328. ECHO # #
  329. ECHO # #
  330. ECHO # AUTHOR: jsanzsp #
  331. ECHO # #
  332. ECHO #########################################################
  333. ECHO.
  334. ECHO Finish nice mining!!
  335. ECHO Press a key to exit.
  336. PAUSE > NUL
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement