MDGx MAX Speed WinDOwS
MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016

Win10 Privacy Reddit

    10_BLOCK  MDGx Win10 Block Tools (10_BLOCK) [50.59 KB, ZIPped archive, free, unsupported].
    Brief Guide must view 1st!
    10_BLOCK.ZIP files in plain text (ASCII) format:List of files inside 10_BLOCK.ZIP archive.
    Complete list of files in 10_BLOCK directory.
    MDGx Win10 Block Tools (10_BLOCK) are also part of W95-11D.EXE + W95-11D.ZIP.
    More info.
    More tools.
    Comparison of Windows 10 Privacy tools.
    Windows 10 looks like this.
Contents: TXT | CMD

10_BLOCK.TXT = ReadMe Text (TXT) Guide must view 1st!


 MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016/2019 


THE GIST
********

* MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016/2019 stop automatic (forced!)
upgrade to Windows 10 > 1-1-2016 [uninstall "Get Windows 10" (GWX) update] and disable all spyware: telemetry
("phone home"), data collection/logging, customer experience + unwanted "offers", eliminating Microsoft
annoyances and restoring online privacy [55 KB, ZIPped archive, free, unsupported]:
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
Brief Guide:
http://www.mdgx.com/xptoy.htm#10BLK
This ReadMe TXT Guide => must view 1st!
http://www.mdgx.com/10BLK/10_BLOCK.php
ZIP archive contents:
* 10_BLOCK.HTM (HTML ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.php
* 10_BLOCK.TXT (Text ReadMe 1st Guide):
http://www.mdgx.com/10BLK/10_BLOCK.TXT
* 10_BLOCK.CMD (Windows Command Script):
http://www.mdgx.com/10BLK/10_BLOCK.CMD
View as plain text:
http://www.mdgx.com/10BLK/10_BLOCK.CMD.TXT
* E10BLOK.CMD (Windows Command Script) executed by 10_BLOCK.CMD (see above):
http://www.mdgx.com/10BLK/E10BLOK.CMD
View as plain text:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
* ELEVATE.EXE (EXEcutable) Elevate 32-bit command line tool which runs E10BLOK.CMD as Administrator in 32-bit (x86) Windows:
http://code.kliu.org/misc/elevate/
* ELEVAT64.EXE (EXEcutable) Elevate 64-bit command line tool which runs E10BLOK.CMD as Administrator in 64-bit (x64) Windows:
http://code.kliu.org/misc/elevate/
* ELEVATE.TXT (ReadMe 1st Text Guide) for ELEVATE.EXE + ELEVAT64.EXE (all included in 10_BLOCK.ZIP):
http://www.mdgx.com/10BLK/ELEVATE.TXT
* Stop DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STOP!DNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT
* Start DNS Client service CMD (Windows Command Script):
http://www.mdgx.com/10BLK/STARTDNS.CMD
View as plain text:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
List of files inside archive 10_BLOCK.ZIP:
http://www.mdgx.com/10BLK/10_list.php
Complete list of files in 10_BLOCK directory:
http://www.mdgx.com/10BLK/list.php
MDGx Win10 Block Tools (10_BLOCK) (ZIP Archive File):
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
are also part of W95-11D.EXE + W95-11D.ZIP:
http://www.mdgx.com/95.htm
More info:
http://www.privacytools.io/#win10
More tools:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png

USAGE => STEP-BY-STEP
*********************

1. Use an unZIPping/unARChiving/unRARing tool [free(ware)]
http://www.mdgx.com/toy.htm#ZIP
to open 10_BLOCK.ZIP -> extract all its files into the same dedicated/empty directory/folder.
2. Open Explorer -> go to Downloads folder (default location)
%UserProfile%\Downloads [a.k.a. C:\Users\%UserName%\Downloads]
-> right-click 10_BLOCK.CMD (Windows Command Script) -> Run as Administrator -> wait for batch file to complete -> restart Windows.
3. Done. ;-/

ONLINE
******

* reddit [must be logged in to view post = reddit account is free]:
http://www.reddit.com/r/windows/comments/3v2f45/
http://redd.it/3v2f45/

UPDATES
*******

* Added ELEVAT64.EXE + ELEVATE.EXE [Elevate 64-bit + 32-bit EXEcutables] +
ELEVATE.TXT [Elevate TXT Guide] to run 10_BLOCK.CMD, which in turn runs
E10BLOK.CMD with elevated Administrator privileges, even if logged on user has
reduced rights (below Administrator level), to ensure all fixes work properly.
See ELEVATE.TXT (included) for details:
http://www.mdgx.com/10BLK/ELEVATE.TXT



Similar Windows 7/8/8.1/2012/10/2016/2019 Anti-Spyware/Privacy Tools
********************************************************************

Windows 10 Fixes:
http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html
Comparison of Windows 10 Privacy tools:
http://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/
11 Free Tools to Disable + Stop Windows 10 from Spying + Tracking You:
http://www.geckoandfly.com/25083/

MANDATORY:
Must run/execute/open all these apps/programs/installers (EXE)/scripts (BAT, CMD, HTA, PS1, REG, VBS)
with the Explorer/shortcut right-click "Run as Administrator" option!

* Blackbird 32-bit + 64-bit (free):
Guide:
http://www.getblackbird.net/documentation/
Program:
http://www.getblackbird.net/
ReadMe:
http://www.getblackbird.net/documentation/
File:
http://www.getblackbird.net/download/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "blackbird.exe" (Application executable) -> Run as Administrator -> select options.

* FixWin for Windows 10 (freeware):
http://www.thewindowsclub.com/fixwin-for-windows-10/
Guide:
http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/
Program:
http://www.thewindowsclub.com/downloading-fixwin-10/
ReadMe:
http://www.thewindowsclub.com/list-of-fixes-available-in-fixwin-10/
File:
http://www.thewindowsclub.com/downloads/FixWin10.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "FixWin 10.1.exe" (Application executable) -> Run as Administrator.

* I Don't Want Windows 10 (free, open source):
Guide:
http://www.msfn.org/board/topic/173961-windows-10-gwx-update-removal-tool-for-windows-7-and-windows-81/
Program:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/
ReadMe:
http://github.com/rn10950/I-Dont-Want-Windows-10/
File:
http://github.com/rn10950/I-Dont-Want-Windows-10/releases/download/4.0/I_Dont_Want_Windows_10_v4.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "I Don't Want Windows 10.exe" (Application executable) -> Run as Administrator.

* WindowsSpyBlocker (free, open source):
Guide:
http://www.ghacks.net/2016/05/15/windows-spy-blocker-review/
Program:
http://github.com/crazy-max/WindowsSpyBlocker/
ReadMe:
http://github.com/crazy-max/WindowsSpyBlocker/wiki/
File:
http://github.com/crazy-max/WindowsSpyBlocker/releases/
Usage:
Open Explorer -> right-click "WindowsSpyBlocker.exe" (Application executable) -> Run as Administrator -> select options.

* Spydish 32-bit + 64-bit (free, open source):
Guide:
http://github.com/builtbybel/spydish/
Program:
http://www.mirinsoft.com/ms-apps/spydish/
Files:
http://github.com/builtbybel/spydish/releases/latest/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Spydish.exe" (Application executable) -> Run as Administrator.

* DisableWinTracking (free, open source):
Guide:
http://www.privacytools.io/#win10
Program:
http://github.com/10se1ucgo/DisableWinTracking/
ReadMe:
http://github.com/10se1ucgo/DisableWinTracking/releases/
File:
http://github.com/10se1ucgo/DisableWinTracking/releases/download/v2.5.1/disablewintracking.exe
Usage:
Open Explorer -> right-click "disablewintracking.exe" (Application executable) -> Run as Administrator -> check "Privacy" -> press Go.

* Destroy Windows Spying (DWS) (free, open source):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/
File:
http://github.com/Nummer/Destroy-Windows-10-Spying/releases/download/1.6.722/DWS_Lite.exe
Usage:
Open Explorer -> right-click "DWS_Lite.exe" (Application executable) -> Run as Administrator.

* O&O ShutUp10 (freeware):
Guide:
http://www.dottech.org/185920/
Program:
http://www.oo-software.com/shutup10/
File:
http://dl5.oo-software.com/files/ooshutup10/OOSU10.exe
Usage:
Open Explorer -> right-click "OOSU10.exe" (Application executable) -> Run as Administrator.

* Win10 Spy Disabler (freeware):
Guide:
http://www.site2unblock.com/win10-spy-disabler/
Program:
http://www.site2unblock.com/win10-spy-disabler/
File:
http://www.site2unblock.com/download/win10-spy-disabler-portable.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win10 Spy Disabler" shortcut inside installed folder -> Run as Administrator -> select options.

* Windows Privacy Tweaker (freeware):
Guide:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
Program:
http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4
File:
http://www.phrozensoft.com/uploads/2016/01/WindowsPrivacyTweakerV2.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Windows Privacy Tweaker.exe" (Application executable) -> Run as Administrator.

* W10Privacy (freeware + donationware):
Guide:
http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/
Program:
http://www.winprivacy.de/english-home/
File:
http://www.winprivacy.de/app/download/12302828636/W10Privacy.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "W10Privacy.exe" (Application executable) -> Run as Administrator.

* Win.Privacy Beta (freeware):
Guide:
http://windotprivacy.co.nf/
Program:
http://windotprivacy.co.nf/
File:
http://www.majorgeeks.com/files/details/win_privacy.html
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Win.Privacy.exe" (Application executable) -> Run as Administrator.

* WinPurify (freeware):
Guide:
http://www.majorgeeks.com/files/details/winpurify.html
Program:
http://www.winpurify.xyz/
File:
http://www.winpurify.xyz/WinPurify.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WinPurify.exe" (Application executable) -> Run as Administrator.

* Spybot Anti-Beacon for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/spybot_anti_beacon_for_windows_10.html
Program:
http://forums.spybot.info/showthread.php?72686
ReadMe:
http://forums.spybot.info/downloads.php?id=58
File:
http://download.spybot.info/AntiBeacon/StandAlone/SDAntiBeacon-1.5.exe
Usage:
Open Explorer -> right-click "SDAntiBeacon-1.5.exe" (Application executable) -> Run as Administrator.

* Ashampoo AntiSpy for Windows 10 (freeware):
Guide:
http://www.majorgeeks.com/files/details/ashampoo_antispy_for_windows_10.html
Program:
http://www.ashampoo.com/en/usd/pin/1004/security-software/Antispy-for-Windows-10/
ReadMe:
http://www.ashampoo.com/en/usd/pde/1004/security-software/Antispy-for-Windows-10/
File:
http://cdn1.ashampoo.net/public/ashf/1004/Ashampoo_AntiSpy.exe
Usage:
Open Explorer -> right-click "Ashampoo_AntiSpy.exe" (Application executable) -> Run as Administrator.

* Win10 SpyStop (freeware):
Guide:
http://www.majorgeeks.com/files/details/win10_spystop.html
Program:
http://www.evorim.com/en/
File:
http://www.evorim.com/win10spystop/win10spystop-x32-setup.exe
Usage:
Open Explorer -> right-click "win10spystop-x32-setup.exe" (Application executable) -> Run as Administrator.

* DoNotSpy10 (freeware: adware! + donationware):
Guide:
http://www.bleepingcomputer.com/forums/t/586731/
Program:
http://www.pxc-coding.com/portfolio/donotspy10/
ReadMe:
http://www.pxc-coding.com/portfolio/donotspy10/
File:
http://www.pxc-coding.com/downloads/donotspy10/DoNotSpy10-1.1.0.0-Setup.exe
Usage:
1. Open Explorer -> right-click "DoNotSpy10-1.1.0.0-Setup.exe" (Application executable) -> Run as Administrator.
2. Open Explorer -> right-click "DoNotSpy10" shortcut inside installed folder -> Run as Administrator -> select options.

* Never10 (freeware):
Guide:
http://www.grc.com/never10/details.htm
Program:
http://www.grc.com/never10.htm
ReadMe:
http://www.grc.com/never10.htm
File:
http://www.grc.com/files/never10.exe
Usage:
Open Explorer -> right-click "never10.exe" (Application executable) -> Run as Administrator.

* Windows 10 Rollback Utility (freeware):
Guide:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Program:
http://www.neosmart.net/Win10Rollback/
ReadMe:
http://www.neosmart.net/Win10Rollback/
File:
http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html
Usage:
1. Burn "Windows 10 Rollback Utility.iso" (ISO File) on blank/empty CD-R/DVD-R/BD-R/USB media.
2. Reboot from CD-R/DVD-R/BD-R/USB disc/stick.
3. Follow instructions to revert (roll) back to previous Windows 7/8/8.1 OS (if any).

* Aegis CMD script (free, open source):
Guide:
http://www.ghacks.net/2016/01/26/block-all-windows-10-components-on-windows-7-and-8/
Program:
http://www.voat.co/v/technology/comments/459263/
ReadMe:
http://github.com/th3power/aegis-voat/
File:
http://github.com/th3power/aegis-voat/archive/v1.10.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "aegis.cmd" (Windows Command Script) -> Run as Administrator.

* GWX Control Panel (freeware):
Guide:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
Program:
http://www.ultimateoutsider.com/downloads/
ReadMe:
http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html
File:
http://www.ultimateoutsider.com/downloads/GwxControlPanelSetup.exe
Usage:
1. Open Explorer -> right-click "GwxControlPanelSetup.exe" (Application executable) -> Run as Administrator.
2. Open Explorer -> right-click "GWX Control Panel" shortcut inside installed folder -> Run as Administrator -> select options.

* 10AppsManager (freeware):
Guide:
http://www.majorgeeks.com/files/details/10appsmanager.html
Program:
http://www.thewindowsclub.com/10appsmanager-windows-10/
ReadMe:
http://www.thewindowsclub.com/10appsmanager-windows-10/
File:
http://www.thewindowsclub.com/downloading-10appsmanager/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "10AppsManager.exe" (Application executable) -> Run as Administrator.

* Windows X App Remover (free, open source):
Guide:
http://sourceforge.net/projects/windows8appremover/
Program:
http://mademan.bplaced.net/page-v2/unterseite-1-1.html
ReadMe:
http://winxappremover.codeplex.com/
File:
http://sourceforge.net/projects/windows8appremover/files/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "WindowsXAppRemover.exe" (Application executable) -> Run as Administrator.

* Uninstall Cortana from Windows 10 CMD script (freeware):
Guide:
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
Program:
http://www.winaero.com/download.php?view.1832
File:
http://www.winaero.com/request.php?1832
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "Uninstall Cortana.cmd" (Windows Command Script) -> Run as Administrator.

* Edge Blocker (freeware):
Guide:
http://www.sordum.org/9312/
Program:
http://www.sordum.org/9312/
File:
http://www.sordum.org/files/download/edge-blocker/EdgeBlock.zip
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click "EdgeBlock.exe" (Application executable) -> Run as Administrator.

* Windows10Debloater (free, open source):
Guide:
http://github.com/Sycnex/Windows10Debloater/blob/master/README.md/
Program:
http://github.com/Sycnex/Windows10Debloater/
ReadMe:
http://github.com/Sycnex/Windows10Debloater/blob/master/README.md/
Files [right-click each 1 -> Save as...]:
http://raw.githubusercontent.com/Sycnex/Windows10Debloater/master/Windows10Debloater.ps1
http://raw.githubusercontent.com/Sycnex/Windows10Debloater/master/Windows10DebloaterGUI.ps1
Usage:
Open Explorer -> right-click "Windows10Debloater.ps1" + then "Windows10DebloaterGUI.ps1" -> Run as Administrator -> enable
execution of PowerShell scripts:
Set-ExecutionPolicy Unrestricted -Force
-> run each PowerShell script (.ps1) file above -> restart computer.

* Debloat Windows 10 (free, open source):
Guide:
http://github.com/W4RH4WK/Debloat-Windows-10/
Program:
http://github.com/W4RH4WK/Debloat-Windows-10/
File:
http://github.com/W4RH4WK/Debloat-Windows-10/archive/master.zip
ReadMe:
http://github.com/W4RH4WK/Debloat-Windows-10/blob/master/README.md/
Usage:
1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files:
http://www.mdgx.com/toy.htm#ZIP
2. Open Explorer -> right-click each .ps1 (PowerShell script) file in .zip -> Run as Administrator ->
enable execution of PowerShell scripts:
Set-ExecutionPolicy Unrestricted -Force
-> right-click PowerShell.exe shortcut -> Run as Administrator -> unblock PowerShell scripts + modules from within files folder:
ls -Recurse *.ps1 | Unblock-File
ls -Recurse *.psm1 | Unblock-File
-> run each PowerShell script in ZIP -> restart computer.



Disable/Reenable User Account Control (UAC)
*******************************************

Windows Vista/2008/7/8/8.1/2012/10/2016/2019 users: right-click each file in Windows/File Explorer -> select
Run as Administrator (temporary fix) or disable User Account Control (UAC) (permanent fix) in:
- Windows 10/2016/2019:
http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html
- Windows 8/2012/8.1/2012 R2:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html
- Windows 7/2008 R2:
http://www.petri.com/disable-uac-in-windows-7.htm
- Windows Vista/2008:
http://www.petri.com/disable_uac_in_windows_vista.htm

Free(ware) tools to disable/reenable UAC:
- UAC Pass:
http://sites.google.com/site/freeavvarea/UACPass-en/
- UAC Tweak:
http://www.askvg.com/uac-tweak-a-small-cute-utility-to-tweak-uac-user-account-control-in-windows-vista/
- TweakUAC:
http://www.majorgeeks.com/files/details/tweakuac.html
- Disable UAC:
http://www.disableuac.com/
FYI:
MDGx Tweaked + Customized File Manager (FM) installer FMNT32.EXE (free):
http://www.mdgx.com/xptoy.htm#FMNT
also installs "Disable User Account Control (UAC)" + "Enable User Account
Control (UAC)" items to Desktop right-click shell context menu. For details
open TAKEOWN.INF + TAKEOWN.REG (both in C:\FileMan) using Notepad or better
Notepad replacement [free(ware)]:
http://www.mdgx.com/toy.htm#TXT



Restore/(Re)Install Windows 7 SP1/8/8.1 or Switch to Linux (free + safe)
************************************************************************

* Strongly Recommended:
Windows 10 users: 30 days after Windows 10 was installed (mostly by force, behind your back, without your knowledge!)
on your computer(s)/laptop(s) you still have the option to restore/(re)install your (previous) operating system (OS):
Windows 7 SP1, 8 or 8.1:
MSKB:
http://support.microsoft.com/help/4027936/
How-To Geek:
http://www.howtogeek.com/220723/
PC Advisor:
http://www.pcadvisor.co.uk/how-to/windows/how-downgrade-windows-10-to-windows-7-8-easy-3615606/

* Or Switch to Linux (free + safe):
Switch to Linux... The Free OS:
http://www.mdgx.com/linux.htm
How to Move from Windows to Linux in 8 steps:
http://www.wikihow.com/Move-from-Windows-to-Linux/
How to Switch from Windows to Ubuntu in 7 steps (example):
http://www.wikihow.com/Switch-to-Ubuntu/
10 Reasons Why You Should Switch To Linux:
http://itsfoss.com/reasons-switch-linux-windows-xp/
Switch to Netrunner Linux distro (example):
http://www.betanews.com/2019/01/14/netrunner-blackbird-linux-win7/
Is Windows 10 Conditioning Us for a Microsoft Linux OS?
http://www.redmondmag.com/articles/2017/09/13/is-windows-10-conditioning-us-linux.aspx



Windows 10 = Errors, Flaws, Spyware + Privacy Nightmare
*******************************************************

