Remove WISPTIS.exe From Your Computer

By | August 8, 2007

WISPTIS! What a piece! I hate that this piece of software and it shows up after I restart my computer.
So, I did something about it.
Remove WISPTIS.exe from your machine by following the script below.

Copy the script below into notepad and name it something like:
RemoveWISPTIS.vbs

You need the .vbs as the file extension!

———-COPY EVERYTHING BELOW THIS LINE for the Script———-
'This script will remove WISPTIS from your local computer.
'Just drag and drop a .txt file containing the registry keys onto it and WISPTIS will be deleted.
'By Cheyenne Harden 8.08.07

Const HKCR   = &H80000000
Const HKCU   = &H80000001
Const HKLM   = &H80000002
Const HKU    = &H80000003
Const HKCC   = &H80000005
Const ForReading = 1
Dim strComputer, objFSO
Dim objWMIService, objProcess, colProcess
Dim strProcessKill, sComputer
Dim strHive, arrPath, strNewReg, strChar
strComputer = "."

sComputer = "."
strChar = ""
Set objFSO = CreateObject("Scripting.FileSystemObject")
Set oReg = GetObject("winmgmts:{impersonationLevel=impersonate}!\\" _
& sComputer & "\root\default:StdRegProv")
Set objArgs = Wscript.Arguments
Set objTextFile = objFSO.OpenTextFile(objArgs(0), ForReading)

 Do Until objTextFile.AtEndOfStream
    strReg = objTextFile.Readline
    'Wscript.Echo strReg & " From Text File"

arrPath = Split(strReg, "\")
'Wscript.Echo ArrPath(0) & " From Array"
strNewReg = Replace(strReg, ArrPath(0) & "\", strChar)
'Wscript.Echo strNewReg & " New Key Path"

Select Case ArrPath(0)

 Case "HKEY_CURRENT_USER"
    DeleteRegistryKey HKCU, strNewReg

 Case "HKEY_LOCAL_MACHINE"
    DeleteRegistryKey HKLM, strNewReg

 Case "HKEY_CLASSES_ROOT"
    DeleteRegistryKey HKCR, strNewReg
 
 Case "HKEY_USERS"
    DeleteRegistryKey HKU, strNewReg

 Case "HKEY_CURRENT_CONFIG"
    DeleteRegistryKey HKCC, strNewReg

End Select
Loop

killWISPTIS()
DeleteFile()

MsgBox "Done…"

 

Function killWISPTIS()
strProcessKill = "'WISPTIS.EXE'"

Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colProcess = objWMIService.ExecQuery _
("Select * from Win32_Process Where Name = " & strProcessKill )
For Each objProcess in colProcess
    objProcess.Terminate()
Next
'WSCript.Echo "Just killed process " & strProcessKill _
'& " on " & strComputer
End Function

 

Function DeleteFile()
Set objFSO = CreateObject("Scripting.FileSystemObject")
objFSO.DeleteFile("C:\Windows\System32\Wisptis.exe")
End Function

 

Sub DeleteRegistryKey(ByVal sHive, ByVal sKey)
Dim aSubKeys, sSubKey, iRC
'On Error Resume Next
iRC = oReg.EnumKey(sHive, sKey, aSubKeys)
If iRC = 0 And IsArray(aSubKeys) Then
For Each sSubKey In aSubKeys
If Err.Number <> 0 Then
Err.Clear
Exit Sub
End If
'Wscript.Echo sHive, sKey & "\" & sSubKey & " From Sub"
DeleteRegistryKey sHive, sKey & "\" & sSubKey
Next
End If
oReg.DeleteKey sHive, sKey
End Sub

 

———-COPY EVERYTHING ABOVE THIS LINE for the Script———-

 

Next, Copy the registry keys below to a text file.
Makesure their are no spaces between lines and no word wrap!!!

