RemoveSPY_AIOv23.cmd
raw download clone
BATCH
views 19
,
size 519872 b
@ECHO OFF
CHCP 852 >nul
MODE CON COLS=100 LINES=42 & COLOR 0F
:RUNwithUAC
:: Run this script with elevation
CALL :RequestAdminElevation "%~dpfs0" %* || goto:eof

:BEGIN
CLS
@ECHO OFF
CHCP 852 >nul
TITLE ... Uruchamianie skryptu
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET AIO_LOG="%WINDIR%\RemoveSpy_AIO.log"
SET AIO_HOSTS=%WINDIR%\system32\drivers\etc\hosts
SET PROGRAMNAME=RemoveSpy_AIO
SET VERSION=v23
SET VERSIONINFO= Nie sprawdzaj

FOR /F "tokens=*" %%j IN ('reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /V ProductName ^|findstr /ri "REG_SZ"') DO SET osa=%%j
REM FOR /F "tokens=3" %%k IN ('reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /V CurrentBuild ^|findstr /ri "REG_SZ"') DO SET osb=%%k
FOR /F "tokens=*" %%l IN ('reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /V EditionID ^|findstr /ri "REG_SZ"') DO SET osc=%%l
SET osa=%osa:ProductName    =%
SET osa=%osa:REG_SZ    =%
SET osc=%osc:EditionID    =%
SET osc=%osc:REG_SZ    =%
ECHO %osa%|find "Windows Vista">nul && SET WINLOG=Vista
ECHO %osa%|find "Windows 7">nul && SET WINLOG= Win7
ECHO %osa%|find "Windows 8.1">nul && SET WINLOG=Win81
ECHO %osa%|find "Windows 10">nul && SET WINLOG=Win10
ECHO %osa%|find "Windows Embedded Standard">nul && SET WINLOG=WinThinPC
IF %COMPUTERNAME%=="PREZES" GOTO VSS_NORESTORE_VERIFY
IF %COMPUTERNAME%=="PREZES2" GOTO VSS_NORESTORE_VERIFY
ECHO .>>%AIO_LOG%
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO% >> %AIO_LOG%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%>> %AIO_LOG%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   >> %AIO_LOG%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    LOG >> %AIO_LOG%
CALL :Log Uruchomienie skryptu %~f0 %1 %2 %3 %4 %5 %6 %7 %8 %9
CALL :Log %COMPUTERNAME% / %osa% / %USERNAME%

DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1
DEL /F /Q %SYSTEMDRIVE%\CRP.VBS>nul 2>&1
DEL /F /Q %SYSTEMDRIVE%\QR.VBS>nul 2>&1

IF /I "%1"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%2"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%3"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%4"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%5"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%6"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%7"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%8"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY
IF /I "%9"=="/noupdate" CALL :Log Nie Sprawdzaj aktualizacji /noupdate & GOTO VSS_NORESTORE_VERIFY

REM Sprawdzanie wersji on-line
ECHO  ... sprawdzanie aktualnej wersji on-line 
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/LATESTRS.txt', 'C:\LATESTRS.txt') }">nul
IF NOT EXIST C:\LATESTRS.txt CALL :Log Bˆ¥d w sprawdzaniu aktualizacji & SET VERSIONINFO= Bˆ¥d Sieci & SET VERSIONRS=%VERSIONR% & GOTO VSS_NORESTORE_VERIFY
FOR /F "delims=" %%h IN (C:\LATESTRS.txt) DO SET VERSIONRS=%%h
IF /I %VERSIONRS% LSS %VERSION:~1,2% SET VERSIONINFO= Wersja testowa& CALL :Log %VERSIONINFO% & DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1 & GOTO VSS_NORESTORE_VERIFY
IF /I %VERSIONRS% EQU %VERSION:~1,2% SET VERSIONINFO= Aktualna& CALL :Log %VERSIONINFO% & DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1 & GOTO VSS_NORESTORE_VERIFY
IF /I %VERSIONRS% GTR %VERSION:~1,2% SET VERSIONINFO= Pobierz now¥& CALL :Log %VERSIONINFO% & DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1 & GOTO UPDATE
GOTO VSS_NORESTORE_VERIFY

:UPDATE
ECHO  ....
ECHO  .... Jest dost©pna nowa wersja ^!
ECHO  ....
ECHO  ..... Start Automatycznej aktualizacji za
TIMEOUT /T 1 >NUL
ECHO  ..... 5
TIMEOUT /T 1 >NUL
ECHO  .... 4
TIMEOUT /T 1 >NUL
ECHO  ... 3
TIMEOUT /T 1 >NUL
ECHO  .. 2
TIMEOUT /T 1 >NUL
ECHO  . 1
TIMEOUT /T 1 >NUL
FOR %%a IN (".\") DO SET "CURPATH=%%~fa"
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/LATESTRS.CMD', '%CURPATH%\RemoveSPY_AIOv%VERSIONRS%.cmd') }">nul
START "" cmd /c "%CURPATH%\RemoveSPY_AIOv%VERSIONRS%.cmd" & EXIT
REM usuni©cie starej wersji
REM START "" cmd /c "%CURPATH%\RemoveSPY_AIOv%VERSIONRS%test.cmd" & DEL "%~fn0" & EXIT
EXIT
GOTO VSS_NORESTORE_VERIFY

:VSS_NORESTORE_VERIFY
IF /I "%1"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%2"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%3"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%4"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%5"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%6"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%7"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%8"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
IF /I "%9"=="/norestore" CALL :Log Przywracanie systemu - bez punktu przywracania /norestore & GOTO CheckVERsion
GOTO VSS_DETECT

:VSS_DETECT
TITLE ... Tworzenie punktu przywracania systemu
REM Wykrywanie systemu modowanego bez VSS 
@ECHO OFF
REG QUERY "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v start >NUL
IF ERRORLEVEL==1 GOTO VSS_NO
IF ERRORLEVEL==0 GOTO VSS_STATE
GOTO VSS_NO

:VSS_STATE
TITLE ... Wykrywanie przywracania systemu
REM Sprawdzenie Usˆugi VSS
FOR /F "tokens=3" %%a IN ('reg query "HKLM\SYSTEM\CurrentControlSet\services\VSS" /v start ^| find /i "REG_DWORD"') DO SET CHECK_VSS=%%a 
ECHO  ... Wykrywanie przywracania systemu

IF %CHECK_VSS% EQU 0x0 GOTO VSS_OK
IF %CHECK_VSS% EQU 0x1 GOTO VSS_OK
IF %CHECK_VSS% EQU 0x2 GOTO VSS_OK
IF %CHECK_VSS% EQU 0x3 GOTO VSS_OK
IF %CHECK_VSS% EQU 0x4 GOTO VSS_NO
GOTO VSS_NO

:VSS_NO
@ECHO OFF
TITLE ... Punkt Przywracania nie zostaˆ utworzony 
CLS
MODE CON COLS=100 lines=42 & Color 0E
ECHO[
ECHO  ... %WINLOG%
ECHO[
ECHO  ... Punkt Przywracania nie zostaˆ utworzony
ECHO[
ECHO  ... Uruchamiasz skrypt bez punktu przywracnia / OS modowany ^^?/ 
ECHO[
ECHO  ... Je¾eli potrzebujesz przywracania systemu, zakoäcz skrypt
ECHO[
ECHO  ... Wˆ¥cz usˆugi odpowiedzialne za przywracanie systemu (VSS) oraz uruchom ponownie skrypt
ECHO[
ECHO  ... Wci˜nij dowolny klawisz lub poczekaj aby kontynuowa† bez punktu przywracania systemu
TIMEOUT /T 4 > NUL
CALL :Log Przywracanie systemu - punkt nie utworzony / OS Modowany^^? /
GOTO CheckVERsion

:VSS_OK
IF /I "%1"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%2"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%3"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%4"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%5"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%6"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%7"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%8"=="/quickrestore" GOTO VSS_OK_QUICK
IF /I "%9"=="/quickrestore" GOTO VSS_OK_QUICK
GOTO VSS_OK_NORMAL

:VSS_OK_NORMAL
CALL :Log Przywracanie systemu - us³uga OK - us³uga dzia³a
TITLE ... Pocz¥tek przywracania systemu
REM Utworzenie punktu przywracania i Wpisanie pliku C:\CRP.VBS
DEL /F /Q %SYSTEMDRIVE%\CRP.VBS>nul 2>&1
REM. >%SYSTEMDRIVE%\CRP.VBS
REM ------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ECHO ^If GetOS = "Vista" Or GetOS = "Win7" Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  If WScript.Arguments.length =0 Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objShell = CreateObject("Shell.Application")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objShell.ShellExecute "wscript.exe", """" ^& _>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            WScript.ScriptFullName ^& """" ^& " uac","", "runas", ^1>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^	Else>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie CRP.VBS" ^& vbCrLf>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            CreateSRP>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^If GetOS = "Win81" Or GetOS = "Win10" Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  If WScript.Arguments.length =0 Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objShell = CreateObject("Shell.Application")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objShell.ShellExecute "wscript.exe", """" ^& _>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        WScript.ScriptFullName ^& """" ^& " uac","", "runas", ^1>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  Else>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie CRP.VBS" ^& vbCrLf>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          const HKEY_LOCAL_MACHINE = ^&H80000002>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            strComputer = ".">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}^!\\" ^& strComputer ^& "\root\default:StdRegProv")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            strValueName = "SystemRestorePointCreationFrequency">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^            oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName, ^0>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^                CreateSRP>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^       oReg.DeleteValue HKEY_LOCAL_MACHINE, strKeyPath, strValueName>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^Sub CreateSRP>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  curDate = Year(Date) ^& "-" ^& Right(String(2, "0") ^& Month(Date),2) ^& "-" ^& Day(Date) ^& "_" ^& Time>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  InputMy = InputBox (" Wpisz w³asn¹ nazwê dla punktu przywracania,"+vbCrLf+vbCrLf+" np. Mój Punkt Przywracania na wszelki wypadek "+vbCrLf+vbCrLf+" lub u¿yj nazwy sugerowanej przez skrypt:",GetOS+" RemoveSpy_AIO - Przywracanie systemu","RemoveSpy_AIO_"+CurDate)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  If InputMy = "" Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^			intTimeout = 2 >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		intType = 48 >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		strMessage = "     Anulowano tworzenie punktu przywracania ^!" >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		strTitle = GetOS+" RemoveSpy_AIO - Przywracanie systemu" >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		Set WshShell = CreateObject("WScript.Shell")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		intResult = WshShell.Popup(strMessage, intTimeout, strTitle, intType)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - anulowano tworzenie punktu przywracania^!" ^& vbCrLf>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    Wscript.Quit>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie tworzenia punktu przywracania systemu" ^& vbCrLf>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  swinmgmts = "winmgmts:\\.\root\default:Systemrestore">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^      GetObject(swinmgmts).CreateRestorePoint InputMy, 0, 100>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^			intTimeout = 3 >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		intType = 64 >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		strMessage = "             Punkt przywracania"+vbCrLf+InputMy+vbCrLf+"               zosta³ utworzony." >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		strTitle = GetOS+" RemoveSpy_AIO - Przywracanie systemu" >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		Set WshShell = CreateObject("WScript.Shell")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  		intResult = WshShell.Popup(strMessage, intTimeout, strTitle, intType)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - punkt przywracania: """+InputMy+""" zosta³ utworzony" ^& vbCrLf >>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^End Sub>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^Function GetOS>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    Set objWMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\" ^& _>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    ".\root\cimv2")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    Set colOS = objWMI.ExecQuery("Select * from Win32_OperatingSystem")>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^    For Each objOS in colOS>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  strOSName = objOS.Caption>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        If instr(strOSName, "Windows 7") Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          GetOS = "Win7">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        ElseIf instr(strOSName, "Vista") Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          GetOS = "Vista">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        ElseIf instr(strOSName, "Windows XP") Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          GetOS = "Windows XP">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        ElseIf instr(strOSName, "Windows 8.1") Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          GetOS = "Win81">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        ElseIf instr(strOSName, "Windows 10") Then>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^          GetOS = "Win10">>%SYSTEMDRIVE%\CRP.VBS
ECHO ^        End If>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  Next>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^End Function>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^Function LogDateTime>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^  LogDateTime = Year(Date) ^& "-" ^& Right(String(2, "0") ^& Month(Date),2) ^& "-" ^& Day(Date) ^& "_" ^& Right(String(2, "0") ^& Hour(Time),2) ^& "-" ^& Right(String(2, "0") ^& Minute(Time),2) ^& "-" ^& Right(String(2, "0") ^& Second(Time),2)>>%SYSTEMDRIVE%\CRP.VBS
ECHO ^End Function>>%SYSTEMDRIVE%\CRP.VBS
REM -------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CALL :Log Przywracanie systemu - utworzenie CRP.VBS
START C:\CRP.VBS
CALL :Log Przywracanie systemu - START procedury %WINLOG%
@ECHO OFF

:VSS_START_SEARCH
REM Sprawdzanie czy dziaˆa wscipt.exe, jak tak to p©tla, jak nie to kolejny etap
CLS
SET EXE=wscript.exe
FOR /F %%x IN ('tasklist /NH /FI "IMAGENAME eq %EXE%"') DO IF %%x == %EXE% goto VSS_FOUND
CALL :Log Przywracanie systemu - koniec procedury %WINLOG%
DEL /F /Q %SYSTEMDRIVE%\CRP.VBS>nul 2>&1
GOTO CheckVERsion

:VSS_FOUND
TITLE ... Oczekiwanie na koniec utworzenia punktu Przywracania Systemu
MODE CON COLS=100 lines=42 & Color 0E
ECHO[
ECHO  ... %WINLOG%
ECHO[
ECHO  ... Oczekiwanie na koniec utworzenia punktu Przywracania Systemu
ECHO[
ECHO  ... Skrypt automatycznie przejdzie do gˆ¢wnego menu
@ECHO OFF
TIMEOUT /T 1 > NUL
GOTO VSS_START_SEARCH

:VSS_OK_QUICK
CALL :Log Przywracanie systemu - szybki punkt automatyczny /quickrestore
REM Wpisanie pliku C:\QR.VBS
DEL /F /Q %SYSTEMDRIVE%\QR.VBS>nul 2>&1
REM. >%SYSTEMDRIVE%\QR.VBS
REM ------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ECHO ^If GetOS = "Vista" Or GetOS = "Win7" Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  If WScript.Arguments.length =0 Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objShell = CreateObject("Shell.Application")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objShell.ShellExecute "wscript.exe", """" ^& _>>%SYSTEMDRIVE%\QR.VBS
ECHO ^            WScript.ScriptFullName ^& """" ^& " uac","", "runas", ^1>>%SYSTEMDRIVE%\QR.VBS
ECHO ^	Else>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie QR.VBS" ^& vbCrLf>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\QR.VBS
ECHO ^            CreateSRP>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    End If>>%SYSTEMDRIVE%\QR.VBS
ECHO ^End If>>%SYSTEMDRIVE%\QR.VBS
ECHO ^If GetOS = "Win81" Or GetOS = "Win10" Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  If WScript.Arguments.length =0 Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objShell = CreateObject("Shell.Application")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objShell.ShellExecute "wscript.exe", """" ^& _>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        WScript.ScriptFullName ^& """" ^& " uac","", "runas", ^1>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  Else>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie QR.VBS" ^& vbCrLf>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          const HKEY_LOCAL_MACHINE = ^&H80000002>>%SYSTEMDRIVE%\QR.VBS
ECHO ^            strComputer = ".">>%SYSTEMDRIVE%\QR.VBS
ECHO ^            Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}^!\\" ^& strComputer ^& "\root\default:StdRegProv")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^            strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore">>%SYSTEMDRIVE%\QR.VBS
ECHO ^            strValueName = "SystemRestorePointCreationFrequency">>%SYSTEMDRIVE%\QR.VBS
ECHO ^            oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName, ^0>>%SYSTEMDRIVE%\QR.VBS
ECHO ^                CreateSRP>>%SYSTEMDRIVE%\QR.VBS
ECHO ^       oReg.DeleteValue HKEY_LOCAL_MACHINE, strKeyPath, strValueName>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    End If>>%SYSTEMDRIVE%\QR.VBS
ECHO ^End If>>%SYSTEMDRIVE%\QR.VBS
ECHO ^Sub CreateSRP>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  curDate = Year(Date) ^& "-" ^& Right(String(2, "0") ^& Month(Date),2) ^& "-" ^& Day(Date) ^& "_" ^& Time>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  InputMy = (GetOS+" RemoveSpy_AIO - /quickrestore "+CurDate)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - uruchomienie tworzenia punktu przywracania systemu" ^& vbCrLf>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  swinmgmts = "winmgmts:\\.\root\default:Systemrestore">>%SYSTEMDRIVE%\QR.VBS
ECHO ^      GetObject(swinmgmts).CreateRestorePoint InputMy, 0, 100>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        LogDateTime>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFSO=CreateObject("Scripting.FileSystemObject")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        outFile="C:\Windows\RemoveSpy_AIO.log">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        Set objFile = objFSO.OpenTextFile(outFile, 8)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Write LogDateTime+" Przywracanie systemu - punkt przywracania: """+InputMy+""" zosta³ utworzony" ^& vbCrLf>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        objFile.Close>>%SYSTEMDRIVE%\QR.VBS
ECHO ^End Sub>>%SYSTEMDRIVE%\QR.VBS
ECHO ^Function GetOS>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    Set objWMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\" ^& _>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    ".\root\cimv2")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    Set colOS = objWMI.ExecQuery("Select * from Win32_OperatingSystem")>>%SYSTEMDRIVE%\QR.VBS
ECHO ^    For Each objOS in colOS>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  strOSName = objOS.Caption>>%SYSTEMDRIVE%\QR.VBS
ECHO ^        If instr(strOSName, "Windows 7") Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          GetOS = "Win7">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        ElseIf instr(strOSName, "Vista") Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          GetOS = "Vista">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        ElseIf instr(strOSName, "Windows XP") Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          GetOS = "Windows XP">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        ElseIf instr(strOSName, "Windows 8.1") Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          GetOS = "Win81">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        ElseIf instr(strOSName, "Windows 10") Then>>%SYSTEMDRIVE%\QR.VBS
ECHO ^          GetOS = "Win10">>%SYSTEMDRIVE%\QR.VBS
ECHO ^        End If>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  Next>>%SYSTEMDRIVE%\QR.VBS
ECHO ^End Function>>%SYSTEMDRIVE%\QR.VBS
ECHO ^Function LogDateTime>>%SYSTEMDRIVE%\QR.VBS
ECHO ^  LogDateTime = Year(Date) ^& "-" ^& Right(String(2, "0") ^& Month(Date),2) ^& "-" ^& Day(Date) ^& "_" ^& Right(String(2, "0") ^& Hour(Time),2) ^& "-" ^& Right(String(2, "0") ^& Minute(Time),2) ^& "-" ^& Right(String(2, "0") ^& Second(Time),2)>>%SYSTEMDRIVE%\QR.VBS
ECHO ^End Function>>%SYSTEMDRIVE%\QR.VBS
REM -------------------------------------------------------------------------------------------------------------------------------------------------------------------------
START C:\QR.VBS
GOTO CheckVERsion

:CheckVERsion
REM Check VERsion System: Vista Windows7 Windows8.1 Windows10
ECHO %osa%|find "Windows Vista">nul && GOTO WINVISTA_VER
ECHO %osa%|find "Windows 7">nul && GOTO WIN7_VER
ECHO %osa%|find "Windows Embedded Standard">nul && GOTO WIN7_VER
ECHO %osa%|find "Windows 8.1">nul && GOTO WIN81_VER
ECHO %osa%|find "Windows 10">nul && GOTO WIN10_VER

REM ECHO %osb%|find "14393">nul && SET VERSION14393=... Ostatnia wersja skryptu dla tego systemu to RemoveSPY_AIOv16
REM ECHO %osb%|find "15063">nul && GOTO WIN10_VER

CALL :Log OS ERROR - System nierozpoznany ^^?^^?^^?
CLS
ECHO[
ECHO  %VERSION14393%
ECHO[
ECHO  ... Jakiego systemu u¾ywasz ^^?^^?^^?
ECHO[
TIMEOUT /T 10
EXIT














:WINVISTA_VER
SET HOSTS_TYPE_MS=WINVISTA_SKRYPT
SET ROUTE_TYPE_MS=WINVISTA_SKRYPT
SET EVENT_TYPE_MS=WINVISTA_SKRYPT
SET CLEANMGRV=0
SET CLEANMGR7=0
SET CLEANMGR81=0
SET CLEANMGR10=0
MODE CON COLS=100 lines=42 & Color A0

IF /I "%1"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%2"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%3"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%4"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%5"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%6"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%7"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%8"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE
IF /I "%9"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WINVISTA_CORE

IF /I "%1"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%2"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%3"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%4"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%5"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%6"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%7"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%8"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV
IF /I "%9"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WINVISTA_ADV

CALL :Log Menu
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Vista
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Menu
ECHO[
ECHO %VERSIONINFO%
ECHO[
ECHO  1. Przed u¾yciem uwa¾nie przeczytaj ^^!^^!^^! / Instrukcja obsˆugi / Pomoc
ECHO[
ECHO  2. Tryb CORE
ECHO[
ECHO  3. Tryb ADV = ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  7. Zestaw NARZ¨DZI / HOSTS / ROUTE / LOG
ECHO[
ECHO  8. Tryb DIAGNOSTYCZNY - Cofni©cie zmian dokonanych przez skrypt
ECHO[
ECHO  9. Wyj˜cie
ECHO[
ECHO  ^^!. Uruchom skrypt od nowa
ECHO[
SET /P CHOICEWINVISTA= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWINVISTA%'=='' ECHO "%CHOICEWINVISTA%" Wpisz jeszcze raz
IF '%CHOICEWINVISTA%'=='1' GOTO WINVISTA_HELP
IF '%CHOICEWINVISTA%'=='2' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WINVISTACORE.RSAIO', 'C:\WINVISTACORE.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WINVISTA_CORE
IF '%CHOICEWINVISTA%'=='3' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WINVISTAADV.RSAIO', 'C:\WINVISTAADV.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WINVISTA_ADV
IF '%CHOICEWINVISTA%'=='7' GOTO WINVISTA_TOOLS
IF '%CHOICEWINVISTA%'=='8' GOTO WINVISTA_REVERT_BACK
IF '%CHOICEWINVISTA%'=='9' GOTO WINVISTA_EXIT_LOG
IF '%CHOICEWINVISTA%'=='!' GOTO BEGIN
GOTO WINVISTA_VER

:WINVISTA_EXIT_LOG
CALL :Log Menu Zakoñczenie skryptu
EXIT

:WINVISTA_HELP
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 1
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Vista
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Pomoc
ECHO[
ECHO  ... Tryb CORE - usuni©ta telemetria oraz podstawowe szpiegi w systemie
ECHO  - Wyˆ¥cza wpisy dotycz¥ce Windows Media Center /kto go nie u¾ywa ˜miaˆo mo¾na wyˆ¥czy†/
ECHO  - Usuwanie wpis¢w szpieguj¥cyh z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie zb©dnych zadaä z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie usˆugi Windows Error Reporting, usuni©cie zadaä z Harmonogramu Zadaä
ECHO  - Wyˆaczenie usˆugi Windows Search
ECHO  - Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
ECHO  - Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
ECHO  - Wyˆ¥czenie usˆugi Zdalnego Rejestru
ECHO  - Wyˆ¥czenie zb©dnych usˆug
ECHO  - ReadyBoost
ECHO  - Tablet
ECHO  - Usuni©cie zb©dnych pozycji autostartu
ECHO  - Usuni©cie plik¢w raport¢w
ECHO  - WERVista ustawienia + data 0
ECHO  - SQMVista ustawienia + data 0
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 2
CLS
ECHO[
ECHO  ... Tryb ADV - blokuje mo¾liwie najwi©cej (dotychczas znanych oczywi˜cie) szpieg¢w
ECHO      wysyˆaj¥cych informacji do M$, opcja odpowiednia dla os¢b ceni¥cych sobie prywatno˜†
ECHO      Tryb ADV oczywi˜cie zawiera w sobie Tryb CORE
ECHO  - Blokowanie HOSTS:
ECHO  - Sklep Windows, Xbox Live
ECHO  - Blokowanie SZPIEGOWANIA MICROSOFT
ECHO  - Blokowanie HOSTS SKYPE REKLAMY
ECHO  - Blokowanie HOSTS MICROSOFT+NSA:
ECHO  - Windows, Windows Mobile, Live.com, MS Online Directory Service, MSN.com, SmartScreen (filter),
ECHO  - Dynamics.com, Zune, others, AutoDesk-NSA, Disney-NSA, Marvel comics, ABC TV channel,
ECHO  - Grolier-NSA, HP, PubTech-NSA, House of Frasier, Swiftserve-NSA, WWE-NSA,
ECHO -  NameServers, unidentified
ECHO  - BLOKADA IP - ROUTING - mo¾e blokowa† serwery aktywacji Microsoft ^^!^^!^^!
ECHO[
ECHO  ^^! Tryb CORE: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                     Oczyszcza wszystko poza poprzednimi instalacjami OS i plikami Upgrade'u.
ECHO[
ECHO  ^^! Tryb ADV/HIGH: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                            Oczyszcza wszystkie dost©pne opcje w tym narz©dziu.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 3
CLS
ECHO[
ECHO  ... Je¾eli potrzebujesz zmodyfikowa† skrypt pod wˆasne ustawienia. Dowoln¥ linie w skrypcie mo¾na
ECHO      pomin¥† wpisuj¥c REM przed t¥ lini¥ np. 
ECHO      REM CALL :SubExec NET STOP "diagtrack" - zostanie ona pomini©ta 
ECHO[
ECHO  ... Zestaw NARZ¨DZI / HOSTS / ROUTE - w ˆatwy spos¢b pozwala na zarz¥dzanie plikiem hosts
ECHO      oraz dodatkowe funkcje zwi¥zane ze skryptem
ECHO[
ECHO  ... Tryb DIAGNOSTYCZNY - sprawdzenie czy skrypt jest przyczyn¥ nieprawidˆowego dziaˆania
ECHO      programu, funkcji systemu Windows Vista - cofa zmiany dokonane przez skrypt
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 4
CLS
ECHO[
ECHO  ... Przeˆ¥czniki wiersza poleceä:
ECHO   /noupdate     - pomija sprawdzanie on-line czy wersja programu jest aktualna
ECHO   /norestore    - bez tworzenia punktu przywracania
ECHO   /quickrestore - szybki - asynchronicznie(!) wykonywany do skryptu, punkt przywracania systemu
ECHO                   z domy˜ln¥ nazw¥ oraz bi©¾¥cym czasem wykonania np: 
ECHO                   WinVISTA RemoveSpy_AIO - /quickrestore 2016-12-27_14:03:50
ECHO   /nocleanmgr   - bez u¾ycia narz©dzia Windows Cleanmgr 
ECHO   /core         - wybrano tryb automatyczny CORE
ECHO   /adv          - wybrano tryb automatyczny ADV
ECHO   /restart      - automatyczny restart komptera w 10 sekund po zakoäczeniu skryptu
ECHO   /shutdown     - automatyczne wyˆ¥cznie komputera w 10 sekund po zakoäczeniu skryptu
ECHO[
ECHO  ... W przypadku u¾ycia dw¢ch tryb¢w pierwszeästwo ma zawsze najni¾szy (CORE)
ECHO[
ECHO  ... Przykˆad u¾ycia: RemoveSPY_AIOv2.cmd /norestore /nocleanmgr /restart /adv
ECHO   Skrypt uruchomi si© automatycznie dla danego systemu:
ECHO   bez punktu przywracania systemu, bez u¾ycia narz©dzia Windows Cleanmgr w trybie ADV i 
ECHO   po 10 sekundach wykona restart
ECHO[
ECHO  ... Przeˆ¥czniki mo¾na stosowa† w dowolnej kolejno˜ci
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby powr¢ci† do menu gˆ¢wnego
PAUSE > NUL
GOTO WINVISTA_VER
EXIT

:WINVISTA_TOOLS
SET HOSTS_TYPE_MS=WINVISTA_EDIT
SET ROUTE_TYPE_MS=WINVISTA_EDIT
SET EVENT_TYPE_MS=WINVISTA_EDIT
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Narz©dzia
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Vista
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Narz©dzia
ECHO[
ECHO  1. Utw¢rz kopi© pliku hosts z bie¾¥c¥ dat¥ i godzin¥   
ECHO[
ECHO  2. Przywr¢† oryginalny plik hosts
ECHO[
ECHO  3. Otw¢rz i edytuj plik hosts / zdj©ta blokada zapisu /
ECHO[
ECHO  4. Wstaw do hosts wpisy blokuj¥ce M$
ECHO[
ECHO  5. Wstaw do hosts wpisy blokuj¥ce reklamy Skype
ECHO[
ECHO  6. Wstaw do hosts wpisy blokuj¥ce M$ + NSA
ECHO[
ECHO  N. Wstaw do hosts wpisy blokuj¥ce (N)OCOIN - kopanie ET/BIT/etc-COIN¢w
ECHO[
ECHO  7. Odblokuj ROUTE
ECHO[
ECHO  O. Zablokuj R(O)UTE
ECHO[
ECHO  Z. Wyczy˜† Dziennik (Z)darzeä systemu Windows
ECHO[
ECHO  8. Otw¢rz p(l)ik / Wy(c)zy˜† plik logu [ C:\Windows\RemoveSpy_AIO.log ]
ECHO[
ECHO  9. Powr¢t do menu gˆ¢wnego ...
ECHO[
SET /P CHOICEWINVISTATOOLS= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWINVISTATOOLS%'=='' ECHO "%CHOICEWINVISTATOOLS%" Wpisz jeszcze raz
IF '%CHOICEWINVISTATOOLS%'=='1' GOTO WINVISTA_TOOLS_HOSTS_KOPIA
IF '%CHOICEWINVISTATOOLS%'=='2' GOTO WINVISTA_TOOLS_HOSTS_CLEAR
IF '%CHOICEWINVISTATOOLS%'=='3' GOTO WINVISTA_TOOLS_HOSTS_EDIT
IF '%CHOICEWINVISTATOOLS%'=='4' GOTO HOSTS_MS
IF '%CHOICEWINVISTATOOLS%'=='5' GOTO HOSTS_SKYPE
IF '%CHOICEWINVISTATOOLS%'=='6' GOTO HOSTS_NSA
IF '%CHOICEWINVISTATOOLS%'=='n' GOTO HOSTS_NOCOIN
IF '%CHOICEWINVISTATOOLS%'=='N' GOTO HOSTS_NOCOIN
IF '%CHOICEWINVISTATOOLS%'=='7' GOTO ROUTE_REVERTBACK
IF '%CHOICEWINVISTATOOLS%'=='o' GOTO ROUTE
IF '%CHOICEWINVISTATOOLS%'=='O' GOTO ROUTE
IF '%CHOICEWINVISTATOOLS%'=='z' GOTO EVENTLOGCLEANER
IF '%CHOICEWINVISTATOOLS%'=='Z' GOTO EVENTLOGCLEANER
IF '%CHOICEWINVISTATOOLS%'=='9' GOTO WINVISTA_VER
IF '%CHOICEWINVISTATOOLS%'=='L' GOTO WINVISTA_RSAIO_LOG
IF '%CHOICEWINVISTATOOLS%'=='l' GOTO WINVISTA_RSAIO_LOG
IF '%CHOICEWINVISTATOOLS%'=='C' GOTO WINVISTA_CLEARLOG
IF '%CHOICEWINVISTATOOLS%'=='c' GOTO WINVISTA_CLEARLOG
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_TOOLS_HOSTS_KOPIA
@ECHO OFF
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :Log HOSTS kopia
ECHO[
ECHO ÿ... Kopia hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_TOOLS_HOSTS_CLEAR
CLS
@ECHO OFF
REM ZDJ¨CIE ATRYBUTU READ
ATTRIB -R %AIO_HOSTS%
REM Plik Hosts na nowo
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO[>>%AIO_HOSTS%
ECHO ^       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^       ::1             localhost>>%AIO_HOSTS%

CALL :Log HOSTS oryginalny
REM ZAO½ENIE ATRYBUTU READ
ATTRIB +R %AIO_HOSTS%
REM Koniec ppisania na nowo pliku HOSTS
ECHO[
ECHO ÿ... Oryginalny plik hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_TOOLS_HOSTS_EDIT
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
CALL :SubExec START notepad.exe %AIO_HOSTS%
CALL :Log HOSTS edycja
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_RSAIO_LOG
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_LOG%
CALL :Log RemoveSpy_AIO.log - Wyœwietlenie
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_CLEARLOG
REM. > %AIO_LOG%
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO% >> %AIO_LOG%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%>> %AIO_LOG%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Vista >> %AIO_LOG%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    LOG >> %AIO_LOG%
ECHO[
ECHO ÿ... RemoveSpy_AIO.log - Wyczyszczony - wci˜nij dowolny klawisz lub poczekaj
GOTO WINVISTA_TOOLS
EXIT

:WINVISTA_ADV
SET CLEANMGRV=1
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV
CALL :Log ... Tryb ADV

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... HOSTS
CALL :Log ... Tryb ADV ... HOSTS
GOTO HOSTS_MS
:WINVISTA_BACK_HOSTS

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ROUTE
CALL :Log ... Tryb ADV ... ROUTE
GOTO ROUTE
:WINVISTA_BACK_ROUTE

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... EVENTLOGCLEANER
CALL :Log ... Tryb ADV ... EVENTLOGCLEANER
GOTO EVENTLOGCLEANER
:WINVISTA_BACK_EVENTLOGCLEANER

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... DEFENDER
CALL :Log ... Tryb ADV ... DEFENDER
REM Wyˆ¥czenie usˆugi Windows Defender
CALL :SubExec NET STOP "WinDefend"
CALL :SubExec SC CONFIG "WinDefend" START= DISABLED
REM Wyˆ¥czenie zadaä Defendera
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
REM Usuni©cie skr¢tu w auto-starcie
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Defender" /F
REM Ustawienie jak wyˆ¥czony skr¢t w auto-starcie
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutorunsDisabled" /V "Windows Defender" /T REG_EXPAND_SZ /D ^%ProgramFiles^%"\Windows Defender\MSASCui.exe -hide" /F
GOTO WINVISTA_CORE

:WINVISTA_CORE
SET /A "CLEANMGRV=CLEANMGRV+1"
CLS
REM Wyˆ¥czenie usˆugi ekranu dotykowego
@ECHO off
FOR /f "tokens=2 delims= " %%i in ('wmic cpu get name') DO SET osv=%%i
ECHO %osv%>nul
ECHO %osv%|find /I "Atom">nul && GOTO WINVISTA_TOUCH_SKIP||GOTO WINVISTA_TOUCH_DISABLE

:WINVISTA_TOUCH_DISABLE
CALL :Log Brak ekranu dotykowego - wyˆ¥czam usˆug©
CALL :SubExec NET STOP "TabletInputService"
CALL :SubExec SC CONFIG "TabletInputService" START= DISABLED
GOTO WINVISTA_TOUCH_NEXT

:WINVISTA_TOUCH_SKIP
CALL :Log Wykryto ekran dotykowy - nie wyˆ¥czam usˆugi
GOTO WINVISTA_TOUCH_NEXT

:WINVISTA_TOUCH_NEXT
CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... HARMONOGRAM ZADAã  MEDIA CENTER
CALL :Log ... Tryb CORE ... HARMONOGRAM ZADAã MEDIA CENTER
REM Wyˆ¥cza wpisy dotycz¥ce Windows Media Center - kto go nie u¾ywa ˜miaˆo mo¾na wyˆ¥czy†
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... HARMONOGRAM ZADAã WPISY SZPIEGUJ¤CE
CALL :Log ... Tryb CORE ... HARMONOGRAM ZADAã WPISY SZPIEGUJ¤CE
REM Usuwanie wpis¢w szpieguj¥cych z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\OptInNotification"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\OptInNotification" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader" /F
REM 2016
CALL :SubExec SCHTASKS /END /TN "\Intel\Intel Telemetry 2"
CALL :SubExec SCHTASKS /DELETE /TN "\Intel\Intel Telemetry 2" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZB¨DNE ZADANIA
CALL :Log ... CORE ... ZBÊDNE ZADANIA
REM Wyˆ¥czenie zb©dnych zadaä z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SideShow\GadgetManager"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SideShow\GadgetManager"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\CrawlStartPages"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\CrawlStartPages"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Wired\GatherWiredInfo"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Wired\GatherWiredInfo"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Wireless\GatherWirelessInfo"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Wireless\GatherWirelessInfo"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ERROR REPORTING
CALL :Log ... CORE ... ERROR REPORTING
REM Wyˆ¥czenie usˆugi Windows Error Reporting, usuni©cie zadaä z harmonogramu
CALL :SubExec NET STOP "WerSvc"
CALL :SubExec SC CONFIG "WerSvc" START= DISABLED
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUGI
CALL :Log ... CORE ... US£UGI
REM Wyˆ¥czenie zb©dnych usˆug
REM Wyˆ¥czenie usˆugi Windows Search
CALL :SubExec NET STOP "WSearch"
CALL :SubExec SC CONFIG "WSearch" START= DISABLED
REM Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec NET STOP "WMPNetworkSvc"
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= DISABLED
REM Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec NET STOP "TrkWks"
CALL :SubExec SC CONFIG "TrkWks" START= DISABLED
REM Wyˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec NET STOP "RemoteRegistry"
CALL :SubExec SC CONFIG "RemoteRegistry" START= DISABLED
REM ReadyBoost
CALL :SubExec NET STOP "EMDMgmt"
CALL :SubExec SC CONFIG "EMDMgmt" START= DISABLED

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... AUTOSTART
CALL :Log ... CORE ... AUTOSTART
REM Usuni©cie zb©dnych pozycji autostartu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6015F}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUNI¨CIE RAPORTàW
CALL :Log ... CORE ... USUNIÊCIE RAPROTÓW
REM Usuni©cie plik¢w raport¢w
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Diagnosis\"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WER
CALL :Log ... CORE ... WER
REM WER Vista ustawienia + data 0
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ConfigureArchive" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableArchive" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "Disabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableQueue" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontShowUI" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ForceQueue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LoggingDisabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontSendAdditionalData" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxArchiveCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Consent" /V "DefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ErrorPort" /T REG_SZ /D "\\No_SPY" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Consent" /V "NewUserDefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\HeapControlledList\dwm.exe" /V "EnableHeapThrottle" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscordacwks.dll" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM
CALL :Log ... Tryb CORE ... SQM
REM SQMVista ustawienia + data 0
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "MachineID" /T REG_SZ /D "00000000-0000-0000-0000-000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\IE" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\RAC" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Reliability" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "WSqmConsLastRunTime" /T REG_BINARY /D "0000000000000000" /F
GOTO END

:WINVISTA_REVERT_BACK
cls
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... TRYB DIAGNOSTYCZNY
CALL :Log Diagnostyczny kopia HOSTS
REM Plik Hosts na nowo + Kopia pliku hosts.bak
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
REM Plik Hosts na nowo
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^ÿ>>%AIO_HOSTS%
ECHO ^       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^       ::1             localhost>>%AIO_HOSTS%
REM ZAO½ENIE ATRYBUTU READ
CALL :SubExec ATTRIB +R %AIO_HOSTS%
REM Koniec wpisania na nowo pliku HOSTS

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... DEFENDER
CALL :Log ... Tryb Diagnostyczny ... DEFENDER
REM Wˆ¥czenie usˆugi Windows Defender
CALL :SubExec SC CONFIG "WinDefend" START= AUTO
CALL :SubExec NET START "WinDefend"
REM Wˆ¥czenie zadaä Defendera
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
REM Usuni©cie jak wˆ¥czony skr¢t w auto-starcie
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutorunsDisabled" /V "Windows Defender" /F
REM Dodanie skr¢tu w w auto-starcie
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Windows Defender" /T REG_EXPAND_SZ /D ^%ProgramFiles^%"\Windows Defender\MSASCui.exe -hide" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... MEDIA CENTER
CALL :Log ... Tryb Diagnostyczny ... MEDIA CENTER
REM Wˆ¥cza wpisy dotycz¥ce Windows Media Center
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ZB©DNE ZADANIA
CALL :Log ... Tryb Diagnostyczny ... ZBÊDNE ZADANIA
REM Wˆ¥czenie zb©dnych zadaä
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\SideShow\GadgetManager"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\CrawlStartPages"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Wired\GatherWiredInfo"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Wireless\GatherWirelessInfo"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... US£UGI
CALL :Log ... Tryb Diagnostyczny ... US£UGI

REM Wˆ¥czenie usˆugi Windows Search
CALL :SubExec SC CONFIG "WSearch" START= AUTO
CALL :SubExec NET START "WSearch"
REM Wˆ¥czenie usˆugi Windows Error Reporting
CALL :SubExec SC CONFIG "WerSvc" START= AUTO
CALL :SubExec NET START "WerSvc"
REM Wˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= AUTO
CALL :SubExec NET START "WMPNetworkSvc"
REM Wˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec SC CONFIG "TrkWks" START= AUTO
CALL :SubExec NET START "TrkWks"
REM Wˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec SC CONFIG "RemoteRegistry" START= AUTO
CALL :SubExec NET START "RemoteRegistry"
REM Wˆ¥czenie zb©dnych usˆug
REM ReadyBoost
CALL :SubExec SC CONFIG "EMDMgmt" START= AUTO
CALL :SubExec NET START "EMDMgmt"
REM Wˆ¥czenie usˆugi ekranu dotykowego
CALL :SubExec SC CONFIG "TabletInputService" START= AUTO
CALL :SubExec NET START "TabletInputService"

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... KOPIA HOSTS
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
CALL :Log ... Tryb Diagnostyczny ... nowy HOSTS
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO[>>%AIO_HOSTS%
ECHO ^       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^       ::1             localhost>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ROUTE
CALL :Log ... Tryb Diagnostyczny ... ROUTE
GOTO ROUTE_REVERTBACK
:WINVISTA_BACK_ROUTE_REVERTBACK
GOTO END_CHANGE
EXIT









:WIN7_VER
SET HOSTS_TYPE_MS=WIN7_SKRYPT
SET ROUTE_TYPE_MS=WIN7_SKRYPT
SET EVENT_TYPE_MS=WIN7_SKRYPT
SET CLEANMGRV=0
SET CLEANMGR7=0
SET CLEANMGR81=0
SET CLEANMGR10=0
MODE CON COLS=100 lines=42 & Color 71

IF /I "%1"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%2"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%3"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%4"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%5"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%6"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%7"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%8"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE
IF /I "%9"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN7_CORE

IF /I "%1"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%2"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%3"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%4"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%5"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%6"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%7"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%8"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV
IF /I "%9"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN7_ADV

CALL :Log Menu
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win7
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Menu
ECHO[
ECHO  1. Przed u¾yciem uwa¾nie przeczytaj ^^!^^!^^! / Instrukcja obsˆugi / Pomoc
ECHO[
ECHO  2. Tryb CORE
ECHO[
ECHO  3. Tryb ADV = ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  -------------------------------------------------------------------------------------------------
ECHO  5. Tryb PRO = Usuni©cie komponent¢w Systemu Windows ^^!^^!^^^! UWAGA tylko i wyˆ¥cznie TRYB PRO ^^!^^!^^!
ECHO            Tylko dla zaawansowanych (wymagana edycja skryptu) i bli¾szych formatu C: ^^!^^!^^!^^!
ECHO          Koniecznie przeczytaj instrukcj© uzytkowana tego trybu przed uruchomieniem go ^^!^^!^^!^^!
ECHO             UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO  -------------------------------------------------------------------------------------------------
ECHO[
ECHO  7. Zestaw NARZ¨DZI / HOSTS / ROUTE / LOG
ECHO[
ECHO  8. Tryb DIAGNOSTYCZNY - Cofni©cie zmian dokonanych przez skrypt
ECHO[
ECHO  9. Wyj˜cie
ECHO[
ECHO  ^^!. Uruchom skrypt od nowa
ECHO[
SET /P CHOICEWIN7= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN7%'=='' ECHO "%CHOICEWIN7%" Wpisz jeszcze raz
IF '%CHOICEWIN7%'=='1' GOTO WIN7_HELP
IF '%CHOICEWIN7%'=='2' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN7CORE.RSAIO', 'C:\WIN7CORE.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN7_CORE
IF '%CHOICEWIN7%'=='3' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN7ADV.RSAIO', 'C:\WIN7ADV.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN7_ADV
IF '%CHOICEWIN7%'=='5' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN7PRO.RSAIO', 'C:\WIN7PRO.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN7_PRO
IF '%CHOICEWIN7%'=='7' GOTO WIN7_TOOLS
IF '%CHOICEWIN7%'=='8' GOTO WIN7_REVERT_BACK
IF '%CHOICEWIN7%'=='9' GOTO WIN7_EXIT_LOG
IF '%CHOICEWIN7%'=='!' GOTO BEGIN
GOTO WIN7_VER

:WIN7_EXIT_LOG
CALL :Log Win7 Menu Zakoñczenie skryptu
EXIT

:WIN7_HELP
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 1
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win7
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Pomoc
ECHO[ 
ECHO  ... Tryb CORE - usuni©ta telemetria oraz podstawowe szpiegi w systemie
ECHO  - Wyˆ¥czenie wpis¢w dotycz¥cych Windows Media Center /kto go nie u¾ywa ˜miaˆo mo¾na wyˆ¥czy†/
ECHO  - Usuwanie wpis¢w szpieguj¥cyh z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
ECHO  - Usuni©cie zb©dnych zadaä z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie usˆugi Windows Error Reporting, usuni©cie zadaä z Harmonogramu Zadaä
ECHO  - Zatrzymanie i Wyˆ¥czenie usˆugi oraz klucza rejestru DiagTrackListener i katalogu AutoLogger
ECHO  - Wyˆ¥czenie usˆugi Windows Search
ECHO  - Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
ECHO  - Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
ECHO  - Wyˆ¥czenie usˆugi Zdalnego Rejestru
ECHO  - Wyˆ¥czenie usˆugi —ledzenia ETW Internet Explorer
ECHO  - Wyˆ¥czenie usˆugi Biom(e)tryki - np. czujnik lini papilarnych etc 
ECHO  - Wyˆ¥czenie usˆugi Windows Defender
ECHO  - Wyˆ¥czenie zadaä Windows Defender w Harmonogramie Zadaä
ECHO  - Wyˆ¥czenie SQM oraz usuni©cie plik¢w stworzonych przez te narz©dzie
ECHO  - Perfmon delete AIT
ECHO  - Usuni©cie log¢w i raport¢w ze szpiegowania
ECHO  - Usuni©cie zb©dnych pozycji autostartu
ECHO  - Wyˆ¥czenie SQM dla Windows Media Playera
ECHO  - WER7 ustawienia + data 0
ECHO  - SQM7 ustawienia + data 0
ECHO  - WMI Autologger data 0
ECHO  - Wyˆ¥czenie w Harmonogramie Zadaä Office2016
ECHO  - Wyˆ¥czenie w Harmonogramie Zadaä Office2013
ECHO  - Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL

TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 2
CLS
ECHO[
ECHO  ... Tryb ADV - blokuje mo¾liwie najwi©cej (dotychczas znanych oczywi˜cie) szpieg¢w
ECHO      wysyˆaj¥cych informacji do M$, opcja odpowiednia dla os¢b ceni¥cych sobie prywatno˜†
ECHO      Tryb ADV oczywi˜cie zawiera w sobie Tryb CORE
ECHO  - Blokowanie HOSTS
ECHO  - Sklep Windows, Xbox Live
ECHO  - Blokowanie SZPIEGOWANIA MICROSOFT
ECHO  - Blokowanie HOSTS SKYPE REKLAMY
ECHO  - Blokowanie HOSTS MICROSOFT+NSA:
ECHO  - Windows, Windows Mobile, Live.com, MS Online Directory Service, MSN.com, SmartScreen (filter),
ECHO  - Dynamics.com, Zune, others, AutoDesk-NSA, Disney-NSA, Marvel comics, ABC TV channel,
ECHO  - Grolier-NSA, HP, PubTech-NSA, House of Frasier, Swiftserve-NSA, WWE-NSA,
ECHO  - NameServers, unidentified
ECHO  - BLOKADA IP - ROUTING - mo¾e blokowa† serwery aktywacji Microsoft ^^!^^!^^!
ECHO[
ECHO  ^^! Tryb CORE: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                       Oczyszcza wszystko poza poprzednimi instalacjami OS i plikami Upgrade'u.
ECHO[
ECHO  ^^! Tryb ADV: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                         Oczyszcza wszystkie dost©pne opcje w tym narz©dziu.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL

TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 3
CLS
ECHO[
ECHO  ... Je¾eli potrzebujesz zmodyfikowa† skrypt pod wˆasne ustawienia. Dowoln¥ linie w skrypcie mo¾na
ECHO      pomin¥† wpisuj¥c REM przed t¥ lini¥ np.
ECHO      REM CALL :SubExec NET STOP "diagtrack" - zostanie ona pomini©ta
ECHO[
ECHO  ... Zestaw NARZ¨DZI / HOSTS / ROUTE - w ˆatwy spos¢b pozwala na zarz¥dzanie plikiem hosts
ECHO      oraz dodatkowe funkcje zwi¥zane ze skryptem
ECHO[
ECHO  ... Tryb DIAGNOSTYCZNY - sprawdzenie czy skrypt jest przyczyn¥ nieprawidˆowego dziaˆania
ECHO      programu, funkcji systemu Windows 7 - cofa zmiany dokonane przez skrypt
ECHO      w Trybie CORE i ADV
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL

TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 4
CLS
ECHO[
ECHO  ... Przeˆ¥czniki wiersza poleceä:
ECHO   /noupdate     - pomija sprawdzanie on-line czy wersja programu jest aktualna
ECHO   /norestore    - bez tworzenia punktu przywracania
ECHO   /quickrestore - szybki - asynchronicznie(!) wykonywany do skryptu, punkt przywracania systemu
ECHO                   z domy˜ln¥ nazw¥ oraz bi©¾¥cym czasem wykonania np: 
ECHO                   Win7 RemoveSpy_AIO - /quickrestore 2016-12-27_14:03:50
ECHO   /nocleanmgr   - bez u¾ycia narz©dzia Windows Cleanmgr 
ECHO   /core         - wybrano tryb automatyczny CORE
ECHO   /adv          - wybrano tryb automatyczny ADV
ECHO   /restart      - automatyczny restart komptera w 10 sekund po zakoäczeniu skryptu
ECHO   /shutdown     - automatyczne wyˆ¥cznie komputera w 10 sekund po zakoäczeniu skryptu
ECHO[
ECHO  ... W przypadku u¾ycia dw¢ch tryb¢w pierwszeästwo ma zawsze najni¾szy (CORE)
ECHO[
ECHO  ... Przykˆad u¾ycia: RemoveSPY_AIOv23.cmd /norestore /nocleanmgr /restart /adv
ECHO   Skrypt uruchomi si© automatycznie dla danego systemu:
ECHO   bez punktu przywracania systemu, bez u¾ycia narz©dzia Windows Cleanmgr w trybie ADV i 
ECHO   po 10 sekundach wykona restart
ECHO[
ECHO  ... Przeˆ¥czniki mo¾na stosowa† w dowolnej kolejno˜ci
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 5
CLS
ECHO[
ECHO  ... Opis Trybu PRO:
ECHO[
ECHO   Tryb ten  polega na USUNI¨CIU z Windowsa okre˜lonych KOMPONENTàW,
ECHO[  peˆna ich lista jest w skrypcie - zaczyna sie od etykiety :WIN10PRO .
ECHO   Wszystkie te komponenty s¥ w p©tli - czyli s¥ usuwane po kolei.
ECHO   Nale¾y dostosowa† list© komponent¢w kt¢re potrzebujesz usun¥†,
ECHO   trzeba wykasowa† komentarz /REM-/ na pocz¥tku lini p©tli.
ECHO   Aby pozostawi† wybrane komponenty powinno to wygl¥da† tak:
ECHO    REM-Microsoft-Windows-TabletPC,
ECHO    REM-Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   Aby usun¥† wybrane komponenty powinno to wygl¥da† tak:
ECHO    Microsoft-Windows-TabletPC
ECHO    Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   NIE MO½LIWO—CI PRZYWRàCENIA ICH - TO JEST WYCIECZKA TYLKO W JEDN¤ STRON¨ BEZ POWROTU ^^!^^!^^!  
ECHO[
ECHO   Uwaga Tryb Online - do prawidˆowego dziaˆania pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO   Tryb PRO jest przeznaczony bardziej dla os¢b bli¾szych formatu dysku C:  
ECHO   Mo¾na w ten spos¢b potestowa† jak dziaˆa Windows bez zb©dnego balastu, sprawdzi† stabilno˜†.
ECHO[
ECHO   Bardzo zale¾y mi na feedbacku z tytuˆu u¾ytkowania tak 'okrojonego' Windowsa na realnym sprz©cie 
ECHO   i w realnych warunkach u¾ytkowania a nie np. na VirtualBoxie.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby powr¢ci† do menu gˆ¢wnego
PAUSE > NUL
GOTO WIN7_VER
EXIT

:WIN7_TOOLS
SET HOSTS_TYPE_MS=WIN7_EDIT
SET ROUTE_TYPE_MS=WIN7_EDIT
SET EVENT_TYPE_MS=WIN7_EDIT
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Narz©dzia
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win7
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Narz©dzia
ECHO[
ECHO  1. Utw¢rz kopi© pliku hosts z bie¾¥c¥ dat¥ i godzin¥   
ECHO[
ECHO  2. Przywr¢† oryginalny plik hosts
ECHO[
ECHO  3. Otw¢rz i edytuj plik hosts / zdj©ta blokada zapisu /
ECHO[
ECHO  4. Wstaw do hosts wpisy blokuj¥ce M$
ECHO[
ECHO  5. Wstaw do hosts wpisy blokuj¥ce reklamy Skype
ECHO[
ECHO  6. Wstaw do hosts wpisy blokuj¥ce M$ + NSA
ECHO[
ECHO  N. Wstaw do hosts wpisy blokuj¥ce (N)OCOIN - kopanie ET/BIT/etc-COIN¢w
ECHO[
ECHO  7. Odblokuj ROUTE
ECHO[
ECHO  O. Zablokuj R(O)UTE
ECHO[
ECHO  Z. Wyczy˜† Dziennik (Z)darzeä systemu Windows
ECHO[
ECHO  8. Otw¢rz p(L)ik / Wy(c)zy˜† plik logu [ C:\Windows\RemoveSpy_AIO.log ]
ECHO[
ECHO  e. Odblokowanie Biom(e)tryki - np. czujnik lini papilarnych etc ... 
ECHO[
ECHO  9. Powr¢t do menu gˆ¢wnego ...
ECHO[
SET /P CHOICEWIN7TOOLS= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN7TOOLS%'=='' ECHO "%CHOICEWIN7TOOLS%" Wpisz jeszcze raz
IF '%CHOICEWIN7TOOLS%'=='1' GOTO WIN7_TOOLS_HOSTS_KOPIA
IF '%CHOICEWIN7TOOLS%'=='2' GOTO WIN7_TOOLS_HOSTS_CLEAR
IF '%CHOICEWIN7TOOLS%'=='3' GOTO WIN7_TOOLS_HOSTS_EDIT
IF '%CHOICEWIN7TOOLS%'=='4' GOTO HOSTS_MS
IF '%CHOICEWIN7TOOLS%'=='5' GOTO HOSTS_SKYPE
IF '%CHOICEWIN7TOOLS%'=='6' GOTO HOSTS_NSA
IF '%CHOICEWIN7TOOLS%'=='n' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN7TOOLS%'=='N' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN7TOOLS%'=='7' GOTO ROUTE_REVERTBACK
IF '%CHOICEWIN7TOOLS%'=='e' GOTO WIN7_BIOMETRYKA_UNBLOCK
IF '%CHOICEWIN7TOOLS%'=='o' GOTO ROUTE
IF '%CHOICEWIN7TOOLS%'=='O' GOTO ROUTE
IF '%CHOICEWIN7TOOLS%'=='z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN7TOOLS%'=='Z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN7TOOLS%'=='9' GOTO WIN7_VER
IF '%CHOICEWIN7TOOLS%'=='L' GOTO WIN7_RSAIO_LOG
IF '%CHOICEWIN7TOOLS%'=='l' GOTO WIN7_RSAIO_LOG
IF '%CHOICEWIN7TOOLS%'=='C' GOTO WIN7_CLEARLOG
IF '%CHOICEWIN7TOOLS%'=='c' GOTO WIN7_CLEARLOG
GOTO WIN7_TOOLS
EXIT

:WIN7_TOOLS_HOSTS_KOPIA
CLS
@ECHO OFF
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :Log HOSTS kopia
ECHO[
ECHO ÿ... Kopia hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj 
TIMEOUT /T 4 > NUL
GOTO WIN7_TOOLS
EXIT

:WIN7_TOOLS_HOSTS_CLEAR
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
REM Plik Hosts na nowo
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO[>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
CALL :Log HOSTS oryginalny
CALL :SubExec ATTRIB +R %AIO_HOSTS%
REM Koniec wpisania na nowo pliku HOSTS
ECHO[
ECHO[
ECHO ÿ... Oryginalny plik hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WIN7_TOOLS
EXIT

:WIN7_TOOLS_HOSTS_EDIT
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_HOSTS%
CALL :Log HOSTS edycja
GOTO WIN7_TOOLS
EXIT

:WIN7_RSAIO_LOG
CLS
@ECHO OFF
ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_LOG%
CALL :Log RemoveSpy_AIO.log - Wyœwietlenie
GOTO WIN7_TOOLS
EXIT

:WIN7_CLEARLOG
REM. > %AIO_LOG%
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO% >> %AIO_LOG%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION% >> %AIO_LOG%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win7 >> %AIO_LOG%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    LOG >> %AIO_LOG%
ECHO[
ECHO ÿ... RemoveSpy_AIO.log - Wyczyszczony - wci˜nij dowolny klawisz lub poczekaj ...
TIMEOUT /T 2 > NUL
GOTO WIN7_TOOLS
EXIT

:WIN7_ROUTE_BLOCK
@ECHO OFF
CLS
GOTO ROUTE
GOTO WIN7_TOOLS
EXIT

:WIN7_BIOMETRYKA_UNBLOCK
@ECHO OFF
CLS
ECHO[
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F
ECHO[
ECHO ÿ... Usˆuga odpowiedzialna za Biometryk© zostaˆa odblokowana
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log Us³uga odpowiedzialna za Biometryk© zosta³a odblokowana
GOTO WIN7_TOOLS
EXIT

:WIN7_PRO
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Pro
CALL :Log ... Tryb Pro ... Start
CALL :Log czego szukasz tu ^^?
ECHO %osc%|find "Starter">nul && GOTO WIN7_PRO_NOSUPPORT
ECHO %osc%|find "HomeBasic">nul && GOTO WIN7_PRO_NOSUPPORT
ECHO %osc%|find "HomePremium">nul && GOTO WIN7_PRO_START
ECHO %osc%|find "Professional">nul && GOTO WIN7_PRO_START
ECHO %osc%|find "Ultimate">nul && GOTO WIN7_PRO_NOSUPPORT
GOTO WIN7_PRO_NOSUPPORT

:WIN7_PRO_START
CALL :Log ... Windows 7 PRO START ...
CLS
ECHO  ... Na Pewno 
ECHO[
PAUSE
ECHO[
ECHO  ... Na Pewno chcesz , zmodyfikowaˆe˜ tryb pod wˆasne potrzeby ^?
ECHO[
ECHO  ... Domy˜lnie tryb jest wyˆ¥czony ^^!
ECHO[
PAUSE
ECHO[
ECHO  ... Na Pewno tego chcesz, czytaˆe˜ instrukcj© dost©pna w gˆ¢wnym menu do tego trybu ^?^?
ECHO[
PAUSE
ECHO[
ECHO  ... Na Pewno tego chcesz - ostatnia szansa by si© wycofa† ^^!^^!^^!

:::::::::::::::::::::::::::::::::::::::::::::::::::::
:::                    Win7                       :::
:::   SEKCJA USUWANIA APLIKACJI Z SYSTEMU         :::
:::  usuä REM- przed WYBRAN¤ LINI¤ LUB LINIAMI    :::
:::  PONI½EJ W P¨TLI FOR%%x in (                  :::
:::  WTEDY USUNIE WYBRANE KOMPONENTY              :::
:::::::::::::::::::::::::::::::::::::::::::::::::::::

CLS
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET COUNT=1
FOR %%x IN (
REM-Microsoft-Hyper-V
REM-Mic-osoft-Windows-Anytime-Upgrade
REM-Microsoft-Windows-Backup
REM-Microsoft-Windows-Gadget-Platform
REM-Microsoft-Windows-Help
REM-Microsoft-Windows-IE-Hyphenation
REM-Microsoft-Windows-IE-Spelling-
REM-Microsoft-Windows-IE-Troubleshooters
REM-Microsoft-Windows-Indexing-Service
REM-Microsoft-Windows-MSMQ-Client
REM-Microsoft-Windows-Shell-HomeGroup
REM-Microsoft-Windows-Shell-InboxGames
REM-Microsoft-Windows-Shell-MultiplayerInboxGames
REM-Microsoft-Windows-Shell-PremiumInboxGames
REM-Microsoft-Windows-SnippingTool
REM-Microsoft-Windows-StickyNotes
REM-Microsoft-Windows-TabletPC-OC
REM-Microsoft-Windows-VirtualPC
REM-Microsoft-Windows-WMPNetworkSharingService
REM-Microsoft-Windows-Xps-Foundation
REM-Server-Help
) DO (
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "%%x" /r
SET /A "COUNT=COUNT+1"
CLS
ECHO                 Krok !COUNT! z 21
)
CALL :SubExec C:\install_wim_tweak.exe /h /o /l
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
DEL /F /Q %USERPROFILE%\Desktop\Packages.txt>nul 2>&1
CALL :Log ... Tryb Pro ... END
TIMEOUT /T 4
GOTO END

:WIN7_PRO_NOSUPPORT
CALL :Log ... No Support ...
CLS
GOTO END


:WIN7_ADV
SET CLEANMGR7=1
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% .... Tryb ADV
CALL :Log ... Tryb ADV

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... HOSTS
CALL :Log ... Tryb ADV ... HOSTS
GOTO HOSTS_MS
:WIN7_BACK_HOSTS

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ROUTE
CALL :Log ... Tryb ADV ... ROUTE
GOTO ROUTE
:WIN7_BACK_ROUTE

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... EVENTLOGCLEANER
CALL :Log ... Tryb ADV ... EVENTLOGCLEANER
GOTO EVENTLOGCLEANER
:WIN7_BACK_EVENTLOGCLEANER

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... BIOMETRYKA
CALL :Log ... Tryb ADV ... BIOMETRYKA
REM Wyˆ¥czenie Biometryki
REM Wyˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec NET STOP "WbioSrvc"
CALL :SubExec SC CONFIG "WbioSrvc" START= DISABLED
REM Wyˆ¥czenie w rejestrze
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /T REG_DWORD /D 0 /F
@ECHO OFF

TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... DEFENDER
CALL :Log ... Tryb ADV ... DEFENDER
REM Wyˆ¥czenie usˆugi Windows Defender
CALL :SubExec NET STOP "WinDefend"
CALL :SubExec SC CONFIG "WinDefend" START= DISABLED
REM Wyˆ¥czenie zadaä Windows Defender w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows Defender\MpIdleTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows Defender\MpIdleTask"
GOTO WIN7_CORE

:WIN7_CORE
SET /A "CLEANMGR7=CLEANMGR7+1"
CLS

REM Wyˆ¥czenie usˆugi ekranu dotykowego
@ECHO off
FOR /f "tokens=2 delims= " %%i in ('wmic cpu get name') DO SET os7=%%i
ECHO %os7%>nul
ECHO %os7%|find /I "Atom">nul && GOTO WIN7_TOUCH_SKIP||GOTO WIN7_TOUCH_DISABLE

:WIN7_TOUCH_DISABLE
CALL :Log Brak ekranu dotykowego - wyˆ¥czam usˆug©
CALL :SubExec NET STOP "TabletInputService"
CALL :SubExec SC CONFIG "TabletInputService" START= DISABLED
GOTO WIN7_TOUCH_NEXT

:WIN7_TOUCH_SKIP
CALL :Log Wykryto ekran dotykowy - nie wyˆ¥czam usˆugi
GOTO WIN7_TOUCH_NEXT

:WIN7_TOUCH_NEXT
CLS
CALL :Log ... Tryb CORE ... START
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... MEDIA CENTER
CALL :Log ... Tryb CORE ... MEDIA CENTER
REM Wyˆ¥cza wpisy dotycz¥ce Windows Media Center /kto go nie u¾ywa ˜miaˆo mo¾na wyˆ¥czy†/
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\InstallPlayReady"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\InstallPlayReady"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PBDADiscovery"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PBDADiscovery"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PeriodicScanRetry"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PeriodicScanRetry"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\PvrScheduleTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\PvrScheduleTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\RecordingRestart"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\RecordingRestart"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\RegisterSearch"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\RegisterSearch"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\StartRecording"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\StartRecording"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WPISY SZPIEGUJ¤CE
CALL :Log ... Tryb CORE ... WPISY SZPIEGUJ¥CE
REM Usuwanie wpis¢w szpieguj¥cych z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\AitAgent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\AitAgent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Autochk\Proxy"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Autochk\Proxy" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Autochk"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Autochk" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\PI\Sqm-Tasks" 
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\PI\Sqm-Tasks" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SetupSQMTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\SetupSQMTask" /F
REM 2016
CALL :SubExec SCHTASKS /END /TN "\Intel\Intel Telemetry 2"
CALL :SubExec SCHTASKS /DELETE /TN "\Intel\Intel Telemetry 2" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZB¨DNE ZADANIA
CALL :Log ... Tryb CORE ... ZBÊDNE ZADANIA
REM Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsBackup\ConfigNotification"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsBackup\ConfigNotification"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
REM Usuni©cie zb©dnych zadaä z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxcontent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxcontent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ERROR REPORTING
CALL :Log ... Tryb CORE ... ERROR REPORTING
REM Wyˆ¥czenie usˆugi Windows Error Reporting, usuni©cie zadaä z Harmonogramu Zadaä
CALL :SubExec NET STOP "WerSvc"
CALL :SubExec SC CONFIG "WerSvc" START= DISABLED
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... DIAGTRACKLISTENER
CALL :Log ... Tryb CORE ... DIAGTRACKLISTENER

REM Zatrzymanie i Wyˆ¥czenie usˆugi oraz klucza rejestru DiagTrackListener i katalogu AutoLogger
CALL :SubExec NET STOP "diagtrack"
CALL :SubExec SC CONFIG "diagtrack" START= DISABLED
CALL :SubExec SC DELETE "diagtrack"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Svchost\utcsvc" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Services\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Control\WMI\Autologger\AutoLogger-Diagtrack-Listener" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUGI
CALL :Log  ... Tryb CORE ... US£UGI

REM Wyˆ¥czenie usˆugi Pliki trybu Offline
CALL :SubExec NET STOP "CscService"
CALL :SubExec SC CONFIG "CscService" START= DISABLED
REM Wyˆ¥czenie usˆugi defragmentacji dysk¢w twardych
CALL :SubExec NET STOP "defragsvc"
CALL :SubExec SC CONFIG "defragsvc" START= DISABLED
REM Wyˆ¥czenie usˆugi Odbiornik Windows Media Center
CALL :SubExec NET STOP "ehRecvr"
CALL :SubExec SC CONFIG "ehRecvr" START= DISABLED
REM Wyˆ¥czenie usˆugi harmonogramu programu Windows Media Center
CALL :SubExec NET STOP "ehSched"
CALL :SubExec SC CONFIG "ehSched" START= DISABLED
REM Wyˆ¥czenie —ledzenia ETW Internet Explorer 
CALL :SubExec NET STOP "IEEtwCollectorService"
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= DISABLED
REM Wyˆ¥czenie usˆugi Media Center Extender
CALL :SubExec NET STOP "Mcx2Svc"
CALL :SubExec SC CONFIG "Mcx2Svc" START= DISABLED
REM Wyˆ¥czenie Routing i dost©p zdalny
CALL :SubExec NET STOP "RemoteAccess"
CALL :SubExec SC CONFIG "RemoteAccess" START= DISABLED
REM Wyˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec NET STOP "RemoteRegistry"
CALL :SubExec SC CONFIG "RemoteRegistry" START= DISABLED
REM Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec NET STOP "TrkWks"
CALL :SubExec SC CONFIG "TrkWks" START= DISABLED
REM Wyˆ¥czenie WebClient
CALL :SubExec NET STOP "WebClient"
CALL :SubExec SC CONFIG "WebClient" START= DISABLED
REM Wyˆ¥czenie Wecsvc kolektor zdarzeä systemu Windows
CALL :SubExec NET STOP "Wecsvc"
CALL :SubExec SC CONFIG "Wecsvc" START= DISABLED
REM Wyˆ¥czenie WinRM
CALL :SubExec NET STOP "WinRM"
CALL :SubExec SC CONFIG "WinRM" START= DISABLED
REM Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec NET STOP "WMPNetworkSvc"
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= DISABLED
REM Wyˆ¥czenie usˆugi Windows Search
CALL :SubExec NET STOP "WSearch"
CALL :SubExec SC CONFIG "WSearch" START= DISABLED
REM v18
CALL :SubExec NET STOP "NvTelemetryContainer"
CALL :SubExec SC CONFIG "NvTelemetryContainer" START= DISABLED
CALL :SubExec SC DELETE "NvTelemetryContainer"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUNI¨CIE RAPORTàW
CALL :Log ... Tryb CORE ... USUNIÊCIE RAPORTÓW 
REM Usuni©cie log¢w i raport¢w ze szpiegowania
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\Sqm\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\AIT\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\ElevatedDiagnostics\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\Diagnostics\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Diagnosis\"
CALL :SubExec DEL /Q /A "sqmdata*.sqm"
CALL :SubExec DEL /Q /A "sqmnoopt*.sqm"
CALL :SubExec RD /S /Q "C:\Windows\System32\LogFiles\AIT\"
CALL :SubExec RD /S /Q "C:\Windows\System32\LogFiles\SQM\"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... AUTOSTART
CALL :Log ... Tryb CORE ... AUTOSTART
REM Usuni©cie zb©dnych pozycji autostartu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM WMP
CALL :Log ... Tryb CORE ... SQM WMP
REM Wyˆ¥czenie SQM dla Windows Media Playera
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\MediaPlayer\PREFERENCES" /V "UsageTracking" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\MediaPlayer\PREFERENCES" /V "SendUserGUID" /T REG_BINARY /D "00" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\MediaPlayer\Preferences" /V "UsageTracking" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\MediaPlayer\Preferences" /V "SendUserGUID" /T REG_BINARY /D "00" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WER
CALL :Log ... Tryb CORE ... WER
REM WER7 ustawienia + data 0
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ConfigureArchive" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableArchive" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "Disabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableQueue" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontShowUI" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ForceQueue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LoggingDisabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontSendAdditionalData" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxArchiveCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Consent" /V "DefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ErrorPort" /T REG_SZ /D "\\No_SPY" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueSizePercentage" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "PurgeThreshholdValueInKB" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ServiceTimeout" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "MachineID" /T REG_SZ /D "00000000-0000-0000-0000-000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Consent" /V "NewUserDefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug" /V "ExceptionRecord" /T REG_BINARY /D "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\HeapControlledList\dwm.exe" /V "EnableHeapThrottle" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscordacwks.dll" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR" /V "Disable" /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM
CALL :Log ... Tryb CORE ... SQM
REM SQM7 ustawienia + data 0
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "MachineID" /T REG_SZ /D "00000000-0000-0000-0000-000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\IE" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Reliability" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPSamplingRangeLow" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPSamplingRangeHigh" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "WSqmConsLastRunTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPEnable" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPEnableLastUpdateTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5366" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5367" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5368" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5382" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5383" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5384" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5373" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4592" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4573" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4574" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4575" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4572" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "4576" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WMI AUTOLOGGERS
REM NEXT AUTOLOGGERRS 7
CALL :Log ... Tryb CORE ... WMI AUTOLOGGERS

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /V "Start" /T REG_DWORD /D "0" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /V "Start" /T REG_DWORD /D "0" /F

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "Start" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MinimumBuffers" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "GUID" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileMax" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileName" /T REG_SZ /D "C:\\Windows\\System32\\LogFiles\\SQM\\SQMLogger.etl" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MaximumBuffers" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "BufferSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MaxFileSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileCounter" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "Status" /T REG_DWORD /D 0 /F
REM NEXT AUTOLOGGERS 7 DELETE
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /F
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /F
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... TELEMETRIA
CALL :Log ... Tryb CORE ... TELEMETRIA
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /V "AllowTelemetry" /T REG_DWORD /d 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... OFFICE
CALL :Log ... Tryb CORE ... OFFICE
REM OFFICE
REM Wyˆ¥czenie w Harmonogramie Zadaä Office2016 
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office Automatic Updates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office ClickToRun Service Monitor"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack2016"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn2016"
REM Wyˆ¥czenie w Harmonogramie Zadaä Office2013
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft Office 15 Sync Maintenance for %COMPUTERNAME%-%USERNAME% %COMPUTERNAME%"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office 15 Subscription Heartbeat"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn"
REM Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V CommonFileShare /T REG_SZ /D "\\0.0.0.0\DontSpy" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag1 /T REG_SZ /D "<TAG1>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag2 /T REG_SZ /D "<TAG2>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag3 /T REG_SZ /D "<TAG3>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag4 /T REG_SZ /D "<TAG4>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentInitWait /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentRandomDelay /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Enablelogging /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableUpload /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableFileObfuscation /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V accesssolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V olksolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V onenotesolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V pptsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V projectsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V publishersolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V visiosolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V wdsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V xlsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V agave /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V appaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V comaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V documentfiles /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V templatefiles /T REG_DWORD /D 1 /F
GOTO END
EXIT

:WIN7_REVERT_BACK
cls
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... MEDIA CENTER
CALL :Log ... Tryb CORE ... MEDIA CENTER
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ehDRMInit"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\InstallPlayReady"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\OCURActivate"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\OCURDiscovery"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PBDADiscovery"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PeriodicScanRetry"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\PvrScheduleTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\RecordingRestart"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\RegisterSearch"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\StartRecording"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\UpdateRecordPath"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\mcupdate"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch"

cls
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ZB¨DNE ZADANIA
CALL :Log ... Tryb CORE ... ZB¨DNE ZADANIA
REM Wˆ¥czenie zb©dnych zadaä
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsBackup\ConfigNotification"

cls
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... USUGI
CALL :Log ... Tryb CORE ... US£UGI

REM Wˆ¥czenie usˆugi Pliki trybu Offline
CALL :SubExec SC CONFIG "CscService" START= AUTO
CALL :SubExec NET START "CscService"
REM Wˆ¥czenie usˆugi defragmentacji dysk¢w twardych
CALL :SubExec SC CONFIG "defragsvc" START= AUTO
CALL :SubExec NET START "defragsvc"
REM Wˆ¥czenie usˆugi Odbiornik Windows Media Center
CALL :SubExec SC CONFIG "ehRecvr" START= AUTO
CALL :SubExec NET START "ehRecvr"
REM Wˆ¥czenie usˆugi harmonogramu programu Windows Media Center
CALL :SubExec SC CONFIG "ehSched" START= AUTO
CALL :SubExec NET START "ehSched"
REM Wˆ¥czenie —ledzenia ETW Internet Explorer 
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= AUTO
CALL :SubExec NET START "IEEtwCollectorService"
REM Wˆ¥czenie usˆugi Media Center Extender
CALL :SubExec SC CONFIG "Mcx2Svc" START= AUTO
CALL :SubExec NET START "Mcx2Svc"
REM Wˆ¥czenie Routing i dost©p zdalny
CALL :SubExec SC CONFIG "RemoteAccess" START= AUTO
CALL :SubExec NET START "RemoteAccess"
REM Wˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec SC CONFIG "RemoteRegistry" START= AUTO
CALL :SubExec NET START "RemoteRegistry"
REM Wˆ¥czenie usˆugi ekranu dotykowego
CALL :SubExec SC CONFIG "TabletInputService" START= AUTO
CALL :SubExec NET START "TabletInputService"
REM Wˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec SC CONFIG "TrkWks" START= AUTO
CALL :SubExec NET START "TrkWks"
REM Wˆ¥czenie WebClient
CALL :SubExec SC CONFIG "WebClient" START= AUTO
CALL :SubExec NET START "WebClient"
REM Wˆ¥czenie Wecsvc kolektor zdarzeä systemu Windows
CALL :SubExec SC CONFIG "Wecsvc" START= AUTO
CALL :SubExec NET START "Wecsvc"
REM Wˆ¥czenie WinRM
CALL :SubExec SC CONFIG "WinRM" START= AUTO
CALL :SubExec NET START "WinRM"
REM Wˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= AUTO
CALL :SubExec NET START "WMPNetworkSvc"
REM Wˆ¥czenie usˆugi Windows Search
CALL :SubExec SC CONFIG "WSearch" START= AUTO
CALL :SubExec NET START "WSearch"
REM Uruchomienie usˆugi Windows Defender
CALL :SubExec SC CONFIG "WinDefend" START= AUTO
CALL :SubExec NET START "WinDefend"
REM Wˆ¥czenie zadaä Defendera
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows Defender\MP Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows Defender\MpIdleTask"

CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /F

REM Wˆ¥czenie Biometryki
REM Wˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
REM Wˆ¥czenie w rejestrze
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... KOPIA HOSTS
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
CALL :Log ... Tryb Diagnostyczny ... nowy HOSTS
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^ÿ>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny... ROUTE
CALL :Log ... Tryb Diagnostyczny ... ROUTE
GOTO ROUTE_REVERTBACK
:WIN7_BACK_ROUTE_REVERTBACK
GOTO END_CHANGE
EXIT




















:WIN81_VER
SET HOSTS_TYPE_MS=WIN81_SKRYPT
SET ROUTE_TYPE_MS=WIN81_SKRYPT
SET EVENT_TYPE_MS=WIN81_SKRYPT
SET CLEANMGRV=0
SET CLEANMGR7=0
SET CLEANMGR81=0
SET CLEANMGR10=0
MODE CON COLS=100 lines=42 & Color 9F

IF /I "%1"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%2"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%3"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%4"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%5"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%6"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%7"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%8"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE
IF /I "%9"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN81_CORE

IF /I "%1"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%2"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%3"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%4"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%5"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%6"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%7"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%8"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV
IF /I "%9"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN81_ADV

IF /I "%1"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%2"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%3"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%4"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%5"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%6"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%7"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%8"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH
IF /I "%9"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN81_HIGH

CALL :Log Menu
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   Win81
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   %VERSION%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Menu
ECHO[
ECHO %VERSIONINFO%
ECHO[
ECHO  1. Przed u¾yciem uwa¾nie przeczytaj ^^!^^!^^! / Instrukcja obsˆugi / Pomoc
ECHO[
ECHO  2. Tryb CORE - U¾ywam kafelk¢w
ECHO[
ECHO  3. Tryb ADV - NIE u¾ywam kafelk¢w = ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  4. Tryb HIGH = Usuni©cie APPS (UWAGA - Usuwa wszystkie APPS dla bie¾¥cego u¾ytkownika ^^!^^!^^!)  
ECHO                 + ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  -------------------------------------------------------------------------------------------------
ECHO  5. Tryb PRO = Usuni©cie komponent¢w Systemu Windows ^^!^^!^^^! UWAGA tylko i wyˆ¥cznie TRYB PRO ^^!^^!^^!
ECHO            Tylko dla zaawansowanych (wymagana edycja skryptu) i bli¾szych formatu C: ^^!^^!^^!^^!
ECHO          Koniecznie przeczytaj instrukcj© uzytkowana tego trybu przed uruchomieniem go ^^!^^!^^!^^!
ECHO             UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO  -------------------------------------------------------------------------------------------------
ECHO[
ECHO  7. Zestaw NARZ¨DZI / HOSTS / ROUTE / LOG
ECHO[
ECHO  8. Tryb DIAGNOSTYCZNY - Cofni©cie zmian dokonanych przez skrypt 
ECHO[
ECHO  9. Wyj˜cie
ECHO[
ECHO  ^^!. Uruchom skrypt od nowa
ECHO[
SET /P CHOICEWIN81= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN81%'=='' ECHO "%CHOICEWIN81%" Wpisz jeszcze raz
IF '%CHOICEWIN81%'=='1' GOTO WIN81_HELP
IF '%CHOICEWIN81%'=='2' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN81CORE.RSAIO', 'C:\WIN81CORE.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN81_CORE
IF '%CHOICEWIN81%'=='3' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN81ADV.RSAIO', 'C:\WIN81ADV.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN81_ADV
IF '%CHOICEWIN81%'=='4' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN81HIGH.RSAIO', 'C:\WIN81HIGH.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN81_HIGH
IF '%CHOICEWIN81%'=='5' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN81PRO.RSAIO', 'C:\WIN81PRO.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN81_PRO
IF '%CHOICEWIN81%'=='7' GOTO WIN81_TOOLS
IF '%CHOICEWIN81%'=='8' GOTO WIN81_REVERT_BACK
IF '%CHOICEWIN81%'=='9' GOTO WIN81_EXIT_LOG
IF '%CHOICEWIN81%'=='!' GOTO BEGIN
GOTO WIN81_VER