* Hold on to your horses... ;-/
Too many Windows 10 Updates are buggy/flawed, may generate errors, lock up your computer(s)/laptop(s), restart/reboot unexpectedly
in the middle of performing critical/essential/vital work, and/or even cause loss of data [!], and these are just a few examples:
http://kotaku.com/1846864671/
http://www.techradar.com/news/new-windows-10-update-is-causing-a-whole-world-of-pain/
http://betanews.com/2021/02/07/windows-10-updates-kb4598299-kb4598301-visual-studio-problems/
http://www.komando.com/security-privacy/latest-windows-10-update-causing-serious-issues-including-blue-screen-of-death/760098/
http://callnerds.com/windows-10-update-disaster-and-what-you-should-do-about-it/
http://www.pcmag.com/news/microsoft-re-releasing-windows-10-october-update-for-all/
http://www.maketecheasier.com/latest-windows-10-update-problems/
http://www.howtogeek.com/658194/
http://www.forbes.com/sites/gordonkelly/2020/05/19/microsoft-windows-10-warning-crashes-bsod-chrome-browser-slowdown-gaming-problems-upgrade-windows-10-free/
http://www.pcmag.com/news/windows-10-update-degrades-performance-in-some-games/
http://www.forbes.com/sites/gordonkelly/2020/05/27/microsoft-issues-windows-10-update-warning-kb4556799-free-windows-10-upgrade/
http://www.cnet.com/news/microsoft-windows-10-forced-updates-auto-restarts-are-the-worst/
... And it goes on, and on...
WTF Microsoft: For months Microsoft hid that Registry backup no longer worked while Windows 10 reported it as successfully completed:
http://www.computerworld.com/article/3406846/wtf-microsoft.html
Microsoft Issues Warning for 800 Million Windows 10 Users:
http://www.forbes.com/sites/gordonkelly/2019/06/29/microsoft-windows-10-upgrade-registry-warning-upgrade-windows/
Microsoft explains the lack of Registry backups in Windows 10:
http://www.ghacks.net/2019/06/29/microsoft-explains-the-lack-of-registry-backups-in-windows-10/
Don't use Windows 10 - It's a privacy nightmare:
http://www.privacytools.io/#win10
What Windows 10's "Privacy Nightmare" Settings Actually Do:
http://www.lifehacker.com/1722267229/
Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings:
http://www.thehackernews.com/2016/02/microsoft-windows10-privacy.html
Even when told not to Windows 10 just can't stop talking to Microsoft:
http://www.arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/
From the horse's mouth: Microsoft Windows 10 License Terms:
http://www.microsoft.com/en-us/useterms/retail/windows/10/useterms_retail_windows_10_english.htm
Windows 10 doesn't offer much privacy by default: Here's how to fix it:
http://www.arstechnica.com/information-technology/2015/08/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it/
Microsoft may be collecting more data than initially thought:
http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/
Windows 10 privacy issues you should know about:
http://www.thenextweb.com/microsoft/2015/07/29/wind-nos/
How to disable data logging in W10:
http://www.reddit.com/r/Windows10/comments/3f38ed/
Windows 10 Privacy Settings:
http://www.tweakhound.com/2015/11/19/windows-10-privacy-settings-2/
Microsoft warning: 'Use Windows 7 at Your Own Risk', seriously?:
http://www.thehackernews.com/2016/01/microsoft-windows-7.html
Microsoft's Windows 10 is a privacy nightmare. Here's how to protect yourself:
http://www.slate.com/articles/technology/bitwise/2015/08/windows_10_privacy_problems_here_s_how_bad_they_are_and_how_to_plug_them.html
Windows 10 is spying on almost everything you do -- here's how to opt out:
http://www.bgr.com/2015/07/31/windows-10-upgrade-spying-how-to-opt-out/
Windows 10 automatically spies on your children and sends you a dossier of their activity:
http://www.boingboing.net/2015/08/10/windows-10.html
Microsoft's Windows 10 has permission to watch your every move:
http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html
Is Windows 10 really a privacy nightmare?
http://money.cnn.com/2015/08/17/technology/windows-10-privacy/
Windows 10 comes with built-in spyware; if your work requires confidentiality DO NOT INSTALL:
http://www.dailykos.com/story/2015/8/2/1408113/-Windows-10-comes-with-built-in-spyware-If-your-work-requires-confidentiality-DO-NOT-INSTALL/
How Bad Is Microsoft's Data Land-Grab?
http://www.slate.com/articles/technology/bitwise/2016/01/microsoft_holds_a_copy_of_windows_10_users_drive_encryption_keys_how_scary.html
Updategate: Microsoft is about to make it even harder to opt out of Windows 10:
http://www.theinquirer.net/inquirer/news/2430786/updategate-microsoft-is-now-installing-windows-10-by-default-in-windows-update/
Microsoft upgraded users to Windows 10 without their OK:
http://www.infoworld.com/article/3043526/
10 reasons you shouldn't upgrade to Windows 10:
http://www.infoworld.com/article/2972298/
Microsoft Starts Collecting User Data from Windows 7 and Windows 8 PCs:
http://news.softpedia.com/news/microsoft-starts-collecting-user-data-from-windows-7-and-windows-8-pcs-490302.shtml
Changes in Computing: Super Silos and Garbage Heap Dogs [Why is Windows 10 different?]:
http://www.jsware.net/jsware/comp2012plus.php5
Microsoft CMO on Windows 10's Pushy Update:
http://www.youtube.com/watch?v=R-j3ZSa33Fw
Microsoft Blog: Windows 10 for Enterprise: More secure and up to date:
http://blogs.windows.com/business/2015/01/30/windows-10-for-enterprise-more-secure-and-up-to-date/
Microsoft Blog: Our continuing commitment to your privacy with Windows 10:
http://blogs.windows.com/windowsexperience/2017/01/10/continuing-commitment-privacy-windows-10/
Windows 7 Users Are Refusing to Upgrade to Windows 10: Here's Why:
http://www.laptopmag.com/articles/windows-7-market-share/
Windows 10 looks like this:
http://i.imgur.com/zPF2k89.png

* Basic education in the digital age = know your rights:
- Internet Privacy:
http://en.wikipedia.org/wiki/Internet_privacy
- Privacy Laws:
http://en.wikipedia.org/wiki/Privacy_law
- Net Neutrality:
http://www.mdgx.com/4net.htm



Windows 7/8/8.1: Block/Disable/Stop Forced Windows 10 Upgrade
*************************************************************

Complete List of All Updates You Should Uninstall to Block Windows 10:
http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/
Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016 step-by-step Guides:
Can't stop Windows 10 upgrade:
http://www.hardforum.com/showthread.php?t=1871988
Disable Data Collection in Windows 10:
http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/
How to Stop Windows 7/8 from Downloading Windows 10 Automatically:
http://www.howtogeek.com/228551/
What Is $WINDOWS.~BT Folder On My Hard Drive?:
http://www.addictivetips.com/windows-tips/what-is-the-windows-bt-folder-on-my-hard-drive/
Manage Windows 10 Notification + Upgrade options [DisableOSUpgrade]:
http://support.microsoft.com/help/3080351/
Disable Windows 8.1 store upgrade offer prompt:
http://www.winaero.com/blog/disable-windows-8-1-store-upgrade-offer-prompt/
Disable Get Windows 10 icon in notification area (tray):
http://www.superuser.com/questions/922068/
Block specific Windows update hotfix:
http://www.serverfault.com/questions/145843/
Disable KB3035583 "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
http://support.microsoft.com/help/3080351/
Block Windows Spying:
http://blockwindows.wordpress.com/
BlockWindows:
http://github.com/WindowsLies/BlockWindows/
Stop Windows 10 upgrade notification in Windows 7:
http://answers.microsoft.com/en-us/windows/forum/windows_10-win_upgrade/stop-windows-10-upgrade-notification-on-windows-7/adda31a7-ebbe-44b7-bcb4-f3da1563688c/
How to clean Windows 10 crapware off your Windows 7 or 8.1 PC:
http://www.infoworld.com/article/2983777/
Windows 10 tools to block automatic updates:
http://www.ghacks.net/2015/12/18/two-windows-10-tools-to-block-automatic-updates/
Uninstall and Block Updates and Drivers in Windows 10:
http://www.howtogeek.com/223864/
Temporarily prevent Windows or Driver Update from reinstalling in Windows 10:
http://support.microsoft.com/help/3073930/
File:
http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab
Win Updates Disabler (freeware):
http://www.site2unblock.com/win-updates-disabler/
File:
http://www.site2unblock.com/download/win-updates-disabler-setup.exe
Portable:
http://www.site2unblock.com/download/win-updates-disabler-portable.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Windows 7/8/8.1: Uninstall Forced Windows 10 Upgrade/Updates
************************************************************

* Uninstall KB3035583 "Get Windows 10" (GWX) Update Guide:
http://www.winsupersite.com/windows-10/how-stop-windows-10-upgrade-downloading-your-system
Uninstall KB3035583 and Hide from Windows Updates in BAT file:
http://www.reddit.com/r/windows/comments/38ivhp/
Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/help/3035583/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3068708/
Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/help/3075249/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3080149/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT

* Remove Windows 10 Upgrade updates from Windows 7/8/8.1:
http://www.ghacks.net/2015/04/17/how-to-remove-windows-10-upgrade-updates-in-windows-7-and-8/
http://support.4it.com.au/article/disable-get-windows-10-notifications-from-the-command-prompt/
Prevent Windows 10 Upgrade from Installing:
http://www.winsupersite.com/windows-10/prevent-windows-10-upgrade-installing-after-making-your-reservation
Block Specific Updates in Windows Update:
http://www.ghacks.net/2010/08/11/how-to-block-specific-updates-in-windows-update/
Remove Windows 10 GWX Upgrade nonsense:
http://www.dedoimedo.com/computers/windows-7-to-10-gwx-how-to-remove.html
Block specific Windows update hotfix:
http://www.serverfault.com/a/341318/



Uninstall Windows 7/8/8.1/2012/10/2016/2019 Spyware
***************************************************

Uninstall spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
KB3022345, KB3068708, KB3075249 + KB3080149:
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3022345/
Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1:
http://support.microsoft.com/help/3035583/
Update for customer experience and diagnostic telemetry:
Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7:
http://support.microsoft.com/help/3075249/
Update for customer experience and diagnostic telemetry:
http://support.microsoft.com/help/3080149/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Windows 10 Blocked Games
************************

Windows 10 Won't Run CD-ROM/DVD-ROM Games Using SafeDisc Or Securom DRM:
http://www.rockpapershotgun.com/2015/08/17/windows-10-safedisc-securom-drm/
http://gadgets.ndtv.com/games/news/windows-10-will-not-run-older-pc-games-with-drm-729304
http://www.pcworld.com/article/2972271/
http://www.ign.com/articles/2015/08/19/windows-10-wont-run-games-with-safedisk-securom-drm
Windows 10 Games Compatibility List:
http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_install/windows-10-games-compatibility-list/a31335a8-730f-4ac9-8c19-7c8c3a664ced



Hiden Disk Partition
********************

Fix: Windows 10 1803 creates an extra Disk Partition:
http://www.thewindowsclub.com/windows-10-creates-extra-disk-partition-fixed/



Group Policy Editor (GPE)
*************************

MDGx Group Policy Editor (GPE) fixes + tools (free):
http://www.mdgx.com/xptoy.htm#GPO
******************************************************************************
Enable Group Policy Editor (gpedit.msc) in Windows 10 Home Edition:
http://www.majorgeeks.com/content/page/enable_group_policy_editor_in_windows_10_home_edition.html
http://www.itechtics.com/enable-gpedit-windows-10-home/
Add Group Policy Editor to Windows 10 Home with PowerShell batch file:
http://www.majorgeeks.com/files/details/add_gpedit_msc_with_powershell.html
http://www.itechtics.com/easily-enable-group-policy-editor-gpedit-msc-in-windows-10-home-edition/
Group Policy Editor for Windows 10 Home Edition:
http://www.majorgeeks.com/files/details/group_policy_editor_for_windows_10_home_edition.html
Group Policy Editor Enabler for Windows 10 Home Edition:
http://www.majorgeeks.com/files/details/group_policy_editor_in_windows_10_home_edition_enabler.html
Policy Plus: Group Policy Editor (GPEdit) Alternative for Windows 7/8/8.1/10:
http://github.com/Fleex255/PolicyPlus/
Direct download [360 KB]:
http://github.com/Fleex255/PolicyPlus/releases/latest/
Requires Microsoft .Net Framework Redistributable (NFR) 4.5/newer:
http://www.mdgx.com/add.htm#NFR
Policy Plus Guide:
http://www.itechtics.com/best-group-policy-editor-gpedit-msc-alternative-for-windows/
http://www.majorgeeks.com/files/details/policy_plus.html
Right-click "PolicyPlus.exe" -> Run as Administrator -> Help -> Acquire ADMX
files -> Begin button -> Wait for download + install to complete... -> OK/Yes
button.
Windows 10 ADMX files used by Group Policy Editor (GPEdit) + Policy Plus
[14 MB]:
http://download.microsoft.com/download/D/7/4/D74DD144-DBC7-496E-A09F-A2DE8E9D38D1/Windows_%2010_Creators_Update_ADMX.msi
******************************************************************************
1. Enable Group Policy Editor (gpedit.msc) in Windows 10 Home Edition:
http://www.majorgeeks.com/content/page/enable_group_policy_editor_in_windows_10_home_edition.html
2. Group Policy Editor for Windows 10 Home Edition:
http://www.majorgeeks.com/mg/getmirror/group_policy_editor_for_windows_10_home_edition,2.html
3. Policy Plus:
http://www.majorgeeks.com/files/details/policy_plus.html
4. Enable Local Security Policy (secpol.msc) in Windows 10 Home:
http://www.majorgeeks.com/content/page/how_to_enable_local_security_policy_in_windows_10_home.html
******************************************************************************
* Microsoft Windows XP SP1/XP SP1a/XP SP2/2003 Group Policy Management Console
(GPMC) v1.0.2 32-bit tool (English):
http://msdn.microsoft.com/library/aa814316.aspx
GPMC.EXE [5.55 MB, right-click to save!]:
http://download.microsoft.com/download/a/d/b/adb5177d-01a7-4f04-bfcc-cb7cea8b5bb7/gpmc.msi
More info:
http://www.microsoft.com/download/details.aspx?id=21895
Windows XP SP1/XP SP1a require GPEDIT.DLL Hotfix already installed:
http://support.microsoft.com/help/326469
Windows XP Pre-SP2 requires Microsoft .Net Framework Redistributable (NFR)
(free):
http://www.mdgx.com/add.htm#NFR
Microsoft Windows 2000/XP/2003 Group Policy Object (GPO) 32-bit tool:
http://technet.microsoft.com/library/cc784165.aspx
GPOTOOL.EXE [77 KB]:
http://download.microsoft.com/download/win2000platform/Tool/Q314147/NT5XP/EN-US/GPOTool.EXE
Group Policy in Windows 2003 DOCument [660 KB, right-click to save!]:
http://download.microsoft.com/download/0/0/4/0044470e-5f3a-4569-9255-91f932e4da3b/gpintro.doc
Microsoft Windows 2000/XP/2003/Vista/2008/7/8/8.1/2012 Group Policy Settings
[Excel XLS format, right-click to save!]:
http://www.microsoft.com/download/details.aspx?id=25250
Microsoft Windows Vista/2008/7/8/8.1/2012 Planning and Deploying Group Policy
DOCument:
http://www.microsoft.com/download/details.aspx?id=22478
GP Plan Deploy DOC [1 MB, DOC format, right-click to save!]:
http://download.microsoft.com/download/f/3/8/f3847f2c-5a90-449b-9fd1-0464e3ab3187/GP_Plan_Deploy.doc
Microsoft Windows 2003 Group Policy Infrastructure DOCument:
http://www.microsoft.com/download/details.aspx?id=14392
GP Infrastructure DOC [1 MB, DOC format, right-click to save!]:
http://download.microsoft.com/download/e/1/0/e1081217-de3d-4e2e-8663-13d59d06cbbd/gpinfra.doc
MS TechNet: Windows Server: Group Policy:
http://technet.microsoft.com/windowsserver/bb310732.aspx
MS TechNet: Group Policy Collection:
http://technet.microsoft.com/library/cc779838.aspx
MSDN: Step-by-Step Guide to Understanding Group Policy:
http://msdn.microsoft.com/library/bb742376.aspx
Windows 7: Group Policy management for IT pros:
http://windows.microsoft.com/en-us/windows7/group-policy-management-for-it-pros/
MSKB: How to use Group Policy to remotely install software in Windows 2003 +
2008:
http://support.microsoft.com/help/816102
Wikipedia: Group Policy:
http://en.wikipedia.org/wiki/Group_Policy
MDGx: gpedit.msc Guide:
http://www.mdgx.com/reg.htm#ADM
FYI:
Microsoft removed Group Policy Editor (GPE) [respectively GPEdit.DLL +
gpedit.msc] from all Basic, Home and Starter Editions of Windows
XP/Vista/7/8/8.1/10!
Restore GPE on all Windows NTx
[2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019] Editions:
http://www.askvg.com/how-to-enable-group-policy-editor-gpedit-msc-in-windows-7-home-premium-home-basic-and-starter-editions/
Install Group Policy Editor (GPEdit.DLL + gpedit.msc) on Windows 7/8/8.1/10:
http://www.rushinformation.com/windows-find-gpedit-msc-error-windows-78-fixed/
SETUP.EXE [855 KB]:
http://orig08.deviantart.net/9bb0/f/2011/180/b/0/add_gpedit_msc_by_jwils876-d3kh6vm.zip
More info:
http://www.deviantart.com/drudger/art/Add-GPEDIT-msc-215792914/
GPEdit Enabler BATch file for Windows 10 Home:
http://www.itechtics.com/enable-gpedit-windows-10-home/
Direct download [379 B]:
http://www.itechtics.com/wp-content/uploads/downloads/gpedit-enabler.bat
Policy Plus: Group Policy Editor (GPEdit) Alternative for Windows 7/8/8.1/10:
http://github.com/Fleex255/PolicyPlus/
Direct download [360 KB]:
http://github.com/Fleex255/PolicyPlus/releases/latest/
Requires Microsoft .Net Framework Redistributable (NFR) 4.5/newer:
http://www.mdgx.com/add.htm#NFR
Policy Plus Guide:
http://www.itechtics.com/best-group-policy-editor-gpedit-msc-alternative-for-windows/
http://www.majorgeeks.com/files/details/policy_plus.html
Right-click "PolicyPlus.exe" -> Run as Administrator -> Help -> Acquire ADMX
files -> Begin button -> Wait for download + install to complete... -> OK/Yes
button.
Windows 10 ADMX files used by Group Policy Editor (GPEdit) + Policy Plus
[14 MB]:
http://download.microsoft.com/download/D/7/4/D74DD144-DBC7-496E-A09F-A2DE8E9D38D1/Windows_%2010_Creators_Update_ADMX.msi
FIX: GPEDIT.MSC snap-in creation failed/failed to initialize:
http://www.rushinformation.com/gpedit-msc-snap-in-creation-failed-initialize-error/
GPE files for Windows XP Home:
http://bogdan.org.ua/2007/11/15/windows-xp-he-home-edition-gpedit-msc-group-policy-editing-via-registry.html
Direct download [845 KB]:
http://bogdan.org.ua/wp-content/uploads/2007/11/gpedit-for-windows-xp-home.zip
GPE registry entries for Windows XP Home:
http://web.archive.org/web/20160324222902/http://www.j79zlr.com/gphome.php



