MDGx MAX Speed WinDOwS
MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016

Win10 Privacy Reddit

    10_BLOCK  MDGx Win10 Block Tools (10_BLOCK) [53.47 KB, ZIPped archive, free, unsupported].
    Brief Guide must view 1st!
    10_BLOCK.ZIP files in plain text (ASCII) format:List of files inside 10_BLOCK.ZIP archive.
    Complete list of files in 10_BLOCK directory.
    MDGx Win10 Block Tools (10_BLOCK) are also part of W95-11D.EXE + W95-11D.ZIP.
    More info.
    More tools.
    Comparison of Windows 10 Privacy tools.
    Windows 10 looks like this.
Contents: TXT | CMD

10_BLOCK.TXT = ReadMe Text (TXT) Guide must view 1st!


 MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016 


THE GIST
********

* MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016
stop automatic (forced!) upgrade to Windows 10 > 1-1-2016 [uninstall "Get
Windows 10" (GWX) update] and disable all spyware: telemetry ("phone home"),
data collection/logging, customer experience + unwanted "offers", eliminating
Microsoft annoyances and restoring online privacy [120 KB, ZIPped archive,
free, unsupported]:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
Brief Guide:
http://www.mdgx.com/xptoy.htm#10BLK
This ReadMe TXT Guide => must view 1st!
http://www.mdgx.com/10BLK/10_BLOCK.php
ZIP archive contents:
* 10_BLOCK.HTM (HTML ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.php
* 10_BLOCK.TXT (Text ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.TXT
* 10_BLOCK.CMD (Windows Command Script):
http://www.mdgx.com/10BLK/10_BLOCK.CMD
View as plain text:
http://www.mdgx.com/10BLK/10_BLOCK.CMD.TXT
* E10BLOK.CMD (Windows Command Script) executed by 10_BLOCK.CMD (see above):
http://www.mdgx.com/10BLK/E10BLOK.CMD
View as plain text:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
* ELEVATE.EXE (EXEcutable) Elevate 32-bit command line tool which runs E10BLOK.CMD as Administrator in 32-bit (x86) Windows:
http://code.kliu.org/misc/elevate/
* ELEVAT64.EXE (EXEcutable) Elevate 64-bit command line tool which runs E10BLOK.CMD as Administrator in 64-bit (x64) Windows:
http://code.kliu.org/misc/elevate/
* ELEVATE.TXT (ReadMe 1st Text Guide) for ELEVATE.EXE + ELEVAT64.EXE (all included in 10_BLOCK.ZIP):
http://www.mdgx.com/10BLK/ELEVATE.TXT
* Stop DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STOP!DNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
* Start DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STARTDNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
List of files inside archive 10_BLOCK.ZIP:
http://www.mdgx.com/10BLK/10_list.php
Complete list of files in 10_BLOCK directory:
http://www.mdgx.com/10BLK/list.php
MDGx Win10 Block Tools (10_BLOCK) (ZIP Archive File):
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
are also part of W95-11D.EXE + W95-11D.ZIP:
http://www.mdgx.com/95.htm
More info:
http://www.privacytools.io/#win10
More tools:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png

USAGE => STEP-BY-STEP
*********************

1. Use an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to open ZIP archive and extract all files from 10_BLOCK.ZIP into the same directory/folder.
2. Open Explorer -> go to Downloads folder (default location) -> right-click 10_BLOCK.CMDn (Windows Command Script) -> Run as Administrator -> wait for batch file to complete -> restart Windows.
3. Done. ;-/

ONLINE
******

* Reddit [must be logged in to view post = Reddit membership is free]:
http://www.reddit.com/r/windows/comments/3v2f45/
http://redd.it/3v2f45/

UPDATES
*******

* Added ELEVAT64.EXE + ELEVATE.EXE [Elevate 64-bit + 32-bit EXEcutables] +
ELEVATE.TXT [Elevate TXT Guide] to run 10_BLOCK.CMD, which in turn runs
E10BLOK.CMD with elevated Administrator privileges, even if logged on user has
reduced rights (below Administrator level), to ensure all fixes work properly.
See ELEVATE.TXT (included) for details:
http://www.mdgx.com/10BLK/ELEVATE.TXT



Similar Windows 7/8/8.1/2012/10/2016 Anti-Spyware/Privacy Tools
***************************************************************
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Comparison of Windows 10 Privacy tools:
http://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/

MANDATORY:
Must run/execute/open all these apps/programs/installers (EXE)/scripts (BAT, CMD, REG, VBS)
with the Explorer/shortcut right-click Run as Administrator option!

* Blackbird 32-bit + 64-bit (free):
Guide:
http://www.getblackbird.net/documentation/
Program:
http://www.getblackbird.net/
ReadMe:
http://www.getblackbird.net/documentation/
File:
http://www.getblackbird.net/download/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "blackbird.exe" (Application) -> Run as Administrator -> select options.

* FixWin for Windows 10 (freeware):
http://www.thewindowsclub.com/fixwin-for-windows-10/
Guide:
http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/
Program:
http://www.thewindowsclub.com/downloading-fixwin-10/
ReadMe:
http://www.thewindowsclub.com/list-of-fixes-available-in-fixwin-10/
File:
http://www.thewindowsclub.com/downloads/FixWin10.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "FixWin 10.1.exe" (Application) -> Run as Administrator.

* I Don't Want Windows 10 (free, open source):
Guide:
http://www.msfn.org/board/topic/173961-windows-10-gwx-update-removal-tool-for-windows-7-and-windows-81/
Program:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/
ReadMe:
http://github.com/rn10950/I-Dont-Want-Windows-10/
File:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/download/4.0/I_Dont_Want_Windows_10_v4.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "I Don't Want Windows 10.exe" (Application) -> Run as Administrator.

* WindowsSpyBlocker (free, open source):
Guide:
http://www.ghacks.net/2016/05/15/windows-spy-blocker-review/
Program:
http://github.com/crazy-max/WindowsSpyBlocker/
ReadMe:
http://github.com/crazy-max/WindowsSpyBlocker/wiki/
File:
http://github.com/crazy-max/WindowsSpyBlocker/releases/
Usage:
Open Explorer -> right-click "WindowsSpyBlocker.exe" (Application) -> Run as Administrator -> select options.

* DisableWinTracking (free, open source):
Guide:
http://www.privacytools.io/#win10
Program:
http://github.com/10se1ucgo/DisableWinTracking/
ReadMe:
http://github.com/10se1ucgo/DisableWinTracking/releases/
File:
http://github.com/10se1ucgo/DisableWinTracking/releases/download/v2.5.1/disablewintracking.exe
Usage:
Open Explorer -> right-click "disablewintracking.exe" (Application) -> Run as Administrator -> check "Privacy" -> press Go.

* Destroy Windows Spying (DWS) (free, open source):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/
File:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/download/1.6.722/DWS_Lite.exe
Usage:
Open Explorer -> right-click "DWS_Lite.exe" (Application) -> Run as Administrator.

* O&O ShutUp10 (freeware):
Guide:
http://www.dottech.org/185920/
Program:
http://www.oo-software.com/shutup10/
File:
http://dl5.oo-software.com/files/ooshutup10/OOSU10.exe
Usage:
Open Explorer -> right-click "OOSU10.exe" (Application) -> Run as Administrator.

* Win10 Spy Disabler (freeware):
Guide:
http://www.site2unblock.com/win10-spy-disabler/
Program:
http://www.site2unblock.com/win10-spy-disabler/
File:
http://www.site2unblock.com/download/win10-spy-disabler-portable.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win10 Spy Disabler" shortcut inside installed folder -> Run as Administrator -> select options.

* Windows Privacy Tweaker (freeware):
Guide:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
Program:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
File:
http://www.phrozensoft.com/uploads/2016/01/WindowsPrivacyTweakerV2.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Windows Privacy Tweaker.exe" (Application) -> Run as Administrator.

* W10Privacy (freeware + donationware):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://www.winprivacy.de/english-home/
File:
http://www.winprivacy.de/app/download/12302828636/W10Privacy.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "W10Privacy.exe" (Application) -> Run as Administrator.

* Win.Privacy Beta (freeware):
Guide:
http://windotprivacy.co.nf/
Program:
http://windotprivacy.co.nf/
File:
http://www.majorgeeks.com/files/details/win_privacy.html
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win.Privacy.exe" (Application) -> Run as Administrator.

* WinPurify (freeware):
Guide:
http://www.majorgeeks.com/files/details/winpurify.html
Program:
http://www.winpurify.xyz/
File:
http://www.winpurify.xyz/WinPurify.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WinPurify.exe" (Application) -> Run as Administrator.

* Spybot Anti-Beacon for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/spybot_anti_beacon_for_windows_10.html
Program:
http://forums.spybot.info/showthread.php?72686
ReadMe:
http://forums.spybot.info/downloads.php?id=58
File:
http://download.spybot.info/AntiBeacon/StandAlone/SDAntiBeacon-1.5.exe
Usage:
Open Explorer -> right-click "SDAntiBeacon-1.5.exe" (Application) -> Run as Administrator.

* Ashampoo AntiSpy for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/ashampoo_antispy_for_windows_10.html
Program:
http://www.ashampoo.com/en/usd/pin/1004/security-software/Antispy-for-Windows-10/
ReadMe:
http://www.ashampoo.com/en/usd/pde/1004/security-software/Antispy-for-Windows-10/
File:
http://cdn1.ashampoo.net/public/ashf/1004/Ashampoo_AntiSpy.exe
Usage:
Open Explorer -> right-click "Ashampoo_AntiSpy.exe" (Application) -> Run as Administrator.

* Win10 SpyStop (freeware):
Guide:
http://www.majorgeeks.com/files/details/win10_spystop.html
Program:
http://www.evorim.com/en/
File:
http://www.evorim.com/win10spystop/win10spystop-x32-setup.exe
Usage:
Open Explorer -> right-click "win10spystop-x32-setup.exe" (Application) -> Run as Administrator.

* DoNotSpy10 (freeware: adware! + donationware):
Guide:
http://www.bleepingcomputer.com/forums/t/586731/
Program:
http://www.pxc-coding.com/portfolio/donotspy10/
ReadMe:
http://www.pxc-coding.com/portfolio/donotspy10/
File:
http://www.pxc-coding.com/downloads/donotspy10/DoNotSpy10-1.1.0.0-Setup.exe
Usage:
1. Open Explorer -> right-click "DoNotSpy10-1.1.0.0-Setup.exe" (Application) -> Run as Administrator.
2. Open Explorer -> right-click "DoNotSpy10" shortcut inside installed folder -> Run as Administrator -> select options.

* Never10 (freeware):
Guide:
http://www.grc.com/never10/details.htm
Program:
http://www.grc.com/never10.htm
ReadMe:
http://www.grc.com/never10.htm
File:
http://www.grc.com/files/never10.exe
Usage:
Open Explorer -> right-click "never10.exe" (Application) -> Run as Administrator.

* Windows 10 Rollback Utility (freeware):
Guide:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Program:
http://www.neosmart.net/Win10Rollback/
ReadMe:
http://www.neosmart.net/Win10Rollback/
File:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Usage:
1. Burn "Windows 10 Rollback Utility.iso" (ISO File) on blank/empty CD-R/DVD-R/BD-R/USB media.
2. Reboot from CD-R/DVD-R/BD-R/USB disc/stick.
3. Follow instructions to revert (roll) back to previous Windows 7/8/8.1 OS (if any).

* Aegis CMD script (free, open source):
Guide:
http://www.ghacks.net/2016/01/26/block-all-windows-10-components-on-windows-7-and-8/
Program:
http://www.voat.co/v/technology/comments/459263/
ReadMe:
http://github.com/th3power/aegis-voat/
File:
http://github.com/th3power/aegis-voat/archive/v1.10.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "aegis.cmd" (Windows Command Script) -> Run as Administrator.

* GWX Control Panel (freeware):
Guide:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
Program:
http://www.ultimateoutsider.com/downloads/
ReadMe:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
File:
http://www.ultimateoutsider.com/downloads/GwxControlPanelSetup.exe
Usage:
1. Open Explorer -> right-click "GwxControlPanelSetup.exe" (Application) -> Run as Administrator.
2. Open Explorer -> right-click "GWX Control Panel" shortcut inside installed folder -> Run as Administrator -> select options.

* 10AppsManager (freeware):
Guide:
http://www.majorgeeks.com/files/details/10appsmanager.html
Program:
http://www.thewindowsclub.com/10appsmanager-windows-10/
ReadMe:
http://www.thewindowsclub.com/10appsmanager-windows-10/
File:
http://www.thewindowsclub.com/downloading-10appsmanager/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "10AppsManager.exe" (Application) -> Run as Administrator.

* Windows X App Remover (free, open source):
Guide:
http://sourceforge.net/projects/windows8appremover/
Program:
http://mademan.bplaced.net/page/winxar.html
ReadMe:
http://winxappremover.codeplex.com/
File:
http://www.f-tools.eu/downloads/counter/winxar.php
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WindowsXAppRemover.exe" (Application) -> Run as Administrator.

* Uninstall Cortana from Windows 10 CMD script (freeware):
Guide:
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
Program:
http://www.winaero.com/download.php?view.1832
File:
http://www.winaero.com/request.php?1832
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Uninstall Cortana.cmd" (Windows Command Script) -> Run as Administrator.

* Edge Blocker (freeware):
Guide:
http://www.sordum.org/9312/
Program:
http://www.sordum.org/9312/
File:
http://www.sordum.org/files/small-tools/EdgeBlock.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "EdgeBlock.exe" (Application) -> Run as Administrator.

* Debloat Windows 10 (free, open source):
Guide:
http://github.com/W4RH4WK/Debloat-Windows-10
Program:
http://github.com/W4RH4WK/Debloat-Windows-10
File:
http://github.com/W4RH4WK/Debloat-Windows-10/archive/master.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Follow instructions in README.md -> enable execution of PowerShell scripts ->
run PowerShell as Administrator -> run all included scripts -> restart computer.



Disable/Reenable User Account Control (UAC)
*******************************************

Windows Vista/2008/7/8/8.1/2012/10/2016 users: right-click each file in Windows/File Explorer -> select
Run as Administrator (temporary fix) or disable User Account Control (UAC) (permanent fix) in:
- Windows 10/2016:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/2008 R2:
http://www.petri.com/disable-uac-in-windows-7.htm
- Windows Vista/2008:
http://www.petri.com/disable_uac_in_windows_vista.htm

Free(ware) tools to disable/reenable UAC:
- UAC Pass:
http://sites.google.com/site/freeavvarea/UACPass-en/
- UAC Tweak:
http://www.askvg.com/uac-tweak-a-small-cute-utility-to-tweak-uac-user-account-control-in-windows-vista/
- TweakUAC:
http://www.majorgeeks.com/files/details/tweakuac.html
- Disable UAC:
http://www.disableuac.com/
FYI:
MDGx Tweaked + Customized File Manager (FM) installer FMNT32.EXE (free):
http://www.mdgx.com/xptoy.htm#FMNT
also installs "Disable User Account Control (UAC)" + "Enable User Account
Control (UAC)" items to Desktop right-click shell context menu. For details
open TAKEOWN.INF + TAKEOWN.REG (both in C:\FileMan) using Notepad or better
Notepad replacement [free(ware)]:
http://www.mdgx.com/toy.htm#TXT



Restore/Install Windows 7 SP1/8/8.1 or Switch to Linux (free + safe)
********************************************************************

* Strongly Recommended:
Windows 10 users: 30 days after Windows 10 was installed (mostly by force, behind your back, without your knowledge!)
on your computer(s)/laptop(s) you still have the option to restore/(re)install your (previous) operating system (OS):
Windows 7 SP1, 8 or 8.1:
MSKB:
http://support.microsoft.com/help/4027936/
How-To Geek:
http://www.howtogeek.com/220723/
PC Advisor:
http://www.pcadvisor.co.uk/how-to/windows/how-downgrade-windows-10-to-windows-7-8-easy-3615606/

* Or Switch to Linux (free + safe):
Switch to Linux... The Free OS:
http://www.mdgx.com/linux.htm
How to Move from Windows to Linux in 8 steps:
http://www.wikihow.com/Move-from-Windows-to-Linux/
How to Switch from Windows to Ubuntu in 7 steps (example):
http://www.wikihow.com/Switch-to-Ubuntu/
10 Reasons Why You Should Switch To Linux:
http://itsfoss.com/reasons-switch-linux-windows-xp/
Switch to Netrunner Linux distro (example):
http://www.betanews.com/2019/01/14/netrunner-blackbird-linux-win7/
Is Windows 10 Conditioning Us for a Microsoft Linux OS?
http://www.redmondmag.com/articles/2017/09/13/is-windows-10-conditioning-us-linux.aspx



Windows 10 = Spyware + Privacy Nightmare
****************************************

WTF Microsoft: For months Microsoft hid that Registry backup no longer worked while Windows 10 reported it as successfully completed:
http://www.computerworld.com/article/3406846/wtf-microsoft.html
Microsoft Issues Warning for 800 Million Windows 10 Users:
http://www.forbes.com/sites/gordonkelly/2019/06/29/microsoft-windows-10-upgrade-registry-warning-upgrade-windows/
Microsoft explains the lack of Registry backups in Windows 10:
http://www.ghacks.net/2019/06/29/microsoft-explains-the-lack-of-registry-backups-in-windows-10/
Don't use Windows 10 - It's a privacy nightmare:
http://www.privacytools.io/#win10
What Windows 10's "Privacy Nightmare" Settings Actually Do:
http://www.lifehacker.com/1722267229/
Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings:
http://www.thehackernews.com/2016/02/microsoft-windows10-privacy.html
Even when told not to Windows 10 just can't stop talking to Microsoft:
http://www.arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/
From the horse's mouth: Microsoft Windows 10 License Terms:
http://www.microsoft.com/en-us/useterms/retail/windows/10/useterms_retail_windows_10_english.htm
Windows 10 doesn't offer much privacy by default: Here's how to fix it:
http://www.arstechnica.com/information-technology/2015/08/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it/
Microsoft may be collecting more data than initially thought:
http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/
Windows 10 privacy issues you should know about:
http://www.thenextweb.com/microsoft/2015/07/29/wind-nos/
How to disable data logging in W10:
http://www.reddit.com/r/Windows10/comments/3f38ed/
Windows 10 Privacy Settings:
http://www.tweakhound.com/2015/11/19/windows-10-privacy-settings-2/
Microsoft warning: 'Use Windows 7 at Your Own Risk', seriously?:
http://www.thehackernews.com/2016/01/microsoft-windows-7.html
Microsoft's Windows 10 is a privacy nightmare. Here's how to protect yourself:
http://www.slate.com/articles/technology/bitwise/2015/08/windows_10_privacy_problems_here_s_how_bad_they_are_and_how_to_plug_them.html
Windows 10 is spying on almost everything you do -- here's how to opt out:
http://www.bgr.com/2015/07/31/windows-10-upgrade-spying-how-to-opt-out/
Windows 10 automatically spies on your children and sends you a dossier of their activity:
http://www.boingboing.net/2015/08/10/windows-10.html
Microsoft's Windows 10 has permission to watch your every move:
http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html
Is Windows 10 really a privacy nightmare?
http://money.cnn.com/2015/08/17/technology/windows-10-privacy/
Windows 10 comes with built-in spyware; if your work requires confidentiality DO NOT INSTALL:
http://www.dailykos.com/story/2015/8/2/1408113/-Windows-10-comes-with-built-in-spyware-If-your-work-requires-confidentiality-DO-NOT-INSTALL/
How Bad Is Microsoft's Data Land-Grab?
http://www.slate.com/articles/technology/bitwise/2016/01/microsoft_holds_a_copy_of_windows_10_users_drive_encryption_keys_how_scary.html
Updategate: Microsoft is about to make it even harder to opt out of Windows 10:
http://www.theinquirer.net/inquirer/news/2430786/updategate-microsoft-is-now-installing-windows-10-by-default-in-windows-update/
Microsoft upgraded users to Windows 10 without their OK:
http://www.infoworld.com/article/3043526/
10 reasons you shouldn't upgrade to Windows 10:
http://www.infoworld.com/article/2972298/
Microsoft Starts Collecting User Data from Windows 7 and Windows 8 PCs:
http://news.softpedia.com/news/microsoft-starts-collecting-user-data-from-windows-7-and-windows-8-pcs-490302.shtml
Changes in Computing: Super Silos and Garbage Heap Dogs [Why is Windows 10 different?]:
http://www.jsware.net/jsware/comp2012plus.php5
Microsoft CMO on Windows 10's Pushy Update:
http://www.youtube.com/watch?v=R-j3ZSa33Fw
Microsoft Blog: Windows 10 for Enterprise: More secure and up to date:
http://blogs.windows.com/business/2015/01/30/windows-10-for-enterprise-more-secure-and-up-to-date/
Microsoft Blog: Our continuing commitment to your privacy with Windows 10:
http://blogs.windows.com/windowsexperience/2017/01/10/continuing-commitment-privacy-windows-10/
Windows 7 Users Are Refusing to Upgrade to Windows 10: Here's Why:
http://www.laptopmag.com/articles/windows-7-market-share/
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png
Basic education in the digital age:
- Internet Privacy:
http://en.wikipedia.org/wiki/Internet_privacy
- Privacy Laws:
http://en.wikipedia.org/wiki/Privacy_law
- Net Neutrality:
http://www.mdgx.com/4net.htm