:WIN81_EXIT_LOG
CALL :Log Menu Zakoñczenie skryptu
EXIT

:WIN81_HELP
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 1
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win8.1
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Pomoc
ECHO[
ECHO  ... Tryb CORE  ma na celu umo¾liwienie bezproblemowego korzystania z kafli w Windows 8.1     
ECHO      W tym trybie jest usuni©ta telemetria oraz podstawowe szpiegi w systemie
ECHO  - Usuwanie wpis¢w szpieguj¥cyh z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
ECHO  - Usuni©cie zb©dnych zadaä z Harmnogramu Zadaä
ECHO  - Usuni©cie zb©dnych zadaä
ECHO  - Wyˆ¥czenie zadaä konserwacji w Harmonogramie Zadaä
ECHO  - Advertising Info DISABLED
ECHO  - Wyˆ¥czenie usˆugi Windows Error Reporting
ECHO  - Usuni©cie zadaä raportowania bˆ©d¢w w Harmonogramie Zadaä
ECHO  - Zatrzymanie i Wyˆ¥czenie usˆugi  DiagTrackListener, klucza rejestru DiagTrackListener
ECHO  - Perfmon delete Diagtrack AITEventLog
ECHO  - Wyˆ¥czenie usˆugi Windows Search
ECHO  - Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
ECHO  - Wyˆ¥czenie usˆugi  ˜ledzenia ˆ¥czy
ECHO  - Wyˆ¥czenie usˆugi  Zdalnego Rejestru
ECHO  - Wyˆ¥czenie usˆugi —ledzenia ETW Internet Explorer 
ECHO  - Wyˆ¥czenie usˆugi Biom(e)tryki - np. czujnik lini papilarnych etc 
ECHO  - Usuni©cie zb©dnych pozycji autostartu
ECHO  - Usuniecie log¢w i raport¢w ze szpiegowania
ECHO  - WER8 ustawienia + data 0
ECHO  - SQM8 ustawienia + data 0
ECHO  - WMI Autologger data 0
ECHO  - Wyˆaczenie w Harmonogramie Zadaä Office 2016
ECHO  - Wyˆaczenie w Harmonogramie Zadaä Office 2013
ECHO  - Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 2
CLS
ECHO[ 
ECHO  ... Tryb ADV - blokuje mo¾liwie najwi©cej (dotychczas znanych oczywi˜cie) szpieg¢w
ECHO      wysyˆaj¥cych informacji do M$, opcja odpowiednia dla os¢b ceni¥cych sobie prywatno˜†
ECHO      Tryb ADV oczywi˜cie zawiera w sobie Tryb CORE
ECHO  - Wyˆ¥czenie Defendera
ECHO  - Wyˆ¥czenie zadaä Defendera
ECHO  - Wyˆ¥czenie zadaä Sklepu Windows
ECHO  - Wyˆ¥czenie zadaä lokalizacji
ECHO  - Wyˆ¥czenie SmartScreen
ECHO  - Wyˆ¥czenie SkyDrive/OneDrive
ECHO  - Wyˆ¥czenie Biometryki
ECHO  - Wyˆ¥czenie usˆugi Biometrycznej 
ECHO  - Wyˆ¥czenie w rejestrze Biometrics
ECHO  - Blokowanie HOSTS
ECHO  - Sklep Windows, Xbox Live
ECHO  - Blokowanie SZPIEGOWANIA MICROSOFT
ECHO  - Blokowanie HOSTS SKYPE REKLAMY
ECHO  - Blokowanie HOSTS MICROSOFT+NSA:
ECHO  - Windows, Windows Mobile, Live.com, MS Online Directory Service, MSN.com, SmartScreen (filter),
ECHO  - Dynamics.com, Zune, others, AutoDesk-NSA, Disney-NSA, Marvel comics, ABC TV channel,
ECHO  - Grolier-NSA, HP, PubTech-NSA, House of Frasier, Swiftserve-NSA, WWE-NSA,
ECHO  - NameServers, unidentified
ECHO  - Blokowanie Reguˆami Zapory - Microsoft - mo¾e blokowa† serwery aktywacji Microsoft ^^!^^!^^!
ECHO  - BLOKADA IP - ROUTING - mo¾e blokowa† serwery aktywacji Microsoft ^^!^^!^^!
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 3
CLS
ECHO[ 
ECHO  ... Tryb HIGH - Usuwa wszystkie APPS dla bie¾¥cego konta u¾ytkownika ^^!^^!^^!
ECHO      APPS Mo¾na przywr¢ci† tworz¥c nowe konto u¾ytkownika.
ECHO      Jest jeszcze metoda r©czna, ale czasochˆonna / szuka† w Google /
ECHO[
ECHO  ... Je¾eli potrzebujesz zmodyfikowa† skrypt pod wˆasne ustawienia. Dowoln¥ linie w skrypcie mo¾na
ECHO      pomin¥† wpisuj¥c REM przed t¥ lini¥ np. 
ECHO      REM CALL :SubExec NET STOP "diagtrack" - zostanie ona pomini©ta
ECHO[
ECHO  ... Zestaw NARZ¨DZI / HOSTS / ROUTE - w ˆatwy spos¢b pozwala na zarz¥dzanie plikiem hosts
ECHO      oraz dodatkowe funkcje zwi¥zane ze skryptem
ECHO[
ECHO  ... Tryb DIAGNOSTYCZNY - sprawdzenie czy skrypt jest przyczyn¥ nieprawidˆowego dziaˆania
ECHO      programu, funkcji systemu Windows 7 - cofa zmiany dokonane przez skrypt
ECHO      w Trybie CORE i ADV
ECHO[
ECHO  ^^! Tryb CORE: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                     Oczyszcza wszystko poza poprzednimi instalacjami OS i plikami Upgrade'u.
ECHO[
ECHO  ^^! Tryb ADV/HIGH: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                            Oczyszcza wszystkie dost©pne opcje w tym narz©dziu.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 4
CLS
ECHO[
ECHO  ... Przeˆ¥czniki wiersza poleceä:
ECHO   /noupdate     - pomija sprawdzanie on-line czy wersja programu jest aktualna
ECHO   /norestore    - bez tworzenia punktu przywracania
ECHO   /quickrestore - szybki - asynchronicznie(!) wykonywany do skryptu, punkt przywracania systemu
ECHO                   z domy˜ln¥ nazw¥ oraz bi©¾¥cym czasem wykonania np: 
ECHO                   Win8.1 RemoveSpy_AIO - /quickrestore 2016-12-27_14:03:50
ECHO   /nocleanmgr   - bez u¾ycia narz©dzia Windows Cleanmgr 
ECHO   /core         - wybrano tryb automatyczny CORE
ECHO   /adv          - wybrano tryb automatyczny ADV
ECHO   /high         - wybrano tryb automatyczny HIGH
ECHO   /restart      - automatyczny restart komptera w 10 sekund po zakoäczeniu skryptu
ECHO   /shutdown     - automatyczne wyˆ¥cznie komputera w 10 sekund po zakoäczeniu skryptu
ECHO[
ECHO  ... W przypadku u¾ycia dw¢ch tryb¢w pierwszeästwo ma zawsze najni¾szy (CORE)
ECHO[
ECHO  ... Przykˆad u¾ycia: RemoveSPY_AIOv23.cmd /norestore /nocleanmgr /restart /adv
ECHO   Skrypt uruchomi si© automatycznie dla danego systemu:
ECHO   bez punktu przywracania systemu, bez u¾ycia narz©dzia Windows Cleanmgr w trybie ADV i 
ECHO   po 10 sekundach wykona restart
ECHO[
ECHO  ... Przeˆ¥czniki mo¾na stosowa† w dowolnej kolejno˜ci
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 5
CLS
ECHO[
ECHO  ... Opis Trybu PRO:
ECHO[
ECHO   Tryb ten  polega na USUNI¨CIU z Windowsa okre˜lonych KOMPONENTàW,
ECHO[  peˆna ich lista jest w skrypcie - zaczyna sie od etykiety :WIN10PRO .
ECHO   Wszystkie te komponenty s¥ w p©tli - czyli s¥ usuwane po kolei.
ECHO   Nale¾y dostosowa† list© komponent¢w kt¢re potrzebujesz usun¥†,
ECHO   trzeba wykasowa† komentarz /REM-/ na pocz¥tku lini p©tli.
ECHO   Aby pozostawi† wybrane komponenty powinno to wygl¥da† tak:
ECHO    REM-Microsoft-Windows-TabletPC,
ECHO    REM-Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   Aby usun¥† wybrane komponenty powinno to wygl¥da† tak:
ECHO    Microsoft-Windows-TabletPC
ECHO    Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   NIE MO½LIWO—CI PRZYWRàCENIA ICH - TO JEST WYCIECZKA TYLKO W JEDN¤ STRON¨ BEZ POWROTU ^^!^^!^^!  
ECHO[
ECHO   Uwaga Tryb Online - do prawidˆowego dziaˆania pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO   Tryb PRO jest przeznaczony bardziej dla os¢b bli¾szych formatu dysku C:  
ECHO   Mo¾na w ten spos¢b potestowa† jak dziaˆa Windows bez zb©dnego balastu, sprawdzi† stabilno˜†.
ECHO[
ECHO   Bardzo zale¾y mi na feedbacku z tytuˆu u¾ytkowania tak 'okrojonego' Windowsa na realnym sprz©cie 
ECHO   i w realnych warunkach u¾ytkowania a nie np. na VirtualBoxie.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby powr¢ci† do menu gˆ¢wnego
PAUSE > NUL
GOTO WIN81_VER
EXIT

:WIN81_TOOLS
SET HOSTS_TYPE_MS=WIN81_EDIT
SET ROUTE_TYPE_MS=WIN81_EDIT
SET EVENT_TYPE_MS=WIN81_EDIT
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Narz©dzia
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win8.1
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Narz©dzia
ECHO[
ECHO  1. Utw¢rz kopi© pliku hosts z bie¾¥c¥ dat¥ i godzin¥   
ECHO[
ECHO  2. Przywr¢† oryginalny plik hosts
ECHO[
ECHO  3. Otw¢rz i edytuj plik hosts / zdj©ta blokada zapisu /
ECHO[
ECHO  4. Wstaw do hosts wpisy blokuj¥ce M$
ECHO[
ECHO  5. Wstaw do hosts wpisy blokuj¥ce reklamy Skype
ECHO[
ECHO  6. Wstaw do hosts wpisy blokuj¥ce M$ + NSA
ECHO[
ECHO  N. Wstaw do hosts wpisy blokuj¥ce (N)OCOIN - kopanie ET/BIT/etc-COIN¢w
ECHO[
ECHO  7. Odblokuj ROUTE
ECHO[
ECHO  O. Zablokuj R(O)UTE
ECHO[
ECHO  Z. Wyczy˜† Dziennik (Z)darzeä systemu Windows
ECHO[
ECHO  8. Otw¢rz p(L)ik / Wy(c)zy˜† plik logu [ C:\Windows\RemoveSpy_AIO.log ]
ECHO[
ECHO  e. Odblokowanie Biom(e)tryki - np. czujnik lini papilarnych etc
ECHO[
ECHO  9. Powr¢t do menu gˆ¢wnego ...
ECHO[
SET /P CHOICEWIN81TOOLS= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN81TOOLS%'=='' ECHO "%CHOICEWIN81TOOLS%" Wpisz jeszcze raz
IF '%CHOICEWIN81TOOLS%'=='1' GOTO WIN81_TOOLS_HOSTS_KOPIA
IF '%CHOICEWIN81TOOLS%'=='2' GOTO WIN81_TOOLS_HOSTS_CLEAR
IF '%CHOICEWIN81TOOLS%'=='3' GOTO WIN81_TOOLS_HOSTS_EDIT
IF '%CHOICEWIN81TOOLS%'=='4' GOTO HOSTS_MS
IF '%CHOICEWIN81TOOLS%'=='5' GOTO HOSTS_SKYPE
IF '%CHOICEWIN81TOOLS%'=='6' GOTO HOSTS_NSA
IF '%CHOICEWIN81TOOLS%'=='n' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN81TOOLS%'=='N' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN81TOOLS%'=='7' GOTO ROUTE_REVERTBACK
IF '%CHOICEWIN81TOOLS%'=='e' GOTO WIN81_BIOMETRYKA_UNBLOCK
IF '%CHOICEWIN81TOOLS%'=='o' GOTO ROUTE
IF '%CHOICEWIN81TOOLS%'=='O' GOTO ROUTE
IF '%CHOICEWIN81TOOLS%'=='z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN81TOOLS%'=='Z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN81TOOLS%'=='9' GOTO WIN81_VER
IF '%CHOICEWIN81TOOLS%'=='L' GOTO WIN81_RSAIO_LOG
IF '%CHOICEWIN81TOOLS%'=='l' GOTO WIN81_RSAIO_LOG
IF '%CHOICEWIN81TOOLS%'=='C' GOTO WIN81_CLEARLOG
IF '%CHOICEWIN81TOOLS%'=='c' GOTO WIN81_CLEARLOG
GOTO WIN81_TOOLS
EXIT

:WIN81_TOOLS_HOSTS_KOPIA
@ECHO OFF
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :Log HOSTS kopia
ECHO[
ECHO ÿ... Kopia hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WIN81_TOOLS
EXIT

:WIN81_TOOLS_HOSTS_CLEAR
@ECHO OFF
REM ZDJECIE ATRYBUTU READ
ATTRIB -R %AIO_HOSTS%
REM Plik Hosts na nowo
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
CALL :Log HOSTS oryginalny
REM ZAO½ENIE ATRYBUTU READ
ATTRIB +R %AIO_HOSTS%
REM Koniec wpisania na nowo pliku HOSTS
ECHO[
ECHO ÿ... Oryginalny plik hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WIN81_TOOLS
EXIT

:WIN81_TOOLS_HOSTS_EDIT
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_HOSTS%
CALL :Log ... HOSTS edycja
GOTO WIN81_TOOLS
EXIT

:WIN81_RSAIO_LOG
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_LOG%
CALL :Log RemoveSpy_AIO.log - Wyœwietlenie
GOTO WIN81_TOOLS
EXIT

:WIN81_CLEARLOG
REM. > %AIO_LOG%
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO% >> %AIO_LOG%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%>> %AIO_LOG%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win8.1 >> %AIO_LOG%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    LOG >> %AIO_LOG%
ECHO[
ECHO ÿ... RemoveSpy_AIO.log - Wyczyszczony - wci˜nij dowolny klawisz lub poczekaj
GOTO WIN81_TOOLS
EXIT

:WIN81_BIOMETRYKA_UNBLOCK
@ECHO OFF
CLS
ECHO[
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F
ECHO[
ECHO ÿ... Usˆuga odpowiedzialna za Biometryk© zostaˆa odblokowana
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log ... Us³uga odpowiedzialna za Biometrykê zosta³a odblokowana
GOTO WIN81_TOOLS



:WIN81_PRO
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Pro
CALL :Log ... Tryb Pro ... Start
CALL :Log czego szukasz tu ^^?
CLS
ECHO %osc%|find "Core">nul && GOTO WIN81_PRO_START
ECHO %osc%|find "Professional">nul && GOTO WIN81_PRO_START
GOTO WIN81_PRO_NOSUPPORT

:WIN81_PRO_START
CALL :Log ... Windows 8.1 PRO START ...
CLS
ECHO  ... Na Pewno 
PAUSE
ECHO  ... Na Pewno chcesz , zmodyfikowaˆe˜ tryb pod wˆasne potrzeby ^?
ECHO[
ECHO  ... Domy˜lnie tryb jest wyˆ¥czony ^^!
PAUSE
ECHO  ... Na Pewno tego chcesz, czytaˆe˜ instrukcj© dost©pna w gˆ¢wnym menu do tego trybu ^?^?
ECHO[
PAUSE
ECHO  ... Na Pewno tego chcesz - ostatnia szansa by si© wycofa† ^^!^^!^^!

:::::::::::::::::::::::::::::::::::::::::::::::::::::
:::                    Win81                      :::
:::   SEKCJA USUWANIA APLIKACJI Z SYSTEMU         :::
:::  usuä REM- przed WYBRAN¤ LINI¤ LUB LINIAMI    :::
:::  PONI½EJ W P¨TLI FOR%%x in (                  :::
:::  WTEDY USUNIE WYBRANE KOMPONENTY              :::
:::::::::::::::::::::::::::::::::::::::::::::::::::::

CLS
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET COUNT=1
FOR %%x IN (
REM-Adobe-Flash-For-Windows-Package
REM-Checkpoint-VpnPlugin
REM-F5-VpnPlugin-Package
REM-Juniper-VpnPlugin
REM-Microsoft-Hyper-V
REM-Microsoft-Windows-Anytime-Upgrade
REM-Microsoft-Windows-BusinessScanning-Feature
REM-Microsoft-Windows-Help
REM-Microsoft-Windows-MCUpdate
REM-Microsoft-Windows-Media-Streaming
REM-Microsoft-Windows-MediaCenter
REM-Microsoft-Windows-Miracast-Driver
REM-Microsoft-Windows-MSMQ-Client
REM-Microsoft-Windows-SearchEngine-Client
REM-Microsoft-Windows-Shell-HomeGroup
REM-Microsoft-Windows-SnippingTool
REM-Microsoft-Windows-SpeechRecognizer
REM-Microsoft-Windows-StickyNotes
REM-Microsoft-Windows-Store-Client
REM-Microsoft-Windows-TextPrediction
REM-Microsoft-Windows-TabletPC
REM-Microsoft-Windows-VirtualPC
REM-Microsoft-Windows-VirtualXP
REM-Microsoft-Windows-WindowsMediaPlayer
REM-Microsoft-Windows-WinOcr
REM-Microsoft-Windows-WMPNetworkSharingService
REM-Microsoft-Windows-Xps
REM-Server-Help-Package
REM-SonicWALL-VpnPlugin
REM-Windows-Defender
) DO (
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "%%x" /r
SET /A "COUNT=COUNT+1"
CLS
ECHO                 Krok !COUNT! z 30
)
CALL :SubExec C:\install_wim_tweak.exe /h /o /l
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
DEL /F /Q %USERPROFILE%\Desktop\Packages.txt>nul 2>&1
CALL :Log ... Tryb Pro ... END
TIMEOUT /T 4
GOTO END


:WIN81_PRO_NOSUPPORT
CALL :Log ... No Support ...
CLS
GOTO END


:WIN81_HIGH
TITLE %PROGRAMNAME%-%VERSION% ... Tryb High ... APPS UNNISTALL
CALL :Log ... Tryb High ... APPS UNNISTALL ... Start
@ECHO OFF
CLS
ECHO  Usuwane s¥ aplikacje Modern / Kafelki
ECHO  Je¾eli b©dziesz potrzebowaˆ Kafelk¢w to utw¢rz nowe konto u¾ytkownika ...
ECHO[ 
POWERSHELL.EXE -ExecutionPolicy Bypass -Command "Get-AppXPackage -User $env:UserName | Remove-AppxPackage" 2>&1>%SYSTEMDRIVE%:\$null
START /wait exit powershell
DEL /F /Q %SYSTEMDRIVE%\$null>nul 2>&1
CALL :Log ... Tryb High ... APPS UNNISTALL ... END
GOTO WIN81_ADV

:WIN81_ADV
SET CLEANMGR81=1
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV
CALL :Log ... Tryb ADV

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... HOSTS
CALL :Log ... Tryb ADV ... HOSTS
GOTO HOSTS_MS
:WIN81_BACK_HOSTS

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ROUTE
CALL :Log ... Tryb ADV ... ROUTE
GOTO ROUTE
:WIN81_BACK_ROUTE

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... EVENTLOGCLEANER
CALL :Log ... Tryb ADV ... EVENTLOGCLEANER
GOTO EVENTLOGCLEANER
:WIN81_BACK_EVENTLOGCLEANER

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... DEFENDER
CALL :Log ... Tryb ADV ... DEFENDER
REM Wyˆ¥czenie Defendera
CALL :SubExec SC CONFIG WinDefend START= DISABLED
CALL :SubExec SC CONFIG WdNisSvc START= DISABLED
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V "DisableAntiSpyware" /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie zadaä Defendera
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... WINDOWS STORE
CALL :Log ... Tryb ADV ... WINDOWS STORE
REM Wyˆ¥czenie Zadaä Sklepu Windows
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\Badge Update"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\Badge Update"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\Sync Licenses"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\Sync Licenses"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\WSRefreshBannedAppsListTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\WSRefreshBannedAppsListTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\WSTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\WSTask"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ZADANIA
CALL :Log ... Tryb ADV ... ZADANIA

CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
REM Wyˆ¥czenie zadaä lokalizacji
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Location\WindowsActionDialog"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Location\WindowsActionDialog"
REM Wyˆ¥czenie SmartScreen
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /V SmartScreenEnabled /T REG_SZ /D "OFF" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /V EnableSmartScreen /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... BIOMETRYKA
CALL :Log ... Tryb ADV ... BIOMETRYKA
REM Wyˆ¥czenie Biometryki
REM Wyˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec NET STOP "WbioSrvc"
CALL :SubExec SC CONFIG "WbioSrvc" START= DISABLED
REM Wyˆ¥czenie w rejestrze
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... USUGI
CALL :Log ... Tryb ADV ... US£UGI

REM Wyˆ¥czenie usˆugi Czujnik¢w
CALL :SubExec NET STOP "SensrSvc"
CALL :SubExec SC CONFIG "SensrSvc" START= DISABLED
REM Wyˆ¥czenie usˆugi Historii Plik¢w
CALL :SubExec NET STOP "fhsvc"
CALL :SubExec SC CONFIG "fhsvc" START= DISABLED
GOTO WIN81_CORE

:WIN81_CORE
SET /A "CLEANMGR81=CLEANMGR81+1"
CLS

REM Wyˆ¥czenie usˆugi ekranu dotykowego
@ECHO off
FOR /f "tokens=2 delims= " %%i in ('wmic cpu get name') DO SET os81=%%i
ECHO %os81%>nul
ECHO %os81%|find /I "Atom">nul && GOTO WIN81_CORE_TOUCH_SKIP||GOTO WIN81_CORE_TOUCH_DISABLE

:WIN81_CORE_TOUCH_DISABLE
CALL :Log Brak ekranu dotykowego - wyˆ¥czam usˆug©
CALL :SubExec NET STOP "TabletInputService"
CALL :SubExec SC CONFIG "TabletInputService" START= DISABLED
GOTO WIN81_CORE_TOUCH_NEXT

:WIN81_CORE_TOUCH_SKIP
CALL :Log Wykryto ekran dotykowy - nie wyˆ¥czam usˆugi
GOTO WIN81_CORE_TOUCH_NEXT

:WIN81_CORE_TOUCH_NEXT
CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZADANIA SZPIEGI
CALL :Log ... Tryb CORE ... ZADANIA SZPIEGI
REM Usuwanie wpis¢w szpieguj¥cych z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\AitAgent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\AitAgent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Autochk\Proxy"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Autochk\Proxy" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Autochk"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Autochk" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\PI\Sqm-Tasks" 
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\PI\Sqm-Tasks" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\IME\SQM data sender"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\IME\SQM data sender" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZB¨DNE ZADANIA
CALL :Log ... Tryb CORE ... ZBÊDNE ZADANIA
REM Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
REM Usuni©cie zb©dnych zadaä z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxcontent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxcontent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /F
REM 2016
CALL :SubExec SCHTASKS /END /TN "\Intel\Intel Telemetry 2"
CALL :SubExec SCHTASKS /DELETE /TN "\Intel\Intel Telemetry 2" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZB¨DNE ZADANIA ... REG
CALL :Log ... Tryb CORE ... ZBÊDNE ZADANIA REG
REM Usuni©cie zb©dnych zadaä
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{1274336E-AB06-46B6-A48C-0671C5557CC6}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2B365C62-2DD8-4CA1-BA42-AD46D3C8CD04}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SKYDRIVE/ONEDRIVE
CALL :Log ... Tryb CORE ... SkYDRIVE/ONEDRIVE
REM Wyˆ¥czenie SkyDrive/OneDrive
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SkyDrive\Routine Maintenance Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SkyDrive\Routine Maintenance Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SkyDrive\Idle Sync Maintenance Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SkyDrive\Idle Sync Maintenance Task"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ZADANIA KONSERWACJI
CALL :Log ... Tryb CORE ... ZADANIA KONSERWACJI
REM Wyˆ¥czenie zadaä konserwacji w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TaskScheduler\Idle Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TaskScheduler\Idle Maintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TaskScheduler\Maintenance Configurator"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TaskScheduler\Maintenance Configurator"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TaskScheduler\Manual Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TaskScheduler\Manual Maintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TaskScheduler\Regular Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TaskScheduler\Regular Maintenance"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ADVERTISING INFO
CALL :Log ... Tryb CORE ... ADVERTISING INFO
REM Advertising Info DISABLED
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V "Enable" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... ERROR REPORTING
CALL :Log ... Tryb CORE ... ERROR REPORTING
REM Wyˆ¥czenie usˆugi Windows Error Reporting
CALL :SubExec NET STOP "WerSvc"
CALL :SubExec SC CONFIG "WerSvc" START= DISABLED
REM Usuni©cie zadaä raportowania bˆ©d¢w w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ...  DIAGTRACKLISTENER
CALL :Log ... Tryb CORE ... DIAGTRACKLISTENER
REM Zatrzymanie i Wyˆ¥czenie usˆugi  DiagTrackListener, klucza rejestru DiagTrackListener
CALL :SubExec NET STOP "diagtrack"
CALL :SubExec SC CONFIG "diagtrack" START= DISABLED
CALL :SubExec SC DELETE "diagtrack"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Svchost\utcsvc" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Services\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Control\WMI\Autologger\AutoLogger-Diagtrack-Listener" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUGI
CALL :Log ... Tryb CORE ... US£UGI

REM Wyˆ¥czenie usˆugi defragmentacji dysk¢w twardych
CALL :SubExec NET STOP "defragsvc"
CALL :SubExec SC CONFIG "defragsvc" START= DISABLED
REM Wyˆ¥czenie —ledzenia ETW Internet Explorer 
CALL :SubExec NET STOP "IEEtwCollectorService"
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= DISABLED
REM Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec NET STOP "TrkWks"
CALL :SubExec SC CONFIG "TrkWks" START= DISABLED
REM Wyˆ¥czenie Routing i dost©p zdalny
CALL :SubExec NET STOP "RemoteAccess"
CALL :SubExec SC CONFIG "RemoteAccess" START= DISABLED
REM Wyˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec NET STOP "RemoteRegistry"
CALL :SubExec SC CONFIG "RemoteRegistry" START= DISABLED
REM Wyˆ¥czenie WebClient
CALL :SubExec NET STOP "WebClient"
CALL :SubExec SC CONFIG "WebClient" START= DISABLED
REM Wyˆ¥czenie Wecsvc kolektor zdarzeä systemu Windows
CALL :SubExec NET STOP "Wecsvc"
CALL :SubExec SC CONFIG "Wecsvc" START= DISABLED
REM Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec NET STOP "WMPNetworkSvc"
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= DISABLED
REM Wyˆ¥czenie WinRM
CALL :SubExec NET STOP "WinRM"
CALL :SubExec SC CONFIG "WinRM" START= DISABLED
REM Wyˆ¥czenie usˆugi Windows Search
CALL :SubExec NET STOP "WSearch"
CALL :SubExec SC CONFIG "WSearch" START= DISABLED
REM v18
CALL :SubExec NET STOP "NvTelemetryContainer"
CALL :SubExec SC CONFIG "NvTelemetryContainer" START= DISABLED
CALL :SubExec SC DELETE "NvTelemetryContainer"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... AUTOSTART
CALL :Log ... Tryb CORE ... AUTOSTART
REM Usuni©cie zb©dnych pozycji autostartu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{630b1da0-b465-11d1-9948-00c04f98bbc9}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6015F}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{45ea75a0-a269-11d1-b5bf-0000f8051515}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{5fd399c0-a70a-11d1-9948-00c04f98bbc9}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{4f645220-306d-11d2-995d-00c04f98bbc9}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{630b1da0-b465-11d1-9948-00c04f98bbc9}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6015F}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45ea75a0-a269-11d1-b5bf-0000f8051515}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5fd399c0-a70a-11d1-9948-00c04f98bbc9}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4f645220-306d-11d2-995d-00c04f98bbc9}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUNI¨CIE RAPORTàW
CALL :Log ... Tryb CORE ... USUNIÊCIE RAPORTÓW
REM Usuniecie log¢w i raport¢w ze szpiegowania
CALL :SubExec RD /S /Q "C:\Windows\System32\Tasks\WPD"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\Sqm\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\windowssampling\Sqm\Manifest\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "C:\Users\Administrator\AppData\Local\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\ElevatedDiagnostics\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\Diagnostics\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\Windows\System32\LogFiles\AIT\"
CALL :SubExec RD /S /Q "C:\Windows\System32\LogFiles\SQM\"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM WMP
CALL :Log ... Tryb CORE ... SQM WMP
REM Wyˆ¥czenie SQM dla Windows Media Playera
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\MediaPlayer\PREFERENCES" /V "UsageTracking" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\MediaPlayer\PREFERENCES" /V "SendUserGUID" /T REG_BINARY /D "00" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\MediaPlayer\Preferences" /V "UsageTracking" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\MediaPlayer\Preferences" /V "SendUserGUID" /T REG_BINARY /D "00" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WER
CALL :Log ... Tryb CORE ... WER
REM WER8 ustawienia + data 0
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ErrorPort" /T REG_SZ /D "\\DontSPY" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueSizePercentage" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "PurgeThreshholdValueInKB" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ServiceTimeout" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "MachineID" /T REG_SZ /D "00000000-0000-0000-0000-000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "Disabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Assert Filtering Policy" /V "ReportAndContinue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\BrokerUp" /V "WWAJSE" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Consent" /V "NewUserDefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug" /V "ExceptionRecord" /T REG_BINARY /D "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug\UIHandles" /V "FirstLevelConsentDialog" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\HeapControlledList\dwm.exe" /V "EnableHeapThrottle" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\System32\msiwer.dll" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscordacwks.dll" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR" /V "Disable" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "Disabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableQueue" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LoggingDisabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontSendAdditionalData" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "AutoApproveOSDumps" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ForceQueue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontShowUI" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ConfigureArchive" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxArchiveCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableArchive" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LastRateLimitedDumpGenerationTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LastQueuePesterTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LastQueueNoPesterTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LastResponsePesterTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Consent" /V "DefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Debug\UIHandles" /V "FirstLevelConsentDialog" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting\ERC" /V "ResponseArchiveListView" /T REG_BINARY /D "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000" /F
CALL :Log Tryb CORE WER

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM	
CALL :Log ... Tryb CORE ... SQM
REM SQM8 ustawienia + data 0
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Internet Explorer\SQM" /V "InstallDate" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\SQMClient" /V "UserId" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumModernPerftrackScenarios" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumScenarioAgeoutErrorsLogged" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumGenericPerftrackScenarios" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumScenarioUnknownErrorsLogged" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "LoggedScenariosSizeInBytes" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumScenarioUnmatchedErrorsLogged" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumErrorsLogged" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "PeriodStartTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\PerfTrack\SqmThrottling" /V "NumScenariosLogged" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "WinSqmFirstSessionStartTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "MachineId" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\CommonUploader" /V "LastRunTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\IE" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Reliability" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPEnable" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "WSqmConsLastRunTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "SqmLoggerRunning" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5371" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5372" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5369" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5385" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5386" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5387" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10755" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10756" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10757" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10758" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5373" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12412" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12415" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12416" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12411" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12414" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12413" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5382" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5383" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5384" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10751" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10752" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10753" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10754" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5366" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5367" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5368" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\TelemetryClient\SampleStore" /V "UpdateFreq" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\TelemetryClient\SampleStore\sqm\Reliability\ServiceMetrics" /V "SampledOut" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\TelemetryClient\SampleStore\sqm\Reliability\ServiceState" /V "SampledOut" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WMI AUTOLOGGERS
REM NEXT AUTOLOGGERRS 8.1
CALL :Log ... Tryb CORE ... WMI AUTOLOGGERS

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /V "Start" /T REG_DWORD /D "0" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /V "Start" /T REG_DWORD /D "0" /F

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "Start" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "LogFileMode" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileCount" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MinimumBuffers" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "GUID" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileMax" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileName" /T REG_SZ /D "C:\\Windows\\System32\\LogFiles\\SQM\\SQMLogger.etl" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MaximumBuffers" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "BufferSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "MaxFileSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FileCounter" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "Status" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "FlushTimer" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V "ClockType" /T REG_DWORD /D 0 /F
REM NEXT AUTOLOGGERS 8.1 DELETE
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /F
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /F
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... TELEMETRIA
CALL :Log ... Tryb CORE ... TELEMETRIA
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... OFFICE
CALL :Log ... Tryb CORE ... OFFICE
REM OFFICE
REM Wyˆ¥czenie w Harmonogramie Zadaä Office 2016
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office Automatic Updates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office ClickToRun Service Monitor"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack2016"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn2016"
REM Wyˆ¥czenie w Harmonogramie Zadaä Office 2013
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft Office 15 Sync Maintenance for %COMPUTERNAME%-%USERNAME% %COMPUTERNAME%"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office 15 Subscription Heartbeat"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn"
REM Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V CommonFileShare /T REG_SZ /D "\\0.0.0.0\DontSpy" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag1 /T REG_SZ /D "<TAG1>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag2 /T REG_SZ /D "<TAG2>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag3 /T REG_SZ /D "<TAG3>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag4 /T REG_SZ /D "<TAG4>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentInitWait /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentRandomDelay /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Enablelogging /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableUpload /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableFileObfuscation /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V accesssolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V olksolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V onenotesolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V pptsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V projectsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V publishersolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V visiosolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V wdsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V xlsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V agave /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V appaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V comaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V documentfiles /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V templatefiles /T REG_DWORD /D 1 /F
GOTO END
EXIT

:WIN81_REVERT_BACK
cls
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ZADANIA
CALL :Log ... Tryb Diagnostyczny ... ZADANIA
REM Wˆ¥czenie zb©dnych zadaä
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Location\WindowsActionDialog"

REM Wˆ¥czenie SkyDrive/OneDrive
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\SkyDrive\Routine Maintenance Task"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\SkyDrive\Idle Sync Maintenance Task"

REM Wˆ¥czenie zadaä konserwacji
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TaskScheduler\Idle Maintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TaskScheduler\Maintenance Configurator"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TaskScheduler\Manual Maintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TaskScheduler\Regular Maintenance"

REM Wˆ¥czenie Zadaä Sklepu Windows
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\Badge Update"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\Sync Licenses"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\WSRefreshBannedAppsListTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\WSTask"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... USUGI
CALL :Log ... Tryb Diagnostyczny ... US£UGI
REM Wˆ¥czenie usˆugi defragmentacji dysk¢w twardych
CALL :SubExec SC CONFIG "defragsvc" START= AUTO
CALL :SubExec NET START "defragsvc"
REM Wˆ¥czenie usˆugi Historii Plik¢w
CALL :SubExec SC CONFIG "fhsvc" START= AUTO
CALL :SubExec NET START "fhsvc"
REM Wˆ¥czenie —ledzenia ETW Internet Explorer 
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= AUTO
CALL :SubExec NET START "IEEtwCollectorService"
REM Wˆ¥czenie Routing i dost©p zdalny
CALL :SubExec SC CONFIG "RemoteAccess" START= AUTO
CALL :SubExec NET START "RemoteAccess"
REM Wˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec SC CONFIG "RemoteRegistry" START= AUTO
CALL :SubExec NET START "RemoteRegistry"
REM Wˆ¥czenie usˆugi Czujnik¢w
CALL :SubExec SC CONFIG "SensrSvc" START= AUTO
CALL :SubExec NET START "SensrSvc"
REM Wˆ¥czenie usˆugi ekranu dotykowego
CALL :SubExec SC CONFIG "TabletInputService" START= AUTO
CALL :SubExec NET START "TabletInputService"
REM Wˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec SC CONFIG "TrkWks" START= AUTO
CALL :SubExec NET START "TrkWks"
REM Wˆ¥czenie WebClient
CALL :SubExec SC CONFIG "WebClient" START= AUTO
CALL :SubExec NET START "WebClient"
REM Wˆ¥czenie Wecsvc kolektor zdarzeä sytemu Windows
CALL :SubExec SC CONFIG "Wecsvc" START= AUTO
CALL :SubExec NET START "Wecsvc"
REM Wˆ¥czenie usˆugi  Windows Error Reporting
CALL :SubExec SC CONFIG "WerSvc" START= AUTO
CALL :SubExec NET START "WerSvc"
REM Wˆ¥czenie WinRM
CALL :SubExec SC CONFIG "WinRM" START= AUTO
CALL :SubExec NET START "WinRM"
REM Wˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= AUTO
CALL :SubExec NET START "WMPNetworkSvc"
REM Wˆ¥czenie usˆugi Windows Search
CALL :SubExec SC CONFIG "WSearch" START= AUTO
CALL :SubExec NET START "WSearch"

REM Wˆ¥czenie Biometryki
REM Wˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
REM Wˆ¥czenie w rejestrze
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F

REM Advertising Info DISABLED
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V "Enable" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... DEFENDER
CALL :Log ... Tryb Diagnostyczny ... DEFENDER
REM Wˆ¥czenie Defendera
CALL :SubExec SC CONFIG WinDefend START= AUTO
CALL :SubExec SC CONFIG WdNisSvc START= AUTO
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V "DisableAntiSpyware" /T REG_DWORD /D 0 /F
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"

REM Wˆ¥czenie SmartScreen
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /V SmartScreenEnabled /T REG_SZ /D "RequireAdmin" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /V EnableSmartScreen /F

CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /F

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... KOPIA HOSTS
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
CALL :Log ... Tryb Diagnostyczny ... nowy HOSTS
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ROUTE
CALL :Log ... Tryb Diagnostyczny ... ROUTE
GOTO ROUTE_REVERTBACK
:WIN81_BACK_ROUTE_REVERTBACK
GOTO END_CHANGE
EXIT












:WIN10_VER
SET HOSTS_TYPE_MS=WIN10_SKRYPT
SET ROUTE_TYPE_MS=WIN10_SKRYPT
SET EVENT_TYPE_MS=WIN10_SKRYPT
SET CLEANMGRV=0
SET CLEANMGR7=0
SET CLEANMGR81=0
SET CLEANMGR10=0
MODE CON COLS=100 lines=42 & Color 0A

IF /I "%1"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%2"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%3"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%4"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%5"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%6"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%7"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%8"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE
IF /I "%9"=="/core" CALL :Log Prze³¹cznik tryb /core & GOTO WIN10_CORE

IF /I "%1"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%2"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%3"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%4"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%5"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%6"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%7"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%8"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV
IF /I "%9"=="/adv" CALL :Log Prze³¹cznik tryb /adv & GOTO WIN10_ADV

IF /I "%1"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%2"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%3"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%4"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%5"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%6"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%7"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%8"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH
IF /I "%9"=="/high" CALL :Log Prze³¹cznik tryb /high & GOTO WIN10_HIGH

IF /I "%1"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%2"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%3"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%4"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%5"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%6"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%7"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%8"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO
IF /I "%9"=="/pro" CALL :Log Prze³¹cznik tryb /pro & GOTO WIN10_PRO

CALL :Log Menu
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win10
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Menu
ECHO[
ECHO  1. Przed u¾yciem uwa¾nie przeczytaj ^^!^^!^^! / Instrukcja obsˆugi / Pomoc
ECHO[
ECHO  2. Tryb CORE - U¾ywam kafelk¢w 
ECHO[
ECHO  3. Tryb ADV - NIE u¾ywam kafelk¢w = ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  4. Tryb HIGH = Usuni©cie APPS (UWAGA - Usuwa wszystkie APPS dla bie¾¥cego u¾ytkownika ^^!^^!^^!)  
ECHO                 + ADV + [Blokowanie HOST+ROUTE] + CORE
ECHO[
ECHO  -------------------------------------------------------------------------------------------------
ECHO  5. Tryb PRO = Usuni©cie komponent¢w Systemu Windows ^^!^^!^^^! UWAGA tylko i wyˆ¥cznie TRYB PRO ^^!^^!^^!
ECHO            Tylko dla zaawansowanych (wymagana edycja skryptu) i bli¾szych formatu C: ^^!^^!^^!^^!
ECHO          Koniecznie przeczytaj instrukcj© uzytkowana tego trybu przed uruchomieniem go ^^!^^!^^!^^!
ECHO             UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO  -------------------------------------------------------------------------------------------------
ECHO[
ECHO  7. Zestaw NARZ¨DZI HOSTS / ROUTE / WINDOWS UPDATE / LOG
ECHO[
ECHO  X. Zestaw NARZ¨DZI APPX / WINDOWS
ECHO[
ECHO  8. Tryb DIAGNOSTYCZNY - Cofni©cie zmian dokonanych przez skrypt
ECHO[
ECHO  9. Wyj˜cie
ECHO[
ECHO  ^^!. Uruchom skrypt od nowa
ECHO[
SET /P CHOICEWIN10= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN10%'=='' ECHO "%CHOICEWIN10%" Wpisz jeszcze raz
IF '%CHOICEWIN10%'=='1' GOTO WIN10_HELP
IF '%CHOICEWIN10%'=='2' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN10CORE.RSAIO', 'C:\WIN10CORE.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN10_CORE
IF '%CHOICEWIN10%'=='3' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN10ADV.RSAIO', 'C:\WIN10ADV.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN10_ADV
IF '%CHOICEWIN10%'=='4' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN10HIGH.RSAIO', 'C:\WIN10HIGH.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN10_HIGH
IF '%CHOICEWIN10%'=='5' powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/Stats/WIN10PRO.RSAIO', 'C:\WIN10PRO.RSAIO') }">nul & DEL /F /Q %SYSTEMDRIVE%\*.RSAIO >nul 2>&1 & GOTO WIN10_PRO
IF '%CHOICEWIN10%'=='7' GOTO WIN10_TOOLS
IF '%CHOICEWIN10%'=='x' GOTO WIN10_TOOLSX
IF '%CHOICEWIN10%'=='X' GOTO WIN10_TOOLSX
IF '%CHOICEWIN10%'=='8' GOTO WIN10_REVERT_BACK
IF '%CHOICEWIN10%'=='9' GOTO WIN10_EXIT_LOG
IF '%CHOICEWIN10%'=='!' GOTO BEGIN
GOTO WIN10_VER
EXIT

