How to remove the Blaster registry key through scripting expert Joel Johnson explains how to remove the Blaster registry key through scripting.

This handy WMI script can be called from your login scripts to clean up the Blaster registry key. Of course, you

may want to add a Reg backup line to backup the registry first.

The basics behind this script are pretty simple. The first five lines lay out the standard Windows registry tree. The next five lines define what we are looking for. The "." stands for local computer. If you want to target a single computer you can add that computer name instead of the ".". The "SMethod" means we are using the "Delete Value" command. The next two lines lay out the location of the value we are looking for. And finally the "SValue" is the value that nasty Blaster added to user registries. The rest of the script calls the variables we just defined.

You can run this within netlogon and save yourself valuable cleanup time.

Const HKEY_CLASSES_ROOT  = &H80000000
Const HKEY_CURRENT_USER  = &H80000001
Const HKEY_Local_Machine  = &H80000002
Const HKEY_Users   = &H80000003
Const HKEY_Current_Config  = &H80000005

sComputer  = "."
sMethod  = "DeleteValue"
hTree   = HKEY_Local_Machine
sKey   = "SoftwareMicrosoftWindowsCurrentVersionRun"
sValueName  = "windows auto update"

Set oRegistry  = GetObject("winmgmts:{impersonationLevel=impersonate}//" & _
   sComputer & "/root/default:StdRegProv")

Set oMethod  = oRegistry.Methods_(sMethod)
Set oInParam  = oMethod.inParameters.SpawnInstance_()

oInParam.hDefKey = hTree
oInParam.sSubKeyName = sKey
oInParam.sValueName = sValueName

Set oOutParam = oRegistry.ExecMethod_(sMethod, oInParam)

This was first published in August 2003

Dig deeper on Malware, Viruses, Trojans and Spyware



Enjoy the benefits of Pro+ membership, learn more and join.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: