Solved

VB Script to replace all matching binary values under Key in Registry

Posted on 2014-11-20
2
134 Views
Last Modified: 2014-11-20
I'm looking for some assistance in a vb script I'm writing.

I'd a script that can locate all instances of a binary value named 'New Signature'

These binary values are be located within unknown sub keys under key 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem'.

I need the code to recursively search through every sub keys and replace when it finds a binary value named 'New signature' it will replace its value with ''hex:28,00,6e,00,6f,00,6e,00,65,00,29,00,00,00"

thanks in advance!
0
Comment
Question by:antonioking
2 Comments
 
LVL 69

Accepted Solution

by:
Qlemo earned 500 total points
ID: 40455301
Is PowerShell an option?
get-childitem -recurse 'HKCU:Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem' |
  get-itemproperty -Name 'New Signature' -ea SilentlyContinue |
  set-itemproperty -Name 'New Signature' -value ([byte[]]@(0x28,0,0x6e,0,0x6f,0,0x6e,0,0x65,0,0x29,0,0,0))

Open in new window

0
 

Author Closing Comment

by:antonioking
ID: 40455320
Oh the wonders of Powershell.

Thank!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Unlike scripting languages such as C# where a semi-colon is used to indicate the end of a command, Microsoft's VBScript language relies on line breaks to determine when a command begins and ends. As you can imagine, this quickly results in messy cod…
In this article we want to have a look at the directory attributes which are used by Microsoft to store the so called Security Identifiers (SID). These SIDs plays an important role in delegating and granting permissions and in authentication of trus…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question