:WIN10_EXIT_LOG
CALL :Log Menu Zakoñczenie skryptu
EXIT

:WIN10_HELP
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 1
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win10
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Pomoc
ECHO[ 
ECHO  ... Tryb CORE ma na celu umo¾liwienie bezproblemowego korzystania z kafli w Windows 10
ECHO      W tym trybie jest usuni©ta telemetria oraz podstawowe szpiegi w systemie
ECHO  - Usuwanie wpis¢w szpieguj¥cyh z Harmonogramu Zadaä
ECHO  - Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
ECHO  - Nowe TH2? w Harmonogramie Zadaä
ECHO  - Usuni©cie pilk¢w raport¢w
ECHO  - Usuni©cie zb©dnych pozycji autostartu
ECHO  - Wyˆ¥czenie szpieguj¥cych usˆug:
ECHO  - Wyˆ¥czenie usˆugi dmwappushservice - telemetria
ECHO  - Wyˆ¥czenie usˆugi iagnosticshub.standardcollector.service - telemetria
ECHO  - Wyˆ¥czenie usˆugi raportowania bˆ©d¢w
ECHO  - Wyˆ¥czenie usˆugi Diagtrack
ECHO  - Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
ECHO  - Wyˆ¥czenie usˆugi Windows Search
ECHO  - Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
ECHO  - Wyˆ¥czenie usˆugi Zdalnego Rejestru
ECHO  - Wyˆ¥czenie —ledzenia ETW Internet Explorer 
ECHO  - Wyˆ¥czenie telemetrii
ECHO  - TWEAKS INTERNET EXPLORER 11
ECHO  - WER10 ustawienia + data 0
ECHO  - SQM10 ustawienia + data 0
ECHO  - Wyˆ¥czenie w Harmonogramie Zadaä Office 2016
ECHO  - Wyˆ¥czenie w Harmonogramie Zadaä Office 2013
ECHO  - Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
ECHO[
ECHO  ... Wci˜nij dowolny klawisz klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 2
CLS
ECHO[ 
ECHO  ... Tryb ADV blokuje mo¾liwie najwi©cej szpieg¢w, dla os¢b ceni¥cych sobie prywatno˜†
ECHO      NIE ZALECANE dla u¾ytkownik¢w korzystaj¥cych z kafli
ECHO  - Wyˆ¥czenie Defendera i zadaä Defendera w Harmonogramie Zadaä
ECHO  - Wyˆ¥czenie w Harmonogramie Zadaä Sklepu Windows
ECHO  - Wyˆ¥czenie Automatycznej aktualizacji aplikacji w Harmonogramie Zadaä
ECHO  - Wyˆ¥czenie usˆug XboXLive
ECHO  - Wyˆ¥czenie Biometryki
ECHO  - Wyˆ¥czenie usˆugi Biometrycznej 
ECHO  - Wyˆ¥czenie w rejestrze Biometrics
ECHO  - BEZPIECZEãSTWO
ECHO  - OKO - wyˆ¥czenie podgl¥du hasˆa na pasku hasˆa
ECHO  - Wyˆ¥czenie WiFi Sense - USER
ECHO  - Wyˆ¥czenie WiFi Sense Group Policy
ECHO  - Skrypt do wyˆ¥czenia WiFi Sense
ECHO  - Wyˆ¥czenie Windows Media DRM Online
ECHO  - Wyˆ¥czenie dost©pu aplikacjom do WIFI
ECHO  - Apps access to loosey coupled devices disabled
ECHO  - WINDOWS DEFENDER AND M$ SPYNET
ECHO  - Wyˆ¥czenie raportowania do SpyNetu
ECHO  - Wyˆ¥czenie wysyˆania pr¢bek do M$
ECHO  - Wyˆ¥czenie raportowania o infekcjach malware
ECHO  - PRYWATNO—
ECHO  - Wyˆ¥czenie udost©pniania pisma odr©cznego
ECHO  - Wyˆ¥czenie udost©pniania pisma odr©cznego-raporty
ECHO  - Wyˆ¥czenie Invertory Collector
ECHO  - Wyˆ¥czenie kamery na ekranie logowania
ECHO  - Advertising info step 2 of 2
ECHO[
ECHO  ... Wci˜nij dowolny klawisz klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 3
CLS
ECHO[ 
ECHO  ... Tryb ADV blokuje mo¾liwie najwi©cej szpieg¢w, dla os¢b ceni¥cych sobie prywatno˜†
ECHO      NIE ZALECANE dla u¾ytkownik¢w korzystaj¥cych z kafli
ECHO  - Wyˆ¥czenie powiadomieä aplikacjom
ECHO  - Wyˆ¥czenie dost©pu aplikacjom do kalendarza
ECHO  - Wyˆ¥czenie dost©pu aplikacjom do kamery
ECHO  - Wyˆ¥czenie dost©pu aplikacjom do mikrofonu
ECHO  - Wyˆ¥czenie dost©pu aplikacjom do wiadomo˜ci
ECHO  - Wyˆ¥czenie informacji o koncie u¾ytkownika dla aplikacji
ECHO  - Wyˆ¥czenie dost©pu do j©zyka lokalnego dla przegl¥darek
ECHO  - Wyˆ¥czenie filtra Smart screen dla URL
ECHO  - Synchronizacja ustawieä
ECHO  - Wyˆ¥cz synchronizacj© wszystkich ustawieä
ECHO  - Wyˆ¥cz synchronizacj© wygl¥du
ECHO  - Wyˆ¥cz synchronizacj© przegl¥darki
ECHO  - Wyˆ¥cz synchronizacj© haseˆ
ECHO  - Wyˆ¥cz synchronizacj© dostepno˜ci
ECHO  - Wyˆ¥cz synchronizacj© ustawieä zaawansowanych Windows
ECHO  - CORTANA
ECHO  - Wyˆ¥czenie Cortany i reset danych
ECHO  - Wyˆ¥czenie personalizacji wprowadzania 5 of 5
ECHO  - Wyˆ¥czenie CortanySearchBar
ECHO  - Wyˆ¥czenie udostepniania loklaizacji do wyszukiwana
ECHO  - Wyˆ¥czenie wyszukiwania z pulpitu
ECHO  - Wyˆ¥czenie przeszukiwania sieci przez Cortan©
ECHO  - LOKALIZACJA
ECHO  - Wyˆ¥czenie usˆugi Geolokalizacji 
ECHO[
ECHO  ... Wci˜nij dowolny klawisz klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 4
CLS
ECHO[ 
ECHO  ... Tryb ADV blokuje mo¾liwie najwi©cej szpieg¢w, dla os¢b ceni¥cych sobie prywatno˜†
ECHO      NIE ZALECANE dla u¾ytkownik¢w korzystaj¥cych z kafli
ECHO  - WINDOWS UPDATE
ECHO  - Wyˆ¥czenie przypomnienia sondy do M$
ECHO  - Wyˆ¥czenie rozszerzenia wyszukiwania BingECHO  - Wyˆ¥czenie OneDrive
ECHO  - Wyˆ¥czenie SmartScreen
ECHO  - Wyˆ¥czenie transmisji wpisywanych informacji
ECHO  - Wyˆ¥czenie Centrum Akcji
ECHO  - Wyˆ¥czenie Centrum Powiadomieä
ECHO  - Blokowanie HOSTS
ECHO  - Sklep Windows, Xbox Live
ECHO  - Blokowanie SZPIEGOWANIA MICROSOFT
ECHO  - Blokowanie HOSTS SKYPE REKLAMY
ECHO  - Blokowanie HOSTS MICROSOFT+NSA:
ECHO  - BLOKADA IP - ROUTING - mo¾e blokowa† serwery aktywacji Microsoft ^^!^^!^^!
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 5
CLS
ECHO[ 
ECHO  ... Tryb HIGH - Usuwa wszystkie APPS dla bie¾¥cego konta u¾ytkownika ^^!^^!^^!
ECHO      APPS Mo¾na przywr¢ci† tworz¥c nowe konto u¾ytkownika.
ECHO      Jest jeszcze metoda r©czna, ale czasochˆonna / szuka† w Google / 
ECHO[
ECHO  ... Je¾eli potrzebujesz zmodyfikowa† skrypt pod wˆasne ustawienia. Dowoln¥ linie w skrypcie mo¾na
ECHO      pomin¥† wpisuj¥c REM przed t¥ lini¥ np. 
ECHO      REM CALL :SubExec NET STOP "diagtrack" - zostanie ona pomini©ta
ECHO[
ECHO  ... ZESTAW NARZ¨DZI / HOSTS / ROUTE / WINDOWS UPDATE / LOG-  
ECHO      w ˆatwy spos¢b pozwalana zarz¥dzanie funkcjami
ECHO      zwi¥zane ze skryptem, plikiem hosts oraz Windows UPDATE. Pozwala na odblokowanie:
ECHO      Xbox, Sklepu Windows, Wyszukiwarki Bing, odblokowanie AUTO-OBROTU po zastosowaniu skryptu, 
ECHO      oraz odpowiednio sparametryzowa† Windows Update.
ECHO      Gwiazdka przed znakiem wyboru oznacza uruchomion¥ / wˆ¥czon¥ funkcj©        
echo
ECHO[
ECHO  ... Tryb DIAGNOSTYCZNY - sprawdzenie czy skrypt jest przyczyn¥ nieprawidˆowego dziaˆania
ECHO      programu, funkcji systemu Windows 10 - cofa zmiany dokonane przez skrypt
ECHO[
ECHO  ^^! Tryb CORE: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                     Oczyszcza wszystko poza poprzednimi instalacjami OS i plikami Upgrade'u.
ECHO[
ECHO  ^^! Tryb ADV/HIGH: u¾ywa narz©dzia do oczyszczania dysku Windows CLEANMGR.
ECHO                            Oczyszcza wszystkie dost©pne opcje w tym narz©dziu.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 6
CLS
ECHO[
ECHO  ... Przeˆ¥czniki wiersza poleceä:
ECHO   /noupdate     - pomija sprawdzanie on-line czy wersja programu jest aktualna
ECHO   /norestore    - bez tworzenia punktu przywracania
ECHO   /quickrestore - szybki - asynchronicznie(!) wykonywany do skryptu, punkt przywracania systemu
ECHO                   z domy˜ln¥ nazw¥ oraz bi©¾¥cym czasem wykonania np: 
ECHO                   Win10 RemoveSpy_AIO - /quickrestore 2016-12-27_14:03:50
ECHO   /nocleanmgr   - bez u¾ycia narz©dzia Windows Cleanmgr 
ECHO   /core         - wybrano tryb automatyczny CORE
ECHO   /adv          - wybrano tryb automatyczny ADV
ECHO   /high         - wybrano tryb automatyczny HIGH
ECHO   /pro          - wybrano tryb automatyczny PRO
ECHO   /restart      - automatyczny restart komptera w 10 sekund po zakoäczeniu skryptu
ECHO   /shutdown     - automatyczne wyˆ¥cznie komputera w 10 sekund po zakoäczeniu skryptu
ECHO[
ECHO  ... W przypadku u¾ycia dw¢ch tryb¢w pierwszeästwo ma zawsze najni¾szy (CORE)
ECHO[
ECHO  ... Przykˆad u¾ycia: RemoveSPY_AIOv23.cmd /norestore /nocleanmgr /restart /adv
ECHO   Skrypt uruchomi si© automatycznie dla danego systemu:
ECHO   bez punktu przywracania systemu, bez u¾ycia narz©dzia Windows Cleanmgr w trybie ADV i 
ECHO   po 10 sekundach wykona restart
ECHO[
ECHO  ... Przeˆ¥czniki mo¾na stosowa† w dowolnej kolejno˜ci
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby aby przej˜† dalej
PAUSE > NUL
TITLE %PROGRAMNAME%-%VERSION% ... MENU ... Pomoc - 7
CLS
ECHO[
ECHO  ... Opis Trybu PRO:
ECHO[
ECHO   Tryb ten  polega na USUNI¨CIU z Windowsa okre˜lonych KOMPONENTàW,
ECHO[  peˆna ich lista jest w skrypcie - zaczyna sie od etykiety :WIN10PRO .
ECHO   Wszystkie te komponenty s¥ w p©tli - czyli s¥ usuwane po kolei.
ECHO   Nale¾y dostosowa† list© komponent¢w kt¢re potrzebujesz usun¥†,
ECHO   trzeba wykasowa† komentarz /REM-/ na pocz¥tku lini p©tli.
ECHO   Aby pozostawi† wybrane komponenty powinno to wygl¥da† tak:
ECHO    REM-Microsoft-Windows-TabletPC,
ECHO    REM-Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   Aby usun¥† wybrane komponenty powinno to wygl¥da† tak:
ECHO    Microsoft-Windows-TabletPC
ECHO    Microsoft-Windows-WindowsMediaPlayer,
ECHO    itd....
ECHO[
ECHO   NIE MO½LIWO—CI PRZYWRàCENIA ICH - TO JEST WYCIECZKA TYLKO W JEDN¤ STRON¨ BEZ POWROTU ^^!^^!^^!  
ECHO[
ECHO   Uwaga Tryb Online - do prawidˆowego dziaˆania pobiera plik .exe do usuni©cia komponent¢w Windows
ECHO   Tryb PRO jest przeznaczony bardziej dla os¢b bli¾szych formatu dysku C:  
ECHO   Mo¾na w ten spos¢b potestowa† jak dziaˆa Windows bez zb©dnego balastu, sprawdzi† stabilno˜†.
ECHO[
ECHO   Bardzo zale¾y mi na feedbacku z tytuˆu u¾ytkowania tak 'okrojonego' Windowsa na realnym sprz©cie 
ECHO   i w realnych warunkach u¾ytkowania a nie np. na VirtualBoxie.
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby powr¢ci† do menu gˆ¢wnego
PAUSE > NUL
PAUSE > NUL
GOTO WIN10_VER

:WIN10_TOOLS
@ECHO OFF

:WIN10_TOOLS_REG2
REM Sprawdzenie stanu Aktualizacji sterownik¢w w Windows Update
REG QUERY "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /V ExcludeWUDriversInQualityUpdate >nul 2>&1
IF %ERRORLEVEL% == 0 SET DA=* & SET DB=  
IF %ERRORLEVEL% == 1 SET DB=* & SET DA=  

:WIN10_TOOLS_CHECK_REG3
@ECHO OFF
REG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate" /v AutoDownload >nul 2>&1
IF ERRORLEVEL==1 SET MA=? & SET MB=? & GOTO WIN10_TOOLS_REG4
IF ERRORLEVEL==0 GOTO WIN10_TOOLS_REG4
 
:WIN10_TOOLS_REG4
REM Sprawdzenie stanu Wˆ¥czenia usˆugi Windows Update
REG QUERY "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /V NoAutoUpdate >nul 2>&1
IF %ERRORLEVEL% == 0 SET CA=* & SET CB=  
IF %ERRORLEVEL% == 1 SET CB=* & SET CA=  

:WIN10_TOOLS_REG5
REM Sprawdzenie stanu Rozszerzenie wyszukiwania aktualizacji w Windows Update
REG QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Services" /V DefaultService >nul 2>&1
IF %ERRORLEVEL% == 0 SET RA=* & SET RB=  
IF %ERRORLEVEL% == 1 SET RB=* & SET RA=  


:WIN10_TOOLS_START
SET HOSTS_TYPE_MS=WIN10_EDIT
SET ROUTE_TYPE_MS=WIN10_EDIT
SET EVENT_TYPE_MS=WIN10_EDIT
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Menu ... Narz©dzia
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win10
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Narz©dzia
ECHO[
ECHO   1. Utw¢rz kopi© pliku hosts z bie¾¥c¥ dat¥ i godzin¥   
ECHO   2. Przywr¢† oryginalny plik hosts
ECHO   3. Otw¢rz i edytuj plik hosts / zdj©ta blokada zapisu /
ECHO   4. Wstaw do hosts wpisy blokuj¥ce M$
ECHO   5. Wstaw do hosts wpisy blokuj¥ce reklamy Skype
ECHO   6. Wstaw do hosts wpisy blokuj¥ce M$ + NSA [Xbox]
ECHO   N. Wstaw do hosts wpisy blokuj¥ce (N)OCOIN - kopanie ET/BIT/etc-COIN¢w
ECHO   7. Odblokuj ROUTE
ECHO   O. Zablokuj R(O)UTE
ECHO   8. Otw¢rz p(L)ik / W(Y)czy˜† plik logu [ C:\Windows\RemoveSpy_AIO.log ]
ECHO   U. Odblokowanie WU - Odblok(U)j        metoda/Usoclient + more/
ECHO   u. Zablokowanie WU - Zablok(u)j        metoda/Usoclient + more/
ECHO %DB%D. Wˆ¥czenie automatycznej aktualizacji (D)la sterownik¢w przez Windows Update
ECHO %DA%d. Wyˆ¥czenie automatycznej aktualizacji (d)la sterownik¢w przez Windows Update
ECHO %CB%C. Wˆ¥(C)zenie usˆugi Windows UPDATE !
ECHO %CA%c. Wyˆ¥(c)zenie usˆugi Windows UPDATE !
ECHO %RA%R. Wˆ¥czenie (R)ozszerzenie wyszukiwania aktualizacji w Windows Update (np. OFFICE)
ECHO %RB%r. Wyˆ¥czenie Rozsze(r)zenie wyszukiwania aktualizacji w Windows Update (np. OFFICE)
ECHO[
ECHO  9. Powr¢t do menu gˆ¢wnego ...
ECHO[
SET /P CHOICEWIN10TOOLS= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN10TOOLS%'=='' ECHO "%CHOICEWIN10TOOLS%" Wpisz jeszcze raz
IF '%CHOICEWIN10TOOLS%'=='1' GOTO WIN10_TOOLS_HOSTS_KOPIA
IF '%CHOICEWIN10TOOLS%'=='2' GOTO WIN10_TOOLS_HOSTS_CLEAR
IF '%CHOICEWIN10TOOLS%'=='3' GOTO WIN10_TOOLS_HOSTS_EDIT
IF '%CHOICEWIN10TOOLS%'=='4' GOTO HOSTS_MS
IF '%CHOICEWIN10TOOLS%'=='5' GOTO HOSTS_SKYPE
IF '%CHOICEWIN10TOOLS%'=='6' GOTO HOSTS_NSA
IF '%CHOICEWIN10TOOLS%'=='n' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN10TOOLS%'=='N' GOTO HOSTS_NOCOIN
IF '%CHOICEWIN10TOOLS%'=='7' GOTO ROUTE_REVERTBACK
IF '%CHOICEWIN10TOOLS%'=='o' GOTO ROUTE
IF '%CHOICEWIN10TOOLS%'=='O' GOTO ROUTE
IF '%CHOICEWIN10TOOLS%'=='l' GOTO WIN10_TOOLS_RSAIO_LOG
IF '%CHOICEWIN10TOOLS%'=='L' GOTO WIN10_TOOLS_RSAIO_LOG
IF '%CHOICEWIN10TOOLS%'=='y' GOTO WIN10_TOOLS_CLEARLOG
IF '%CHOICEWIN10TOOLS%'=='Y' GOTO WIN10_TOOLS_CLEARLOG
IF '%CHOICEWIN10TOOLS%'=='U' GOTO WIN10_TOOLS_WU_UNBLOCK_USO_MORE
IF '%CHOICEWIN10TOOLS%'=='u' GOTO WIN10_TOOLS_WU_BLOCK_USO_MORE
IF '%CHOICEWIN10TOOLS%'=='D' GOTO WIN10_TOOLS_AKTUA_DRIVERS_ON
IF '%CHOICEWIN10TOOLS%'=='d' GOTO WIN10_TOOLS_AKTUA_DRIVERS_OFF
IF '%CHOICEWIN10TOOLS%'=='C' GOTO WIN10_TOOLS_WINDOWS_UPDATE_ON
IF '%CHOICEWIN10TOOLS%'=='c' GOTO WIN10_TOOLS_WINDOWS_UPDATE_OFF
IF '%CHOICEWIN10TOOLS%'=='R' GOTO WIN10_TOOLS_EXTENDWU_ON
IF '%CHOICEWIN10TOOLS%'=='r' GOTO WIN10_TOOLS_EXTENDWU_OFF
IF '%CHOICEWIN10TOOLS%'=='9' GOTO WIN10_VER
GOTO WIN10_TOOLS

:WIN10_TOOLS_HOSTS_KOPIA
CLS
@ECHO OFF
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :Log HOSTS kopia
ECHO[
ECHO ÿ... Kopia hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj 
TIMEOUT /T 4 > NUL
GOTO WIN10_TOOLS

:WIN10_TOOLS_HOSTS_CLEAR
CLS
@ECHO OFF
REM ZDJ¨CIE ATRYBUTU READ
CALL :SubExec ATTRIB -R %AIO_HOSTS%
REM Plik Hosts na nowo
CALL :SubExec REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
REM ZAO½ENIE ATRYBUTU READ
CALL :SubExec ATTRIB +R %AIO_HOSTS%
CALL :Log HOSTS oryginalny
REM Koniec wpisania na nowo pliku HOSTS
ECHO[
ECHO ÿ... Oryginalny plik hosts OK
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
GOTO WIN10_TOOLS

:WIN10_TOOLS_HOSTS_EDIT
CLS
@ECHO OFF
CALL :SubExec ATTRIB -R %AIO_HOSTS%
START notepad.exe %AIO_HOSTS%
CALL :Log HOSTS edycja
GOTO WIN10_TOOLS

:WIN10_TOOLS_RSAIO_LOG
CLS
@ECHO OFF
START notepad.exe %AIO_LOG%
CALL :Log RemoveSpy_AIO.log
GOTO WIN10_TOOLS

:WIN10_TOOLS_CLEARLOG
REM. > %AIO_LOG%
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO% >> %AIO_LOG%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION% >> %AIO_LOG%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win10 >> %AIO_LOG%
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    LOG >> %AIO_LOG%
ECHO[
ECHO ÿ... RemoveSpy_AIO.log - Wyczyszczony - wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 2 > NUL
GOTO WIN10_TOOLS

:WIN10_TOOLS_WU_UNBLOCK_USO_MORE
@ECHO OFF
CLS
ECHO[
CALL :SubExec icacls "%systemroot%\System32\osrss.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\UsoClient.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSMedic.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\WaasMedicSvc.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSMedicPS.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSAssessment.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\SIHClient.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\MusNotificationUx.exe" /reset
ECHO[
ECHO ÿ... Odblokowano Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Odblokowano Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_WU_BLOCK_USO_MORE
@ECHO OFF
CLS
ECHO[
CALL :SubExec takeown /f "%systemroot%\System32\osrss.dll" /a
CALL :SubExec icacls "%systemroot%\System32\osrss.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\osrss.dll" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\UsoClient.exe" /a
CALL :SubExec icacls "%systemroot%\System32\UsoClient.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\UsoClient.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\WaaSMedic.exe" /a
CALL :SubExec icacls "%systemroot%\System32\WaaSMedic.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSMedic.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18
CALL :SubExec icacls "%systemroot%\System32\WaaSMedic.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\WaasMedicSvc.dll" /a
CALL :SubExec icacls "%systemroot%\System32\WaasMedicSvc.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\WaasMedicSvc.dll" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\WaaSMedicPS.dll" /a
CALL :SubExec icacls "%systemroot%\System32\WaaSMedicPS.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSMedicPS.dll" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\WaaSAssessment.dll" /a
CALL :SubExec icacls "%systemroot%\System32\WaaSAssessment.dll" /reset
CALL :SubExec icacls "%systemroot%\System32\WaaSAssessment.dll" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\SIHClient.exe" /a
CALL :SubExec icacls "%systemroot%\System32\SIHClient.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\SIHClient.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

CALL :SubExec takeown /f "%systemroot%\System32\MusNotificationUx.exe" /a
CALL :SubExec icacls "%systemroot%\System32\MusNotificationUx.exe" /reset
CALL :SubExec icacls "%systemroot%\System32\MusNotificationUx.exe" /inheritance:r /remove *S-1-5-32-544 *S-1-5-11 *S-1-5-32-545 *S-1-5-18

ECHO[
ECHO ÿ... Zablokowano Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Zablokowano Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_AKTUA_DRIVERS_ON
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /V ExcludeWUDriversInQualityUpdate /F >nul 2>&1
ECHO[
ECHO  ... Wˆ¥czono automatyczn¥ aktualizacj© sterownik¢w przez Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log W³¹czono automatyczn¹ aktualizacjê sterowników przez Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_AKTUA_DRIVERS_OFF
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /V ExcludeWUDriversInQualityUpdate /T REG_DWORD /D 1 /F >nul 2>&1
ECHO[
ECHO  ... Wyˆ¥czono automatyczn¥ aktualizacj© sterownik¢w przez Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Wy³¹czono automatyczn¹ aktualizacjê sterowników przez Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_AKTUA_APPS_ON
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate" /V AutoDownload /T REG_DWORD /D 4 /F >nul 2>&1
ECHO[
ECHO  ... Wˆ¥czona automatyczna aktualizacja APPS przez Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log
GOTO WIN10_TOOLS

:WIN10_TOOLS_AKTUA_APPS_OFF
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate" /V AutoDownload /T REG_DWORD /D 2 /F >nul 2>&1
ECHO[
ECHO  ... Wyˆ¥czona automatyczna aktualizacja APPS przez Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log
GOTO WIN10_TOOLS

:WIN10_TOOLS_WINDOWS_UPDATE_ON
@ECHO OFF
CLS
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /V NoAutoUpdate /F >nul 2>&1
ECHO[
NET START "wuauserv"
ECHO[
SC CONFIG "wuauserv" START= AUTO

CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\sih"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\sihboot"

CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"

ECHO[
ECHO  ... Wˆ¥czono Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log W³¹czono Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_WINDOWS_UPDATE_OFF
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /V NoAutoUpdate /T REG_DWORD /D 1 /F >nul 2>&1
ECHO[
CALL :SubExec NET STOP "wuauserv"
ECHO[
CALL :SubExec SC CONFIG "wuauserv" START= DISABLED

CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\sih"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\sih"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\sihboot"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\sihboot"

CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"

CALL :SubExec NET STOP "wuauserv"
ECHO[
ECHO  ... Wyˆ¥czono Windows Update
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Wy³¹czono Windows Update
GOTO WIN10_TOOLS

:WIN10_TOOLS_EXTENDWU_ON
@ECHO OFF
CLS
SET WUMUON=%SYSTEMDRIVE%\WIN10_MU_ON.vbs
REM. > %SYSTEMDRIVE%\WIN10_MU_ON.vbs
ECHO ^Set ServiceManager = CreateObject("Microsoft.Update.ServiceManager") >>%WUMUON%
ECHO ^ServiceManager.ClientApplicationID = "My App" >>%WUMUON%
ECHO[ >>%WUMUON%
ECHO ^Set NewUpdateService = ServiceManager.AddService2("7971f918-a847-4430-9279-4a52d1efe18d",7,"") >>%WUMUON%
START "" /high /B /WAIT cscript.exe "%SYSTEMDRIVE%\WIN10_MU_ON.vbs" //Nologo
DEL /F /Q %SYSTEMDRIVE%\WIN10_MU_ON.vbs>nul 2>&1
ECHO[
ECHO  ... Wˆ¥czenie rozszerzenia wyszukiwania aktualizacji w Windows Update (np. OFFICE)
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
CALL :Log W³¹czenie rozszerzenie wyszukiwania aktualizacji w Windows Update (np. OFFICE)
TIMEOUT /T 3 > NUL
GOTO WIN10_TOOLS

:WIN10_TOOLS_EXTENDWU_OFF
@ECHO OFF
CLS
SET WUMUOFF=%SYSTEMDRIVE%\WIN10_MU_OFF.vbs
REM. > %SYSTEMDRIVE%\WIN10_MU_OFF.vbs
ECHO ^Set ServiceManager = CreateObject("Microsoft.Update.ServiceManager") >>%WUMUOFF%
ECHO ^ServiceManager.ClientApplicationID = "My App" >>%WUMUOFF%
ECHO[ >>%WUMUOFF%
ECHO ^ServiceManager.RemoveService("7971f918-a847-4430-9279-4a52d1efe18d") >>%WUMUOFF%
START "" /high /B /WAIT cscript.exe "%SYSTEMDRIVE%\WIN10_MU_OFF.vbs" //Nologo 
DEL /F /Q %SYSTEMDRIVE%\WIN10_MU_OFF.vbs>nul 2>&1
ECHO[
ECHO  ... Wyˆ¥czenie rozszerzenia wyszukiwania aktualizacji w Windows Update (np. OFFICE)
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
CALL :Log Wy³¹czenie rozszerzenie wyszukiwania aktualizacji w Windows Update (np. OFFICE)
TIMEOUT /T 3 > NUL
GOTO WIN10_TOOLS


:WIN10_TOOLSX
SET EVENT_TYPE_MS=WIN10_EDIT
REM Sprawdzenie stanu Xbox DVR
REG QUERY "HKCU\System\GameConfigStore /V GameDVR_Enabled >nul 2>&1
IF %ERRORLEVEL% EQU 0x0 SET VA=* & SET VB=  
IF %ERRORLEVEL% EQU 0x1 SET VB=* & SET VA=  

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Menu ... Narz©dziaX
CLS
ECHO       ___   ____ __  ___ ____  _   __ ____    ____ ___ __  __    ___    ____ ____   %VERSIONINFO%
ECHO  m4s / _ \ / __//  ^|/  // __ \^| ^| / // __/   / __// _ \\ \/ /   / _ ^|  /  _// __ \   %VERSION%
ECHO     / , _// _/ / /^|_/ // /_/ /^| ^|/ // _/    _\ \ / ___/ \  /   / __ ^| _/ / / /_/ /   Win10
ECHO    /_/^|_^|/___//_/  /_/ \____/ ^|___//___/   /___//_/     /_/   /_/ ^|_^|/___/ \____/    Narz©dziaX
ECHO[
ECHO   1.  Usuni©cie wszystkich APPX opr¢cz Windows Store i XBOX ! - mo¾liwos† dostosowania element¢w,
ECHO       poprzez edycj© skryptu - znjad« w skrypcie :WIN10_TOOLSX_APPX
ECHO       Potrzebne kompenenty zostaw przez u¾ycie REM - zapisz zmiany i gotowe
ECHO[
ECHO   S. Odblokuj menu (S)tart /wyszarzone po trybie PRO+HIGH/ - fix
ECHO      Naprawia te¾ brak mo¾liwo˜ci wej˜cia w Kompozycje
ECHO   r. Odblokuj menu Sta(r)t /wyszarzone po trybie PRO+HIGH/ - fix M$
ECHO   Z. Wyczy˜† Dziennik (Z)darzeä systemu Windows
ECHO   t. Odinstaluj OneDrive z sys(t)emu
ECHO   f. Usuä bezpowrotnie Windows De(f)endera z systemu / uruchom drugi raz po restarcie ^^!
ECHO      UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows     
ECHO   O. Wyˆacz zap(o)r© Defedner - wymagany RESTART komputera
ECHO   P. Wˆ¥cz za(p)or© Defender - wymagany RESTART komputera
ECHO   U. Usuä bezpowrotnie Windows (U)pdate z systemu
ECHO      UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows  
ECHO   C. Usuä bezpowrotnie (C)ortan© z Windows
ECHO      UWAGA ^^!^^!^^! Tryb Online - pobiera plik .exe do usuni©cia komponent¢w Windows  
ECHO   N. Usuä bezpowrot(n)ie SmartScreen z systemu  
ECHO   K. Odblokowanie S(k)lep Windows [Wpis hosts + usˆugi]
ECHO   B. Odblokowanie (B)ing [Wpis ROUTE]
ECHO   A. Odblokowanie (A)uto-obrotu - TABLET MODE
ECHO   D. Odblokowanie (D)otyku - Przydatne w tabletach
ECHO   e. Odblokowanie Biom(e)tryki - np. czujnik lini papilarnych etc ...
ECHO   X. Odblokowanie (X)box / Usˆugi + hosts + Zadania/
ECHO %VB%V. Wˆ¥czenie D(V)R Xbox 
ECHO %VA%v. Wyˆ¥czenie D(v)R Xbox
ECHO[
ECHO  9. Powr¢t do menu gˆ¢wnego ...
ECHO[
SET /P CHOICEWIN10TOOLSX= ... Gotowy do dziaˆania - wyb¢r nale¾y do Ciebie [+ENTER] - 
IF '%CHOICEWIN10TOOLSX%'=='' ECHO "%CHOICEWIN10TOOLSX%" Wpisz jeszcze raz
IF '%CHOICEWIN10TOOLSX%'=='1' GOTO WIN10_TOOLSX_APPX
IF '%CHOICEWIN10TOOLSX%'=='s' GOTO WIN10_TOOLSX_UNBLOCK_START_TILE1
IF '%CHOICEWIN10TOOLSX%'=='S' GOTO WIN10_TOOLSX_UNBLOCK_START_TILE1
IF '%CHOICEWIN10TOOLSX%'=='r' GOTO WIN10_TOOLSX_UNBLOCK_START_TILE2
IF '%CHOICEWIN10TOOLSX%'=='R' GOTO WIN10_TOOLSX_UNBLOCK_START_TILE2
IF '%CHOICEWIN10TOOLSX%'=='z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN10TOOLSX%'=='Z' GOTO EVENTLOGCLEANER
IF '%CHOICEWIN10TOOLSX%'=='t' GOTO WIN10_TOOLSX_ONEDRIVE_UNINSTALL
IF '%CHOICEWIN10TOOLSX%'=='T' GOTO WIN10_TOOLSX_ONEDRIVE_UNINSTALL
IF '%CHOICEWIN10TOOLSX%'=='f' GOTO WIN10_TOOLSX_DEFENDER_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='F' GOTO WIN10_TOOLSX_DEFENDER_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='o' GOTO WIN10_TOOLSX_DEFENDER_FIREWAL_OFF
IF '%CHOICEWIN10TOOLSX%'=='O' GOTO WIN10_TOOLSX_DEFENDER_FIREWAL_OFF
IF '%CHOICEWIN10TOOLSX%'=='p' GOTO WIN10_TOOLSX_DEFENDER_FIREWAL_ON
IF '%CHOICEWIN10TOOLSX%'=='P' GOTO WIN10_TOOLSX_DEFENDER_FIREWAL_ON
IF '%CHOICEWIN10TOOLSX%'=='u' GOTO WIN10_TOOLSX_WINDOWSUPDATE_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='U' GOTO WIN10_TOOLSX_WINDOWSUPDATE_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='c' GOTO WIN10_TOOLSX_CORTANA_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='C' GOTO WIN10_TOOLSX_CORTANA_DESTROY
IF '%CHOICEWIN10TOOLSX%'=='n' GOTO WIN10_TOOLSX_REMOVE_SMARTSCREEN
IF '%CHOICEWIN10TOOLSX%'=='N' GOTO WIN10_TOOLSX_REMOVE_SMARTSCREEN
IF '%CHOICEWIN10TOOLSX%'=='k' GOTO WIN10_TOOLSX_STORE_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='K' GOTO WIN10_TOOLSX_STORE_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='b' GOTO WIN10_TOOLSX_BING_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='B' GOTO WIN10_TOOLSX_BING_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='a' GOTO WIN10_TOOLSX_AUTOROTATIONMODE
IF '%CHOICEWIN10TOOLSX%'=='A' GOTO WIN10_TOOLSX_AUTOROTATIONMODE
IF '%CHOICEWIN10TOOLSX%'=='d' GOTO WIN10_TOOLSX_TOUCH_CREEN
IF '%CHOICEWIN10TOOLSX%'=='D' GOTO WIN10_TOOLSX_TOUCH_CREEN
IF '%CHOICEWIN10TOOLSX%'=='e' GOTO WIN10_TOOLSX_BIOMETRYKA_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='E' GOTO WIN10_TOOLSX_BIOMETRYKA_UNBLOCK
IF '%CHOICEWIN10TOOLSX%'=='x' GOTO WIN10_TOOLSX_XBOX_ON
IF '%CHOICEWIN10TOOLSX%'=='X' GOTO WIN10_TOOLSX_XBOX_ON
IF '%CHOICEWIN10TOOLSX%'=='V' GOTO WIN10_TOOLSX_XboxGameDVR_ON
IF '%CHOICEWIN10TOOLSX%'=='v' GOTO WIN10_TOOLSX_XboxGameDVR_OFF
IF '%CHOICEWIN10TOOLSX%'=='9' GOTO WIN10_VER
GOTO WIN10_TOOLSX
EXIT


:WIN10_TOOLSX_APPX
CLS
::::::::::::::::::::::::::::::::::::::::::::::
::::::   SEKCJA USUWANIA APLIKACJI APPX  :::::
:::  dodaj REM przed linijk¥ POWERSHELL    :::
:::  wtedy nie usuwa wybranej aplikacji    :::   
::::::::::::::::::::::::::::::::::::::::::::::
CLS
ECHO  ... Usuwane s¥ aplikacje Kafelki 
ECHO  ... Je¾eli b©dziesz potrzebowaˆ Kafelk¢w to utw¢rz nowe konto u¾ytkownika
@ECHO OFF
REM SKLEP WINDOWS - DOMY—LNIE ZOSTAWIONY
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *WindowsStore* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *StorePurchaseApp* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Services.Store.Engagement* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM SKLEP WINDOWS - DOMY˜LNIE ZOSTAWIONY
REM XBOX - DOMY˜LNIE ZOSTAWIONY
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.XboxGameCallableUI* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Xbox.TCUI* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.XboxApp* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.XboxGameOverlay* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.XboxIdentityProvider* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.XboxSpeechToTextOverlay* | Remove-AppxPackage -ErrorAction SilentlyContinue"
REM XBOX - DOMY˜LNIE ZOSTAWIONY
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.BingWeather* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.DesktopAppInstaller* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.GetHelp* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Getstarted* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Messaging* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Microsoft3DViewer* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.MicrosoftOfficeHub* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.MicrosoftSolitaireCollection* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.MicrosoftStickyNotes* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.MSPaint* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Office.OneNote* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.OneConnect* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.People* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Print3D* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.SkypeApp* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Wallet* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.Windows.Photos* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsAlarms* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsCalculator* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsCamera* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *microsoft.windowscommunicationsapps* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsFeedbackHub* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsMaps* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.WindowsSoundRecorder* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.ZuneMusic* | Remove-AppxPackage -ErrorAction SilentlyContinue"
POWERSHELL -command "Get-AppXPackage -User $env:UserName *Microsoft.ZuneVideo* | Remove-AppxPackage -ErrorAction SilentlyContinue"

START /WAIT EXIT powershell
ECHO[
ECHO  ... APPSX zostaˆy odinstalowane
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Usuniêcie APPSX
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_UNBLOCK_START_TILE1
REM 
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\AppXSvc" /V Start /T REG_DWORD /D 3 /F >nul 2>&1
ECHO[
ECHO ÿ... Menu Start zostaˆo odblokowane
ECHO[
ECHO  ... Nie zapomnij zrestartowa† ponownie komputera / tylko wtedy zadziaˆa /
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 8 > NUL
CALL :Log Menu Start zostaˆo odblokowane - fix
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_UNBLOCK_START_TILE2
REM Serwer M$
REM START http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/startmenu.diagcab
REM Serwer Zapasowy
REM START http://m4s.cba.pl/startmenu.diagcab
@ECHO OFF
CLS
ECHO[
ECHO  ... Gotowy na napraw© menu Start?
ECHO[
ECHO  ... Plik zostanie pobrany z serwer¢w M$ przez domy˜ln¥ przegl¥dark©
ECHO[
ECHO  ... Prosz© uruchomi† plik i post©powa† zgodnie z poleceniami
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby rozpocz¥† napraw© menu Start
PAUSE > NUL
START /MIN http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/startmenu.diagcab
ECHO[
ECHO  ... Nie zapomnij zrestartowa† ponownie komputera / tylko wtedy zadziaˆa /
ECHO[
ECHO  ... Wci˜nij dowolny klawisz aby powr¢ci† do menu skryptu
ECHO[
PAUSE > NUL
CALL :Log Menu Start zostaˆo odblokowane - fix M$
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_ONEDRIVE_UNINSTALL
@ECHO OFF
CLS
ECHO[
CALL :SubExec TASKKILL /F /IM "OneDrive.exe"
CALL :SubExec TASKKILL /F /IM "explorer.exe"
IF EXIST "C:\Windows\System32\OneDriveSetup.exe" CALL :SubExec START /WAIT C:\Windows\System32\OneDriveSetup.exe /uninstall
IF EXIST "C:\Windows\SysWOW64\OneDriveSetup.exe" CALL :SubExec START /WAIT C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall
CALL :SubExec TAKEOWN /F "%UserProfile%\OneDrive" /R /D Y
CALL :SubExec TAKEOWN /F "%LocalAppData%\Microsoft\OneDrive" /R /D Y
CALL :SubExec TAKEOWN /F "%ProgramData%\Microsoft OneDrive" /R /D Y
CALL :SubExec TAKEOWN /F "C:\OneDriveTemp" /R /D Y
CALL :SubExec ICACLS "%UserProfile%\OneDrive" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "%LocalAppData%\Microsoft\OneDrive" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "%ProgramData%\Microsoft OneDrive" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "C:\OneDriveTemp" /T /GRANT Wszyscy:F
CALL :SubExec RD "%UserProfile%\OneDrive" /Q /S
CALL :SubExec RD "%LocalAppData%\Microsoft\OneDrive" /Q /S
CALL :SubExec RD "%ProgramData%\Microsoft OneDrive" /Q /S
CALL :SubExec RD "C:\OneDriveTemp" /Q /S
CALL :SubExec RD "%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneDrive.lnk"
CALL :SubExec DEL /F /Q "%localappdata%\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe" >nul 2>&1
CALL :SubExec REG DELETE "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /F
CALL :SubExec REG DELETE "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /F

CALL :SubExec SCHTASKS /END /TN "\OneDrive Standalone Update Task*"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\OneDrive Standalone Update Task*"

CALL :SubExec START "" "explorer.exe"
CLS
ECHO[
ECHO  ... OneDrive zostaˆ odinstalowany
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Usuniêcie OneDrive
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_DEFENDER_DESTROY
CLS
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "Windows-Defender" /r
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
REM P©tla wydobywa ˜cie¾k© do lokalizacji z kt¢rej jest uruchomiony skrypt
FOR %%B IN (".\") DO SET "CURPATHPACKAGES=%%~fB"
DEL /F /Q "%CURPATHPACKAGES%\Packages.txt">nul 2>&1
CALL :SubExec TAKEOWN /F "C:\Program Files\Windows Defender" /R /D Y
CALL :SubExec TAKEOWN /F "C:\Program Files (x86)\Windows Defender" /R /D Y
CALL :SubExec TAKEOWN /F "C:\Users\All Users\Microsoft\Windows Defender" /R /D Y
CALL :SubExec TAKEOWN /F "C:\Program Files\Windows Defender Advanced Threat Protection" /R /D Y 
CALL :SubExec ICACLS "C:\Program Files\Windows Defender" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "C:\Program Files (x86)\Windows Defender" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "C:\Users\All Users\Microsoft\Windows Defender" /T /GRANT Wszyscy:F
CALL :SubExec ICACLS "C:\Program Files\Windows Defender Advanced Threat Protection" /T /GRANT Wszyscy:F
CALL :SubExec RD "C:\Program Files\Windows Defender" /Q /S
CALL :SubExec RD "C:\Program Files (x86)\Windows Defender" /Q /S
CALL :SubExec RD "C:\Users\All Users\Microsoft\Windows Defender" /Q /S
CALL :SubExec RD "C:\Program Files\Windows Defender Advanced Threat Protection" /Q /S
CALL :SubExec DEL /Q /S "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Windows Defender.lnk"
CALL :SubExec DEL /Q /S "C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\System Tools\Windows Defender.lnk"
CALL :SubExec DEL /Q /S "C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Windows Defender.lnk"
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /V Start /T REG_DWORD /D 4 /F
REM v20
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableBehaviorMonitoring /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableBehaviorMonitoring /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableOnAccessProtection /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableScanOnRealtimeEnable /T REG_DWORD /D 1 /F
REM v20
CLS
ECHO[
ECHO  ... Windows Defender usuni©ty
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Windows Defender usuniêty
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_DEFENDER_FIREWAL_OFF
CLS
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /V Start /T REG_DWORD /D 4 /F
ECHO[
ECHO  ... Zapora Windows Defender wyˆ¥czona
ECHO  ... Musisz zrestartowa† komputer 
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Zapora Windows Defender wy³¹czona
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_DEFENDER_FIREWAL_ON
CLS
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /V Start /T REG_DWORD /D 2 /F
ECHO[
ECHO  ... Zapora Windows Defender wˆ¥czona
ECHO  ... Musisz zrestartowa† komputer
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log Zapora Windows Defender w³¹czona
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_WINDOWSUPDATE_DESTROY
CLS
CALL :Log Usun bezpowrotnie Windows Update START
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /V NoAutoUpdate /T REG_DWORD /D 1 /F >nul 2>&1
ECHO[
NET STOP "wuauserv"
ECHO[
SC CONFIG "wuauserv" START= DISABLED

powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "Microsoft-OneCore-Update" /r
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
REM P©tla wydobywa ˜cie¾k© do lokalizacji z kt¢rej jest uruchomiony skrypt
FOR %%B IN (".\") DO SET "CURPATHPACKAGES=%%~fB"
DEL /F /Q "%CURPATHPACKAGES%\Packages.txt">nul 2>&1

CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\sih"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\sih"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\WindowsUpdate\sih" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\sihboot"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\sihboot"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\UpdateOrchestrator\Maintenance Install" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\UpdateOrchestrator\Reboot" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\UpdateOrchestrator\Schedule Scan" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\UpdateOrchestrator\USO_Broker_Display" /F

CALL :Log Usun bezpowrotnie Windows Update Koniec
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 5 > NUL
GOTO WIN10_TOOLSX


:WIN10_TOOLSX_CORTANA_DESTROY
CLS
CALL :Log Usun bezpowrotnie Cortan© START

powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "Microsoft-Windows-Cortana" /r
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
REM P©tla wydobywa ˜cie¾k© do lokalizacji z kt¢rej jest uruchomiony skrypt
FOR %%B IN (".\") DO SET "CURPATHPACKAGES=%%~fB"
DEL /F /Q "%CURPATHPACKAGES%\Packages.txt">nul 2>&1

CALL :Log Usun bezpowrotnie Cortan© Koniec
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 5 > NUL
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_REMOVE_SMARTSCREEN
CLS
CALL :SubExec taskkill /im smartscreen.exe /f
CALL :SubExec takeown /f "%WinDir%\System32\smartscreen.exe" /a
CALL :SubExec icacls "%WinDir%\System32\smartscreen.exe" /grant:r Administrators:F /c
CALL :SubExec icacls "%WinDir%\System32\smartscreen.exe" /grant:r Administratorzy:F /c
CALL :SubExec taskkill /im smartscreen.exe /f
CALL :SubExec del "%WinDir%\System32\smartscreen.exe" /s /f /q
ECHO[
ECHO  ... SmartScreen bezpowrotnie usuni©ty
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log SmartScreen bezpowrotnie usuniêty
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_STORE_UNBLOCK
@ECHO OFF
CLS
REM Wˆ¥czenie Zadaä Sklepu Windows
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\Badge Update"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\Sync Licenses"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\WSRefreshBannedAppsListTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\WSTask"
REM Wˆ¥czenie Automatycznie aktualizacji aplikacji
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
ECHO[
ECHO ÿ... Teraz nale¾y usun¥† z plik hosts wpis dla Sklepu Windows
ECHO[
ECHO ÿ... Wybierz w menu Pomoc - 3 i w pliku hosts wykasuj wpis od
ECHO  ... START BLOKOWANIA SKLEP WINDOWS do
ECHO ÿ... KONIEC BLOKOWANIA SKLEP WINDOWS
ECHO  ... nast©pnie zapisz plik i gotowe
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 10 > NUL
CALL :Log Sklep Windows Odblokuj
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_BING_UNBLOCK
@ECHO OFF
CLS
ECHO[
CALL :SubExec ROUTE -P DELETE 207.46.101.29 MASK 255.255.255.255 0.0.0.0
CALL :SubExec ROUTE -P DELETE 204.79.197.200 MASK 255.255.255.255 0.0.0.0
ECHO[
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V BingSearchEnabled /F >nul 2>&1
ECHO[
ECHO ÿ... Wyszukiwarka Bing Zostaˆa odblokowana
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log Wyszukiwarka Bing Zosta³a odblokowana
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_AUTOROTATIONMODE
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableSensors /T REG_DWORD /D 0 /F >nul 2>&1
ECHO[
ECHO ÿ... Auto-rotacja zostaˆa odblokowana
ECHO  ... Musisz zrestartowa† Tablet/Komputer
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log Auto-rotacja Zosta³a odblokowana
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_TOUCH_CREEN
@ECHO OFF
CLS
ECHO[
CALL :Log Wˆ¥czam usˆug© ekranu dotykowego
CALL :SubExec NET START "TabletInputService"
ECHO ÿ... Ekran Dotykowy zostaˆ odblokowany
ECHO  ... Musisz zrestartowa† Tablet/Komputer
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log Ekran Dotykowy Zosta³ odblokowany
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_BIOMETRYKA_UNBLOCK
@ECHO OFF
CLS
ECHO[
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F
ECHO[
ECHO ÿ... Usˆuga odpowiedzialna za Biometryk© zostaˆa odblokowana
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 4 > NUL
CALL :Log Us³uga odpowiedzialna za Biometrykê zosta³a odblokowana
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_XBOX_ON
@ECHO OFF
CLS
ECHO[
ECHO ... Uruchamiam usˆugi ...
ECHO[
CALL :SubExec SC CONFIG "XboxNetApiSvc" START= AUTO
CALL :SubExec NET START "XboxNetApiSvc"
CALL :SubExec SC CONFIG "XboxGipSvc" START= AUTO
CALL :SubExec NET START "XboxGipSvc"
CALL :SubExec SC CONFIG "XblGameSave" START= AUTO
CALL :SubExec NET START "XblGameSave"
CALL :SubExec SC CONFIG "XblAuthManager" START= AUTO
CALL :SubExec NET START "XblAuthManager"
CALL :SubExec SC CONFIG "xbgm" START= AUTO
CALL :SubExec NET START "xbgm"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /RUN /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"
CALL :SubExec SCHTASKS /RUN /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"
ECHO[
ECHO ÿ... Usˆugi i zadania przywr¢cone OK
ECHO[
ECHO ÿ... Teraz nale¾y usun¥† z plik hosts wpisy dla XboX
ECHO[
ECHO ÿ... Wybierz w menu Pomoc - 3 i w pliku hosts wykasuj wpisy od
ECHO  ... START BLOKOWANIA XBOX do
ECHO ÿ... KONIEC BLOKOWANIA XBOX 
ECHO  ... nast©pnie zapisz plik i gotowe
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 10 > NUL
CALL :Log XboX Przywr¢†
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_XboxGameDVR_ON
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR" /V AppCaptureEnabled /T REG_DWORD /D 1 /F >nul 2>&1
CALL :SubExec REG ADD "HKCU\System\GameConfigStore" /V GameDVR_Enabled /T REG_DWORD /D 1 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\ApplicationManagement\AllowGameDVR" /V value /T REG_DWORD /D 1 /F >nul 2>&1
ECHO[
ECHO ÿ... XboxGameDVR zostaˆ wˆ¥czony
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log XboxGameDVR Zosta³ odblokowany
GOTO WIN10_TOOLSX

:WIN10_TOOLSX_XboxGameDVR_OFF
@ECHO OFF
CLS
ECHO[
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR" /V AppCaptureEnabled /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKCU\System\GameConfigStore" /V GameDVR_Enabled /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\ApplicationManagement\AllowGameDVR" /V value /T REG_DWORD /D 0 /F >nul 2>&1
ECHO[
ECHO ÿ... XboxGameDVR zostaˆ wyˆ¥czony
ECHO[
ECHO ÿ... Wci˜nij dowolny klawisz lub poczekaj
TIMEOUT /T 3 > NUL
CALL :Log XboxGameDVR Zosta³ wy³¥czony
GOTO WIN10_TOOLSX

:WIN10_PRO
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Pro
CALL :Log ... Tryb Pro ... Start
CALL :Log czego szukasz tu ^^?
CLS
ECHO %osc%|find "Core">nul && GOTO WIN10_PRO_START
ECHO %osc%|find "Professional">nul && GOTO WIN10_PRO_START
GOTO WIN10_PRO_NOSUPPORT

:WIN10_PRO_START
CALL :Log ... Windows 10 PRO START ...
CLS
ECHO  ... Na Pewno 
PAUSE
ECHO  ... Na Pewno chcesz , zmodyfikowaˆe˜ tryb pod wˆasne potrzeby ^?
PAUSE
ECHO  ... Na Pewno tego chcesz, czytaˆe˜ instrukcj© dost©pna w gˆ¢wnym menu do tego trybu ^?^?
ECHO[
ECHO  ... Odblokowanie menu START  - Narz©dzia X / odblokuj menu START
ECHO[
PAUSE
ECHO  ... Na Pewno tego chcesz - ostatnia szansa by si© wycofa† ^^!^^!^^!

:::::::::::::::::::::::::::::::::::::::::::::::::::::
:::                    Win10                      :::
:::   SEKCJA USUWANIA APLIKACJI Z SYSTEMU         :::
:::  usuä REM- przed WYBRAN¤ LINI¤ LUB LINIAMI    :::
:::  PONI½EJ W P¨TLI FOR%%x in (                  :::
:::  WTEDY USUNIE WYBRANE KOMPONENTY              :::
:::::::::::::::::::::::::::::::::::::::::::::::::::::

CLS
powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://m4s.cba.pl/install_wim_tweakMY.exe', 'C:\install_wim_tweak.exe') }">nul
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /l
CLS
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET COUNT=1
FOR %%x IN (
REM-Adobe-Flash-For-Windows,
REM-HyperV,
REM-Microsoft-Hyper-V-ClientEdition,
REM-Microsoft-Mobile-Sensors,
REM-Microsoft-OneCore-Multimedia-CastingCommon,
REM-Microsoft-OneCore-Multimedia-CastingReceiver,
REM-Microsoft-OneCore-Multimedia-CastingTransmitter,
REM-Microsoft-OneCore-Multimedia-MFPMP,
REM-Microsoft-OneCore-Networking-DataMarketplace,
REM-Microsoft-OneCore-Ramdisk,
REM-Microsoft-OneCore-Sensors,
REM-Microsoft-OneCore-Update,
REM-Microsoft-Windows-AppManagement,
REM-Microsoft-Windows-Backup,
REM-Microsoft-Windows-Cortana,
REM-Microsoft-Windows-ContentDeliveryManager,
REM-Microsoft-Windows-DeviceGuard,
REM-Microsoft-Windows-DirectPlay,
REM-Microsoft-Windows-EditionPack-Enterprise,
REM-Microsoft-Windows-EditionPack-Professional,
REM-Microsoft-Windows-Editions-Education,
REM-Microsoft-Windows-Editions-Professional,
REM-Microsoft-Windows-Editions-ProfessionalEducation,
REM-Microsoft-Windows-Editions-ProfessionalWorkstation,
REM-Microsoft-Windows-EditionSpecific-Education,
REM-Microsoft-Windows-EditionSpecific-Professional,
REM-Microsoft-Windows-EditionSpecific-ProfessionalEducation,
REM-Microsoft-Windows-EditionSpecific-ProfessionalWorkstation,
REM-Microsoft-Windows-EducationEdition,
REM-Microsoft-Windows-Help-ClientUA-Enterprise,
REM-Microsoft-Windows-Help-ClientUA-Professional,
REM-Microsoft-Windows-HyperV-Guest,
REM-Microsoft-Windows-Internet-Browser,
REM-Microsoft-Windows-InternetExplorer,
REM-Microsoft-Windows-Killbits,
REM-Microsoft-Windows-LanguageFeatures-Handwriting,
REM-Microsoft-Windows-LanguageFeatures-OCR,
REM-Microsoft-Windows-LanguageFeatures-TextToSpeech,
REM-Microsoft-Windows-Media-Streaming,
REM-Microsoft-Windows-MediaPlayback,
REM-Microsoft-Windows-MediaPlayer,
REM-Microsoft-Windows-MobilePC-Client,
REM-Microsoft-Windows-OfflineFiles,
REM-Microsoft-Windows-OneDrive,
REM-Microsoft-Windows-PhotoBasicPackage,
REM-Microsoft-Windows-PhotoPremiumPackage,
REM-Microsoft-Windows-Power-CAD-Suite,
REM-Microsoft-Windows-TabletPC,
REM-Microsoft-Windows-Store-Client,
REM-Microsoft-Windows-SnippingTool,
REM-Microsoft-Windows-Skype-ORTC,
REM-Microsoft-Windows-SearchEngine,
REM-Microsoft-Windows-SenseClient,
REM-Microsoft-Windows-Security-SPP-Component-SKU-Education,
REM-Microsoft-Windows-Security-SPP-Component-SKU-Enterprise,
REM-Microsoft-Windows-Security-SPP-Component-SKU-Professional,
REM-Microsoft-Windows-Security-SPP-Component-SKU-ProfessionalEducation,
REM-Microsoft-Windows-Security-SPP-Component-SKU-ProfessionalWorkstation,
REM-Microsoft-Windows-NetworkDiagnostics-DirectAccessEntry,
REM-Microsoft-Windows-Printing-XPSServices,
REM-Microsoft-Windows-QuickAssist,
REM-Microsoft-Windows-RemoteAssistance,
REM-Microsoft-Windows-Shell-HomeGroup,
REM-Microsoft-Windows-SystemRestore,
REM-Microsoft-Windows-BusinessScanning,
REM-Microsoft-Windows-TextPrediction,
REM-Microsoft-Windows-WebcamExperience,
REM-Microsoft-Windows-WinOcr,
REM-Microsoft-Windows-WinSATMediaFiles,
REM-Microsoft-Windows-WMPNetworkSharingService,
REM-Microsoft-Windows-WPD,
REM-Microsoft-Windows-Xps-Foundation-Client,
REM-Microsoft-Windows-Xps-Xps-Viewer-Opt,
REM-MultiPoint-Help-Package,
REM-Networking-MPSSVC-Rules-BusinessEdition,
REM-Networking-MPSSVC-Rules-EnterpriseEdition,
REM-Sensors-Universal-Package,
REM-Server-Help-Package.ClientEnterprise,
REM-Server-Help-Package.ClientProfessional,
REM-Windows-Defender,
REM-WindowsSearchEngineSKU
) DO (
CALL :SubExecNoDisplay C:\install_wim_tweak.exe /o /c "%%x" /r
SET /A "COUNT=COUNT+1"
CLS
ECHO                 Krok !COUNT! z 82
)
CALL :SubExec C:\install_wim_tweak.exe /h /o /l
DEL /F /Q C:\install_wim_tweak.exe >nul 2>&1
DEL /F /Q %USERPROFILE%\Desktop\Packages.txt>nul 2>&1
CALL :Log ... Tryb Pro ... END

REM NIE USUWA† SYSTEM PADNIE !!!
REM Microsoft-Windows-PushNotify
REM Microsoft-Windows-PushNotifications
REM Microsoft-Windows-ShellExperienceHost
TIMEOUT /T 4
GOTO END


:WIN10_PRO_NOSUPPORT
CALL :Log ... No Support ...
CLS
GOTO END


:WIN10_HIGH
@ECHO OFF
CLS
TITLE %PROGRAMNAME%-%VERSION% ... Tryb High ... APPS UNNISTALL
ECHO  ... Usuwane s¥ aplikacje Kafelki 
ECHO  ... Je¾eli b©dziesz potrzebowaˆ Kafelk¢w to utw¢rz nowe konto u¾ytkownika
CALL :Log ... Tryb High ... APPS UNNISTALL ... Start
REM CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\AppXSvc" /V Start /T REG_DWORD /D 4 /F
@ECHO OFF
POWERSHELL.EXE -ExecutionPolicy Bypass -Command "Get-AppXPackage -User $env:UserName | Remove-AppxPackage" 2>&1>%SYSTEMDRIVE%\$null
START /WAIT EXIT powershell
DEL /F /Q %SYSTEMDRIVE%\$null>nul 2>&1
CALL :Log ... Tryb High ... APPS UNNISTALL ... END
GOTO WIN10_ADV

:WIN10_ADV
SET CLEANMGR10=1
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV
CALL :Log ... Tryb ADV

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... HOSTS
CALL :Log ... Tryb ADV ... HOSTS
GOTO HOSTS_MS
:WIN10_BACK_HOSTS

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ROUTE
CALL :Log ... Tryb ADV ... ROUTE
GOTO ROUTE
:WIN10_BACK_ROUTE

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... EVENTLOGCLEANER
CALL :Log ... Tryb ADV ... EVENTLOGCLEANER
GOTO EVENTLOGCLEANER
:WIN10_BACK_EVENTLOGCLEANER

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... DEFENDER
CALL :Log ... Tryb ADV ... DEFENDER
REM Wyˆ¥czenie Defendera i zadaä Defendera w Harmonogramie Zadaä
CALL :SubExec SC CONFIG WinDefend START= DISABLED
CALL :SubExec SC CONFIG WdNisSvc START= DISABLED
CALL :SubExec SC CONFIG SecurityHealthService START= DISABLED
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableAntiSpyware /T REG_DWORD /D 1 /F
REM v20
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableBehaviorMonitoring /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableOnAccessProtection /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableScanOnRealtimeEnable /T REG_DWORD /D 1 /F
REM v20
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... WINDOWS STORE
CALL :Log ... Tryb ADV ... WINDOWS STORE
REM Wyˆ¥czenie w Harmonogramie Zadaä Sklepu Windows
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows\WS\WSTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WS\WSTask"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... AUTOUPDATE APP
CALL :Log ... Tryb ADV ... AUTOUPDATE APP
REM Wyˆ¥czenie Automatycznej aktualizacji aplikacji w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... BEZPIECZEãSTWO
CALL :Log ... Tryb ADV ... BEZPIECZEÑSTWO
REM BEZPIECZEãSTWO
REM OKO - wyˆ¥czenie podgl¥du hasˆa na pasku hasˆa
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\CredUI" /V DisablePasswordReveal /T REG_DWORD /D 1 /F
Rem Wyˆ¥czenie Steps User Recorder
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /V DisableUAR /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie WiFi Sense - USER
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config" /V AutoConnectAllowedOEM /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie WiFi Sense Group Policy
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /V value /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /V value /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features" /V WiFiSenseOpen /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features" /V WiFiSenseCredShared /T REG_DWORD /D 0 /F
REM Skrypt do wyˆ¥czenia WiFi Sense
SETLOCAL enabledelayedexpansion
FOR /F "tokens=2" %%i in ('whoami /user /fo table /nh') DO SET USERSID=%%i
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features\%USERSID%" /V FeatureStates /T REG_DWORD /D 828 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\ABCH" /V OptInStatus /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\ABCH-SKYPE" /V OptInStatus /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\FACEBOOK" /V OptInStatus /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie Windows Media DRM Online
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\WMDRM" /V DisableOnline /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie dost©pu aplikacjom do WIFI
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{A8804298-2D5F-42E3-9531-9C8C39EB29CE}" /V Value /T REG_SZ /D "Deny" /F
REM Apps access to loosey coupled devices disabled
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\LooselyCoupled" /V Value /T REG_SZ /D "Deny" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... DEFENDER
CALL :Log ... Tryb ADV ... DEFENDER
REM WINDOWS DEFENDER AND M$ SPYNET
REM Wyˆ¥czenie raportowania do SpyNetu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SpyNetReporting /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie wysyˆania pr¢bek do M$
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SubmitSamplesConsent /T REG_DWORD /D 2 /F
REM Wyˆ¥czenie raportowania o infekcjach malware
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... PRYWATNO—
CALL :Log ... Tryb ADV ... PRYWATNOή
REM PRYWATNO—
REM Wyˆ¥czenie udost©pniania pisma odr©cznego
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\TabletPC" /V PreventHandwritingDataSharing /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie udost©pniania pisma odr©cznego-raporty
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports" /V PreventHandwritingErrorReports /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie Invertory Collector
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /V "DisableInventory" /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie kamery na ekranie logowania
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /V NoLockScreenCamera /T REG_DWORD /D 1 /F
REM Advertising info step 2 of 2
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V Enabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie powiadomieä na kafelkach, ekranie blokady, pulpicie
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /V ToastEnabled /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie dost©pu aplikacjom do powiadomieä
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{52079E78-A92B-413F-B213-E8FE35712E72}" /V Value /T REG_SZ /D "Deny" /F


REM 2018 RS4 v23
REM Wyˆ¥czenie dost©pu aplikacjom do nazwy u¾ytkownika
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do kamery
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do mikrofonu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do kontakt¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do kalendarza
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do historii poˆ¥czeä
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do mail 
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do listy zadaä
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userDataTasks" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do wiadomo˜ci
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do dokument¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do obraz¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do video
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu aplikacjom do systemu plik¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess" /V Value /T REG_SZ /D "Deny" /F
REM 2018 RS4 v23

REM Wyˆ¥czenie dost©pu do j©zyka lokalnego dla przegl¥darek
CALL :SubExec REG ADD "HKCU\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie filtra Smart screen dla URL
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /V EnableWebContentEvaluation /T REG_DWORD /D 0 /F
REM 2017 RS2
REM Wyˆ¥czenie reklam przez Bluetooth
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\Bluetooth" /V AllowAdvertising /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie ˜ledzenia uruchamiania APPS
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V Start_TrackProgs /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie dost©pu do informacji diagnostycznych dla APPS
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{2297E4E2-5DBE-466D-A12B-0F8286F0D9CA}" /V Value /T REG_SZ /D "Deny" /F
REM Wyˆ¥czenie dost©pu dla APPS w tle
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications" /V GlobalUserDisabled /T REG_DWORD /D 1 /F
REM 2018 RS3
REM Wyˆ¥czenie kopii wiadomo˜ci tekstowych na serwerach M$
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Messaging" /V AllowMessageSync /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... Edge
CALL :Log ... Tryb ADV ... Edge
REM Edge wszystko wyˆ¥cza
REM Do Not Track
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main" /V DoNotTrack /T REG_DWORD /D 1 /F
REM Disable Page Prediction
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead" /V FPEnabled /T REG_DWORD /D 0 /F
REM Disable search and website suggestion
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\User\Default\SearchScopes" /V ShowSearchSuggestionsGlobal /T REG_DWORD /D 0 /F
REM DRM
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy" /V EnableEncryptedMediaExtensions /T REG_DWORD /D 0 /F
REM Do Not Optimized Webs Search Results
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main" /V OptimizeWindowsSearchResultsForScreenReaders /T REG_DWORD /D 0 /F
REM Disable Smart Screen Filter
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter" /V EnabledV9 /T REG_DWORD /D 0 /F
REM 2017 RS2
REM Wyˆ¥czenie auto-uzupeˆniania tekstu w pasku adresu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\Browser" /V AllowAddressBarDropdown /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... SYNCHRONIZACJA
CALL :Log ... Tryb ADV ... SYNCHRONIZACJA
REM Synchronizacja ustawieä
REM Wyˆ¥cz synchronizacj© wszystkich ustawieä
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync" /V SyncPolicy /T REG_DWORD /D 5 /F
REM Wyˆ¥cz synchronizacj© wygl¥du
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Personalization" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥cz synchronizacj© przegl¥darki
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\BrowserSettings" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥cz synchronizacj© haseˆ
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Credentials" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥cz synchronizacj© dost©pno˜ci
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Accessibility" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥cz synchronizacj© ustawieä zaawansowanych Windows
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Windows" /V Enabled /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... CORTANA
CALL :Log ... Tryb ADV ... CORTANA
REM CORTANA
REM 
REM 2018 RS4 v23
REM Wyˆ¥czenie Cortany i reset danych 1 z 2
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Windows Search" /V CortanaConsent /T REG_DWORD /D 0 /F
REM 2018 RS4 v23

REM Wyˆ¥czenie Cortany i reset danych 2 z 2
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCortana /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V CortanaEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Experience\AllowCortana" /V value /T REG_DWORD /D 0 /F

REM Wyˆ¥czenie personalizacji wprowadzania 5 of 5
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Personalization\Settings" /V AcceptedPrivacyPolicy /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Language" /V Enabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\InputPersonalization" /V RestrictImplicitTextCollection /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\InputPersonalization" /V RestrictImplicitInkCollection /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /V HarvestContacts /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie CortanySearchBar
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V SearchboxTaskbarMode /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie udost©pniania lokalizacji do wyszukiwana
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowSearchToUseLocation /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie wyszukiwania z pulpitu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V DisableWebSearch /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie przeszukiwania sieci przez Cortan©
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWeb /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWebOverMeteredConnections /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchPrivacy /T REG_DWORD /D 3 /F
REM 2017 RS2
REM Wyˆ¥czenie pobierania modelu j©zyk¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Speech_OneCore\Preferences" /V ModelDownloadAllowed /T REG_DWORD /D 0 /F
REM 2018 RS3
REM Wyˆ¥czenie szukania w chmurze
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCloudSearch /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... LOKALIZACJA
CALL :Log ... Tryb ADV ... LOKALIZACJA
REM LOKALIZACJA
REM Wyˆ¥czenie usˆug Geolokalizacji, lokalizacji i auto-obrotu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableLocation /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableWindowsLocationProvider /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableLocationScripting /T REG_DWORD /D 1 /F
REM Wyˆ¥czenie auto-obrotu ekranu (TABLET !)
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableSensors /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\lfsvc\Service\Configuration" /V Status /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Overrides\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V SensorPermissionState /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V Value /T REG_SZ /D "Deny" /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Permissions\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V SensorPermissionState /T REG_DWORD /D 0 /F

REM 2017 RS2
REM USER BEHAVIOR
REM Wyˆ¥czenie wysyˆania danych do M$
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Privacy" /V TailoredExperiencesWithDiagnosticDataEnabled /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... WINDOWS UPDATE
CALL :Log ... Tryb ADV ... WINDOWS UPDATE
REM WINDOWS UPDATE
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization" /V DODownloadMode /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization" /V SystemSettingsDownloadMode /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /V DownloadMode /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /V DODownloadMode /T REG_DWORD /D 0 /F
REM REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /V DeferUpgrade /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /V ExternalIpAddress_saved /T REG_SZ /D "0.0.0.0" /F
REM 2018 RS3
REM Wyˆ¥czenie aktualizacji modelu j©zyk¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Speech" /V AllowSpeechModelUpdate /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... POZOSTAE
CALL :Log ... Tryb ADV ... POZOSTAE
REM POZOSTAE
REM Wyˆ¥czenie przypomnienia sondy do M$
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /V NumberOfSIUFInPeriod /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /V PeriodInNanoSeconds /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie rozszerzenia wyszukiwania Bing
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V BingSearchEnabled /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie OneDrive
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\OneDrive" /V DisableFileSyncNGSC /T REG_DWORD /D 1 /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "OneDrive" /F
REM Wyˆ¥czenie ikony OneDrive w oknie panelu nawigacji Eksploratora
CALL :SubExec REG ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /V System.IsPinnedToNameSpaceTree /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /V System.IsPinnedToNameSpaceTree /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie SmartScreen
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /V SmartScreenEnabled /T REG_SZ /D "OFF" /F
REM Wyˆ¥czenie transmisji wpisywanych informacji
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Input\TIPC" /V Enabled /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie zdalnych eksperyment¢w przez M$
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\System" /V AllowExperimentation /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie Centrum Akcji
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ImmersiveShell" /V UseActionCenterExperience /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie Centrum Powiadomieä
CALL :SubExec REG ADD "HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer" /V DisableNotificationCenter /T REG_DWORD /D 0 /F
REM 2016 V10
REM NO LICENSE CHECKING By default, Windows will check your license every time you turn on your PC, this will prevent it
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform" /V NoGenTicket /T REG_DWORD /D 1 /F
REM NO WINDOWS TIPS
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableSoftLanding /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableWindowsConsumerFeatures /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /V DoNotShowFeedbackNotifications /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V FeatureManagementEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V RotatingLockScreenEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SilentInstalledAppsEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SoftLandingEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SubscribedContentEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SystemPaneSuggestionsEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V OemPreInstalledAppsEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V PreInstalledAppsEnabled /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V ContentDeliveryAllowed /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V king.com.CandyCrushSaga_kgqvnymyfvs32 /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V Microsoft.MinecraftUWP_8wekyb3d8bbwe /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V 9E2F88E3.Twitter_wgeqdkkx372wm /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V Flipboard.Flipboard_3f5azkryzdbc4 /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V 6Wunderkinder.Wunderlist_b4cwydgxqx59r /T REG_DWORD /D 0 /F
REM 2017 RS2
REM Windows Explorer
REM Disable ads in Windows Explorer/OneDrive
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V ShowSyncProviderNotifications /T REG_DWORD /D 0 /F
REM 2018 RS3
REM Nie pokazuj ostatnich plik¢w/katalog¢w
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V Start_TrackDocs /T REG_DWORD /D 0 /F
REM Wyˆ¥cz dost©p OneDrive przed logowaniem w celu synchronizacji plik¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\OneDrive" /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 1 /F
REM 2018 RS4 v23
REM Wyˆ¥czenie automatycznego pobierania map
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps" /V AutoDownloadAndUpdateMapData /T REG_DWORD /D 0 /F
REM Wyˆ¥czenie nieprzerwanego ruchu sieciowego dla map
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps" /V AllowUntriggeredNetworkTrafficOnSettingsPage /T REG_DWORD /D 0 /F
REM 2018 RS4 v23

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... XBOXLIVE
CALL :Log ... Tryb ADV ... XBOXLIVE
REM Wyˆ¥czenie usˆug XboXLive
CALL :SubExec NET STOP "XboxNetApiSvc"
CALL :SubExec SC CONFIG "XboxNetApiSvc" START= DISABLED
CALL :SubExec NET STOP "XboxGipSvc"
CALL :SubExec SC CONFIG "XboxGipSvc" START= DISABLED
CALL :SubExec NET STOP "XblGameSave"
CALL :SubExec SC CONFIG "XblGameSave" START= DISABLED
CALL :SubExec NET STOP "XblAuthManager"
CALL :SubExec SC CONFIG "XblAuthManager" START= DISABLED
CALL :SubExec NET STOP "xbgm"
CALL :SubExec SC CONFIG "xbgm" START= DISABLED
CALL :SubExec SCHTASKS /END /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"

REM 2016
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... USUGI
CALL :Log ... Tryb ADV ... US£UGI

REM Optymalizacja dostarczania
CALL :SubExec NET STOP "DoSvc"
CALL :SubExec SC CONFIG "DoSvc" START= DISABLED
REM MapsBroker
CALL :SubExec NET STOP "MapsBroker"
CALL :SubExec SC CONFIG "MapsBroker" START= DISABLED
REM DataCollectionPublishingService
CALL :SubExec NET STOP "DcpSvc"
CALL :SubExec SC CONFIG "DcpSvc" START= DISABLED
REM Usˆuga geolokalizacji
CALL :SubExec NET STOP "lfsvc"
CALL :SubExec SC CONFIG "lfsvc" START= DISABLED
REM Usˆuga Windows INSIDER
CALL :SubExec NET STOP "wisvc"
CALL :SubExec SC CONFIG "wisvc" START= DISABLED
REM Usˆuga czujnik¢w
CALL :SubExec NET STOP "SensorService"
CALL :SubExec SC CONFIG "SensorService" START= DISABLED
REM Usˆuga danych czujnik¢w
CALL :SubExec NET STOP "SensorDataService"
CALL :SubExec SC CONFIG "SensorDataService" START= DISABLED
REM Tryb osadzony
CALL :SubExec NET STOP "embeddedmode"
CALL :SubExec SC CONFIG "embeddedmode" START= DISABLED
REM Wyˆ¥czenie Biometryki
REM Wyˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec NET STOP "WbioSrvc"
CALL :SubExec SC CONFIG "WbioSrvc" START= DISABLED
REM Wyˆ¥czenie w rejestrze
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /T REG_DWORD /D 0 /F

REM 2016v12
CALL :SubExec NET STOP "CDPsvc"
CALL :SubExec SC CONFIG "CDPsvc" START= DISABLED
CALL :SubExec NET STOP "AJRouter"
CALL :SubExec SC CONFIG "AJRouter" START= DISABLED
CALL :SubExec NET STOP "SmsRouter"
CALL :SubExec SC CONFIG "SmsRouter" START= DISABLED
CALL :SubExec NET STOP "NgcCtnrSvc"
CALL :SubExec SC CONFIG "NgcCtnrSvc" START= DISABLED
CALL :SubExec NET STOP "FrameServer"
CALL :SubExec SC CONFIG "FrameServer" START= DISABLED
CALL :SubExec NET STOP "WpnService"
CALL :SubExec SC CONFIG "WpnService" START= DISABLED

REM 2017v15
REM icssvc - hot spot mobilny
CALL :SubExec NET STOP "icssvc"
CALL :SubExec SC CONFIG "icssvc" START= DISABLED
REM ClipSVC - Windows Store licencjonowanie klienta
CALL :SubExec NET STOP "ClipSVC"
CALL :SubExec SC CONFIG "ClipSVC" START= DISABLED
REM imon - monitor podczerwieni
CALL :SubExec NET STOP "imon"
CALL :SubExec SC CONFIG "imon" START= DISABLED
REM RetailDemo - tryb pokazowy
CALL :SubExec NET STOP "RetailDemo"
CALL :SubExec SC CONFIG "RetailDemo" START= DISABLED
REM TimeBrokerService
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\TimeBroker" /V "Start" /T REG_DWORD /D 4 /F

REM 2017V19 rs3
REM Usˆuga diagsvc
CALL :SubExec NET STOP "diagsvc"
CALL :SubExec SC CONFIG "diagsvc" START= DISABLED
REM Usˆuga DmEnrollmentSvc
CALL :SubExec NET STOP "DmEnrollmentSvc"
CALL :SubExec SC CONFIG "DmEnrollmentSvc" START= DISABLED
REM Usˆuga GraphicsPerfSvc
CALL :SubExec NET STOP "GraphicsPerfSvc"
CALL :SubExec SC CONFIG "GraphicsPerfSvc" START= DISABLED
REM Usˆuga SEMgrSvc
CALL :SubExec NET STOP "SEMgrSvc"
CALL :SubExec SC CONFIG "SEMgrSvc" START= DISABLED
REM Usˆuga SharedRealitySvc
CALL :SubExec NET STOP "SharedRealitySvc"
CALL :SubExec SC CONFIG "SharedRealitySvc" START= DISABLED
REM Usˆuga naturalnego uwierzytelniania
CALL :SubExec NET STOP "NaturalAuthentication"
CALL :SubExec SC CONFIG "NaturalAuthentication" START= DISABLED
REM Usˆuga WarpJITSvc
CALL :SubExec NET STOP "WarpJITSvc"
CALL :SubExec SC CONFIG "WarpJITSvc" START= DISABLED
REM Usˆuga portfela
CALL :SubExec NET STOP "WalletService"
CALL :SubExec SC CONFIG "WalletService" START= DISABLED
REM Usˆuga powiadomienia drukarek
CALL :SubExec NET STOP "PrintNotify"
CALL :SubExec SC CONFIG "PrintNotify" START= DISABLED
REM Usˆuga zarz¥dzania radiem i trybem samolotowym
CALL :SubExec NET STOP "RmSvc"
CALL :SubExec SC CONFIG "RmSvc" START= DISABLED
REM Usˆuga Historii Plik¢w
CALL :SubExec NET STOP "fhsvc"
CALL :SubExec SC CONFIG "fhsvc" START= DISABLED

@ECHO OFF
REM Usˆugi do Wyˆ¥czenia MULTI
CALL :Log ... Tryb ADV ... US£UGI ... MULTI
REM klucz START
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "CDPUserSvc" ^| FIND /i "CDPUserSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "OneSyncSvc" ^| FIND /i "OneSyncSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "PimIndexMaintenanceSvc" ^| FIND /i "PimIndexMaintenanceSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UnistoreSvc" ^| FIND /i "UnistoreSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UserDataSvc" ^| FIND /i "UserDataSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "MessagingService" ^| FIND /i "MessagingService"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "WpnUserService" ^| FIND /i "WpnUserService"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 4 /f )
REM klucz UserServiceFlags
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "CDPUserSvc" ^| FIND /i "CDPUserSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "OneSyncSvc" ^| FIND /i "OneSyncSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "PimIndexMaintenanceSvc" ^| FIND /i "PimIndexMaintenanceSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UnistoreSvc" ^| FIND /i "UnistoreSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UserDataSvc" ^| FIND /i "UserDataSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "MessagingService" ^| FIND /i "MessagingService"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "WpnUserService" ^| FIND /i "WpnUserService"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 0 /f )


@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb ADV ... ZB©DNE ZADANIA TZ
CALL :Log ... Tryb ADV ... ZBÊDNE ZADANIA TZ
REM Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä Tryb ADV
REM 2016v10
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\CloudExperienceHost\CreateObjectTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\CloudExperienceHost\CreateObjectTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\FileHistory\File History (maintenance mode)"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\FileHistory\File History (maintenance mode)"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DUSM\dusmtask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DUSM\dusmtask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\EDP App Launch Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\EDP App Launch Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\EDP Auth Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\EDP Auth Task"
REM V 20 Start
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\EDP Inaccesible Credential Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\EDP Inaccesible Credential Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\StorageCardEncryption Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\StorageCardEncryption Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SpacePort\SpaceAgentTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SpacePort\SpaceAgentTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SpacePort\SpaceManagerTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SpacePort\SpaceManagerTask"
REM V20 End
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EnterpriseMgmt\MDMMaintenenceTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EnterpriseMgmt\MDMMaintenenceTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\License Manager\TempSignedLicenseExchange"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\License Manager\TempSignedLicenseExchange"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\RemovalTools\MRT_HB"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\RemovalTools\MRT_HB"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\RemovalTools\MRT_ERROR_HB"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\RemovalTools\MRT_ERROR_HB"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\IndexerAutomaticMaintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\IndexerAutomaticMaintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\FamilySafetyMonitor"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\FamilySafetyMonitor"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\FamilySafetyRefresh"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\FamilySafetyRefresh"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\FamilySafetyUpload"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\FamilySafetyUpload"
REM 2016v12
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Shell\FamilySafetyRefreshTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Shell\FamilySafetyRefreshTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TPM\Tpm-HASCertRetr"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TPM\Tpm-HASCertRetr"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\TPM\Tpm-Maintenance"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\TPM\Tpm-Maintenance"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Management Initialization"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Management Initialization"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Optimization"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Optimization"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Speech\SpeechModelDownloadTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Speech\SpeechModelDownloadTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\StartupAppTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Application Experience\StartupAppTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ApplicationData\appuriverifierdaily"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ApplicationData\appuriverifierdaily"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ApplicationData\appuriverifierinstall"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ApplicationData\appuriverifierinstall"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Mobile Broadband Accounts\MNO Metadata Parser"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Mobile Broadband Accounts\MNO Metadata Parser"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Ras\MobilityManager"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Ras\MobilityManager"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\AppID\EDP Policy Manager"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\AppID\EDP Policy Manager"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskCleanup\SilentCleanup"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DiskCleanup\SilentCleanup"
CALL :SubExec SCHTASKS /END /TN "\User_Feed_Synchronization-{883C416D-BAEC-4ED9-90F4-26C0F091D0F5}"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\User_Feed_Synchronization-{883C416D-BAEC-4ED9-90F4-26C0F091D0F5}"
REM 2017v15
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\RetailDemo\CleanupOfflineContent"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\RetailDemo\CleanupOfflineContent"
REM 2018 RS4 V23
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ApplicationData\CleanupTemporaryState"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ApplicationData\CleanupTemporaryState"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ApplicationData\DsSvcCleanup"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ApplicationData\DsSvcCleanup"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\BrokerInfrastructure\BgTaskRegistrationMaintenanceTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\BrokerInfrastructure\BgTaskRegistrationMaintenanceTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DirectX\DXGIAdapterCache"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DirectX\DXGIAdapterCache"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskFootprint\Diagnostics"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DiskFootprint\Diagnostics"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskFootprint\StorageSense"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DiskFootprint\StorageSense"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\EDP Inaccessible Credentials Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\EDP Inaccessible Credentials Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\EDP\StorageCardEncryption Task"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\EDP\StorageCardEncryption Task"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\HelloFace\FODCleanupTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\HelloFace\FODCleanupTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\InstallService\ScanForUpdates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\InstallService\ScanForUpdates"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\InstallService\ScanForUpdatesAsUser"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\InstallService\ScanForUpdatesAsUser"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\InstallService\SmartRetry"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\InstallService\SmartRetry"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\InstallService\WakeUpAndContinueUpdates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\InstallService\WakeUpAndContinueUpdates"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\InstallService\WakeUpAndScanForUpdates"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\PushToInstall\LoginCheck"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\PushToInstall\LoginCheck"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\PushToInstall\Registration"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\PushToInstall\Registration"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\RemoteAssistance\RemoteAssistanceTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\RemoteAssistance\RemoteAssistanceTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SettingSync\BackgroundUploadTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SettingSync\BackgroundUploadTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SettingSync\NetworkStateChangeTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\SettingSync\NetworkStateChangeTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Setup\SetupCleanupTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Setup\SetupCleanupTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Speech\HeadsetButtonPress"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Speech\HeadsetButtonPress"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Subscription\EnableLicenseAcquisition"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Subscription\EnableLicenseAcquisition"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Subscription\LicenseAcquisition"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Subscription\LicenseAcquisition"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\UNP\RunUpdateNotificationMgr"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\UNP\RunUpdateNotificationMgr"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Work Folders\Work Folders Logon Synchronization"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Work Folders\Work Folders Logon Synchronization"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Work Folders\Work Folders Maintenance Work"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Work Folders\Work Folders Maintenance Work"

