@ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END ::  ::  MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016  ::  :: Must see 10_BLOCK.TXT (included) for guidelines! :: http://www.mdgx.com/10BLK/10_BLOCK.php :: Or: :: http://www.mdgx.com/10BLK/10_BLOCK.TXT COLOR 17 ECHO. ECHO.  ECHO.  Wait! This will take a while...  ECHO.  ECHO. ::  :: Run all 10_BLOCK.* files (.CMD + .EXE) as Administrator: ::  IF NOT EXIST "%TEMP%\10_BLOCK.CMD" GOTO ADMt %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMt IF NOT EXIST "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" GOTO ADMp %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMp IF NOT EXIST "%USERPROFILE%\Downloads\10_BLOCK.CMD" GOTO ADMu %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMu ::  :: Verify if logged on user is Administrator: ::  :: %windir%\SYSTEM32\openfiles.exe 1 >NUL 2>&1 :: IF NOT %errorlevel% equ 0 ( :: ECHO You are not logged in as Administrator! :: ECHO You MUST: Open Explorer -> right-click this file -> Run as Administrator. :: PAUSE :: EXIT 1 :: ) else ( SETLOCAL :: User Account Control (UAC) check + Auto-Elevate Permissions 2 Admin level :: Check for permissions... >NUL 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" :: If error flag already set we do not have admin. :-( IF '%errorlevel%' NEQ '0' ( ECHO: ECHO Requesting Administrative Privileges... ECHO When UAC prompt opens press YES to Continue ECHO: GOTO UACPrompt ) else (GOTO gotAdmin) :UACPrompt ECHO SET UAC=CreateObject^("Shell.Application"^)>"%temp%\GetAdm!.vbs" ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%temp%\GetAdm!.vbs" "%temp%\GetAdm!.vbs" EXIT /B :gotAdmin IF EXIST "%temp%\GetAdm!.vbs" (DEL "%temp%\GetAdm!.vbs") PUSHD "%CD%" CD /D "%~dp0" ::  :: Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers": ::  IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO NT0 IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO NT0 :: Disable Diagnostics Tracking (DiagTrack) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagtrack %windir%\SYSTEM32\SC.EXE config diagtrack START= disabled :: Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagnosticshub.standardcollector.service %windir%\SYSTEM32\SC.EXE config diagnosticshub.standardcollector.service START= disabled :: Disable WAP Push Message Routing (DmWAPPush) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP dmwappushservice %windir%\SYSTEM32\SC.EXE config dmwappushservice START= disabled :: Disable Retail Demo (RetailDemo) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RetailDemo %windir%\SYSTEM32\SC.EXE config RetailDemo START= disabled :: Disable Windows Event Collector (WECSvc) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP Wecsvc %windir%\SYSTEM32\SC.EXE CONFIG Wecsvc START= disabled :: Disable Remote Registry (RemoteRegistry) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RemoteRegistry %windir%\SYSTEM32\SC.EXE CONFIG RemoteRegistry START= disabled :: Disable One Drive (OneSyncSvc) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP OneSyncSvc %windir%\SYSTEM32\SC.EXE CONFIG OneSyncSvc START= disabled %windir%\SYSTEM32\REG.EXE add"HKLM\SYSTEM\CurrentControlSet\Services\OneSyncSvc_Session1" /v "Start" /t REG_DWORD /d 4 /f >NUL 2>&1 :NT0 ECHO "" > %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl ECHO Y|%windir%\SYSTEM32\CACLS.EXE %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl /d SYSTEM %windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "AutoLogger-Diagtrack-Listener" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "SQMLogger" /f >NUL 2>&1 :: Disable automatic/pushed (without permission) installation + display of ads/suggested apps from Start menu: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenOverlayEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" policies: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable WiFi Sense, AutoUpdate, Defender SpyNet, Office + Diagnostics logging + reporting: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseCredShared" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseOpen" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "IncludeRecommendedUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "EnableFeaturedSoftware" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SpyNetReporting" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy" /v "EnableQueryRemoteServer" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "Disable Performance Counters" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Remove spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" folders from My PC: %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f >NUL 2>&1 :: Disable Automatic Computer Maintenance tasks: :: http://www.winaero.com/blog/disable-computer-maintenance-windows-10/ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\ScheduledDiagnostics" /v "EnabledExecution" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Edge (Spartan) web browser ads: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxCacheTtl" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxNegativeCacheTtl" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Enable Advanced Explorer View tweaks: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable Advanced Explorer View automatic/pushed (without permission) of ads/suggested apps: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Windows Update P2P: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Cortana in Search: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Remove "Is Shortcut": %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "link" /t REG_BINARY /d 0 /f >NUL 2>&1 :: Explorer remove OneDrive icon: %windir%\SYSTEM32\REG.EXE ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1 ::  :: Disable "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks: ::  IF NOT EXIST %windir%\SYSTEM32\SCHTASKS.EXE GOTO SCH %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\AitAgent" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Autochk\Proxy" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Maintenance\WinSAT" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ehDRMInit" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\InstallPlayReady" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\mcupdate" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURActivate" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURDiscovery" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscovery" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrScheduleTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\RegisterSearch" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\UpdateRecordPath" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Time-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\PI\Sqm-Tasks" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /DISABLE :SCH ::  :: Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016: ::  %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx" /v "DisableGwx" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gwx.exe" /v "Debugger" /t REG_SZ /d "systray.exe" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "ElevateNonAdmins" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableOSUpgrade" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "AllowOSUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "ReservationsAllowed" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeState" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeStateTimeStamp" /t REG_SZ /d "2015-09-09 09:09:09" /f >NUL 2>&1 ::  :: OPTIONAL: Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]: ::  %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "AutoInstallMinorUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1 :: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoRebootWithLoggedOnUsers" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAUAsDefaultShutdownOption" /t REG_DWORD /d 1 /f >NUL 2>&1 :: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable reinstall (of undesired) Windows Updates + Drivers: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "DontSearchWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 1 /f >NUL 2>&1 ::  :: Uninstall OneDrive: ::  %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSync" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1 SET x86="%SYSTEMROOT%\System32\OneDriveSetup.exe" SET x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe" %windir%\SYSTEM32\TASKKILL.EXE /IM OneDrive.