DNS Cache
*********
http://www.mdgx.com/hosts.php#N2

Optional:
DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS [hosts] files with many IPs:
Disable Client-Side DNS Caching in Windows XP/2003:
http://support.microsoft.com/help/318803/
Flush Windows DNS Cache:
http://www.thewindowsclub.com/flush-windows-dns-cache/
Stop/Start DNS Client service:
http://www.computerstepbystep.com/dns_client_service.html
MDGx HOSTS Guide: DNS Client Service:
http://www.mdgx.com/hosts.php#N2
Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details:
http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT
http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT



TURN OFF Windows Update (WU)
****************************

Optional:
* MDGx WINDOWS8.TXT:
http://www.mdgx.com/8.php
http://www.mdgx.com/WINDOWS8.TXT
-> "Tweaks + Fixes" ->
* Turn OFF Windows Updates (WU) + related Registry settings in Windows 7/8/8.1:
http://support.microsoft.com/help/328010/
http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS
http://www.smallvoid.com/article/winnt-automatic-updates-config.html
1. Use Notepad or similar/better free(ware) plain text/ASCII editor:
http://www.mdgx.com/toy.htm#TXT
to create a plain text Registry file containing the lines between Cut & Paste delimiters below.
2. Save it as plain text/ASCII file (Encode -> ANSI) with the REG extension (.REG).
3. Name it whatever you wish.
4. Right-click newly created .REG file.
5. Run as Administrator.
6. Answer Yes/OK to all prompts to register its information into your Registry.
-----Begin cut & paste here-----
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"DisableOSUpgrade"=dword:1
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate]
"DisableWindowsUpdateAccess"=dword:1
"ElevateNonAdmins"=dword:1
"DisableOSUpgrade"=dword:1
"WUServer"="0.0.0.0"
"WUStatusServer"="0.0.0.0"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate\AU]
"AutoInstallMinorUpdates"=dword:0
"NoAutoUpdate"=dword:1
"NoAutoRebootWithLoggedOnUsers"=dword:1
"NoAUAsDefaultShutdownOption"=dword:1
"RebootRelaunchTimeout"=dword:3
"RebootRelaunchTimeoutEnabled"=dword:1
"UseWUServer"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update]
"NextSqmReportTime"="0"
"NextFeaturedUpdatesNotificationTime"="0"
"EnableFeaturedSoftware"=dword:0
"FeaturedUpdatesNotificationSeqNum"=dword:0
"FeaturedUpdatesNotificationSeqNumGenTime"="0"
"SetupWizardLaunchTime"="0"
"ForcedReboot"=dword:0
"AUOptions"=dword:1
"ConfigVer"=dword:1
"BalloonTime"="0"
"ScheduledInstallDay"=dword:0
"ScheduledInstallTime"=dword:0
"IncludeRecommendedUpdates"=dword:0
"NextDetectionTime"="0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoWindowsUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade]
"AllowOSUpgrade"=dword:0
"ReservationsAllowed"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State]
"OSUpgradeState"=dword:1
"OSUpgradeStateTimeStamp"="2015-05-05 05:05:05"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"EnableAutoUpgrade"=dword:0
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player]
"DisableAutoUpdate"=dword:1
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions]
"NoUpdateCheck"=dword:1
;
------End cut & paste here------

* Disable Windows Update (WU):
Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
http://www.pctools.com/guides/registry/detail/1176/
Configure Automatic Updates [AutoInstallMinorUpdates]:
http://technet.microsoft.com/library/cc708449.aspx
Automatic Updates Settings [NoAutoRebootWithLoggedOnUsers]:
http://technet.microsoft.com/library/dd939923.aspx
Automatic Updates using Registry Editor [NoWindowsUpdate]:
http://technet.microsoft.com/library/dd939844.aspx
Windows Update Client (WUC) + Windows Update Agent (WUA):
http://www.mdgx.com/xptoy.htm#WUC
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Uninstall Cortana + OneDrive
****************************

Optional:
Uninstall Cortana from Windows 10 (by using install_wim_tweak.exe):
http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/
File:
http://www.winaero.com/request.php?1832
Completely disable Cortana in Windows 10:
http://www.superuser.com/questions/949569/
Uninstall/Reinstall Windows 10 Built-in Apps:
http://www.howtogeek.com/224798/how-to-uninstall-windows-10s-built-in-apps-and-how-to-reinstall-them/
Remove default apps from Windows 10:
http://www.reddit.com/r/windows/comments/3f6gsl/
Killing Cortana: Disable Windows 10 info-hungry digital assistant:
http://www.pcworld.com/article/2949759/
Uninstall OneDrive:
http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT



Restore Windows Help (WinHlp32) Functionality
*********************************************

WinHlp32 for Windows 10:
http://raxsoft.com/raxccm/software_app.php?progid=13
Direct download [735 KB, freeware]:
http://assets.raxsoft.com/bin/winhlp32/winhlp32.msi
Windows Help + HTML Help:
http://www.mdgx.com/add.htm#HHU



HOSTS
*****
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
http://www.mdgx.com/10BLK/10_BLOCK.ZIP
http://www.mdgx.com/hosts.php

Copy & paste these 0.0.0.0 (redirected to null) IPs to your HOSTS [hosts] file located in:
%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
where %windir% = usually C:\WINDOWS .
Source:
http://www.pastebin.com/gebp8edd
Edit HOSTS file in Windows 7/8/8.1/2012/10/2016/2019:
http://www.petri.com/easily-edit-hosts-file-windows-10/
http://www.petri.com/edit-hosts-file-windows-8/
http://www.petri.com/edit-hosts-file-windows-7/
Take Ownership of files + folders right-click Explorer option:
http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/
MDGx Tweaked + Customized File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:
http://www.mdgx.com/xptoy.htm#FMNT
FM ReadMe Guide:
http://www.mdgx.com/fmnt32/fmnt32.php
FM [2.2 MB, free]:
http://www.mdgx.com/fmnt32/FMNT32.EXE
FixNT6 Take Ownership tool (freeware):
http://www.jsware.net/jsware/nt6fix.php5#restfix
FixNT6 [36 KB, freeware]:
http://www.jsware.net/jsware/zips/fix6r.zip
Open E10BLOK.CMD (included) in Notepad for details:
http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT
If 0.0.0.0 redirects do not work properly on your computer(s), you can substitute all null [0.0.0.0] text strings below with default localhost:
127.0.0.1
Open Notepad or better Notepad replacement [free(ware)]:
http://www.mdgx.com/toy.htm#TXT
-> right-click your HOSTS file [%windir%\SYSTEM32\DRIVERS\ETC\HOSTS where %windir% is usually C:\WINDOWS] -> Properties -> Security tab -> Edit... ->
click Administrators (Your User Name/Administrator) -> check Full control box -> OK -> OK -> right-click your HOSTS file -> Run as Administrator -> Edit -> Replace [Ctrl+H] -> Find what:
0.0.0.0
-> Replace with:
127.0.0.1
Replace all instances -> Save HOSTS file -> refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).
BONUS:
List below contains most all known Microsoft servers one may wish to disable, but some will deactivate
Windows Update (WU) and/or some will block other Microsoft programs/features/services/etc you may need or care about.
CAUTION:
View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
NOTE:
You can always disable or delete completely (already disabled) servers you wish to access:
To (re)enable/edit/customize -> open HOSTS file (as Administrator) in Notepad/similar/better plain text/ASCII editor
http://www.mdgx.com/toy.htm#TXT
-> comment/remark (precede with # followed by 1 space) or delete desired line(s) below -> save your HOSTS file ->
refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).
Recommended HOSTS file:

-----Begin cut & paste here-----
# MDGx HOSTS Guide:
# http://www.mdgx.com/hosts.php
# All localhost lines must be listed at the top of the HOSTS file in this order: IPv4 (1st) + IPv6 (2nd):
# http://en.wikipedia.org/wiki/Multicast_address
# (1) Next line maps IPv4 protocol localhost:
127.0.0.1 localhost
# (2) Next lines map IPv6 protocol localhost:
::1 localhost
fe80::1 localhost
fe80::1%lo0 localhost
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
# Lines below recommended to disable Microsoft:
# Windows Automatic Update (WUA), Forced Win10 Upgrade (GWX), Ads, Live, Logging, Spyware, Telemetry, Tracking.
# Use with CAUTION!
# Hostnames below are disabled (IPv4) -> redirected to 0.0.0.0 (null) or 127.0.0.1 (localhost).
# http://en.wikipedia.org/wiki/Hostname
# To (re)enable/edit/customize -> open HOSTS file (as Administrator) in Notepad/similar/better plain text/ASCII editor
# http://www.mdgx.com/toy.htm#TXT
# -> comment/remark (precede with # followed by 1 space) or delete desired line(s) below -> save your HOSTS file ->
# refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s).

