MDGx MAX Speed WinDOwS
MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10

Win10 Privacy Reddit Google+ Google+ Google+

    10_BLOCK  MDGx Win10 Block Tools (10_BLOCK) [43.38 KB, ZIPped archive, free, unsupported].
    Brief Guide must view 1st!
    10_BLOCK.ZIP files in plain text (ASCII) format:List of files inside 10_BLOCK.ZIP archive.
    Complete list of files in 10_BLOCK directory.
    MDGx Win10 Block Tools (10_BLOCK) are also part of W95-11D.EXE + W95-11D.ZIP.
    More info.
    More tools.
    Comparison of Windows 10 Privacy tools.
    Windows 10 looks like this.
Contents: TXT | CMD

10_BLOCK.TXT = ReadMe Text (TXT) Guide must view 1st!


 MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10 


THE GIST
********

* MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10 stop
automatic (forced!) upgrade to Windows 10 > 1-1-2016 [uninstall "Get Windows
10" (GWX) update] and disable all spyware: telemetry ("phone home"), data
collection/logging, customer experience + unwanted "offers", eliminating
Microsoft annoyances and restoring online privacy [120 KB, ZIPped archive,
free, unsupported]:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
Brief Guide:
http://www.mdgx.com/xptoy.htm#10BLK
This ReadMe TXT Guide => must view 1st!
http://www.mdgx.com/10BLK/10_BLOCK.php
ZIP archive contents:
* 10_BLOCK.HTM (HTML ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.php
* 10_BLOCK.TXT (Text ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.TXT
* 10_BLOCK.CMD (Windows Command Script):
http://www.mdgx.com/10BLK/10_BLOCK.CMD
View as plain text:
http://www.mdgx.com/10BLK/10_BLOCK.CMD.TXT
* E10BLOK.CMD (Windows Command Script) executed by 10_BLOCK.CMD (see above):
http://www.mdgx.com/10BLK/E10BLOK.CMD
View as plain text:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
* ELEVATE.EXE (EXEcutable) Elevate 32-bit command line tool which runs E10BLOK.CMD as Administrator in 32-bit (x86) Windows:
http://code.kliu.org/misc/elevate/
* ELEVAT64.EXE (EXEcutable) Elevate 64-bit command line tool which runs E10BLOK.CMD as Administrator in 64-bit (x64) Windows:
http://code.kliu.org/misc/elevate/
* ELEVATE.TXT (ReadMe 1st Text Guide) for ELEVATE.EXE + ELEVAT64.EXE (all included in 10_BLOCK.ZIP):
http://www.mdgx.com/10BLK/ELEVATE.TXT
* Stop DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STOP!DNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
* Start DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STARTDNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
List of files inside archive 10_BLOCK.ZIP:
http://www.mdgx.com/10BLK/10_list.php
Complete list of files in 10_BLOCK directory:
http://www.mdgx.com/10BLK/list.php
MDGx Win10 Block Tools (10_BLOCK) (ZIP Archive File):
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
are also part of W95-11D.EXE + W95-11D.ZIP:
http://www.mdgx.com/95.htm
More info:
http://www.privacytools.io/#win10
More tools:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png

USAGE => STEP-BY-STEP
*********************

1. Extract all files from 10_BLOCK.ZIP into the same folder/directory:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
[Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:]
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> Downloads folder (default location) -> right-click 10_BLOCK.CMD -> Run as Administrator -> restart Windows.
3. Done. ;-/

LINKS:
* Reddit [must be logged in = Reddit membership is free]:
http://www.reddit.com/r/windows/comments/3v2f45/
http://redd.it/3v2f45/
* Google+:
http://plus.google.com/+MDGx7/posts/D9mMWXFNyiG/
http://plus.google.com/112611477121626777410/posts/6vrWpSJwrV6/
http://plus.google.com/110290139810626577855/posts/PK7fbc6CMy1/

UPDATES
*******

* Added ELEVAT64.EXE + ELEVATE.EXE [Elevate 64-bit + 32-bit EXEcutables] +
ELEVATE.TXT [Elevate TXT Guide] to run 10_BLOCK.CMD, which in turn runs
E10BLOK.CMD with elevated Administrator privileges, even if logged on user has
reduced rights (below Administrator level), to ensure all fixes work properly.
See ELEVATE.TXT (included) for details:
http://www.mdgx.com/10BLK/ELEVATE.TXT



Similar Windows 7/8/8.1/10 Anti-Spyware/Privacy Tools
*****************************************************
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Comparison of Windows 10 Privacy tools:
http://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/

MANDATORY:
Must run/execute/open all these apps/programs/installers (EXE)/scripts (BAT,
CMD, REG, VBS) with the Explorer/shortcut right-click "Run as Administrator"
option!

* I Don't Want Windows 10 (free, open source):
Guide:
http://www.msfn.org/board/topic/173961-windows-10-gwx-update-removal-tool-for-windows-7-and-windows-81/
Program:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/
ReadMe:
http://github.com/rn10950/I-Dont-Want-Windows-10/
File:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/download/4.0/I_Dont_Want_Windows_10_v4.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "I Don't Want Windows 10.exe" (Application) -> Run as Administrator.

* DisableWinTracking (free, open source):
Guide:
http://www.privacytools.io/#win10
Program:
http://github.com/10se1ucgo/DisableWinTracking/
ReadMe:
http://github.com/10se1ucgo/DisableWinTracking/releases/
File:
http://github.com/10se1ucgo/DisableWinTracking/releases/download/v2.5.1/disablewintracking.exe
Usage:
Open Explorer -> right-click "disablewintracking.exe" (Application) -> Run as Administrator -> check "Privacy" -> press Go.

* Destroy Windows Spying (DWS) (free, open source):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/
File:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/download/1.6.722/DWS_Lite.exe
Usage:
Open Explorer -> right-click "DWS_Lite.exe" (Application) -> Run as Administrator.

* O&O ShutUp10 (freeware):
Guide:
http://www.dottech.org/185920/
Program:
http://www.oo-software.com/shutup10/
File:
http://dl5.oo-software.com/files/ooshutup10/OOSU10.exe
Usage:
Open Explorer -> right-click "OOSU10.exe" (Application) -> Run as Administrator.

* Win10 Spy Disabler (freeware):
Guide:
http://www.site2unblock.com/win10-spy-disabler/
Program:
http://www.site2unblock.com/win10-spy-disabler/
File:
http://www.site2unblock.com/download/win10-spy-disabler-portable.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win10 Spy Disabler" shortcut inside installed folder -> Run as Administrator -> select options.

* Windows Privacy Tweaker (freeware):
Guide:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
Program:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
File:
http://www.phrozensoft.com/uploads/2016/01/WindowsPrivacyTweakerV2.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Windows Privacy Tweaker.exe" (Application) -> Run as Administrator.

* W10Privacy (freeware + donationware):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://www.winprivacy.de/english-home/
File:
http://www.winprivacy.de/app/download/12302828636/W10Privacy.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "W10Privacy.exe" (Application) -> Run as Administrator.

* Win.Privacy Beta (freeware):
Guide:
http://windotprivacy.co.nf/
Program:
http://windotprivacy.co.nf/
File:
http://www.majorgeeks.com/files/details/win_privacy.html
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win.Privacy.exe" (Application) -> Run as Administrator.

* WinPurify (freeware):
Guide:
http://www.majorgeeks.com/files/details/winpurify.html
Program:
http://www.winpurify.xyz/
File:
http://www.winpurify.xyz/WinPurify.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WinPurify.exe" (Application) -> Run as Administrator.

* Spybot Anti-Beacon for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/spybot_anti_beacon_for_windows_10.html
Program:
http://forums.spybot.info/showthread.php?72686
ReadMe:
http://forums.spybot.info/downloads.php?id=58
File:
http://download.spybot.info/AntiBeacon/StandAlone/SDAntiBeacon-1.5.exe
Usage:
Open Explorer -> right-click "SDAntiBeacon-1.5.exe" (Application) -> Run as Administrator.

* Ashampoo AntiSpy for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/ashampoo_antispy_for_windows_10.html
Program:
http://www.ashampoo.com/en/usd/pin/1004/security-software/Antispy-for-Windows-10/
ReadMe:
http://www.ashampoo.com/en/usd/pde/1004/security-software/Antispy-for-Windows-10/
File:
http://cdn1.ashampoo.net/public/ashf/1004/Ashampoo_AntiSpy.exe
Usage:
Open Explorer -> right-click "Ashampoo_AntiSpy.exe" (Application) -> Run as Administrator.

* Win10 SpyStop (freeware):
Guide:
http://www.majorgeeks.com/files/details/win10_spystop.html
Program:
http://www.evorim.com/en/
File:
http://www.evorim.com/win10spystop/win10spystop-x32-setup.exe
Usage:
Open Explorer -> right-click "win10spystop-x32-setup.exe" (Application) -> Run as Administrator.

* DoNotSpy10 (freeware: adware! + donationware):
Guide:
http://www.bleepingcomputer.com/forums/t/586731/
Program:
http://www.pxc-coding.com/portfolio/donotspy10/
ReadMe:
http://www.pxc-coding.com/portfolio/donotspy10/
File:
http://www.pxc-coding.com/downloads/donotspy10/DoNotSpy10-1.1.0.0-Setup.exe
Usage:
1. Open Explorer -> right-click "DoNotSpy10-1.1.0.0-Setup.exe" (Application) -> Run as Administrator.
2. Open Explorer -> right-click "DoNotSpy10" shortcut inside installed folder -> Run as Administrator -> select options.

* Never10 (freeware):
Guide:
http://www.grc.com/never10/details.htm
Program:
http://www.grc.com/never10.htm
ReadMe:
http://www.grc.com/never10.htm
File:
http://www.grc.com/files/never10.exe
Usage:
Open Explorer -> right-click "never10.exe" (Application) -> Run as Administrator.

* Windows 10 Rollback Utility (freeware):
Guide:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Program:
http://www.neosmart.net/Win10Rollback/
ReadMe:
http://www.neosmart.net/Win10Rollback/
File:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Usage:
1. Burn "Windows 10 Rollback Utility.iso" (ISO File) on blank/empty CD-R/DVD-R/BD-R/USB media.
2. Reboot from CD-R/DVD-R/BD-R/USB.
3. Follow instructions to revert (roll) back to previous Windows 7/8/8.1 OS (if any).

* Aegis CMD script (free, open source):
Guide:
http://www.ghacks.net/2016/01/26/block-all-windows-10-components-on-windows-7-and-8/
Program:
http://www.voat.co/v/technology/comments/459263/
ReadMe:
http://github.com/th3power/aegis-voat/
File:
http://github.com/th3power/aegis-voat/archive/v1.10.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "aegis.cmd" (Windows Command Script) -> Run as Administrator.

* GWX Control Panel (freeware):
Guide:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
Program:
http://www.ultimateoutsider.com/downloads/
ReadMe:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
File:
http://www.ultimateoutsider.com/downloads/GwxControlPanelSetup.exe
Usage:
1. Open Explorer -> right-click "GwxControlPanelSetup.exe" (Application) -> Run as Administrator.
2. Open Explorer -> right-click "GWX Control Panel" shortcut inside installed folder -> Run as Administrator -> select options.

* 10AppsManager (freeware):
Guide:
http://www.majorgeeks.com/files/details/10appsmanager.html
Program:
http://www.thewindowsclub.com/10appsmanager-windows-10/
ReadMe:
http://www.thewindowsclub.com/10appsmanager-windows-10/
File:
http://www.thewindowsclub.com/downloading-10appsmanager/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "10AppsManager.exe" (Application) -> Run as Administrator.

* Windows X App Remover (free, open source):
Guide:
http://sourceforge.net/projects/windows8appremover/
Program:
http://mademan.bplaced.net/page/winxar.html
ReadMe:
http://winxappremover.codeplex.com/
File:
http://www.f-tools.eu/downloads/counter/winxar.php
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WindowsXAppRemover.exe" (Application) -> Run as Administrator.

* Uninstall Cortana from Windows 10 CMD script (freeware):
Guide:
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
Program:
http://www.winaero.com/download.php?view.1832
File:
http://www.winaero.com/request.php?1832
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Uninstall Cortana.cmd" (Windows Command Script) -> Run as Administrator.

* Edge Blocker (freeware):
Guide:
http://www.sordum.org/9312/
Program:
http://www.sordum.org/9312/
File:
http://www.sordum.org/files/small-tools/EdgeBlock.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "EdgeBlock.exe" (Application) -> Run as Administrator.

* Debloat Windows 10 (free, open source):
Guide:
http://github.com/W4RH4WK/Debloat-Windows-10
Program:
http://github.com/W4RH4WK/Debloat-Windows-10
File:
http://github.com/W4RH4WK/Debloat-Windows-10/archive/master.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Follow instructions in README.md -> enable execution of PowerShell scripts ->
run PowerShell as Administrator -> run all included scripts -> restart computer.

* Blackbird 32-bit + 64-bit (freeware):
Guide:
http://www.getblackbird.net/documentation/
Program:
http://www.getblackbird.net/
File:
http://www.getblackbird.net/download/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "blackbird.exe" (Application) -> Run as Administrator.



Disable/Renable User Account Control (UAC)
******************************************

Windows Vista/2008/7/8/8.1/2012/10 users: right-click each file in
Windows/File Explorer -> select "Run as Administrator" (temporary fix) or
disable User Account Control (UAC) (permanent fix) in:
- Windows 10:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/2008 R2:
http://www.petri.co.il/disable-uac-in-windows-7.htm
- Windows Vista/2008:
http://www.petri.co.il/disable_uac_in_windows_vista.htm

Free(ware) tools to disable/reenable UAC:
- UAC Pass:
http://sites.google.com/site/freeavvarea/UACPass-en/
- UAC Tweak:
http://www.askvg.com/uac-tweak-a-small-cute-utility-to-tweak-uac-user-account-control-in-windows-vista/
- TweakUAC:
http://www.majorgeeks.com/files/details/tweakuac.html
- Disable UAC:
http://www.disableuac.com/
FYI:
Customized File Manager (FM) installer FMNT32.EXE (free):
http://www.mdgx.com/xptoy.htm#FMNT
also installs "Disable User Account Control (UAC)" + "Enable User Account
Control (UAC)" items to Desktop right-click shell context menu. For details
open TAKEOWN.INF + TAKEOWN.REG (both in C:\FileMan) using Notepad or better
Notepad replacement [free(ware)]:
http://www.mdgx.com/toy.htm#TXT



Restore Windows 7 SP1/8/8.1
***************************

STRONGLY RECOMMENDED:
Windows 10 users: 30 days after Windows 10 was installed (by force, behind
your back!) on your computer(s)/laptop(s)/device(s) you still have the option
to restore/reinstall your previous operating system (OS): Windows 7 SP1, 8 or
8.1:
Microsoft Windows:
http://windows.microsoft.com/en-us/windows-10/going-back-to-windows-7-or-windows-81/
How-To Geek:
http://www.howtogeek.com/220723/
PC Advisor:
http://www.pcadvisor.co.uk/how-to/windows/how-downgrade-windows-10-to-windows-7-8-easy-3615606/



Windows 10 = Spyware + Privacy Nightmare
****************************************

Don't use Windows 10 - It's a privacy nightmare:
http://www.privacytools.io/#win10
What Windows 10's "Privacy Nightmare" Settings Actually Do:
http://www.lifehacker.com/1722267229/
Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings:
http://www.thehackernews.com/2016/02/microsoft-windows10-privacy.html
Even when told not to, Windows 10 just can't stop talking to Microsoft:
http://www.arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/
From the horse's mouth: Microsoft Windows 10 License Terms:
http://www.microsoft.com/en-us/useterms/retail/windows/10/useterms_retail_windows_10_english.htm
Windows 10 doesn't offer much privacy by default: Here's how to fix it:
http://www.arstechnica.com/information-technology/2015/08/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it/
Microsoft may be collecting more data than initially thought:
http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/
Windows 10 privacy issues you should know about:
http://www.thenextweb.com/microsoft/2015/07/29/wind-nos/
How to disable data logging in W10:
http://www.reddit.com/r/Windows10/comments/3f38ed/
Windows 10 Privacy Settings:
http://www.tweakhound.com/2015/11/19/windows-10-privacy-settings-2/
Microsoft warning: 'Use Windows 7 at Your Own Risk', seriously?:
http://www.thehackernews.com/2016/01/microsoft-windows-7.html
Microsoft's Windows 10 is a privacy nightmare. Here's how to protect yourself:
http://www.slate.com/articles/technology/bitwise/2015/08/windows_10_privacy_problems_here_s_how_bad_they_are_and_how_to_plug_them.html
Windows 10 is spying on almost everything you do -- here's how to opt out:
http://www.bgr.com/2015/07/31/windows-10-upgrade-spying-how-to-opt-out/
Windows 10 automatically spies on your children and sends you a dossier of their activity:
http://www.boingboing.net/2015/08/10/windows-10.html
Microsoft's Windows 10 has permission to watch your every move:
http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html
Is Windows 10 really a privacy nightmare?
http://money.cnn.com/2015/08/17/technology/windows-10-privacy/
Windows 10 comes with built-in spyware; if your work requires confidentiality DO NOT INSTALL:
http://www.dailykos.com/story/2015/8/2/1408113/-Windows-10-comes-with-built-in-spyware-If-your-work-requires-confidentiality-DO-NOT-INSTALL/
How Bad Is Microsoft's Data Land-Grab?
http://www.slate.com/articles/technology/bitwise/2016/01/microsoft_holds_a_copy_of_windows_10_users_drive_encryption_keys_how_scary.html
Updategate: Microsoft is about to make it even harder to opt out of Windows 10:
http://www.theinquirer.net/inquirer/news/2430786/updategate-microsoft-is-now-installing-windows-10-by-default-in-windows-update/
Microsoft upgraded users to Windows 10 without their OK:
http://www.infoworld.com/article/3043526/
10 reasons you shouldn't upgrade to Windows 10:
http://www.infoworld.com/article/2972298/
Microsoft Starts Collecting User Data from Windows 7 and Windows 8 PCs:
http://news.softpedia.com/news/microsoft-starts-collecting-user-data-from-windows-7-and-windows-8-pcs-490302.shtml
Changes in Computing: Super Silos and Garbage Heap Dogs [Why is Windows 10 different?]:
http://www.jsware.net/jsware/comp2012plus.php5
TWiT Netcast Network: Microsoft CMO on Windows 10's Pushy Update:
http://www.youtube.com/watch?v=R-j3ZSa33Fw
Microsoft Blog: Windows 10 for Enterprise: More secure and up to date:
http://blogs.windows.com/business/2015/01/30/windows-10-for-enterprise-more-secure-and-up-to-date/
Microsoft Blog: Our continuing commitment to your privacy with Windows 10:
http://blogs.windows.com/windowsexperience/2017/01/10/continuing-commitment-privacy-windows-10/
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png



Block Windows 10 Upgrade
************************

Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016 step-by-step Guides:
[H]ardForum: Can't stop Windows 10 upgrade:
http://www.hardforum.com/showthread.php?t=1871988
MSFN Forums: Disable Data Collection in Windows 10:
http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/
How-to Geek: How to Stop Windows 7/8 from Downloading Windows 10 Automatically:
http://www.howtogeek.com/228551/
addictivetips: What Is $WINDOWS.~BT Folder On My Hard Drive?:
http://www.addictivetips.com/windows-tips/what-is-the-windows-bt-folder-on-my-hard-drive/
MSKB: Manage Windows 10 Notification + Upgrade options [DisableOSUpgrade]:
http://support.microsoft.com/kb/3080351
WinAero: Disable Windows 8.1 store upgrade offer prompt:
http://www.winaero.com/blog/disable-windows-8-1-store-upgrade-offer-prompt/
SuperUser: Disable Get Windows 10 icon in notification area (tray)?:
http://www.superuser.com/questions/922068/
ServerFault: Block specific Windows update hotfix:
http://www.serverfault.com/questions/145843/
Disable KB3035583 "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
http://support.microsoft.com/kb/3080351
Block Windows: Block Windows Spying:
http://blockwindows.wordpress.com/
GitHub: BlockWindows:
http://github.com/WindowsLies/BlockWindows/
MS Forums: Stop Windows 10 upgrade notification in Windows 7:
http://answers.microsoft.com/en-us/windows/forum/windows_10-win_upgrade/stop-windows-10-upgrade-notification-on-windows-7/adda31a7-ebbe-44b7-bcb4-f3da1563688c/
InfoWorld: How to clean Windows 10 crapware off your Windows 7 or 8.1 PC:
http://www.infoworld.com/article/2983777/
Windows 10 tools to block automatic updates:
http://www.ghacks.net/2015/12/18/two-windows-10-tools-to-block-automatic-updates/
Uninstall and Block Updates and Drivers in Windows 10:
http://www.howtogeek.com/223864/
Temporarily prevent Windows or driver update from reinstalling in Windows 10:
http://support.microsoft.com/kb/3073930
File:
http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Win Updates Disabler (freeware):
http://www.site2unblock.com/win-updates-disabler/
File:
http://www.site2unblock.com/download/win-updates-disabler-setup.exe
Portable:
http://www.site2unblock.com/download/win-updates-disabler-portable.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Uninstall Windows 10 Upgrade
****************************

Uninstall KB3035583 "Get Windows 10" (GWX) Update Guide:
http://www.winsupersite.com/windows-10/how-stop-windows-10-upgrade-downloading-your-system
Uninstall KB3035583 and Hide from Windows Updates in BAT file:
http://www.reddit.com/r/windows/comments/38ivhp/
MSKB: Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/kb/3035583
MSKB: Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/kb/3068708
MSKB: Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/kb/3075249
MSKB: Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/kb/3080149
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT

Remove Windows 10 Upgrade updates from Windows 7/8/8.1:
http://www.ghacks.net/2015/04/17/how-to-remove-windows-10-upgrade-updates-in-windows-7-and-8/
http://support.4it.com.au/article/disable-get-windows-10-notifications-from-the-command-prompt/
Prevent Windows 10 Upgrade from Installing:
http://www.winsupersite.com/windows-10/prevent-windows-10-upgrade-installing-after-making-your-reservation
Block Specific Updates in Windows Update:
http://www.ghacks.net/2010/08/11/how-to-block-specific-updates-in-windows-update/
Remove Windows 10 GWX Upgrade nonsense:
http://www.dedoimedo.com/computers/windows-7-to-10-gwx-how-to-remove.html
Block specific Windows update hotfix:
http://www.serverfault.com/a/341318/



Block Windows 8/8.1/10 Spyware
******************************

Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers"...
Windows 10: Privacy and data collection:
http://en.wikipedia.org/wiki/Windows_10#Privacy_and_data_collection
Windows 10: Removed features:
http://en.wikipedia.org/wiki/Windows_10#Removed_features
Windows 10 Enterprise - Mother of all tweak scripts:
http://www.reboot.pro/topic/20623-windows-10-enterprise-mother-of-all-tweak-scripts/
Windows 10: stop the home calling function:
http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/
Guide: Disable Data Collection in Windows 10:
http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/
Disable Telemetry and Data Collection in Windows 10:
http://www.winaero.com/blog/how-to-disable-telemetry-and-data-collection-in-windows-10/
Fix Windows 10 privacy:
http://fix10.isleaked.com/
Fix Windows 7/8.1 spyware:
http://fix10.isleaked.com/oldwindows.html
MSKB: How to manage Windows 10 notification and upgrade options:
http://support.microsoft.com/kb/3080351
MS Blogs: How to Remove, Block and Prevent "Get Windows 10" Application for Enterprise Environments:
http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx
MS TechNet: Manage connections from Windows operating system components to Microsoft services:
http://technet.microsoft.com/library/mt577208.aspx
Windows 10: which services to disable?
http://www.wilderssecurity.com/threads/378804
Windows 10 Tweaks:
http://www.pastebin.com/m26z309a
Remove Bloat from Windows 10:
http://www.hwinfo.com/misc/RemoveW10Bloat.htm
Disable Diagnostics Tracking (DiagTrack) service:
http://www.ghacks.net/2015/05/12/how-to-disable-the-diagnostics-tracking-service-in-windows/
Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service:
http://www.hwinfo.com/misc/RemoveW10Bloat.htm
Disable WAP Push Message Routing (DmWAPPush) service:
http://www.ghacks.net/2015/11/28/windows-10-new-services-list/
Disable Retail Demo (RetailDemo) service:
http://www.tenforums.com/windows-10-news/8079-windows-10-has-secret-retail-demo-mode-new-app-video-loop.html
Disable Windows Event Collector (WECSvc) service:
http://www.computerstepbystep.com/windows_event_collector_service.html
Disable Remote Registry (RemoteRegistry) service:
http://www.techrepublic.com/article/solutionbase-disabling-windows-xps-remote-registry-service/
Disable Telemetry and Data Collection in Windows 7/8/8.1:
http://www.askvg.com/tip-disable-telemetry-and-data-collection-on-windows-7-and-8/
Stop Windows 10 spying by using Windows Firewall:
http://www.winaero.com/blog/stop-windows-10-spying-on-you-using-just-windows-firewall/
TweakHound Windows 10 Tweaks:
http://www.tweakhound.com/2015/08/10/my-windows-10-tweaks/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Uninstall Windows 8/8.1/10 Spyware
**********************************

Uninstall spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
KB3022345, KB3068708, KB3075249 + KB3080149:
MSKB: Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/kb/3022345
MSKB: Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/kb/3035583
MSKB: Update for customer experience and diagnostic telemetry:
MSKB: Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/kb/3075249
MSKB: Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/kb/3080149
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Windows 10 Blocked Games
************************

Windows 10 Won't Run CD-ROM/DVD-ROM Games Using SafeDisc Or Securom DRM:
http://www.rockpapershotgun.com/2015/08/17/windows-10-safedisc-securom-drm/
http://gadgets.ndtv.com/games/news/windows-10-will-not-run-older-pc-games-with-drm-729304
http://www.pcworld.com/article/2972271/
http://www.ign.com/articles/2015/08/19/windows-10-wont-run-games-with-safedisk-securom-drm
Windows 10 Games Compatibility List:
http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_install/windows-10-games-compatibility-list/a31335a8-730f-4ac9-8c19-7c8c3a664ced



Group Policy Editor
*******************
http://www.mdgx.com/xptoy.htm#GPX

FYI:
Microsoft removed Group Policy Editor (GPE) [respectively GPEdit.DLL +
gpedit.msc] from all Home and Starter Editions of Windows XP/Vista/7/8/8.1/10!
Restore GPE in all Windows NTx [2000/XP/2003/Vista/2008/7/8/8.1/2012/10]
Editions:
Install Group Policy Editor (GPEdit.DLL + gpedit.msc) in Windows 7/8/8.1/10:
http://www.rushinformation.com/windows-find-gpedit-msc-error-windows-78-fixed/
File:
http://orig08.deviantart.net/9bb0/f/2011/180/b/0/add_gpedit_msc_by_jwils876-d3kh6vm.zip
More info:
http://drudger.deviantart.com/art/Add-GPEDIT-msc-215792914/
Corrected GPEdit Installer BATch files:
http://www.itechtics.com/enable-gpedit-windows-10-home/
File:
http://www.itechtics.com/wp-content/uploads/files/x86x64.zip
FIX: GPEDIT.MSC snap-in creation failed/failed to initialize:
http://www.rushinformation.com/gpedit-msc-snap-in-creation-failed-initialize-error/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open this ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "setup.exe" (Application) -> Run as Administrator.
3. Start -> select Run... (hold WinKey + press R) -> type gpedit.msc -> OK/Enter -> select Policy to change.
WinKey:
http://www.mdgx.com/lastweek.htm#WINKEY



DNS Cache
*********
http://www.mdgx.com/hosts.php#N2

OPTIONAL:
DNS Client Service caches Domain Name System names (DNS Cache)
which slows down processing of large HOSTS with many IPs:
Disable Client-Side DNS Caching in Windows XP/2003:
http://support.microsoft.com/kb/318803
Flush Windows DNS Cache:
http://www.thewindowsclub.com/flush-windows-dns-cache
Stop/Start DNS Client service:
http://www.computerstepbystep.com/dns_client_service.html
MDGx HOSTS Guide: DNS Client Service:
http://www.mdgx.com/hosts.php#N2
Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP



Windows Update
**************

OPTIONAL:
Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
http://www.pctools.com/guides/registry/detail/1176/
MS TechNet: Configure Automatic Updates [AutoInstallMinorUpdates]:
http://technet.microsoft.com/library/cc708449.aspx
MS TechNet: Automatic Updates Settings [NoAutoRebootWithLoggedOnUsers]:
http://technet.microsoft.com/library/dd939923.aspx
MS TechNet: Automatic Updates using Registry Editor [NoWindowsUpdate]:
http://technet.microsoft.com/library/dd939844.aspx
Windows Update Client (WUC) + Windows Update Agent (WUA):
http://www.mdgx.com/xptoy.htm#WUC
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Web Browsers: IE, Chrome + Firefox Privacy
******************************************

Web browsers Online Privacy Opt Out (uses cookies!):

* Internet Explorer (IE) 11/newer:
1. Go to:
http://choice.microsoft.com/opt-out
2. Turn OFF all ads:
- Personalized ads in this browser.
- Personalized ads wherever I use my Microsoft account.
3. Go to:
http://www.aboutads.info/choices/
4. UNcheck all boxes:
- All Participating Companies.
- Companies Customizing Ads For Your Browser.
Internet Explorer (IE) 9/10/11/newer Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade:
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/kb/2843950
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
Wikipedia: HTTP cookies:
http://en.wikipedia.org/wiki/HTTP_cookie
More info:
http://www.mdgx.com/ietoy.htm#IE11
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
5. Restart your browser.

* Google Chrome/Chromium:
1. Log in to your Google account (if any):
http://accounts.google.com/
2. Go to:
http://plus.google.com/settings/endorsements/
3. UNcheck this box:
Based upon my activity, Google may show my name and profile photo in shared endorsements that appear in ads.
4. Go to:
http://www.google.com/settings/accounthistory/
5. UNcheck all boxes + turn OFF all switches.
6. Restart your browser.

* Mozilla Firefox/Seamonkey:
1. Go to:
http://support.mozilla.org/products/firefox/protect-your-privacy/
2. Follow instructions to disable (opt out of) all ads + tracking.
3. Go to:
http://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/
4. Follow instructions to add/modify/delete desired settings [about:config] in
order to strengthen your Mozilla web browser's security.
5. Restart your browser.



Uninstall Cortana + OneDrive
****************************

OPTIONAL:
Uninstall Cortana from Windows 10 (by using install_wim_tweak.exe):
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
File:
http://www.winaero.com/request.php?1832
Completely disable Cortana in Windows 10:
http://www.superuser.com/questions/949569/
Uninstall/Reinstall Windows 10 Built-in Apps:
http://www.howtogeek.com/224798/how-to-uninstall-windows-10s-built-in-apps-and-how-to-reinstall-them/
Remove default apps from Windows 10:
http://www.reddit.com/r/windows/comments/3f6gsl/
Killing Cortana: Disable Windows 10 info-hungry digital assistant:
http://www.pcworld.com/article/2949759/
Uninstall OneDrive:
http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



HOSTS
*****
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
http://www.mdgx.com/10BLK/10_BLOCK.ZIP

Add these 0.0.0.0 (redirected to null) IPs to your %windir%\SYSTEM32\DRIVERS\ETC\HOSTS file:
http://www.pastebin.com/gebp8edd
Edit HOSTS in Windows 7/8/8.1/10:
http://www.petri.com/easily-edit-hosts-file-windows-10/
http://www.petri.com/edit-hosts-file-windows-8/
http://www.petri.com/edit-hosts-file-windows-7/
MDGx HOSTS Guide + Tools:
http://www.mdgx.com/hosts.php
Take Ownership of files + folders right-click Explorer option:
http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/
MDGx File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:
http://www.mdgx.com/xptoy.htm#FMNT
FM ReadMe Guide:
http://www.mdgx.com/fmnt32/fmnt32.php
FM [2.2 MB, free]:
http://www.mdgx.com/fmnt32/FMNT32.EXE
FixNT6 Take Ownership tool (freeware):
http://www.jsware.net/jsware/nt6fix.php5#restfix
FixNT6 [36 KB, freeware]:
http://www.jsware.net/jsware/zips/fix6r.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
If 0.0.0.0 redirects do not work properly on your computer(s)
you can substitute all null strings below with default localhost:
127.0.0.1
BONUS:
List below contains all known Microsoft servers one may wish to disable, but some will deactivate
Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about.
View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
Use with CAUTION!