Block Windows 10 Upgrade
************************

Complete List of All Updates You Should Uninstall to Block Windows 10:
http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/
Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016 step-by-step Guides:
Can't stop Windows 10 upgrade:
http://www.hardforum.com/showthread.php?t=1871988
Disable Data Collection in Windows 10:
http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/
How to Stop Windows 7/8 from Downloading Windows 10 Automatically:
http://www.howtogeek.com/228551/
What Is $WINDOWS.~BT Folder On My Hard Drive?:
http://www.addictivetips.com/windows-tips/what-is-the-windows-bt-folder-on-my-hard-drive/
Manage Windows 10 Notification + Upgrade options [DisableOSUpgrade]:
http://support.microsoft.com/help/3080351/
Disable Windows 8.1 store upgrade offer prompt:
http://www.winaero.com/blog/disable-windows-8-1-store-upgrade-offer-prompt/
Disable Get Windows 10 icon in notification area (tray):
http://www.superuser.com/questions/922068/
Block specific Windows update hotfix:
http://www.serverfault.com/questions/145843/
Disable KB3035583 "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
http://support.microsoft.com/help/3080351/
Block Windows Spying:
http://blockwindows.wordpress.com/
BlockWindows:
http://github.com/WindowsLies/BlockWindows/
Stop Windows 10 upgrade notification in Windows 7:
http://answers.microsoft.com/en-us/windows/forum/windows_10-win_upgrade/stop-windows-10-upgrade-notification-on-windows-7/adda31a7-ebbe-44b7-bcb4-f3da1563688c/
How to clean Windows 10 crapware off your Windows 7 or 8.1 PC:
http://www.infoworld.com/article/2983777/
Windows 10 tools to block automatic updates:
http://www.ghacks.net/2015/12/18/two-windows-10-tools-to-block-automatic-updates/
Uninstall and Block Updates and Drivers in Windows 10:
http://www.howtogeek.com/223864/
Temporarily prevent Windows or Driver Update from reinstalling in Windows 10:
http://support.microsoft.com/help/3073930/
File:
http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Win Updates Disabler (freeware):
http://www.site2unblock.com/win-updates-disabler/
File:
http://www.site2unblock.com/download/win-updates-disabler-setup.exe
Portable:
http://www.site2unblock.com/download/win-updates-disabler-portable.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Uninstall Windows 10 Upgrade
****************************

* Uninstall KB3035583 "Get Windows 10" (GWX) Update Guide:
http://www.winsupersite.com/windows-10/how-stop-windows-10-upgrade-downloading-your-system
Uninstall KB3035583 and Hide from Windows Updates in BAT file:
http://www.reddit.com/r/windows/comments/38ivhp/
Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/help/3035583/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3068708/
Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/help/3075249/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3080149/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT

* Remove Windows 10 Upgrade updates from Windows 7/8/8.1:
http://www.ghacks.net/2015/04/17/how-to-remove-windows-10-upgrade-updates-in-windows-7-and-8/
http://support.4it.com.au/article/disable-get-windows-10-notifications-from-the-command-prompt/
Prevent Windows 10 Upgrade from Installing:
http://www.winsupersite.com/windows-10/prevent-windows-10-upgrade-installing-after-making-your-reservation
Block Specific Updates in Windows Update:
http://www.ghacks.net/2010/08/11/how-to-block-specific-updates-in-windows-update/
Remove Windows 10 GWX Upgrade nonsense:
http://www.dedoimedo.com/computers/windows-7-to-10-gwx-how-to-remove.html
Block specific Windows update hotfix:
http://www.serverfault.com/a/341318/



Block/Disable Windows 8/8.1/2012/10/2016 Spyware
************************************************

Block/Disable Windows 8/8.1/10/2012/2016 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
Windows 10: Privacy and data collection:
http://en.wikipedia.org/wiki/Windows_10#Privacy_and_data_collection
Windows 10 Removed features:
http://en.wikipedia.org/wiki/Windows_10#Removed_features
Windows 10 Enterprise - Mother of all tweak scripts:
http://www.reboot.pro/topic/20623-windows-10-enterprise-mother-of-all-tweak-scripts/
Windows 10 stop the home calling function:
http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/
Disable Data Collection in Windows 10:
http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/
Disable Telemetry and Data Collection in Windows 10:
http://www.winaero.com/blog/how-to-disable-telemetry-and-data-collection-in-windows-10/
Fix Windows 10 privacy:
http://web.archive.org/web/20180323123837/http://fix10.isleaked.com/
Fix Windows 7/8.1 spyware:
http://web.archive.org/web/20180323123837/http://fix10.isleaked.com/oldwindows.html
How to manage Windows 10 notification and upgrade options:
http://support.microsoft.com/help/3080351/
How to Remove, Block and Prevent "Get Windows 10" Application for Enterprise Environments:
http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx
Manage connections from Windows operating system components to Microsoft services:
http://technet.microsoft.com/library/mt577208.aspx
Windows 10: which services to disable?
http://www.wilderssecurity.com/threads/378804
Windows 10 Tweaks:
http://www.pastebin.com/m26z309a
Remove Bloat from Windows 10:
http://www.hwinfo.com/misc/RemoveW10Bloat.htm
Disable Diagnostics Tracking (DiagTrack) service:
http://www.ghacks.net/2015/05/12/how-to-disable-the-diagnostics-tracking-service-in-windows/
Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service:
http://www.hwinfo.com/misc/RemoveW10Bloat.htm
Disable WAP Push Message Routing (DmWAPPush) service:
http://www.ghacks.net/2015/11/28/windows-10-new-services-list/
Disable Retail Demo (RetailDemo) service:
http://www.tenforums.com/windows-10-news/8079-windows-10-has-secret-retail-demo-mode-new-app-video-loop.html
Disable Windows Event Collector (WECSvc) service:
http://www.computerstepbystep.com/windows_event_collector_service.html
Disable Remote Registry (RemoteRegistry) service:
http://www.techrepublic.com/article/solutionbase-disabling-windows-xps-remote-registry-service/
Disable Telemetry and Data Collection in Windows 7/8/8.1:
http://www.askvg.com/tip-disable-telemetry-and-data-collection-on-windows-7-and-8/
Rename Cortana folder + stop SearchUI.exe:
http://www.tenforums.com/software-apps/14300-how-permanently-disable-cortana-4.html
Stop SearchUI.exe:
http://www.trishtech.com/2016/01/how-to-permanently-stop-searchui-exe-from-running-in-windows-10/
Stop Windows 10 spying by using Windows Firewall:
http://www.winaero.com/blog/stop-windows-10-spying-on-you-using-just-windows-firewall/
Windows 10 Tweaks:
http://www.tweakhound.com/2015/08/10/my-windows-10-tweaks/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Uninstall Windows 7/8/8.1/2012/10/2016 Spyware
**********************************************

Uninstall spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
KB3022345, KB3068708, KB3075249 + KB3080149:
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3022345/
Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/help/3035583/
Update for customer experience and diagnostic telemetry:
Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/help/3075249/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3080149/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Windows 10 Blocked Games
************************

Windows 10 Won't Run CD-ROM/DVD-ROM Games Using SafeDisc Or Securom DRM:
http://www.rockpapershotgun.com/2015/08/17/windows-10-safedisc-securom-drm/
http://gadgets.ndtv.com/games/news/windows-10-will-not-run-older-pc-games-with-drm-729304
http://www.pcworld.com/article/2972271/
http://www.ign.com/articles/2015/08/19/windows-10-wont-run-games-with-safedisk-securom-drm
Windows 10 Games Compatibility List:
http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_install/windows-10-games-compatibility-list/a31335a8-730f-4ac9-8c19-7c8c3a664ced



Hiden Disk Partition
********************

Fix: Windows 10 v1803 creates an extra Disk Partition:
http://www.thewindowsclub.com/windows-10-creates-extra-disk-partition-fixed/



Group Policy Editor
*******************
http://www.mdgx.com/xptoy.htm#GPX

FYI:
Microsoft removed Group Policy Editor (GPE) [respectively GPEdit.DLL + gpedit.msc]
from all Home and Starter Editions of Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016!
Restore GPE in all Windows NTx [2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016] Editions:
Install Group Policy Editor (GPEdit.DLL + gpedit.msc) in Windows 7/8/8.1/10/2016:
http://www.rushinformation.com/windows-find-gpedit-msc-error-windows-78-fixed/
File:
http://orig08.deviantart.net/9bb0/f/2011/180/b/0/add_gpedit_msc_by_jwils876-d3kh6vm.zip
More info:
http://drudger.deviantart.com/art/Add-GPEDIT-msc-215792914/
Corrected GPEdit Installer BATch files:
http://www.itechtics.com/enable-gpedit-windows-10-home/
File:
http://www.itechtics.com/wp-content/uploads/files/x86x64.zip
FIX: GPEDIT.MSC snap-in creation failed/failed to initialize:
http://www.rushinformation.com/gpedit-msc-snap-in-creation-failed-initialize-error/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "setup.exe" (Application) -> Run as Administrator.
3. Start -> select Run... (hold WinKey + press R) -> type gpedit.msc -> OK/Enter -> select Policy to change.
WinKey:
http://www.mdgx.com/lastweek.htm#WINKEY



DNS Cache
*********
http://www.mdgx.com/hosts.php#N2

Optional:
DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS [hosts] files with many IPs:
Disable Client-Side DNS Caching in Windows XP/2003:
http://support.microsoft.com/help/318803/
Flush Windows DNS Cache:
http://www.thewindowsclub.com/flush-windows-dns-cache/
Stop/Start DNS Client service:
http://www.computerstepbystep.com/dns_client_service.html
MDGx HOSTS Guide: DNS Client Service:
http://www.mdgx.com/hosts.php#N2
Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT



TURN OFF Windows Update (WU)
****************************

Optional:
* MDGx WINDOWS8.TXT:
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
-> "Tweaks + Fixes" ->
* Turn OFF Windows Updates (WU) + related Registry settings in Windows 7/8/8.1:
http://support.microsoft.com/help/328010/
http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS
http://www.smallvoid.com/article/winnt-automatic-updates-config.html
1. Use Notepad or similar/better free(ware) plain text/ASCII editor:
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below.
2. Save it as plain text/ASCII file (Encode -> ANSI) with the REG extension (.REG).
3. Name it whatever you wish.
4. Right-click newly created .REG file.
5. Run as Administrator.
6. Answer Yes/OK to all prompts to register its information into your Registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"DisableOSUpgrade"=dword:1
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate]
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"DisableOSUpgrade"=dword:1
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update]
"NextSqmReportTime"="0"
"NextFeaturedUpdatesNotificationTime"="0"
"EnableFeaturedSoftware"=dword:0
"FeaturedUpdatesNotificationSeqNum"=dword:0
"FeaturedUpdatesNotificationSeqNumGenTime"="0"
"SetupWizardLaunchTime"="0"
"ForcedReboot"=dword:0
"AUOptions"=dword:1
"ConfigVer"=dword:1
"BalloonTime"="0"
"ScheduledInstallDay"=dword:0
"ScheduledInstallTime"=dword:0
"IncludeRecommendedUpdates"=dword:0
"NextDetectionTime"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade]
"AllowOSUpgrade"=dword:0
"ReservationsAllowed"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State]
"OSUpgradeState"=dword:1
"OSUpgradeStateTimeStamp"="2015-05-05 05:05:05"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player]
"DisableAutoUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions]
"NoUpdateCheck"=dword:1
;
------End cut & paste here------

* Disable Windows Update (WU):
Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
http://www.pctools.com/guides/registry/detail/1176/
Configure Automatic Updates [AutoInstallMinorUpdates]:
http://technet.microsoft.com/library/cc708449.aspx
Automatic Updates Settings [NoAutoRebootWithLoggedOnUsers]:
http://technet.microsoft.com/library/dd939923.aspx
Automatic Updates using Registry Editor [NoWindowsUpdate]:
http://technet.microsoft.com/library/dd939844.aspx
Windows Update Client (WUC) + Windows Update Agent (WUA):
http://www.mdgx.com/xptoy.htm#WUC
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Internet Explorer (IE)/Edge, Chrome/Chromium + Firefox/Mozilla Privacy
**********************************************************************

Free(ware) web browsers:
http://www.mdgx.com/nettoys.htm#NET
Protect your online privacy, opt out of ads/cookies + block malware/spyware:

* Internet Explorer (IE) web browser:
1. Go to:
http://choice.microsoft.com/opt-out
2. Turn OFF all ads:
- Personalized ads in this browser.
- Personalized ads wherever I use my Microsoft account.
3. Go to:
http://www.aboutads.info/choices/
4. UNcheck all boxes:
- "All Participating Companies".
- "Companies Customizing Ads For Your Browser".
5. Internet Explorer (IE) 9/10/11/newer "Block Tracking" (Geolocation Detection) + "Automatic (Forced) Upgrade":
http://unlockforus.blogspot.com/2012/09/do-not-allow-websites-to-get-your.html
http://support.microsoft.com/help/2843950/
http://www.eightforums.com/tutorials/7996-internet-explorer-10-auto-update-enable-disable.html
http://www.itninja.com/question/ie10-turn-off-auto-updates/
A. Use Notepad or similar/better free(ware) plain text/ASCII editor:
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below.
B. Save it as plain text/ASCII file (Encode -> ANSI) with the REG extension (.REG).
C. Name it whatever you wish.
D. Right-click newly created .REG file.
E. Run as Administrator.
F. Answer Yes/OK to all prompts to register its information into your Registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Geolocation]
"BlockAllWebsites"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
;
------End cut & paste here------
6. Turn OFF Internet Explorer (IE) Security Check:
http://www.windows-security.org/65c2e8edd3108cdb6fc985493bb2fa38/turn-off-the-security-settings-check-feature/
A. Use Notepad or similar/better free(ware) plain text/ASCII editor:
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below.
B. Save it as plain text/ASCII file (Encode -> ANSI) with the REG extension (.REG).
C. Name it whatever you wish.
D. Right-click newly created .REG file.
E. Run as Administrator.
F. Answer Yes/OK to all prompts to register its information into your Registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Security]
"DisableSecuritySettingsCheck"=dword:1
;
------End cut & paste here------
7. HTTP cookies:
http://en.wikipedia.org/wiki/HTTP_cookie
More info:
http://www.mdgx.com/ietoy.htm#IE11
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
8. Install AdBlock Plus (ABP) for Internet Explorer (IE) (free, open source):
http://adblockplus.org/en/internet-explorer
http://eyeo.to/adblockplus/ie_install/internet-explorer
9. Restart your browser.
Internet Explorer (IE) web browser:
http://www.mdgx.com/nettoys.htm#IEX

* Chrome/Chromium web browsers:
01. Replace your Google Chrome web browser with a Google-free [stripped of Google ads/phone-home/spyware apps, scripts + code]
Chromium or 3rd party/independent alternative/derivative/fork Chromium-based web browser (free, open source):
http://www.mdgx.com/nettoys.htm#BLX
02. Right-click Command/Console/CMD/DOS icon/shortcut or %windir%\SYSTEM32\CMD.EXE [where %windir% is C:\WINDOWS] -> "Run as Administrator" -> run these commands from a DOS console window:
%windir%\SYSTEM32\SETX.EXE GOOGLE_API_KEY "NO" /M
%windir%\SYSTEM32\SETX.EXE GOOGLE_DEFAULT_CLIENT_ID "NO" /M
%windir%\SYSTEM32\SETX.EXE GOOGLE_DEFAULT_CLIENT_SECRET "NO" /M
to make sure you're not getting any Google apps/code/scripts annoying errors while running Chromium web browsers.
03. Log in to your Google account (if any):
http://accounts.google.com/
04. Go to:
http://www.google.com/settings/accounthistory
05. UNcheck all boxes + turn OFF all switches.
06. Go to:
http://myaccount.google.com/activitycontrols
07. UNcheck all boxes + turn OFF all switches related to ads, tracking, history.
08. Go to:
http://adssettings.google.com/authenticated
09. Turn OFF "Ad personalization is ON" to read "Ad personalization is OFF".
10. Go to:
http://optout.aboutads.info/
11. Wait for browser detection to complete [may take a while! ;-(] = 100%.
12. Click "Opt Out? select all" (top right) or "OPT OUT OF ALL" (bottom).
13. Wait for browser detection to complete [total ~ 134 opt-out requests] = 100%.
14. Click "View Updated Results" -> UNcheck all boxes.
15. Go to:
http://myaccount.google.com/activitycontrols
16. Turn OFF (pause) "Web & App Activity".
17. UNcheck "Include Chrome history and activity from sites, apps and devices that use Google services".
18. Turn OFF Sync to stop sending your browsing history to the Google servers.
19. Click the 3 dots (older browser versions: 3 bars) at the top right corner or type:
chrome://settings
in the (URL) address bar -> Settings -> People -> Sync -> turn OFF "On - sync everything".
20. Click the circular Sync (profile menu) icon at the top right corner -> turn OFF "Sync and personalize Chrome across your devices".
21. Turn OFF automatically being logged into your Google account whenever you sign into your Gmail account (if using Gmail).
22. Click the 3 dots (older browser versions: 3 bars) at the top right corner -> Settings -> Advanced -> Privacy and security -> turn OFF "Allow Chrome sign-in".
23. Click the 3 dots (older browser versions: 3 bars) at the top right corner -> Settings -> Advanced -> Privacy and security -> turn ON "Send a 'Do Not Track' request with your browsing traffic".
24. Turn OFF (Push) Notifications:
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
25. Click the 3 dots (older browser versions: 3 bars) at the top right corner or type:
chrome://settings
in the (URL) address bar -> Settings -> Advanced -> Content Settings -> Notifications -> slide button left to read "Blocked".
26. Install important privacy/ad-blocker/anti-malware/phone-home/anti-spyware extensions: AdBlock/AdBlock Plus (ABP)/AdBlock Ultimate/AdBlocker/AdRemover/uBlock,
AdBlock for YouTube, No-Cookies, Ghostery, No Script, TamperMonkey + custom TamperMonkey scripts/scriplets, and a few password protection extensions.
Examples:
AdBlock Plus [also blocks YouTube/Facebook ads]:
http://chrome.google.com/webstore/detail/adblock-plus/cfhdojbkjhnklbpkdaibdccddilifddb/
EasyList Filters:
http://www.easylist.to/
FilterLists:
http://www.filterlists.com/
AdBlock/AdBlock Plus/AdBlock Ultimate/AdBlocker/AdRemover Subscriptions/Lists:
http://adblockplus.org/subscriptions
abp:subscribe?location=http://easylist.to/easylist/easylist.txt&title=EasyList
abp:subscribe?location=http://easylist.to/easylist/easyprivacy.txt&title=EasyPrivacy&requiresLocation=http://easylist.to/easylist/easylist.txt&requiresTitle=EasyList
abp:subscribe?location=http://easylist.to/easylist/fanboy-annoyance.txt&title=Fanboy's%20Annoyance%20List
abp:subscribe?location=http%3A%2F%2Fransomwaretracker.abuse.ch%2Fdownloads%2FRW_DOMBL.txt&title=Ransomware%20Tracker%20Domain%20Blocklist
SuperBlock Adblocker:
http://chrome.google.com/webstore/detail/superblock-adblocker/miijbmhjndcihicbljlcieiajhemmdeb/
AdBlock:
http://chrome.google.com/webstore/detail/adblock/gighmmpiobklfepjocnamgkkbiglidom/
http://www.getadblock.com/
AdRemover for Chrome:
http://chrome.google.com/webstore/detail/adremover-for-google-chro/mcefmojpghnaceadnghednjhbmphipkb/
AdBlocker Ultimate:
http://chrome.google.com/webstore/detail/adblocker-ultimate/ohahllgiabjaoigichmmfljhkcfikeof/
http://www.adblockultimate.net/
Ads Killer Adblocker Plus:
http://chrome.google.com/webstore/detail/ads-killer-adblocker-plus/pgbllmbdjgcalkoimdfcpknbjgnhjclg/
Anti-Adblock Killer (AAK) (JavaScript):
http://gitlab.com/xuhaiyang1234/AAK-Cont/raw/master/FINAL_BUILD/aak-cont-script-notubo.user.js
http://gitlab.com/xuhaiyang1234/AAK-Cont/tree/master/FINAL_BUILD/
http://github.com/reek/anti-adblock-killer/
http://reek.github.io/anti-adblock-killer/#settings
http://xuhaiyang1234.gitlab.io/AAK-Cont/dist/aak-cont-list-notubo.txt
http://raw.github.com/reek/anti-adblock-killer/master/anti-adblock-killer.user.js
http://github.com/reek/anti-adblock-killer/blob/master/anti-adblock-killer-filters.txt
http://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer-filters.txt
http://greasyfork.org/scripts/735-anti-adblock-killer-reek/code/Anti-Adblock%20Killer%20%7C%20Reek.user.js
http://www.codejuggle.dj/anti-adblock-killer/
http://greasyfork.org/en/scripts/15947-adblock/
http://greasyfork.org/scripts/15947-adblock/code/Fuck%20FuckAdBlock.user.js
AdsBypasser (JavaScript):
http://adsbypasser.github.io/
http://adsbypasser.github.io/releases/adsbypasser.full.es7.user.js
http://github.com/adsbypasser/adsbypasser/wiki/Supported-Platforms
http://github.com/adsbypasser/adsbypasser/wiki/Runtime-Configurations
AdBlock Plus YouTube filter subscription:
http://youtube.adblockplus.me/
http://www.adblockplus.org/
Disable Google/YouTube Ads:
http://www.ghacks.net/2013/08/18/youtube-experiment-gets-rid-of-all-advertisement-on-site/
Webmail Ad Blocker:
http://chrome.google.com/webstore/detail/webmail-ad-blocker/cbhfdchmklhpcngcgjmpdbjakdggkkjp/
Ad-blocker for Gmail:
http://chrome.google.com/webstore/detail/coibnogmjcpbccgjofoiklnfpbbjbapo/
Video Adblocker for Youtube:
http://chrome.google.com/webstore/detail/video-adblocker-for-youtu/hflefjhkfeiaignkclmphmokmmbhbhik/
AdBlock on YouTube:
http://chrome.google.com/webstore/detail/adblock-on-youtube/emngkmlligggbbiioginlkphcmffbncb/
AdBlocker for YouTube:
http://chrome.google.com/webstore/detail/adblocker-for-youtube/naihbfkjlampnpbnohcehoedklmejhmh/
Adguard AdBlocker:
http://chrome.google.com/webstore/detail/adguard-adblocker/bgnkhhnnamicmpeenaelnjfhikgbkllg/
AdF.ly Skipper:
http://adfly-skipper.blogspot.com/
http://chrome.google.com/webstore/detail/adskipper/obnfifcganohemahpomajbhocfkdgmjb/
http://github.com/StoreClerk/AdF.ly-Skipper/
uBlock Origin:
http://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm/
JustBlock Security:
http://chrome.google.com/webstore/detail/justblock-security/hiajdlfgbgnnjakkbnpdhmhfhklkbiol/
TamperMonkey BETA/NEWer:
http://chrome.google.com/webstore/detail/tampermonkey-beta/gcalenpjmijncebpfijmoaglllgpjagf/
TamperMonkey:
http://chrome.google.com/webstore/detail/tampermonkey/dhdgffkkebhmkfjojejmpbldmpobfkfo/
http://www.tampermonkey.net/
TamperMonkey FAQ:
http://www.tampermonkey.net/faq.php
27. Restart your browser.
Chromium + Chrome web browsers:
http://www.mdgx.com/nettoys.htm#CHR