0.0.0.0 00001b-1.l.windowsupdate.com
0.0.0.0 000043-1.l.windowsupdate.com
0.0.0.0 000061-1.l.windowsupdate.com
0.0.0.0 0000a3-1.l.windowsupdate.com
0.0.0.0 0000f2-1.l.windowsupdate.com
0.0.0.0 0000f9-1.l.windowsupdate.com
0.0.0.0 0000fe-1.l.windowsupdate.com
0.0.0.0 00015e-1.l.windowsupdate.com
0.0.0.0 0001a5-1.l.windowsupdate.com
0.0.0.0 0001bc-1.l.windowsupdate.com
0.0.0.0 0001d4-1.l.windowsupdate.com
0.0.0.0 0001ed-1.l.windowsupdate.com
0.0.0.0 000202-1.l.windowsupdate.com
0.0.0.0 000238-1.l.windowsupdate.com
0.0.0.0 000263-1.l.windowsupdate.com
0.0.0.0 00028e-1.l.windowsupdate.com
0.0.0.0 00028f-1.l.windowsupdate.com
0.0.0.0 0002ae-1.l.windowsupdate.com
0.0.0.0 0002c3-1.l.windowsupdate.com
0.0.0.0 0002fd-1.l.windowsupdate.com
0.0.0.0 000371-1.l.windowsupdate.com
0.0.0.0 000396-1.l.windowsupdate.com
0.0.0.0 0003fc-1.l.windowsupdate.com
0.0.0.0 000410-1.l.windowsupdate.com
0.0.0.0 000418-1.l.windowsupdate.com
0.0.0.0 000452-1.l.windowsupdate.com
0.0.0.0 000464-1.l.windowsupdate.com
0.0.0.0 000498-1.l.windowsupdate.com
0.0.0.0 0004ad-1.l.windowsupdate.com
0.0.0.0 0004ee-1.l.windowsupdate.com
0.0.0.0 0004f1-1.l.windowsupdate.com
0.0.0.0 000502-1.l.windowsupdate.com
0.0.0.0 00054d-1.l.windowsupdate.com
0.0.0.0 000589-1.l.windowsupdate.com
0.0.0.0 000646-1.l.windowsupdate.com
0.0.0.0 0006df-1.l.windowsupdate.com
0.0.0.0 0007be-1.l.windowsupdate.com
0.0.0.0 0007e4-1.l.windowsupdate.com
0.0.0.0 00081a-1.l.windowsupdate.com
0.0.0.0 0008f7-1.l.windowsupdate.com
0.0.0.0 000968-1.l.windowsupdate.com
0.0.0.0 000989-1.l.windowsupdate.com
0.0.0.0 0009a5-1.l.windowsupdate.com
0.0.0.0 0009b8-1.l.windowsupdate.com
0.0.0.0 0009fe-1.l.windowsupdate.com
0.0.0.0 000a55-1.l.windowsupdate.com
0.0.0.0 000a56-1.l.windowsupdate.com
0.0.0.0 000a60-1.l.windowsupdate.com
0.0.0.0 000afa-1.l.windowsupdate.com
0.0.0.0 000b25-1.l.windowsupdate.com
0.0.0.0 000b3d-1.l.windowsupdate.com
0.0.0.0 000b62-1.l.windowsupdate.com
0.0.0.0 000b78-1.l.windowsupdate.com
0.0.0.0 000bc0-1.l.windowsupdate.com
0.0.0.0 000bcf-1.l.windowsupdate.com
0.0.0.0 000bdf-1.l.windowsupdate.com
0.0.0.0 000be0-1.l.windowsupdate.com
0.0.0.0 000c0c-1.l.windowsupdate.com
0.0.0.0 000c19-1.l.windowsupdate.com
0.0.0.0 000c27-1.l.windowsupdate.com
0.0.0.0 000c33-1.l.windowsupdate.com
0.0.0.0 000cb0-1.l.windowsupdate.com
0.0.0.0 000cca-1.l.windowsupdate.com
0.0.0.0 000d29-1.l.windowsupdate.com
0.0.0.0 000d40-1.l.windowsupdate.com
0.0.0.0 000d6d-1.l.windowsupdate.com
0.0.0.0 000e78-1.l.windowsupdate.com
0.0.0.0 000efd-1.l.windowsupdate.com
0.0.0.0 000f40-1.l.windowsupdate.com
0.0.0.0 001007-1.l.windowsupdate.com
0.0.0.0 001056-1.l.windowsupdate.com
0.0.0.0 001089-1.l.windowsupdate.com
0.0.0.0 0010bb-1.l.windowsupdate.com
0.0.0.0 0010da-1.l.windowsupdate.com
0.0.0.0 0010e3-1.l.windowsupdate.com
0.0.0.0 00111c-1.l.windowsupdate.com
0.0.0.0 001173-1.l.windowsupdate.com
0.0.0.0 0011da-1.l.windowsupdate.com
0.0.0.0 0011f3-1.l.windowsupdate.com
0.0.0.0 001233-1.l.windowsupdate.com
0.0.0.0 00123a-1.l.windowsupdate.com
0.0.0.0 001390-1.l.windowsupdate.com
0.0.0.0 001402-1.l.windowsupdate.com
0.0.0.0 00149f-1.l.windowsupdate.com
0.0.0.0 0016c3-1.l.windowsupdate.com
0.0.0.0 0017b1-1.l.windowsupdate.com
0.0.0.0 0017c5-1.l.windowsupdate.com
0.0.0.0 0017f1-1.l.windowsupdate.com
0.0.0.0 00184b-1.l.windowsupdate.com
0.0.0.0 00185d-1.l.windowsupdate.com
0.0.0.0 001891-1.l.windowsupdate.com
0.0.0.0 0018c4-1.l.windowsupdate.com
0.0.0.0 001949-1.l.windowsupdate.com
0.0.0.0 00196e-1.l.windowsupdate.com
0.0.0.0 00198e-1.l.windowsupdate.com
0.0.0.0 0019a2-1.l.windowsupdate.com
0.0.0.0 0019d8-1.l.windowsupdate.com
0.0.0.0 001a1f-1.l.windowsupdate.com
0.0.0.0 001a27-1.l.windowsupdate.com
0.0.0.0 001a32-1.l.windowsupdate.com
0.0.0.0 001a43-1.l.windowsupdate.com
0.0.0.0 001a83-1.l.windowsupdate.com
0.0.0.0 001a92-1.l.windowsupdate.com
0.0.0.0 001bb5-1.l.windowsupdate.com
0.0.0.0 001c02-1.l.windowsupdate.com
0.0.0.0 001cdc-1.l.windowsupdate.com
0.0.0.0 001d09-1.l.windowsupdate.com
0.0.0.0 001d1f-1.l.windowsupdate.com
0.0.0.0 001d49-1.l.windowsupdate.com
0.0.0.0 001d7a-1.l.windowsupdate.com
0.0.0.0 001dc2-1.l.windowsupdate.com
0.0.0.0 001e03-1.l.windowsupdate.com
0.0.0.0 001e05-1.l.windowsupdate.com
0.0.0.0 001e0c-1.l.windowsupdate.com
0.0.0.0 001e0f-1.l.windowsupdate.com
0.0.0.0 001e27-1.l.windowsupdate.com
0.0.0.0 001e4b-1.l.windowsupdate.com
0.0.0.0 001e8d-1.l.windowsupdate.com
0.0.0.0 001e9c-1.l.windowsupdate.com
0.0.0.0 001ec3-1.l.windowsupdate.com
0.0.0.0 001f23-1.l.windowsupdate.com
0.0.0.0 001f4f-1.l.windowsupdate.com
0.0.0.0 001f7f-1.l.windowsupdate.com
0.0.0.0 001fbb-1.l.windowsupdate.com
0.0.0.0 002012-1.l.windowsupdate.com
0.0.0.0 002062-1.l.windowsupdate.com
0.0.0.0 0020a7-1.l.windowsupdate.com
0.0.0.0 002108-1.l.windowsupdate.com
0.0.0.0 00210c-1.l.windowsupdate.com
0.0.0.0 00210e-1.l.windowsupdate.com
0.0.0.0 002182-1.l.windowsupdate.com
0.0.0.0 0021a0-1.l.windowsupdate.com
0.0.0.0 0021d0-1.l.windowsupdate.com
0.0.0.0 0021ff-1.l.windowsupdate.com
0.0.0.0 00227f-1.l.windowsupdate.com
0.0.0.0 0022a7-1.l.windowsupdate.com
0.0.0.0 0022c1-1.l.windowsupdate.com
0.0.0.0 0022db-1.l.windowsupdate.com
0.0.0.0 0022e6-1.l.windowsupdate.com
0.0.0.0 0022eb-1.l.windowsupdate.com
0.0.0.0 00235c-1.l.windowsupdate.com
0.0.0.0 002384-1.l.windowsupdate.com
0.0.0.0 00238e-1.l.windowsupdate.com
0.0.0.0 002394-1.l.windowsupdate.com
0.0.0.0 0023c5-1.l.windowsupdate.com
0.0.0.0 0023df-1.l.windowsupdate.com
0.0.0.0 00249b-1.l.windowsupdate.com
0.0.0.0 002518-1.l.windowsupdate.com
0.0.0.0 002557-1.l.windowsupdate.com
0.0.0.0 002562-1.l.windowsupdate.com
0.0.0.0 0025be-1.l.windowsupdate.com
0.0.0.0 0025ea-1.l.windowsupdate.com
0.0.0.0 0025f2-1.l.windowsupdate.com
0.0.0.0 00268c-1.l.windowsupdate.com
0.0.0.0 0026a1-1.l.windowsupdate.com
0.0.0.0 0026bc-1.l.windowsupdate.com
0.0.0.0 73307cf78bfb.microsoft.com
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 a-0001.dc-msedge.net
0.0.0.0 a-0002.a-msedge.net
0.0.0.0 a-0003.a-msedge.net
0.0.0.0 a-0003.dc-msedge.net
0.0.0.0 a-0004.a-msedge.net
0.0.0.0 a-0005.a-msedge.net
0.0.0.0 a-0006.a-msedge.net
0.0.0.0 a-0007.a-msedge.net
0.0.0.0 a-0008.a-msedge.net
0.0.0.0 a-0009.a-msedge.net
0.0.0.0 a-0010.a-msedge.net
0.0.0.0 a-0011.a-msedge.net
0.0.0.0 a-0012.a-msedge.net
0.0.0.0 a-msedge.net
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msads.net
0.0.0.0 a.ads2.msn.com
0.0.0.0 a.microsoft.com
0.0.0.0 a.rad.msn.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000000003.ms.a.microsoft.com
0.0.0.0 a000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a00000000000000000000000000000000000000000000000000000000001337.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000001.ms.a.microsoft.com
0.0.0.0 a0000000000000000000000002.ms.a.microsoft.com
0.0.0.0 a0000000000000000001.ms.a.microsoft.com
0.0.0.0 a000000000000000003.ms.a.microsoft.com
0.0.0.0 a000001.ms.a.microsoft.com
0.0.0.0 a102.ms.a.microsoft.com
0.0.0.0 a106.ms.a.microsoft.com
0.0.0.0 a107.ms.a.microsoft.com
0.0.0.0 a1112.ms.a.microsoft.com
0.0.0.0 a1122.ms.a.microsoft.com
0.0.0.0 a113.ms.a.microsoft.com
0.0.0.0 a119.ms.a.microsoft.com
0.0.0.0 a120.ms.a.microsoft.com
0.0.0.0 a1205.ms.a.microsoft.com
0.0.0.0 a122.ms.a.microsoft.com
0.0.0.0 a126.ms.a.microsoft.com
0.0.0.0 a128.ms.a.microsoft.com
0.0.0.0 a129.ms.a.microsoft.com
0.0.0.0 a133.ms.a.microsoft.com
0.0.0.0 a137.ms.a.microsoft.com
0.0.0.0 a141.ms.a.microsoft.com
0.0.0.0 a142.ms.a.microsoft.com
0.0.0.0 a145.ms.a.microsoft.com
0.0.0.0 a146.ms.a.microsoft.com
0.0.0.0 a1500.ms.a.microsoft.com
0.0.0.0 a2000.ms.a.microsoft.com
0.0.0.0 a23.ms.a.microsoft.com
0.0.0.0 a4.ms.a.microsoft.com
0.0.0.0 a592.ms.a.microsoft.com
0.0.0.0 ac3.msn.com
0.0.0.0 access.microsofttemplates.org
0.0.0.0 account.microsoft.com
0.0.0.0 activate.microsoft.com
0.0.0.0 activate.one.microsoft.com
0.0.0.0 activation-v2.sls.microsoft.com
0.0.0.0 activation.sls.microsoft.com
0.0.0.0 activity.windows.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 adcenter.microsoft.com
0.0.0.0 adl.windows.com
0.0.0.0 admin.messaging.microsoft.com
0.0.0.0 admin.training.partner.microsoft.com
0.0.0.0 adnexus.net
0.0.0.0 adnxs.com
0.0.0.0 ads.msn.com
0.0.0.0 ads1.msads.net
0.0.0.0 ads1.msn.com
0.0.0.0 adsinapps.microsoft.com
0.0.0.0 advertise.bingads.microsoft.com
0.0.0.0 advertising.bingads.microsoft.com
0.0.0.0 advertising.microsoft.com
0.0.0.0 aer.microsoft.com
0.0.0.0 afkar.microsoft.com
0.0.0.0 aidps.atdmt.com
0.0.0.0 ak.or.download.microsoft.com
0.0.0.0 aka-cdn-ns.adtech.de
0.0.0.0 akamdub.fullproduct.download.microsoft.com
0.0.0.0 akampr.fullproduct.download.microsoft.com
0.0.0.0 akamsin.fullproduct.download.microsoft.com
0.0.0.0 alert-security.fail
0.0.0.0 alerts.live.com
0.0.0.0 alerts.microsoft.com
0.0.0.0 alpha.telemetry.microsoft.com
0.0.0.0 alventive.xbox.com
0.0.0.0 am3pap002.storage.live.com
0.0.0.0 americas.winqual.microsoft.com
0.0.0.0 answerdesk.microsoftstore.com
0.0.0.0 answers.microsoft.com
0.0.0.0 answersstaticfilecdn.azureedge.net
0.0.0.0 anz.partners.extranet.microsoft.com
0.0.0.0 apac1.notify.windows.com.akadns.net
0.0.0.0 api.bing.com
0.0.0.0 api.cortana.ai
0.0.0.0 api.onedrive.com
0.0.0.0 appex-rf.msn.com
0.0.0.0 apps.skype.com
0.0.0.0 arc.msn.com
0.0.0.0 arc.msn.com.nsatc.net
0.0.0.0 array101-prod.do.dsp.mp.microsoft.com
0.0.0.0 array102-prod.do.dsp.mp.microsoft.com
0.0.0.0 array103-prod.do.dsp.mp.microsoft.com
0.0.0.0 array104-prod.do.dsp.mp.microsoft.com
0.0.0.0 array201-prod.do.dsp.mp.microsoft.com
0.0.0.0 array202-prod.do.dsp.mp.microsoft.com
0.0.0.0 array203-prod.do.dsp.mp.microsoft.com
0.0.0.0 array204-prod.do.dsp.mp.microsoft.com
0.0.0.0 array401-prod.do.dsp.mp.microsoft.com
0.0.0.0 array402-prod.do.dsp.mp.microsoft.com
0.0.0.0 array403-prod.do.dsp.mp.microsoft.com
0.0.0.0 array404-prod.do.dsp.mp.microsoft.com
0.0.0.0 array405-prod.do.dsp.mp.microsoft.com
0.0.0.0 array406-prod.do.dsp.mp.microsoft.com
0.0.0.0 array407-prod.do.dsp.mp.microsoft.com
0.0.0.0 array408-prod.do.dsp.mp.microsoft.com
0.0.0.0 ars.smartscreen.microsoft.com
0.0.0.0 asimov-win.settings.data.microsoft.com.akadns.net
0.0.0.0 ask.support.microsoft.com
0.0.0.0 assessment.learning.microsoft.com
0.0.0.0 au.download.windowsupdate.com
0.0.0.0 au.v4.download.windowsupdate.com
0.0.0.0 auth.gfx.ms
0.0.0.0 autocomplete.support.microsoft.com
0.0.0.0 autoupdate.microsoft.com
0.0.0.0 autoupdate.windowsmedia.com
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az416426.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 az725175.vo.msecnd.net
0.0.0.0 azure.microsoft.com
0.0.0.0 b.ads1.msn.com
0.0.0.0 b.ads2.msads.net
0.0.0.0 b.office.microsoft.com
0.0.0.0 b.rad.msn.com
0.0.0.0 backup12.microsoft.com
0.0.0.0 bay01.calendar.live.com
0.0.0.0 bay02.calendar.live.com
0.0.0.0 bay03.calendar.live.com
0.0.0.0 bay04.calendar.live.com
0.0.0.0 beta.update.microsoft.com
0.0.0.0 betaoneservices.com
0.0.0.0 betaplace.msbpn.com
0.0.0.0 betaplace.partners.extranet.microsoft.com
0.0.0.0 betaservices.windowsmedia.com
0.0.0.0 bg.v4.a.dl.ws.microsoft.com
0.0.0.0 bg.v4.emdl.ws.microsoft.com
0.0.0.0 bg1.v4.a.dl.ws.microsoft.com
0.0.0.0 bg1.v4.emdl.ws.microsoft.com
0.0.0.0 bg2.v4.a.dl.ws.microsoft.com
0.0.0.0 bg2.v4.emdl.ws.microsoft.com
0.0.0.0 bg3.v4.a.dl.ws.microsoft.com
0.0.0.0 bg3.v4.emdl.ws.microsoft.com
0.0.0.0 bg4.v4.a.dl.ws.microsoft.com
0.0.0.0 bg4.v4.emdl.ws.microsoft.com
0.0.0.0 bg5.v4.a.dl.ws.microsoft.com
0.0.0.0 bg5.v4.emdl.ws.microsoft.com
0.0.0.0 billing.microsoft.com
0.0.0.0 bingads.microsoft.com
0.0.0.0 bingforbusiness.com
0.0.0.0 bl2p.wns.notify.windows.com.akadns.net
0.0.0.0 bl2p.wns.windows.com
0.0.0.0 bl3301-a.1drv.com
0.0.0.0 bl3301-c.1drv.com
0.0.0.0 bl3301-g.1drv.com
0.0.0.0 blob.sn4prdstr03a.store.core.windows.net
0.0.0.0 blob.weather.microsoft.com
0.0.0.0 blugro2gms.groove.microsoft.com
0.0.0.0 bn2b-cor001.api.p001.1drv.com
0.0.0.0 bn2b-cor002.api.p001.1drv.com
0.0.0.0 bn2b-cor003.api.p001.1drv.com
0.0.0.0 bn2b-cor004.api.p001.1drv.com
0.0.0.0 bn2wns1.wns.windows.com
0.0.0.0 bn3p-cor001.api.p001.1drv.com
0.0.0.0 bn3sch020010558.wns.windows.com
0.0.0.0 bn3sch020010560.wns.windows.com
0.0.0.0 bn3sch020010618.wns.windows.com
0.0.0.0 bn3sch020010629.wns.windows.com
0.0.0.0 bn3sch020010631.wns.windows.com
0.0.0.0 bn3sch020010635.wns.windows.com
0.0.0.0 bn3sch020010636.wns.windows.com
0.0.0.0 bn3sch020010650.wns.windows.com
0.0.0.0 bn3sch020011727.wns.windows.com
0.0.0.0 bn3sch020012850.wns.windows.com
0.0.0.0 bn3sch020020322.wns.windows.com
0.0.0.0 bn3sch020020749.wns.windows.com
0.0.0.0 bn3sch020022328.wns.windows.com
0.0.0.0 bn3sch020022335.wns.windows.com
0.0.0.0 bn3sch020022361.wns.windows.com
0.0.0.0 bn4sch101120814.wns.windows.com
0.0.0.0 bn4sch101120818.wns.windows.com
0.0.0.0 bn4sch101120911.wns.windows.com
0.0.0.0 bn4sch101120913.wns.windows.com
0.0.0.0 bn4sch101121019.wns.windows.com
0.0.0.0 bn4sch101121109.wns.windows.com
0.0.0.0 bn4sch101121118.wns.windows.com
0.0.0.0 bn4sch101121223.wns.windows.com
0.0.0.0 bn4sch101121407.wns.windows.com
0.0.0.0 bn4sch101121618.wns.windows.com
0.0.0.0 bn4sch101121704.wns.windows.com
0.0.0.0 bn4sch101121709.wns.windows.com
0.0.0.0 bn4sch101121714.wns.windows.com
0.0.0.0 bn4sch101121908.wns.windows.com
0.0.0.0 bn4sch101122117.wns.windows.com
0.0.0.0 bn4sch101122310.wns.windows.com
0.0.0.0 bn4sch101122312.wns.windows.com
0.0.0.0 bn4sch101122421.wns.windows.com
0.0.0.0 bn4sch101123108.wns.windows.com
0.0.0.0 bn4sch101123110.wns.windows.com
0.0.0.0 bn4sch101123202.wns.windows.com
0.0.0.0 bn4sch102110124.wns.windows.com
0.0.0.0 boardlink.microsoft.com
0.0.0.0 brandtools.partners.extranet.microsoft.com
0.0.0.0 browser.events.data.microsoft.com
0.0.0.0 browser.pipe.aria.microsoft.com
0.0.0.0 bs.serving-sys.com
0.0.0.0 buy.trymicrosoftoffice.com
0.0.0.0 buynow.one.microsoft.com
0.0.0.0 buyoffice.microsoft.com
0.0.0.0 by3301-a.1drv.com
0.0.0.0 by3301-c.1drv.com
0.0.0.0 by3301-e.1drv.com
0.0.0.0 byfiles.storage.live.com
0.0.0.0 c-0001.dc-msedge.net
0.0.0.0 c.atdmt.com
0.0.0.0 c.microsoft.akadns.net
0.0.0.0 c.microsoft.com
0.0.0.0 c.msn.com
0.0.0.0 c.s-microsoft.com
0.0.0.0 c1.microsoft.com
0.0.0.0 c2.microsoft.com
0.0.0.0 c2r.microsoft.com
0.0.0.0 c2rsetup.officeapps.live.com
0.0.0.0 cache.datamart.windows.com
0.0.0.0 candycrushsoda.king.com
0.0.0.0 capccfv2.partners.extranet.microsoft.com
0.0.0.0 careers.microsoft.com
0.0.0.0 catalog.microsoft.com
0.0.0.0 catalog.update.microsoft.com
0.0.0.0 ccp.microsoft.com
0.0.0.0 cdm.microsoft.com
0.0.0.0 cdn.atdmt.com
0.0.0.0 cdn.ay.gy
0.0.0.0 cdn.cloudflare.net
0.0.0.0 cdn.content.prod.cms.msn.com
0.0.0.0 cdn.onenote.net
0.0.0.0 cdp1.public-trust.com
0.0.0.0 cds10.stn.llnw.net
0.0.0.0 cds1203.lon.llnw.net
0.0.0.0 cds1204.lon.llnw.net
0.0.0.0 cds1209.lon.llnw.net
0.0.0.0 cds1219.lon.llnw.net
0.0.0.0 cds1228.lon.llnw.net
0.0.0.0 cds1244.lon.llnw.net
0.0.0.0 cds1257.lon.llnw.net
0.0.0.0 cds1265.lon.llnw.net
0.0.0.0 cds1269.lon.llnw.net
0.0.0.0 cds1273.lon.llnw.net
0.0.0.0 cds1285.lon.llnw.net
0.0.0.0 cds1287.lon.llnw.net
0.0.0.0 cds1289.lon.llnw.net
0.0.0.0 cds1293.lon.llnw.net
0.0.0.0 cds1307.lon.llnw.net