# Lines below recommended to disable almost *everything* Microsoft => use with CAUTION!
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 a-0002.a-msedge.net
0.0.0.0 a-0003.a-msedge.net
0.0.0.0 a-0004.a-msedge.net
0.0.0.0 a-0005.a-msedge.net
0.0.0.0 a-0006.a-msedge.net
0.0.0.0 a-0007.a-msedge.net
0.0.0.0 a-0008.a-msedge.net
0.0.0.0 a-0009.a-msedge.net
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msads.net
0.0.0.0 a.ads2.msn.com
0.0.0.0 a.microsoft.com
0.0.0.0 a.rad.msn.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000003.ms.a.microsoft.com
0.0.0.0 a000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001337.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a0000000000000000001.ms.a.microsoft.com
0.0.0.0 a000000000000000003.ms.a.microsoft.com
0.0.0.0 a000001.ms.a.microsoft.com
0.0.0.0 a102.ms.a.microsoft.com
0.0.0.0 a106.ms.a.microsoft.com
0.0.0.0 a107.ms.a.microsoft.com
0.0.0.0 a1112.ms.a.microsoft.com
0.0.0.0 a1122.ms.a.microsoft.com
0.0.0.0 a113.ms.a.microsoft.com
0.0.0.0 a119.ms.a.microsoft.com
0.0.0.0 a120.ms.a.microsoft.com
0.0.0.0 a1205.ms.a.microsoft.com
0.0.0.0 a122.ms.a.microsoft.com
0.0.0.0 a126.ms.a.microsoft.com
0.0.0.0 a128.ms.a.microsoft.com
0.0.0.0 a129.ms.a.microsoft.com
0.0.0.0 a133.ms.a.microsoft.com
0.0.0.0 a137.ms.a.microsoft.com
0.0.0.0 a141.ms.a.microsoft.com
0.0.0.0 a142.ms.a.microsoft.com
0.0.0.0 a145.ms.a.microsoft.com
0.0.0.0 a146.ms.a.microsoft.com
0.0.0.0 a1500.ms.a.microsoft.com
0.0.0.0 a2000.ms.a.microsoft.com
0.0.0.0 a23.ms.a.microsoft.com
0.0.0.0 a4.ms.a.microsoft.com
0.0.0.0 a592.ms.a.microsoft.com
0.0.0.0 ac3.msn.com
0.0.0.0 access.microsofttemplates.org
0.0.0.0 activate.microsoft.com
0.0.0.0 activate.one.microsoft.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 adcenter.microsoft.com
0.0.0.0 admin.messaging.microsoft.com
0.0.0.0 admin.training.partner.microsoft.com
0.0.0.0 adnexus.net
0.0.0.0 adnxs.com
0.0.0.0 ads.msn.com
0.0.0.0 ads1.msads.net
0.0.0.0 ads1.msn.com
0.0.0.0 adsinapps.microsoft.com
0.0.0.0 advertise.bingads.microsoft.com
0.0.0.0 advertising.bingads.microsoft.com
0.0.0.0 advertising.microsoft.com
0.0.0.0 aer.microsoft.com
0.0.0.0 afkar.microsoft.com
0.0.0.0 aidps.atdmt.com
0.0.0.0 ak.or.download.microsoft.com
0.0.0.0 aka-cdn-ns.adtech.de
0.0.0.0 akamdub.fullproduct.download.microsoft.com
0.0.0.0 akampr.fullproduct.download.microsoft.com
0.0.0.0 akamsin.fullproduct.download.microsoft.com
0.0.0.0 alert-security.fail
0.0.0.0 alerts.live.com
0.0.0.0 alerts.microsoft.com
0.0.0.0 alventive.xbox.com
0.0.0.0 americas.winqual.microsoft.com
0.0.0.0 answerdesk.microsoftstore.com
0.0.0.0 anz.partners.extranet.microsoft.com
0.0.0.0 apps.skype.com
0.0.0.0 ask.support.microsoft.com
0.0.0.0 assessment.learning.microsoft.com
0.0.0.0 au.download.windowsupdate.com
0.0.0.0 autocomplete.support.microsoft.com
0.0.0.0 autoupdate.microsoft.com
0.0.0.0 autoupdate.windowsmedia.com
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 b.ads1.msn.com
0.0.0.0 b.ads2.msads.net
0.0.0.0 b.office.microsoft.com
0.0.0.0 b.rad.msn.com
0.0.0.0 backup12.microsoft.com
0.0.0.0 bay01.calendar.live.com
0.0.0.0 bay02.calendar.live.com
0.0.0.0 bay03.calendar.live.com
0.0.0.0 bay04.calendar.live.com
0.0.0.0 beta.update.microsoft.com
0.0.0.0 betaoneservices.com
0.0.0.0 betaplace.msbpn.com
0.0.0.0 betaplace.partners.extranet.microsoft.com
0.0.0.0 betaservices.windowsmedia.com
0.0.0.0 billing.microsoft.com
0.0.0.0 blugro2gms.groove.microsoft.com
0.0.0.0 boardlink.microsoft.com
0.0.0.0 brandtools.partners.extranet.microsoft.com
0.0.0.0 bs.serving-sys.com
0.0.0.0 buy.trymicrosoftoffice.com
0.0.0.0 buynow.one.microsoft.com
0.0.0.0 buyoffice.microsoft.com
0.0.0.0 byfiles.storage.live.com
0.0.0.0 c.atdmt.com
0.0.0.0 c.microsoft.akadns.net
0.0.0.0 c.microsoft.com
0.0.0.0 c.msn.com
0.0.0.0 c1.microsoft.com
0.0.0.0 c2.microsoft.com
0.0.0.0 c2r.microsoft.com
0.0.0.0 c2rsetup.officeapps.live.com
0.0.0.0 capccfv2.partners.extranet.microsoft.com
0.0.0.0 careers.microsoft.com
0.0.0.0 catalog.microsoft.com
0.0.0.0 catalog.update.microsoft.com
0.0.0.0 ccp.microsoft.com
0.0.0.0 cdm.microsoft.com
0.0.0.0 cdn.atdmt.com
0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net
0.0.0.0 cdp1.public-trust.com
0.0.0.0 cds26.ams9.msecn.net
0.0.0.0 ceip.microsoft.com
0.0.0.0 centergyremote.partners.extranet.microsoft.com
0.0.0.0 certification.drm.microsoft.com
0.0.0.0 certpartner.one.microsoft.com
0.0.0.0 cgl.microsoft.com
0.0.0.0 challenge.eteam.partners.extranet.microsoft.com
0.0.0.0 channels.microsoft.com
0.0.0.0 choice.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 click.email.microsoftonline.com
0.0.0.0 cmtypartnertool.partners.extranet.microsoft.com
0.0.0.0 codepremium.msdn.microsoft.com
0.0.0.0 commerce.microsoft.com
0.0.0.0 community.advertising.microsoft.com
0.0.0.0 community.bingads.microsoft.com
0.0.0.0 compaq.windowsmedia.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 configurator.microsoft.com
0.0.0.0 connections.members.microsoft.com
0.0.0.0 content.locator.metadata.windowsmedia.com
0.0.0.0 content.microsoftstore.com
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 corporate.windowsupdate.microsoft.com
0.0.0.0 crl.microsoft.com
0.0.0.0 crystal.partners.extranet.microsoft.com
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 css.one.microsoft.com
0.0.0.0 ctldl.windowsupdate.com
0.0.0.0 cuai-96.microsoft.com
0.0.0.0 cuai97.microsoft.com
0.0.0.0 curah.microsoft.com
0.0.0.0 cust-supp-chat.one.microsoft.com
0.0.0.0 cyclescentral.directtaps.net
0.0.0.0 dars.msft.net
0.0.0.0 das.microsoft.com
0.0.0.0 data.choice.microsoft.com
0.0.0.0 data.tvdownload.microsoft.com
0.0.0.0 db3aqu.atdmt.com
0.0.0.0 dcs.ccp.microsoft.com
0.0.0.0 delivery.pens.microsoft.com
0.0.0.0 delivery.smtp.microsoft.com
0.0.0.0 delivery2.pens.microsoft.com
0.0.0.0 dev.windows.com
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 dgl.microsoft.com
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 directory.microsoft.com
0.0.0.0 directory.netmeeting.microsoft.com
0.0.0.0 directory.partners.extranet.microsoft.com
0.0.0.0 discuss.microsoft.com
0.0.0.0 dlbmodigital.microsoft.com
0.0.0.0 dns.msftncsi.com
0.0.0.0 dns2.tk.msft.net
0.0.0.0 dns3.tk.msft.net
0.0.0.0 domains.live.com
0.0.0.0 down.saservices.microsoft.com
0.0.0.0 download.windowsupdate.com
0.0.0.0 downloadoffice2010.microsoft.com
0.0.0.0 drm.microsoft.com
0.0.0.0 drmlicense.one.microsoft.com
0.0.0.0 ds.download.windowsupdate.com
0.0.0.0 ds.microsoft.com
0.0.0.0 dynamics-crm.pinpoint.microsoft.com
0.0.0.0 e2835.dspb.akamaiedge.net
0.0.0.0 e7341.g.akamaiedge.net
0.0.0.0 e7502.ce.akamaiedge.net
0.0.0.0 e8218.ce.akamaiedge.net
0.0.0.0 ec.atdmt.com
0.0.0.0 email.microsoft.com
0.0.0.0 email2.microsoft.com
0.0.0.0 emea.microsoftstore.com
0.0.0.0 emeaselling.partners.extranet.microsoft.com
0.0.0.0 empower-isv.one.microsoft.com
0.0.0.0 entimg-origin.msn.com
0.0.0.0 eopen.microsoft.com
0.0.0.0 epg.tvdownload.microsoft.com
0.0.0.0 epp.microsoft.com
0.0.0.0 eu.microsoft.com
0.0.0.0 events.microsoft.com
0.0.0.0 events.microsoftvirtualacademy.com
0.0.0.0 example.microsoft.com
0.0.0.0 excel.office.live.com
0.0.0.0 extranet.microsoft-int.com
0.0.0.0 extranet.microsoft.com
0.0.0.0 f.email.microsoft.com
0.0.0.0 fai.music.metaservices.microsoft.com
0.0.0.0 familysafety.microsoft.com
0.0.0.0 favorites.live.com
0.0.0.0 fd.bingads.microsoft.com
0.0.0.0 fe1.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 fe2.ws.microsoft.com.nsatc.net
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 feedback.windows.com
0.0.0.0 feeds.microsoft.com
0.0.0.0 fixitcenter.support.microsoft.com
0.0.0.0 flex.msn.com
0.0.0.0 forefrontdl.microsoft.com
0.0.0.0 freebusy.office.microsoft.com
0.0.0.0 fulfilloffer.microsoft.com
0.0.0.0 fullproduct.download.microsoft.com
0.0.0.0 fuse.microsoft.com
0.0.0.0 g.live.com
0.0.0.0 g.microsoft.com
0.0.0.0 g.microsoftonline.com
0.0.0.0 g3.microsoft.com
0.0.0.0 genuine.microsoft.com
0.0.0.0 genuinebeta.microsoft.com
0.0.0.0 glbdns.microsoft.com
0.0.0.0 go.microsoft.akadns.net
0.0.0.0 h1.msn.com
0.0.0.0 hdshowcase.microsoft.com
0.0.0.0 help.bingads.microsoft.com
0.0.0.0 holiday.microsoftstore.com
0.0.0.0 home.microsoft.com
0.0.0.0 hostedocsp.globalsign.com
0.0.0.0 hotfixv4.microsoft.com
0.0.0.0 hp.windowsmedia.com
0.0.0.0 hup.microsoft.com
0.0.0.0 i.microsoft.com
0.0.0.0 i.msdn.microsoft.com
0.0.0.0 i.office.microsoft.com
0.0.0.0 i.s-microsoft.com
0.0.0.0 i.technet.microsoft.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 i2.microsoft.com