* Google search, apps + everything else:
How to stop Google from tracking and storing your locations:
http://www.techrepublic.com/article/how-to-stop-google-from-tracking-and-storing-your-locations/
How to Disable Web Push Notifications in Google Chrome:
http://www.pushassist.com/knowledgebase/how-to-disable-web-push-notifications-in-google-chrome/
How to force Google to automatically delete the information it saves about what you do online:
http://www.cnbc.com/2019/05/08/how-to-stop-google-from-tracking-web-history.html
Google knows everywhere you go - here's how to stop it from tracking you and delete the logs:
http://www.cnbc.com/2019/04/25/how-to-stop-google-from-storing-your-location-history.html
Google collects information about many things you do online -- here's how to stop it:
http://www.cnbc.com/2019/05/01/how-to-stop-google-from-collecting-your-private-information.html
Google Sees Everything You Do: Here's How to Stop That:
http://www.lifewire.com/4123866/
Report malicious software web sites:
http://safebrowsing.google.com/safebrowsing/report_badware/
Report Phishing and Malware:
http://www.decentsecurity.com/malware-web-and-phishing-investigation/

* Firefox/Mozilla web browsers:
1. Go to:
http://support.mozilla.org/products/firefox/protect-your-privacy/
2. Follow instructions to turn OFF (opt out of) all ads + tracking.
3. Go to:
http://www.ghacks.net/2015/08/18/a-comprehensive-list-of-firefox-privacy-and-security-settings/
4. Type:
about:config
in the (URL) address bar -> follow instructions:
http://kb.mozillazine.org/About:config_entries#Privacy.
http://kb.mozillazine.org/About:config_entries#Security.
to add/modify/delete desired settings in order to strengthen your Mozilla web browser security.
5. Turn OFF (Push) Notifications:
http://www.makeuseof.com/tag/disable-notifications-chrome-firefox-safari/
6. Click the 3 bars at the top right corner or type:
about:preferences#privacy
in the (URL) address bar -> Options -> Privacy & Security -> Notifications -> Settings -> check "Block new requests asking to allow notifications" box -> Save Changes.
7. Install important privacy/ad-blocker/anti-malware/phone-home/anti-spyware add-ons: AdBlock/AdBlock Plus (ABP)/AdBlock Ultimate/AdBlocker/AdRemover/uBlock,
AdBlock for YouTube, No-Cookies, Ghostery, No Script, GreaseMonkey + custom GreaseMonkey scripts/scriplets, and a few password protection add-ons.
Examples:
AdBlock:
http://addons.mozilla.org/firefox/addon/adblock-for-firefox/
http://www.getadblock.com/
AdBlock Plus [also blocks YouTube/Facebook ads]:
http://addons.mozilla.org/firefox/addon/adblock-plus/
EasyList Filters:
http://www.easylist.to/
FilterLists:
http://www.filterlists.com/
AdBlock/AdBlock Plus/AdBlock Ultimate/AdBlocker/AdRemover Subscriptions/Lists:
http://adblockplus.org/subscriptions
abp:subscribe?location=http://easylist.to/easylist/easylist.txt&title=EasyList
abp:subscribe?location=http://easylist.to/easylist/easyprivacy.txt&title=EasyPrivacy&requiresLocation=http://easylist.to/easylist/easylist.txt&requiresTitle=EasyList
abp:subscribe?location=http://easylist.to/easylist/fanboy-annoyance.txt&title=Fanboy's%20Annoyance%20List
abp:subscribe?location=http%3A%2F%2Fransomwaretracker.abuse.ch%2Fdownloads%2FRW_DOMBL.txt&title=Ransomware%20Tracker%20Domain%20Blocklist
Adblock Plus Whitelist Export (JavaScript):
http://gist.github.com/noromanba/5872328/
http://gist.githubusercontent.com/noromanba/5872328/raw/d8c0023c7b66bb3f9ae26afa29d8b0cb67e0d718/abp-whitelist-export.js
Disable Anti-Adblock:
http://addons.mozilla.org/firefox/addon/disable-anti-adblock/
AdsBypasser (JavaScript):
http://adsbypasser.github.io/
http://adsbypasser.github.io/releases/adsbypasser.full.es7.user.js
http://github.com/adsbypasser/adsbypasser/wiki/Supported-Platforms
http://github.com/adsbypasser/adsbypasser/wiki/Runtime-Configurations
Anti-Adblock Killer (AAK) (JavaScript):
http://gitlab.com/xuhaiyang1234/AAK-Cont/raw/master/FINAL_BUILD/aak-cont-script-notubo.user.js
http://gitlab.com/xuhaiyang1234/AAK-Cont/tree/master/FINAL_BUILD/
http://github.com/reek/anti-adblock-killer/
http://reek.github.io/anti-adblock-killer/#settings
http://xuhaiyang1234.gitlab.io/AAK-Cont/dist/aak-cont-list-notubo.txt
http://raw.github.com/reek/anti-adblock-killer/master/anti-adblock-killer.user.js
http://github.com/reek/anti-adblock-killer/blob/master/anti-adblock-killer-filters.txt
http://raw.githubusercontent.com/reek/anti-adblock-killer/master/anti-adblock-killer-filters.txt
http://greasyfork.org/scripts/735-anti-adblock-killer-reek/code/Anti-Adblock%20Killer%20%7C%20Reek.user.js
http://www.codejuggle.dj/anti-adblock-killer/
http://greasyfork.org/en/scripts/15947-adblock/
http://greasyfork.org/scripts/15947-adblock/code/Fuck%20FuckAdBlock.user.js
Adblock Plus Pop-up Addon:
http://addons.mozilla.org/firefox/addon/adblock-plus-pop-up-addon/
AdBlock Plus YouTube filter subscription:
http://youtube.adblockplus.me/
http://www.adblockplus.org/
AdBlock for YouTube:
http://addons.mozilla.org/firefox/addon/adblock-for-youtube/
Ad-blocker for Gmail:
http://addons.mozilla.org/firefox/addon/ad-blocker-for-gmail/
AdBlock for Gmail:
http://addons.mozilla.org/firefox/addon/adblock-for-gmail/
Customizations for AdBlock Plus:
http://addons.mozilla.org/firefox/addon/abpcustomization/
http://www.adblockplus.org/customizations
Element Hiding Helper for AdBlock Plus:
http://addons.mozilla.org/firefox/addon/elemhidehelper/
http://www.adblockplus.org/elemhidehelper
AdBlocker Ultimate:
http://addons.mozilla.org/firefox/addon/adblocker-ultimate/
http://www.adblockultimate.net/
Adguard AdBlocker:
http://addons.mozilla.org/firefox/addon/adguard-adblocker/
AdF.ly Skipper:
http://adfly-skipper.blogspot.com/
http://addons.mozilla.org/firefox/addon/adfly-skipper/
http://github.com/StoreClerk/AdF.ly-Skipper/
uBlock Origin:
http://addons.mozilla.org/firefox/addon/ublock-origin/
Disable WebRTC:
http://addons.mozilla.org/firefox/addon/happy-bonobo-disable-webrtc/
I don't care about cookies:
http://addons.mozilla.org/firefox/addon/i-dont-care-about-cookies/
CookiesOK:
http://addons.mozilla.org/firefox/addon/cookiesok/
Google Disconnect:
http://addons.mozilla.org/firefox/addon/gdc/
Google Untracker:
http://addons.mozilla.org/firefox/addon/google-untracker/
http://github.com/sharpdressedcodes/google-untracker/
Google search link fix:
http://addons.mozilla.org/firefox/addon/google-search-link-fix/
NO Google Analytics:
http://addons.mozilla.org/firefox/addon/no-google-analytics/
GreaseMonkey:
http://addons.mozilla.org/firefox/addon/greasemonkey/
http://www.greasespot.net/
YouTube Unblocker (JavaScript):
http://greasyfork.org/en/scripts/9062-youtube-unblocker
http://greasyfork.org/scripts/9062-youtube-unblocker/code/YouTube%20Unblocker.user.js
Ads Skipper 2.0 (JavaScript):
http://userscripts-mirror.org/scripts/show/158531
http://www.userscripts-mirror.org/scripts/source/158531.user.js
8. Restart your browser.
Firefox + Mozilla web browsers:
http://www.mdgx.com/nettoys.htm#MOZ

* Edge (proprietary, obsolete!)/Chromium Edge (new, current, open source):
Windows 7 SP1/8/8.1/10 users: install newest Edge web browser (Internet Explorer replacement) based on Chromium Canary developer channel (free, open source):
http://www.microsoftedgeinsider.com/download/
Chromium Edge web browser Canary preview builds for Windows 7 SP1/8/8.1:
http://blogs.windows.com/msedgedev/2019/06/19/introducing-microsoft-edge-preview-builds-for-windows-7-windows-8-and-windows-8-1/
Chromium Edge web browser:
http://www.ghacks.net/2019/03/25/this-is-the-chromium-based-microsoft-edge-browser/
Chromium Edge web browser preview builds:
http://blogs.windows.com/msedgedev/2019/04/08/microsoft-edge-preview-channel-details/
How to download Chromium Edge for Windows 10 64-bit:
http://www.pureinfotech.com/download-chromium-microsoft-edge-windows-10/
Edge support:
http://microsoftedgesupport.microsoft.com/
Chromium + Chrome web browsers:
http://www.mdgx.com/nettoys.htm#CHR



Uninstall Cortana + OneDrive
****************************

Optional:
Uninstall Cortana from Windows 10 (by using install_wim_tweak.exe):
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
File:
http://www.winaero.com/request.php?1832
Completely disable Cortana in Windows 10:
http://www.superuser.com/questions/949569/
Uninstall/Reinstall Windows 10 Built-in Apps:
http://www.howtogeek.com/224798/how-to-uninstall-windows-10s-built-in-apps-and-how-to-reinstall-them/
Remove default apps from Windows 10:
http://www.reddit.com/r/windows/comments/3f6gsl/
Killing Cortana: Disable Windows 10 info-hungry digital assistant:
http://www.pcworld.com/article/2949759/
Uninstall OneDrive:
http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



HOSTS
*****
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
http://www.mdgx.com/hosts.php

Copy & paste these 0.0.0.0 (redirected to null) IPs to your HOSTS [hosts] file located in:
%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
where %windir% = usually C:\WINDOWS .
Source:
http://www.pastebin.com/gebp8edd
Edit HOSTS file in Windows 7/8/8.1/2012/10/2016:
http://www.petri.com/easily-edit-hosts-file-windows-10/
http://www.petri.com/edit-hosts-file-windows-8/
http://www.petri.com/edit-hosts-file-windows-7/
Take Ownership of files + folders right-click Explorer option:
http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/
MDGx Tweaked + Customized File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:
http://www.mdgx.com/xptoy.htm#FMNT
FM ReadMe Guide:
http://www.mdgx.com/fmnt32/fmnt32.php
FM [2.2 MB, free]:
http://www.mdgx.com/fmnt32/FMNT32.EXE
FixNT6 Take Ownership tool (freeware):
http://www.jsware.net/jsware/nt6fix.php5#restfix
FixNT6 [36 KB, freeware]:
http://www.jsware.net/jsware/zips/fix6r.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
If 0.0.0.0 redirects do not work properly on your computer(s), you can substitute all null [0.0.0.0] text strings below with default localhost:
127.0.0.1
Open Notepad or better Notepad replacement [free(ware)]:
http://www.mdgx.com/toy.htm#TXT
-> right-click your HOSTS file [%windir%\SYSTEM32\DRIVERS\ETC\HOSTS where %windir% is usually C:\WINDOWS] -> Properties -> Security tab -> Edit... ->
click Administrators (Your User Name/Administrator) -> check Full control box -> OK -> OK -> right-click your HOSTS file -> Run as Administrator -> Edit -> Replace [Ctrl+H] -> Find what:
0.0.0.0
-> Replace with:
127.0.0.1
Replace all instances -> Save HOSTS file -> refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).
BONUS:
List below contains most all known Microsoft servers one may wish to disable, but some will deactivate
Windows Update (WU) and/or some will block other Microsoft programs/features/services/etc you may need or care about.
CAUTION:
View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
NOTE:
You can always disable or delete completely (already disabled) servers you wish to access:
To (re)enable/edit/customize -> open HOSTS file (as Administrator) in Notepad/similar/better plain text/ASCII editor
http://www.mdgx.com/toy.htm#TXT
-> comment/remark (precede with # followed by 1 space) or delete desired line(s) below -> save your HOSTS file ->
refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).
Recommended HOSTS file:

-----Begin cut & paste here-----
# MDGx HOSTS Guide:
# http://www.mdgx.com/hosts.php
# All localhost lines must be listed at the top of the HOSTS file in this order: IPv4 (1st) + IPv6 (2nd):
# http://en.wikipedia.org/wiki/Multicast_address
# (1) Next line maps IPv4 protocol localhost:
127.0.0.1 localhost
# (2) Next lines map IPv6 protocol localhost:
::1 localhost
fe80::1 localhost
fe80::1%lo0 localhost
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
# Lines below recommended to disable Microsoft:
# Windows Automatic Update (WUA), Forced Win10 Upgrade (GWX), Ads, Live, Logging, Spyware, Telemetry, Tracking.
# Use with CAUTION!
# To (re)enable/edit/customize -> open HOSTS file (as Administrator) in Notepad/similar/better plain text/ASCII editor
# http://www.mdgx.com/toy.htm#TXT
# -> comment/remark (precede with # followed by 1 space) or delete desired line(s) below -> save your HOSTS file ->
# refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).