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1 IF EXIST %x64% ( %x64% /uninstall ) else ( %x86% /uninstall ) %windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1 RD "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1 RD "C:\OneDriveTemp" /Q /S >NUL 2>&1 RD "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1 RD "%ProgramData%\Microsoft OneDrive" /Q /S >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1 ::  :: Internet Explorer (IE) 9/10/11/newer Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade: ::  %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Geolocation" /v "BlockAllWebsites" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 ::  :: OPTIONAL: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS with many IPs: ::  :: Open STOP!DNS.CMD + STARTDNS.CMD (included) in Notepad for details: :: http://www.mdgx.com/10BLK/10_BLOCK.ZIP :: More info: :: http://www.mdgx.com/hosts.php#N2 IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO DN$ IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO DN$ :: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP DNSCache :: %windir%\SYSTEM32\SC.EXE CONFIG DNSCache START= disabled :DN$ ::  :: Block Spyware, Tracking + Telemetry using Windows Firewall: ::  IF NOT EXIST %windir%\SYSTEM32\NETSH.EXE GOTO NS0 %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_134.170.30.202" dir=out action=block remoteip=134.170.30.202 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_137.116.81.24" dir=out action=block remoteip=137.116.81.24 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_157.56.106.189" dir=out action=block remoteip=157.56.106.189 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_184.86.53.99" dir=out action=block remoteip=184.86.53.99 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.43" dir=out action=block remoteip=2.22.61.43 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.66" dir=out action=block remoteip=2.22.61.66 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.39.117.230" dir=out action=block remoteip=65.39.117.230 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.52.108.33" dir=out action=block remoteip=65.52.108.33 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_64.4.54.254" dir=out action=block remoteip=64.4.54.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes :NS0 ::  :: NTFS Long Path ::  :: Enable NTFS long path (> 260 characters) option: :: http://www.superuser.com/questions/1119883/ :: http://www.howtogeek.com/266621/ :: http://www.winaero.com/blog/how-to-enable-ntfs-long-paths-in-windows-10/ :: NFR 4.6.2 and long paths in Windows 10: :: http://blogs.msdn.microsoft.com/jeremykuhne/2016/07/30/net-4-6-2-and-long-paths-on-windows-10/ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{48981759-12F2-42A6-A048-028B3973495F}Machine\System\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 ::  :: HOSTS ::  :: If 0.0.0.0 redirects do not work properly on your computer(s) you can substitute all null strings below with default localhost: :: 127.0.0.1 :: BONUS: :: List below contains all known Microsoft servers one may wish to disable, but some will deactivate :: Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about. :: View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly. :: Use with CAUTION! :: Open 10_BLOCK.TXT (included) in Notepad for details: :: http://www.mdgx.com/10BLK/10_BLOCK.php IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SYSTEM32\DRIVERS\ETC" /r /d y >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SysWOW64\DRIVERS\ETC" /r /d y >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SysWOW64\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS.ORI" GOTO NXT IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" HOSTS.ORI IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" HOSTS.ORI IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" :NXT IF EXIST %windir%\SYSTEM32\DRIVERS\ETC\HOSTS GOTO HOST1 ECHO # >%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # THIS FILE IS OBSOLETE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All necessary tasks are executed by running E10BLOK.CMD (included)!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Must see 10_BLOCK.TXT (included) for guidelines!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/10BLK/10_BLOCK.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Or:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/10BLK/10_BLOCK.TXT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx HOSTS (plain text/ASCII file):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Used in TCP/IP for mapping IP addresses (1st column) to corresponding host names (2nd column):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Hosts_(file)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Each entry must be on a separate line. Columns must be separated by at least 1 space or tab.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All lines starting with # are comments/remarks and are not processed.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # DNS itself handles localhost name resolution.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Next lines MUST be listed FIRST in this EXACT order [IPv4 (1st) + IPv6 (2nd)]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 localhost.localdomain>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 255.255.255.255 broadcasthost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 local>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Next lines recommended for IPv6 protocol:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO fe80::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO fe00::0 ip6-localnet>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff00::0 ip6-mcastprefix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::1 ip6-allnodes>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::2 ip6-allrouters>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::3 ip6-allhosts>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Multicast_address>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # ENABLE/DISABLE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All servers below are disabled = redirected to 0.0.0.0 (null).>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # To (re)enable: comment/remark (precede with #) or delete desired line(s) below.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Add these 0.0.0.0 (redirected to null) IPs to your %%windir%%\SYSTEM32\DRIVERS\ETC\HOSTS file:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.pastebin.com/gebp8edd>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Edit HOSTS in Windows 7/8/8.1/10:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/easily-edit-hosts-file-windows-10/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/edit-hosts-file-windows-8/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/edit-hosts-file-windows-7/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx HOSTS Guide + Tools:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Take Ownership of files + folders right-click Explorer option:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/xptoy.htm#FMNT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FM ReadMe Guide:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/fmnt32/fmnt32.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FM [2.2 MB, free]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/fmnt32/FMNT32.EXE>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FixNT6 Take Ownership tool (freeware):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.jsware.net/jsware/nt6fix.php5#restfix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FixNT6 [36 KB, freeware]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.jsware.net/jsware/zips/fix6r.zip>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Lines below disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0001.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0002.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0003.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0004.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0005.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0006.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0007.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0008.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0009.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads2.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ac3.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ad.doubleclick.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads1.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 adnexus.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 aidps.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 aka-cdn-ns.adtech.de>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 apps.