0.0.0.0 cds1310.lon.llnw.net
0.0.0.0 cds1325.lon.llnw.net
0.0.0.0 cds1327.lon.llnw.net
0.0.0.0 cds177.dus.llnw.net
0.0.0.0 cds20005.stn.llnw.net
0.0.0.0 cds20404.lcy.llnw.net
0.0.0.0 cds20411.lcy.llnw.net
0.0.0.0 cds20415.lcy.llnw.net
0.0.0.0 cds20416.lcy.llnw.net
0.0.0.0 cds20417.lcy.llnw.net
0.0.0.0 cds20424.lcy.llnw.net
0.0.0.0 cds20425.lcy.llnw.net
0.0.0.0 cds20431.lcy.llnw.net
0.0.0.0 cds20435.lcy.llnw.net
0.0.0.0 cds20440.lcy.llnw.net
0.0.0.0 cds20443.lcy.llnw.net
0.0.0.0 cds20445.lcy.llnw.net
0.0.0.0 cds20450.lcy.llnw.net
0.0.0.0 cds20452.lcy.llnw.net
0.0.0.0 cds20457.lcy.llnw.net
0.0.0.0 cds20461.lcy.llnw.net
0.0.0.0 cds20469.lcy.llnw.net
0.0.0.0 cds20475.lcy.llnw.net
0.0.0.0 cds20482.lcy.llnw.net
0.0.0.0 cds20485.lcy.llnw.net
0.0.0.0 cds20495.lcy.llnw.net
0.0.0.0 cds21205.lon.llnw.net
0.0.0.0 cds21207.lon.llnw.net
0.0.0.0 cds21225.lon.llnw.net
0.0.0.0 cds21229.lon.llnw.net
0.0.0.0 cds21233.lon.llnw.net
0.0.0.0 cds21238.lon.llnw.net
0.0.0.0 cds21244.lon.llnw.net
0.0.0.0 cds21249.lon.llnw.net
0.0.0.0 cds21256.lon.llnw.net
0.0.0.0 cds21257.lon.llnw.net
0.0.0.0 cds21258.lon.llnw.net
0.0.0.0 cds21261.lon.llnw.net
0.0.0.0 cds21267.lon.llnw.net
0.0.0.0 cds21278.lon.llnw.net
0.0.0.0 cds21281.lon.llnw.net
0.0.0.0 cds21293.lon.llnw.net
0.0.0.0 cds21309.lon.llnw.net
0.0.0.0 cds21313.lon.llnw.net
0.0.0.0 cds21321.lon.llnw.net
0.0.0.0 cds26.ams9.msecn.net
0.0.0.0 cds299.lcy.llnw.net
0.0.0.0 cds30027.stn.llnw.net
0.0.0.0 cds308.lcy.llnw.net
0.0.0.0 cds310.lcy.llnw.net
0.0.0.0 cds38.ory.llnw.net
0.0.0.0 cds405.lcy.llnw.net
0.0.0.0 cds406.lcy.llnw.net
0.0.0.0 cds407.fra.llnw.net
0.0.0.0 cds416.lcy.llnw.net
0.0.0.0 cds421.lcy.llnw.net
0.0.0.0 cds422.lcy.llnw.net
0.0.0.0 cds425.lcy.llnw.net
0.0.0.0 cds426.lcy.llnw.net
0.0.0.0 cds447.lcy.llnw.net
0.0.0.0 cds458.lcy.llnw.net
0.0.0.0 cds459.lcy.llnw.net
0.0.0.0 cds461.lcy.llnw.net
0.0.0.0 cds468.lcy.llnw.net
0.0.0.0 cds469.lcy.llnw.net
0.0.0.0 cds471.lcy.llnw.net
0.0.0.0 cds483.lcy.llnw.net
0.0.0.0 cds484.lcy.llnw.net
0.0.0.0 cds489.lcy.llnw.net
0.0.0.0 cds493.lcy.llnw.net
0.0.0.0 cds494.lcy.llnw.net
0.0.0.0 cds54.ory.llnw.net
0.0.0.0 cds812.lon.llnw.net
0.0.0.0 cds815.lon.llnw.net
0.0.0.0 cds818.lon.llnw.net
0.0.0.0 cds832.lon.llnw.net
0.0.0.0 cds836.lon.llnw.net
0.0.0.0 cds840.lon.llnw.net
0.0.0.0 cds843.lon.llnw.net
0.0.0.0 cds857.lon.llnw.net
0.0.0.0 cds868.lon.llnw.net
0.0.0.0 cds869.lon.llnw.net
0.0.0.0 ceip.microsoft.com
0.0.0.0 centergyremote.partners.extranet.microsoft.com
0.0.0.0 certification.drm.microsoft.com
0.0.0.0 certpartner.one.microsoft.com
0.0.0.0 cgl.microsoft.com
0.0.0.0 ch1-cor001.api.p001.1drv.com
0.0.0.0 ch1-cor002.api.p001.1drv.com
0.0.0.0 ch3301-c.1drv.com
0.0.0.0 ch3301-e.1drv.com
0.0.0.0 ch3301-g.1drv.com
0.0.0.0 ch3302-c.1drv.com
0.0.0.0 ch3302-e.1drv.com
0.0.0.0 challenge.eteam.partners.extranet.microsoft.com
0.0.0.0 channels.microsoft.com
0.0.0.0 checkappexec.microsoft.com
0.0.0.0 choice.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 click.email.microsoftonline.com
0.0.0.0 client-office365-tas.msedge.net
0.0.0.0 client-s.gateway.messenger.live.com
0.0.0.0 client.wns.windows.com
0.0.0.0 clientconfig.passport.net
0.0.0.0 cmtypartnertool.partners.extranet.microsoft.com
0.0.0.0 co2.sls.microsoft.com
0.0.0.0 codepremium.msdn.microsoft.com
0.0.0.0 commerce.microsoft.com
0.0.0.0 community.advertising.microsoft.com
0.0.0.0 community.bingads.microsoft.com
0.0.0.0 compaq.windowsmedia.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 compatexchange1.trafficmanager.net
0.0.0.0 config.edge.skype.com
0.0.0.0 config.teams.microsoft.com
0.0.0.0 configurator.microsoft.com
0.0.0.0 connections.members.microsoft.com
0.0.0.0 content.locator.metadata.windowsmedia.com
0.0.0.0 content.microsoftstore.com
0.0.0.0 continuum.dds.microsoft.com
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 corporate.windowsupdate.microsoft.com
0.0.0.0 crl.microsoft.com
0.0.0.0 crystal.partners.extranet.microsoft.com
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 css.one.microsoft.com
0.0.0.0 ctldl.windowsupdate.com
0.0.0.0 cuai-96.microsoft.com
0.0.0.0 cuai97.microsoft.com
0.0.0.0 curah.microsoft.com
0.0.0.0 cust-supp-chat.one.microsoft.com
0.0.0.0 cy2.settings.data.microsoft.com.akadns.net
0.0.0.0 cy2.vortex.data.microsoft.com.akadns.net
0.0.0.0 cyclescentral.directtaps.net
0.0.0.0 dars.msft.net
0.0.0.0 das.microsoft.com
0.0.0.0 data.choice.microsoft.com
0.0.0.0 data.choice.microsoft.com.nsatc.net
0.0.0.0 data.tvdownload.microsoft.com
0.0.0.0 db3aqu.atdmt.com
0.0.0.0 db3wns2011111.wns.windows.com
0.0.0.0 db5-dspcdn.tlu.dl.delivery.mp.microsoft.com
0.0.0.0 db5-eap.settings-win.data.microsoft.com.akadns.net
0.0.0.0 db5.settings-win.data.microsoft.com.akadns.net
0.0.0.0 db5.settings.data.microsoft.com.akadns.net
0.0.0.0 db5.vortex.data.microsoft.com.akadns.net
0.0.0.0 db5.wns.windows.com
0.0.0.0 db5p.wns.notify.windows.com.akadns.net
0.0.0.0 db5p.wns.windows.com
0.0.0.0 db5sch101100122.wns.windows.com
0.0.0.0 db5sch101100127.wns.windows.com
0.0.0.0 db5sch101100831.wns.windows.com
0.0.0.0 db5sch101100835.wns.windows.com
0.0.0.0 db5sch101100917.wns.windows.com
0.0.0.0 db5sch101100925.wns.windows.com
0.0.0.0 db5sch101100928.wns.windows.com
0.0.0.0 db5sch101100938.wns.windows.com
0.0.0.0 db5sch101101001.wns.windows.com
0.0.0.0 db5sch101101022.wns.windows.com
0.0.0.0 db5sch101101024.wns.windows.com
0.0.0.0 db5sch101101031.wns.windows.com
0.0.0.0 db5sch101101034.wns.windows.com
0.0.0.0 db5sch101101042.wns.windows.com
0.0.0.0 db5sch101101044.wns.windows.com
0.0.0.0 db5sch101101122.wns.windows.com
0.0.0.0 db5sch101101123.wns.windows.com
0.0.0.0 db5sch101101125.wns.windows.com
0.0.0.0 db5sch101101128.wns.windows.com
0.0.0.0 db5sch101101129.wns.windows.com
0.0.0.0 db5sch101101133.wns.windows.com
0.0.0.0 db5sch101101145.wns.windows.com
0.0.0.0 db5sch101101209.wns.windows.com
0.0.0.0 db5sch101101221.wns.windows.com
0.0.0.0 db5sch101101228.wns.windows.com
0.0.0.0 db5sch101101231.wns.windows.com
0.0.0.0 db5sch101101237.wns.windows.com
0.0.0.0 db5sch101101317.wns.windows.com
0.0.0.0 db5sch101101324.wns.windows.com
0.0.0.0 db5sch101101329.wns.windows.com
0.0.0.0 db5sch101101333.wns.windows.com
0.0.0.0 db5sch101101334.wns.windows.com
0.0.0.0 db5sch101101338.wns.windows.com
0.0.0.0 db5sch101101419.wns.windows.com
0.0.0.0 db5sch101101424.wns.windows.com
0.0.0.0 db5sch101101426.wns.windows.com
0.0.0.0 db5sch101101427.wns.windows.com
0.0.0.0 db5sch101101430.wns.windows.com
0.0.0.0 db5sch101101445.wns.windows.com
0.0.0.0 db5sch101101511.wns.windows.com
0.0.0.0 db5sch101101519.wns.windows.com
0.0.0.0 db5sch101101529.wns.windows.com
0.0.0.0 db5sch101101535.wns.windows.com
0.0.0.0 db5sch101101541.wns.windows.com
0.0.0.0 db5sch101101543.wns.windows.com
0.0.0.0 db5sch101101608.wns.windows.com
0.0.0.0 db5sch101101618.wns.windows.com
0.0.0.0 db5sch101101629.wns.windows.com
0.0.0.0 db5sch101101631.wns.windows.com
0.0.0.0 db5sch101101633.wns.windows.com
0.0.0.0 db5sch101101640.wns.windows.com
0.0.0.0 db5sch101101711.wns.windows.com
0.0.0.0 db5sch101101722.wns.windows.com
0.0.0.0 db5sch101101739.wns.windows.com
0.0.0.0 db5sch101101745.wns.windows.com
0.0.0.0 db5sch101101813.wns.windows.com
0.0.0.0 db5sch101101820.wns.windows.com
0.0.0.0 db5sch101101826.wns.windows.com
0.0.0.0 db5sch101101828.wns.windows.com
0.0.0.0 db5sch101101835.wns.windows.com
0.0.0.0 db5sch101101837.wns.windows.com
0.0.0.0 db5sch101101844.wns.windows.com
0.0.0.0 db5sch101101902.wns.windows.com
0.0.0.0 db5sch101101907.wns.windows.com
0.0.0.0 db5sch101101910.wns.windows.com
0.0.0.0 db5sch101101914.wns.windows.com
0.0.0.0 db5sch101101929.wns.windows.com
0.0.0.0 db5sch101101939.wns.windows.com
0.0.0.0 db5sch101101941.wns.windows.com
0.0.0.0 db5sch101102015.wns.windows.com
0.0.0.0 db5sch101102017.wns.windows.com
0.0.0.0 db5sch101102019.wns.windows.com
0.0.0.0 db5sch101102023.wns.windows.com
0.0.0.0 db5sch101102025.wns.windows.com
0.0.0.0 db5sch101102032.wns.windows.com
0.0.0.0 db5sch101102033.wns.windows.com
0.0.0.0 db5sch101110108.wns.windows.com
0.0.0.0 db5sch101110109.wns.windows.com
0.0.0.0 db5sch101110114.wns.windows.com
0.0.0.0 db5sch101110135.wns.windows.com
0.0.0.0 db5sch101110142.wns.windows.com
0.0.0.0 db5sch101110204.wns.windows.com
0.0.0.0 db5sch101110206.wns.windows.com
0.0.0.0 db5sch101110214.wns.windows.com
0.0.0.0 db5sch101110225.wns.windows.com
0.0.0.0 db5sch101110232.wns.windows.com
0.0.0.0 db5sch101110245.wns.windows.com
0.0.0.0 db5sch101110315.wns.windows.com
0.0.0.0 db5sch101110323.wns.windows.com
0.0.0.0 db5sch101110325.wns.windows.com
0.0.0.0 db5sch101110328.wns.windows.com
0.0.0.0 db5sch101110331.wns.windows.com
0.0.0.0 db5sch101110341.wns.windows.com
0.0.0.0 db5sch101110343.wns.windows.com
0.0.0.0 db5sch101110345.wns.windows.com
0.0.0.0 db5sch101110403.wns.windows.com
0.0.0.0 db5sch101110408.wns.windows.com
0.0.0.0 db5sch101110419.wns.windows.com
0.0.0.0 db5sch101110428.wns.windows.com
0.0.0.0 db5sch101110435.wns.windows.com
0.0.0.0 db5sch101110438.wns.windows.com
0.0.0.0 db5sch101110442.wns.windows.com
0.0.0.0 db5sch101110501.wns.windows.com
0.0.0.0 db5sch101110510.wns.windows.com
0.0.0.0 db5sch101110518.wns.windows.com
0.0.0.0 db5sch101110527.wns.windows.com
0.0.0.0 db5sch101110533.wns.windows.com
0.0.0.0 db5sch101110618.wns.windows.com
0.0.0.0 db5sch101110621.wns.windows.com
0.0.0.0 db5sch101110622.wns.windows.com
0.0.0.0 db5sch101110624.wns.windows.com
0.0.0.0 db5sch101110626.wns.windows.com
0.0.0.0 db5sch101110634.wns.windows.com
0.0.0.0 db5sch101110705.wns.windows.com
0.0.0.0 db5sch101110713.wns.windows.com
0.0.0.0 db5sch101110724.wns.windows.com
0.0.0.0 db5sch101110729.wns.windows.com
0.0.0.0 db5sch101110740.wns.windows.com
0.0.0.0 db5sch101110810.wns.windows.com
0.0.0.0 db5sch101110816.wns.windows.com
0.0.0.0 db5sch101110821.wns.windows.com
0.0.0.0 db5sch101110822.wns.windows.com
0.0.0.0 db5sch101110825.wns.windows.com
0.0.0.0 db5sch101110828.wns.windows.com
0.0.0.0 db5sch101110829.wns.windows.com
0.0.0.0 db5sch101110831.wns.windows.com
0.0.0.0 db5sch101110835.wns.windows.com
0.0.0.0 db5sch101110919.wns.windows.com
0.0.0.0 db5sch101110921.wns.windows.com
0.0.0.0 db5sch101110923.wns.windows.com
0.0.0.0 db5sch101110929.wns.windows.com
0.0.0.0 db5sch103081814.wns.windows.com
0.0.0.0 db5sch103081913.wns.windows.com
0.0.0.0 db5sch103082011.wns.windows.com
0.0.0.0 db5sch103082111.wns.windows.com
0.0.0.0 db5sch103082308.wns.windows.com
0.0.0.0 db5sch103082406.wns.windows.com
0.0.0.0 db5sch103082409.wns.windows.com
0.0.0.0 db5sch103082609.wns.windows.com
0.0.0.0 db5sch103082611.wns.windows.com
0.0.0.0 db5sch103082709.wns.windows.com
0.0.0.0 db5sch103082712.wns.windows.com
0.0.0.0 db5sch103082806.wns.windows.com
0.0.0.0 db5sch103090115.wns.windows.com
0.0.0.0 db5sch103090210.wns.windows.com
0.0.0.0 db5sch103090414.wns.windows.com
0.0.0.0 db5sch103090415.wns.windows.com
0.0.0.0 db5sch103090513.wns.windows.com
0.0.0.0 db5sch103090515.wns.windows.com
0.0.0.0 db5sch103090608.wns.windows.com
0.0.0.0 db5sch103090806.wns.windows.com
0.0.0.0 db5sch103090814.wns.windows.com
0.0.0.0 db5sch103090906.wns.windows.com
0.0.0.0 db5sch103091011.wns.windows.com
0.0.0.0 db5sch103091012.wns.windows.com
0.0.0.0 db5sch103091106.wns.windows.com
0.0.0.0 db5sch103091108.wns.windows.com
0.0.0.0 db5sch103091212.wns.windows.com
0.0.0.0 db5sch103091311.wns.windows.com
0.0.0.0 db5sch103091313.wns.windows.com
0.0.0.0 db5sch103091414.wns.windows.com
0.0.0.0 db5sch103091511.wns.windows.com
0.0.0.0 db5sch103091609.wns.windows.com
0.0.0.0 db5sch103091617.wns.windows.com
0.0.0.0 db5sch103091715.wns.windows.com
0.0.0.0 db5sch103091817.wns.windows.com
0.0.0.0 db5sch103091908.wns.windows.com
0.0.0.0 db5sch103091911.wns.windows.com
0.0.0.0 db5sch103092010.wns.windows.com
0.0.0.0 db5sch103092108.wns.windows.com
0.0.0.0 db5sch103092109.wns.windows.com
0.0.0.0 db5sch103092209.wns.windows.com
0.0.0.0 db5sch103092210.wns.windows.com
0.0.0.0 db5sch103092509.wns.windows.com
0.0.0.0 db5sch103100117.wns.windows.com
0.0.0.0 db5sch103100121.wns.windows.com
0.0.0.0 db5sch103100221.wns.windows.com
0.0.0.0 db5sch103100313.wns.windows.com
0.0.0.0 db5sch103100314.wns.windows.com
0.0.0.0 db5sch103100412.wns.windows.com
0.0.0.0 db5sch103100510.wns.windows.com
0.0.0.0 db5sch103100511.wns.windows.com
0.0.0.0 db5sch103100611.wns.windows.com
0.0.0.0 db5sch103100712.wns.windows.com
0.0.0.0 db5sch103101105.wns.windows.com
0.0.0.0 db5sch103101208.wns.windows.com
0.0.0.0 db5sch103101212.wns.windows.com
0.0.0.0 db5sch103101314.wns.windows.com
0.0.0.0 db5sch103101411.wns.windows.com
0.0.0.0 db5sch103101413.wns.windows.com
0.0.0.0 db5sch103101513.wns.windows.com
0.0.0.0 db5sch103101610.wns.windows.com
0.0.0.0 db5sch103101611.wns.windows.com
0.0.0.0 db5sch103101705.wns.windows.com
0.0.0.0 db5sch103101711.wns.windows.com
0.0.0.0 db5sch103101813.wns.windows.com
0.0.0.0 db5sch103101909.wns.windows.com
0.0.0.0 db5sch103101914.wns.windows.com
0.0.0.0 db5sch103102009.wns.windows.com
0.0.0.0 db5sch103102112.wns.windows.com
0.0.0.0 db5sch103102203.wns.windows.com
0.0.0.0 db5sch103102209.wns.windows.com
0.0.0.0 db5sch103102310.wns.windows.com
0.0.0.0 db5sch103102404.wns.windows.com
0.0.0.0 db5sch103102410.wns.windows.com
0.0.0.0 db5sch103102516.wns.windows.com
0.0.0.0 db5sch103102609.wns.windows.com
0.0.0.0 db5sch103102610.wns.windows.com
0.0.0.0 db5sch103102710.wns.windows.com
0.0.0.0 db5sch103102711.wns.windows.com
0.0.0.0 db5sch103102805.wns.windows.com
0.0.0.0 db5wns1d.wns.windows.com
0.0.0.0 db6sch102090104.wns.windows.com
0.0.0.0 db6sch102090109.wns.windows.com
0.0.0.0 db6sch102090112.wns.windows.com
0.0.0.0 db6sch102090116.wns.windows.com
0.0.0.0 db6sch102090122.wns.windows.com
0.0.0.0 db6sch102090203.wns.windows.com
0.0.0.0 db6sch102090206.wns.windows.com
0.0.0.0 db6sch102090208.wns.windows.com
0.0.0.0 db6sch102090209.wns.windows.com
0.0.0.0 db6sch102090210.wns.windows.com
0.0.0.0 db6sch102090211.wns.windows.com
0.0.0.0 db6sch102090212.wns.windows.com
0.0.0.0 db6sch102090305.wns.windows.com
0.0.0.0 db6sch102090306.wns.windows.com
0.0.0.0 db6sch102090308.wns.windows.com
0.0.0.0 db6sch102090311.wns.windows.com
0.0.0.0 db6sch102090313.wns.windows.com
0.0.0.0 db6sch102090410.wns.windows.com
0.0.0.0 db6sch102090412.wns.windows.com
0.0.0.0 db6sch102090504.wns.windows.com
0.0.0.0 db6sch102090510.wns.windows.com
0.0.0.0 db6sch102090512.wns.windows.com
0.0.0.0 db6sch102090513.wns.windows.com
0.0.0.0 db6sch102090514.wns.windows.com
0.0.0.0 db6sch102090519.wns.windows.com
0.0.0.0 db6sch102090613.wns.windows.com
0.0.0.0 db6sch102090619.wns.windows.com
0.0.0.0 db6sch102090810.wns.windows.com
0.0.0.0 db6sch102090811.wns.windows.com
0.0.0.0 db6sch102090902.wns.windows.com
0.0.0.0 db6sch102090905.wns.windows.com
0.0.0.0 db6sch102090907.wns.windows.com
0.0.0.0 db6sch102090908.wns.windows.com
0.0.0.0 db6sch102090910.wns.windows.com
0.0.0.0 db6sch102090911.wns.windows.com
0.0.0.0 db6sch102091003.wns.windows.com
0.0.0.0 db6sch102091007.wns.windows.com
0.0.0.0 db6sch102091008.wns.windows.com
0.0.0.0 db6sch102091009.wns.windows.com
0.0.0.0 db6sch102091011.wns.windows.com