0.0.0.0 00001b-1.l.windowsupdate.com
0.0.0.0 000043-1.l.windowsupdate.com
0.0.0.0 000061-1.l.windowsupdate.com
0.0.0.0 0000a3-1.l.windowsupdate.com
0.0.0.0 0000f2-1.l.windowsupdate.com
0.0.0.0 0000f9-1.l.windowsupdate.com
0.0.0.0 0000fe-1.l.windowsupdate.com
0.0.0.0 00015e-1.l.windowsupdate.com
0.0.0.0 0001a5-1.l.windowsupdate.com
0.0.0.0 0001bc-1.l.windowsupdate.com
0.0.0.0 0001d4-1.l.windowsupdate.com
0.0.0.0 0001ed-1.l.windowsupdate.com
0.0.0.0 000202-1.l.windowsupdate.com
0.0.0.0 000238-1.l.windowsupdate.com
0.0.0.0 000263-1.l.windowsupdate.com
0.0.0.0 00028e-1.l.windowsupdate.com
0.0.0.0 00028f-1.l.windowsupdate.com
0.0.0.0 0002ae-1.l.windowsupdate.com
0.0.0.0 0002c3-1.l.windowsupdate.com
0.0.0.0 0002fd-1.l.windowsupdate.com
0.0.0.0 000371-1.l.windowsupdate.com
0.0.0.0 000396-1.l.windowsupdate.com
0.0.0.0 0003fc-1.l.windowsupdate.com
0.0.0.0 000410-1.l.windowsupdate.com
0.0.0.0 000418-1.l.windowsupdate.com
0.0.0.0 000452-1.l.windowsupdate.com
0.0.0.0 000464-1.l.windowsupdate.com
0.0.0.0 000498-1.l.windowsupdate.com
0.0.0.0 0004ad-1.l.windowsupdate.com
0.0.0.0 0004ee-1.l.windowsupdate.com
0.0.0.0 0004f1-1.l.windowsupdate.com
0.0.0.0 000502-1.l.windowsupdate.com
0.0.0.0 00054d-1.l.windowsupdate.com
0.0.0.0 000589-1.l.windowsupdate.com
0.0.0.0 000646-1.l.windowsupdate.com
0.0.0.0 0006df-1.l.windowsupdate.com
0.0.0.0 0007be-1.l.windowsupdate.com
0.0.0.0 0007e4-1.l.windowsupdate.com
0.0.0.0 00081a-1.l.windowsupdate.com
0.0.0.0 0008f7-1.l.windowsupdate.com
0.0.0.0 000968-1.l.windowsupdate.com
0.0.0.0 000989-1.l.windowsupdate.com
0.0.0.0 0009a5-1.l.windowsupdate.com
0.0.0.0 0009b8-1.l.windowsupdate.com
0.0.0.0 0009fe-1.l.windowsupdate.com
0.0.0.0 000a55-1.l.windowsupdate.com
0.0.0.0 000a56-1.l.windowsupdate.com
0.0.0.0 000a60-1.l.windowsupdate.com
0.0.0.0 000afa-1.l.windowsupdate.com
0.0.0.0 000b25-1.l.windowsupdate.com
0.0.0.0 000b3d-1.l.windowsupdate.com
0.0.0.0 000b62-1.l.windowsupdate.com
0.0.0.0 000b78-1.l.windowsupdate.com
0.0.0.0 000bc0-1.l.windowsupdate.com
0.0.0.0 000bcf-1.l.windowsupdate.com
0.0.0.0 000bdf-1.l.windowsupdate.com
0.0.0.0 000be0-1.l.windowsupdate.com
0.0.0.0 000c0c-1.l.windowsupdate.com
0.0.0.0 000c19-1.l.windowsupdate.com
0.0.0.0 000c27-1.l.windowsupdate.com
0.0.0.0 000c33-1.l.windowsupdate.com
0.0.0.0 000cb0-1.l.windowsupdate.com
0.0.0.0 000cca-1.l.windowsupdate.com
0.0.0.0 000d29-1.l.windowsupdate.com
0.0.0.0 000d40-1.l.windowsupdate.com
0.0.0.0 000d6d-1.l.windowsupdate.com
0.0.0.0 000e78-1.l.windowsupdate.com
0.0.0.0 000efd-1.l.windowsupdate.com
0.0.0.0 000f40-1.l.windowsupdate.com
0.0.0.0 001007-1.l.windowsupdate.com
0.0.0.0 001056-1.l.windowsupdate.com
0.0.0.0 001089-1.l.windowsupdate.com
0.0.0.0 0010bb-1.l.windowsupdate.com
0.0.0.0 0010da-1.l.windowsupdate.com
0.0.0.0 0010e3-1.l.windowsupdate.com
0.0.0.0 00111c-1.l.windowsupdate.com
0.0.0.0 001173-1.l.windowsupdate.com
0.0.0.0 0011da-1.l.windowsupdate.com
0.0.0.0 0011f3-1.l.windowsupdate.com
0.0.0.0 001233-1.l.windowsupdate.com
0.0.0.0 00123a-1.l.windowsupdate.com
0.0.0.0 001390-1.l.windowsupdate.com
0.0.0.0 001402-1.l.windowsupdate.com
0.0.0.0 00149f-1.l.windowsupdate.com
0.0.0.0 0016c3-1.l.windowsupdate.com
0.0.0.0 0017b1-1.l.windowsupdate.com
0.0.0.0 0017c5-1.l.windowsupdate.com
0.0.0.0 0017f1-1.l.windowsupdate.com
0.0.0.0 00184b-1.l.windowsupdate.com
0.0.0.0 00185d-1.l.windowsupdate.com
0.0.0.0 001891-1.l.windowsupdate.com
0.0.0.0 0018c4-1.l.windowsupdate.com
0.0.0.0 001949-1.l.windowsupdate.com
0.0.0.0 00196e-1.l.windowsupdate.com
0.0.0.0 00198e-1.l.windowsupdate.com
0.0.0.0 0019a2-1.l.windowsupdate.com
0.0.0.0 0019d8-1.l.windowsupdate.com
0.0.0.0 001a1f-1.l.windowsupdate.com
0.0.0.0 001a27-1.l.windowsupdate.com
0.0.0.0 001a32-1.l.windowsupdate.com
0.0.0.0 001a43-1.l.windowsupdate.com
0.0.0.0 001a83-1.l.windowsupdate.com
0.0.0.0 001a92-1.l.windowsupdate.com
0.0.0.0 001bb5-1.l.windowsupdate.com
0.0.0.0 001c02-1.l.windowsupdate.com
0.0.0.0 001cdc-1.l.windowsupdate.com
0.0.0.0 001d09-1.l.windowsupdate.com
0.0.0.0 001d1f-1.l.windowsupdate.com
0.0.0.0 001d49-1.l.windowsupdate.com
0.0.0.0 001d7a-1.l.windowsupdate.com
0.0.0.0 001dc2-1.l.windowsupdate.com
0.0.0.0 001e03-1.l.windowsupdate.com
0.0.0.0 001e05-1.l.windowsupdate.com
0.0.0.0 001e0c-1.l.windowsupdate.com
0.0.0.0 001e0f-1.l.windowsupdate.com
0.0.0.0 001e27-1.l.windowsupdate.com
0.0.0.0 001e4b-1.l.windowsupdate.com
0.0.0.0 001e8d-1.l.windowsupdate.com
0.0.0.0 001e9c-1.l.windowsupdate.com
0.0.0.0 001ec3-1.l.windowsupdate.com
0.0.0.0 001f23-1.l.windowsupdate.com
0.0.0.0 001f4f-1.l.windowsupdate.com
0.0.0.0 001f7f-1.l.windowsupdate.com
0.0.0.0 001fbb-1.l.windowsupdate.com
0.0.0.0 002012-1.l.windowsupdate.com
0.0.0.0 002062-1.l.windowsupdate.com
0.0.0.0 0020a7-1.l.windowsupdate.com
0.0.0.0 002108-1.l.windowsupdate.com
0.0.0.0 00210c-1.l.windowsupdate.com
0.0.0.0 00210e-1.l.windowsupdate.com
0.0.0.0 002182-1.l.windowsupdate.com
0.0.0.0 0021a0-1.l.windowsupdate.com
0.0.0.0 0021d0-1.l.windowsupdate.com
0.0.0.0 0021ff-1.l.windowsupdate.com
0.0.0.0 00227f-1.l.windowsupdate.com
0.0.0.0 0022a7-1.l.windowsupdate.com
0.0.0.0 0022c1-1.l.windowsupdate.com
0.0.0.0 0022db-1.l.windowsupdate.com
0.0.0.0 0022e6-1.l.windowsupdate.com
0.0.0.0 0022eb-1.l.windowsupdate.com
0.0.0.0 00235c-1.l.windowsupdate.com
0.0.0.0 002384-1.l.windowsupdate.com
0.0.0.0 00238e-1.l.windowsupdate.com
0.0.0.0 002394-1.l.windowsupdate.com
0.0.0.0 0023c5-1.l.windowsupdate.com
0.0.0.0 0023df-1.l.windowsupdate.com
0.0.0.0 00249b-1.l.windowsupdate.com
0.0.0.0 002518-1.l.windowsupdate.com
0.0.0.0 002557-1.l.windowsupdate.com
0.0.0.0 002562-1.l.windowsupdate.com
0.0.0.0 0025be-1.l.windowsupdate.com
0.0.0.0 0025ea-1.l.windowsupdate.com
0.0.0.0 0025f2-1.l.windowsupdate.com
0.0.0.0 00268c-1.l.windowsupdate.com
0.0.0.0 0026a1-1.l.windowsupdate.com
0.0.0.0 0026bc-1.l.windowsupdate.com
0.0.0.0 73307cf78bfb.microsoft.com
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 a-0001.dc-msedge.net
0.0.0.0 a-0002.a-msedge.net
0.0.0.0 a-0003.a-msedge.net
0.0.0.0 a-0003.dc-msedge.net
0.0.0.0 a-0004.a-msedge.net
0.0.0.0 a-0005.a-msedge.net
0.0.0.0 a-0006.a-msedge.net
0.0.0.0 a-0007.a-msedge.net
0.0.0.0 a-0008.a-msedge.net
0.0.0.0 a-0009.a-msedge.net
0.0.0.0 a-0010.a-msedge.net
0.0.0.0 a-0011.a-msedge.net
0.0.0.0 a-0012.a-msedge.net
0.0.0.0 a-msedge.net
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msads.net
0.0.0.0 a.ads2.msn.com
0.0.0.0 a.microsoft.com
0.0.0.0 a.rad.msn.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000003.ms.a.microsoft.com
0.0.0.0 a000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001337.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a0000000000000000001.ms.a.microsoft.com
0.0.0.0 a000000000000000003.ms.a.microsoft.com
0.0.0.0 a000001.ms.a.microsoft.com
0.0.0.0 a102.ms.a.microsoft.com
0.0.0.0 a106.ms.a.microsoft.com
0.0.0.0 a107.ms.a.microsoft.com
0.0.0.0 a1112.ms.a.microsoft.com
0.0.0.0 a1122.ms.a.microsoft.com
0.0.0.0 a113.ms.a.microsoft.com
0.0.0.0 a119.ms.a.microsoft.com
0.0.0.0 a120.ms.a.microsoft.com
0.0.0.0 a1205.ms.a.microsoft.com
0.0.0.0 a122.ms.a.microsoft.com
0.0.0.0 a126.ms.a.microsoft.com
0.0.0.0 a128.ms.a.microsoft.com
0.0.0.0 a129.ms.a.microsoft.com
0.0.0.0 a133.ms.a.microsoft.com
0.0.0.0 a137.ms.a.microsoft.com
0.0.0.0 a141.ms.a.microsoft.com
0.0.0.0 a142.ms.a.microsoft.com
0.0.0.0 a145.ms.a.microsoft.com
0.0.0.0 a146.ms.a.microsoft.com
0.0.0.0 a1500.ms.a.microsoft.com
0.0.0.0 a2000.ms.a.microsoft.com
0.0.0.0 a23.ms.a.microsoft.com
0.0.0.0 a4.ms.a.microsoft.com
0.0.0.0 a592.ms.a.microsoft.com
0.0.0.0 ac3.msn.com
0.0.0.0 access.microsofttemplates.org
0.0.0.0 account.microsoft.com
0.0.0.0 activate.microsoft.com
0.0.0.0 activate.one.microsoft.com
0.0.0.0 activation-v2.sls.microsoft.com
0.0.0.0 activation.sls.microsoft.com
0.0.0.0 activity.windows.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 adcenter.microsoft.com
0.0.0.0 adl.windows.com
0.0.0.0 admin.messaging.microsoft.com
0.0.0.0 admin.training.partner.microsoft.com
0.0.0.0 adnexus.net
0.0.0.0 adnxs.com
0.0.0.0 ads.msn.com
0.0.0.0 ads1.msads.net
0.0.0.0 ads1.msn.com
0.0.0.0 adsinapps.microsoft.com
0.0.0.0 advertise.bingads.microsoft.com
0.0.0.0 advertising.bingads.microsoft.com
0.0.0.0 advertising.microsoft.com
0.0.0.0 aer.microsoft.com
0.0.0.0 afkar.microsoft.com
0.0.0.0 aidps.atdmt.com
0.0.0.0 ak.or.download.microsoft.com
0.0.0.0 aka-cdn-ns.adtech.de
0.0.0.0 akamdub.fullproduct.download.microsoft.com
0.0.0.0 akampr.fullproduct.download.microsoft.com
0.0.0.0 akamsin.fullproduct.download.microsoft.com
0.0.0.0 alert-security.fail
0.0.0.0 alerts.live.com
0.0.0.0 alerts.microsoft.com
0.0.0.0 alpha.telemetry.microsoft.com
0.0.0.0 alventive.xbox.com
0.0.0.0 am3pap002.storage.live.com
0.0.0.0 americas.winqual.microsoft.com
0.0.0.0 answerdesk.microsoftstore.com
0.0.0.0 answers.microsoft.com
0.0.0.0 answersstaticfilecdn.azureedge.net
0.0.0.0 anz.partners.extranet.microsoft.com
0.0.0.0 apac1.notify.windows.com.akadns.net
0.0.0.0 api.bing.com
0.0.0.0 api.cortana.ai
0.0.0.0 api.onedrive.com
0.0.0.0 appex-rf.msn.com
0.0.0.0 apps.skype.com
0.0.0.0 arc.msn.com
0.0.0.0 arc.msn.com.nsatc.net
0.0.0.0 array101-prod.do.dsp.mp.microsoft.com
0.0.0.0 array102-prod.do.dsp.mp.microsoft.com
0.0.0.0 array103-prod.do.dsp.mp.microsoft.com
0.0.0.0 array104-prod.do.dsp.mp.microsoft.com
0.0.0.0 array201-prod.do.dsp.mp.microsoft.com
0.0.0.0 array202-prod.do.dsp.mp.microsoft.com
0.0.0.0 array203-prod.do.dsp.mp.microsoft.com
0.0.0.0 array204-prod.do.dsp.mp.microsoft.com
0.0.0.0 array401-prod.do.dsp.mp.microsoft.com
0.0.0.0 array402-prod.do.dsp.mp.microsoft.com
0.0.0.0 array403-prod.do.dsp.mp.microsoft.com
0.0.0.0 array404-prod.do.dsp.mp.microsoft.com
0.0.0.0 array405-prod.do.dsp.mp.microsoft.com
0.0.0.0 array406-prod.do.dsp.mp.microsoft.com
0.0.0.0 array407-prod.do.dsp.mp.microsoft.com
0.0.0.0 array408-prod.do.dsp.mp.microsoft.com
0.0.0.0 ars.smartscreen.microsoft.com
0.0.0.0 asimov-win.settings.data.microsoft.com.akadns.net
0.0.0.0 ask.support.microsoft.com
0.0.0.0 assessment.learning.microsoft.com
0.0.0.0 au.download.windowsupdate.com
0.0.0.0 au.v4.download.windowsupdate.com
0.0.0.0 auth.gfx.ms
0.0.0.0 autocomplete.support.microsoft.com
0.0.0.0 autoupdate.microsoft.com
0.0.0.0 autoupdate.windowsmedia.com
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az416426.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 az725175.vo.msecnd.net
0.0.0.0 b.ads1.msn.com
0.0.0.0 b.ads2.msads.net
0.0.0.0 b.office.microsoft.com
0.0.0.0 b.rad.msn.com
0.0.0.0 backup12.microsoft.com
0.0.0.0 bay01.calendar.live.com
0.0.0.0 bay02.calendar.live.com
0.0.0.0 bay03.calendar.live.com
0.0.0.0 bay04.calendar.live.com
0.0.0.0 beta.update.microsoft.com
0.0.0.0 betaoneservices.com
0.0.0.0 betaplace.msbpn.com
0.0.0.0 betaplace.partners.extranet.microsoft.com
0.0.0.0 betaservices.windowsmedia.com
0.0.0.0 bg.v4.a.dl.ws.microsoft.com
0.0.0.0 bg.v4.emdl.ws.microsoft.com
0.0.0.0 bg1.v4.a.dl.ws.microsoft.com
0.0.0.0 bg1.v4.emdl.ws.microsoft.com
0.0.0.0 bg2.v4.a.dl.ws.microsoft.com
0.0.0.0 bg2.v4.emdl.ws.microsoft.com
0.0.0.0 bg3.v4.a.dl.ws.microsoft.com
0.0.0.0 bg3.v4.emdl.ws.microsoft.com
0.0.0.0 bg4.v4.a.dl.ws.microsoft.com
0.0.0.0 bg4.v4.emdl.ws.microsoft.com
0.0.0.0 bg5.v4.a.dl.ws.microsoft.com
0.0.0.0 bg5.v4.emdl.ws.microsoft.com
0.0.0.0 billing.microsoft.com
0.0.0.0 bingads.microsoft.com
0.0.0.0 bingforbusiness.com
0.0.0.0 bl2p.wns.notify.windows.com.akadns.net
0.0.0.0 bl2p.wns.windows.com
0.0.0.0 bl3301-a.1drv.com
0.0.0.0 bl3301-c.1drv.com
0.0.0.0 bl3301-g.1drv.com
0.0.0.0 blob.sn4prdstr03a.store.core.windows.net
0.0.0.0 blob.weather.microsoft.com
0.0.0.0 blugro2gms.groove.microsoft.com
0.0.0.0 bn2b-cor001.api.p001.1drv.com
0.0.0.0 bn2b-cor002.api.p001.1drv.com
0.0.0.0 bn2b-cor003.api.p001.1drv.com
0.0.0.0 bn2b-cor004.api.p001.1drv.com
0.0.0.0 bn2wns1.wns.windows.com
0.0.0.0 bn3p-cor001.api.p001.1drv.com
0.0.0.0 bn3sch020010558.wns.windows.com
0.0.0.0 bn3sch020010560.wns.windows.com
0.0.0.0 bn3sch020010618.wns.windows.com
0.0.0.0 bn3sch020010629.wns.windows.com
0.0.0.0 bn3sch020010631.wns.windows.com
0.0.0.0 bn3sch020010635.wns.windows.com
0.0.0.0 bn3sch020010636.wns.windows.com
0.0.0.0 bn3sch020010650.wns.windows.com
0.0.0.0 bn3sch020011727.wns.windows.com
0.0.0.0 bn3sch020012850.wns.windows.com
0.0.0.0 bn3sch020020322.wns.windows.com
0.0.0.0 bn3sch020020749.wns.windows.com
0.0.0.0 bn3sch020022328.wns.windows.com
0.0.0.0 bn3sch020022335.wns.windows.com
0.0.0.0 bn3sch020022361.wns.windows.com
0.0.0.0 bn4sch101120814.wns.windows.com
0.0.0.0 bn4sch101120818.wns.windows.com
0.0.0.0 bn4sch101120911.wns.windows.com
0.0.0.0 bn4sch101120913.wns.windows.com
0.0.0.0 bn4sch101121019.wns.windows.com
0.0.0.0 bn4sch101121109.wns.windows.com
0.0.0.0 bn4sch101121118.wns.windows.com
0.0.0.0 bn4sch101121223.wns.windows.com
0.0.0.0 bn4sch101121407.wns.windows.com
0.0.0.0 bn4sch101121618.wns.windows.com
0.0.0.0 bn4sch101121704.wns.windows.com
0.0.0.0 bn4sch101121709.wns.windows.com
0.0.0.0 bn4sch101121714.wns.windows.com
0.0.0.0 bn4sch101121908.wns.windows.com
0.0.0.0 bn4sch101122117.wns.windows.com
0.0.0.0 bn4sch101122310.wns.windows.com
0.0.0.0 bn4sch101122312.wns.windows.com
0.0.0.0 bn4sch101122421.wns.windows.com
0.0.0.0 bn4sch101123108.wns.windows.com
0.0.0.0 bn4sch101123110.wns.windows.com
0.0.0.0 bn4sch101123202.wns.windows.com
0.0.0.0 bn4sch102110124.wns.windows.com
0.0.0.0 boardlink.microsoft.com
0.0.0.0 brandtools.partners.extranet.microsoft.com
0.0.0.0 browser.events.data.microsoft.com
0.0.0.0 browser.pipe.aria.microsoft.com
0.0.0.0 bs.serving-sys.com
0.0.0.0 buy.trymicrosoftoffice.com
0.0.0.0 buynow.one.microsoft.com
0.0.0.0 buyoffice.microsoft.com
0.0.0.0 by3301-a.1drv.com
0.0.0.0 by3301-c.1drv.com
0.0.0.0 by3301-e.1drv.com
0.0.0.0 byfiles.storage.live.com
0.0.0.0 c-0001.dc-msedge.net
0.0.0.0 c.atdmt.com
0.0.0.0 c.microsoft.akadns.net
0.0.0.0 c.microsoft.com
0.0.0.0 c.msn.com
0.0.0.0 c.s-microsoft.com
0.0.0.0 c1.microsoft.com
0.0.0.0 c2.microsoft.com
0.0.0.0 c2r.microsoft.com
0.0.0.0 c2rsetup.officeapps.live.com
0.0.0.0 cache.datamart.windows.com
0.0.0.0 candycrushsoda.king.com
0.0.0.0 capccfv2.partners.extranet.microsoft.com
0.0.0.0 careers.microsoft.com
0.0.0.0 catalog.microsoft.com
0.0.0.0 catalog.update.microsoft.com
0.0.0.0 ccp.microsoft.com
0.0.0.0 cdm.microsoft.com
0.0.0.0 cdn.atdmt.com
0.0.0.0 cdn.ay.gy
0.0.0.0 cdn.cloudflare.net
0.0.0.0 cdn.content.prod.cms.msn.com
0.0.0.0 cdn.onenote.net
0.0.0.0 cdp1.public-trust.com
0.0.0.0 cds10.stn.llnw.net
0.0.0.0 cds1203.lon.llnw.net
0.0.0.0 cds1204.lon.llnw.net
0.0.0.0 cds1209.lon.llnw.net
0.0.0.0 cds1219.lon.llnw.net
0.0.0.0 cds1228.lon.llnw.net
0.0.0.0 cds1244.lon.llnw.net
0.0.0.0 cds1257.lon.llnw.net
0.0.0.0 cds1265.lon.llnw.net
0.0.0.0 cds1269.lon.llnw.net
0.0.0.0 cds1273.lon.llnw.net
0.0.0.0 cds1285.lon.llnw.net
0.0.0.0 cds1287.lon.llnw.net
0.0.0.0 cds1289.lon.llnw.net
0.0.0.0 cds1293.lon.llnw.net
0.0.0.0 cds1307.lon.llnw.net
0.0.0.0 cds1310.lon.llnw.net
0.0.0.0 cds1325.lon.llnw.net