GOTO WIN10_CORE

:WIN10_CORE
SET /A "CLEANMGR10=CLEANMGR10+1"
CLS
REM Wyˆ¥czenie usˆugi ekranu dotykowego
@ECHO off
FOR /f "tokens=2 delims= " %%i in ('wmic cpu get name') DO SET os10=%%i
ECHO %os10%>nul
ECHO %os10%|find /I "Atom">nul && GOTO WIN10_CORE_TOUCH_SKIP||GOTO WIN10_CORE_TOUCH_DISABLE

:WIN10_CORE_TOUCH_DISABLE
CALL :Log Brak ekranu dotykowego - wyˆ¥czam usˆug©
CALL :SubExec NET STOP "TabletInputService"
CALL :SubExec SC CONFIG "TabletInputService" START= DISABLED
GOTO WIN10_CORE_TOUCH_NEXT

:WIN10_CORE_TOUCH_SKIP
CALL :Log Wykryto ekran dotykowy - nie wyˆ¥czam usˆugi
GOTO WIN10_CORE_TOUCH_NEXT

:WIN10_CORE_TOUCH_NEXT
CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SZPIEGI
CALL :Log ... Tryb CORE ...  SZPIEGI
REM Usuwanie wpis¢w szpieguj¥cych z Harmonogramu Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Autochk\Proxy"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Autochk\Proxy" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\Uploader" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Customer Experience Improvement Program"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Customer Experience Improvement Program" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\PI\Sqm-Tasks" 
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\PI\Sqm-Tasks" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /F
REM 2016
CALL :SubExec SCHTASKS /END /TN "\Intel\Intel Telemetry 2"
CALL :SubExec SCHTASKS /DELETE /TN "\Intel\Intel Telemetry 2" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmMon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
CALL :SubExec SCHTASKS /END /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}"
CALL :SubExec SCHTASKS /DELETE /TN "\NvTmRepOnLogon_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}" /F
REM V20
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SMB\UninstallSMB1ClientTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\SMB\UninstallSMB1ClientTask" /F
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\SMB\UninstallSMB1ServerTask"
CALL :SubExec SCHTASKS /DELETE /TN "\Microsoft\Windows\SMB\UninstallSMB1ServerTask" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... Zb©dne zadania
CALL :Log ... Tryb CORE ... Zb©dne zadania
REM Wyˆ¥czenie zb©dnych zadaä w Harmonogramie Zadaä
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\AppID\SmartScreenSpecific"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\AppID\SmartScreenSpecific"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Feedback\Siuf\DmClient"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Feedback\Siuf\DmClient"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Location\WindowsActionDialog"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Location\WindowsActionDialog"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Maps\MapsToastTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Maps\MapsToastTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Maps\MapsUpdateTask"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Maps\MapsUpdateTask"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ErrorDetails\EnableErrorDetailsUpdate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ErrorDetails\EnableErrorDetailsUpdate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\ErrorDetails\ErrorDetailsUpdate"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\ErrorDetails\ErrorDetailsUpdate"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Device Information\Device"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Device Information\Device"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\Device Setup\Metadata Refresh"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\Device Setup\Metadata Refresh"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\HandleCommand"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\HandleCommand"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\HandleWnsCommand"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\HandleWnsCommand"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\IntegrityCheck"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\LocateCommandUserSession"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\LocateCommandUserSession"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceAccountChange"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceAccountChange"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceLocationRightsChange"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceLocationRightsChange"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDevicePeriodic24"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDevicePeriodic24"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDevicePolicyChange"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDevicePolicyChange"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceProtectionStateChanged"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceProtectionStateChanged"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceSettingChange"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterDeviceSettingChange"
CALL :SubExec SCHTASKS /END /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterUserDevice"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Windows\DeviceDirectoryClient\RegisterUserDevice"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUNI©CIE RAPORT¢W
CALL :Log ... Tryb CORE ... USUNIÊCIE RAPORTÓW
REM Usuni©cie plik¢w raport¢w
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\windows\Sqm\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\windows\WER\"
CALL :SubExec RD /S /Q "%USERPROFILE%\AppData\Local\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Windows\Sqm\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Windows\WER\"
CALL :SubExec RD /S /Q "C:\ProgramData\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "C:\Users\All Users\Microsoft\Diagnosis\"
CALL :SubExec RD /S /Q "%WINDIR%\System32\LogFiles\SQM\"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... Autostart
CALL :Log ... Tryb CORE ... Autostart
REM Usuni©cie zb©dnych pozycji autostartu
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "OneDrive" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... USUGI
CALL :Log ... Tryb CORE ... US£UGI
REM Wyˆ¥czenie szpieguj¥cych usˆug
REM Wyˆ¥czenie usˆugi dmwappushservice - telemetria
CALL :SubExec NET STOP "dmwappushservice"
CALL :SubExec SC CONFIG "dmwappushservice" START= DISABLED 
REM Wyˆ¥czenie usˆugi iagnosticshub.standardcollector.service - telemetria
CALL :SubExec NET STOP "diagnosticshub.standardcollector.service"
CALL :SubExec SC CONFIG "diagnosticshub.standardcollector.service" START= DISABLED
REM Wyˆ¥czenie usˆugi raportowania bˆ©d¢w
CALL :SubExec NET STOP "WerSvc"
CALL :SubExec SC CONFIG "WerSvc" START= DISABLED
REM Usuni©cie usˆugi Diagtrack + zale¾ne wpisy
CALL :SubExec NET STOP "diagtrack"
CALL :SubExec SC CONFIG "diagtrack" START= DISABLED
CALL :SubExec SC DELETE "diagtrack"
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Svchost\utcsvc" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Services\DiagTrack" /F
CALL :SubExec REG DELETE "HKLM\System\CurrentControlSet\Control\WMI\Autologger\AutoLogger-Diagtrack-Listener" /F
REM Wyˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec NET STOP "WMPNetworkSvc"
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= DISABLED
REM Wyˆ¥czenie usˆugi Windows Search
CALL :SubExec NET STOP "WSearch"
CALL :SubExec SC CONFIG "WSearch" START= DISABLED
REM Wyˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec NET STOP "TrkWks"
CALL :SubExec SC CONFIG "TrkWks" START= DISABLED
REM Wyˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec NET STOP "RemoteRegistry"
CALL :SubExec SC CONFIG "RemoteRegistry" START= DISABLED
REM Wyˆ¥czenie —ledzenia ETW Internet Explorer 
CALL :SubExec NET STOP "IEEtwCollectorService"
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= DISABLED
REM 2016
REM Pomoc techniczna panelu sterowania Raporty i rozwi¥zania problem¢w
CALL :SubExec NET STOP "wercplsupport"
CALL :SubExec SC CONFIG "wercplsupport" START= DISABLED
REM v18
CALL :SubExec NET STOP "NvTelemetryContainer"
CALL :SubExec SC CONFIG "NvTelemetryContainer" START= DISABLED
CALL :SubExec SC DELETE "NvTelemetryContainer"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... TELEMETRIA
CALL :Log ... Tryb CORE ... TELEMETRIA
REM User BEHAVIOR
REM Wyˆ¥czenie telemetrii
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\DiagTrack" /V Start /T REG_DWORD /D 4 /F
REM Powoduje ¾e przycisk INSIDERa jest SZARY
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /V AITEnable /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /V "f!dss-winrt-telemetry.js" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /V "f!proactive-telemetry.js" /t REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /V "f!proactive-telemetry-event_8ac43a41e5030538" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\COMPONENTS\DerivedData\Components\amd64_microsoft-windows-c..lemetry.lib.cortana_31bf3856ad364e35_10.0.10240.16384_none_40ba2ec3d03bceb0" /V "f!proactive-telemetry-inter_58073761d33f144b" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener" /V Start /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger" /V Start /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... IE11
CALL :Log ... Tryb CORE ... IE11
REM TWEAKS INTERNET EXPLORER 11
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "DoNotTrack" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "Start Page" /T REG_SZ /D "https://www.google.pl" /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "Start Page Redirect Cache" /T REG_SZ /D "https://www.google.pl" /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "Search Page" /T REG_SZ /D "https://www.google.pl" /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "DisableFirstRunCustomize" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "RunOnceHasShown" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Internet Explorer\Main" /V "RunOnceComplete" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /V "DisableFirstRunCustomize" /T REG_DWORD /D 1 /f
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /V "RunOnceHasShown" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /V "RunOnceComplete" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /V "DisableFirstRunCustomize" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /V "RunOnceHasShown" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Internet Explorer\Main" /V "RunOnceComplete" /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WER
CALL :Log ... Tryb CORE ... WER
REM WER10 ustawienia + data 0
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "AutoApproveOSdumps" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ConfigureArchive" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableArchive" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "Disabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DisableQueue" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontSendAdditionalData" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "DontShowUI" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "ForceQueue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "LoggingDisabled" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxArchiveCount" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueCount" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueSize" /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "LastQueuePesterTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "EnableZip" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ErrorPort" /T REG_SZ /D "\DonNotSpy" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "MaxQueueSizePercentage" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "PurgeThreshholdValueInKB" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /V "ServiceTimeout" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Assert Filtering Policy" /V "ReportAndContinue" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\BrokerUp" /V "WWAJSE" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Consent" /V "DefaultConsent" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\HeapControlledList\dwm.exe" /V "EnableHeapThrottle" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\System32\msiwer.dll" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules" /V "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscordacwks.dll" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR" /V "Disable" /T REG_DWORD /D 1 /F /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... SQM
CALL :Log ... Tryb CORE ... SQM
REM SQM10 ustawienia + data 0
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /V "CEIPEnable" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\SQMClient" /V "UserId" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "WinSqmFirstSessionStartTime" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient" /V "MachineId" /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\IE" /V "CabSessionAfterSize" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows" /V "CEIPEnable" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5385" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5386" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5387" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10755" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10756" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10757" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10758" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5373" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5371" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5372" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5369" /T REG_BINARY /D "0000000000000000" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12412" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12415" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12416" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12411" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12414" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12413" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "31" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "35" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "608" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "8073" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "9290" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "9292" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12728" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12729" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12730" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12736" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12737" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "12738" /T REG_SZ /D "xxx" /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5382" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5383" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "5384" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10751" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10752" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10753" /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\SQMClient\Windows\CommonDatapoints" /V "10754" /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... WMI AUTOLOGGERS
REM NEXT AUTOLOGGERRS 10
CALL :Log ... Tryb CORE ... WMI AUTOLOGGERS

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /V Start /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /V Start /T REG_DWORD /D 0 /F

CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V Start /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V BufferSize /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V FileMax /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V FileName /T REG_SZ /D "C:\\Windows\\System32\\LogFiles\\SQM\\SQMLogger.etl" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V GUID /T REG_SZ /D "{00000000-0000-0000-0000-000000000000}" /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V LogFileMode /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V MaxFileSize /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V MinimumBuffers /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V MaximumBuffers /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /V Status /T REG_DWORD /D 0 /F
REM NEXT AUTOLOGGERS 10 DELETE
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /F
REM CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Autologger-Diagtrack-Listener" /F
CALL :SubExec REG DELETE "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb CORE ... OFFICE
CALL :Log ... Tryb CORE ... OFFICE
REM OFFICE
REM Wyˆ¥czenie w Harmonogramie Zadaä Office 2016
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office Automatic Updates"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office ClickToRun Service Monitor"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack2016"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn2016"
REM Wyˆ¥czenie w Harmonogramie Zadaä Office 2013
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft Office 15 Sync Maintenance for %COMPUTERNAME%-%USERNAME% %COMPUTERNAME%"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\Office 15 Subscription Heartbeat"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentFallBack"
CALL :SubExec SCHTASKS /CHANGE /DISABLE /TN "\Microsoft\Office\OfficeTelemetryAgentLogOn"
REM Wyˆ¥czenie TELEMETRII - Office 365 ProPlus, Office 2013
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V CommonFileShare /T REG_SZ /D "\\0.0.0.0\DontSpy" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag1 /T REG_SZ /D "<TAG1>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag2 /T REG_SZ /D "<TAG2>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag3 /T REG_SZ /D "<TAG3>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Tag4 /T REG_SZ /D "<TAG4>" /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentInitWait /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V AgentRandomDelay /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V Enablelogging /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableUpload /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm" /V EnableFileObfuscation /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V accesssolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V olksolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V onenotesolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V pptsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V projectsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V publishersolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V visiosolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V wdsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedapplications" /V xlsolution /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V agave /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V appaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V comaddins /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V documentfiles /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\15.0\osm\preventedsolutiontypes" /V templatefiles /T REG_DWORD /D 1 /F

CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\16.0\osm" /V Enablelogging /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\16.0\osm" /V EnableUpload /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\Software\Policies\Microsoft\Office\16.0\osm" /V EnableFileObfuscation /T REG_DWORD /D 1 /F
GOTO END

:WIN10_REVERT_BACK
CLS
@ECHO OFF
REM Kafelki wracajcie !
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\AppXSvc" /V Start /T REG_DWORD /D 3 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... DEFENDER
CALL :Log ... Tryb Diagnostyczny ... DEFENDER
REM Wˆ¥czenie Defendera
CALL :SubExec SC CONFIG WinDefend START= AUTO
CALL :SubExec SC CONFIG WdNisSvc START= AUTO
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableAntiSpyware /F >nul 2>&1
REM v20
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableBehaviorMonitoring /F >nul 2>&1
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableOnAccessProtection /F >nul 2>&1
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /V DisableScanOnRealtimeEnable /F >nul 2>&1
REM v20
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Cleanup"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Defender\Windows Defender Verification"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... WINDOWS STORE
CALL :Log ... Tryb Diagnostyczny ... WINDOWS STORE
REM Wˆ¥czenie Zadaä Sklepu Windows
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\Badge Update"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\License Validation"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\Sync Licenses"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows\WS\WSRefreshBannedAppsListTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WS\WSTask"
REM Wˆ¥czenie Automatycznie aktualizacji aplikacji
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... XBOXLIVE
CALL :Log ... Tryb Diagnostyczny ... XBOXLIVE
REM Wˆ¥czenie usˆug XboXLive
CALL :SubExec SC CONFIG "XboxNetApiSvc" START= AUTO
CALL :SubExec NET START "XboxNetApiSvc"
CALL :SubExec SC CONFIG "XboxGipSvc" START= AUTO
CALL :SubExec NET START "XboxGipSvc"
CALL :SubExec SC CONFIG "XblGameSave" START= AUTO
CALL :SubExec NET START "XblGameSave"
CALL :SubExec SC CONFIG "XblAuthManager" START= AUTO
CALL :SubExec NET START "XblAuthManager"
CALL :SubExec SC CONFIG "xbgm" START= AUTO
CALL :SubExec NET START "xbgm"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /RUN /TN "\Microsoft\XblGameSave\XblGameSaveTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"
CALL :SubExec SCHTASKS /RUN /TN "\Microsoft\XblGameSave\XblGameSaveTaskLogon"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... USUGI
CALL :Log ... Tryb Diagnostyczny ... US£UGI
REM Wˆ¥czenie usˆugi dmwappushservice - telemetria
CALL :SubExec SC CONFIG "dmwappushservice" START= AUTO 
CALL :SubExec NET START "dmwappushservice"
REM Wˆ¥czenie usˆugi Diagnosticshub.standardcollector.service - telemetria
CALL :SubExec SC CONFIG "diagnosticshub.standardcollector.service" START= AUTO
CALL :SubExec NET START "diagnosticshub.standardcollector.service"
REM Wˆ¥czenie usˆugi Windows Error Reporting
CALL :SubExec SC CONFIG "WerSvc" START= AUTO
CALL :SubExec NET START "WerSvc"
REM Wˆ¥czenie usˆugi Windows Search
CALL :SubExec SC CONFIG "WSearch" START= AUTO
CALL :SubExec NET START "WSearch"
REM Wˆ¥czenie usˆugi Udost©pnianie w sieci WMPalyer
CALL :SubExec SC CONFIG "WMPNetworkSvc" START= AUTO
CALL :SubExec NET START "WMPNetworkSvc"
REM Wˆ¥czenie usˆugi ˜ledzenia ˆ¥czy
CALL :SubExec SC CONFIG "TrkWks" START= AUTO
CALL :SubExec NET START "TrkWks"
REM Wˆ¥czenie usˆugi Zdalnego Rejestru
CALL :SubExec SC CONFIG "RemoteRegistry" START= AUTO
CALL :SubExec NET START "RemoteRegistry"
REM Internet Explorer Wˆ¥czenie —ledzenia ETW
CALL :SubExec SC CONFIG "IEEtwCollectorService" START= AUTO
CALL :SubExec NET START "IEEtwCollectorService"

REM 2016
REM Optymalizacja dostarczania
CALL :SubExec SC CONFIG "DoSvc" START= AUTO
CALL :SubExec NET START "DoSvc"
REM MapsBroker
CALL :SubExec SC CONFIG "MapsBroker" START= AUTO
CALL :SubExec NET START "MapsBroker"
REM DataCollectionPublishingService
CALL :SubExec SC CONFIG "DcpSvc" START= AUTO
CALL :SubExec NET START "DcpSvc"
REM Usˆuga geolokalizacji
CALL :SubExec SC CONFIG "lfsvc" START= AUTO
CALL :SubExec NET START "lfsvc"
REM Usˆuga Windows INSIDER
CALL :SubExec NET START "wisvc"
CALL :SubExec SC CONFIG "wisvc" START= AUTO
REM Usˆuga czujnik¢w
CALL :SubExec SC CONFIG "SensorService" START= AUTO
CALL :SubExec NET START "SensorService"
REM Usˆuga danych czujnik¢w
CALL :SubExec SC CONFIG "SensorDataService" START= AUTO
CALL :SubExec NET START "SensorDataService"
REM Tryb osadzony
CALL :SubExec SC CONFIG "embeddedmode" START= AUTO
CALL :SubExec NET START "embeddedmode"
REM Pomoc techniczna panelu sterowania Raporty i rozwi¥zania problem¢w
CALL :SubExec SC CONFIG "wercplsupport" START= AUTO
CALL :SubExec NET START "wercplsupport"
REM Wˆ¥czenie Biometryki
REM Wˆ¥czenie usˆugi Biometrycznej 
CALL :SubExec SC CONFIG "WbioSrvc" START= AUTO
CALL :SubExec NET START "WbioSrvc"
REM Wˆ¥czenie w rejestrze
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Biometrics" /V Enabled /F
REM Wˆ¥czenie usˆugi ekranu dotykowego
CALL :SubExec SC CONFIG "TabletInputService" START= AUTO
CALL :SubExec NET START "TabletInputService"

REM 2016V12
CALL :SubExec SC CONFIG "CDPsvc" START= AUTO
CALL :SubExec NET START "CDPsvc"
CALL :SubExec SC CONFIG "AJRouter" START= AUTO
CALL :SubExec NET START "AJRouter"
CALL :SubExec SC CONFIG "SmsRouter" START= AUTO
CALL :SubExec NET START "SmsRouter"
CALL :SubExec SC CONFIG "NgcCtnrSvc" START= AUTO
CALL :SubExec NET START "NgcCtnrSvc"
CALL :SubExec SC CONFIG "FrameServer" START= AUTO
CALL :SubExec NET START "FrameServer"
CALL :SubExec SC CONFIG "WpnService" START= AUTO
CALL :SubExec NET START "WpnService"

REM 2017v15
REM icssvc - hot spot mobilny
CALL :SubExec SC CONFIG "icssvc" START= AUTO
CALL :SubExec NET START "icssvc"
REM ClipSVC - windows store licencjonowanie klienta
CALL :SubExec SC CONFIG "ClipSVC" START= AUTO
CALL :SubExec NET START "ClipSVC"
REM imon - monitor podczerwieni
CALL :SubExec SC CONFIG "imon" START= AUTO
CALL :SubExec NET START "imon"
REM RetailDemo - tryb pokazowy
CALL :SubExec SC CONFIG "RetailDemo" START= AUTO
CALL :SubExec NET START "RetailDemo"
REM TimeBrokerService
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\TimeBroker" /V "Start" /T REG_DWORD /D 3 /F

REM 2017V19 rs3
REM Usˆuga diagsvc
CALL :SubExec SC CONFIG "diagsvc" START= AUTO
CALL :SubExec NET START "diagsvc"
REM Usˆuga DmEnrollmentSvc
CALL :SubExec SC CONFIG "DmEnrollmentSvc" START= AUTO
CALL :SubExec NET START "DmEnrollmentSvc"
REM Usˆuga GraphicsPerfSvc
CALL :SubExec SC CONFIG "GraphicsPerfSvc" START= AUTO
CALL :SubExec NET START "GraphicsPerfSvc"
REM Usˆuga SEMgrSvc
CALL :SubExec SC CONFIG "SEMgrSvc" START= AUTO
CALL :SubExec NET START "SEMgrSvc"
REM Usˆuga SharedRealitySvc
CALL :SubExec SC CONFIG "SharedRealitySvc" START= AUTO
CALL :SubExec NET START "SharedRealitySvc"
REM Usˆuga naturalnego uwierzytelniania
CALL :SubExec SC CONFIG "NaturalAuthentication" START= AUTO
CALL :SubExec NET START "NaturalAuthentication"
REM Usˆuga WarpJITSvc
CALL :SubExec SC CONFIG "WarpJITSvc" START= AUTO
CALL :SubExec NET START "WarpJITSvc"
REM Usˆuga portfela
CALL :SubExec SC CONFIG "WalletService" START= AUTO
CALL :SubExec NET START "WalletService"
REM Usˆuga powiadomienia drukarek
CALL :SubExec SC CONFIG "PrintNotify" START= AUTO
CALL :SubExec NET START "PrintNotify"
REM Usˆuga zarz¥dzania radiem i trybem samolotowym
CALL :SubExec SC CONFIG "RmSvc" START= AUTO
CALL :SubExec NET START "RmSvc"
REM Usˆuga Historii Plik¢w
CALL :SubExec SC CONFIG "fhsvc" START= AUTO
CALL :SubExec NET START "fhsvc"

REM Usˆugi do Wˆ¥czenia MULTI
CALL :Log ... Tryb Diagnostyczny ... US£UGI ... MULTI
REM klucz START
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "CDPUserSvc" ^| FIND /i "CDPUserSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "OneSyncSvc" ^| FIND /i "OneSyncSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "PimIndexMaintenanceSvc" ^| FIND /i "PimIndexMaintenanceSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UnistoreSvc" ^| FIND /i "UnistoreSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UserDataSvc" ^| FIND /i "UserDataSvc"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "MessagingService" ^| FIND /i "MessagingService"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "WpnUserService" ^| FIND /i "WpnUserService"') DO (reg add "%%I" /v "Start" /t REG_DWORD /d 3 /f )
REM klucz UserServiceFlags
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "CDPUserSvc" ^| FIND /i "CDPUserSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "OneSyncSvc" ^| FIND /i "OneSyncSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "PimIndexMaintenanceSvc" ^| FIND /i "PimIndexMaintenanceSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UnistoreSvc" ^| FIND /i "UnistoreSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "UserDataSvc" ^| FIND /i "UserDataSvc"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "MessagingService" ^| FIND /i "MessagingService"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )
FOR /f %%I IN (' reg query "HKLM\SYSTEM\CurrentControlSet\Services" /k /f "WpnUserService" ^| FIND /i "WpnUserService"') DO (reg add "%%I" /v "UserServiceFlags" /t REG_DWORD /d 3 /f )

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ZB¨DNE ZADANIA TP
CALL :Log ... Tryb Diagnostyczny ... ZBÊDNE ZADANIA TP
REM Wˆ¥czenie zb©dnych zadaä Tryb CORE
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\AppID\SmartScreenSpecific"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\NetTrace\GatherNetworkInfo"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Feedback\Siuf\DmClient"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Feedback\Siuf\DmClientOnScenarioDownload"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Location\Notifications"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Location\WindowsActionDialog"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Maps\MapsToastTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Maps\MapsUpdateTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Diagnosis\Scheduled"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Windows Media Sharing\UpdateLibrary"

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ZB¨DNE ZADANIA TZ
CALL :Log ... Tryb Diagnostyczny ... ZBÊDNE ZADANIA TZ
REM Wˆ¥czenie zb©dnych zadaä Tryb ADV
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\CloudExperienceHost\CreateObjectTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\FileHistory\File History (maintenance mode)"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\DUSM\dusmtask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\EDP App Launch Task"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\EDP Auth Task"
REM V20 Start
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\EDP Inaccesible Credential Task"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\StorageCardEncryption Task"
REM V20 End
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EnterpriseMgmt\MDMMaintenenceTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\License Manager\TempSignedLicenseExchange"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\RemovalTools\MRT_HB"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\RemovalTools\MRT_ERROR_HB"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\IndexerAutomaticMaintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\FamilySafetyMonitor"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\FamilySafetyRefresh"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\FamilySafetyUpload"
REM 2016v12
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Shell\FamilySafetyRefreshTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TPM\Tpm-HASCertRetr"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\TPM\Tpm-Maintenance"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Management Initialization"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Storage Tiers Management\Storage Tiers Optimization"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Speech\SpeechModelDownloadTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Application Experience\StartupAppTask"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\ApplicationData\appuriverifierdaily"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\ApplicationData\appuriverifierinstall"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Mobile Broadband Accounts\MNO Metadata Parser"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Ras\MobilityManager"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\EDP App Launch Task"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\EDP\EDP Auth Task"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\AppID\EDP Policy Manager"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\DiskCleanup\SilentCleanup"
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\User_Feed_Synchronization-{883C416D-BAEC-4ED9-90F4-26C0F091D0F5}"
REM 2017v15
CALL :SubExec SCHTASKS /CHANGE /ENABLE /TN "\Microsoft\Windows\RetailDemo\CleanupOfflineContent"
REM 2018 RS4 v23
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /V PreventDeviceMetadataFromNetwork /T REG_DWORD /D 0 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... BEZPIECZEãSTWO
CALL :Log ... Tryb Diagnostyczny ... BEZPIECZEÑSTWO
REM BEZPIECZEãSTWO
REM OKO - wyˆ¥czenie podgl¥du hasˆa na pasku hasˆa
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\CredUI" /F
REM Wˆ¥czenie User Steps Recorder
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /V "DisableUAR" /F
REM Wˆ¥czenie WiFi Sense - USER
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config" /V AutoConnectAllowedOEM /F
REM Wˆ¥czenie WiFi Sense Group Policy
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /V value /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /V value /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features" /V WiFiSenseOpen /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features" /V WiFiSenseCredShared /T REG_DWORD /D 1 /F
REM Skrypt do wˆ¥czenia WiFi Sense
setlocal enabledelayedexpansion
FOR /F "tokens=2" %%u in ('whoami /user /fo table /nh') DO SET USERSIDR=%%u
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\features\%USERSIDR%" /V FeatureStates /T REG_DWORD /D 893 /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\ABCH" /V OptInStatus /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\ABCH-SKYPE" /V OptInStatus /F
REG DELETE "HKLM\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\SocialNetworks\FACEBOOK" /V OptInStatus /F
REM Wˆ¥czenie Windows Media DRM Online
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\WMDRM" /V DisableOnline /F
REM Wˆ¥czenie dost©pu aplikacjom do WIFI
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{A8804298-2D5F-42E3-9531-9C8C39EB29CE}" /V Value /T REG_SZ /D "Allow" /F
REM Apps access to loosey coupled devices disabled
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\LooselyCoupled" /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... DEFENDER
CALL :Log ... Tryb Diagnostyczny ... DEFENDER
REM WINDOWS DEFENDER AND M$ SPYNEt
REM Wˆ¥czenie raportowania do SpyNetu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SpyNetReporting /F
REM Wˆ¥czenie wysyˆania pr¢bek do M$
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /V SubmitSamplesConsent /F
REM Wˆ¥czenie raportowania o infekcjach malware
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\MRT" /V DontReportInfectionInformation /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... PRYWATNO—
CALL :Log ... Tryb Diagnostyczny ... PRYWATNOή
REM PRYWATNO—
REM Wˆ¥czenie udost©pniania pisma odr©cznego
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\TabletPC" /F
REM Wˆ¥czenie udost©pniania pisma odr©cznego-raporty
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports" /F
REM Wˆ¥czenie Inventory Collector
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /V "DisableInventory" /F
REM Wˆ¥czenie kamery na ekranie logowania
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /F
REM Advertising info step 2 of 2
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V Enabled /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /V Enabled /F
REM Wˆ¥czenie powiadomieä na kafelkach, ekranie blokady, pulpicie
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /V ToastEnabled /F
REM Wˆ¥czenie dost©pu aplikacjom do powiadomieä
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{52079E78-A92B-413F-B213-E8FE35712E72}" /V Value /T REG_SZ /D "Allow" /F

REM 2018 RS4 v23
REM Wˆ¥czenie dost©pu aplikacjom do nazwy u¾ytkownika
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do kamery
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do mikrofonu
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do kontakt¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do kalendarza
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do historii poˆ¥czeä
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do mail 
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do listy zadaä
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userDataTasks" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do wiadomo˜ci
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do dokument¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do obraz¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do video
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu aplikacjom do systemu plik¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess" /V Value /T REG_SZ /D "Allow" /F
REM 2018 RS4 v23

REM Wˆ¥czenie dost©pu do j©zyka lokalnego dla przegl¥darek
CALL :SubExec REG DELETE "HKCU\Control Panel\International\User Profile" /V HttpAcceptLanguageOptOut /F
REM Wˆ¥czenie filtra Smart screen dla URL
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /V EnableWebContentEvaluation /T REG_DWORD /D 1 /F
REM 2017RS2
REM Wˆ¥czenie reklam przez Bluetooth
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\Bluetooth" /V AllowAdvertising  /F
REM Wˆ¥czenie ˜ledzenia uruchamiania APPS
CALL :SubExec REG DELETE "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V Start_TrackProgs /F
REM Wˆ¥czenie dost©pu do informacji diagnostycznych dla APPS
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{2297E4E2-5DBE-466D-A12B-0F8286F0D9CA}" /V Value /T REG_SZ /D "Allow" /F
REM Wˆ¥czenie dost©pu dla APPS w tle
CALL :SubExec REG DELETE "HKCU\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications" /V GlobalUserDisabled /F
REM 2018 RS3
REM Wˆ¥czenie kopii wiadomo˜ci tekstowych na serwerach M$
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Messaging" /V AllowMessageSync /F


@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... Edge
CALL :Log ... Tryb Diagnostyczny ... Edge
REM Edge wszystko wˆ¥cza
REM Do Not Track
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main" /V DoNotTrack /T REG_DWORD /D 0 /F
REM Disable Page Prediction
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead" /V FPEnabled /T REG_DWORD /D 1 /F
REM Disable search and website suggestion
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\User\Default\SearchScopes" /V ShowSearchSuggestionsGlobal /T REG_DWORD /D 1 /F
REM DRM
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy" /V EnableEncryptedMediaExtensions /T REG_DWORD /D 1 /F
REM Do Not Optimized Webs Search Results
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main" /V OptimizeWindowsSearchResultsForScreenReaders /T REG_DWORD /D 1 /F
REM Disable Smart Screen Filter
CALL :SubExec REG ADD "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter" /V EnabledV9 /T REG_DWORD /D 1 /F
REM 2017 RS2
REM EDGE
REM Wˆ¥czenie auto-uzupeˆniania tekstu w pasku adresu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\Browser" /V AllowAddressBarDropdown /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... SYNCHRONIZACJA
CALL :Log ... Tryb Diagnostyczny ... SYNCHRONIZACJA
REM Synchronizacja ustawieä
REM Wˆ¥cz synchronizacj© wszystkich ustawieä
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync" /V SyncPolicy /T REG_DWORD /D 1 /F
REM Wˆ¥cz synchronizacj© wygl¥du
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Personalization" /V Enabled /T REG_DWORD /D 1 /F
REM Wˆ¥cz synchronizacj© przegl¥darki
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\BrowserSettings" /V Enabled /T REG_DWORD /D 1 /F
REM Wˆ¥cz synchronizacj© haseˆ
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Credentials" /V Enabled /T REG_DWORD /D 1 /F
REM Wˆ¥cz synchronizacj© dost©pno˜ci
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Accessibility" /V Enabled /T REG_DWORD /D 1 /F
REM Wˆ¥cz synchronizacj© ustawieä zaawansowanych Windows
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Windows" /V Enabled /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... CORTANA
CALL :Log ... Tryb Diagnostyczny ... CORTANA
REM CORTANA

REM 2018 RS4 v23
REM Wyˆ¥czenie Cortany i reset danych 1 z 2
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Windows Search" /V CortanaConsent /F
REM 2018 RS4 v23

REM Wˆ¥czenie Cortany i reset danych
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCortana /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V CortanaEnabled /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Experience\AllowCortana" /F

REM Wˆ¥czenie personalizacji wprowadzania 5 of 5
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Personalization\Settings" /V AcceptedPrivacyPolicy /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Language" /V Enabled /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\InputPersonalization" /F
REM Wˆ¥czenie CortanySearchBar
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V SearchboxTaskbarMode /T REG_DWORD /D 1 /F
REM Wˆ¥czenie udost©pniania lokalizacji do wyszukiwana
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowSearchToUseLocation /F
REM Wˆ¥czenie wyszukiwania z pulpitu
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V DisableWebSearch /F
REM Wˆ¥czenie przeszukiwania sieci przez Cortan©
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWeb /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchUseWebOverMeteredConnections /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V ConnectedSearchPrivacy /F
REM 2017 RS2
REM Wˆ¥czenie pobierania modelu j©zyk¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Speech_OneCore\Preferences" /V ModelDownloadAllowed /T REG_DWORD /D 1 /F
REM 2018 RS3
REM Wyˆ¥czenie szukania w chmurze
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /V AllowCloudSearch /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... LOKALIZACJA
CALL :Log ... Tryb Diagnostyczny ... LOKALIZACJA
REM LOKALIZACJA
REM Wˆ¥czenie usˆug Geolokalizacji, lokalizacji
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableLocation /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableWindowsLocationProvider /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableLocationScripting /T REG_DWORD /D 0 /F
REM Wˆ¥czenie auto-obrotu ekranu (TABLET !)
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors" /V DisableSensors /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\SYSTEM\CurrentControlSet\Services\lfsvc\Service\Configuration" /V Status /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Overrides\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V SensorPermissionState /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V Value /T REG_SZ /D "Allow" /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Sensor\Permissions\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}" /V SensorPermissionState /T REG_DWORD /D 1 /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... INSIDER
CALL :Log ... Tryb Diagnostyczny ... INSIDER
REM Powoduje ¾e przycisk INSIDERa jest SZARY
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 3 /F
CALL :SubExec REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /V "AllowTelemetry" /T REG_DWORD /D 3 /F

REM 2017 RS2
REM USER BEHAVIOR
REM Wˆ¥czenie wysyˆania danych do M$
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Privacy" /V TailoredExperiencesWithDiagnosticDataEnabled /F

@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... WINDOWS UPDATE
CALL :Log ... Tryb Diagnostyczny ... WINDOWS UPDATE
REM WINDOWS UPDATE
REM Windows UPDATE - odpowiednie ustawienia
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization" /V DODownloadMode /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization" /V SystemSettingsDownloadMode /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /V DownloadMode /F
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /V DODownloadMode /F
REM REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /V DeferUpgrade /T REG_DWORD /D 1 /F
REM 2018 RS3
REM Wˆ¥czenie aktualizacji modelu j©zyk¢w
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Speech" /V AllowSpeechModelUpdate /F


@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... POZOSTAE
CALL :Log ... Tryb Diagnostyczny ... POZOSTA£E
REM POZOSTAE
REM Wˆ¥czenie przypomnienia sondy do M$
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /V NumberOfSIUFInPeriod /F
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Siuf\Rules" /V PeriodInNanoSeconds /F
REM Wˆ¥czenie rozszerzenia wyszukiwania Bing
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /V BingSearchEnabled /F
REM Wˆ¥czenie OneDrive
CALL :SubExec REG DELETE "HKLM\Software\Policies\Microsoft\Windows\OneDrive" /F
REM Wˆ¥czenie  ikony OneDrive w oknie panelu nawigacji Eksploratora
CALL :SubExec REG ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /V System.IsPinnedToNameSpaceTree /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /V System.IsPinnedToNameSpaceTree /T REG_DWORD /D 1 /F
REM Wˆ¥czenie SmartScreen
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /V SmartScreenEnabled /T REG_SZ "RequireAdmin" /F
REM Wˆ¥czenie transmisji wpisywanych informacji
CALL :SubExec REG DELETE "HKCU\SOFTWARE\Microsoft\Input\TIPC" /V Enabled /F
REM Wˆ¥czenie zdalnych eksperyment¢w przez M$
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\System" /V AllowExperimentation /T REG_DWORD /D 1 /F
REM Wˆ¥czenie Centrum Akcji
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ImmersiveShell" /V UseActionCenterExperience /T REG_DWORD /D 1 /F
REM Wˆ¥czenie Centrum Powiadomieä
CALL :SubExec REG DELETE "HKCU\Software\Policies\Microsoft\Windows\Explorer" /V DisableNotificationCenter /F
REM LICENSE CHECKING By default, Windows will check your license every time you turn on your PC, this will prevent it-Deleting
CALL :SubExec REG DELETE "HKLM\Software\Policies\Microsoft\Windows NT\CurrentVersion" /F

REM 2018 RS4 v23
REM Wyˆ¥czenie automatycznego pobierania map
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps" /V AutoDownloadAndUpdateMapData /F
REM Wyˆ¥czenie nieprzerwanego ruchu sieciowego dla map
CALL :SubExec REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows\Maps" /V AllowUntriggeredNetworkTrafficOnSettingsPage /F
REM 2018 RS4 v23

REM 2016 V10
REM WINDOWS TIPS
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableSoftLanding /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableWindowsSpotlightFeatures /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /V DisableWindowsConsumerFeatures /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /V DoNotShowFeedbackNotifications /T REG_DWORD /D 0 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V FeatureManagementEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V RotatingLockScreenEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V RotatingLockScreenOverlayEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SilentInstalledAppsEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SoftLandingEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SubscribedContentEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V SystemPaneSuggestionsEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V OemPreInstalledAppsEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V PreInstalledAppsEnabled /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /V ContentDeliveryAllowed /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V king.com.CandyCrushSaga_kgqvnymyfvs32 /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V Microsoft.MinecraftUWP_8wekyb3d8bbwe /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V 9E2F88E3.Twitter_wgeqdkkx372wm /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V Flipboard.Flipboard_3f5azkryzdbc4 /T REG_DWORD /D 1 /F
CALL :SubExec REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager\SuggestedApps" /V 6Wunderkinder.Wunderlist_b4cwydgxqx59r /T REG_DWORD /D 1 /F
REM RS3 2017
REM Windows Explorer
REM Disable ads in Windows Explorer/OneDrive
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V ShowSyncProviderNotifications /T REG_DWORD /D 1 /F
REM 2018 RS3
REM Pokazuj ostatnich pliki/katalogi
CALL :SubExec REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /V Start_TrackDocs /T REG_DWORD /D 1 /F
REM Wˆ¥cz dost©p OneDrive przed logowaniem w celu synchronizacji plik¢w
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\OneDrive" /V PreventNetworkTrafficPreUserSignIn /T REG_DWORD /D 0 /F

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... KOPIA HOSTS
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
CALL :Log ... Tryb Diagnostyczny ... nowy HOSTS
REM. > %AIO_HOSTS%
REM Oryginalna zawarto˜† pliku hosts UWAGA- Wolna linia to TWARDA SPACJA = Lewy ALT+0160 (z klawiatury numerycznej) !!!
ECHO ^# Copyright (c) 1993-2009 Microsoft Corp.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# This file contains the mappings of IP addresses to host names. Each>>%AIO_HOSTS%
ECHO ^# entry should be kept on an individual line. The IP address should>>%AIO_HOSTS%
ECHO ^# be placed in the first column followed by the corresponding host name.>>%AIO_HOSTS%
ECHO ^# The IP address and the host name should be separated by at least one>>%AIO_HOSTS%
ECHO ^# space.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# Additionally, comments (such as these) may be inserted on individual>>%AIO_HOSTS%
ECHO ^# lines or following the machine name denoted by a '#' symbol.>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# For example:>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^#      102.54.94.97     rhino.acme.com          # source server>>%AIO_HOSTS%
ECHO ^#       38.25.63.10     x.acme.com              # x client host>>%AIO_HOSTS%
ECHO ^#>>%AIO_HOSTS%
ECHO ^# localhost name resolution is handle within DNS itself.>>%AIO_HOSTS%
ECHO ^#       127.0.0.1       localhost>>%AIO_HOSTS%
ECHO ^#       ::1             localhost>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%

CLS
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczny ... ROUTE
CALL :Log ... Tryb Diagnostyczny ... ROUTE
GOTO ROUTE_REVERTBACK
:WIN10_BACK_ROUTE_REVERTBACK
GOTO END_CHANGE
EXIT