0.0.0.0 i2.msdn.microsoft.com
0.0.0.0 i2.services.social.microsoft.com
0.0.0.0 i2.technet.microsoft.com
0.0.0.0 i3.microsoft.com
0.0.0.0 i3.services.social.microsoft.com
0.0.0.0 i4.services.social.microsoft.com
0.0.0.0 ia.microsoft.com
0.0.0.0 icassp98.microsoft.com
0.0.0.0 ice.microsoft.com
0.0.0.0 icmods.microsoft.com
0.0.0.0 ics.one.microsoft.com
0.0.0.0 ie.components.microsoft.com
0.0.0.0 ie8.msn.com
0.0.0.0 ieak.microsoft.com
0.0.0.0 ieonline.microsoft.com
0.0.0.0 ilabdc.directtaps.net
0.0.0.0 images2.store.microsoft.com
0.0.0.0 img.microsoft.com
0.0.0.0 info.music.metaservices.microsoft.com
0.0.0.0 invoice.microsoft.com
0.0.0.0 iso.esd.microsoft.com
0.0.0.0 ispreferral.microsoft.com
0.0.0.0 isvmex.team.partners.extranet.microsoft.com
0.0.0.0 iwsolve.partners.extranet.microsoft.com
0.0.0.0 jdp.microsoft.com
0.0.0.0 js.microsoft.com
0.0.0.0 kcenter.partners.extranet.microsoft.com
0.0.0.0 lb1.www.ms.akadns.net
0.0.0.0 learningcenter.partners.extranet.microsoft.com
0.0.0.0 lg.home.microsoft.com
0.0.0.0 li581-132.members.linode.com
0.0.0.0 licensecode.one.microsoft.com
0.0.0.0 licenseserver.windowsmedia.com
0.0.0.0 licensing.microsoft.com
0.0.0.0 live.rads.msn.com
0.0.0.0 lobby.microsoftstore.com
0.0.0.0 locator.metadata.windowsmedia.com
0.0.0.0 login.domains.live.com
0.0.0.0 login.microsoftonline.com
0.0.0.0 lync.microsoft.com
0.0.0.0 lynconline.pinpoint.microsoft.com
0.0.0.0 m.adnxs.com
0.0.0.0 m.hotmail.com
0.0.0.0 m.microsoft.com
0.0.0.0 m.microsoftstore.com
0.0.0.0 mac2.microsoft.com
0.0.0.0 mail3.microsoft.com
0.0.0.0 mail3.mssupport.microsoft.com
0.0.0.0 maps.microsoft.com
0.0.0.0 marketing.microsoft.com
0.0.0.0 mbs.microsoft.com
0.0.0.0 mc1.maps.live.com
0.0.0.0 mcp.microsoft.com
0.0.0.0 mcsp.microsoft.com
0.0.0.0 mcspreferral.microsoft.com
0.0.0.0 mediadl.microsoft.com
0.0.0.0 medtronics.team.partners.extranet.microsoft.com
0.0.0.0 membercenter.office.microsoft.com
0.0.0.0 members.microsoft.com
0.0.0.0 memberstest2.microsoft.com
0.0.0.0 mert.microsoft.com
0.0.0.0 messaging.office.microsoft.com
0.0.0.0 messenger.live.com
0.0.0.0 messenger.microsoft.com
0.0.0.0 metadata.windowsmedia.com
0.0.0.0 metaservices.microsoft.com
0.0.0.0 metaservices.windowsmedia.com
0.0.0.0 mgn.microsoft.com
0.0.0.0 microsoft-careers.com
0.0.0.0 microsoft-int.com
0.0.0.0 microsoft.software.net
0.0.0.0 microsoftelearning.com
0.0.0.0 microsoftlawportal.net
0.0.0.0 microsoftlicense.com
0.0.0.0 microsoftlicensereview.com
0.0.0.0 microsoftonline.com
0.0.0.0 microsoftportal.net
0.0.0.0 microsoftstore.it
0.0.0.0 microsoftstore.me
0.0.0.0 microsofttouch.fr
0.0.0.0 microsoftupdate.com
0.0.0.0 microsoftupdate.microsoft.com
0.0.0.0 microsoftupdates.eu
0.0.0.0 microsoftvolumelicensing.com
0.0.0.0 mla.microsoft.com
0.0.0.0 mobileconfig.net
0.0.0.0 mocl.one.microsoft.com
0.0.0.0 moet.microsoft.com
0.0.0.0 movie.metadata.windowsmedia.com
0.0.0.0 mpa.one.microsoft.com
0.0.0.0 mpan.microsoft.com
0.0.0.0 mpanbeta.microsoft.com
0.0.0.0 mppe.partners.extranet.microsoft.com
0.0.0.0 ms.a.microsoft.com
0.0.0.0 msa.one.microsoft.com
0.0.0.0 mscrl.microsoft.com
0.0.0.0 msdl.microsoft.com
0.0.0.0 msdn.one.microsoft.com
0.0.0.0 msdnisv.microsoft.com
0.0.0.0 msedge.net
0.0.0.0 msevents-as.microsoft.com
0.0.0.0 msevents-eu.microsoft.com
0.0.0.0 msevents.microsoft.com
0.0.0.0 mseventsppe.microsoft.com
0.0.0.0 msftncsi.com
0.0.0.0 msftopenus.partners.extranet.microsoft.com
0.0.0.0 msnbot-65-55-108-23.search.msn.com
0.0.0.0 msnews.microsoft.com
0.0.0.0 msntest.serving-sys.com
0.0.0.0 msops.microsoft.com
0.0.0.0 mspartner.microsoft.com
0.0.0.0 mspress.microsoft.com
0.0.0.0 msrcmt.research.microsoft.com
0.0.0.0 mt.saservices.microsoft.com
0.0.0.0 mtcppoc.directtaps.net
0.0.0.0 murl.microsoft.com
0.0.0.0 music.metaservices.microsoft.com
0.0.0.0 music.submissions.metaservices.microsoft.com
0.0.0.0 mvp.microsoft.com
0.0.0.0 mvp.support.microsoft.com
0.0.0.0 mvp.support.ppe.microsoft.com
0.0.0.0 mymfe.microsoft.com
0.0.0.0 mywindowsmobile.co.uk
0.0.0.0 mywindowsmobile.com
0.0.0.0 mywindowsmobile.de
0.0.0.0 na.msdn.microsoft.com
0.0.0.0 ncsi.glbdns.microsoft.com
0.0.0.0 netc.members.microsoft.com
0.0.0.0 netmeeting.microsoft.com
0.0.0.0 netscan.research.microsoft.com
0.0.0.0 netservforextranet.microsoft.com
0.0.0.0 newsletters.microsoft.com
0.0.0.0 ns.microsoft.com
0.0.0.0 ntservicepack.microsoft.com
0.0.0.0 nz.partners.retail.microsoft.com
0.0.0.0 nz.xbox.partners.retail.microsoft.com
0.0.0.0 o15.officeredir.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 odc.officeapps.live.com
0.0.0.0 office.live.com
0.0.0.0 office.microsoft.com
0.0.0.0 office2010.microsoft.com
0.0.0.0 office365.microsoft.com
0.0.0.0 office365.pinpoint.microsoft.com
0.0.0.0 officebeta.microsoft.com
0.0.0.0 officecdn.microsoft.com
0.0.0.0 officeimages.microsoft.com
0.0.0.0 officeint.microsoft.com
0.0.0.0 officelive.microsoft.com
0.0.0.0 officeoffer.one.microsoft.com
0.0.0.0 officeredir.microsoft.com
0.0.0.0 officesas.microsoft.com
0.0.0.0 officeupdate.microsoft.com
0.0.0.0 om.one.microsoft.com
0.0.0.0 oms.one.microsoft.com
0.0.0.0 oms2.one.microsoft.com
0.0.0.0 onboarding.data.tvdownload.microsoft.com
0.0.0.0 onboarding.epg.tvdownload.microsoft.com
0.0.0.0 one.microsoft.com
0.0.0.0 onlinehelp.microsoft.com
0.0.0.0 onlinestores.metaservices.microsoft.com
0.0.0.0 origin-codecs.microsoft.com
0.0.0.0 origin-images.windowsmedia.com
0.0.0.0 osl.microsoft.com
0.0.0.0 outlook.microsoft.com
0.0.0.0 p.email.microsoft.com
0.0.0.0 partner.microsoft.com
0.0.0.0 partnerconnect.microsoft.com
0.0.0.0 partnering.one.microsoft.com
0.0.0.0 partners.extranet.microsoft-int.com
0.0.0.0 partners.extranet.microsoft.com
0.0.0.0 partners.microsoft.com
0.0.0.0 partners.retail.microsoft.com
0.0.0.0 partners.sts.microsoft.com
0.0.0.0 partnerstraining.microsoft.com
0.0.0.0 partnersupport.microsoft.com
0.0.0.0 pens.microsoft.com
0.0.0.0 personaluselicense.windows.com
0.0.0.0 phishingfilter.microsoft.com
0.0.0.0 phoenixbillingtest.partners.extranet.microsoft-int.com
0.0.0.0 phones.microsoftstore.com
0.0.0.0 pilot.premier.microsoft.com
0.0.0.0 pingdom.com
0.0.0.0 pinpoint.microsoft-ppe.com
0.0.0.0 pinpoint.microsoft.com
0.0.0.0 planningservices.partners.extranet.microsoft.com
0.0.0.0 portal.microsoftonline.com
0.0.0.0 powerpoint.office.live.com
0.0.0.0 ppe.microsoft.com
0.0.0.0 pre.footprintpredict.com
0.0.0.0 premier.microsoft.com
0.0.0.0 premierdownload.microsoft.com
0.0.0.0 premieritaly.eteam.partners.extranet.microsoft.com
0.0.0.0 preview.data.tvdownload.microsoft.com
0.0.0.0 preview.info.music.metaservices.microsoft.com
0.0.0.0 preview.msn.com
0.0.0.0 preview.music.submissions.metaservices.microsoft.com
0.0.0.0 preview.services.wmdrm.windowsmedia.com
0.0.0.0 preview.serviceswitching.metadata.windowsmedia.com
0.0.0.0 preview.vcs.metaservices.microsoft.com
0.0.0.0 preview.video.metaservices.microsoft.com
0.0.0.0 preview.windows.com
0.0.0.0 previewa.locator.metadata.windowsmedia.com
0.0.0.0 previewa.movie.metadata.windowsmedia.com
0.0.0.0 pricelist.skype.com
0.0.0.0 privacy.microsoft.com
0.0.0.0 privatenews.microsoft.com
0.0.0.0 prodreg.microsoft.com
0.0.0.0 productstudio.partners.extranet.microsoft.com
0.0.0.0 profile.live.com
0.0.0.0 profile.microsoft.com
0.0.0.0 profileppe.microsoft.com
0.0.0.0 profiletest2.microsoft.com
0.0.0.0 protect.microsoft.com
0.0.0.0 quarantine.messaging.microsoft.com
0.0.0.0 r.email.microsoft.com
0.0.0.0 r.office.microsoft.com
0.0.0.0 r.officeint.microsoft.com
0.0.0.0 ra.microsoft.com
0.0.0.0 rad.live.com
0.0.0.0 rad.microsoft.com
0.0.0.0 rad.msn.com
0.0.0.0 ragnarok.msft.net
0.0.0.0 rbeta2.officebeta.microsoft.com
0.0.0.0 rdns1.msft.net
0.0.0.0 rdns2.msft.net
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 redir.windows.microsoft.com
0.0.0.0 redir.windowsmedia.com
0.0.0.0 redmond3.download.microsoft.com
0.0.0.0 register.microsoft.com
0.0.0.0 register.one.microsoft.com
0.0.0.0 registermsdn.one.microsoft.com
0.0.0.0 reply.microsoft.com
0.0.0.0 reports.membercenter.office.microsoft.com
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 resourcelink.mspress.microsoft.com
0.0.0.0 resources.whymicrosoft.com
0.0.0.0 retail.microsoft.com
0.0.0.0 rs.update.microsoft.com
0.0.0.0 rs.windowsupdate.microsoft.com
0.0.0.0 rss.servicehealth.microsoftonline.com
0.0.0.0 rssgov.windows.microsoft.com
0.0.0.0 rtc.webresponse.one.microsoft.com
0.0.0.0 rto.microsoft.com
0.0.0.0 s.gateway.messenger.live.com
0.0.0.0 s.microsoft.com
0.0.0.0 sO.2mdn.net
0.0.0.0 sa.windows.com