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 az361816.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 az512334.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 bs.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 c.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 c.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdn.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cds26.ams9.msecn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 choice.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 choice.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 compatexchange.cloudapp.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cs1.wpc.v0cdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdp1.public-trust.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 corp.sts.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 db3aqu.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 diagnostics.support.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e2835.dspb.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e8218.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e7341.g.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e7502.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ec.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.windows.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.microsoft-hohm.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.search.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 fe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 fe2.ws.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 flex.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 g.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 h1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 hostedocsp.globalsign.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 i1.services.social.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 li581-132.members.linode.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 lb1.www.ms.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 live.rads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 m.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 m.hotmail.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msntest.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 oca.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 pre.footprintpredict.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 preview.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 pricelist.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 rad.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 redir.metaservices.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 s.gateway.messenger.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 schemas.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 secure.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 secure.flashtalking.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 services.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 settings-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 settings-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sls.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sO.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 static.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe2.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe1.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 survey.watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telecommand.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.appex.bing.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.appex.bing.net:443>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.urs.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ui.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 view.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.ppe.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 www.go.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 www.msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS :HOST1 SET NEWLINE=.^& ECHO %windir%\SYSTEM32\FIND.EXE /C /I "a-0001.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0001.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0002.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0002.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0003.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0003.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0004.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0004.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0005.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0005.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0006.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0006.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0007.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0007.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0008.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0008.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0009.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0009.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ac3.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ac3.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ad.doubleclick.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ad.doubleclick.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads1.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "adnexus.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnexus.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "aidps.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aidps.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "aka-cdn-ns.adtech.de" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aka-cdn-ns.adtech.de)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "apps.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 apps.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "az361816.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az361816.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "az512334.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az512334.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "bs.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 bs.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "c.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "c.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdn.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdn.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cds26.ams9.msecn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cds26.ams9.msecn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "compatexchange.cloudapp.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 compatexchange.cloudapp.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "corpext.msitadfs.glbdns2.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdnjs.cloudflare.com.cdn.cloudflare.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cs1.wpc.v0cdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cs1.wpc.v0cdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdp1.public-trust.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdp1.public-trust.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "corp.sts.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corp.sts.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "db3aqu.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 db3aqu.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "diagnostics.support.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 diagnostics.support.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e2835.dspb.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e2835.dspb.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e8218.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e8218.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e7341.g.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7341.g.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e7502.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7502.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ec.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ec.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.windows.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.windows.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.microsoft-hohm.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.microsoft-hohm.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.search.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.search.