:HOSTS_MS
TITLE %PROGRAMNAME%-%VERSION% ... HOSTS MS
CLS
ECHO[
ECHO ÿ... Wpisy MS
@ECHO OFF
CALL :Log ... Tryb HOSTS ... Wpisy MS Start 
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak > NUL
CALL :SubExec ATTRIB -R %AIO_HOSTS%
ECHO ^# START BLOKOWANIA SKLEP WINDOWS>>%AIO_HOSTS%
ECHO ^0.0.0.0 storeedgefd.dsx.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 assets.onestore.ms>>%AIO_HOSTS%
ECHO ^0.0.0.0 microsoftstore.btttag.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pdtf4q.by3302.livefilestore.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pti.store.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 store-images.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 store-images.s-microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 storecatalogrevocation.storequality.microsoft.com>>%AIO_HOSTS%
ECHO ^# END BLOKOWANIA SKLEP WINDOWS>>%AIO_HOSTS%
ECHO ^# START BLOKOWANIA XBOX>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings-ssl.xboxlive.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 tiles.xbox.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 musicmatch-ssl.xboxlive.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 epix.xbox.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 vdlimages.xboxlive.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 download-ssl.xbox.com.nsatc.net>>%AIO_HOSTS%
ECHO ^# END BLOKOWANIA XBOX>>%AIO_HOSTS%
ECHO ^# START BLOKOWANIA SKLEP WINDOWS>>%AIO_HOSTS%
ECHO ^0.0.0.0 1c.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 1c.tlu.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 2.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 2.tlu.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 205-trouter-eus2-a.drip.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 258-trouter-neu-a.drip.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 2df7e.v.fwmrm.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 3.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 3.tlu.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 39-trouter-eus2-a.drip.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 7.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 7.tlu.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 73-trouter-neu-a.drip.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 7962161087.cdn.optimizely.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 87-trouter-easia-a.drip.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 966-khf-533.mktoresp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0001.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0001.dc-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0002.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0003.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0003.dc-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0004.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0005.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0006.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0007.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0008.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0009.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0010.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0011.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-0012.a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a-ring.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.ads1.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.ads2.msads.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.ads2.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.disquscdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.mnet-ad.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.rad.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 a.volvelle.tech>>%AIO_HOSTS%
ECHO ^0.0.0.0 a3698060313.cdn.optimizely.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 aa.agkn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 aa.online-metrix.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ac3.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 acdn.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 activity.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad.360yield.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad.atdmt.com>>%AIO_HOSTS%

ECHO ^0.0.0.0 ad.turn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad.yieldmanager.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad1.adfarm1.adition.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adadvisor.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 adbroker.mp.dse.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adl.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 admin.brightcove.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adnexus.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.lfstmedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.pubmatic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.rubiconproject.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.scorecardresearch.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.travelaudience.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.w55c.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads.yahoo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads1.msads.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ads1.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adserver-us.adtech.advertising.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adserver.adtechus.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adserverec.adtechus.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adventori.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 adx.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 agent.aralego.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 aidps.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ajax.aspnetcdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 aka-cdn-ns.adtech.de>>%AIO_HOSTS%
ECHO ^0.0.0.0 aktrack.pubmatic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 am3pap001.settings.live.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ampconfigprod.blob.core.windows.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ams1-ib.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 an.pxl.ace.advertising.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 animate.adobe.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ap.lijit.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api-cache.adsnative.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.bazaarvoice.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.gravity.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.onedrive.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 appexmapsappupdate.blob.core.windows.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 array101-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array102-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array103-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array104-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array201-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array202-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array203-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array204-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array401-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array402-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array403-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array404-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array405-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array406-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array407-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 array408-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ars.smartscreen.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 as.bankrate.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 assets.windowsphone.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 at.atwola.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 atemda.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 az361816.vo.msecnd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 az416426.vo.msecnd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 az479434.vo.msecnd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 az512334.vo.msecnd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 az725175.vo.msecnd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 b-ring.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 b.ads1.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 b.ads2.msads.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 b.grvcdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 b.rad.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 b.scorecardresearch.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 b1sync.zemanta.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bat.r.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bay407-m.hotmail.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 beacon.krxd.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 beacon.walmart.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bh.contextweb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bidi-geo.mythings.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bingads.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bl3301-a.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bl3301-c.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bl3301-g.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 blob.weather.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 blog.dailylifetech.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn1304-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn1306-a.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn1306-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn1306-g.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2.fpt.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2b-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2b-cor002.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2b-cor003.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2b-cor004.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn2wns1.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3p-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010560.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010618.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010629.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010631.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010635.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010636.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010650.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020010659.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020011727.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020012850.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020020322.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020020749.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020022328.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020022332.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020022335.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn3sch020022361.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101120814.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101120818.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101120823.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101120913.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121019.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121109.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121118.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121215.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121223.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121407.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121505.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121611.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121618.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121704.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121709.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121714.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121715.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121906.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121908.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101121909.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122006.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122114.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122117.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122303.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122310.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122312.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122412.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122421.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122607.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122610.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122804.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122813.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122904.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101122906.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101123108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101123110.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch101123202.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch102110124.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch102110218.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bn4sch102110219.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bs.serving-sys.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bttrack.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 by3301-a.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 by3301-c.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 by3301-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 by3302.settings.live.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 c-0001.dc-msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.s-microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c.urs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c1.adform.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 c1.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 c5.zedo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ca.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cache.datamart.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 candycrushsoda.king.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 casale-match.dotomi.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.content.prod.cms.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdp1.public-trust.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1143.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1203.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1204.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1209.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1219.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1228.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1244.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1257.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1265.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1269.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1273.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1285.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1287.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1289.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1293.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds1327.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds177.dus.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20005.stn.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20404.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20411.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20417.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20424.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20425.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20431.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20435.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20445.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20450.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20452.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20457.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20461.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20475.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20482.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds20495.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21225.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21229.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21233.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21244.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21256.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21261.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21267.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21278.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21281.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21293.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21309.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds21321.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds26.ams9.msecn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds299.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds308.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds310.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds339.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds344.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds405.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds406.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds407.fra.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds425.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds447.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds458.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds459.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds461.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds471.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds494.lcy.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds818.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds832.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds840.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cds965.lon.llnw.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 ce.lijit.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cem.services.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch1-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch1-cor002.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch3301-c.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch3301-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch3301-g.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch3302-c.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ch3302-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 choice.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 choice.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 client.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 clientconfig.passport.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 clk.tradedoubler.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cloudtile.photos.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cluster.ad-serverparc.nl>>%AIO_HOSTS%
ECHO ^0.0.0.0 cm.adgrx.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cm.everesttech.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cm.smartstream.tv>>%AIO_HOSTS%
ECHO ^0.0.0.0 cms.analytics.yahoo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cms.quantserve.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cmsresources.windowsphone.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 collections.md.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 collections.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 compass-ssl.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 compatexchange.cloudapp.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 compatexchange1.trafficmanager.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 contextual.media.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 continuum.dds.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cookiex.ngd.yahoo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 corp.sts.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp101-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp201-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp401-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp501-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp601-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp701-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp801-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cs.adingo.jp>>%AIO_HOSTS%
ECHO ^0.0.0.0 cs.dds.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cs1.wpc.v0cdn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 csm2waycm-atl.netmng.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ct1.ra.linksynergy.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cti.w55c.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cy2.settings.data.microsoft.com.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 d.agkn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 d.chango.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 d.turn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 d5p.de17a.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db3aqu.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db3wns2011111.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5.settings.data.microsoft.com.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100122.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100127.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100128.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100437.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100831.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100833.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100835.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100840.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100917.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100922.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100925.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100926.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100928.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100934.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100938.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101100944.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101001.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101022.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101024.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101030.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101031.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101034.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101042.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101044.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101122.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101123.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101125.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101128.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101129.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101133.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101145.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101204.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101220.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101221.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101228.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101231.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101234.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101237.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101310.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101317.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101324.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101329.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101332.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101333.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101334.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101338.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101401.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101419.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101424.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101426.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101427.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101430.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101441.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101445.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101511.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101519.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101523.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101529.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101531.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101535.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101541.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101543.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101608.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101618.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101620.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101629.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101631.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101633.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101638.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101640.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101711.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101722.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101724.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101739.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101740.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101745.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101810.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101813.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101820.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101826.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101828.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101835.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101837.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101844.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101902.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101907.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101910.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101914.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101921.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101929.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101939.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101101941.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102009.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102015.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102017.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102019.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102023.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102025.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102032.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101102033.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110105.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110109.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110114.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110123.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110125.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110130.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110135.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110142.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110204.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110206.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110214.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110224.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110225.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110230.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110232.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110239.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110245.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110309.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110315.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110323.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110325.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110328.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110331.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110341.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110343.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110345.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110403.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110408.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110419.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110422.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110428.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110435.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110438.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110441.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110442.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110501.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110510.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110518.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110527.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110528.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110533.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110534.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110541.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110544.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110618.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110621.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110622.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110624.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110626.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110627.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110634.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110643.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110705.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110707.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110713.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110717.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110724.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110728.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110729.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110737.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110740.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110744.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110810.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110816.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110821.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110822.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110825.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110828.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110829.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110831.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110835.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110841.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110919.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110921.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110923.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110927.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110929.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch101110931.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103081814.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103081910.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103081913.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082008.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082011.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082111.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082210.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082211.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082308.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082310.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082406.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082409.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082507.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082510.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082609.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082611.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082709.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082712.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082806.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103082809.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090115.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090120.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090210.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090316.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090414.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090415.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090513.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090515.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090608.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090616.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090709.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090710.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090806.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090814.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090906.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103090914.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091011.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091012.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091106.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091212.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091311.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091313.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091411.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091414.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091510.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091511.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091609.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091617.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091709.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091715.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091811.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091817.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091908.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103091911.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092010.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092013.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092109.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092210.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092509.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092608.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092610.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092710.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092713.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092808.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103092817.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100117.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100121.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100212.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100221.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100313.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100314.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100412.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100415.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100510.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100511.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100611.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100614.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100710.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100712.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103100805.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101009.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101012.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101105.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101113.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101208.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101212.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101305.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101314.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101411.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101413.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101512.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101513.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101610.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101611.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101705.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101711.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101806.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101813.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101909.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103101914.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102009.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102010.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102105.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102112.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102203.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102310.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102311.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102404.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102410.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102508.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102516.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102609.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102610.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102710.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102711.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102805.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5sch103102811.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db5wns1d.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090104.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090109.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090112.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090113.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090115.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090116.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090122.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090203.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090206.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090208.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090210.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090211.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090212.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090305.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090306.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090308.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090309.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090311.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090313.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090318.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090406.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090409.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090410.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090412.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090413.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090504.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090506.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090510.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090512.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090513.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090514.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090519.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090603.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090604.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090608.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090609.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090613.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090619.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090621.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090703.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090707.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090708.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090713.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090803.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090806.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090808.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090809.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090810.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090811.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090902.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090904.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090905.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090907.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090908.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090910.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102090911.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091003.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091004.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091006.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091007.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091008.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091009.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091011.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091103.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091105.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091106.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091107.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091108.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091109.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091110.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091204.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091205.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091209.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091210.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091216.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091302.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091305.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091306.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091307.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091308.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091309.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091314.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091409.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091412.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091502.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091503.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091506.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091507.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091508.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091511.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091513.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091602.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091603.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091604.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091606.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 db6sch102091607.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dc.services.visualstudio.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 definitionupdates.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 delivery.swid.switchadhub.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 delivery.swid.switchads.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 deliveryengine.synchroscript.adswizz.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dev.microsofttranslator.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dev.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 developer.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 df.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dgps.support.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 diagnostics.support.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dis.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dis.eu.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dis.us.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc101-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc201-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc401-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc501-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc601-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc701-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disc801-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 display.ugc.bazaarvoice.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 disqus-d.openx.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 doubleclick.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 dmd.metaservices.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dp2.33across.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dpm.demdex.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 dri1.img.digitalrivercontent.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 dri2.img.digitalrivercontent.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 dsp.adfarm1.adition.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dsp.adkernel.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dsum-sec.casalemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dsum.casalemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dt.adsafeprotected.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dx.steelhousemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dynmsg.modpim.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 e.nexac.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ebdr3.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ec.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ecn.dev.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 edge.quantserve.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 edgedccdn.azureedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 emdl.ws.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 eu-px.steelhousemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 eu-u.openx.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 eu.vortex.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 evoke-windowsservices-tas.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 fcs.zedo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fe3.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 feedback.microsoft-hohm.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 feedback.search.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 feedback.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fei.pro-market.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 flex.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fp.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 fpt.live-partner.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fpt.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fra1-ib.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 fud.community.services.support.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.ceipmsn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.cwkuki.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g1.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 g2.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gdeua.hit.gemius.pl>>%AIO_HOSTS%
ECHO ^0.0.0.0 geo-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 geo-um.btrll.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 geo.settings.data.microsoft.com.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 geover-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gj.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 global.ib-ibi.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gn.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gn.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 go.trouter.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 gp.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gum.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gv.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gwx.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 h1.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 h2.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020721.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020723.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020726.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020729.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020732.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020824.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020843.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020851.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020854.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020855.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020924.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020936.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020940.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020956.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020958.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130020961.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021017.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021029.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021035.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021123.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021137.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021142.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021153.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021217.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021246.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021249.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021260.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021264.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021322.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021323.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021329.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021334.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021360.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021432.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021433.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021435.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021437.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021440.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021450.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021518.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021523.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021526.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021527.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021544.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021554.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021618.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021634.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021638.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021646.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021652.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021654.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021657.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021723.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021726.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021727.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021730.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021731.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021754.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021829.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021830.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021831.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021833.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021840.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021842.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021851.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021852.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021927.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021928.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021929.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130021958.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130022035.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130022037.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130022041.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130022049.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2sch130022135.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2wns1.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hk2wns1b.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hostme.blob.core.windows.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 html5.adsrvr.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-bl6p-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-by3p-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-by3p-cor002.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-ch1-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-ch1-cor002.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-msdn.sec.s-msft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-sn2-cor001.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i-sn2-cor002.api.p001.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i.s-microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i1.services.social.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 i2-msdn.sec.s-msft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ib.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ibeu2.mookie1.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 idpix.media6degrees.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 idsync.rlcdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 iecvlist.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ieonline.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ih.adscale.de>>%AIO_HOSTS%
ECHO ^0.0.0.0 img.s-msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 inference.location.live.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 insiderhub.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 insiderppe.cloudapp.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 intljs.rmtag.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 inv-nets.admixer.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 inv.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 jscj80qv-d1f0336a6f8d54d920cfda7f994ed61ba66881f3-am1.d.aa.online-metrix.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 jsonip.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 k.intellitxt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv101-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv201-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv401-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv501-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv601-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv701-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kv801-prod.do.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 l-ring.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 lb1.www.ms.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 livetileedge.dsx.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 load.s3.amazonaws.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 load77.exelator.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 loadm.exelator.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 loadus.exelator.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 log.outbrain.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ls2web.redmond.corp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 m.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 m.webtrends.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ma791-r.analytics.edgekey.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 match.adsrvr.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 match.basebanner.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 match.prod.bidr.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 match.sharethrough.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 media.msg.dotomi.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 media.whoishostingthis.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 medianet-d.openx.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 mediaredirect.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 metrics.politico.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 microsoftedgetips.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 microsoftedgewelcome.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ml314.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mm.markandmini.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mpp.vindicosuite.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mpsnare.iesnare.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 msdn.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 msdnshared.blob.core.windows.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 msftspeechmodelsprod.azureedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 msnbot-207-46-194-33.search.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 msntest.serving-sys.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mucp.api.account.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 nexus.ensighten.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 notification.services.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 nyt2.dc-storm.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 o.aolcdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 oca.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 odb.outbrain.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 odin-pv.azureedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 odr.mookie1.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 open-rating-prod.azurewebsites.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 open-rating.azureedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 opt-east.media.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 orca9o5ptld7p8kl709wbwth.blob.core.windows.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 otf.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 p.adsymptotic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 p.rfihub.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 p.sfx.ms>>%AIO_HOSTS%
ECHO ^0.0.0.0 p.typekit.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 penta.a.one.impact-ad.jp>>%AIO_HOSTS%
ECHO ^0.0.0.0 personalization.services.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pix.btrll.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pix.impdesk.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pix04.revsci.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel-a.sitescout.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.adsafeprotected.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.advertising.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.everesttech.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.mathtag.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.onaudience.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.quantserve.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.rubiconproject.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.s3xified.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.sitescout.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixel.tapad.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pixelus.alephd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pm.w55c.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 pr-bh.ybp.yahoo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pre-usermatch.targeting.unrulymedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pre.footprintpredict.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 prebid.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 preview.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 prod.oneservice.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 prod.y-medialink.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 products.support.services.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ps.eyeota.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 pumamx.solution.weborama.fr>>%AIO_HOSTS%
ECHO ^0.0.0.0 px.adhigh.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 px.owneriq.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 px.powerlinks.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pxl.connexity.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 qsearch.media.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 query.prod.cms.rt.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 r.casalemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 r.turn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rad.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rc.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 redir.metaservices.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 register.cdpcs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ris.api.iris.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rma-api.gravity.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 router.infolinks.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rp.gwallet.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rps.trafficmanager.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 rt.legolas-media.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rtax.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rtb-csync.smartadserver.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rtbcc.fyber.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rtd.tubemogul.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rto.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rub.pxl.ace.advertising.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rudy.adsnative.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.amazon-adsystem.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.mnet-ad.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.thebrighttag.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.w.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 s.wsj.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 s0.2mdn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 s1.2mdn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 s1.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s2.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s2s.prebid.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 sales.liveperson.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sb.scorecardresearch.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sc.iasds01.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 schemas.microsoft.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sci1-1.am.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sci2-1.am.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 scs.webtrends.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 search.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 secure-dcr.imrworldwide.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 secure-gl.imrworldwide.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 secure.adnxs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 secure.flashtalking.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 secure.livechatinc.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 servedby.flashtalking.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 services.wes.df.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings-sandbox.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings-win-ppe.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings-win.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings.data.glbdns2.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 settings.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sf.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sg.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 shopper.img.digitalrivercontent.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 simage2.pubmatic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 site-cdn.onenote.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sjs.bizographics.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 skyapi.live.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 skydrive.wns.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 skydrivesync.policies.live.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sn3301-c.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sn3301-e.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sn3301-g.1drv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 snap.licdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 so.2mdn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 spynet2.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 spynetalt.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 spyneteurope.microsoft.akadns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sqm.df.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sqm.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sr.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sr.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ss.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ss.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ssl.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sslwidget.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ssum-sec.casalemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ssum.casalemedia.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 stags.bluekai.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static-hp-neu.s-msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.2mdn.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.adsnative.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.bundles.hybrid.api.here.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.chartbeat.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.criteo.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 static2.politico.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 static3.mansionglobal.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 su.addthis.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 survey.watson.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.1rx.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.adap.tv>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.go.sonobi.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.ipredictive.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.ligadx.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.mathtag.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.outbrain.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.rhythmxchange.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.search.spotxchange.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync.teads.tv>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync3.adsniper.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 sync3.sniperlog.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.a3cloud.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.channeladvisor.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.mookie1.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.tellapart.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.urs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 t.wayfair.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 t0.ssl.ak.dynamic.tiles.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 t0.ssl.ak.tiles.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 t2.ssl.ak.tiles.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 t2.symcb.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tacoda.at.atwola.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tags.bluekai.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tags.crwdcntrl.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 tags.tiqcdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tap-secure.rubiconproject.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tapestry.tapad.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tele.trafficmanager.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 telecommand.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 telemetry.appex.bing.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 telemetry.urs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 teredo.ipv6.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 test.activity.windows.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 testfamilysafety.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tg.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tile-service.weather.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tj.symcd.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tk2.plt.msn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tlg.mookie1.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tlu.dl.delivery.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tps10207.doubleverify.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 track.adform.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 tracking.kdata.fr>>%AIO_HOSTS%
ECHO ^0.0.0.0 trc.taboola.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 tsfe.trafficshaping.dsp.mp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 uif.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 uipglob.semasio.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 um.simpli.fi>>%AIO_HOSTS%
ECHO ^0.0.0.0 um2.eqads.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ums.adtechus.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 urs.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 urs.smartscreen.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 us-u.openx.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 user-disp.tidaltv.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 usync.nexage.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 v20.vortex-win.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 vap2ams2.lijit.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 vars.hotjar.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 venuemaps.virtualearth.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 version.hybrid.api.here.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 view.atdmt.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 visitor.omnitagjs.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 vlscppe.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 watson.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 watson.ppe.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 watson.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 wdcp.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wdcpalt.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 web.vortex.data.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 websockets.platform.bing.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wes.df.telemetry.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 widget.us.criteo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 widgets.outbrain.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 widgets.services.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 win10-trt.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 win10.ipv6.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 win1710.ipv6.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 win8.ipv6.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 windows.intowindows.netdna-cdn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wscont.apps.microsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wscont.apps.microsoft.com.edgesuite.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.msedge.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.windowssearch.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.wtp101.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 x.bidswitch.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 x.skimresources.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 z.moatads.com>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%
CALL :Log ... Tryb HOSTS ... Wpisy MS END

IF %HOSTS_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %HOSTS_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %HOSTS_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %HOSTS_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLS

:HOSTS_SKYPE
CLS
ECHO[
ECHO ÿ... Wpisy hosts Skype OK
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... HOSTS Skype
CALL :Log ... Tryb HOSTS ... WPISY SKYPE START
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak 
CALL :SubExec ATTRIB -R %AIO_HOSTS%

ECHO ^# START BLOKOWANIA REKLAM SKYPE>>%AIO_HOSTS%
ECHO ^127.0.0.1 apps.skype.com>>%AIO_HOSTS%
ECHO ^# KONIEC BLOKOWANIA REKLAM SKYPE>>%AIO_HOSTS%
CALL :SubExec ATTRIB +R %AIO_HOSTS%
CALL :Log ... Tryb HOSTS ... Wpisy Skype Koniec

REM warunki powrotu do edycji
IF %HOSTS_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %HOSTS_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %HOSTS_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %HOSTS_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLS

:HOSTS_NSA
CLS
ECHO[
ECHO ÿ... Wpisy hosts MS + NSA
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... HOSTS MS ^+ NSA
CALL :Log ... Tryb HOSTS ... Wpisy MS ^+ NSA Start
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%

ECHO ^# START BLOKOWANIA HOSTS MICROSOFT^+NSA>>%AIO_HOSTS%
REM Windows
ECHO ^0.0.0.0 win10.ipv6.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 t2ext.audownload.windowsupdate.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 aadg.windows.net.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 win8.ipv6.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 services.apps.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 adsyndication.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 gateway.messenger.hotmail.by2.nc.messenger.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 g.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 aidps.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 fd.rad.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn3.zone.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 mobileads.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 arc.msn.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 account.manage.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 bg.v4.a.dlws.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cx.familysafety.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 cp-mlxprod-static.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 choice.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 sc.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 wl.dlservice.microsoft.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 wer.microsoft.com.nsatc.net>>%AIO_HOSTS%
ECHO ^# KONIEC BLOKOWANIA SZPIEGOWANIA MICROSOFT^+NSA>>%AIO_HOSTS%
REM ZALOZENIE ATRYBUTU READ
CALL :SubExec ATTRIB +R %AIO_HOSTS%
CALL :Log ... Tryb HOSTS ... Wpisy MS ^+ NSA Koniec
REM KONIEC BLOKOWANIA HOSTS MS + NSA

:HOSTS_NOCOIN
CLS
ECHO[
ECHO ÿ... Wpisy hosts NOCOIN
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... HOSTS NOCOIN
CALL :Log ... Tryb HOSTS ... Wpisy NOCOIN Start
SET CZASRS=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET CZASRS=%CZASRS: =0%
CALL :SubExec COPY %AIO_HOSTS% %AIO_HOSTS%_%CZASRS%.bak
CALL :SubExec ATTRIB -R %AIO_HOSTS%
ECHO ^# START BLOKOWANIA NOCOIN>>%AIO_HOSTS%
ECHO ^0.0.0.0 cnhv.co>>%AIO_HOSTS%
ECHO ^0.0.0.0 coin-hive.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinhive.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 authedmine.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 load.jsecoin.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 miner.pr0gramm.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 minemytraffic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ppoi.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 projectpoi.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 crypto-loot.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cryptaloot.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 cryptoloot.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinerra.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 coin-have.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 minero.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 minero-proxy-01.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 minero-proxy-02.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 minero-proxy-03.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.inwemo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rocks.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 adminer.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad-miner.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 jsccnn.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 jscdndel.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinhiveproxy.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinblind.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinnebula.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 monerominer.rocks>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.cloudcoins.co>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinlab.biz>>%AIO_HOSTS%
ECHO ^0.0.0.0 go.megabanners.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 baiduccdn1.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wsp.marketgid.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 papoto.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 flare-analytics.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.sparechange.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 static.sparechange.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 miner.nablabee.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 m.anyfiles.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.coinimp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.coinimp.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.bid>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.date>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.faith>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.loan>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.racing>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.freecontent.win>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.blockchained.party>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.hostingcloud.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.cryptonoter.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.mutuza.win>>%AIO_HOSTS%
ECHO ^0.0.0.0 crypto-webminer.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.adless.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 hegrinhar.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 verresof.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hemnes.win>>%AIO_HOSTS%
ECHO ^0.0.0.0 tidafors.xyz>>%AIO_HOSTS%
ECHO ^0.0.0.0 moneone.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 plexcoin.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.monkeyminer.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 go2.mercy.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 coinpirate.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 d.cpufan.club>>%AIO_HOSTS%
ECHO ^0.0.0.0 krb.devphp.org.ua>>%AIO_HOSTS%
ECHO ^0.0.0.0 nfwebminer.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cfcdist.gdn>>%AIO_HOSTS%
ECHO ^0.0.0.0 node.cfcdist.gdn>>%AIO_HOSTS%
ECHO ^0.0.0.0 webxmr.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 xmr.mining.best>>%AIO_HOSTS%
ECHO ^0.0.0.0 webminepool.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 webminepool.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 hive.tubetitties.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 playerassets.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 tokyodrift.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 webassembly.stream>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.webassembly.stream>>%AIO_HOSTS%
ECHO ^0.0.0.0 okeyletsgo.ml>>%AIO_HOSTS%
ECHO ^0.0.0.0 candid.zone>>%AIO_HOSTS%
ECHO ^0.0.0.0 webmine.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 andlache.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bablace.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bewaslac.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 biberukalap.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bowithow.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 butcalve.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 evengparme.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gridiogrid.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 hatcalter.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 kedtise.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ledinund.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 nathetsof.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 renhertfo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rintindown.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sparnove.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 witthethim.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 1q2w3.fun>>%AIO_HOSTS%
ECHO ^0.0.0.0 1q2w3.me>>%AIO_HOSTS%
ECHO ^0.0.0.0 bjorksta.men>>%AIO_HOSTS%
ECHO ^0.0.0.0 crypto.csgocpu.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 noblock.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 miner.cryptobara.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 digger.cryptobara.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 dev.cryptobara.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 reservedoffers.club>>%AIO_HOSTS%
ECHO ^0.0.0.0 mine.torrent.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 host.d-ns.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 abc.pema.cl>>%AIO_HOSTS%
ECHO ^0.0.0.0 js.nahnoji.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 mine.nahnoji.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 webmine.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.webmine.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 intactoffers.club>>%AIO_HOSTS%
ECHO ^0.0.0.0 analytics.blue>>%AIO_HOSTS%
ECHO ^0.0.0.0 smectapop12.pl>>%AIO_HOSTS%
ECHO ^0.0.0.0 berserkpl.net.pl>>%AIO_HOSTS%
ECHO ^0.0.0.0 hodlers.party>>%AIO_HOSTS%
ECHO ^0.0.0.0 hodling.faith>>%AIO_HOSTS%
ECHO ^0.0.0.0 chainblock.science>>%AIO_HOSTS%
ECHO ^0.0.0.0 minescripts.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.minescripts.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 miner.nablabee.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wss.nablabee.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 clickwith.bid>>%AIO_HOSTS%
ECHO ^0.0.0.0 dronml.ml>>%AIO_HOSTS%
ECHO ^0.0.0.0 niematego.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 tulip18.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 p.estream.to>>%AIO_HOSTS%
ECHO ^0.0.0.0 didnkinrab.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 ledhenone.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 losital.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 mebablo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 moonsade.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 nebabrop.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 pearno.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rintinwa.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 willacrit.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www2.adfreetv.ch>>%AIO_HOSTS%
ECHO ^0.0.0.0 minr.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 new.minr.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 test.minr.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 staticsfs.host>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn-code.host>>%AIO_HOSTS%
ECHO ^0.0.0.0 g-content.bid>>%AIO_HOSTS%
ECHO ^0.0.0.0 ad.g-content.bid>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.static-cnt.bid>>%AIO_HOSTS%
ECHO ^0.0.0.0 cnt.statistic.date>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.jquery-uim.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn-jquery.host>>%AIO_HOSTS%
ECHO ^0.0.0.0 p1.interestingz.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 kippbeak.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 pasoherb.gq>>%AIO_HOSTS%
ECHO ^0.0.0.0 axoncoho.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 depttake.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 flophous.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 pr0gram.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 authedmine.eu>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.monero-miner.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.datasecu.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jquery-cdn.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.etzbnfuigipwvs.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.terethat.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 freshrefresher.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.pzoifaum.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 ws.pzoifaum.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.bhzejltg.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 ws.bhzejltg.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 d.cfcnet.top>>%AIO_HOSTS%
ECHO ^0.0.0.0 vip.cfcnet.top>>%AIO_HOSTS%
ECHO ^0.0.0.0 eu.cfcnet.top>>%AIO_HOSTS%
ECHO ^0.0.0.0 as.cfcnet.top>>%AIO_HOSTS%
ECHO ^0.0.0.0 us.cfcnet.top>>%AIO_HOSTS%
ECHO ^0.0.0.0 eu.cfcdist.loan>>%AIO_HOSTS%
ECHO ^0.0.0.0 as.cfcdist.loan>>%AIO_HOSTS%
ECHO ^0.0.0.0 us.cfcdist.loan>>%AIO_HOSTS%
ECHO ^0.0.0.0 gustaver.ddns.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 worker.salon.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s2.appelamule.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mepirtedic.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdn.streambeam.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 adzjzewsma.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 ffinwwfpqi.gq>>%AIO_HOSTS%
ECHO ^0.0.0.0 ininmacerad.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 mhiobjnirs.gq>>%AIO_HOSTS%
ECHO ^0.0.0.0 open-hive-server-1.pp.ua>>%AIO_HOSTS%
ECHO ^0.0.0.0 pool.hws.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 pool.etn.spacepools.org>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.aalbbh84.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.aymcsx.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros01.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros02.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros03.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros04.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros05.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros06.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros07.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros08.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros09.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros10.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros11.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 aeros12.tk>>%AIO_HOSTS%
ECHO ^0.0.0.0 npcdn1.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 mxcdn2.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 sxcdn6.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 mxcdn1.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 sxcdn02.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 sxcdn4.now.sh>>%AIO_HOSTS%
ECHO ^0.0.0.0 jqcdn2.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sxcdn1.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sxcdn5.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wpcdn1.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 jqcdn01.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 jqcdn03.herokuapp.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 1q2w3.website>>%AIO_HOSTS%
ECHO ^0.0.0.0 video.videos.vidto.me>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.play1.videos.vidto.me>>%AIO_HOSTS%
ECHO ^0.0.0.0 playe.vidto.se>>%AIO_HOSTS%
ECHO ^0.0.0.0 video.streaming.estream.to>>%AIO_HOSTS%
ECHO ^0.0.0.0 eth-pocket.de>>%AIO_HOSTS%
ECHO ^0.0.0.0 xvideosharing.site>>%AIO_HOSTS%
ECHO ^0.0.0.0 bestcoinsignals.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 eucsoft.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 traviilo.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 wasm24.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 xmr.cool>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.netflare.info>>%AIO_HOSTS%
ECHO ^0.0.0.0 cdnjs.cloudflane.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.cloudflane.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 clgserv.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 hide.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 graftpool.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 encoding.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 altavista.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 scaleway.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 nexttime.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 never.ovh>>%AIO_HOSTS%
ECHO ^0.0.0.0 2giga.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 support.2giga.link>>%AIO_HOSTS%
ECHO ^0.0.0.0 webminerpool.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 minercry.pt>>%AIO_HOSTS%
ECHO ^0.0.0.0 adplusplus.fr>>%AIO_HOSTS%
ECHO ^0.0.0.0 ethtrader.de>>%AIO_HOSTS%
ECHO ^0.0.0.0 gobba.myeffect.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 bauersagtnein.myeffect.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 besti.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 jurty.ml>>%AIO_HOSTS%
ECHO ^0.0.0.0 jurtym.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 mfio.cf>>%AIO_HOSTS%
ECHO ^0.0.0.0 mwor.gq>>%AIO_HOSTS%
ECHO ^0.0.0.0 oei1.gq>>%AIO_HOSTS%
ECHO ^0.0.0.0 wordc.ga>>%AIO_HOSTS%
ECHO ^0.0.0.0 berateveng.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 ctlrnwbv.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 ermaseuc.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 kdmkauchahynhrs.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 uoldid.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jqrcdn.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jqassets.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jqcdn.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jquerrycdn.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.jqwww.download>>%AIO_HOSTS%
ECHO ^0.0.0.0 lightminer.co>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.lightminer.co>>%AIO_HOSTS%
ECHO ^0.0.0.0 browsermine.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 api.browsermine.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 mlib.browsermine.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 bmst.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 bmnr.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 bmcm.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 bmcm.ml>>%AIO_HOSTS%
ECHO ^0.0.0.0 videoplayer2.xyz>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.video2.stream.vidzi.tv>>%AIO_HOSTS%
ECHO ^0.0.0.0 001.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 002.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 003.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 004.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 005.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 006.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 007.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 008.0x1f4b0.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 authedwebmine.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 www.authedwebmine.cz>>%AIO_HOSTS%
ECHO ^0.0.0.0 skencituer.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 site.flashx.cc>>%AIO_HOSTS%
ECHO ^0.0.0.0 js.vidoza.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 mm.zubovskaya-banya.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 mysite.irkdsu.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.estream.nu>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.estream.to>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.estream.xyz>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.play.estream.nu>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.play.estream.to>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.play.estream.xyz>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.tainiesonline.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.vidzi.tv>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.pampopholf.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s3.pampopholf.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.malictuiar.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s3.malictuiar.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.play.tainiesonline.stream>>%AIO_HOSTS%
ECHO ^0.0.0.0 ocean2.authcaptcha.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 rock2.authcaptcha.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 stone2.authcaptcha.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sass2.authcaptcha.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 sea2.authcaptcha.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.flowplayer.space>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.pc.belicimo.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.power.tainiesonline.pw>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.s01.vidtodo.pro>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.cc.gofile.io>>%AIO_HOSTS%
ECHO ^0.0.0.0 wm.yololike.space>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.mix.kinostuff.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.on.animeteatr.ru>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.mine.gay-hotvideo.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.www.intellecthosting.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 mytestminer.xyz>>%AIO_HOSTS%
ECHO ^0.0.0.0 play.vb.wearesaudis.net>>%AIO_HOSTS%
ECHO ^0.0.0.0 flowplayer.space>>%AIO_HOSTS%
ECHO ^0.0.0.0 s2.flowplayer.space>>%AIO_HOSTS%
ECHO ^0.0.0.0 s3.flowplayer.space>>%AIO_HOSTS%
ECHO ^0.0.0.0 thersprens.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s2.thersprens.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 s3.thersprens.com>>%AIO_HOSTS%
ECHO ^0.0.0.0 gramombird.com>>%AIO_HOSTS%
ECHO ^# KONIEC BLOKOWANIA NOCOIN>>%AIO_HOSTS%
REM ZALOZENIE ATRYBUTU READ
CALL :SubExec ATTRIB +R %AIO_HOSTS%
CALL :Log ... Tryb HOSTS ... Wpisy NOCOIN Koniec
REM LISTA https://github.com/hoshsadiq/adblock-nocoin-list
REM LISTA https://github.com/crazy-max/WindowsSpyBlocker/wiki/dataHosts
REM KONIEC BLOKOWANIA HOSTS MS + NSA

REM warunki powrotu do edycji czy do skryptu
IF %HOSTS_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %HOSTS_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %HOSTS_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %HOSTS_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLS

IF %HOSTS_TYPE_MS%==WINVISTA_SKRYPT GOTO WINVISTA_BACK_HOSTS
IF %HOSTS_TYPE_MS%==WIN7_SKRYPT GOTO WIN7_BACK_HOSTS
IF %HOSTS_TYPE_MS%==WIN81_SKRYPT GOTO WIN81_BACK_HOSTS
IF %HOSTS_TYPE_MS%==WIN10_SKRYPT GOTO WIN10_BACK_HOSTS
EXIT
REM Wpisy blokuj¥ce NCSI (Network Connected Status Indicator) z grupy HOSTS
REM Wpisy wykluczone ¾eby nie byˆo problem¢w z ¾¢ˆtym wykrzyknikiem na ikonie poˆ¥czenia sieciowego
REM ECHO ^0.0.0.0 www.msftncsi.com
REM ECHO ^0.0.0.0 msftncsi.com

:ROUTE
@ECHO OFF
cls
TITLE %PROGRAMNAME%-%VERSION% ... ROUTE
CALL :Log ... Tryb ROUTE ... Start
REM BLOKADA IP - ROUTING
FOR %%y IN (
2.22.61.43,
2.22.61.66,
23.57.101.163,
23.223.20.82,
23.99.10.11,
23.218.212.69,
23.205.214.76,
23.204.68.66,
23.102.21.4,
23.99.10.11,
23.57.107.27,
23.57.101.163,
23.57.107.163,
23.48.106.243,
23.36.33.135,
40.77.226.223,
40.77.226.221,
52.167.222.147,
64.4.54.32,
64.4.54.22,
64.4.54.22,
64.4.6.100,
65.55.39.10,
65.52.100.9,
65.52.100.7,
65.52.100.11,
65.39.117.230,
65.55.108.23,
65.52.100.91,
65.52.108.33,
65.52.108.29,
65.52.108.103,
65.52.100.94,
65.52.100.92,
65.55.138.114,
65.55.138.126,
65.55.138.186,
65.55.252.63,
65.55.252.71,
65.55.252.92,
65.55.252.93,
65.55.29.238,
65.52.100.93,
65.52.108.254,
77.67.29.176,
104.96.147.3,
104.87.88.177,
104.89.242.39,
111.221.29.177,
111.221.29.253,
131.253.34.230,
131.253.61.68,
131.253.61.96,
131.253.61.100,
131.253.61.64,
131.253.40.37,
134.170.30.202,
134.170.185.70,
134.170.165.248,
134.170.115.60,
134.170.165.253,
137.117.235.16,
137.116.81.24,
157.55.129.21,
157.56.77.148,
157.56.77.149,
157.55.133.204,
157.56.106.189,
157.56.91.77,
157.56.96.54,
157.55.240.220,
157.56.121.89,
157.56.124.87,
168.63.108.233,
172.230.215.85,
191.232.80.58,
191.232.139.254,
191.237.208.126,
191.232.80.62,
191.232.139.2,
204.79.197.200,
207.46.114.58,
207.46.101.29,
207.68.166.254,
207.46.223.94,
212.30.134.204,
212.30.134.205,
) DO (
CLS
CALL :SubExec ROUTE -P ADD "%%y" MASK 255.255.255.255 0.0.0.0

)
REM MULTI-IP
CALL :SubExec ROUTE -P ADD "64.4.23.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "65.55.223.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "111.221.64.0" MASK 255.255.192.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "157.55.52.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "157.55.56.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "157.55.130.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "157.55.235.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "157.55.236.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "195.138.255.0" MASK 255.255.255.0 0.0.0.0
CALL :SubExec ROUTE -P ADD "213.199.179.0" MASK 255.255.255.0 0.0.0.0
CALL :Log ... Tryb ROUTE ... Koniec
REM warunki powrotu do edycji czy do skryptu
IF %ROUTE_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %ROUTE_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %ROUTE_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %ROUTE_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLS

IF %ROUTE_TYPE_MS%==WINVISTA_SKRYPT GOTO WINVISTA_BACK_ROUTE
IF %ROUTE_TYPE_MS%==WIN7_SKRYPT GOTO WIN7_BACK_ROUTE
IF %ROUTE_TYPE_MS%==WIN81_SKRYPT GOTO WIN81_BACK_ROUTE
IF %ROUTE_TYPE_MS%==WIN10_SKRYPT GOTO WIN10_BACK_ROUTE
EXIT

:ROUTE_REVERTBACK
REM ROUTE
CLS
TITLE %PROGRAMNAME%-%VERSION% ... Tryb Diagnostyczy ... ROUTE
CALL :Log ... Tryb Diagnostyczny ... ROUTE ... Start
@echo off
ECHO  ... Traw usuwanie wpis¢w ROUTE ... czekaj ...
powershell -command "& Get-WmiObject Win32_IP4PersistedRouteTable | Select-Object Destination, Mask, Nexthop, Metric1 | Where-Object -FilterScript {$_.Metric1 -eq 1} | ForEach-Object {ROUTE DELETE $_.Destination}" >NUL
CALL :Log ... Tryb Diagnostyczny ... ROUTE ... Koniec

IF %ROUTE_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %ROUTE_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %ROUTE_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %ROUTE_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLS

IF %ROUTE_TYPE_MS%==WINVISTA_SKRYPT GOTO WINVISTA_BACK_ROUTE_REVERTBACK
IF %ROUTE_TYPE_MS%==WIN7_SKRYPT GOTO WIN7_BACK_ROUTE_REVERTBACK
IF %ROUTE_TYPE_MS%==WIN81_SKRYPT GOTO WIN81_BACK_ROUTE_REVERTBACK
IF %ROUTE_TYPE_MS%==WIN10_SKRYPT GOTO WIN10_BACK_ROUTE_REVERTBACK
EXIT

:EVENTLOGCLEANER
TITLE %PROGRAMNAME%-%VERSION% ... EVENTLOGCLEANER ... trwa czyszczenie ... czekaj
CLS
@ECHO OFF
CALL :Log ... Tryb EVENTLOGCLEANER ... Start
FOR /F "tokens=*" %%G IN ('wevtutil.exe el') DO (CALL :EVENTLOGCLEANER_DO_CLEAR "%%G")
GOTO EVENTLOGCLEANER_FINITO
:EVENTLOGCLEANER_DO_CLEAR
ECHO[
ECHO  ... EVENTLOGCLEANER ... trwa czyszczenie ... czekaj
CALL :SubExec wevtutil.exe cl %1
CLS
GOTO :EOF
:EVENTLOGCLEANER_FINITO
REM Warunek powrotu
CALL :Log ... Tryb EVENTLOGCLEANER ... Koniec
IF %EVENT_TYPE_MS%==WINVISTA_EDIT GOTO WINVISTA_TOOLS
IF %EVENT_TYPE_MS%==WIN7_EDIT GOTO WIN7_TOOLS
IF %EVENT_TYPE_MS%==WIN81_EDIT GOTO WIN81_TOOLS
IF %EVENT_TYPE_MS%==WIN10_EDIT GOTO WIN10_TOOLSX