0.0.0.0 cds1327.lon.llnw.net
0.0.0.0 cds177.dus.llnw.net
0.0.0.0 cds20005.stn.llnw.net
0.0.0.0 cds20404.lcy.llnw.net
0.0.0.0 cds20411.lcy.llnw.net
0.0.0.0 cds20415.lcy.llnw.net
0.0.0.0 cds20416.lcy.llnw.net
0.0.0.0 cds20417.lcy.llnw.net
0.0.0.0 cds20424.lcy.llnw.net
0.0.0.0 cds20425.lcy.llnw.net
0.0.0.0 cds20431.lcy.llnw.net
0.0.0.0 cds20435.lcy.llnw.net
0.0.0.0 cds20440.lcy.llnw.net
0.0.0.0 cds20443.lcy.llnw.net
0.0.0.0 cds20445.lcy.llnw.net
0.0.0.0 cds20450.lcy.llnw.net
0.0.0.0 cds20452.lcy.llnw.net
0.0.0.0 cds20457.lcy.llnw.net
0.0.0.0 cds20461.lcy.llnw.net
0.0.0.0 cds20469.lcy.llnw.net
0.0.0.0 cds20475.lcy.llnw.net
0.0.0.0 cds20482.lcy.llnw.net
0.0.0.0 cds20485.lcy.llnw.net
0.0.0.0 cds20495.lcy.llnw.net
0.0.0.0 cds21205.lon.llnw.net
0.0.0.0 cds21207.lon.llnw.net
0.0.0.0 cds21225.lon.llnw.net
0.0.0.0 cds21229.lon.llnw.net
0.0.0.0 cds21233.lon.llnw.net
0.0.0.0 cds21238.lon.llnw.net
0.0.0.0 cds21244.lon.llnw.net
0.0.0.0 cds21249.lon.llnw.net
0.0.0.0 cds21256.lon.llnw.net
0.0.0.0 cds21257.lon.llnw.net
0.0.0.0 cds21258.lon.llnw.net
0.0.0.0 cds21261.lon.llnw.net
0.0.0.0 cds21267.lon.llnw.net
0.0.0.0 cds21278.lon.llnw.net
0.0.0.0 cds21281.lon.llnw.net
0.0.0.0 cds21293.lon.llnw.net
0.0.0.0 cds21309.lon.llnw.net
0.0.0.0 cds21313.lon.llnw.net
0.0.0.0 cds21321.lon.llnw.net
0.0.0.0 cds26.ams9.msecn.net
0.0.0.0 cds299.lcy.llnw.net
0.0.0.0 cds30027.stn.llnw.net
0.0.0.0 cds308.lcy.llnw.net
0.0.0.0 cds310.lcy.llnw.net
0.0.0.0 cds38.ory.llnw.net
0.0.0.0 cds405.lcy.llnw.net
0.0.0.0 cds406.lcy.llnw.net
0.0.0.0 cds407.fra.llnw.net
0.0.0.0 cds416.lcy.llnw.net
0.0.0.0 cds421.lcy.llnw.net
0.0.0.0 cds422.lcy.llnw.net
0.0.0.0 cds425.lcy.llnw.net
0.0.0.0 cds426.lcy.llnw.net
0.0.0.0 cds447.lcy.llnw.net
0.0.0.0 cds458.lcy.llnw.net
0.0.0.0 cds459.lcy.llnw.net
0.0.0.0 cds461.lcy.llnw.net
0.0.0.0 cds468.lcy.llnw.net
0.0.0.0 cds469.lcy.llnw.net
0.0.0.0 cds471.lcy.llnw.net
0.0.0.0 cds483.lcy.llnw.net
0.0.0.0 cds484.lcy.llnw.net
0.0.0.0 cds489.lcy.llnw.net
0.0.0.0 cds493.lcy.llnw.net
0.0.0.0 cds494.lcy.llnw.net
0.0.0.0 cds54.ory.llnw.net
0.0.0.0 cds812.lon.llnw.net
0.0.0.0 cds815.lon.llnw.net
0.0.0.0 cds818.lon.llnw.net
0.0.0.0 cds832.lon.llnw.net
0.0.0.0 cds836.lon.llnw.net
0.0.0.0 cds840.lon.llnw.net
0.0.0.0 cds843.lon.llnw.net
0.0.0.0 cds857.lon.llnw.net
0.0.0.0 cds868.lon.llnw.net
0.0.0.0 cds869.lon.llnw.net
0.0.0.0 ceip.microsoft.com
0.0.0.0 centergyremote.partners.extranet.microsoft.com
0.0.0.0 certification.drm.microsoft.com
0.0.0.0 certpartner.one.microsoft.com
0.0.0.0 cgl.microsoft.com
0.0.0.0 ch1-cor001.api.p001.1drv.com
0.0.0.0 ch1-cor002.api.p001.1drv.com
0.0.0.0 ch3301-c.1drv.com
0.0.0.0 ch3301-e.1drv.com
0.0.0.0 ch3301-g.1drv.com
0.0.0.0 ch3302-c.1drv.com
0.0.0.0 ch3302-e.1drv.com
0.0.0.0 challenge.eteam.partners.extranet.microsoft.com
0.0.0.0 channels.microsoft.com
0.0.0.0 checkappexec.microsoft.com
0.0.0.0 choice.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 click.email.microsoftonline.com
0.0.0.0 client-office365-tas.msedge.net
0.0.0.0 client-s.gateway.messenger.live.com
0.0.0.0 client.wns.windows.com
0.0.0.0 clientconfig.passport.net
0.0.0.0 cmtypartnertool.partners.extranet.microsoft.com
0.0.0.0 co2.sls.microsoft.com
0.0.0.0 codepremium.msdn.microsoft.com
0.0.0.0 commerce.microsoft.com
0.0.0.0 community.advertising.microsoft.com
0.0.0.0 community.bingads.microsoft.com
0.0.0.0 compaq.windowsmedia.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 compatexchange1.trafficmanager.net
0.0.0.0 config.edge.skype.com
0.0.0.0 config.teams.microsoft.com
0.0.0.0 configurator.microsoft.com
0.0.0.0 connections.members.microsoft.com
0.0.0.0 content.locator.metadata.windowsmedia.com
0.0.0.0 content.microsoftstore.com
0.0.0.0 continuum.dds.microsoft.com
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 corporate.windowsupdate.microsoft.com
0.0.0.0 crl.microsoft.com
0.0.0.0 crystal.partners.extranet.microsoft.com
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 css.one.microsoft.com
0.0.0.0 ctldl.windowsupdate.com
0.0.0.0 cuai-96.microsoft.com
0.0.0.0 cuai97.microsoft.com
0.0.0.0 curah.microsoft.com
0.0.0.0 cust-supp-chat.one.microsoft.com
0.0.0.0 cy2.settings.data.microsoft.com.akadns.net
0.0.0.0 cy2.vortex.data.microsoft.com.akadns.net
0.0.0.0 cyclescentral.directtaps.net
0.0.0.0 dars.msft.net
0.0.0.0 das.microsoft.com
0.0.0.0 data.choice.microsoft.com
0.0.0.0 data.choice.microsoft.com.nsatc.net
0.0.0.0 data.tvdownload.microsoft.com
0.0.0.0 db3aqu.atdmt.com
0.0.0.0 db3wns2011111.wns.windows.com
0.0.0.0 db5-dspcdn.tlu.dl.delivery.mp.microsoft.com
0.0.0.0 db5-eap.settings-win.data.microsoft.com.akadns.net
0.0.0.0 db5.settings-win.data.microsoft.com.akadns.net
0.0.0.0 db5.settings.data.microsoft.com.akadns.net
0.0.0.0 db5.vortex.data.microsoft.com.akadns.net
0.0.0.0 db5.wns.windows.com
0.0.0.0 db5p.wns.notify.windows.com.akadns.net
0.0.0.0 db5p.wns.windows.com
0.0.0.0 db5sch101100122.wns.windows.com
0.0.0.0 db5sch101100127.wns.windows.com
0.0.0.0 db5sch101100831.wns.windows.com
0.0.0.0 db5sch101100835.wns.windows.com
0.0.0.0 db5sch101100917.wns.windows.com
0.0.0.0 db5sch101100925.wns.windows.com
0.0.0.0 db5sch101100928.wns.windows.com
0.0.0.0 db5sch101100938.wns.windows.com
0.0.0.0 db5sch101101001.wns.windows.com
0.0.0.0 db5sch101101022.wns.windows.com
0.0.0.0 db5sch101101024.wns.windows.com
0.0.0.0 db5sch101101031.wns.windows.com
0.0.0.0 db5sch101101034.wns.windows.com
0.0.0.0 db5sch101101042.wns.windows.com
0.0.0.0 db5sch101101044.wns.windows.com
0.0.0.0 db5sch101101122.wns.windows.com
0.0.0.0 db5sch101101123.wns.windows.com
0.0.0.0 db5sch101101125.wns.windows.com
0.0.0.0 db5sch101101128.wns.windows.com
0.0.0.0 db5sch101101129.wns.windows.com
0.0.0.0 db5sch101101133.wns.windows.com
0.0.0.0 db5sch101101145.wns.windows.com
0.0.0.0 db5sch101101209.wns.windows.com
0.0.0.0 db5sch101101221.wns.windows.com
0.0.0.0 db5sch101101228.wns.windows.com
0.0.0.0 db5sch101101231.wns.windows.com
0.0.0.0 db5sch101101237.wns.windows.com
0.0.0.0 db5sch101101317.wns.windows.com
0.0.0.0 db5sch101101324.wns.windows.com
0.0.0.0 db5sch101101329.wns.windows.com
0.0.0.0 db5sch101101333.wns.windows.com
0.0.0.0 db5sch101101334.wns.windows.com
0.0.0.0 db5sch101101338.wns.windows.com
0.0.0.0 db5sch101101419.wns.windows.com
0.0.0.0 db5sch101101424.wns.windows.com
0.0.0.0 db5sch101101426.wns.windows.com
0.0.0.0 db5sch101101427.wns.windows.com
0.0.0.0 db5sch101101430.wns.windows.com
0.0.0.0 db5sch101101445.wns.windows.com
0.0.0.0 db5sch101101511.wns.windows.com
0.0.0.0 db5sch101101519.wns.windows.com
0.0.0.0 db5sch101101529.wns.windows.com
0.0.0.0 db5sch101101535.wns.windows.com
0.0.0.0 db5sch101101541.wns.windows.com
0.0.0.0 db5sch101101543.wns.windows.com
0.0.0.0 db5sch101101608.wns.windows.com
0.0.0.0 db5sch101101618.wns.windows.com
0.0.0.0 db5sch101101629.wns.windows.com
0.0.0.0 db5sch101101631.wns.windows.com
0.0.0.0 db5sch101101633.wns.windows.com
0.0.0.0 db5sch101101640.wns.windows.com
0.0.0.0 db5sch101101711.wns.windows.com
0.0.0.0 db5sch101101722.wns.windows.com
0.0.0.0 db5sch101101739.wns.windows.com
0.0.0.0 db5sch101101745.wns.windows.com
0.0.0.0 db5sch101101813.wns.windows.com
0.0.0.0 db5sch101101820.wns.windows.com
0.0.0.0 db5sch101101826.wns.windows.com
0.0.0.0 db5sch101101828.wns.windows.com
0.0.0.0 db5sch101101835.wns.windows.com
0.0.0.0 db5sch101101837.wns.windows.com
0.0.0.0 db5sch101101844.wns.windows.com
0.0.0.0 db5sch101101902.wns.windows.com
0.0.0.0 db5sch101101907.wns.windows.com
0.0.0.0 db5sch101101910.wns.windows.com
0.0.0.0 db5sch101101914.wns.windows.com
0.0.0.0 db5sch101101929.wns.windows.com
0.0.0.0 db5sch101101939.wns.windows.com
0.0.0.0 db5sch101101941.wns.windows.com
0.0.0.0 db5sch101102015.wns.windows.com
0.0.0.0 db5sch101102017.wns.windows.com
0.0.0.0 db5sch101102019.wns.windows.com
0.0.0.0 db5sch101102023.wns.windows.com
0.0.0.0 db5sch101102025.wns.windows.com
0.0.0.0 db5sch101102032.wns.windows.com
0.0.0.0 db5sch101102033.wns.windows.com
0.0.0.0 db5sch101110108.wns.windows.com
0.0.0.0 db5sch101110109.wns.windows.com
0.0.0.0 db5sch101110114.wns.windows.com
0.0.0.0 db5sch101110135.wns.windows.com
0.0.0.0 db5sch101110142.wns.windows.com
0.0.0.0 db5sch101110204.wns.windows.com
0.0.0.0 db5sch101110206.wns.windows.com
0.0.0.0 db5sch101110214.wns.windows.com
0.0.0.0 db5sch101110225.wns.windows.com
0.0.0.0 db5sch101110232.wns.windows.com
0.0.0.0 db5sch101110245.wns.windows.com
0.0.0.0 db5sch101110315.wns.windows.com
0.0.0.0 db5sch101110323.wns.windows.com
0.0.0.0 db5sch101110325.wns.windows.com
0.0.0.0 db5sch101110328.wns.windows.com
0.0.0.0 db5sch101110331.wns.windows.com
0.0.0.0 db5sch101110341.wns.windows.com
0.0.0.0 db5sch101110343.wns.windows.com
0.0.0.0 db5sch101110345.wns.windows.com
0.0.0.0 db5sch101110403.wns.windows.com
0.0.0.0 db5sch101110408.wns.windows.com
0.0.0.0 db5sch101110419.wns.windows.com
0.0.0.0 db5sch101110428.wns.windows.com
0.0.0.0 db5sch101110435.wns.windows.com
0.0.0.0 db5sch101110438.wns.windows.com
0.0.0.0 db5sch101110442.wns.windows.com
0.0.0.0 db5sch101110501.wns.windows.com
0.0.0.0 db5sch101110510.wns.windows.com
0.0.0.0 db5sch101110518.wns.windows.com
0.0.0.0 db5sch101110527.wns.windows.com
0.0.0.0 db5sch101110533.wns.windows.com
0.0.0.0 db5sch101110618.wns.windows.com
0.0.0.0 db5sch101110621.wns.windows.com
0.0.0.0 db5sch101110622.wns.windows.com
0.0.0.0 db5sch101110624.wns.windows.com
0.0.0.0 db5sch101110626.wns.windows.com
0.0.0.0 db5sch101110634.wns.windows.com
0.0.0.0 db5sch101110705.wns.windows.com
0.0.0.0 db5sch101110713.wns.windows.com
0.0.0.0 db5sch101110724.wns.windows.com
0.0.0.0 db5sch101110729.wns.windows.com
0.0.0.0 db5sch101110740.wns.windows.com
0.0.0.0 db5sch101110810.wns.windows.com
0.0.0.0 db5sch101110816.wns.windows.com
0.0.0.0 db5sch101110821.wns.windows.com
0.0.0.0 db5sch101110822.wns.windows.com
0.0.0.0 db5sch101110825.wns.windows.com
0.0.0.0 db5sch101110828.wns.windows.com
0.0.0.0 db5sch101110829.wns.windows.com
0.0.0.0 db5sch101110831.wns.windows.com
0.0.0.0 db5sch101110835.wns.windows.com
0.0.0.0 db5sch101110919.wns.windows.com
0.0.0.0 db5sch101110921.wns.windows.com
0.0.0.0 db5sch101110923.wns.windows.com
0.0.0.0 db5sch101110929.wns.windows.com
0.0.0.0 db5sch103081814.wns.windows.com
0.0.0.0 db5sch103081913.wns.windows.com
0.0.0.0 db5sch103082011.wns.windows.com
0.0.0.0 db5sch103082111.wns.windows.com
0.0.0.0 db5sch103082308.wns.windows.com
0.0.0.0 db5sch103082406.wns.windows.com
0.0.0.0 db5sch103082409.wns.windows.com
0.0.0.0 db5sch103082609.wns.windows.com
0.0.0.0 db5sch103082611.wns.windows.com
0.0.0.0 db5sch103082709.wns.windows.com
0.0.0.0 db5sch103082712.wns.windows.com
0.0.0.0 db5sch103082806.wns.windows.com
0.0.0.0 db5sch103090115.wns.windows.com
0.0.0.0 db5sch103090210.wns.windows.com
0.0.0.0 db5sch103090414.wns.windows.com
0.0.0.0 db5sch103090415.wns.windows.com
0.0.0.0 db5sch103090513.wns.windows.com
0.0.0.0 db5sch103090515.wns.windows.com
0.0.0.0 db5sch103090608.wns.windows.com
0.0.0.0 db5sch103090806.wns.windows.com
0.0.0.0 db5sch103090814.wns.windows.com
0.0.0.0 db5sch103090906.wns.windows.com
0.0.0.0 db5sch103091011.wns.windows.com
0.0.0.0 db5sch103091012.wns.windows.com
0.0.0.0 db5sch103091106.wns.windows.com
0.0.0.0 db5sch103091108.wns.windows.com
0.0.0.0 db5sch103091212.wns.windows.com
0.0.0.0 db5sch103091311.wns.windows.com
0.0.0.0 db5sch103091313.wns.windows.com
0.0.0.0 db5sch103091414.wns.windows.com
0.0.0.0 db5sch103091511.wns.windows.com
0.0.0.0 db5sch103091609.wns.windows.com
0.0.0.0 db5sch103091617.wns.windows.com
0.0.0.0 db5sch103091715.wns.windows.com
0.0.0.0 db5sch103091817.wns.windows.com
0.0.0.0 db5sch103091908.wns.windows.com
0.0.0.0 db5sch103091911.wns.windows.com
0.0.0.0 db5sch103092010.wns.windows.com
0.0.0.0 db5sch103092108.wns.windows.com
0.0.0.0 db5sch103092109.wns.windows.com
0.0.0.0 db5sch103092209.wns.windows.com
0.0.0.0 db5sch103092210.wns.windows.com
0.0.0.0 db5sch103092509.wns.windows.com
0.0.0.0 db5sch103100117.wns.windows.com
0.0.0.0 db5sch103100121.wns.windows.com
0.0.0.0 db5sch103100221.wns.windows.com
0.0.0.0 db5sch103100313.wns.windows.com
0.0.0.0 db5sch103100314.wns.windows.com
0.0.0.0 db5sch103100412.wns.windows.com
0.0.0.0 db5sch103100510.wns.windows.com
0.0.0.0 db5sch103100511.wns.windows.com
0.0.0.0 db5sch103100611.wns.windows.com
0.0.0.0 db5sch103100712.wns.windows.com
0.0.0.0 db5sch103101105.wns.windows.com
0.0.0.0 db5sch103101208.wns.windows.com
0.0.0.0 db5sch103101212.wns.windows.com
0.0.0.0 db5sch103101314.wns.windows.com
0.0.0.0 db5sch103101411.wns.windows.com
0.0.0.0 db5sch103101413.wns.windows.com
0.0.0.0 db5sch103101513.wns.windows.com
0.0.0.0 db5sch103101610.wns.windows.com
0.0.0.0 db5sch103101611.wns.windows.com
0.0.0.0 db5sch103101705.wns.windows.com
0.0.0.0 db5sch103101711.wns.windows.com
0.0.0.0 db5sch103101813.wns.windows.com
0.0.0.0 db5sch103101909.wns.windows.com
0.0.0.0 db5sch103101914.wns.windows.com
0.0.0.0 db5sch103102009.wns.windows.com
0.0.0.0 db5sch103102112.wns.windows.com
0.0.0.0 db5sch103102203.wns.windows.com
0.0.0.0 db5sch103102209.wns.windows.com
0.0.0.0 db5sch103102310.wns.windows.com
0.0.0.0 db5sch103102404.wns.windows.com
0.0.0.0 db5sch103102410.wns.windows.com
0.0.0.0 db5sch103102516.wns.windows.com
0.0.0.0 db5sch103102609.wns.windows.com
0.0.0.0 db5sch103102610.wns.windows.com
0.0.0.0 db5sch103102710.wns.windows.com
0.0.0.0 db5sch103102711.wns.windows.com
0.0.0.0 db5sch103102805.wns.windows.com
0.0.0.0 db5wns1d.wns.windows.com
0.0.0.0 db6sch102090104.wns.windows.com
0.0.0.0 db6sch102090109.wns.windows.com
0.0.0.0 db6sch102090112.wns.windows.com
0.0.0.0 db6sch102090116.wns.windows.com
0.0.0.0 db6sch102090122.wns.windows.com
0.0.0.0 db6sch102090203.wns.windows.com
0.0.0.0 db6sch102090206.wns.windows.com
0.0.0.0 db6sch102090208.wns.windows.com
0.0.0.0 db6sch102090209.wns.windows.com
0.0.0.0 db6sch102090210.wns.windows.com
0.0.0.0 db6sch102090211.wns.windows.com
0.0.0.0 db6sch102090212.wns.windows.com
0.0.0.0 db6sch102090305.wns.windows.com
0.0.0.0 db6sch102090306.wns.windows.com
0.0.0.0 db6sch102090308.wns.windows.com
0.0.0.0 db6sch102090311.wns.windows.com
0.0.0.0 db6sch102090313.wns.windows.com
0.0.0.0 db6sch102090410.wns.windows.com
0.0.0.0 db6sch102090412.wns.windows.com
0.0.0.0 db6sch102090504.wns.windows.com
0.0.0.0 db6sch102090510.wns.windows.com
0.0.0.0 db6sch102090512.wns.windows.com
0.0.0.0 db6sch102090513.wns.windows.com
0.0.0.0 db6sch102090514.wns.windows.com
0.0.0.0 db6sch102090519.wns.windows.com
0.0.0.0 db6sch102090613.wns.windows.com
0.0.0.0 db6sch102090619.wns.windows.com
0.0.0.0 db6sch102090810.wns.windows.com
0.0.0.0 db6sch102090811.wns.windows.com
0.0.0.0 db6sch102090902.wns.windows.com
0.0.0.0 db6sch102090905.wns.windows.com
0.0.0.0 db6sch102090907.wns.windows.com
0.0.0.0 db6sch102090908.wns.windows.com
0.0.0.0 db6sch102090910.wns.windows.com
0.0.0.0 db6sch102090911.wns.windows.com
0.0.0.0 db6sch102091003.wns.windows.com
0.0.0.0 db6sch102091007.wns.windows.com
0.0.0.0 db6sch102091008.wns.windows.com
0.0.0.0 db6sch102091009.wns.windows.com