0.0.0.0 saservices.microsoft.com
0.0.0.0 sba.microsoft.com
0.0.0.0 sc.imp.live.com
0.0.0.0 schemas.microsoft.akadns.net
0.0.0.0 se.windows.com
0.0.0.0 search-ppe.microsoft.com
0.0.0.0 search.officeupdate.microsoft.com
0.0.0.0 searchorigin4.microsoft.com
0.0.0.0 searchservice.support.microsoft.com
0.0.0.0 searchservice32.support.microsoft.com
0.0.0.0 secure.adnxs.com
0.0.0.0 secure.download.windowsupdate.com
0.0.0.0 secure.flashtalking.com
0.0.0.0 services.apps.microsoft.com
0.0.0.0 services.learningbeta.microsoft.com
0.0.0.0 services.social.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 services.windowsmedia.com
0.0.0.0 services.wmdrm.windowsmedia.com
0.0.0.0 services1.windowsmedia.com
0.0.0.0 serviceswitching.metadata.windowsmedia.com
0.0.0.0 serviceswitching.metaservices.microsoft.com
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 settings.messenger.live.com
0.0.0.0 sharepoint.microsoft.com
0.0.0.0 shell.windows.com
0.0.0.0 shopformusic.microsoft.com
0.0.0.0 sipfed.microsoft.com
0.0.0.0 slg.msgamedev.com
0.0.0.0 sls.microsoft.com
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 smallbusiness.support.microsoft.com
0.0.0.0 smtp.microsoft.com
0.0.0.0 snackbox.microsoft.com
0.0.0.0 solutionfinder.microsoft.com
0.0.0.0 solutionfinderbeta.microsoft.com
0.0.0.0 solutionmarketplace.partners.extranet.microsoft.com
0.0.0.0 solutionprofiler.microsoft.com
0.0.0.0 solutionprofilerbeta.microsoft.com
0.0.0.0 spar.msteams.com
0.0.0.0 specserver.microsoft.com
0.0.0.0 spynet.microsoft.com
0.0.0.0 spynet2.microsoft.com
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 sqm.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 sqmtest.microsoft.com
0.0.0.0 srd.ds.microsoft.com
0.0.0.0 staging.services.wmdrm.windowsmedia.com
0.0.0.0 static.2mdn.net
0.0.0.0 stats.microsoft.com
0.0.0.0 stats.update.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 storage.live.com
0.0.0.0 store.microsoft.com
0.0.0.0 sts.microsoft.com
0.0.0.0 submissions.metaservices.microsoft.com
0.0.0.0 subscriptions.downloads.msdn.microsoft.com
0.0.0.0 subscriptions.downloads.technet.microsoft.com
0.0.0.0 support.ppe.microsoft.com
0.0.0.0 support.tie.microsoft.com
0.0.0.0 supportorigin3.microsoft.com
0.0.0.0 surface.microsoftstore.com
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 svcs.microsoft.com
0.0.0.0 sxp.microsoft.com
0.0.0.0 sysdev.microsoft.com
0.0.0.0 systemcenter.pinpoint.microsoft.com
0.0.0.0 tag.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 telemetry.appex.bing.net:443
0.0.0.0 telemetry.microsoft.com
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 telesales360.partners.extranet.microsoft.com
0.0.0.0 test.newsletters.microsoft.com
0.0.0.0 test.uddi.microsoft.com
0.0.0.0 test.update.microsoft.com
0.0.0.0 testservices.windowsmedia.com
0.0.0.0 tide004.microsoft.com
0.0.0.0 tide005.microsoft.com
0.0.0.0 tide134.microsoft.com
0.0.0.0 tide137.microsoft.com
0.0.0.0 tide143.microsoft.com
0.0.0.0 tide42.microsoft.com
0.0.0.0 tie.microsoft.com
0.0.0.0 tk.downloads.microsoft.com
0.0.0.0 tkbpnbip01.one.microsoft.com
0.0.0.0 tkxtbip01.one.microsoft.com
0.0.0.0 tkxtbip02.one.microsoft.com
0.0.0.0 tkxtbip03.one.microsoft.com
0.0.0.0 tkxtbip04.one.microsoft.com
0.0.0.0 tkxtbip05.one.microsoft.com
0.0.0.0 tkxtbip06.one.microsoft.com
0.0.0.0 tkxtbip07.one.microsoft.com
0.0.0.0 toc.music.metaservices.microsoft.com
0.0.0.0 training.partner.microsoft.com
0.0.0.0 training.retail.microsoft.com
0.0.0.0 transfer.microsoft.com
0.0.0.0 transfers.ds.microsoft.com
0.0.0.0 transfers.one.microsoft.com
0.0.0.0 trial.trymicrosoftoffice.com
0.0.0.0 tripoli.microsoft.com
0.0.0.0 trymicrosoftoffice.com
0.0.0.0 tv.metadata.windowsmedia.com
0.0.0.0 uat.mywindowsmobile.de
0.0.0.0 uat.startwindowsmobile.com
0.0.0.0 uatpremier.microsoft.com
0.0.0.0 uddi.microsoft.com
0.0.0.0 uddiv3.microsoft.com
0.0.0.0 ui.skype.com
0.0.0.0 update.microsoft.com
0.0.0.0 us1.trymicrosoftoffice.com
0.0.0.0 us20.trymicrosoftoffice.com
0.0.0.0 v4-ori.windowsupdate.microsoft.com
0.0.0.0 v4.windowsupdate.microsoft.com
0.0.0.0 v5.windowsupdate.microsoft.com
0.0.0.0 v5stats.windowsupdate.microsoft.com
0.0.0.0 vcs.metaservices.microsoft.com
0.0.0.0 video.metaservices.microsoft.com
0.0.0.0 view.atdmt.com
0.0.0.0 view.email.microsoftonline.com
0.0.0.0 view.officeapps.live.com
0.0.0.0 virtualchat.support.microsoft.com
0.0.0.0 vistatechbeta.microsoft.com
0.0.0.0 visualstudiogallery.msdn.microsoft.com
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 watson.live.com
0.0.0.0 watson.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 wb01.nz.partners.retail.microsoft.com
0.0.0.0 wb01.nz.xbox.partners.retail.microsoft.com
0.0.0.0 wb02.nz.partners.retail.microsoft.com
0.0.0.0 wb02.nz.xbox.partners.retail.microsoft.com
0.0.0.0 web-ngram.research.microsoft.com
0.0.0.0 web.esd.microsoft.com
0.0.0.0 webevents.microsoft.com
0.0.0.0 webfolders.metaservices.microsoft.com
0.0.0.0 webnews.microsoft.com
0.0.0.0 webresponse.one.microsoft.com
0.0.0.0 wer.microsoft.com
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 wfp.microsoft.com
0.0.0.0 wfp.vistatechbeta.microsoft.com
0.0.0.0 whidbey.msdn.microsoft.com
0.0.0.0 windowsbetatest.rte.microsoft.com
0.0.0.0 windowslive.com
0.0.0.0 windowslive.es.msn.com
0.0.0.0 windowslive.jp.msn.com
0.0.0.0 windowslive.msn.com
0.0.0.0 windowslivegadgets.com
0.0.0.0 windowslivehelp.com
0.0.0.0 windowsmarketplace.com
0.0.0.0 windowsmedia.microsoft.com
0.0.0.0 windowsmedia1.com
0.0.0.0 windowsmediaguide.com
0.0.0.0 windowsonecare.com
0.0.0.0 windowsonecarelive.com
0.0.0.0 windowssdk.msdn.microsoft.com
0.0.0.0 windowsserverfeedback.com
0.0.0.0 windowsupdate.com
0.0.0.0 windowsupdate.microsoft.com
0.0.0.0 winfo.microsoft.com
0.0.0.0 winfx.msdn.microsoft.com
0.0.0.0 winqual.microsoft.com
0.0.0.0 winse.microsoft.com
0.0.0.0 wm.microsoft.com
0.0.0.0 wmdrm.windowsmedia.com
0.0.0.0 word.office.live.com
0.0.0.0 workspace.office.live.com
0.0.0.0 wpa.one.microsoft.com
0.0.0.0 ws03sp1.update.microsoft.com
0.0.0.0 wscont2.apps.microsoft.com
0.0.0.0 wsus.ds.download.windowsupdate.com
0.0.0.0 wu-ori.microsoft.com
0.0.0.0 wustat.windows.com
0.0.0.0 wustats.microsoft.com
0.0.0.0 wutrack.windows.com
0.0.0.0 wwetrain.microsoft.com
0.0.0.0 wwevents.microsoft.com
0.0.0.0 wweventstest.one.microsoft.com
0.0.0.0 www.betaone.partners.extranet.microsoft.com
0.0.0.0 www.billing.microsoft.com
0.0.0.0 www.commerce.microsoft.com
0.0.0.0 www.domains.live.com
0.0.0.0 www.download.windowsupdate.com
0.0.0.0 www.email.microsoft.com
0.0.0.0 www.empresas.microsoft.com
0.0.0.0 www.eu.microsoft.com
0.0.0.0 www.favorites.live.com
0.0.0.0 www.go.microsoft.akadns.net
0.0.0.0 www.licencje-microsoft.pl
0.0.0.0 www.licencjemicrosoft.eu
0.0.0.0 www.mar.partners.extranet.microsoft.com
0.0.0.0 www.microsoft-certification.co.uk
0.0.0.0 www.microsoft-int.com
0.0.0.0 www.microsoft-office.fr
0.0.0.0 www.microsoftadvertising.com
0.0.0.0 www.microsoftbusinesshub.com
0.0.0.0 www.microsoftcloudpartner.com
0.0.0.0 www.microsoftelearning.com
0.0.0.0 www.microsoftfrontpage.com
0.0.0.0 www.microsoftlicense.com
0.0.0.0 www.microsoftoffice365now.com
0.0.0.0 www.microsoftonline.com
0.0.0.0 www.microsoftstore.com.cn
0.0.0.0 www.microsoftstore.it
0.0.0.0 www.microsoftupdate.com
0.0.0.0 www.microsoftvolumelicensing.com
0.0.0.0 www.msevents.microsoft.com
0.0.0.0 www.msftncsi.com
0.0.0.0 www.msgamedev.com
0.0.0.0 www.msnusers.com
0.0.0.0 www.msus.windowsupdate.com
0.0.0.0 www.office.microsoft.com
0.0.0.0 www.officesas.microsoft.com
0.0.0.0 www.officeupdate.microsoft.com
0.0.0.0 www.partners.extranet.microsoft.com
0.0.0.0 www.pmi.microsoft.com
0.0.0.0 www.trymicrosoftoffice.com
0.0.0.0 www.update.microsoft.com
0.0.0.0 www.windowslive.com
0.0.0.0 www.windowslive.de
0.0.0.0 www.windowslive.fr
0.0.0.0 www.windowslive.nl
0.0.0.0 www.windowslivehelp.com
0.0.0.0 www.windowsmarketplace.com
0.0.0.0 www.windowsmedia.microsoft.com
0.0.0.0 www.windowsmedia1.com
0.0.0.0 www.windowsmediacenter.com
0.0.0.0 www.windowsonecare.com
0.0.0.0 www.windowsphone.live.com
0.0.0.0 www.windowsupdate.com
0.0.0.0 www2.buyoffice.microsoft.com
0.0.0.0 www20.buyoffice.microsoft.com
0.0.0.0 www20.downloadoffice2010.microsoft.com
0.0.0.0 www7.buyoffice.microsoft.com
0.0.0.0 www7.downloadoffice2010.microsoft.com
0.0.0.0 wwwbeta.microsoft.com
0.0.0.0 wwwppe.microsoft.com
0.0.0.0 wxpsp2.windowsupdate.microsoft.com
0.0.0.0 xbox.microsoftstore.com
0.0.0.0 xbox.retail.microsoft.com
0.0.0.0 xpsp1.microsoft.com
0.0.0.0 yannerwan8.spaces.live.com