0.0.0.0 db6sch102091103.wns.windows.com
0.0.0.0 db6sch102091105.wns.windows.com
0.0.0.0 db6sch102091204.wns.windows.com
0.0.0.0 db6sch102091205.wns.windows.com
0.0.0.0 db6sch102091209.wns.windows.com
0.0.0.0 db6sch102091305.wns.windows.com
0.0.0.0 db6sch102091307.wns.windows.com
0.0.0.0 db6sch102091308.wns.windows.com
0.0.0.0 db6sch102091309.wns.windows.com
0.0.0.0 db6sch102091314.wns.windows.com
0.0.0.0 db6sch102091412.wns.windows.com
0.0.0.0 db6sch102091503.wns.windows.com
0.0.0.0 db6sch102091507.wns.windows.com
0.0.0.0 db6sch102091508.wns.windows.com
0.0.0.0 db6sch102091602.wns.windows.com
0.0.0.0 db6sch102091603.wns.windows.com
0.0.0.0 db6sch102091606.wns.windows.com
0.0.0.0 db6sch102091607.wns.windows.com
0.0.0.0 dcodews.partners.extranet.microsoft.com
0.0.0.0 dcs.ccp.microsoft.com
0.0.0.0 definitionupdates.microsoft.com
0.0.0.0 delivery.pens.microsoft.com
0.0.0.0 delivery.smtp.microsoft.com
0.0.0.0 delivery2.pens.microsoft.com
0.0.0.0 dev.virtualearth.net
0.0.0.0 device.auth.xboxlive.com
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 dgl.microsoft.com
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 directory.microsoft.com
0.0.0.0 directory.netmeeting.microsoft.com
0.0.0.0 directory.partners.extranet.microsoft.com
0.0.0.0 discuss.microsoft.com
0.0.0.0 displaycatalog.mp.microsoft.com
0.0.0.0 dl.delivery.mp.microsoft.com
0.0.0.0 dlbmodigital.microsoft.com
0.0.0.0 dmd.metaservices.microsoft.com
0.0.0.0 dmd.metaservices.microsoft.com.akadns.net
0.0.0.0 dns.msftncsi.com
0.0.0.0 dns2.tk.msft.net
0.0.0.0 dns3.tk.msft.net
0.0.0.0 domains.googlesyndication.com
0.0.0.0 domains.live.com
0.0.0.0 down.saservices.microsoft.com
0.0.0.0 download.microsoft.com
0.0.0.0 download.windowsupdate.com
0.0.0.0 downloadoffice2010.microsoft.com
0.0.0.0 drm.microsoft.com
0.0.0.0 drmlicense.one.microsoft.com
0.0.0.0 ds.download.windowsupdate.com
0.0.0.0 ds.microsoft.com
0.0.0.0 dynamics-crm.pinpoint.microsoft.com
0.0.0.0 e2835.dspb.akamaiedge.net
0.0.0.0 e7341.g.akamaiedge.net
0.0.0.0 e7502.ce.akamaiedge.net
0.0.0.0 e8218.ce.akamaiedge.net
0.0.0.0 ec.atdmt.com
0.0.0.0 ecn.dev.virtualearth.net
0.0.0.0 email.microsoft.com
0.0.0.0 email2.microsoft.com
0.0.0.0 emdl.ws.microsoft.com
0.0.0.0 emea.microsoftstore.com
0.0.0.0 emeaselling.partners.extranet.microsoft.com
0.0.0.0 empower-isv.one.microsoft.com
0.0.0.0 entimg-origin.msn.com
0.0.0.0 eopen.microsoft.com
0.0.0.0 epg.tvdownload.microsoft.com
0.0.0.0 epp.microsoft.com
0.0.0.0 eu-v10.events.data.microsoft.com
0.0.0.0 eu-v20.events.data.microsoft.com
0.0.0.0 eu.microsoft.com
0.0.0.0 eu.vortex-win.data.microsoft.com
0.0.0.0 eu.vortex.data.microsoft.com
0.0.0.0 europe.smartscreen-prod.microsoft.com
0.0.0.0 events.data.microsoft.com
0.0.0.0 events.microsoft.com
0.0.0.0 events.microsoftvirtualacademy.com
0.0.0.0 evoke-windowsservices-tas.msedge.net
0.0.0.0 example.microsoft.com
0.0.0.0 excel.office.live.com
0.0.0.0 extranet.microsoft-int.com
0.0.0.0 extranet.microsoft.com
0.0.0.0 f.email.microsoft.com
0.0.0.0 fai.music.metaservices.microsoft.com
0.0.0.0 familysafety.microsoft.com
0.0.0.0 favorites.live.com
0.0.0.0 fd.bingads.microsoft.com
0.0.0.0 fe1.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 fe2.ws.microsoft.com
0.0.0.0 fe2.ws.microsoft.com.nsatc.net
0.0.0.0 fe2cr.update.microsoft.com
0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net
0.0.0.0 fe3.delivery.mp.microsoft.com
0.0.0.0 fe3cr.delivery.mp.microsoft.com
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 feedback.windows.com
0.0.0.0 feeds.microsoft.com
0.0.0.0 fg.ds.b1.download.windowsupdate.com
0.0.0.0 fg.v4.download.windowsupdate.com
0.0.0.0 finance.services.appex.bing.com
0.0.0.0 fixitcenter.support.microsoft.com
0.0.0.0 flex.msn.com
0.0.0.0 foodanddrink.tile.appex.bing.com
0.0.0.0 forefrontdl.microsoft.com
0.0.0.0 forinstall.linked-bigstyler.com
0.0.0.0 fr-fr.appex-rf.msn.com
0.0.0.0 freebusy.office.microsoft.com
0.0.0.0 fs.microsoft.com
0.0.0.0 fulfilloffer.microsoft.com
0.0.0.0 fullproduct.download.microsoft.com
0.0.0.0 fuse.microsoft.com
0.0.0.0 g.bing.com
0.0.0.0 g.live.com
0.0.0.0 g.microsoft.com
0.0.0.0 g.microsoftonline.com
0.0.0.0 g.msn.com
0.0.0.0 g3.microsoft.com
0.0.0.0 genuine.microsoft.com
0.0.0.0 genuinebeta.microsoft.com
0.0.0.0 geo-prod.do.dsp.mp.microsoft.com
0.0.0.0 geo.settings-win.data.microsoft.com.akadns.net
0.0.0.0 geo.settings.data.microsoft.com.akadns.net
0.0.0.0 geo.vortex.data.microsoft.com.akadns.net
0.0.0.0 geover-prod.do.dsp.mp.microsoft.com
0.0.0.0 glbdns.microsoft.com
0.0.0.0 global.sam.msn.com
0.0.0.0 go.microsoft.akadns.net
0.0.0.0 h1.msn.com
0.0.0.0 h2.msn.com
0.0.0.0 hdshowcase.microsoft.com
0.0.0.0 help.bingads.microsoft.com
0.0.0.0 hk2.settings.data.microsoft.com.akadns.net
0.0.0.0 hk2.wns.windows.com
0.0.0.0 hk2sch130020721.wns.windows.com
0.0.0.0 hk2sch130020723.wns.windows.com
0.0.0.0 hk2sch130020726.wns.windows.com
0.0.0.0 hk2sch130020729.wns.windows.com
0.0.0.0 hk2sch130020732.wns.windows.com
0.0.0.0 hk2sch130020824.wns.windows.com
0.0.0.0 hk2sch130020843.wns.windows.com
0.0.0.0 hk2sch130020851.wns.windows.com
0.0.0.0 hk2sch130020854.wns.windows.com
0.0.0.0 hk2sch130020855.wns.windows.com
0.0.0.0 hk2sch130020924.wns.windows.com
0.0.0.0 hk2sch130020936.wns.windows.com
0.0.0.0 hk2sch130020940.wns.windows.com
0.0.0.0 hk2sch130020956.wns.windows.com
0.0.0.0 hk2sch130020958.wns.windows.com
0.0.0.0 hk2sch130020961.wns.windows.com
0.0.0.0 hk2sch130021017.wns.windows.com
0.0.0.0 hk2sch130021029.wns.windows.com
0.0.0.0 hk2sch130021035.wns.windows.com
0.0.0.0 hk2sch130021137.wns.windows.com
0.0.0.0 hk2sch130021142.wns.windows.com
0.0.0.0 hk2sch130021153.wns.windows.com
0.0.0.0 hk2sch130021217.wns.windows.com
0.0.0.0 hk2sch130021246.wns.windows.com
0.0.0.0 hk2sch130021249.wns.windows.com
0.0.0.0 hk2sch130021260.wns.windows.com
0.0.0.0 hk2sch130021264.wns.windows.com
0.0.0.0 hk2sch130021322.wns.windows.com
0.0.0.0 hk2sch130021323.wns.windows.com
0.0.0.0 hk2sch130021329.wns.windows.com
0.0.0.0 hk2sch130021334.wns.windows.com
0.0.0.0 hk2sch130021360.wns.windows.com
0.0.0.0 hk2sch130021432.wns.windows.com
0.0.0.0 hk2sch130021433.wns.windows.com
0.0.0.0 hk2sch130021435.wns.windows.com
0.0.0.0 hk2sch130021437.wns.windows.com
0.0.0.0 hk2sch130021440.wns.windows.com
0.0.0.0 hk2sch130021450.wns.windows.com
0.0.0.0 hk2sch130021518.wns.windows.com
0.0.0.0 hk2sch130021523.wns.windows.com
0.0.0.0 hk2sch130021526.wns.windows.com
0.0.0.0 hk2sch130021527.wns.windows.com
0.0.0.0 hk2sch130021544.wns.windows.com
0.0.0.0 hk2sch130021554.wns.windows.com
0.0.0.0 hk2sch130021618.wns.windows.com
0.0.0.0 hk2sch130021634.wns.windows.com
0.0.0.0 hk2sch130021638.wns.windows.com
0.0.0.0 hk2sch130021646.wns.windows.com
0.0.0.0 hk2sch130021652.wns.windows.com
0.0.0.0 hk2sch130021654.wns.windows.com
0.0.0.0 hk2sch130021657.wns.windows.com
0.0.0.0 hk2sch130021723.wns.windows.com
0.0.0.0 hk2sch130021726.wns.windows.com
0.0.0.0 hk2sch130021727.wns.windows.com
0.0.0.0 hk2sch130021730.wns.windows.com
0.0.0.0 hk2sch130021731.wns.windows.com
0.0.0.0 hk2sch130021754.wns.windows.com
0.0.0.0 hk2sch130021829.wns.windows.com
0.0.0.0 hk2sch130021830.wns.windows.com
0.0.0.0 hk2sch130021833.wns.windows.com
0.0.0.0 hk2sch130021840.wns.windows.com
0.0.0.0 hk2sch130021842.wns.windows.com
0.0.0.0 hk2sch130021851.wns.windows.com
0.0.0.0 hk2sch130021852.wns.windows.com
0.0.0.0 hk2sch130021927.wns.windows.com
0.0.0.0 hk2sch130021928.wns.windows.com
0.0.0.0 hk2sch130021929.wns.windows.com
0.0.0.0 hk2sch130021958.wns.windows.com
0.0.0.0 hk2sch130022035.wns.windows.com
0.0.0.0 hk2sch130022041.wns.windows.com
0.0.0.0 hk2sch130022049.wns.windows.com
0.0.0.0 hk2sch130022135.wns.windows.com
0.0.0.0 hk2wns1.wns.windows.com
0.0.0.0 hk2wns1b.wns.windows.com
0.0.0.0 holiday.microsoftstore.com
0.0.0.0 home.microsoft.com
0.0.0.0 hostedocsp.globalsign.com
0.0.0.0 hp.windowsmedia.com
0.0.0.0 hs.windows.microsoft.com
0.0.0.0 hup.microsoft.com
0.0.0.0 i-bl6p-cor001.api.p001.1drv.com
0.0.0.0 i-bl6p-cor002.api.p001.1drv.com
0.0.0.0 i-bn3p-cor001.api.p001.1drv.com
0.0.0.0 i-by3p-cor001.api.p001.1drv.com
0.0.0.0 i-by3p-cor002.api.p001.1drv.com
0.0.0.0 i-ch1-cor001.api.p001.1drv.com
0.0.0.0 i-ch1-cor002.api.p001.1drv.com
0.0.0.0 i-sn2-cor001.api.p001.1drv.com
0.0.0.0 i-sn2-cor002.api.p001.1drv.com
0.0.0.0 i-sn3p-cor001.api.p001.1drv.com
0.0.0.0 i.microsoft.com
0.0.0.0 i.msdn.microsoft.com
0.0.0.0 i.office.microsoft.com
0.0.0.0 i.s-microsoft.com
0.0.0.0 i.technet.microsoft.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 i2.microsoft.com
0.0.0.0 i2.msdn.microsoft.com
0.0.0.0 i2.services.social.microsoft.com
0.0.0.0 i2.technet.microsoft.com
0.0.0.0 i3.microsoft.com
0.0.0.0 i3.services.social.microsoft.com
0.0.0.0 i4.services.social.microsoft.com
0.0.0.0 ia.microsoft.com
0.0.0.0 icassp98.microsoft.com
0.0.0.0 ice.microsoft.com
0.0.0.0 icmods.microsoft.com
0.0.0.0 ics.one.microsoft.com
0.0.0.0 ie.components.microsoft.com
0.0.0.0 ie8.msn.com
0.0.0.0 ieak.microsoft.com
0.0.0.0 iecvlist.microsoft.com
0.0.0.0 ieonline.microsoft.com
0.0.0.0 ilabdc.directtaps.net
0.0.0.0 images2.store.microsoft.com
0.0.0.0 img-prod-cms-rt-microsoft-com.akamaized.net
0.0.0.0 img-s-msn-com.akamaized.net
0.0.0.0 img.microsoft.com
0.0.0.0 img.stb.s-msn.com
0.0.0.0 inference.location.live.net
0.0.0.0 info.music.metaservices.microsoft.com
0.0.0.0 insiderservice.microsoft.com
0.0.0.0 invoice.microsoft.com
0.0.0.0 ipv4.login.live.com
0.0.0.0 iso.esd.microsoft.com
0.0.0.0 ispreferral.microsoft.com
0.0.0.0 isvmex.team.partners.extranet.microsoft.com
0.0.0.0 iwsolve.partners.extranet.microsoft.com
0.0.0.0 jdp.microsoft.com
0.0.0.0 js.microsoft.com
0.0.0.0 kcenter.partners.extranet.microsoft.com
0.0.0.0 lb1.www.ms.akadns.net
0.0.0.0 learningcenter.partners.extranet.microsoft.com
0.0.0.0 lg.home.microsoft.com
0.0.0.0 li581-132.members.linode.com
0.0.0.0 licensecode.one.microsoft.com
0.0.0.0 licenseserver.windowsmedia.com
0.0.0.0 licensing.microsoft.com
0.0.0.0 licensing.mp.microsoft.com
0.0.0.0 live.rads.msn.com
0.0.0.0 lobby.microsoftstore.com
0.0.0.0 location-inference-westus.cloudapp.net
0.0.0.0 locator.metadata.windowsmedia.com
0.0.0.0 login.domains.live.com
0.0.0.0 login.live.com
0.0.0.0 login.microsoftonline.com
0.0.0.0 login.msa.akadns6.net
0.0.0.0 logincdn.msauth.net
0.0.0.0 lync.microsoft.com
0.0.0.0 lynconline.pinpoint.microsoft.com
0.0.0.0 m.adnxs.com
0.0.0.0 m.hotmail.com
0.0.0.0 m.microsoft.com
0.0.0.0 m.microsoftstore.com
0.0.0.0 mac2.microsoft.com
0.0.0.0 mail3.microsoft.com
0.0.0.0 mail3.mssupport.microsoft.com
0.0.0.0 manage.devcenter.microsoft.com
0.0.0.0 maps.microsoft.com
0.0.0.0 maps.windows.com
0.0.0.0 marketing.microsoft.com
0.0.0.0 mbs.microsoft.com
0.0.0.0 mc1.maps.live.com
0.0.0.0 mcp.microsoft.com
0.0.0.0 mcsp.microsoft.com
0.0.0.0 mcspreferral.microsoft.com
0.0.0.0 mediadl.microsoft.com
0.0.0.0 mediaredirect.microsoft.com
0.0.0.0 medtronics.team.partners.extranet.microsoft.com
0.0.0.0 membercenter.office.microsoft.com
0.0.0.0 members.microsoft.com
0.0.0.0 memberstest2.microsoft.com
0.0.0.0 mert.microsoft.com
0.0.0.0 messaging.office.microsoft.com
0.0.0.0 messenger.live.com
0.0.0.0 messenger.microsoft.com
0.0.0.0 metadata.windowsmedia.com
0.0.0.0 metaservices.microsoft.com
0.0.0.0 metaservices.windowsmedia.com
0.0.0.0 mgn.microsoft.com
0.0.0.0 microsoft-careers.com
0.0.0.0 microsoft-int.com
0.0.0.0 microsoft.software.net
0.0.0.0 microsoftelearning.com
0.0.0.0 microsoftlawportal.net
0.0.0.0 microsoftlicense.com
0.0.0.0 microsoftlicensereview.com
0.0.0.0 microsoftonline.com
0.0.0.0 microsoftportal.net
0.0.0.0 microsoftstore.com
0.0.0.0 microsoftstore.it
0.0.0.0 microsoftstore.me
0.0.0.0 microsofttouch.fr
0.0.0.0 microsoftupdate.com
0.0.0.0 microsoftupdate.microsoft.com
0.0.0.0 microsoftupdates.eu
0.0.0.0 microsoftvolumelicensing.com
0.0.0.0 mla.microsoft.com
0.0.0.0 mobile.events.data.microsoft.com
0.0.0.0 mobile.pipe.aria.microsoft.com
0.0.0.0 mobileconfig.net
0.0.0.0 mocl.one.microsoft.com
0.0.0.0 modern.watson.data.microsoft.com.akadns.net
0.0.0.0 moet.microsoft.com
0.0.0.0 movie.metadata.windowsmedia.com
0.0.0.0 mpa.one.microsoft.com
0.0.0.0 mpan.microsoft.com
0.0.0.0 mpanbeta.microsoft.com
0.0.0.0 mppe.partners.extranet.microsoft.com
0.0.0.0 mrodevicemgr.officeapps.live.com
0.0.0.0 ms.a.microsoft.com
0.0.0.0 msa.one.microsoft.com
0.0.0.0 msagfx.live.com
0.0.0.0 mscrl.microsoft.com
0.0.0.0 msdl.microsoft.com
0.0.0.0 msdn.one.microsoft.com
0.0.0.0 msdnisv.microsoft.com
0.0.0.0 msedge.net
0.0.0.0 msevents-as.microsoft.com
0.0.0.0 msevents-eu.microsoft.com
0.0.0.0 msevents.microsoft.com
0.0.0.0 mseventsppe.microsoft.com
0.0.0.0 msftncsi.com
0.0.0.0 msftopenus.partners.extranet.microsoft.com
0.0.0.0 mshome.net
0.0.0.0 msnbot-65-55-108-23.search.msn.com
0.0.0.0 msnews.microsoft.com
0.0.0.0 msntest.serving-sys.com
0.0.0.0 msops.microsoft.com
0.0.0.0 mspartner.microsoft.com
0.0.0.0 mspress.microsoft.com
0.0.0.0 msrcmt.research.microsoft.com
0.0.0.0 mt.saservices.microsoft.com
0.0.0.0 mtcppoc.directtaps.net
0.0.0.0 murl.microsoft.com
0.0.0.0 music.metaservices.microsoft.com
0.0.0.0 music.submissions.metaservices.microsoft.com
0.0.0.0 mvp.microsoft.com
0.0.0.0 mvp.support.microsoft.com
0.0.0.0 mvp.support.ppe.microsoft.com
0.0.0.0 mymfe.microsoft.com
0.0.0.0 mywindowsmobile.co.uk
0.0.0.0 mywindowsmobile.com
0.0.0.0 mywindowsmobile.de
0.0.0.0 na.msdn.microsoft.com
0.0.0.0 nav.smartscreen.microsoft.com
0.0.0.0 ncsi.glbdns.microsoft.com
0.0.0.0 netc.members.microsoft.com
0.0.0.0 netmeeting.microsoft.com
0.0.0.0 netscan.research.microsoft.com
0.0.0.0 netservforextranet.microsoft.com
0.0.0.0 newsletters.microsoft.com
0.0.0.0 next-services.apps.microsoft.com
0.0.0.0 nexus.officeapps.live.com
0.0.0.0 nexusrules.officeapps.live.com
0.0.0.0 ns.microsoft.com
0.0.0.0 ntservicepack.microsoft.com
0.0.0.0 nz.partners.retail.microsoft.com
0.0.0.0 nz.xbox.partners.retail.microsoft.com
0.0.0.0 o15.officeredir.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 ocos-office365-s2s.msedge.net
0.0.0.0 odc.officeapps.live.com
0.0.0.0 office.live.com
0.0.0.0 office.microsoft.com
0.0.0.0 office2010.microsoft.com
0.0.0.0 office365.microsoft.com
0.0.0.0 office365.pinpoint.microsoft.com
0.0.0.0 officebeta.microsoft.com
0.0.0.0 officecdn.microsoft.com
0.0.0.0 officecdn.microsoft.com.edgesuite.net
0.0.0.0 officeclient.microsoft.com
0.0.0.0 officeimages.microsoft.com
0.0.0.0 officeint.microsoft.com
0.0.0.0 officelive.microsoft.com
0.0.0.0 officeoffer.one.microsoft.com
0.0.0.0 officeredir.microsoft.com
0.0.0.0 officesas.microsoft.com
0.0.0.0 officeupdate.microsoft.com
0.0.0.0 om.one.microsoft.com
0.0.0.0 oms.one.microsoft.com
0.0.0.0 oms2.one.microsoft.com
0.0.0.0 onboarding.data.tvdownload.microsoft.com
0.0.0.0 onboarding.epg.tvdownload.microsoft.com
0.0.0.0 one.microsoft.com
0.0.0.0 oneclient.sfx.ms
0.0.0.0 onecollector.cloudapp.aria.akadns.net
0.0.0.0 onedrive.live.com
0.0.0.0 onlinehelp.microsoft.com
0.0.0.0 onlinestores.metaservices.microsoft.com
0.0.0.0 origin-codecs.microsoft.com
0.0.0.0 origin-images.windowsmedia.com