0.0.0.0 db6sch102091011.wns.windows.com
0.0.0.0 db6sch102091103.wns.windows.com
0.0.0.0 db6sch102091105.wns.windows.com
0.0.0.0 db6sch102091204.wns.windows.com
0.0.0.0 db6sch102091205.wns.windows.com
0.0.0.0 db6sch102091209.wns.windows.com
0.0.0.0 db6sch102091305.wns.windows.com
0.0.0.0 db6sch102091307.wns.windows.com
0.0.0.0 db6sch102091308.wns.windows.com
0.0.0.0 db6sch102091309.wns.windows.com
0.0.0.0 db6sch102091314.wns.windows.com
0.0.0.0 db6sch102091412.wns.windows.com
0.0.0.0 db6sch102091503.wns.windows.com
0.0.0.0 db6sch102091507.wns.windows.com
0.0.0.0 db6sch102091508.wns.windows.com
0.0.0.0 db6sch102091602.wns.windows.com
0.0.0.0 db6sch102091603.wns.windows.com
0.0.0.0 db6sch102091606.wns.windows.com
0.0.0.0 db6sch102091607.wns.windows.com
0.0.0.0 dcodews.partners.extranet.microsoft.com
0.0.0.0 dcs.ccp.microsoft.com
0.0.0.0 definitionupdates.microsoft.com
0.0.0.0 delivery.pens.microsoft.com
0.0.0.0 delivery.smtp.microsoft.com
0.0.0.0 delivery2.pens.microsoft.com
0.0.0.0 dev.virtualearth.net
0.0.0.0 device.auth.xboxlive.com
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 dgl.microsoft.com
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 directory.microsoft.com
0.0.0.0 directory.netmeeting.microsoft.com
0.0.0.0 directory.partners.extranet.microsoft.com
0.0.0.0 discuss.microsoft.com
0.0.0.0 displaycatalog.mp.microsoft.com
0.0.0.0 dl.delivery.mp.microsoft.com
0.0.0.0 dlbmodigital.microsoft.com
0.0.0.0 dmd.metaservices.microsoft.com
0.0.0.0 dmd.metaservices.microsoft.com.akadns.net
0.0.0.0 dns.msftncsi.com
0.0.0.0 dns2.tk.msft.net
0.0.0.0 dns3.tk.msft.net
0.0.0.0 domains.googlesyndication.com
0.0.0.0 domains.live.com
0.0.0.0 down.saservices.microsoft.com
0.0.0.0 download.microsoft.com
0.0.0.0 download.windowsupdate.com
0.0.0.0 downloadoffice2010.microsoft.com
0.0.0.0 drm.microsoft.com
0.0.0.0 drmlicense.one.microsoft.com
0.0.0.0 ds.download.windowsupdate.com
0.0.0.0 ds.microsoft.com
0.0.0.0 dynamics-crm.pinpoint.microsoft.com
0.0.0.0 e2835.dspb.akamaiedge.net
0.0.0.0 e7341.g.akamaiedge.net
0.0.0.0 e7502.ce.akamaiedge.net
0.0.0.0 e8218.ce.akamaiedge.net
0.0.0.0 ec.atdmt.com
0.0.0.0 ecn.dev.virtualearth.net
0.0.0.0 email.microsoft.com
0.0.0.0 email2.microsoft.com
0.0.0.0 emdl.ws.microsoft.com
0.0.0.0 emea.microsoftstore.com
0.0.0.0 emeaselling.partners.extranet.microsoft.com
0.0.0.0 empower-isv.one.microsoft.com
0.0.0.0 entimg-origin.msn.com
0.0.0.0 eopen.microsoft.com
0.0.0.0 epg.tvdownload.microsoft.com
0.0.0.0 epp.microsoft.com
0.0.0.0 eu-v10.events.data.microsoft.com
0.0.0.0 eu-v20.events.data.microsoft.com
0.0.0.0 eu.microsoft.com
0.0.0.0 eu.vortex-win.data.microsoft.com
0.0.0.0 eu.vortex.data.microsoft.com
0.0.0.0 europe.smartscreen-prod.microsoft.com
0.0.0.0 events.data.microsoft.com
0.0.0.0 events.microsoft.com
0.0.0.0 events.microsoftvirtualacademy.com
0.0.0.0 evoke-windowsservices-tas.msedge.net
0.0.0.0 example.microsoft.com
0.0.0.0 excel.office.live.com
0.0.0.0 extranet.microsoft-int.com
0.0.0.0 extranet.microsoft.com
0.0.0.0 f.email.microsoft.com
0.0.0.0 fai.music.metaservices.microsoft.com
0.0.0.0 familysafety.microsoft.com
0.0.0.0 favorites.live.com
0.0.0.0 fd.bingads.microsoft.com
0.0.0.0 fe1.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 fe2.ws.microsoft.com
0.0.0.0 fe2.ws.microsoft.com.nsatc.net
0.0.0.0 fe2cr.update.microsoft.com
0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net
0.0.0.0 fe3.delivery.mp.microsoft.com
0.0.0.0 fe3cr.delivery.mp.microsoft.com
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 feedback.windows.com
0.0.0.0 feeds.microsoft.com
0.0.0.0 fg.ds.b1.download.windowsupdate.com
0.0.0.0 fg.v4.download.windowsupdate.com
0.0.0.0 finance.services.appex.bing.com
0.0.0.0 fixitcenter.support.microsoft.com
0.0.0.0 flex.msn.com
0.0.0.0 foodanddrink.tile.appex.bing.com
0.0.0.0 forefrontdl.microsoft.com
0.0.0.0 forinstall.linked-bigstyler.com
0.0.0.0 fr-fr.appex-rf.msn.com
0.0.0.0 freebusy.office.microsoft.com
0.0.0.0 fs.microsoft.com
0.0.0.0 fulfilloffer.microsoft.com
0.0.0.0 fullproduct.download.microsoft.com
0.0.0.0 fuse.microsoft.com
0.0.0.0 g.bing.com
0.0.0.0 g.live.com
0.0.0.0 g.microsoft.com
0.0.0.0 g.microsoftonline.com
0.0.0.0 g.msn.com
0.0.0.0 g3.microsoft.com
0.0.0.0 genuine.microsoft.com
0.0.0.0 genuinebeta.microsoft.com
0.0.0.0 geo-prod.do.dsp.mp.microsoft.com
0.0.0.0 geo.settings-win.data.microsoft.com.akadns.net
0.0.0.0 geo.settings.data.microsoft.com.akadns.net
0.0.0.0 geo.vortex.data.microsoft.com.akadns.net
0.0.0.0 geover-prod.do.dsp.mp.microsoft.com
0.0.0.0 glbdns.microsoft.com
0.0.0.0 global.sam.msn.com
0.0.0.0 go.microsoft.akadns.net
0.0.0.0 h1.msn.com
0.0.0.0 h2.msn.com
0.0.0.0 hdshowcase.microsoft.com
0.0.0.0 help.bingads.microsoft.com
0.0.0.0 hk2.settings.data.microsoft.com.akadns.net
0.0.0.0 hk2.wns.windows.com
0.0.0.0 hk2sch130020721.wns.windows.com
0.0.0.0 hk2sch130020723.wns.windows.com
0.0.0.0 hk2sch130020726.wns.windows.com
0.0.0.0 hk2sch130020729.wns.windows.com
0.0.0.0 hk2sch130020732.wns.windows.com
0.0.0.0 hk2sch130020824.wns.windows.com
0.0.0.0 hk2sch130020843.wns.windows.com
0.0.0.0 hk2sch130020851.wns.windows.com
0.0.0.0 hk2sch130020854.wns.windows.com
0.0.0.0 hk2sch130020855.wns.windows.com
0.0.0.0 hk2sch130020924.wns.windows.com
0.0.0.0 hk2sch130020936.wns.windows.com
0.0.0.0 hk2sch130020940.wns.windows.com
0.0.0.0 hk2sch130020956.wns.windows.com
0.0.0.0 hk2sch130020958.wns.windows.com
0.0.0.0 hk2sch130020961.wns.windows.com
0.0.0.0 hk2sch130021017.wns.windows.com
0.0.0.0 hk2sch130021029.wns.windows.com
0.0.0.0 hk2sch130021035.wns.windows.com
0.0.0.0 hk2sch130021137.wns.windows.com
0.0.0.0 hk2sch130021142.wns.windows.com
0.0.0.0 hk2sch130021153.wns.windows.com
0.0.0.0 hk2sch130021217.wns.windows.com
0.0.0.0 hk2sch130021246.wns.windows.com
0.0.0.0 hk2sch130021249.wns.windows.com
0.0.0.0 hk2sch130021260.wns.windows.com
0.0.0.0 hk2sch130021264.wns.windows.com
0.0.0.0 hk2sch130021322.wns.windows.com
0.0.0.0 hk2sch130021323.wns.windows.com
0.0.0.0 hk2sch130021329.wns.windows.com
0.0.0.0 hk2sch130021334.wns.windows.com
0.0.0.0 hk2sch130021360.wns.windows.com
0.0.0.0 hk2sch130021432.wns.windows.com
0.0.0.0 hk2sch130021433.wns.windows.com
0.0.0.0 hk2sch130021435.wns.windows.com
0.0.0.0 hk2sch130021437.wns.windows.com
0.0.0.0 hk2sch130021440.wns.windows.com
0.0.0.0 hk2sch130021450.wns.windows.com
0.0.0.0 hk2sch130021518.wns.windows.com
0.0.0.0 hk2sch130021523.wns.windows.com
0.0.0.0 hk2sch130021526.wns.windows.com
0.0.0.0 hk2sch130021527.wns.windows.com
0.0.0.0 hk2sch130021544.wns.windows.com
0.0.0.0 hk2sch130021554.wns.windows.com
0.0.0.0 hk2sch130021618.wns.windows.com
0.0.0.0 hk2sch130021634.wns.windows.com
0.0.0.0 hk2sch130021638.wns.windows.com
0.0.0.0 hk2sch130021646.wns.windows.com
0.0.0.0 hk2sch130021652.wns.windows.com
0.0.0.0 hk2sch130021654.wns.windows.com
0.0.0.0 hk2sch130021657.wns.windows.com
0.0.0.0 hk2sch130021723.wns.windows.com
0.0.0.0 hk2sch130021726.wns.windows.com
0.0.0.0 hk2sch130021727.wns.windows.com
0.0.0.0 hk2sch130021730.wns.windows.com
0.0.0.0 hk2sch130021731.wns.windows.com
0.0.0.0 hk2sch130021754.wns.windows.com
0.0.0.0 hk2sch130021829.wns.windows.com
0.0.0.0 hk2sch130021830.wns.windows.com
0.0.0.0 hk2sch130021833.wns.windows.com
0.0.0.0 hk2sch130021840.wns.windows.com
0.0.0.0 hk2sch130021842.wns.windows.com
0.0.0.0 hk2sch130021851.wns.windows.com
0.0.0.0 hk2sch130021852.wns.windows.com
0.0.0.0 hk2sch130021927.wns.windows.com
0.0.0.0 hk2sch130021928.wns.windows.com
0.0.0.0 hk2sch130021929.wns.windows.com
0.0.0.0 hk2sch130021958.wns.windows.com
0.0.0.0 hk2sch130022035.wns.windows.com
0.0.0.0 hk2sch130022041.wns.windows.com
0.0.0.0 hk2sch130022049.wns.windows.com
0.0.0.0 hk2sch130022135.wns.windows.com
0.0.0.0 hk2wns1.wns.windows.com
0.0.0.0 hk2wns1b.wns.windows.com
0.0.0.0 holiday.microsoftstore.com
0.0.0.0 home.microsoft.com
0.0.0.0 hostedocsp.globalsign.com
0.0.0.0 hp.windowsmedia.com
0.0.0.0 hs.windows.microsoft.com
0.0.0.0 hup.microsoft.com
0.0.0.0 i-bl6p-cor001.api.p001.1drv.com
0.0.0.0 i-bl6p-cor002.api.p001.1drv.com
0.0.0.0 i-bn3p-cor001.api.p001.1drv.com
0.0.0.0 i-by3p-cor001.api.p001.1drv.com
0.0.0.0 i-by3p-cor002.api.p001.1drv.com
0.0.0.0 i-ch1-cor001.api.p001.1drv.com
0.0.0.0 i-ch1-cor002.api.p001.1drv.com
0.0.0.0 i-sn2-cor001.api.p001.1drv.com
0.0.0.0 i-sn2-cor002.api.p001.1drv.com
0.0.0.0 i-sn3p-cor001.api.p001.1drv.com
0.0.0.0 i.microsoft.com
0.0.0.0 i.msdn.microsoft.com
0.0.0.0 i.office.microsoft.com
0.0.0.0 i.s-microsoft.com
0.0.0.0 i.technet.microsoft.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 i2.microsoft.com
0.0.0.0 i2.msdn.microsoft.com
0.0.0.0 i2.services.social.microsoft.com
0.0.0.0 i2.technet.microsoft.com
0.0.0.0 i3.microsoft.com
0.0.0.0 i3.services.social.microsoft.com
0.0.0.0 i4.services.social.microsoft.com
0.0.0.0 ia.microsoft.com
0.0.0.0 icassp98.microsoft.com
0.0.0.0 ice.microsoft.com
0.0.0.0 icmods.microsoft.com
0.0.0.0 ics.one.microsoft.com
0.0.0.0 ie.components.microsoft.com
0.0.0.0 ie8.msn.com
0.0.0.0 ieak.microsoft.com
0.0.0.0 iecvlist.microsoft.com
0.0.0.0 ieonline.microsoft.com
0.0.0.0 ilabdc.directtaps.net
0.0.0.0 images2.store.microsoft.com
0.0.0.0 img-prod-cms-rt-microsoft-com.akamaized.net
0.0.0.0 img-s-msn-com.akamaized.net
0.0.0.0 img.microsoft.com
0.0.0.0 img.stb.s-msn.com
0.0.0.0 inference.location.live.net
0.0.0.0 info.music.metaservices.microsoft.com
0.0.0.0 insiderservice.microsoft.com
0.0.0.0 invoice.microsoft.com
0.0.0.0 ipv4.login.live.com
0.0.0.0 iso.esd.microsoft.com
0.0.0.0 ispreferral.microsoft.com
0.0.0.0 isvmex.team.partners.extranet.microsoft.com
0.0.0.0 iwsolve.partners.extranet.microsoft.com
0.0.0.0 jdp.microsoft.com
0.0.0.0 js.microsoft.com
0.0.0.0 kcenter.partners.extranet.microsoft.com
0.0.0.0 lb1.www.ms.akadns.net
0.0.0.0 learningcenter.partners.extranet.microsoft.com
0.0.0.0 lg.home.microsoft.com
0.0.0.0 li581-132.members.linode.com
0.0.0.0 licensecode.one.microsoft.com
0.0.0.0 licenseserver.windowsmedia.com
0.0.0.0 licensing.microsoft.com
0.0.0.0 licensing.mp.microsoft.com
0.0.0.0 live.rads.msn.com
0.0.0.0 lobby.microsoftstore.com
0.0.0.0 location-inference-westus.cloudapp.net
0.0.0.0 locator.metadata.windowsmedia.com
0.0.0.0 login.domains.live.com
0.0.0.0 login.live.com
0.0.0.0 login.microsoftonline.com
0.0.0.0 login.msa.akadns6.net
0.0.0.0 logincdn.msauth.net
0.0.0.0 lync.microsoft.com
0.0.0.0 lynconline.pinpoint.microsoft.com
0.0.0.0 m.adnxs.com
0.0.0.0 m.hotmail.com
0.0.0.0 m.microsoft.com
0.0.0.0 m.microsoftstore.com
0.0.0.0 mac2.microsoft.com
0.0.0.0 mail3.microsoft.com
0.0.0.0 mail3.mssupport.microsoft.com
0.0.0.0 manage.devcenter.microsoft.com
0.0.0.0 maps.microsoft.com
0.0.0.0 maps.windows.com
0.0.0.0 marketing.microsoft.com
0.0.0.0 mbs.microsoft.com
0.0.0.0 mc1.maps.live.com
0.0.0.0 mcp.microsoft.com
0.0.0.0 mcsp.microsoft.com
0.0.0.0 mcspreferral.microsoft.com
0.0.0.0 mediadl.microsoft.com
0.0.0.0 mediaredirect.microsoft.com
0.0.0.0 medtronics.team.partners.extranet.microsoft.com
0.0.0.0 membercenter.office.microsoft.com
0.0.0.0 members.microsoft.com
0.0.0.0 memberstest2.microsoft.com
0.0.0.0 mert.microsoft.com
0.0.0.0 messaging.office.microsoft.com
0.0.0.0 messenger.live.com
0.0.0.0 messenger.microsoft.com
0.0.0.0 metadata.windowsmedia.com
0.0.0.0 metaservices.microsoft.com
0.0.0.0 metaservices.windowsmedia.com
0.0.0.0 mgn.microsoft.com
0.0.0.0 microsoft-careers.com
0.0.0.0 microsoft-int.com
0.0.0.0 microsoft.software.net
0.0.0.0 microsoftelearning.com
0.0.0.0 microsoftlawportal.net
0.0.0.0 microsoftlicense.com
0.0.0.0 microsoftlicensereview.com
0.0.0.0 microsoftonline.com
0.0.0.0 microsoftportal.net
0.0.0.0 microsoftstore.it
0.0.0.0 microsoftstore.me
0.0.0.0 microsofttouch.fr
0.0.0.0 microsoftupdate.com
0.0.0.0 microsoftupdate.microsoft.com
0.0.0.0 microsoftupdates.eu
0.0.0.0 microsoftvolumelicensing.com
0.0.0.0 mla.microsoft.com
0.0.0.0 mobile.events.data.microsoft.com
0.0.0.0 mobile.pipe.aria.microsoft.com
0.0.0.0 mobileconfig.net
0.0.0.0 mocl.one.microsoft.com
0.0.0.0 modern.watson.data.microsoft.com.akadns.net
0.0.0.0 moet.microsoft.com
0.0.0.0 movie.metadata.windowsmedia.com
0.0.0.0 mpa.one.microsoft.com
0.0.0.0 mpan.microsoft.com
0.0.0.0 mpanbeta.microsoft.com
0.0.0.0 mppe.partners.extranet.microsoft.com
0.0.0.0 mrodevicemgr.officeapps.live.com
0.0.0.0 ms.a.microsoft.com
0.0.0.0 msa.one.microsoft.com
0.0.0.0 msagfx.live.com
0.0.0.0 mscrl.microsoft.com
0.0.0.0 msdl.microsoft.com
0.0.0.0 msdn.one.microsoft.com
0.0.0.0 msdnisv.microsoft.com
0.0.0.0 msedge.net
0.0.0.0 msevents-as.microsoft.com
0.0.0.0 msevents-eu.microsoft.com
0.0.0.0 msevents.microsoft.com
0.0.0.0 mseventsppe.microsoft.com
0.0.0.0 msftncsi.com
0.0.0.0 msftopenus.partners.extranet.microsoft.com
0.0.0.0 mshome.net
0.0.0.0 msnbot-65-55-108-23.search.msn.com
0.0.0.0 msnews.microsoft.com
0.0.0.0 msntest.serving-sys.com
0.0.0.0 msops.microsoft.com
0.0.0.0 mspartner.microsoft.com
0.0.0.0 mspress.microsoft.com
0.0.0.0 msrcmt.research.microsoft.com
0.0.0.0 mt.saservices.microsoft.com
0.0.0.0 mtcppoc.directtaps.net
0.0.0.0 murl.microsoft.com
0.0.0.0 music.metaservices.microsoft.com
0.0.0.0 music.submissions.metaservices.microsoft.com
0.0.0.0 mvp.microsoft.com
0.0.0.0 mvp.support.microsoft.com
0.0.0.0 mvp.support.ppe.microsoft.com
0.0.0.0 mymfe.microsoft.com
0.0.0.0 mywindowsmobile.co.uk
0.0.0.0 mywindowsmobile.com
0.0.0.0 mywindowsmobile.de
0.0.0.0 na.msdn.microsoft.com
0.0.0.0 nav.smartscreen.microsoft.com
0.0.0.0 ncsi.glbdns.microsoft.com
0.0.0.0 netc.members.microsoft.com
0.0.0.0 netmeeting.microsoft.com
0.0.0.0 netscan.research.microsoft.com
0.0.0.0 netservforextranet.microsoft.com
0.0.0.0 newsletters.microsoft.com
0.0.0.0 next-services.apps.microsoft.com
0.0.0.0 nexus.officeapps.live.com
0.0.0.0 nexusrules.officeapps.live.com
0.0.0.0 ns.microsoft.com
0.0.0.0 ntservicepack.microsoft.com
0.0.0.0 nz.partners.retail.microsoft.com
0.0.0.0 nz.xbox.partners.retail.microsoft.com
0.0.0.0 o15.officeredir.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 ocos-office365-s2s.msedge.net
0.0.0.0 odc.officeapps.live.com
0.0.0.0 office.live.com
0.0.0.0 office.microsoft.com
0.0.0.0 office2010.microsoft.com
0.0.0.0 office365.microsoft.com
0.0.0.0 office365.pinpoint.microsoft.com
0.0.0.0 officebeta.microsoft.com
0.0.0.0 officecdn.microsoft.com
0.0.0.0 officecdn.microsoft.com.edgesuite.net
0.0.0.0 officeclient.microsoft.com
0.0.0.0 officeimages.microsoft.com
0.0.0.0 officeint.microsoft.com
0.0.0.0 officelive.microsoft.com
0.0.0.0 officeoffer.one.microsoft.com
0.0.0.0 officeredir.microsoft.com
0.0.0.0 officesas.microsoft.com
0.0.0.0 officeupdate.microsoft.com
0.0.0.0 om.one.microsoft.com
0.0.0.0 oms.one.microsoft.com
0.0.0.0 oms2.one.microsoft.com
0.0.0.0 onboarding.data.tvdownload.microsoft.com
0.0.0.0 onboarding.epg.tvdownload.microsoft.com
0.0.0.0 one.microsoft.com
0.0.0.0 oneclient.sfx.ms
0.0.0.0 onecollector.cloudapp.aria.akadns.net
0.0.0.0 onlinehelp.microsoft.com
0.0.0.0 onlinestores.metaservices.microsoft.com