Back 2 Top

E10BLOK.CMD = Batch Command (CMD) file

@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END

:: 
::  MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10 
:: 
:: Must see 10_BLOCK.TXT (included) for guidelines!
:: http://www.mdgx.com/10BLK/10_BLOCK.php
:: Or:
:: http://www.mdgx.com/10BLK/10_BLOCK.TXT

COLOR 17

ECHO.
ECHO. 
ECHO.  Wait! This will take a while... 
ECHO. 
ECHO.

:: 
:: Run all 10_BLOCK.* files (.CMD + .EXE) as Administrator:
:: 

IF NOT EXIST "%TEMP%\10_BLOCK.CMD" GOTO ADMt
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL
:ADMt
IF NOT EXIST "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" GOTO ADMp
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL
:ADMp
IF NOT EXIST "%USERPROFILE%\Downloads\10_BLOCK.CMD" GOTO ADMu
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL
:ADMu

:: 
:: Verify if logged on user is Administrator:
:: 

:: %windir%\SYSTEM32\openfiles.exe 1 >NUL 2>&1
:: IF NOT %errorlevel% equ 0 (
:: ECHO You are not logged in as Administrator!
:: ECHO You MUST: Open Explorer -> right-click this file -> Run as Administrator.
:: PAUSE
:: EXIT 1
:: ) else (
SETLOCAL

:: User Account Control (UAC) check + Auto-Elevate Permissions 2 Admin level
:: Check for permissions...
>NUL 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"
:: If error flag already set we do not have admin. :-(
IF '%errorlevel%' NEQ '0' (
ECHO:
ECHO Requesting Administrative Privileges...
ECHO When UAC prompt opens press YES to Continue
ECHO:
GOTO UACPrompt
) else (GOTO gotAdmin)
:UACPrompt
ECHO SET UAC=CreateObject^("Shell.Application"^)>"%temp%\GetAdm!.vbs"
ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%temp%\GetAdm!.vbs"
"%temp%\GetAdm!.vbs"
EXIT /B
:gotAdmin
IF EXIST "%temp%\GetAdm!.vbs" (DEL "%temp%\GetAdm!.vbs")
PUSHD "%CD%"
CD /D "%~dp0"

:: 
:: Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
:: 

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO NT0
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO NT0
:: Disable Diagnostics Tracking (DiagTrack) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagtrack
%windir%\SYSTEM32\SC.EXE config diagtrack START= disabled
:: Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagnosticshub.standardcollector.service
%windir%\SYSTEM32\SC.EXE config diagnosticshub.standardcollector.service START= disabled
:: Disable WAP Push Message Routing (DmWAPPush) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP dmwappushservice
%windir%\SYSTEM32\SC.EXE config dmwappushservice START= disabled
:: Disable Retail Demo (RetailDemo) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RetailDemo
%windir%\SYSTEM32\SC.EXE config RetailDemo START= disabled
:: Disable Windows Event Collector (WECSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP Wecsvc
%windir%\SYSTEM32\SC.EXE CONFIG Wecsvc START= disabled
:: Disable Remote Registry (RemoteRegistry) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RemoteRegistry
%windir%\SYSTEM32\SC.EXE CONFIG RemoteRegistry START= disabled
:: Disable One Drive (OneSyncSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP OneSyncSvc
%windir%\SYSTEM32\SC.EXE CONFIG OneSyncSvc START= disabled
%windir%\SYSTEM32\REG.EXE add"HKLM\SYSTEM\CurrentControlSet\Services\OneSyncSvc_Session1" /v "Start" /t REG_DWORD /d 4 /f >NUL
:NT0
ECHO "" > %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl
ECHO Y|%windir%\SYSTEM32\CACLS.EXE %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl /d SYSTEM
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "AutoLogger-Diagtrack-Listener" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "SQMLogger" /f >NUL
:: Disable automatic/pushed (without permission) installation + display of ads/suggested apps from Start menu:
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenOverlayEnabled" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f >NUL
:: Disable spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" policies:
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f >NUL
:: Disable WiFi Sense, AutoUpdate, Defender SpyNet, Office + Diagnostics logging + reporting:
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseCredShared" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseOpen" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "IncludeRecommendedUpdates" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "EnableFeaturedSoftware" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SpyNetReporting" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy" /v "EnableQueryRemoteServer" /t REG_DWORD /d 0 /f >NUL
:: Remove spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" folders from My PC:
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f >NUL
:: Disable Automatic Computer Maintenance tasks:
:: http://www.winaero.com/blog/disable-computer-maintenance-windows-10/
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\ScheduledDiagnostics" /v "EnabledExecution" /t REG_DWORD /d 0 /f >NUL
:: Disable Edge (Spartan) web browser ads:
%windir%\SYSTEM32\REG.EXE add "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxCacheTtl" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxNegativeCacheTtl" /t REG_DWORD /d 0 /f >NUL
:: Enable Advanced Explorer View tweaks:
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f >NUL
:: Disable Advanced Explorer View automatic/pushed (without permission) of ads/suggested apps:
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d 0 /f >NUL
:: Disable Windows Update P2P:
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f >NUL
:: Disable Cortana in Search:
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f >NUL
:: Remove "Is Shortcut":
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "link" /t REG_BINARY /d 0 /f >NUL
:: Explorer remove OneDrive icon:
%windir%\SYSTEM32\REG.EXE add "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL

:: 
:: Disable "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
:: 

IF NOT EXIST %windir%\SYSTEM32\SCHTASKS.EXE GOTO SCH
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\AitAgent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Autochk\Proxy" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Maintenance\WinSAT" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ehDRMInit" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\InstallPlayReady" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\mcupdate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURActivate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURDiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrScheduleTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\RegisterSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\UpdateRecordPath" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Time-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\PI\Sqm-Tasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /DISABLE
:SCH

:: 
:: Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016:
:: 

%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx" /v "DisableGwx" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gwx.exe" /v "Debugger" /t REG_SZ /d "systray.exe" /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "ElevateNonAdmins" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableOSUpgrade" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "AllowOSUpgrade" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "ReservationsAllowed" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeState" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeStateTimeStamp" /t REG_SZ /d "2015-09-09 09:09:09" /f >NUL

:: 
:: OPTIONAL: Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
:: 

%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "AutoInstallMinorUpdates" /t REG_DWORD /d 0 /f >NUL
:: %windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoRebootWithLoggedOnUsers" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAUAsDefaultShutdownOption" /t REG_DWORD /d 1 /f >NUL
:: %windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWindowsUpdate" /t REG_DWORD /d 1 /f >NUL
:: Disable reinstall (of undesired) Windows Updates + Drivers:
%windir%\SYSTEM32\REG.EXE add "HKCU\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "DontSearchWindowsUpdate" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 1 /f >NUL

:: 
:: Uninstall OneDrive:
:: 

%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSync" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL
SET x86="%SYSTEMROOT%\System32\OneDriveSetup.exe"
SET x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe"
%windir%\SYSTEM32\TASKKILL.EXE /IM OneDrive.exe /T /F >NUL
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL
IF EXIST %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL
RD "%USERPROFILE%\OneDrive" /Q /S >NUL
RD "C:\OneDriveTemp" /Q /S >NUL
RD "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL
RD "%ProgramData%\Microsoft OneDrive" /Q /S >NUL
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL

:: 
:: Internet Explorer (IE) 9/10/11/newer Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade:
:: 

%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Internet Explorer\Geolocation" /v "BlockAllWebsites" /t REG_DWORD /d 1 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL
%windir%\SYSTEM32\REG.EXE add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL

:: 
:: OPTIONAL: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS with many IPs:
:: 
:: Open STOP!DNS.CMD + STARTDNS.CMD (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.ZIP
:: More info:
:: http://www.mdgx.com/hosts.php#N2

