I work for a school system and I have created a spyware removal progam that runs when the users log on to our network, it works like a dream. Not only will it get rid of spyware but any other application that you don't want to run.
I am using WMI, I have a database with the registry run keys, with the associated EXE and the folder if any. Using WMI I kill the process(s) then delete the EXE and the folder. Then with registry file and GPOs I lock the PC down so the user can not download anything from the web. I built a web page that will display any unknown registry key then I Google it, if it comes back as Spyware I move the key to the Bad Key table the place the path to the EXE and the folder into a tables one for files (EXE) the other for folder, else I move it to the Good Key table. Br0ck, I have converted the SQL Server database to an Access database but it is still 12 MBs not sure how to get that to you. To view a demo of the web page I built go to
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.