0.0.0.0 origin-codecs.microsoft.com
0.0.0.0 origin-images.windowsmedia.com
0.0.0.0 osl.microsoft.com
0.0.0.0 otf.msn.com
0.0.0.0 outlook.microsoft.com
0.0.0.0 outlook.office365.com
0.0.0.0 p.email.microsoft.com
0.0.0.0 partner.microsoft.com
0.0.0.0 partnerconnect.microsoft.com
0.0.0.0 partnering.one.microsoft.com
0.0.0.0 partners.extranet.microsoft-int.com
0.0.0.0 partners.extranet.microsoft.com
0.0.0.0 partners.microsoft.com
0.0.0.0 partners.retail.microsoft.com
0.0.0.0 partners.sts.microsoft.com
0.0.0.0 partnerstraining.microsoft.com
0.0.0.0 partnersupport.microsoft.com
0.0.0.0 pens.microsoft.com
0.0.0.0 personaluselicense.windows.com
0.0.0.0 phishingfilter.microsoft.com
0.0.0.0 phoenixbillingtest.partners.extranet.microsoft-int.com
0.0.0.0 phones.microsoftstore.com
0.0.0.0 pilot.premier.microsoft.com
0.0.0.0 pingdom.com
0.0.0.0 pinpoint.microsoft-ppe.com
0.0.0.0 pinpoint.microsoft.com
0.0.0.0 planningservices.partners.extranet.microsoft.com
0.0.0.0 portal.microsoftonline.com
0.0.0.0 powerpoint.office.live.com
0.0.0.0 ppe.microsoft.com
0.0.0.0 pre.footprintpredict.com
0.0.0.0 premier.microsoft.com
0.0.0.0 premierdownload.microsoft.com
0.0.0.0 premieritaly.eteam.partners.extranet.microsoft.com
0.0.0.0 preview.data.tvdownload.microsoft.com
0.0.0.0 preview.info.music.metaservices.microsoft.com
0.0.0.0 preview.msn.com
0.0.0.0 preview.music.submissions.metaservices.microsoft.com
0.0.0.0 preview.services.wmdrm.windowsmedia.com
0.0.0.0 preview.serviceswitching.metadata.windowsmedia.com
0.0.0.0 preview.vcs.metaservices.microsoft.com
0.0.0.0 preview.video.metaservices.microsoft.com
0.0.0.0 preview.windows.com
0.0.0.0 previewa.locator.metadata.windowsmedia.com
0.0.0.0 previewa.movie.metadata.windowsmedia.com
0.0.0.0 pricelist.skype.com
0.0.0.0 privacy.microsoft.com
0.0.0.0 privatenews.microsoft.com
0.0.0.0 prodreg.microsoft.com
0.0.0.0 productstudio.partners.extranet.microsoft.com
0.0.0.0 profile.live.com
0.0.0.0 profile.microsoft.com
0.0.0.0 profileppe.microsoft.com
0.0.0.0 profiletest2.microsoft.com
0.0.0.0 protect.microsoft.com
0.0.0.0 pti.store.microsoft.com
0.0.0.0 purchase.mp.microsoft.com
0.0.0.0 quarantine.messaging.microsoft.com
0.0.0.0 query.prod.cms.rt.microsoft.com
0.0.0.0 r.email.microsoft.com
0.0.0.0 r.office.microsoft.com
0.0.0.0 r.officeint.microsoft.com
0.0.0.0 r20swj13mr.microsoft.com
0.0.0.0 ra.microsoft.com
0.0.0.0 rad.live.com
0.0.0.0 rad.microsoft.com
0.0.0.0 rad.msn.com
0.0.0.0 ragnarok.msft.net
0.0.0.0 rbeta2.officebeta.microsoft.com
0.0.0.0 rdns1.msft.net
0.0.0.0 rdns2.msft.net
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 redir.windows.microsoft.com
0.0.0.0 redir.windowsmedia.com
0.0.0.0 redmond3.download.microsoft.com
0.0.0.0 register.cdpcs.microsoft.com
0.0.0.0 register.microsoft.com
0.0.0.0 register.one.microsoft.com
0.0.0.0 registermsdn.one.microsoft.com
0.0.0.0 reply.microsoft.com
0.0.0.0 reports.membercenter.office.microsoft.com
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 resourcelink.mspress.microsoft.com
0.0.0.0 resources.whymicrosoft.com
0.0.0.0 retail.microsoft.com
0.0.0.0 ris.api.iris.microsoft.com
0.0.0.0 rs.update.microsoft.com
0.0.0.0 rs.windowsupdate.microsoft.com
0.0.0.0 rss.servicehealth.microsoftonline.com
0.0.0.0 rssgov.windows.microsoft.com
0.0.0.0 rtc.webresponse.one.microsoft.com
0.0.0.0 rto.microsoft.com
0.0.0.0 s.gateway.messenger.live.com
0.0.0.0 s.microsoft.com
0.0.0.0 s0.2mdn.net
0.0.0.0 s2s.config.skype.com
0.0.0.0 sa.windows.com
0.0.0.0 saservices.microsoft.com
0.0.0.0 sba.microsoft.com
0.0.0.0 sc.imp.live.com
0.0.0.0 schemas.microsoft.akadns.net
0.0.0.0 se.windows.com
0.0.0.0 search-ppe.microsoft.com
0.0.0.0 search.msn.com
0.0.0.0 search.officeupdate.microsoft.com
0.0.0.0 searchorigin4.microsoft.com
0.0.0.0 searchservice.support.microsoft.com
0.0.0.0 searchservice32.support.microsoft.com
0.0.0.0 secure.adnxs.com
0.0.0.0 secure.download.windowsupdate.com
0.0.0.0 secure.flashtalking.com
0.0.0.0 self.events.data.microsoft.com
0.0.0.0 service.weather.microsoft.com
0.0.0.0 services.apps.microsoft.com
0.0.0.0 services.learningbeta.microsoft.com
0.0.0.0 services.social.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 services.windowsmedia.com
0.0.0.0 services.wmdrm.windowsmedia.com
0.0.0.0 services1.windowsmedia.com
0.0.0.0 serviceswitching.metadata.windowsmedia.com
0.0.0.0 serviceswitching.metaservices.microsoft.com
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 settings-ssl.xboxlive.com
0.0.0.0 settings-win-ppe.data.microsoft.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 settings.data.glbdns2.microsoft.com
0.0.0.0 settings.data.microsoft.com
0.0.0.0 settings.messenger.live.com
0.0.0.0 sfdataservice.microsoft.com
0.0.0.0 sg2p.wns.windows.com
0.0.0.0 share.microsoft.com
0.0.0.0 sharepoint.microsoft.com
0.0.0.0 shell.windows.com
0.0.0.0 shopformusic.microsoft.com
0.0.0.0 sipfed.microsoft.com
0.0.0.0 skydrive.wns.windows.com
0.0.0.0 skydrivesync.policies.live.net
0.0.0.0 slg.msgamedev.com
0.0.0.0 sls.microsoft.com
0.0.0.0 sls.update.microsoft.com
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 slscr.update.microsoft.com
0.0.0.0 smallbusiness.support.microsoft.com
0.0.0.0 smtp.microsoft.com
0.0.0.0 sn3301-c.1drv.com
0.0.0.0 sn3301-e.1drv.com
0.0.0.0 sn3301-g.1drv.com
0.0.0.0 snackbox.microsoft.com
0.0.0.0 sO.2mdn.net
0.0.0.0 solutionfinder.microsoft.com
0.0.0.0 solutionfinderbeta.microsoft.com
0.0.0.0 solutionmarketplace.partners.extranet.microsoft.com
0.0.0.0 solutionprofiler.microsoft.com
0.0.0.0 solutionprofilerbeta.microsoft.com
0.0.0.0 spar.msteams.com
0.0.0.0 specserver.microsoft.com
0.0.0.0 spo-ring.msedge.net
0.0.0.0 spynet.microsoft.com
0.0.0.0 spynet2.microsoft.com
0.0.0.0 spynetalt.microsoft.com
0.0.0.0 spyneteurope.microsoft.akadns.net
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 sqm.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 sqmtest.microsoft.com
0.0.0.0 srd.ds.microsoft.com
0.0.0.0 ssw.live.com
0.0.0.0 staging.services.wmdrm.windowsmedia.com
0.0.0.0 static.2mdn.net
0.0.0.0 statics-uhf-eus.akamaized.net
0.0.0.0 statics-uhf-wus.akamaized.net
0.0.0.0 stats.microsoft.com
0.0.0.0 stats.update.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 storage.live.com
0.0.0.0 store-images.microsoft.com
0.0.0.0 store-images.s-microsoft.com
0.0.0.0 store.microsoft.com
0.0.0.0 storecatalogrevocation.storequality.microsoft.com
0.0.0.0 storeedgefd.dsx.mp.microsoft.com
0.0.0.0 sts.microsoft.com
0.0.0.0 submissions.metaservices.microsoft.com
0.0.0.0 subscriptions.downloads.msdn.microsoft.com
0.0.0.0 subscriptions.downloads.technet.microsoft.com
0.0.0.0 support.microsoft.com
0.0.0.0 support.ppe.microsoft.com
0.0.0.0 support.tie.microsoft.com
0.0.0.0 supportorigin3.microsoft.com
0.0.0.0 surface.microsoftstore.com
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 svcs.microsoft.com
0.0.0.0 sxp.microsoft.com
0.0.0.0 sysdev.microsoft.com
0.0.0.0 systemcenter.pinpoint.microsoft.com
0.0.0.0 t.urs.microsoft.com
0.0.0.0 t0.ssl.ak.dynamic.tiles.virtualearth.net
0.0.0.0 t0.ssl.ak.tiles.virtualearth.net
0.0.0.0 tag.microsoft.com
0.0.0.0 tele.trafficmanager.net
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 telemetry.microsoft.com
0.0.0.0 telemetry.remoteapp.windowsazure.com
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 telesales360.partners.extranet.microsoft.com
0.0.0.0 teredo.ipv6.microsoft.com
0.0.0.0 test.activity.windows.com
0.0.0.0 test.newsletters.microsoft.com
0.0.0.0 test.uddi.microsoft.com
0.0.0.0 test.update.microsoft.com
0.0.0.0 testservices.windowsmedia.com
0.0.0.0 tide004.microsoft.com
0.0.0.0 tide005.microsoft.com
0.0.0.0 tide134.microsoft.com
0.0.0.0 tide137.microsoft.com
0.0.0.0 tide143.microsoft.com
0.0.0.0 tide42.microsoft.com
0.0.0.0 tie.microsoft.com
0.0.0.0 tile-service.weather.microsoft.com
0.0.0.0 time.windows.com
0.0.0.0 tk.downloads.microsoft.com
0.0.0.0 tk2.plt.msn.com
0.0.0.0 tkbpnbip01.one.microsoft.com
0.0.0.0 tkxtbip01.one.microsoft.com
0.0.0.0 tkxtbip02.one.microsoft.com
0.0.0.0 tkxtbip03.one.microsoft.com
0.0.0.0 tkxtbip04.one.microsoft.com
0.0.0.0 tkxtbip05.one.microsoft.com
0.0.0.0 tkxtbip06.one.microsoft.com
0.0.0.0 tkxtbip07.one.microsoft.com
0.0.0.0 tlu.dl.delivery.mp.microsoft.com
0.0.0.0 toc.music.metaservices.microsoft.com
0.0.0.0 training.partner.microsoft.com
0.0.0.0 training.retail.microsoft.com
0.0.0.0 transfer.microsoft.com
0.0.0.0 transfers.ds.microsoft.com
0.0.0.0 transfers.one.microsoft.com
0.0.0.0 trial.trymicrosoftoffice.com
0.0.0.0 tripoli.microsoft.com
0.0.0.0 trymicrosoftoffice.com
0.0.0.0 tsfe.trafficshaping.dsp.mp.microsoft.com
0.0.0.0 tv.metadata.windowsmedia.com
0.0.0.0 uat.mywindowsmobile.de
0.0.0.0 uat.startwindowsmobile.com
0.0.0.0 uatpremier.microsoft.com
0.0.0.0 uddi.microsoft.com
0.0.0.0 uddiv3.microsoft.com
0.0.0.0 uhf.microsoft.com
0.0.0.0 ui.skype.com
0.0.0.0 umwatsonc.events.data.microsoft.com
0.0.0.0 update.microsoft.com
0.0.0.0 urs.microsoft.com
0.0.0.0 urs.smartscreen.microsoft.com
0.0.0.0 us-v10.events.data.microsoft.com
0.0.0.0 us-v20.events.data.microsoft.com
0.0.0.0 us.vortex-win.data.microsoft.com
0.0.0.0 us1.trymicrosoftoffice.com
0.0.0.0 us20.trymicrosoftoffice.com
0.0.0.0 v10-win.vortex.data.microsoft.com.akadns.net
0.0.0.0 v10.events.data.microsoft.com
0.0.0.0 v10.vortex-win.data.microsoft.com
0.0.0.0 v10c.events.data.microsoft.com
0.0.0.0 v20.events.data.microsoft.com
0.0.0.0 v20.vortex-win.data.microsoft.com
0.0.0.0 v4-ori.windowsupdate.microsoft.com
0.0.0.0 v4.download.windowsupdate.com
0.0.0.0 v4.windowsupdate.microsoft.com
0.0.0.0 v5.windowsupdate.microsoft.com
0.0.0.0 v5stats.windowsupdate.microsoft.com
0.0.0.0 validation-v2.sls.microsoft.com
0.0.0.0 validation.sls.microsoft.com
0.0.0.0 vcs.metaservices.microsoft.com
0.0.0.0 version.hybrid.api.here.com
0.0.0.0 video.metaservices.microsoft.com
0.0.0.0 view.atdmt.com
0.0.0.0 view.email.microsoftonline.com
0.0.0.0 view.officeapps.live.com
0.0.0.0 virtualchat.support.microsoft.com
0.0.0.0 vistatechbeta.microsoft.com
0.0.0.0 visualstudiogallery.msdn.microsoft.com
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 vortex-win-sandbox.data.microsoft.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 vortex.data.glbdns2.microsoft.com
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 w.apprep.smartscreen.microsoft.com
0.0.0.0 wallet.microsoft.com
0.0.0.0 watson.live.com
0.0.0.0 watson.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 wb01.nz.partners.retail.microsoft.com
0.0.0.0 wb01.nz.xbox.partners.retail.microsoft.com
0.0.0.0 wb02.nz.partners.retail.microsoft.com
0.0.0.0 wb02.nz.xbox.partners.retail.microsoft.com
0.0.0.0 wdcp.microsoft.com
0.0.0.0 wdcpalt.microsoft.com
0.0.0.0 web-ngram.research.microsoft.com
0.0.0.0 web.esd.microsoft.com
0.0.0.0 web.vortex.data.microsoft.com
0.0.0.0 webevents.microsoft.com
0.0.0.0 webfolders.metaservices.microsoft.com
0.0.0.0 webnews.microsoft.com
0.0.0.0 webresponse.one.microsoft.com
0.0.0.0 wer.microsoft.com
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 wfp.microsoft.com
0.0.0.0 wfp.vistatechbeta.microsoft.com
0.0.0.0 whidbey.msdn.microsoft.com
0.0.0.0 win10-trt.msedge.net
0.0.0.0 win10.ipv6.microsoft.com
0.0.0.0 win1710.ipv6.microsoft.com
0.0.0.0 win8.ipv6.microsoft.com
0.0.0.0 windowsbetatest.rte.microsoft.com
0.0.0.0 windowslive.com
0.0.0.0 windowslive.es.msn.com
0.0.0.0 windowslive.jp.msn.com
0.0.0.0 windowslive.msn.com
0.0.0.0 windowslivegadgets.com
0.0.0.0 windowslivehelp.com
0.0.0.0 windowsmarketplace.com
0.0.0.0 windowsmedia.microsoft.com
0.0.0.0 windowsmedia1.com
0.0.0.0 windowsmediaguide.com
0.0.0.0 windowsonecare.com
0.0.0.0 windowsonecarelive.com
0.0.0.0 windowssdk.msdn.microsoft.com
0.0.0.0 windowsserverfeedback.com
0.0.0.0 windowsupdate.com
0.0.0.0 windowsupdate.microsoft.com
0.0.0.0 winfo.microsoft.com
0.0.0.0 winfx.msdn.microsoft.com
0.0.0.0 winqual.microsoft.com
0.0.0.0 winse.microsoft.com
0.0.0.0 wm.microsoft.com
0.0.0.0 wmdrm.windowsmedia.com
0.0.0.0 word.office.live.com
0.0.0.0 workspace.office.live.com
0.0.0.0 wpa.one.microsoft.com
0.0.0.0 ws03sp1.update.microsoft.com
0.0.0.0 wscont.apps.microsoft.com
0.0.0.0 wscont.apps.microsoft.com.edgesuite.net
0.0.0.0 wscont1.apps.microsoft.com
0.0.0.0 wscont2.apps.microsoft.com
0.0.0.0 wsus.ds.download.windowsupdate.com
0.0.0.0 wu-ori.microsoft.com
0.0.0.0 wustat.windows.com
0.0.0.0 wustats.microsoft.com
0.0.0.0 wutrack.windows.com
0.0.0.0 wwetrain.microsoft.com
0.0.0.0 wwevents.microsoft.com
0.0.0.0 wweventstest.one.microsoft.com
0.0.0.0 www.betaone.partners.extranet.microsoft.com
0.0.0.0 www.billing.microsoft.com
0.0.0.0 www.commerce.microsoft.com
0.0.0.0 www.domains.live.com
0.0.0.0 www.download.windowsupdate.com
0.0.0.0 www.email.microsoft.com
0.0.0.0 www.empresas.microsoft.com
0.0.0.0 www.eu.microsoft.com
0.0.0.0 www.favorites.live.com
0.0.0.0 www.go.microsoft.akadns.net
0.0.0.0 www.licencje-microsoft.pl
0.0.0.0 www.licencjemicrosoft.eu
0.0.0.0 www.mar.partners.extranet.microsoft.com
0.0.0.0 www.microsoft-certification.co.uk
0.0.0.0 www.microsoft-int.com
0.0.0.0 www.microsoft-office.fr
0.0.0.0 www.microsoftadvertising.com
0.0.0.0 www.microsoftbusinesshub.com
0.0.0.0 www.microsoftcloudpartner.com
0.0.0.0 www.microsoftelearning.com
0.0.0.0 www.microsoftfrontpage.com
0.0.0.0 www.microsoftlicense.com
0.0.0.0 www.microsoftoffice365now.com
0.0.0.0 www.microsoftonline.com
0.0.0.0 www.microsoftstore.com.cn
0.0.0.0 www.microsoftstore.it
0.0.0.0 www.microsoftupdate.com
0.0.0.0 www.microsoftvolumelicensing.com
0.0.0.0 www.msedge.net
0.0.0.0 www.msevents.microsoft.com
0.0.0.0 www.msftconnecttest.com
0.0.0.0 www.msftncsi.com
0.0.0.0 www.msgamedev.com
0.0.0.0 www.mshome.net
0.0.0.0 www.msnusers.com
0.0.0.0 www.msus.windowsupdate.com
0.0.0.0 www.office.microsoft.com
0.0.0.0 www.officesas.microsoft.com
0.0.0.0 www.officeupdate.microsoft.com
0.0.0.0 www.partners.extranet.microsoft.com
0.0.0.0 www.pmi.microsoft.com
0.0.0.0 www.trymicrosoftoffice.com
0.0.0.0 www.update.microsoft.com
0.0.0.0 www.windowslive.com
0.0.0.0 www.windowslive.de
0.0.0.0 www.windowslive.fr
0.0.0.0 www.windowslive.nl
0.0.0.0 www.windowslivehelp.com
0.0.0.0 www.windowsmarketplace.com
0.0.0.0 www.windowsmedia.microsoft.com
0.0.0.0 www.windowsmedia1.com
0.0.0.0 www.windowsmediacenter.com
0.0.0.0 www.windowsonecare.com
0.0.0.0 www.windowsphone.live.com
0.0.0.0 www.windowssearch.com
0.0.0.0 www.windowsupdate.com
0.0.0.0 www.windowsupdate.microsoft.com
0.0.0.0 www2.buyoffice.microsoft.com
0.0.0.0 www20.buyoffice.microsoft.com
0.0.0.0 www20.downloadoffice2010.microsoft.com
0.0.0.0 www7.buyoffice.microsoft.com
0.0.0.0 www7.downloadoffice2010.microsoft.com
0.0.0.0 wwwbeta.microsoft.com
0.0.0.0 wwwppe.microsoft.com
0.0.0.0 wxpsp2.windowsupdate.microsoft.com
0.0.0.0 x.urs.microsoft.com
0.0.0.0 xbox.microsoftstore.com
0.0.0.0 xbox.retail.microsoft.com
0.0.0.0 xml.login.live.com
0.0.0.0 xpsp1.microsoft.com
0.0.0.0 yannerwan8.spaces.live.com
------End cut & paste here------