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "fe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "fe2.ws.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.ws.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "flex.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 flex.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "g.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 g.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "h1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 h1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "hostedocsp.globalsign.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 hostedocsp.globalsign.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "li581-132.members.linode.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 li581-132.members.linode.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "lb1.www.ms.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 lb1.www.ms.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "live.rads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 live.rads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "m.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "m.hotmail.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.hotmail.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msnbot-65-55-108-23.search.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msnbot-65-55-108-23.search.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msntest.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msntest.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "pre.footprintpredict.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pre.footprintpredict.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "preview.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 preview.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "pricelist.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pricelist.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "rad.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "redir.metaservices.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 redir.metaservices.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "reports.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 reports.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "s.gateway.messenger.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 s.gateway.messenger.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "schemas.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 schemas.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "secure.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "secure.flashtalking.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.flashtalking.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "services.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 services.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "settings-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "settings-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sls.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sls.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sO.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sO.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "static.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 static.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe1.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe1.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "survey.watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 survey.watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net:443" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net:443)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.urs.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.urs.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ui.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ui.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "view.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 view.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-bn2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-cy2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.ppe.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.ppe.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "www.go.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.go.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "www.msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ::  :: Stop + Uninstall Get Windows 10 (GWX), unwanted mandatory updates + spyware: ::  :: Stop + Uninstall Get Windows 10 (GWX), spyware, telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers": %windir%\SYSTEM32\TASKKILL.EXE /IM GWX.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM GWXUXWorker.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM GWXConfigManager.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM consent.exe /T /F >NUL 2>&1 :: Stop customer experience + cortana search: %windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /r /d y %windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q %windir%\SYSTEM32\TASKKILL.EXE /IM ShellExperienceHost.exe /T /F >NUL 2>&1 MOVE /Y "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy.000" %windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /r /d y %windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q %windir%\SYSTEM32\TASKKILL.EXE /IM SearchUI.exe /T /F >NUL 2>&1 MOVE /Y "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.000" IF NOT EXIST %windir%\SYSTEM32\WUSA.EXE GOTO END :: KB971033: Windows Activation Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:971033 /quiet /norestart >NUL 2>&1 :: KB2952664: Get Windows 10 (GWX) Assistant: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2952664 /quiet /norestart >NUL 2>&1 :: KB2990214: Get Windows 10 (GWX): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2990214 /quiet /norestart >NUL 2>&1 :: KB3012973: Upgrade to Windows 10 Pro: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3012973 /quiet /norestart >NUL 2>&1 :: KB3021917: Performance Improvements Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3021917 /quiet /norestart >NUL 2>&1 :: KB3022345: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3022345 /quiet /norestart >NUL 2>&1 :: KB3035583: Get Windows 10 (GWX) App: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3035583 /quiet /norestart >NUL 2>&1 :: KB3044374: Get Windows 10 (GWX) Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3044374 /quiet /norestart >NUL 2>&1 :: KB3068708: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3068708 /quiet /norestart >NUL 2>&1 :: KB3075249: Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075249 /quiet /norestart >NUL 2>&1 :: KB3080149: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3080149 /quiet /norestart >NUL 2>&1 :: KB3112343: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3112343 /quiet /norestart >NUL 2>&1 :: KB3083711: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083711 /quiet /norestart >NUL 2>&1 :: KB3083325: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083325 /quiet /norestart >NUL 2>&1 :: KB3075853: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075853 /quiet /norestart >NUL 2>&1 :: KB3072318: OOBE Update to upgrade to Windows 10: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3072318 /quiet /norestart >NUL 2>&1 :: KB3065988: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3065988 /quiet /norestart >NUL 2>&1 :: KB3064683: OOBE Update to upgrade to Windows 10: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3064683 /quiet /norestart >NUL 2>&1 :: KB3058168: Activate Windows 10 from Hosts Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3058168 /quiet /norestart >NUL 2>&1 :: KB3050267: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3050267 /quiet /norestart >NUL 2>&1 :: KB2976978: Compatibility Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2976978 /quiet /norestart >NUL 2>&1 :: KB2977759: Compatibility Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2977759 /quiet /norestart >NUL 2>&1 :: KB3081954: Work Folders Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3081954 /quiet /norestart >NUL 2>&1 :: KB3123862: Upgrade Capability Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3123862 /quiet /norestart >NUL 2>&1 :: KB3138612: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3138612 /quiet /norestart >NUL 2>&1 :: KB3172605: July 2016 Update Rollup: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3172605 /quiet /norestart >NUL 2>&1 TIMEOUT /T 5 /NOBREAK ::  :END :: EXIT