0.0.0.0 osl.microsoft.com
0.0.0.0 outlook.live.com
0.0.0.0 otf.msn.com
0.0.0.0 outlook.microsoft.com
0.0.0.0 outlook.office365.com
0.0.0.0 p.email.microsoft.com
0.0.0.0 partner.microsoft.com
0.0.0.0 partnerconnect.microsoft.com
0.0.0.0 partnering.one.microsoft.com
0.0.0.0 partners.extranet.microsoft-int.com
0.0.0.0 partners.extranet.microsoft.com
0.0.0.0 partners.microsoft.com
0.0.0.0 partners.retail.microsoft.com
0.0.0.0 partners.sts.microsoft.com
0.0.0.0 partnerstraining.microsoft.com
0.0.0.0 partnersupport.microsoft.com
0.0.0.0 pens.microsoft.com
0.0.0.0 personaluselicense.windows.com
0.0.0.0 phishingfilter.microsoft.com
0.0.0.0 phoenixbillingtest.partners.extranet.microsoft-int.com
0.0.0.0 phones.microsoftstore.com
0.0.0.0 pilot.premier.microsoft.com
0.0.0.0 pingdom.com
0.0.0.0 pinpoint.microsoft-ppe.com
0.0.0.0 pinpoint.microsoft.com
0.0.0.0 planningservices.partners.extranet.microsoft.com
0.0.0.0 portal.microsoftonline.com
0.0.0.0 powerapps.microsoft.com
0.0.0.0 powerplatform.microsoft.com
0.0.0.0 powerpoint.office.live.com
0.0.0.0 ppe.microsoft.com
0.0.0.0 pre.footprintpredict.com
0.0.0.0 premier.microsoft.com
0.0.0.0 premierdownload.microsoft.com
0.0.0.0 premieritaly.eteam.partners.extranet.microsoft.com
0.0.0.0 preview.data.tvdownload.microsoft.com
0.0.0.0 preview.info.music.metaservices.microsoft.com
0.0.0.0 preview.msn.com
0.0.0.0 preview.music.submissions.metaservices.microsoft.com
0.0.0.0 preview.services.wmdrm.windowsmedia.com
0.0.0.0 preview.serviceswitching.metadata.windowsmedia.com
0.0.0.0 preview.vcs.metaservices.microsoft.com
0.0.0.0 preview.video.metaservices.microsoft.com
0.0.0.0 preview.windows.com
0.0.0.0 previewa.locator.metadata.windowsmedia.com
0.0.0.0 previewa.movie.metadata.windowsmedia.com
0.0.0.0 pricelist.skype.com
0.0.0.0 privacy.microsoft.com
0.0.0.0 privatenews.microsoft.com
0.0.0.0 prodreg.microsoft.com
0.0.0.0 productstudio.partners.extranet.microsoft.com
0.0.0.0 profile.live.com
0.0.0.0 profile.microsoft.com
0.0.0.0 profileppe.microsoft.com
0.0.0.0 profiletest2.microsoft.com
0.0.0.0 protect.microsoft.com
0.0.0.0 pti.store.microsoft.com
0.0.0.0 purchase.mp.microsoft.com
0.0.0.0 quarantine.messaging.microsoft.com
0.0.0.0 query.prod.cms.rt.microsoft.com
0.0.0.0 r.email.microsoft.com
0.0.0.0 r.office.microsoft.com
0.0.0.0 r.officeint.microsoft.com
0.0.0.0 r20swj13mr.microsoft.com
0.0.0.0 ra.microsoft.com
0.0.0.0 rad.live.com
0.0.0.0 rad.microsoft.com
0.0.0.0 rad.msn.com
0.0.0.0 ragnarok.msft.net
0.0.0.0 rbeta2.officebeta.microsoft.com
0.0.0.0 rdns1.msft.net
0.0.0.0 rdns2.msft.net
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 redir.windows.microsoft.com
0.0.0.0 redir.windowsmedia.com
0.0.0.0 redmond3.download.microsoft.com
0.0.0.0 register.cdpcs.microsoft.com
0.0.0.0 register.microsoft.com
0.0.0.0 register.one.microsoft.com
0.0.0.0 registermsdn.one.microsoft.com
0.0.0.0 reply.microsoft.com
0.0.0.0 reports.membercenter.office.microsoft.com
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 resourcelink.mspress.microsoft.com
0.0.0.0 resources.whymicrosoft.com
0.0.0.0 retail.microsoft.com
0.0.0.0 ris.api.iris.microsoft.com
0.0.0.0 rs.update.microsoft.com
0.0.0.0 rs.windowsupdate.microsoft.com
0.0.0.0 rss.servicehealth.microsoftonline.com
0.0.0.0 rssgov.windows.microsoft.com
0.0.0.0 rtc.webresponse.one.microsoft.com
0.0.0.0 rto.microsoft.com
0.0.0.0 s.gateway.messenger.live.com
0.0.0.0 s.microsoft.com
0.0.0.0 s0.2mdn.net
0.0.0.0 s2s.config.skype.com
0.0.0.0 sa.windows.com
0.0.0.0 saservices.microsoft.com
0.0.0.0 sba.microsoft.com
0.0.0.0 sc.imp.live.com
0.0.0.0 schemas.microsoft.akadns.net
0.0.0.0 se.windows.com
0.0.0.0 search-ppe.microsoft.com
0.0.0.0 search.msn.com
0.0.0.0 search.officeupdate.microsoft.com
0.0.0.0 searchorigin4.microsoft.com
0.0.0.0 searchservice.support.microsoft.com
0.0.0.0 searchservice32.support.microsoft.com
0.0.0.0 secure.adnxs.com
0.0.0.0 secure.download.windowsupdate.com
0.0.0.0 secure.flashtalking.com
0.0.0.0 self.events.data.microsoft.com
0.0.0.0 service.weather.microsoft.com
0.0.0.0 services.apps.microsoft.com
0.0.0.0 services.learningbeta.microsoft.com
0.0.0.0 services.social.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 services.windowsmedia.com
0.0.0.0 services.wmdrm.windowsmedia.com
0.0.0.0 services1.windowsmedia.com
0.0.0.0 serviceswitching.metadata.windowsmedia.com
0.0.0.0 serviceswitching.metaservices.microsoft.com
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 settings-ssl.xboxlive.com
0.0.0.0 settings-win-ppe.data.microsoft.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 settings.data.glbdns2.microsoft.com
0.0.0.0 settings.data.microsoft.com
0.0.0.0 settings.messenger.live.com
0.0.0.0 sfdataservice.microsoft.com
0.0.0.0 sg2p.wns.windows.com
0.0.0.0 share.microsoft.com
0.0.0.0 sharepoint.microsoft.com
0.0.0.0 shell.windows.com
0.0.0.0 shopformusic.microsoft.com
0.0.0.0 sipfed.microsoft.com
0.0.0.0 skydrive.wns.windows.com
0.0.0.0 skydrivesync.policies.live.net
0.0.0.0 slg.msgamedev.com
0.0.0.0 sls.microsoft.com
0.0.0.0 sls.update.microsoft.com
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 slscr.update.microsoft.com
0.0.0.0 smallbusiness.support.microsoft.com
0.0.0.0 smtp.microsoft.com
0.0.0.0 sn3301-c.1drv.com
0.0.0.0 sn3301-e.1drv.com
0.0.0.0 sn3301-g.1drv.com
0.0.0.0 snackbox.microsoft.com
0.0.0.0 sO.2mdn.net
0.0.0.0 solutionfinder.microsoft.com
0.0.0.0 solutionfinderbeta.microsoft.com
0.0.0.0 solutionmarketplace.partners.extranet.microsoft.com
0.0.0.0 solutionprofiler.microsoft.com
0.0.0.0 solutionprofilerbeta.microsoft.com
0.0.0.0 spar.msteams.com
0.0.0.0 specserver.microsoft.com
0.0.0.0 spo-ring.msedge.net
0.0.0.0 spynet.microsoft.com
0.0.0.0 spynet2.microsoft.com
0.0.0.0 spynetalt.microsoft.com
0.0.0.0 spyneteurope.microsoft.akadns.net
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 sqm.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 sqmtest.microsoft.com
0.0.0.0 srd.ds.microsoft.com
0.0.0.0 ssw.live.com
0.0.0.0 staging.services.wmdrm.windowsmedia.com
0.0.0.0 static.2mdn.net
0.0.0.0 statics-marketingsites-eus-ms-com.akamaized.net
0.0.0.0 statics-uhf-eus.akamaized.net
0.0.0.0 statics-uhf-wus.akamaized.net
0.0.0.0 stats.microsoft.com
0.0.0.0 stats.update.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 storage.live.com
0.0.0.0 store-images.microsoft.com
0.0.0.0 store-images.s-microsoft.com
0.0.0.0 store.microsoft.com
0.0.0.0 storecatalogrevocation.storequality.microsoft.com
0.0.0.0 storeedgefd.dsx.mp.microsoft.com
0.0.0.0 sts.microsoft.com
0.0.0.0 submissions.metaservices.microsoft.com
0.0.0.0 subscriptions.downloads.msdn.microsoft.com
0.0.0.0 subscriptions.downloads.technet.microsoft.com
0.0.0.0 support.microsoft.com
0.0.0.0 support.ppe.microsoft.com
0.0.0.0 support.tie.microsoft.com
0.0.0.0 supportorigin3.microsoft.com
0.0.0.0 surface.microsoftstore.com
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 svcs.microsoft.com
0.0.0.0 sxp.microsoft.com
0.0.0.0 sysdev.microsoft.com
0.0.0.0 systemcenter.pinpoint.microsoft.com
0.0.0.0 t.urs.microsoft.com
0.0.0.0 t0.ssl.ak.dynamic.tiles.virtualearth.net
0.0.0.0 t0.ssl.ak.tiles.virtualearth.net
0.0.0.0 tag.microsoft.com
0.0.0.0 tele.trafficmanager.net
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 telemetry.microsoft.com
0.0.0.0 telemetry.remoteapp.windowsazure.com
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 telesales360.partners.extranet.microsoft.com
0.0.0.0 teredo.ipv6.microsoft.com
0.0.0.0 test.activity.windows.com
0.0.0.0 test.newsletters.microsoft.com
0.0.0.0 test.uddi.microsoft.com
0.0.0.0 test.update.microsoft.com
0.0.0.0 testservices.windowsmedia.com
0.0.0.0 tide004.microsoft.com
0.0.0.0 tide005.microsoft.com
0.0.0.0 tide134.microsoft.com
0.0.0.0 tide137.microsoft.com
0.0.0.0 tide143.microsoft.com
0.0.0.0 tide42.microsoft.com
0.0.0.0 tie.microsoft.com
0.0.0.0 tile-service.weather.microsoft.com
0.0.0.0 time.windows.com
0.0.0.0 tk.downloads.microsoft.com
0.0.0.0 tk2.plt.msn.com
0.0.0.0 tkbpnbip01.one.microsoft.com
0.0.0.0 tkxtbip01.one.microsoft.com
0.0.0.0 tkxtbip02.one.microsoft.com
0.0.0.0 tkxtbip03.one.microsoft.com
0.0.0.0 tkxtbip04.one.microsoft.com
0.0.0.0 tkxtbip05.one.microsoft.com
0.0.0.0 tkxtbip06.one.microsoft.com
0.0.0.0 tkxtbip07.one.microsoft.com
0.0.0.0 tlu.dl.delivery.mp.microsoft.com
0.0.0.0 toc.music.metaservices.microsoft.com
0.0.0.0 training.partner.microsoft.com
0.0.0.0 training.retail.microsoft.com
0.0.0.0 transfer.microsoft.com
0.0.0.0 transfers.ds.microsoft.com
0.0.0.0 transfers.one.microsoft.com
0.0.0.0 trial.trymicrosoftoffice.com
0.0.0.0 tripoli.microsoft.com
0.0.0.0 trymicrosoftoffice.com
0.0.0.0 tsfe.trafficshaping.dsp.mp.microsoft.com
0.0.0.0 tv.metadata.windowsmedia.com
0.0.0.0 uat.mywindowsmobile.de
0.0.0.0 uat.startwindowsmobile.com
0.0.0.0 uatpremier.microsoft.com
0.0.0.0 uddi.microsoft.com
0.0.0.0 uddiv3.microsoft.com
0.0.0.0 uhf.microsoft.com
0.0.0.0 ui.skype.com
0.0.0.0 umwatsonc.events.data.microsoft.com
0.0.0.0 update.microsoft.com
0.0.0.0 urs.microsoft.com
0.0.0.0 urs.smartscreen.microsoft.com
0.0.0.0 us-v10.events.data.microsoft.com
0.0.0.0 us-v20.events.data.microsoft.com
0.0.0.0 us.vortex-win.data.microsoft.com
0.0.0.0 us1.trymicrosoftoffice.com
0.0.0.0 us20.trymicrosoftoffice.com
0.0.0.0 v10-win.vortex.data.microsoft.com.akadns.net
0.0.0.0 v10.events.data.microsoft.com
0.0.0.0 v10.vortex-win.data.microsoft.com
0.0.0.0 v10c.events.data.microsoft.com
0.0.0.0 v20.events.data.microsoft.com
0.0.0.0 v20.vortex-win.data.microsoft.com
0.0.0.0 v4-ori.windowsupdate.microsoft.com
0.0.0.0 v4.download.windowsupdate.com
0.0.0.0 v4.windowsupdate.microsoft.com
0.0.0.0 v5.windowsupdate.microsoft.com
0.0.0.0 v5stats.windowsupdate.microsoft.com
0.0.0.0 validation-v2.sls.microsoft.com
0.0.0.0 validation.sls.microsoft.com
0.0.0.0 vcs.metaservices.microsoft.com
0.0.0.0 version.hybrid.api.here.com
0.0.0.0 video.metaservices.microsoft.com
0.0.0.0 view.atdmt.com
0.0.0.0 view.email.microsoftonline.com
0.0.0.0 view.officeapps.live.com
0.0.0.0 virtualchat.support.microsoft.com
0.0.0.0 vistatechbeta.microsoft.com
0.0.0.0 visualstudiogallery.msdn.microsoft.com
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 vortex-win-sandbox.data.microsoft.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 vortex.data.glbdns2.microsoft.com
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 w.apprep.smartscreen.microsoft.com
0.0.0.0 wallet.microsoft.com
0.0.0.0 watson.live.com
0.0.0.0 watson.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 wb01.nz.partners.retail.microsoft.com
0.0.0.0 wb01.nz.xbox.partners.retail.microsoft.com
0.0.0.0 wb02.nz.partners.retail.microsoft.com
0.0.0.0 wb02.nz.xbox.partners.retail.microsoft.com
0.0.0.0 wdcp.microsoft.com
0.0.0.0 wdcpalt.microsoft.com
0.0.0.0 web-ngram.research.microsoft.com
0.0.0.0 web.esd.microsoft.com
0.0.0.0 web.vortex.data.microsoft.com
0.0.0.0 webevents.microsoft.com
0.0.0.0 webfolders.metaservices.microsoft.com
0.0.0.0 webnews.microsoft.com
0.0.0.0 webresponse.one.microsoft.com
0.0.0.0 wer.microsoft.com
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 wfp.microsoft.com
0.0.0.0 wfp.vistatechbeta.microsoft.com
0.0.0.0 whidbey.msdn.microsoft.com
0.0.0.0 win10-trt.msedge.net
0.0.0.0 win10.ipv6.microsoft.com
0.0.0.0 win1710.ipv6.microsoft.com
0.0.0.0 win8.ipv6.microsoft.com
0.0.0.0 windowsbetatest.rte.microsoft.com
0.0.0.0 windowslive.com
0.0.0.0 windowslive.es.msn.com
0.0.0.0 windowslive.jp.msn.com
0.0.0.0 windowslive.msn.com
0.0.0.0 windowslivegadgets.com
0.0.0.0 windowslivehelp.com
0.0.0.0 windowsmarketplace.com
0.0.0.0 windowsmedia.microsoft.com
0.0.0.0 windowsmedia1.com
0.0.0.0 windowsmediaguide.com
0.0.0.0 windowsonecare.com
0.0.0.0 windowsonecarelive.com
0.0.0.0 windowssdk.msdn.microsoft.com
0.0.0.0 windowsserverfeedback.com
0.0.0.0 windowsupdate.com
0.0.0.0 windowsupdate.microsoft.com
0.0.0.0 winfo.microsoft.com
0.0.0.0 winfx.msdn.microsoft.com
0.0.0.0 winqual.microsoft.com
0.0.0.0 winse.microsoft.com
0.0.0.0 wm.microsoft.com
0.0.0.0 wmdrm.windowsmedia.com
0.0.0.0 word.office.live.com
0.0.0.0 workspace.office.live.com
0.0.0.0 wpa.one.microsoft.com
0.0.0.0 ws03sp1.update.microsoft.com
0.0.0.0 wscont.apps.microsoft.com
0.0.0.0 wscont.apps.microsoft.com.edgesuite.net
0.0.0.0 wscont1.apps.microsoft.com
0.0.0.0 wscont2.apps.microsoft.com
0.0.0.0 wsus.ds.download.windowsupdate.com
0.0.0.0 wu-ori.microsoft.com
0.0.0.0 wustat.windows.com
0.0.0.0 wustats.microsoft.com
0.0.0.0 wutrack.windows.com
0.0.0.0 wwetrain.microsoft.com
0.0.0.0 wwevents.microsoft.com
0.0.0.0 wweventstest.one.microsoft.com
0.0.0.0 www.betaone.partners.extranet.microsoft.com
0.0.0.0 www.billing.microsoft.com
0.0.0.0 www.commerce.microsoft.com
0.0.0.0 www.domains.live.com
0.0.0.0 www.download.windowsupdate.com
0.0.0.0 www.email.microsoft.com
0.0.0.0 www.empresas.microsoft.com
0.0.0.0 www.eu.microsoft.com
0.0.0.0 www.favorites.live.com
0.0.0.0 www.go.microsoft.akadns.net
0.0.0.0 www.licencje-microsoft.pl
0.0.0.0 www.licencjemicrosoft.eu
0.0.0.0 www.mar.partners.extranet.microsoft.com
0.0.0.0 www.microsoft-certification.co.uk
0.0.0.0 www.microsoft-int.com
0.0.0.0 www.microsoft-office.fr
0.0.0.0 www.microsoftadvertising.com
0.0.0.0 www.microsoftbusinesshub.com
0.0.0.0 www.microsoftcloudpartner.com
0.0.0.0 www.microsoftelearning.com
0.0.0.0 www.microsoftfrontpage.com
0.0.0.0 www.microsoftlicense.com
0.0.0.0 www.microsoftoffice365now.com
0.0.0.0 www.microsoftonline.com
0.0.0.0 www.microsoftstore.com
0.0.0.0 www.microsoftstore.com.cn
0.0.0.0 www.microsoftstore.it
0.0.0.0 www.microsoftupdate.com
0.0.0.0 www.microsoftvolumelicensing.com
0.0.0.0 www.msedge.net
0.0.0.0 www.msevents.microsoft.com
0.0.0.0 www.msftconnecttest.com
0.0.0.0 www.msftncsi.com
0.0.0.0 www.msgamedev.com
0.0.0.0 www.mshome.net
0.0.0.0 www.msnusers.com
0.0.0.0 www.msus.windowsupdate.com
0.0.0.0 www.office.microsoft.com
0.0.0.0 www.officesas.microsoft.com
0.0.0.0 www.officeupdate.microsoft.com
0.0.0.0 www.partners.extranet.microsoft.com
0.0.0.0 www.pmi.microsoft.com
0.0.0.0 www.trymicrosoftoffice.com
0.0.0.0 www.update.microsoft.com
0.0.0.0 www.windowslive.com
0.0.0.0 www.windowslive.de
0.0.0.0 www.windowslive.fr
0.0.0.0 www.windowslive.nl
0.0.0.0 www.windowslivehelp.com
0.0.0.0 www.windowsmarketplace.com
0.0.0.0 www.windowsmedia.microsoft.com
0.0.0.0 www.windowsmedia1.com
0.0.0.0 www.windowsmediacenter.com
0.0.0.0 www.windowsonecare.com
0.0.0.0 www.windowsphone.live.com
0.0.0.0 www.windowssearch.com
0.0.0.0 www.windowsupdate.com
0.0.0.0 www.windowsupdate.microsoft.com
0.0.0.0 www2.buyoffice.microsoft.com
0.0.0.0 www20.buyoffice.microsoft.com
0.0.0.0 www20.downloadoffice2010.microsoft.com
0.0.0.0 www7.buyoffice.microsoft.com
0.0.0.0 www7.downloadoffice2010.microsoft.com
0.0.0.0 wwwbeta.microsoft.com
0.0.0.0 wwwppe.microsoft.com
0.0.0.0 wxpsp2.windowsupdate.microsoft.com
0.0.0.0 x.urs.microsoft.com
0.0.0.0 xbox.microsoftstore.com
0.0.0.0 xbox.retail.microsoft.com
0.0.0.0 xml.login.live.com
0.0.0.0 xpsp1.microsoft.com
0.0.0.0 yannerwan8.spaces.live.com
------End cut & paste here------