Back 2 Top

E10BLOK.CMD = Batch Command (CMD) file

@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END

:: 
::  MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016 
:: 
:: Must see 10_BLOCK.TXT (included) for guidelines!
:: http://www.mdgx.com/10BLK/10_BLOCK.php
:: Or:
:: http://www.mdgx.com/10BLK/10_BLOCK.TXT

COLOR 17

ECHO.
ECHO. 
ECHO.  Wait! This will take a while... 
ECHO. 
ECHO.

:: 
:: Run all 10_BLOCK.* files (.CMD + .EXE) as Administrator:
:: 

IF NOT EXIST "%TEMP%\10_BLOCK.CMD" GOTO ADMt
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMt
IF NOT EXIST "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" GOTO ADMp
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMp
IF NOT EXIST "%USERPROFILE%\Downloads\10_BLOCK.CMD" GOTO ADMu
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMu

:: 
:: Verify if logged on user is Administrator:
:: 

:: %windir%\SYSTEM32\openfiles.exe 1 >NUL 2>&1
:: IF NOT %errorlevel% equ 0 (
:: ECHO You are not logged in as Administrator!
:: ECHO You MUST: Open Explorer -> right-click this file -> Run as Administrator.
:: PAUSE
:: EXIT 1
:: ) else (
SETLOCAL

:: User Account Control (UAC) check + Auto-Elevate Permissions 2 Admin level
:: Check for permissions...
>NUL 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"
:: If error flag already set we do not have admin. :-(
IF '%errorlevel%' NEQ '0' (
ECHO:
ECHO Requesting Administrative Privileges...
ECHO When UAC prompt opens press YES to Continue
ECHO:
GOTO UACPrompt
) else (GOTO gotAdmin)
:UACPrompt
ECHO SET UAC=CreateObject^("Shell.Application"^)>"%temp%\GetAdm!.vbs"
ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%temp%\GetAdm!.vbs"
"%temp%\GetAdm!.vbs"
EXIT /B
:gotAdmin
IF EXIST "%temp%\GetAdm!.vbs" (DEL "%temp%\GetAdm!.vbs")
PUSHD "%CD%"
CD /D "%~dp0"

:: 
:: Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
:: 

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO NT0
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO NT0
:: Disable Diagnostics Tracking (DiagTrack) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagtrack
%windir%\SYSTEM32\SC.EXE config diagtrack START= disabled
:: Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagnosticshub.standardcollector.service
%windir%\SYSTEM32\SC.EXE config diagnosticshub.standardcollector.service START= disabled
:: Disable WAP Push Message Routing (DmWAPPush) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP dmwappushservice
%windir%\SYSTEM32\SC.EXE config dmwappushservice START= disabled
:: Disable Retail Demo (RetailDemo) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RetailDemo
%windir%\SYSTEM32\SC.EXE config RetailDemo START= disabled
:: Disable Windows Event Collector (WECSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP Wecsvc
%windir%\SYSTEM32\SC.EXE CONFIG Wecsvc START= disabled
:: Disable Remote Registry (RemoteRegistry) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RemoteRegistry
%windir%\SYSTEM32\SC.EXE CONFIG RemoteRegistry START= disabled
:: Disable One Drive (OneSyncSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP OneSyncSvc
%windir%\SYSTEM32\SC.EXE CONFIG OneSyncSvc START= disabled
%windir%\SYSTEM32\REG.EXE add"HKLM\SYSTEM\CurrentControlSet\Services\OneSyncSvc_Session1" /v "Start" /t REG_DWORD /d 4 /f >NUL 2>&1
:NT0
ECHO "" > %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl
ECHO Y|%windir%\SYSTEM32\CACLS.EXE %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl /d SYSTEM
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "AutoLogger-Diagtrack-Listener" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "SQMLogger" /f >NUL 2>&1
:: Disable automatic/pushed (without permission) installation + display of ads/suggested apps from Start menu:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenOverlayEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" policies:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable WiFi Sense, AutoUpdate, Defender SpyNet, Office + Diagnostics logging + reporting:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseCredShared" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseOpen" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "IncludeRecommendedUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "EnableFeaturedSoftware" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SpyNetReporting" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy" /v "EnableQueryRemoteServer" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "Disable Performance Counters" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Remove spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" folders from My PC:
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f >NUL 2>&1
:: Disable Automatic Computer Maintenance tasks:
:: http://www.winaero.com/blog/disable-computer-maintenance-windows-10/
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\ScheduledDiagnostics" /v "EnabledExecution" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Edge (Spartan) web browser ads:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxCacheTtl" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxNegativeCacheTtl" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Enable Advanced Explorer View tweaks:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable Advanced Explorer View automatic/pushed (without permission) of ads/suggested apps:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Windows Update P2P:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Cortana in Search:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Remove "Is Shortcut":
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "link" /t REG_BINARY /d 0 /f >NUL 2>&1
:: Explorer remove OneDrive icon:
%windir%\SYSTEM32\REG.EXE ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: Disable "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
:: 

IF NOT EXIST %windir%\SYSTEM32\SCHTASKS.EXE GOTO SCH
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\AitAgent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Autochk\Proxy" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Maintenance\WinSAT" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ehDRMInit" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\InstallPlayReady" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\mcupdate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURActivate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURDiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrScheduleTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\RegisterSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\UpdateRecordPath" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Time-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\PI\Sqm-Tasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /DISABLE
:SCH

:: 
:: Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx" /v "DisableGwx" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gwx.exe" /v "Debugger" /t REG_SZ /d "systray.exe" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "ElevateNonAdmins" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableOSUpgrade" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "AllowOSUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "ReservationsAllowed" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeState" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeStateTimeStamp" /t REG_SZ /d "2015-09-09 09:09:09" /f >NUL 2>&1

:: 
:: OPTIONAL: Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "AutoInstallMinorUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1
:: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoRebootWithLoggedOnUsers" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAUAsDefaultShutdownOption" /t REG_DWORD /d 1 /f >NUL 2>&1
:: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable reinstall (of undesired) Windows Updates + Drivers:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "DontSearchWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: Uninstall OneDrive:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSync" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1
SET x86="%SYSTEMROOT%\System32\OneDriveSetup.exe"
SET x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe"
%windir%\SYSTEM32\TASKKILL.EXE /IM OneDrive.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1
IF EXIST %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1
RD "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1
RD "C:\OneDriveTemp" /Q /S >NUL 2>&1
RD "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1
RD "%ProgramData%\Microsoft OneDrive" /Q /S >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1

:: 
:: Internet Explorer (IE) 9/10/11/newer Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Geolocation" /v "BlockAllWebsites" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1

:: 
:: OPTIONAL: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS with many IPs:
:: 
:: Open STOP!DNS.CMD + STARTDNS.CMD (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.ZIP
:: More info:
:: http://www.mdgx.com/hosts.php#N2

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO DN$
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO DN$
:: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP DNSCache
:: %windir%\SYSTEM32\SC.EXE CONFIG DNSCache START= disabled
:DN$

:: 
:: Block Spyware, Tracking + Telemetry using Windows Firewall:
:: 

IF NOT EXIST %windir%\SYSTEM32\NETSH.EXE GOTO NS0
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_134.170.30.202" dir=out action=block remoteip=134.170.30.202 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_137.116.81.24" dir=out action=block remoteip=137.116.81.24 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_157.56.106.189" dir=out action=block remoteip=157.56.106.189 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_184.86.53.99" dir=out action=block remoteip=184.86.53.99 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.43" dir=out action=block remoteip=2.22.61.43 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.66" dir=out action=block remoteip=2.22.61.66 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.39.117.230" dir=out action=block remoteip=65.39.117.230 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.52.108.33" dir=out action=block remoteip=65.52.108.33 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_64.4.54.254" dir=out action=block remoteip=64.4.54.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes
:NS0

:: 
:: NTFS Long Path
:: 
:: Enable NTFS long path (> 260 characters) option:
:: http://www.superuser.com/questions/1119883/
:: http://www.howtogeek.com/266621/
:: http://www.winaero.com/blog/how-to-enable-ntfs-long-paths-in-windows-10/
:: NFR 4.6.2 and long paths in Windows 10:
:: http://blogs.msdn.microsoft.com/jeremykuhne/2016/07/30/net-4-6-2-and-long-paths-on-windows-10/

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{48981759-12F2-42A6-A048-028B3973495F}Machine\System\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: HOSTS
:: 
:: If 0.0.0.0 redirects do not work properly on your computer(s) you can substitute all null strings below with default localhost:
:: 127.0.0.1
:: BONUS:
:: List below contains all known Microsoft servers one may wish to disable, but some will deactivate
:: Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about.
:: View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
:: Use with CAUTION!
:: Open 10_BLOCK.TXT (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.php

IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SYSTEM32\DRIVERS\ETC" /r /d y >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SysWOW64\DRIVERS\ETC" /r /d y >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SysWOW64\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS.ORI" GOTO NXT
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" HOSTS.ORI
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS"
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" HOSTS.ORI
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SysWOW64\DRIVERS\ETC\HOSTS"
:NXT
IF EXIST %windir%\SYSTEM32\DRIVERS\ETC\HOSTS GOTO HOST1
ECHO # >%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # THIS FILE IS OBSOLETE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All necessary tasks are executed by running E10BLOK.CMD (included)!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Must see 10_BLOCK.TXT (included) for guidelines!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Or:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.TXT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS (plain text/ASCII file):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Used in TCP/IP for mapping IP addresses (1st column) to corresponding host names (2nd column):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Hosts_(file)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Each entry must be on a separate line. Columns must be separated by at least 1 space or tab.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All lines starting with # are comments/remarks and are not processed.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # DNS itself handles localhost name resolution.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines MUST be listed FIRST in this EXACT order [IPv4 (1st) + IPv6 (2nd)]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost.localdomain>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 255.255.255.255 broadcasthost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 local>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines recommended for IPv6 protocol:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe80::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe00::0 ip6-localnet>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff00::0 ip6-mcastprefix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::1 ip6-allnodes>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::2 ip6-allrouters>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::3 ip6-allhosts>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Multicast_address>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # ENABLE/DISABLE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All servers below are disabled = redirected to 0.0.0.0 (null).>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # To (re)enable: comment/remark (precede with #) or delete desired line(s) below.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Add these 0.0.0.0 (redirected to null) IPs to your %%windir%%\SYSTEM32\DRIVERS\ETC\HOSTS file:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.pastebin.com/gebp8edd>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Edit HOSTS in Windows 7/8/8.1/10:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/easily-edit-hosts-file-windows-10/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-8/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-7/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS Guide + Tools:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Take Ownership of files + folders right-click Explorer option:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/xptoy.htm#FMNT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM ReadMe Guide:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/fmnt32.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM [2.2 MB, free]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/FMNT32.EXE>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 Take Ownership tool (freeware):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/nt6fix.php5#restfix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 [36 KB, freeware]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/zips/fix6r.zip>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Lines below disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0001.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0002.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0003.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0004.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0005.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0006.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0007.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0008.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0009.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ac3.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ad.doubleclick.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnexus.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aidps.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aka-cdn-ns.adtech.de>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 apps.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az361816.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az512334.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 bs.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdn.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cds26.ams9.msecn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 compatexchange.cloudapp.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cs1.wpc.v0cdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdp1.public-trust.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corp.sts.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 db3aqu.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 diagnostics.support.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e2835.dspb.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e8218.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7341.g.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7502.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ec.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.windows.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.microsoft-hohm.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.search.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.ws.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 flex.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 g.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 h1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 hostedocsp.globalsign.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 li581-132.members.linode.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 lb1.www.ms.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 live.rads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.hotmail.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msntest.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pre.footprintpredict.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 preview.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pricelist.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 redir.metaservices.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 s.gateway.messenger.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 schemas.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.flashtalking.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 services.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sls.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sO.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 static.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe1.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 survey.watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net:443>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.urs.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ui.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 view.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.ppe.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.go.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
:HOST1
SET NEWLINE=.^& ECHO
%windir%\SYSTEM32\FIND.EXE /C /I "a-0001.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0001.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0002.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0002.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0003.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0003.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0004.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0004.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0005.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0005.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0006.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0006.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0007.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0007.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0008.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0008.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0009.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0009.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ac3.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ac3.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ad.doubleclick.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ad.doubleclick.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnexus.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnexus.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aidps.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aidps.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aka-cdn-ns.adtech.de" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aka-cdn-ns.adtech.de)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "apps.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 apps.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az361816.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az361816.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az512334.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az512334.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "bs.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 bs.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdn.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdn.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cds26.ams9.msecn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cds26.ams9.msecn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "compatexchange.cloudapp.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 compatexchange.cloudapp.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corpext.msitadfs.glbdns2.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdnjs.cloudflare.com.cdn.cloudflare.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cs1.wpc.v0cdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cs1.wpc.v0cdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdp1.public-trust.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdp1.public-trust.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corp.sts.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corp.sts.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "db3aqu.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 db3aqu.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "diagnostics.support.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 diagnostics.support.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e2835.dspb.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e2835.dspb.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e8218.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e8218.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7341.g.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7341.g.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7502.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7502.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ec.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ec.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.windows.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.windows.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.microsoft-hohm.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.microsoft-hohm.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.search.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.search.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.ws.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.ws.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "flex.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 flex.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "g.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 g.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "h1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 h1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "hostedocsp.globalsign.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 hostedocsp.globalsign.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "li581-132.members.linode.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 li581-132.members.linode.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "lb1.www.ms.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 lb1.www.ms.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "live.rads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 live.rads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.hotmail.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.hotmail.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msnbot-65-55-108-23.search.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msnbot-65-55-108-23.search.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msntest.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msntest.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pre.footprintpredict.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pre.footprintpredict.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "preview.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 preview.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pricelist.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pricelist.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "redir.metaservices.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 redir.metaservices.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "reports.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 reports.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "s.gateway.messenger.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 s.gateway.messenger.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "schemas.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 schemas.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.flashtalking.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.flashtalking.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "services.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 services.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sls.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sls.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sO.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sO.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "static.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 static.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe1.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe1.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "survey.watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 survey.watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net:443" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net:443)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.urs.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.urs.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ui.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ui.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "view.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 view.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-bn2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-cy2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.ppe.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.ppe.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.go.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.go.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS

:: 
:: Stop + Uninstall Get Windows 10 (GWX), unwanted mandatory updates + spyware:
:: 

:: Stop + Uninstall Get Windows 10 (GWX), spyware, telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
%windir%\SYSTEM32\TASKKILL.EXE /IM GWX.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXUXWorker.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXConfigManager.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM consent.exe /T /F >NUL 2>&1

:: Stop customer experience + cortana search:
%windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /r /d y
%windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q
%windir%\SYSTEM32\TASKKILL.EXE /IM ShellExperienceHost.exe /T /F >NUL 2>&1
MOVE /Y "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy.000"
%windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /r /d y
%windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q
%windir%\SYSTEM32\TASKKILL.EXE /IM SearchUI.exe /T /F >NUL 2>&1
MOVE /Y "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.000"

IF NOT EXIST %windir%\SYSTEM32\WUSA.EXE GOTO END
:: KB971033: Windows Activation Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:971033 /quiet /norestart >NUL 2>&1
:: KB2952664: Get Windows 10 (GWX) Assistant:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2952664 /quiet /norestart >NUL 2>&1
:: KB2990214: Get Windows 10 (GWX):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2990214 /quiet /norestart >NUL 2>&1
:: KB3012973: Upgrade to Windows 10 Pro:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3012973 /quiet /norestart >NUL 2>&1
:: KB3021917: Performance Improvements Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3021917 /quiet /norestart >NUL 2>&1
:: KB3022345: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3022345 /quiet /norestart >NUL 2>&1
:: KB3035583: Get Windows 10 (GWX) App:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3035583 /quiet /norestart >NUL 2>&1
:: KB3044374: Get Windows 10 (GWX) Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3044374 /quiet /norestart >NUL 2>&1
:: KB3068708: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3068708 /quiet /norestart >NUL 2>&1
:: KB3075249: Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075249 /quiet /norestart >NUL 2>&1
:: KB3080149: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3080149 /quiet /norestart >NUL 2>&1
:: KB3112343: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3112343 /quiet /norestart >NUL 2>&1
:: KB3083711: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083711 /quiet /norestart >NUL 2>&1
:: KB3083325: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083325 /quiet /norestart >NUL 2>&1
:: KB3075853: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075853 /quiet /norestart >NUL 2>&1
:: KB3072318: OOBE Update to upgrade to Windows 10:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3072318 /quiet /norestart >NUL 2>&1
:: KB3065988: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3065988 /quiet /norestart >NUL 2>&1
:: KB3064683: OOBE Update to upgrade to Windows 10:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3064683 /quiet /norestart >NUL 2>&1
:: KB3058168: Activate Windows 10 from Hosts Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3058168 /quiet /norestart >NUL 2>&1
:: KB3050267: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3050267 /quiet /norestart >NUL 2>&1
:: KB2976978: Compatibility Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2976978 /quiet /norestart >NUL 2>&1
:: KB2977759: Compatibility Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2977759 /quiet /norestart >NUL 2>&1
:: KB3081954: Work Folders Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3081954 /quiet /norestart >NUL 2>&1
:: KB3123862: Upgrade Capability Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3123862 /quiet /norestart >NUL 2>&1
:: KB3138612: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3138612 /quiet /norestart >NUL 2>&1
:: KB3172605: July 2016 Update Rollup:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3172605 /quiet /norestart >NUL 2>&1
TIMEOUT /T 5 /NOBREAK

:: 

:END
:: EXIT

Back 2 Top

MDGx MAX Speed WinDOwS

MDGx