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO DN$
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO DN$
:: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP DNSCache
:: %windir%\SYSTEM32\SC.EXE CONFIG DNSCache START= disabled
:DN$

:: 
:: Block Spyware, Tracking + Telemetry using Windows Firewall:
:: 

IF NOT EXIST %windir%\SYSTEM32\NETSH.EXE GOTO NS0
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_134.170.30.202" dir=out action=block remoteip=134.170.30.202 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_137.116.81.24" dir=out action=block remoteip=137.116.81.24 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_157.56.106.189" dir=out action=block remoteip=157.56.106.189 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_184.86.53.99" dir=out action=block remoteip=184.86.53.99 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.43" dir=out action=block remoteip=2.22.61.43 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.66" dir=out action=block remoteip=2.22.61.66 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.39.117.230" dir=out action=block remoteip=65.39.117.230 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.52.108.33" dir=out action=block remoteip=65.52.108.33 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_64.4.54.254" dir=out action=block remoteip=64.4.54.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes
:NS0

:: 
:: HOSTS
:: 
:: If 0.0.0.0 redirects do not work properly on your computer(s) you can substitute all null strings below with default localhost:
:: 127.0.0.1
:: BONUS:
:: List below contains all known Microsoft servers one may wish to disable, but some will deactivate
:: Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about.
:: View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
:: Use with CAUTION!
:: Open 10_BLOCK.TXT (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.php

%windir%\SYSTEM32\TAKEOWN.EXE /F "%windir%\SYSTEM32\DRIVERS\ETC" /R /D Y
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /E /T /C /G Administrators:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /E /T /C /G SYSTEM:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /E /T /C /G "Authenticated Users":F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /E /T /C /G %username%:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant Administrators:F /T
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant SYSTEM:F /T
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant "Authenticated Users":F /T
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant %username%:F /T
%windir%\SYSTEM32\TAKEOWN.EXE /F "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /R /D Y
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /E /T /C /G Administrators:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /E /T /C /G SYSTEM:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /E /T /C /G "Authenticated Users":F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /E /T /C /G %username%:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /grant Administrators:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /grant SYSTEM:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /grant "Authenticated Users":F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" /grant %username%:F /T
%windir%\SYSTEM32\TAKEOWN.EXE /F "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /R /D Y
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /E /T /C /G Administrators:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /E /T /C /G SYSTEM:F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /E /T /C /G "Authenticated Users":F
ECHO Y|%windir%\SYSTEM32\CACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /E /T /C /G %username%:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /grant Administrators:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /grant SYSTEM:F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /grant "Authenticated Users":F
ECHO Y|%windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" /grant %username%:F /T
%windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL
%windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" %windir%\SYSTEM32\ATTRIB.EXE +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" >NUL
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\*HOSTS*" %windir%\SYSTEM32\ATTRIB.EXE +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS*.*" >NUL
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" %windir%\SYSTEM32\ATTRIB.EXE +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" >NUL
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS.ORI" GOTO NXT
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" HOSTS.ORI
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS"
:NXT
IF EXIST %windir%\SYSTEM32\DRIVERS\ETC\HOSTS GOTO HOST1
ECHO # >%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # THIS FILE IS OBSOLETE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All necessary tasks are executed by running E10BLOK.CMD (included)!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Must see 10_BLOCK.TXT (included) for guidelines!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Or:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.TXT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS (plain text/ASCII file):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Used in TCP/IP for mapping IP addresses (1st column) to corresponding host names (2nd column):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Hosts_(file)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Each entry must be on a separate line. Columns must be separated by at least 1 space or tab.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All lines starting with # are comments/remarks and are not processed.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # DNS itself handles localhost name resolution.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines MUST be listed FIRST in this EXACT order [IPv4 (1st) + IPv6 (2nd)]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost.localdomain>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 255.255.255.255 broadcasthost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 local>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines recommended for IPv6 protocol:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe80::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe00::0 ip6-localnet>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff00::0 ip6-mcastprefix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::1 ip6-allnodes>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::2 ip6-allrouters>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::3 ip6-allhosts>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Multicast_address>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # ENABLE/DISABLE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All servers below are disabled = redirected to 0.0.0.0 (null).>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # To (re)enable: comment/remark (precede with #) or delete desired line(s) below.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Add these 0.0.0.0 (redirected to null) IPs to your %%windir%%\SYSTEM32\DRIVERS\ETC\HOSTS file:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.pastebin.com/gebp8edd>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Edit HOSTS in Windows 7/8/8.1/10:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/easily-edit-hosts-file-windows-10/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-8/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-7/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS Guide + Tools:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Take Ownership of files + folders right-click Explorer option:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/xptoy.htm#FMNT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM ReadMe Guide:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/fmnt32.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM [2.2 MB, free]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/FMNT32.EXE>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 Take Ownership tool (freeware):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/nt6fix.php5#restfix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 [36 KB, freeware]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/zips/fix6r.zip>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Lines below disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0001.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0002.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0003.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0004.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0005.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0006.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0007.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0008.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0009.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ac3.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ad.doubleclick.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnexus.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aidps.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aka-cdn-ns.adtech.de>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 apps.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az361816.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az512334.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 bs.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdn.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cds26.ams9.msecn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 compatexchange.cloudapp.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cs1.wpc.v0cdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdp1.public-trust.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corp.sts.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 db3aqu.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 diagnostics.support.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e2835.dspb.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e8218.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7341.g.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7502.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ec.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.windows.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.microsoft-hohm.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.search.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.ws.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 flex.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 g.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 h1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 hostedocsp.globalsign.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 li581-132.members.linode.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 lb1.www.ms.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 live.rads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.hotmail.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msntest.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pre.footprintpredict.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 preview.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pricelist.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 redir.metaservices.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 s.gateway.messenger.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 schemas.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.flashtalking.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 services.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sls.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sO.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 static.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe1.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 survey.watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net:443>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.urs.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ui.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 view.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.ppe.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.go.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
:HOST1
SET NEWLINE=.^& ECHO
%windir%\SYSTEM32\FIND.EXE /C /I "a-0001.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0001.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0002.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0002.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0003.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0003.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0004.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0004.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0005.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0005.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0006.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0006.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0007.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0007.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0008.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0008.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0009.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0009.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ac3.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ac3.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ad.doubleclick.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ad.doubleclick.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnexus.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnexus.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aidps.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aidps.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aka-cdn-ns.adtech.de" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aka-cdn-ns.adtech.de)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "apps.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 apps.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az361816.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az361816.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az512334.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az512334.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "bs.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 bs.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdn.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdn.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cds26.ams9.msecn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cds26.ams9.msecn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "compatexchange.cloudapp.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 compatexchange.cloudapp.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corpext.msitadfs.glbdns2.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdnjs.cloudflare.com.cdn.cloudflare.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cs1.wpc.v0cdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cs1.wpc.v0cdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdp1.public-trust.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdp1.public-trust.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corp.sts.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corp.sts.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "db3aqu.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 db3aqu.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "diagnostics.support.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 diagnostics.support.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e2835.dspb.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e2835.dspb.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e8218.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e8218.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7341.g.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7341.g.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7502.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7502.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ec.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ec.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.windows.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.windows.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.microsoft-hohm.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.microsoft-hohm.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.search.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.search.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.ws.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.ws.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "flex.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 flex.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "g.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 g.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "h1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 h1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "hostedocsp.globalsign.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 hostedocsp.globalsign.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "li581-132.members.linode.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 li581-132.members.linode.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "lb1.www.ms.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 lb1.www.ms.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "live.rads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 live.rads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.hotmail.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.hotmail.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msnbot-65-55-108-23.search.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msnbot-65-55-108-23.search.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msntest.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msntest.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pre.footprintpredict.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pre.footprintpredict.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "preview.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 preview.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pricelist.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pricelist.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "redir.metaservices.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 redir.metaservices.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "reports.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 reports.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "s.gateway.messenger.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 s.gateway.messenger.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "schemas.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 schemas.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.flashtalking.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.flashtalking.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "services.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 services.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sls.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sls.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sO.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sO.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "static.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 static.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe1.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe1.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "survey.watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 survey.watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net:443" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net:443)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.urs.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.urs.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ui.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ui.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "view.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 view.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-bn2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-cy2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.ppe.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.ppe.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.go.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.go.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS

:: 
:: Stop + Uninstall Get Windows 10 (GWX), unwanted mandatory updates + spyware:
:: 

:: Stop + Uninstall Get Windows 10 (GWX), spyware, telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
%windir%\SYSTEM32\TASKKILL.EXE /IM GWX.exe /T /F >NUL
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXUXWorker.exe /T /F >NUL
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXConfigManager.exe /T /F >NUL
%windir%\SYSTEM32\TASKKILL.EXE /IM consent.exe /T /F >NUL
IF NOT EXIST %windir%\SYSTEM32\WUSA.EXE GOTO END
:: KB2952664: Get Windows 10 (GWX) Assistant:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2952664 /quiet /norestart
:: KB2990214: Get Windows 10 (GWX):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2990214 /quiet /norestart
:: KB3012973: Upgrade to Windows 10 Pro:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3012973 /quiet /norestart
:: KB3021917: Performance Improvements Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3021917 /quiet /norestart
:: KB3022345: Customer Experience and Diagnostic Telemetry Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3022345 /quiet /norestart
:: KB3035583: Get Windows 10 (GWX) App:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3035583 /quiet /norestart
:: KB3044374: Get Windows 10 (GWX) Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3044374 /quiet /norestart
:: KB3068708: Customer Experience and Diagnostic Telemetry Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3068708 /quiet /norestart
:: KB3075249: Telemetry Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075249 /quiet /norestart
:: KB3080149: Customer Experience and Diagnostic Telemetry Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3080149 /quiet /norestart
:: KB3112343: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3112343 /quiet /norestart
:: KB3083711: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083711 /quiet /norestart
:: KB3083325: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083325 /quiet /norestart
:: KB3075853: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075853 /quiet /norestart
:: KB3072318: OOBE Update to upgrade to Windows 10:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3072318 /quiet /norestart
:: KB3065988: Windows Update Client (WUC):
:: START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3065988 /quiet /norestart
:: KB3064683: OOBE Update to upgrade to Windows 10:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3064683 /quiet /norestart
:: KB3058168: Activate Windows 10 from Hosts Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3058168 /quiet /norestart
:: KB3050267: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3050267 /quiet /norestart
:: KB2976978: Compatibility Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2976978 /quiet /norestart
:: KB2977759: Compatibility Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2977759 /quiet /norestart
:: KB3081954: Work Folders Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3081954 /quiet /norestart
:: KB3123862: Upgrade Capability Update:
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3123862 /quiet /norestart
:: KB3138612: Windows Update Client (WUC):
START "title" /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3138612 /quiet /norestart
:: TIMEOUT 3

:: 

:END
:: EXIT

Back 2 Top

MDGx MAX Speed WinDOwS

MDGx