Back 2 Top

E10BLOK.CMD = Batch Command (CMD) file

@ECHO OFF
IF NOT "%OS%"=="Windows_NT" GOTO END

:: 
::  MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016 
:: 
:: Must see 10_BLOCK.TXT (included) for guidelines!
:: http://www.mdgx.com/10BLK/10_BLOCK.php
:: Or:
:: http://www.mdgx.com/10BLK/10_BLOCK.TXT

COLOR 17

ECHO.
ECHO. 
ECHO.  Wait! This will take a while... 
ECHO. 
ECHO.

:: 
:: Run all 10_BLOCK.* files (.CMD + .EXE) as Administrator:
:: 

IF NOT EXIST "%TEMP%\10_BLOCK.CMD" GOTO ADMt
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMt
IF NOT EXIST "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" GOTO ADMp
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMp
IF NOT EXIST "%USERPROFILE%\Downloads\10_BLOCK.CMD" GOTO ADMu
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1
:ADMu

:: 
:: Verify if logged on user is Administrator:
:: 

:: %windir%\SYSTEM32\openfiles.exe 1 >NUL 2>&1
:: IF NOT %errorlevel% equ 0 (
:: ECHO You are not logged in as Administrator!
:: ECHO You MUST: Open Explorer -> right-click this file -> Run as Administrator.
:: PAUSE
:: EXIT 1
:: ) else (
SETLOCAL

:: User Account Control (UAC) check + Auto-Elevate Permissions 2 Admin level
:: Check for permissions...
>NUL 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"
:: If error flag already set we do not have admin. :-(
IF '%errorlevel%' NEQ '0' (
ECHO:
ECHO Requesting Administrative Privileges...
ECHO When UAC prompt opens press YES to Continue
ECHO:
GOTO UACPrompt
) else (GOTO gotAdmin)
:UACPrompt
ECHO SET UAC=CreateObject^("Shell.Application"^)>"%temp%\GetAdm!.vbs"
ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%temp%\GetAdm!.vbs"
"%temp%\GetAdm!.vbs"
EXIT /B
:gotAdmin
IF EXIST "%temp%\GetAdm!.vbs" (DEL "%temp%\GetAdm!.vbs")
PUSHD "%CD%"
CD /D "%~dp0"

:: 
:: Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
:: 

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO NT0
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO NT0
:: Disable Diagnostics Tracking (DiagTrack) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagtrack
%windir%\SYSTEM32\SC.EXE config diagtrack START= disabled
:: Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagnosticshub.standardcollector.service
%windir%\SYSTEM32\SC.EXE config diagnosticshub.standardcollector.service START= disabled
:: Disable WAP Push Message Routing (DmWAPPush) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP dmwappushservice
%windir%\SYSTEM32\SC.EXE config dmwappushservice START= disabled
:: Disable Retail Demo (RetailDemo) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RetailDemo
%windir%\SYSTEM32\SC.EXE config RetailDemo START= disabled
:: Disable Windows Event Collector (WECSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP Wecsvc
%windir%\SYSTEM32\SC.EXE CONFIG Wecsvc START= disabled
:: Disable Remote Registry (RemoteRegistry) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RemoteRegistry
%windir%\SYSTEM32\SC.EXE CONFIG RemoteRegistry START= disabled
:: Disable One Drive (OneSyncSvc) service:
ECHO Y|%windir%\SYSTEM32\NET.EXE STOP OneSyncSvc
%windir%\SYSTEM32\SC.EXE CONFIG OneSyncSvc START= disabled
%windir%\SYSTEM32\REG.EXE add"HKLM\SYSTEM\CurrentControlSet\Services\OneSyncSvc_Session1" /v "Start" /t REG_DWORD /d 4 /f >NUL 2>&1
:NT0
ECHO "" > %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl
ECHO Y|%windir%\SYSTEM32\CACLS.EXE %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl /d SYSTEM
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "AutoLogger-Diagtrack-Listener" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "SQMLogger" /f >NUL 2>&1
:: Disable automatic/pushed (without permission) installation + display of ads/suggested apps from Start menu:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenOverlayEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" policies:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable WiFi Sense, AutoUpdate, Defender SpyNet, Office + Diagnostics logging + reporting:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseCredShared" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseOpen" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "IncludeRecommendedUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "EnableFeaturedSoftware" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SpyNetReporting" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy" /v "EnableQueryRemoteServer" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "Disable Performance Counters" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Remove spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" folders from My PC:
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f >NUL 2>&1
:: Disable Automatic Computer Maintenance tasks:
:: http://www.winaero.com/blog/disable-computer-maintenance-windows-10/
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\ScheduledDiagnostics" /v "EnabledExecution" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Edge (Spartan) web browser ads:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxCacheTtl" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxNegativeCacheTtl" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Enable Advanced Explorer View tweaks:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable Advanced Explorer View automatic/pushed (without permission) of ads/suggested apps:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Windows Update P2P:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Disable Cortana in Search:
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f >NUL 2>&1
:: Remove "Is Shortcut":
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "link" /t REG_BINARY /d 0 /f >NUL 2>&1
:: Explorer remove OneDrive icon:
%windir%\SYSTEM32\REG.EXE ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: Disable "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks:
:: 

IF NOT EXIST %windir%\SYSTEM32\SCHTASKS.EXE GOTO SCH
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\AitAgent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Autochk\Proxy" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Maintenance\WinSAT" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ehDRMInit" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\InstallPlayReady" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\mcupdate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURActivate" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURDiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscovery" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrScheduleTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\RegisterSearch" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\UpdateRecordPath" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Time-5d" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\PI\Sqm-Tasks" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /DISABLE
%windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /DISABLE
:SCH

:: 
:: Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx" /v "DisableGwx" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gwx.exe" /v "Debugger" /t REG_SZ /d "systray.exe" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "ElevateNonAdmins" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableOSUpgrade" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "AllowOSUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "ReservationsAllowed" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeState" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeStateTimeStamp" /t REG_SZ /d "2015-09-09 09:09:09" /f >NUL 2>&1

:: 
:: OPTIONAL: Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "AutoInstallMinorUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1
:: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoRebootWithLoggedOnUsers" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAUAsDefaultShutdownOption" /t REG_DWORD /d 1 /f >NUL 2>&1
:: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
:: Disable reinstall (of undesired) Windows Updates + Drivers:
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "DontSearchWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: Uninstall OneDrive:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSync" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1
SET x86="%SYSTEMROOT%\System32\OneDriveSetup.exe"
SET x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe"
%windir%\SYSTEM32\TASKKILL.EXE /IM OneDrive.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1
IF EXIST %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
%windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1
RD "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1
RD "C:\OneDriveTemp" /Q /S >NUL 2>&1
RD "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1
RD "%ProgramData%\Microsoft OneDrive" /Q /S >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1

:: 
:: Internet Explorer (IE) 9/10/11/newer Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade:
:: 

%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Geolocation" /v "BlockAllWebsites" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1

:: 
:: OPTIONAL: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS with many IPs:
:: 
:: Open STOP!DNS.CMD + STARTDNS.CMD (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.ZIP
:: More info:
:: http://www.mdgx.com/hosts.php#N2

IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO DN$
IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO DN$
:: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP DNSCache
:: %windir%\SYSTEM32\SC.EXE CONFIG DNSCache START= disabled
:DN$

:: 
:: Block Spyware, Tracking + Telemetry using Windows Firewall:
:: 

IF NOT EXIST %windir%\SYSTEM32\NETSH.EXE GOTO NS0
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_134.170.30.202" dir=out action=block remoteip=134.170.30.202 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_137.116.81.24" dir=out action=block remoteip=137.116.81.24 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_157.56.106.189" dir=out action=block remoteip=157.56.106.189 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_184.86.53.99" dir=out action=block remoteip=184.86.53.99 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.43" dir=out action=block remoteip=2.22.61.43 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.66" dir=out action=block remoteip=2.22.61.66 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.39.117.230" dir=out action=block remoteip=65.39.117.230 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.52.108.33" dir=out action=block remoteip=65.52.108.33 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_64.4.54.254" dir=out action=block remoteip=64.4.54.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes
%windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes
:NS0

:: 
:: NTFS Long Path
:: 
:: Enable NTFS long path (> 260 characters) option:
:: http://www.superuser.com/questions/1119883/
:: http://www.howtogeek.com/266621/
:: http://www.winaero.com/blog/how-to-enable-ntfs-long-paths-in-windows-10/
:: NFR 4.6.2 and long paths in Windows 10:
:: http://blogs.msdn.microsoft.com/jeremykuhne/2016/07/30/net-4-6-2-and-long-paths-on-windows-10/

%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1
%windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{48981759-12F2-42A6-A048-028B3973495F}Machine\System\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1

:: 
:: HOSTS
:: 
:: If 0.0.0.0 redirects do not work properly on your computer(s) you can substitute all null strings below with default localhost:
:: 127.0.0.1
:: BONUS:
:: List below contains all known Microsoft servers one may wish to disable, but some will deactivate
:: Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about.
:: View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly.
:: Use with CAUTION!
:: Open 10_BLOCK.TXT (included) in Notepad for details:
:: http://www.mdgx.com/10BLK/10_BLOCK.php

IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SYSTEM32\DRIVERS\ETC" /r /d y >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SysWOW64\DRIVERS\ETC" /r /d y >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SysWOW64\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS.ORI" GOTO NXT
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" HOSTS.ORI
IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS"
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" HOSTS.ORI
IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SysWOW64\DRIVERS\ETC\HOSTS"
:NXT
IF EXIST %windir%\SYSTEM32\DRIVERS\ETC\HOSTS GOTO HOST1
ECHO # >%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # THIS FILE IS OBSOLETE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All necessary tasks are executed by running E10BLOK.CMD (included)!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Must see 10_BLOCK.TXT (included) for guidelines!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Or:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/10BLK/10_BLOCK.TXT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS (plain text/ASCII file):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Used in TCP/IP for mapping IP addresses (1st column) to corresponding host names (2nd column):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Hosts_(file)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Each entry must be on a separate line. Columns must be separated by at least 1 space or tab.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All lines starting with # are comments/remarks and are not processed.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # DNS itself handles localhost name resolution.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines MUST be listed FIRST in this EXACT order [IPv4 (1st) + IPv6 (2nd)]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 localhost.localdomain>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 255.255.255.255 broadcasthost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 127.0.0.1 local>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Next lines recommended for IPv6 protocol:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe80::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO fe00::0 ip6-localnet>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff00::0 ip6-mcastprefix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::1 ip6-allnodes>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::2 ip6-allrouters>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO ff02::3 ip6-allhosts>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://en.wikipedia.org/wiki/Multicast_address>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # ENABLE/DISABLE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # All servers below are disabled = redirected to 0.0.0.0 (null).>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # To (re)enable: comment/remark (precede with #) or delete desired line(s) below.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Add these 0.0.0.0 (redirected to null) IPs to your %%windir%%\SYSTEM32\DRIVERS\ETC\HOSTS file:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.pastebin.com/gebp8edd>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Edit HOSTS in Windows 7/8/8.1/10:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/easily-edit-hosts-file-windows-10/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-8/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.petri.com/edit-hosts-file-windows-7/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx HOSTS Guide + Tools:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Take Ownership of files + folders right-click Explorer option:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # MDGx File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/xptoy.htm#FMNT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM ReadMe Guide:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/fmnt32.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FM [2.2 MB, free]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.mdgx.com/fmnt32/FMNT32.EXE>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 Take Ownership tool (freeware):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/nt6fix.php5#restfix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # FixNT6 [36 KB, freeware]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # http://www.jsware.net/jsware/zips/fix6r.zip>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # Lines below disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0001.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0002.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0003.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0004.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0005.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0006.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0007.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0008.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a-0009.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 a.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ac3.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ad.doubleclick.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ads1.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnexus.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aidps.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 aka-cdn-ns.adtech.de>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 apps.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az361816.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 az512334.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 b.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 bs.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 c.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdn.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cds26.ams9.msecn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 choice.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 compatexchange.cloudapp.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cs1.wpc.v0cdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 cdp1.public-trust.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 corp.sts.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 db3aqu.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 diagnostics.support.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e2835.dspb.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e8218.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7341.g.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 e7502.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ec.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.windows.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.microsoft-hohm.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 feedback.search.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 fe2.ws.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 flex.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 g.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 h1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 hostedocsp.globalsign.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 li581-132.members.linode.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 lb1.www.ms.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 live.rads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 m.hotmail.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 msntest.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pre.footprintpredict.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 preview.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 pricelist.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 redir.metaservices.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 s.gateway.messenger.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 schemas.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 secure.flashtalking.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 services.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 settings-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sls.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sO.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 static.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe1.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 survey.watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.appex.bing.net:443>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.urs.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 ui.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 view.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 vortex-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.ppe.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.go.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO 0.0.0.0 www.msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
ECHO # >>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
:HOST1
SET NEWLINE=.^& ECHO
%windir%\SYSTEM32\FIND.EXE /C /I "a-0001.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0001.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0002.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0002.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0003.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0003.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0004.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0004.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0005.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0005.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0006.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0006.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0007.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0007.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0008.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0008.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a-0009.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0009.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "a.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ac3.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ac3.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ad.doubleclick.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ad.doubleclick.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ads1.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnexus.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnexus.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aidps.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aidps.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "aka-cdn-ns.adtech.de" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aka-cdn-ns.adtech.de)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "apps.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 apps.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az361816.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az361816.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "az512334.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az512334.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "b.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "bs.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 bs.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "c.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdn.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdn.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cds26.ams9.msecn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cds26.ams9.msecn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "compatexchange.cloudapp.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 compatexchange.cloudapp.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corpext.msitadfs.glbdns2.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdnjs.cloudflare.com.cdn.cloudflare.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cs1.wpc.v0cdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cs1.wpc.v0cdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "cdp1.public-trust.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdp1.public-trust.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "corp.sts.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corp.sts.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "db3aqu.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 db3aqu.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "diagnostics.support.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 diagnostics.support.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e2835.dspb.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e2835.dspb.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e8218.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e8218.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7341.g.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7341.g.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "e7502.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7502.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ec.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ec.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.windows.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.windows.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.microsoft-hohm.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.microsoft-hohm.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "feedback.search.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.search.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "fe2.ws.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.ws.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "flex.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 flex.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "g.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 g.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "h1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 h1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "hostedocsp.globalsign.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 hostedocsp.globalsign.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "li581-132.members.linode.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 li581-132.members.linode.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "lb1.www.ms.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 lb1.www.ms.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "live.rads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 live.rads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "m.hotmail.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.hotmail.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msnbot-65-55-108-23.search.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msnbot-65-55-108-23.search.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "msntest.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msntest.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pre.footprintpredict.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pre.footprintpredict.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "preview.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 preview.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "pricelist.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pricelist.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "redir.metaservices.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 redir.metaservices.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "reports.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 reports.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "s.gateway.messenger.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 s.gateway.messenger.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "schemas.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 schemas.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "secure.flashtalking.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.flashtalking.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "services.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 services.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "settings-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sls.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sls.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sO.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sO.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "static.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 static.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe1.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe1.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "survey.watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 survey.watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net:443" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net:443)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.urs.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.urs.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "ui.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ui.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "view.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 view.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-bn2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-cy2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "vortex-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.ppe.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.ppe.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.go.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.go.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS
%windir%\SYSTEM32\FIND.EXE /C /I "www.msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1
IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS

:: 
:: Stop + Uninstall Get Windows 10 (GWX), unwanted mandatory updates + spyware:
:: 

:: Stop + Uninstall Get Windows 10 (GWX), spyware, telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":
%windir%\SYSTEM32\TASKKILL.EXE /IM GWX.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXUXWorker.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM GWXConfigManager.exe /T /F >NUL 2>&1
%windir%\SYSTEM32\TASKKILL.EXE /IM consent.exe /T /F >NUL 2>&1

:: Stop customer experience + cortana search:
%windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /r /d y
%windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q
%windir%\SYSTEM32\TASKKILL.EXE /IM ShellExperienceHost.exe /T /F >NUL 2>&1
MOVE /Y "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy.000"
%windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /r /d y
%windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q
%windir%\SYSTEM32\TASKKILL.EXE /IM SearchUI.exe /T /F >NUL 2>&1
MOVE /Y "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.000"

IF NOT EXIST %windir%\SYSTEM32\WUSA.EXE GOTO END
:: KB971033: Windows Activation Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:971033 /quiet /norestart >NUL 2>&1
:: KB2952664: Get Windows 10 (GWX) Assistant:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2952664 /quiet /norestart >NUL 2>&1
:: KB2990214: Get Windows 10 (GWX):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2990214 /quiet /norestart >NUL 2>&1
:: KB3012973: Upgrade to Windows 10 Pro:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3012973 /quiet /norestart >NUL 2>&1
:: KB3021917: Performance Improvements Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3021917 /quiet /norestart >NUL 2>&1
:: KB3022345: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3022345 /quiet /norestart >NUL 2>&1
:: KB3035583: Get Windows 10 (GWX) App:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3035583 /quiet /norestart >NUL 2>&1
:: KB3044374: Get Windows 10 (GWX) Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3044374 /quiet /norestart >NUL 2>&1
:: KB3068708: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3068708 /quiet /norestart >NUL 2>&1
:: KB3075249: Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075249 /quiet /norestart >NUL 2>&1
:: KB3080149: Customer Experience and Diagnostic Telemetry Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3080149 /quiet /norestart >NUL 2>&1
:: KB3112343: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3112343 /quiet /norestart >NUL 2>&1
:: KB3083711: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083711 /quiet /norestart >NUL 2>&1
:: KB3083325: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083325 /quiet /norestart >NUL 2>&1
:: KB3075853: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075853 /quiet /norestart >NUL 2>&1
:: KB3072318: OOBE Update to upgrade to Windows 10:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3072318 /quiet /norestart >NUL 2>&1
:: KB3065988: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3065988 /quiet /norestart >NUL 2>&1
:: KB3064683: OOBE Update to upgrade to Windows 10:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3064683 /quiet /norestart >NUL 2>&1
:: KB3058168: Activate Windows 10 from Hosts Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3058168 /quiet /norestart >NUL 2>&1
:: KB3050267: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3050267 /quiet /norestart >NUL 2>&1
:: KB2976978: Compatibility Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2976978 /quiet /norestart >NUL 2>&1
:: KB2977759: Compatibility Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2977759 /quiet /norestart >NUL 2>&1
:: KB3081954: Work Folders Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3081954 /quiet /norestart >NUL 2>&1
:: KB3123862: Upgrade Capability Update:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3123862 /quiet /norestart >NUL 2>&1
:: KB3138612: Windows Update Client (WUC):
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3138612 /quiet /norestart >NUL 2>&1
:: KB3172605: July 2016 Update Rollup:
START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3172605 /quiet /norestart >NUL 2>&1
TIMEOUT /T 5 /NOBREAK

:: 

:END
:: EXIT

Back 2 Top

MDGx MAX Speed WinDOwS

MDGx