IF %EVENT_TYPE_MS%==WINVISTA_SKRYPT GOTO WINVISTA_BACK_EVENTLOGCLEANER
IF %EVENT_TYPE_MS%==WIN7_SKRYPT GOTO WIN7_BACK_EVENTLOGCLEANER
IF %EVENT_TYPE_MS%==WIN81_SKRYPT GOTO WIN81_BACK_EVENTLOGCLEANER
IF %EVENT_TYPE_MS%==WIN10_SKRYPT GOTO WIN10_BACK_EVENTLOGCLEANER
EXIT

:END
CLS
IF /I "%1"=="/nocleanmgr" GOTO END_TRUE
IF /I "%2"=="/nocleanmgr" GOTO END_TRUE
IF /I "%3"=="/nocleanmgr" GOTO END_TRUE
IF /I "%4"=="/nocleanmgr" GOTO END_TRUE
IF /I "%5"=="/nocleanmgr" GOTO END_TRUE
IF /I "%6"=="/nocleanmgr" GOTO END_TRUE
IF /I "%7"=="/nocleanmgr" GOTO END_TRUE
IF /I "%8"=="/nocleanmgr" GOTO END_TRUE
IF /I "%9"=="/nocleanmgr" GOTO END_TRUE

IF %CLEANMGRV% == 1 GOTO CLEANMGR6500
IF %CLEANMGRV% == 2 GOTO CLEANMGR6600
IF %CLEANMGR7% == 1 GOTO CLEANMGR7500
IF %CLEANMGR7% == 2 GOTO CLEANMGR7600
IF %CLEANMGR81% == 1 GOTO CLEANMGR8500
IF %CLEANMGR81% == 2 GOTO CLEANMGR8600
IF %CLEANMGR10% == 1 GOTO CLEANMGR10500
IF %CLEANMGR10% == 2 GOTO CLEANMGR10600
CALL :Log END skryptu- ERROR - nie zrobiono CLEANMGR
GOTO END_TRUE

:CLEANMGR6500
REM CLEANMGR6500 - CORE
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR CORE ... Start
CALL :Log ... CLEANMGR CORE ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags6500 /T REG_DWORD /D 2/F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags6500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags6500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags6500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags6500 /T REG_DWORD /D 2 /F >nul 2>&1
@ECHO OFF
CLS
ECHO[
ECHO  ... Trwa oczyszczanie Podstawowe - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:6500 > NUL
CALL :Log ... CLEANMGR CORE... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR6600
REM CLEANMGR6600 - ADV
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR ADV ... Start
CALL :Log ... CLEANMGR ADV ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags6600 /T REG_DWORD /D 2/F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags6600 /T REG_DWORD /D 2 /F >nul 2>&1
@ECHO OFF
CLS
ECHO[
ECHO  ... Trwa oczyszczanie Zawaansowane - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:6600 > NUL
CALL :Log ... CLEANMGR ADV ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR7500
REM CLEANMGR7500 - CORE
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR CORE ... Start
CALL :Log ... CLEANMGR CORE ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags7500 /T REG_DWORD /D 2/F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags7500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags7500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags7500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags7500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags7500 /T REG_DWORD /D 0 /F >nul 2>&1
@ECHO OFF
CLS
ECHO[
ECHO  ... Trwa oczyszczanie Podstawowe - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:7500 > NUL
CALL :Log ... CLEANMGR CORE ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR7600
REM CLEANMGR7600 - ADV
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR ADV ... Start
CALL :Log ... CLEANMGR ADV ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags7600 /T REG_DWORD /D 2/F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags7600 /T REG_DWORD /D 2 /F >nul 2>&1
CLS
@ECHO OFF
ECHO[
ECHO  ... Trwa oczyszczanie Zawaansowane - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:7600 > NUL
CALL :Log ... CLEANMGR ADV ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR8500
REM CLEANMGR8500 - CORE
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR CORE ... Start
CALL :Log ... CLEANMGR CORE ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags8500 /T REG_DWORD /D 2/F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags8500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags8500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags8500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags8500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags8500 /T REG_DWORD /D 0 /F >nul 2>&1
CLS
@ECHO OFF
ECHO[
ECHO  ... Trwa oczyszczanie Podstawowe - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:8500 > NUL
CALL :Log ... CLEANMGR CORE ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR8600
REM CLEAN8600 - ADV
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR ADV ... Start
CALL :Log ... CLEANMGR ADV ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Memory Dump Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Offline Pages Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags8600 /T REG_DWORD /D 2 /F >nul 2>&1
CLS
@ECHO OFF
ECHO[
ECHO  ... Trwa oczyszczanie Zawaansowane - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:8600 > NUL
CALL :Log ... CLEANMGR ADV ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR10500
REM CLEAN10500 - CORE
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR CORE ... Start
CALL :Log ... CLEANMGR CORE ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags10500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags10500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags10500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\User file versions" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Defender" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Temp Files" /V StateFlags10500 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows ESD installation files" /V StateFlags10500 /T REG_DWORD /D 0 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags10500 /T REG_DWORD /D 0 /F >nul 2>&1
CLS
@ECHO OFF
ECHO[
ECHO  ... Trwa oczyszczanie Podstawowe - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:10500 > NUL
CALL :Log ... CLEANMGR CORE ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE

:CLEANMGR10600
REM CLEAN10600 - ADV
TITLE %PROGRAMNAME%-%VERSION% ... CLEANMGR ADV ... Start
CALL :Log ... CLEANMGR ADV ... Start
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Active Setup Temp Folders" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Downloaded Program Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Internet Cache Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Old ChkDsk Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Previous Installations" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Recycle Bin" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Service Pack Cleanup" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Setup Log Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error memory dump files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\System error minidump files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Temporary Setup Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Thumbnail Cache" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Update Cleanup" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Upgrade Discarded Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\User file versions" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Defender" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Archive Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Queue Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Archive Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting System Queue Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Error Reporting Temp Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows ESD installation files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CALL :SubExec REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\Windows Upgrade Log Files" /V StateFlags10600 /T REG_DWORD /D 2 /F >nul 2>&1
CLS
@ECHO OFF
ECHO[
ECHO  ... Trwa oczyszczanie Zawaansowane - czekaj cierpliwie
CALL :SubExec NET STOP WUAUSERV > NUL
CALL :SubExec RD /S /Q "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec MD "%WINDIR%\SoftwareDistribution\Download\" > NUL
CALL :SubExec NET START WUAUSERV > NUL
CALL :SubExec START "DEEPCLEANER" /B /WAIT CLEANMGR /sagerun:10600 > NUL
CALL :Log ... CLEANMGR ADV ... Koniec
ECHO[
ECHO  ... Zakoäczono
ECHO[
ECHO  ... Uwaga Czyszczenie zadziaˆa dopiero podczas restartu
TIMEOUT /T 4 > NUL
GOTO END_TRUE











:END_TRUE
CLS
DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1
DEL /F /Q %SYSTEMDRIVE%\$null>nul 2>&1
CALL :Log Koniec skryptu
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Uruchom ponownie komputer ^!
CLS
ECHO                       __ __  ____    _  __   ____   ____   _____
ECHO                      / //_/ / __ \  / ^|/ /  /  _/  / __/  / ___/
ECHO                     / ,^<   / /_/ / /    /  _/ /   / _/   / /__  
ECHO                    /_/^|_^|  \____/ /_/^|_/  /___/  /___/   \___/                                                   
ECHO[
ECHO  ... Uruchom ponownie komputer ^!
ECHO[
ECHO ÿ... Skrypt zakoäczy si© automatycznie po 10 sekundach / lub wci˜nij dowolny klawisz / 
IF /I "%1"=="/restart" GOTO ARGrestart
IF /I "%2"=="/restart" GOTO ARGrestart
IF /I "%3"=="/restart" GOTO ARGrestart
IF /I "%4"=="/restart" GOTO ARGrestart
IF /I "%5"=="/restart" GOTO ARGrestart
IF /I "%6"=="/restart" GOTO ARGrestart
IF /I "%7"=="/restart" GOTO ARGrestart
IF /I "%8"=="/restart" GOTO ARGrestart
IF /I "%9"=="/restart" GOTO ARGrestart

IF /I "%1"=="/shutdown" GOTO ARGshutdown
IF /I "%2"=="/shutdown" GOTO ARGshutdown
IF /I "%3"=="/shutdown" GOTO ARGshutdown
IF /I "%4"=="/shutdown" GOTO ARGshutdown
IF /I "%5"=="/shutdown" GOTO ARGshutdown
IF /I "%6"=="/shutdown" GOTO ARGshutdown
IF /I "%7"=="/shutdown" GOTO ARGshutdown
IF /I "%8"=="/shutdown" GOTO ARGshutdown
IF /I "%9"=="/shutdown" GOTO ARGshutdown
TIMEOUT /T 10 > NUL
EXIT

:END_CHANGE
DEL /F /Q %SYSTEMDRIVE%\LATESTRS.txt>nul 2>&1
CALL :Log Koniec skryptu - Tryb Diagnostyczny
@ECHO OFF
TITLE %PROGRAMNAME%-%VERSION% ... Uruchom ponownie komputer ^!
CLS
ECHO                       __ __  ____    _  __   ____   ____   _____
ECHO                      / //_/ / __ \  / ^|/ /  /  _/  / __/  / ___/
ECHO                     / ,^<   / /_/ / /    /  _/ /   / _/   / /__  
ECHO                    /_/^|_^|  \____/ /_/^|_/  /___/  /___/   \___/                                                   
ECHO[
ECHO  ... Cofni©cie zmian wprowadzonych przez skrypt - zakoäczone
ECHO[
ECHO  ... Uruchom ponownie komputer ^!
ECHO[
ECHO ÿ... Skrypt zakoäczy si© automatycznie po 10 sekundach / lub wci˜nij dowolny klawisz /
IF /I "%1"=="/restart" GOTO ARGrestart
IF /I "%2"=="/restart" GOTO ARGrestart
IF /I "%3"=="/restart" GOTO ARGrestart
IF /I "%4"=="/restart" GOTO ARGrestart
IF /I "%5"=="/restart" GOTO ARGrestart
IF /I "%6"=="/restart" GOTO ARGrestart
IF /I "%7"=="/restart" GOTO ARGrestart
IF /I "%8"=="/restart" GOTO ARGrestart
IF /I "%9"=="/restart" GOTO ARGrestart

IF /I "%1"=="/shutdown" GOTO ARGshutdown
IF /I "%2"=="/shutdown" GOTO ARGshutdown
IF /I "%3"=="/shutdown" GOTO ARGshutdown
IF /I "%4"=="/shutdown" GOTO ARGshutdown
IF /I "%5"=="/shutdown" GOTO ARGshutdown
IF /I "%6"=="/shutdown" GOTO ARGshutdown
IF /I "%7"=="/shutdown" GOTO ARGshutdown
IF /I "%8"=="/shutdown" GOTO ARGshutdown
IF /I "%9"=="/shutdown" GOTO ARGshutdown
TIMEOUT /T 10 > NUL
EXIT

:ARGrestart
REM Komenda RESTARTU
cls
ECHO[
ECHO ZA 10 sekund nast¥pi Restart Komputera ^^!^^!^^!
ECHO[
SHUTDOWN /r /t 10 /f
TIMEOUT /T 4 > NUL
EXIT

:ARGshutdown
REM Komenda SHUTDOWN
cls
ECHO[
ECHO ZA 10 sekund nast¥pi Wyˆ¥czenie Komputera ^^!^^!^^!
ECHO[
SHUTDOWN /s /t 10 /f
TIMEOUT /T 4 > NUL
EXIT






REM
REM
REM ˜mietnik
REM if errorlevel=0 means the value exists
REM if errorlevel=1 means the value does not exist
REM BS= to jest ALT+008
REM ASCII GENERATOR http://patorjk.com/software/taag/#p=display&h=3&v=3&f=Small%20Slant&t=K%20O%20N%20%20I%20%20E%20%20C

:ChangeLog
REM Aktualizacja 26.07.2018 v23
REM V/7/8.1/10
REM - DODANO  Pobieranie plik¢w do statystyk u¾ywania OS/tryb
REM - FIX  Aktualizacja listy HOSTS - porz¥dki
REM - FIX  Aktualizacja listy HOSTS - NOCOIN - blokowanie kopania ET/BIT/etc-COIN¢w
REM -/-/-/10
REM - DODANO Aktualizacja dla Windows 1803/rs4/ SpringsCreatorsUpdate
REM - FIX  Tryb Pro domy˜lnie nic nie usuwa  - domy˜lnie ma  wyˆ¥czone usuwanie komponent¢w, trzeba edytowa† skrypt aby zadziaˆaˆ
REM        trzeba go zmodyfikowa† pod wˆasne potrzeby 
REM - DODANO  Usuni©cie bezpowrotne Cortany
REM - DODANO  Nowe zb©dne zadania z Harmonogramu Zadaä do wyˆ¥czenia
REM - FIX  aktualizacja blokowania/odblokowania Windows Update  - nowa metoda UsoClient + more
REM        Po zablokowaniu Windows nie b©dzie m¢gˆ sam sprawdzi† sobie aktualizacji,
REM        nie wolno w ustawieniach mu w tym pomaga†, klikaj¥c Sprawd« aktualizacje czy pon¢w pr¢b© !!!
REM        Je¾eli klikniesz Sprawd« aktualizacje to nale¾y wybra† w RemovePSY-AIO
REM        Menu   Narz©dzia/7/ - /c/ - Wyˆ¥(c)zenie usˆugi Windows UPDATE !, 
REM        potem  Narz©dzia/7/ - /C/ - Wˆ¥(C)zenie usˆugi Windows UPDATE ! + wykona† restart komputera
REM
REM Aktualizacja 29.03.2018 v22
REM V/7/8.1/10
REM - DODANO  HOSTS - dodanie nowych wpis¢w
REM - FIX  Aktualizacja listy HOSTS - porz¥dki min. w Skype, Outlook, MicrosoftStore
REM - FIX  Aktualizacja listy HOSTS - NOCOIN - blokowanie kopania ET/BIT/etc-COIN¢w
REM -/-/-/10
REM - DODANO  Usuni©cie bezpowrotne SmartScreena
REM - DODANO  Wˆ¥czenie/ wyˆ¥czenie Zapory Windows Defender
REM
REM
REM Aktualizacja 19.03.2018 v21
REM V/7/8.1/10
REM - FIX  Aktualizacja listy HOSTS - porz¥dki min. w Skype
REM -/-/-/10
REM - FIX  Narz©dzia dodanie opcji blokowania/odblokowania Windows Update  - nowa metoda UsoClient.exe 
REM        Po zablokowaniu Windows nie b©dzie m¢gˆ sam sprawdzi† sobie aktualizacji,
REM        nie wolno w ustawieniach mu w tym pomaga†, klikaj¥c Sprawd« aktualizacje czy pon¢w pr¢b© !!!
REM        Je¾eli klikniesz Sprawd« aktualizacje to nale¾y wybra† w RemovePSY-AIO
REM        Menu   Narz©dzia/7/ - /c/ - Wyˆ¥(c)zenie usˆugi Windows UPDATE !, 
REM        potem  Narz©dzia/7/ - /C/ - Wˆ¥(C)zenie usˆugi Windows UPDATE ! + wykona† restart komputera
REM
REM
REM Aktualizacja 14.03.2018 v20
REM -/-/-/10
REM - FIX  Narz©dziaX dodanie opcji odblokowania dotyku (D)
REM - FIX  Tryb ADV Blokowanie nowych features Win10 RS3
REM - FIX  Narz©dziaX - dodanie opcji bezpowrotnego usuni©cia Windows Update z systemu (U)
REM V/7/8.1/10
REM - DODANO Automatyczn¥ aktualizacj© skryptu
REM - DODANO Narz©dzia Blokowanie HOSTS - NOCOIN - blokowanie kopania ET/BIT/etc-COIN¢w
REM - FIX  Aktualizacja listy HOSTS
REM - FIX  Aktualizacja listy ROUTE + Usprawnienie usuwania nieaktualnych wpis¢w
REM
REM
REM Aktualizacja 14.11.2017 v19
REM -/-/-/10
REM - DODANO Aktualizacja dla Windows 1709/rs3/FallCreatorsUpdate
REM - FIX Menu X - Dodanie zadaä harmonogramu do odblokowania sklepu Windows
REM - FIX Tryb PRO staje si© oddzielnym moduˆem - dotychczas po wykonaniu trybu PRO nast©powaˆy kolejne tryby,
REM       teraz po wykonaniu trybu PRO skrypt po prostu zakoäczy si©
REM
REM -/7/8.1/-
REM - DODANO Tryb PRO
REM - FIX Tryb PRO staje si© oddzielnym moduˆem - dotychczas po wykonaniu trybu PRO nast©powaˆy kolejne tryby,
REM       teraz po wykonaniu trybu PRO skrypt po prostu zakoäczy si©
REM
REM
REM Aktualizacja 29.09.2017 v18
REM -/-/-/10
REM - FIX  Aktualizacja komponent¢w tryb PRO
DA SPOLER !
Adobe-Flash-For-Windows,
HyperV,
Media-FaceAnalysis,
Media-ocr,
Microsoft-Hyper-V-Management,
Microsoft-Mobile-Sensors,
Microsoft-OneCore-APPXDeployment,
Microsoft-OneCore-AllowTelemetry,
Microsoft-OneCore-AppModel,
Microsoft-OneCore-AppRuntime,
Microsoft-OneCore-BITS-Client,
Microsoft-OneCore-Biometrics,
Microsoft-OneCore-Bluetooth-WinRT,
Microsoft-OneCore-CameraCaptureUI,
Microsoft-OneCore-CloudExperienceHost, 
Microsoft-OneCore-ConnectionSharing,
Microsoft-OneCore-Connectivity-Bluetooth,
Microsoft-OneCore-Connectivity-NFC,
Microsoft-OneCore-DebugCore,
Microsoft-OneCore-Gaming,
Microsoft-OneCore-InkPlatform,
Microsoft-OneCore-InputService,
Microsoft-OneCore-Maps,
Microsoft-OneCore-Miracast,
Microsoft-OneCore-Multimedia-CastingCommon,
Microsoft-OneCore-Multimedia-CastingReceiver,
Microsoft-OneCore-Multimedia-CastingTransmitter,
Microsoft-OneCore-Networking-DataMarketplace,
Microsoft-OneCore-Networking-MobileBroadbandApi,
Microsoft-OneCore-NowPlayingSessionManager,
Microsoft-OneCore-Payments,
Microsoft-OneCore-PointOfService,
Microsoft-OneCore-Sensors,
Microsoft-OneCore-TroubleShooting,
Microsoft-OneCore-UniversalStore,
Microsoft-OneCore-Update,
Microsoft-OneCore-UpdateAgent,
Microsoft-OneCore-UpdatePolicy,
Microsoft-OneCore-Wallet,
Microsoft-OneCore-WalletService,
Microsoft-OneCore-Wer,
Microsoft-Windows-ContactSupport,
Microsoft-Windows-Cortana,
Microsoft-Windows-Geolocation,
Microsoft-Windows-Help-ClientUA-Enterprise,
Microsoft-Windows-HyperV,
Microsoft-Windows-Internet-Browser-Package,
Microsoft-Windows-InternetExplorer,
Microsoft-Windows-Killbits,
Microsoft-Windows-LanguageFeatures-Handwriting,
Microsoft-Windows-LanguageFeatures-OCR,
Microsoft-Windows-LanguageFeatures-TextToSpeech,
Microsoft-Windows-MRT10,
Microsoft-Windows-MediaPlayer,
Microsoft-Windows-NetworkDiagnostics-DirectAccessEntry,
Microsoft-Windows-OneDrive,
Microsoft-Windows-Printing-XPSServices,
Microsoft-Windows-QuickAssist,
Microsoft-Windows-RemoteAssistance,
Microsoft-Windows-SearchEngine,
Microsoft-Windows-Shell-HomeGroup,
Microsoft-Windows-Skype-ORTC,
Microsoft-Windows-SnippingTool,
Microsoft-Windows-TabletPC,
Microsoft-Windows-TextPrediction,
Microsoft-Windows-WebcamExperience,
Microsoft-Windows-WinOcr,
Microsoft-Windows-WinSATMediaFiles,
Microsoft-Windows-WindowsMediaPlayer-Troubleshooters,
Microsoft-Windows-Xps-Foundation,
Microsoft-Windows-Xps-Foundation-Client,
MultiPoint-Help-Package,
Server-Help-Package.ClientEnterprise,
Windows-Defender,
Microsoft-OneCore-Tethering,
Microsoft-OneCore-Indexer,
Microsoft-OneCore-Multimedia-MFPMP,
Microsoft-OneCore-TileDataRepository,
Microsoft-Windows-Help-ClientUA-Professional,
Microsoft-Windows-Help-ClientUA-Core,
Microsoft-Windows-OfflineFiles,
Microsoft-Windows-SystemRestore,
Microsoft-Windows-AppManagement,
Microsoft-Windows-AppReadiness,
Microsoft-Windows-BusinessScanning,
Microsoft-Windows-PhotoBasicPackage,
Microsoft-Windows-PhotoPremiumPackage,
Microsoft-Windows-Power-CAD-Suite,
Microsoft-Windows-ShellExperienceHost,
Microsoft-Windows-Store-Client
Koniec SPOILERA
REM - FIX  Aktualizacja Narz©dziaX/1
REM - FIX  Narz©dziaX - zmiana opcji z O na S - odblokowanie menu START po u¾yciu trybu PRO /min. usuni©cie Cortany/
REM - FIX  Narz©dziaX - dodanie opcji naprawy menu start narz©dziem M$
REM - FIX  Narz©dzia - Wyˆ¥czenie/Wˆ¥czenie usˆugi Windows Update /dodatkowe wpisy z harmonogramu zadaä!/
REM - FIX  Poprawienie wykrywania system¢w / Windows 10 b©dzie identyfikowany po Windows10/
REM -/7/8.1/10 
REM - DODANO  Usuni©cie usˆugi telemetrycznej nVidia
REM
REM
REM Aktualizacja 19.04.2017 v17
REM -/-/-/10
REM - DODANO - nowe funkcje do blokowania build 15063
REM - FIX  drobne usprawnienia
REM - FIX  odblokowanie menu START po u¾yciu trybu PRO /min. usuni©cie Cortany/
REM - FIX  poprawienie dziaˆania funkcji w menu Narz©dzia-7: (D-d)
REM        Wˆ¥czenie/wyˆ¥czenie automatycznej aktualizacji dla sterownik¢w przez Windows Update
REM
REM
REM Aktualizacja 21.03.2017 v16 - 14393
REM - FIX  Poprawienie wykrywania system¢w / Windows 10 b©dzie identyfikowany po numerze build-u 14393/
REM  
REM
REM Aktualizacja 14.03.2017 v15
REM -/7/-/-
REM - FIX  Usˆuga kopia Zapasowa Systemu Windows - nie b©dzie ju¾ wyˆ¥czana
REM V/7/8.1/10
REM - FIX  Poprawione wykrywanie system¢w
REM - FIX  Usuni©cie blokowania reguˆami FIREWALL na korzy˜† ROUTE 
REM - DODANO  Narz©dzia /7/ Blokowanie ROUTE /O/
REM - DODANO  /tryb ADV/ Nowe usˆugi do wyˆ¥czenia 
REM - DODANO  /tryb ADV/ Narz©dzia /7/ Czyszczenie Dziennik¢w Zdarzeä systemu Windows /Z/
REM - FIX  Porz¥dki i Poprawki w kodzie skryptu: zmniejszenie wielko˜ci skryptu, oraz poprawa szybko˜ci dziaˆania
REM - 
REM -/-/8.1/10
REM -FIX  Poprawione dziaˆanie trybu HIGH /Powershell in CMD/ 
REM -/-/-/10
REM - DODANO  Narz©dzia X / Windows :
REM - DODANO  Usuni©cie wszystkich APPS poza Windows STORE
REM - DODANO  Odinstalowanie OneDrive z systemu
REM - DODANO  Usuni©cie Defendera z systemu /nale¾y wykona† dwukrotnie/w tym jeden raz po restarcie/
REM - DODANO  W trybie PRO / Faza eksperymentalna - u¾ywasz na wˆasne ryzyko!!!/ 
REM - USUWA z komponent¢w Windowsa: przedrostek REM- zapobiega usuni©ciu
DA SPOLER !
REM-Microsoft-OneCore-Update,
REM-Microsoft-OneCore-UpdateAgent,
REM-Microsoft-Windows-CoreSystem-UpdateClient,
Windows-Defender,
Microsoft-Windows-Internet-Browser-Package,
Microsoft-Windows-Cortana,
Microsoft-OneCore-CortanaComponents,
Microsoft-Windows-Geolocation,
Microsoft-Windows-Search2,
Microsoft-Windows-TroubleShooting,
Microsoft-OneCore-TroubleShooting,
Microsoft-Windows-IE-Troubleshooters,
Microsoft-Windows-WindowsMediaPlayer,
Microsoft-Windows-WindowsMediaPlayer-Troubleshooters,
Microsoft-Windows-TextPrediction,
Microsoft-OneCore-DebugCore,
Microsoft-Windows-CoreSystem-DebugTransports,
Microsoft-OneCore-Gaming,
Microsoft-Xbox-GameCallableUI,
Adobe-Flash-For-Windows,
Microsoft-Windows-Media-FlvPropHandler-Package,
Media-FaceAnalysis,
Microsoft-OneCore-Biometrics-FaceRecognition,
Microsoft-OneCore-InkPlatform,
Microsoft-OneCore-Maps,
Microsoft-OneCore-PointOfService,
Microsoft-OneCore-SpeechComponents,
Microsoft-Windows-LanguageFeatures-Speech,
Microsoft-Windows-LanguageFeatures-TextToSpeech,
Microsoft-Windows-MRT10,
Microsoft-Windows-ParentalControls,
Microsoft-Windows-Shell-HomeGroup,
Microsoft-OneCore-Wer,
Microsoft-Windows-Printing-XPSServices,
Microsoft-Windows-Xps-Foundation-Client,
MultiPoint-Help-Package,
Server-Help-Package.ClientEnterprise,
Microsoft-Windows-Help-ClientUA-Enterprise,
Microsoft-OneCore-AllowTelemetry,
Microsoft-Windows-ContactSupport,
Microsoft-Windows-QuickAssist,
Microsoft-Windows-RemoteAssistance-Package,
Microsoft-Windows-Skype-ORTC,
Microsoft-Windows-NetworkDiagnostics-DirectAccessEntry,
Microsoft-Windows-WinSATMediaFiles,
Microsoft-OneCore-Miracast,
Microsoft-OneCore-Multimedia-CastingTransmitter-MiracastView,
Microsoft-Windows-MiracastView-AppX,
Microsoft-Windows-MediaPlayer
Koniec SPOILERA
REM 
REM
REM
REM Aktualizacja 23.01.2017 v14
REM V/7/8.1/10
REM - FIX  Porz¥dki w nazewnictwie tryb¢w CORE, ADV, HIGH, PRO
REM - FIX  Wyˆ¥czanie usˆugi dotyku tylko w przypadku urz¥dzeä bez dotyku
REM - FIX  Poprawki w kodzie skryptu
REM
REM
REM Aktualizacja 11.01.2017 v12
REM - DODANO Przeˆ¥czniki wiersza poleceä
REM          /noupdate     - pomija sprawdzanie czy wersja programu jest aktualna
REM          /norestore    - bez tworzenia punktu przywracania
REM          /quickrestore - szybki - asynchronicznie(!) wykonywany do skryptu, punkt przywracania systemu z domy˜ln¥ nazw¥ 
REM                          oraz bie¾¥cym czasem wykonania np: Win7 RemoveSpy_AIO - /quickrestore 2016-12-27_14:03:50
REM          /nocleanmgr   - bez u¾ycia narz©dzia Windows Cleanmgr 
REM          /restart      - automatyczny restart komputera w 10 sekund po zakoäczeniu skryptu
REM          /shutdown     - automatyczne wyˆ¥cznie komputera w 10 sekund po zakoäczeniu skryptu
REM          /core         - wybrano tryb automatyczny CORE
REM          /adv          - wybrano tryb automatyczny ADV
REM          /high         - wybrano tryb automatyczny HIGH
REM          /pro          - wybrano tryb automatyczny PRO
REM   W przypadku u¾ycia dw¢ch tryb¢w pierwszeästwo ma zawsze najni¾szy (CORE)
REM   przykˆad u¾ycia: RemoveSPY_AIOv12.cmd /norestore /nocleanmgr /restart /adv
REM   Skrypt uruchomi si© automatycznie dla danego systemu:
REM   bez punktu przywracania systemu, bez u¾ycia narz©dzia Windows Cleanmgr w trybie ADV i po 10 sekundach wykona restart
REM - FIX Og¢lne porz¥dki w skrypcie
REM V/7/8.1/10
REM - DODANO  Powiadomienie o nowej wersji on-line
REM - DODANO  Wyˆ¥czenie i usuniecie usˆugi diagtrack + usuni©cie zale¾nych kluczy rejestru
REM - FIX  Windows Cleanmgr
REM - HOSTS  Zmiana w blokowaniu reklam Skype
REM - DODANO  usuni©cie zadaä telemetrycznych nVidia z Harmonogramu Zadaä /tryb CORE/
REM -/7/-/-
REM - DODANO  Nowe usˆugi do wyˆ¥czenia
REM -/-/8.1/-
REM - DODANO  Nowe usˆugi do wyˆ¥czenia
REM -/-/-/10
REM - DODANO  Dwie metody wykrywania systemu w przypadku Win 10 gdy jest za mocno modowany
REM - DODANO  Opcja Xbox DVR /wˆ¥cz-wyˆ¥cz/
REM - DODANO  Wyˆ¥czenie ikony OneDrive w oknie panelu nawigacji Eksploratora
REM - Tryb ADV:
REM - DODANO  Wyˆ¥czenie opcji przegl¥darki EDGE /DoNotTrack, Przewidywanie stron i wpisywanej tre˜ci, SmartScreen OFF/
REM - DODANO  Wyˆ¥czenie zdalnych eksperyment¢w na ustawieniach systemu przez M$  /poziom bezczelno˜ci M$ - MAX/
REM - DODANO  Nowe usˆugi do wyˆ¥czenia
REM - DODANO  Nowe zb©dne zadania z Harmonogramu Zadaä do wyˆ¥czenia
REM
REM
REM Aktualizacja 14.11.2016 v11
REM V/7/8.1/10
REM - FIX - Zˆy formaty pliku hosts, porz¥dki w hosts,
REM - FIX - poprawa blokowania reklam w Skype
REM
REM
REM Aktualizacja 10.10.2016 v10
REM V/7/8.1/-
REM - DODANO nowe zadanie do wyˆ¥czenia i usuni©cia w harmonogramie zadaä
REM -/-/-/10
REM - FIX nowe zadania w harmonogramie do wyˆ¥czenia w trybie PODSTAWOWYM /ZAAWANSOWANYM
REM - FIX nowe usˆugi do wyˆ¥czenia
REM - FIX opcja odroczenia upgrade i aktualizacji w Windows Update
REM V/7/8.1/10
REM - DODANO oczyszczenie dysku za pomoc¥ narz©dzia Windows Cleanmgr w dw¢ch trybach: Podstawowym i Zaawansowanym 
REM - 		Cleanmgr Podstawowy od Zaawansowanego r¢¾ni si© tylko tym 
REM -       ¾e Zaawansowany usuwa pliki Upgrade-u ,odrzucone pliki Upgrade-u oraz Poprzednie instalacje systemu Windows
REM - FIX Automatyczne wywoˆanie kontroli konta u¾ytkownika - je¾eli wˆ¥czona (brak potrzeby uruchamiania jako administrator)
REM - FIX nowe adresy IP ROUTE / FIREWALL    							
REM - FIX polskie znaki w pliku logu, dokˆadniejsze logowanie, oraz zmiana formatu logu                             
REM - FIX Przywracanie Systemu: automatyczne wykrywanie systemu - zniesienie ograniczenia w ilo˜ci tworzonych punkt¢w Przywracania dla Win8.1 i Win10	
REM                             automatyczna nazwa punktu przywracania, obsˆuga przycisku Anuluj , zgranie .cmd z .VBS                  
REM
REM
REM Aktualizacja 06.05.2016 v9
REM Win10 FIX- Centrum powiadomieä(nieprawidˆowy wygl¥d po u¾yciu Trybu Diagnostycznego)
REM
REM
REM Aktualizacja 06.05.2016 v9
REM V/7/8.1/10
REM - DODANO 7. Narz©dzia / 7 - odblokuj FIREWALL+ROUTE (w przypadku problem¢w np. z aktywacj¥ Office etc)
REM - FIX optymalizacja kodu(sekcja FIREWALL+ROUTE), changelog w skrypcie
REM - FIX Znowu Skype - usuni©ty jeden potencjalny wpis w hosts(blokowanie funkcjonalno˜ci Skype)
REM
REM
REM Aktualizacja 29.03.2016 v8
REM V/7/8.1/10
REM - DODANO nowe zadania do wyˆ¥czenia w harmonogramie zadaä
REM - FIX Uporz¥dkowanie i dodanie nowych adres¢w do blokowania HOST+ROUTE
REM Win10
REM - DODANO nowa funkcja w menu narz©dzia /7 - A/ po u¾yciu trybu Zaawansowanego
REM   odblokuj Auto-rotacj© w trybie TABLET
REM - FIX kosmetyka, kosmetyka, kosmetyka
REM - FIX Win10 nie dziaˆaˆa Auto-rotacja ekranu w trybie TABLET
REM  
REM 
REM Aktualizacja 02.12.2015 v7
REM V/7/8.1/10
REM - FIX - Z list wpisywanych do pliku hosts wykasowane dwa blokowane adresy mog¥ce by† przyczyn¥ ¾¢ˆtego wykrzyknika na ikonie poˆ¥czenia sieciowego.
REM Win10
REM - DODANO - Nowe funkcje po u¾yciu trybu Zaawansowanego.
REM   odblokuj Bing
REM   odblokuj Sklep Windows
REM - DODANO - Nowe funkcje Windows Update (Win10)
REM   od/blokowanie nowych kompilacji,
REM   od/blokowanie automatycznej aktualizacji APPS,
REM   od/blokowanie automatycznego pobierania sterownik¢w,
REM   od/blokowanie rozszerzonego WU.
REM   Dodatkowo skrypt pokazuje informacj© o stanie danej funkcji(powy¾sze) aktywna jest zaznaczona gwiazdk¥ :).
REM - DODANO - Nowe zadania do wyˆ¥czenia w harmonogramie zadaä.
REM - SKRYPT - Rozbudowanie log¢w skryptu(bardzo pomocne w razie bˆ©d¢w).
REM - FIX - nie dziaˆaˆ Tryb DIAGNOSTYCZNY / Win81 /
REM  
REM 
REM Aktualizacja 12.11.2015 v6
REM - SKRYPT - Poprawki bˆ©du w skrypcie dla Win10 tryb High + poprawka tworzenia czystego pliku hosts Vista, Win7
REM  
REM Aktualizacja 10.11.2015  v5
REM - DODANO - Nowe narz©dzia (plik hosts, log),
REM - DODANO - Tryb usuwaj¥cy APPS / Win8.1 /,
REM - FIX - Poprawione i ujednolicone opisy poszczeg¢lnych funkcji oraz pomocy,
REM - SKRYPT - Nowe narz©dzia / skryptu , Xbox /.
REM - SKRYPT - Optymalizacja kodu - przej˜cie pomi©dzy poszczeg¢lnymi etapami odbywa si© w spos¢b automatyczny.
REM 
REM  
REM Aktualizacja 04.11.2015 v4
REM - DODANO - zestaw narz©dzi dla pliku hosts / mo¾na go przywr¢ci† do oryginalnej wersji, zrobi† kopi© zapasow¥, edytowa† /
REM - DODANO - Tryb usuwaj¥cy APPS / APPKI / Win 10/
REM - SKRYPT - Kosmetyka wizualna skryptu,
REM - SKRYPT - Optymalizacja kodu,
REM - SKRYPT - A tak¾e jest logowana aktywno˜† skryptu w lokalizacji C:\Windows\Remove_SPY.log (tylko do cel¢w diagnostycznych !)
REM 
REM  
REM Aktualizacja 29.10.2015 v3
REM - DODANO  - Obsˆug© Visty
REM - FIX - Brakuj¥cy SmartScreen / Win8.1 /
REM - SKRYPT - Drobna kosmetyka
REM 
REM  
REM v2?
REM 
REM 
REM Aktualizacja 16.10.2015 v1
REM Novum Panie , novum.

REM Kontakt z autorem:  	skrypt@vip.wp.pl

::::::::::::::::::::::::::::::::::::::::::::::::::::::
:SubExec
@ECHO OFF
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET LogTime=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET LogTime=%LogTime: =0%
@ECHO ON
%*
@ECHO OFF
ECHO %LogTime% %*  EXIT CODE !ERRORLEVEL!>>%AIO_LOG%
ENDLOCAL
EXIT /B 0
::::::::::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::::::::::::::::::::::::::::::::::::
:SubExecNoDisplay
@ECHO OFF
SETLOCAL ENABLEEXTENSIONS ENABLEDELAYEDEXPANSION
SET LogTime=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET LogTime=%LogTime: =0%
%*
ECHO %LogTime% %*  EXIT CODE !ERRORLEVEL!>>%AIO_LOG%
ENDLOCAL
EXIT /B 0
::::::::::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::::::::::::::::::::::::::::::::::::
:Log
SET LogTime=%date%_%time:~0,2%-%time:~3,2%-%time:~6,2%
SET LogTime=%LogTime: =0%
ECHO %LogTime% %*>>%AIO_LOG%
EXIT /B 0
::::::::::::::::::::::::::::::::::::::::::::::::::::::

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:RequestAdminElevation FilePath %* || goto:eof
:: 
:: By:   Cyberponk,     
::          v1.5 - 10/06/2016 - Changed the admin rights test method from cacls to fltmc
::          v1.4 - 17/05/2016 - Added instructions for arguments with ! char
::          v1.3 - 01/08/2015 - Fixed not returning to original folder after elevation successful
::          v1.2 - 30/07/2015 - Added error message when running from mapped drive
::          v1.1 - 01/06/2015
:: 
:: Func: opens an admin elevation prompt. If elevated, runs everything after the function call, with elevated rights.
:: Returns: -1 if elevation was requested
::           0 if elevation was successful
::           1 if an error occured
:: 
:: USAGE:
:: If function is copied to a batch file:
::     call :RequestAdminElevation "%~dpf0" %* || goto:eof
::
:: If called as an external library (from a separate batch file):
::     set "_DeleteOnExit=0" on Options
::     (call :RequestAdminElevation "%~dpf0" %* || goto:eof) && CD /D %CD%
::
:: If called from inside another CALL, you must set "_ThisFile=%~dpf0" at the beginning of the file
::     call :RequestAdminElevation "%_ThisFile%" %* || goto:eof
::
:: If you need to use the ! char in the arguments, the calling must be done like this, and afterwards you must use %args% to get the correct arguments:
::      set "args=%* "
::      call :RequestAdminElevation .....   use one of the above but replace the %* with %args:!={a)%
::      set "args=%args:{a)=!%" 
::  http://stackoverflow.com/questions/1894967/how-to-request-administrator-access-inside-a-batch-file
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
@ECHO OFF
cls
setlocal ENABLEDELAYEDEXPANSION & set "_FilePath=%~1"
  if NOT EXIST "!_FilePath!" (echo/Read RequestAdminElevation usage information)
  :: UAC.ShellExecute only works with 8.3 filename, so use %~s1
  set "_FN=_%~ns1" & echo/%TEMP%| findstr /C:"(" >nul && (echo/ERROR: %%TEMP%% path can not contain parenthesis &pause &endlocal &fc;: 2>nul & goto:eof)
  :: Remove parenthesis from the temp filename
  set _FN=%_FN:(=%
  set _vbspath="%temp:~%\%_FN:)=%.vbs" & set "_batpath=%temp:~%\%_FN:)=%.bat"

  :: Test if we gave admin rights
  fltmc >nul 2>&1 || goto :_getElevation

  :: Elevation successful
  (if exist %_vbspath% ( del %_vbspath% )) & (if exist %_batpath% ( del %_batpath% )) 
  :: Set ERRORLEVEL 0, set original folder and exit
  endlocal & CD /D "%~dp1" & ver >nul & goto:eof

  :_getElevation
  cls
  @ECHO OFF
  echo/... Uzyskiwanie uprawnieä administracyjnych
  :: Try to create %_vbspath% file. If failed, exit with ERRORLEVEL 1
  echo/Set UAC = CreateObject^("Shell.Application"^) > %_vbspath% || (echo/&echo/Unable to create %_vbspath% & endlocal &md; 2>nul &goto:eof) 
  echo/UAC.ShellExecute "%_batpath%", "", "", "runas", 1 >> %_vbspath% & echo/wscript.Quit(1)>> %_vbspath%
  :: Try to create %_batpath% file. If failed, exit with ERRORLEVEL 1
  echo/@%* > "%_batpath%" || (echo/&echo/Unable to create %_batpath% & endlocal &md; 2>nul &goto:eof)
  echo/@if %%errorlevel%%==9009 (echo/^&echo/Admin user could not read the batch file. If running from a mapped drive or UNC path, check if Admin user can read it.)^&echo/^& @if %%errorlevel%% NEQ 0 pause >> "%_batpath%"

  :: Run %_vbspath%, that calls %_batpath%, that calls the original file
  %_vbspath% && (echo/&echo/Failed to run VBscript %_vbspath% &endlocal &md; 2>nul & goto:eof)

  :: Vbscript has been run, exit with ERRORLEVEL -1
  echo/&echo/Elevation was requested on a new CMD window &endlocal &fc;: 2>nul & goto:eof
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
close fullscreen
Login or Register to edit or fork this paste. It's free.