———-COPY EVERYTHING BELOW THIS LINE for the Script———-
HKEY_CLASSES_ROOT\AppID\{7F429620-16D1-471E-A81A-114992148034}
HKEY_CLASSES_ROOT\AppID\wisptis.EXE
HKEY_CLASSES_ROOT\CLSID\{04A1E553-FE36-4FDE-865E-344194E69424}
HKEY_CLASSES_ROOT\CLSID\{13DE4A42-8D21-4C8E-BF9C-8F69CB068FCA}
HKEY_CLASSES_ROOT\CLSID\{242025BB-8546-48B6-B9B0-F4406C54ACFC}
HKEY_CLASSES_ROOT\CLSID\{3336B8BF-45AF-429F-85CB-8C435FBF21E4}
HKEY_CLASSES_ROOT\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}
HKEY_CLASSES_ROOT\CLSID\{43B07326-AAE0-4B62-A83D-5FD768B7353C}
HKEY_CLASSES_ROOT\CLSID\{43FB1553-AD74-4EE8-88E4-3E6DAAC915DB}
HKEY_CLASSES_ROOT\CLSID\{524B13ED-2E57-40B8-B801-5FA35122EB5C}
HKEY_CLASSES_ROOT\CLSID\{632A2D3D-86AF-411A-8654-7511B51B3D5F}
HKEY_CLASSES_ROOT\CLSID\{65D00646-CDE3-4A88-9163-6769F0F1A97D}
HKEY_CLASSES_ROOT\CLSID\{6E4FCB12-510A-4D40-9304-1DA10AE9147C}
HKEY_CLASSES_ROOT\CLSID\{786CDB70-1628-44A0-853C-5D340A499137}
HKEY_CLASSES_ROOT\CLSID\{836FA1B6-1190-4005-B434-7ED921BE2026}
HKEY_CLASSES_ROOT\CLSID\{8770D941-A63A-4671-A375-2855A18EBA73}
HKEY_CLASSES_ROOT\CLSID\{8854F6A0-4683-4AE7-9191-752FE64612C3}
HKEY_CLASSES_ROOT\CLSID\{937C1A34-151D-4610-9CA6-A8CC9BDB5D83}
HKEY_CLASSES_ROOT\CLSID\{9C1CC6E4-D7EB-4EEB-9091-15A7C8791ED9}
HKEY_CLASSES_ROOT\CLSID\{9DE85094-F71F-44F1-8471-15A2FA76FCF3}
HKEY_CLASSES_ROOT\CLSID\{9FD4E808-F6E6-4E65-98D3-AA39054C1255}
HKEY_CLASSES_ROOT\CLSID\{A5558507-9B96-46BA-94ED-982E684A9A6B}
HKEY_CLASSES_ROOT\CLSID\{A5B020FD-E04B-4E67-B65A-E7DEED25B2CF}
HKEY_CLASSES_ROOT\CLSID\{AAC46A37-9229-4FC0-8CCE-4497569BF4D1}
HKEY_CLASSES_ROOT\CLSID\{C52FF1FD-EB6C-42CF-9140-83DEFECA7E29}
HKEY_CLASSES_ROOT\CLSID\{D8BF32A2-05A5-44C3-B3AA-5E80AC7D2576}
HKEY_CLASSES_ROOT\CLSID\{DE815B00-9460-4F6E-9471-892ED2275EA5}
HKEY_CLASSES_ROOT\CLSID\{E3D5D93C-1663-4A78-A1A7-22375DFEBAEE}
HKEY_CLASSES_ROOT\CLSID\{E5CA59F5-57C4-4DD8-9BD6-1DEEEDD27AF4}
HKEY_CLASSES_ROOT\CLSID\{E9A6AB1B-0C9C-44AC-966E-560C2771D1E8}
HKEY_CLASSES_ROOT\CLSID\{EFB4A0CB-A01F-451C-B6B7-56F02F77D76F}
HKEY_CLASSES_ROOT\CLSID\{F0291081-E87C-4E07-97DA-A0A03761E586}
HKEY_CLASSES_ROOT\Installer\Components\BCA32ECD550E1F4488DBD2A1578ACF8B
HKEY_CLASSES_ROOT\Installer\Features\7040110900063D11C8EF10054038389C\WISPFiles
HKEY_CLASSES_ROOT\Installer\Features\7040110900063D11C8EF10054038389C\WISPHidden
HKEY_CLASSES_ROOT\TypeLib\{194508A0-B8D1-473E-A9B6-851AAF726A6D}
HKEY_CLASSES_ROOT\TypeLib\{56D04F5D-964F-4DBF-8D23-B97989E53418}
HKEY_CLASSES_ROOT\TypeLib\{773F1B9A-35B9-4E95-83A0-A210F2DE3B37}
HKEY_CLASSES_ROOT\TypeLib\{7D868ACD-1A5D-4A47-A247-F39741353012}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1125549C421D34E4DBF1036F62580BE1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\652A08B235C6DFF4C8CD41B52DE68CA4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9B4B5940D4625D64C85532B8CDE3BF4D
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D656DA4A9E277A34D90D5E6FFA34E827
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7040110900063D11C8EF10054038389C\Features\WISPHidden
HKEY_CLASSES_ROOT\TpcCom.ClassicW
HKEY_CLASSES_ROOT\TpcCom.ClassicW.1
HKEY_CLASSES_ROOT\TpcCom.DrawAttrs
HKEY_CLASSES_ROOT\TpcCom.DrawAttrs.1
HKEY_CLASSES_ROOT\TpcCom.DrawAttrsXP
HKEY_CLASSES_ROOT\TpcCom.DrawAttrsXP.1
HKEY_CLASSES_ROOT\TpcCom.GenericRecognizer
HKEY_CLASSES_ROOT\TpcCom.GenericRecognizer.1
HKEY_CLASSES_ROOT\TpcCom.InkObject
HKEY_CLASSES_ROOT\TpcCom.InkObject.1
HKEY_CLASSES_ROOT\TpcCom.InkObjectXP
HKEY_CLASSES_ROOT\TpcCom.InkObjectXP.1
HKEY_CLASSES_ROOT\TpcCom.InkSettings.1
HKEY_CLASSES_ROOT\TpcCom.Lattice.1
HKEY_CLASSES_ROOT\TpcCom.RecoManager
HKEY_CLASSES_ROOT\TpcCom.RecoManager.1
HKEY_CLASSES_ROOT\TpcCom.TabletManager
HKEY_CLASSES_ROOT\TpcCom.TabletManager.1
HKEY_CLASSES_ROOT\TpcCom.UserDictionary
HKEY_CLASSES_ROOT\TpcCom.UserDictionary.1
———-COPY EVERYTHING ABOVE THIS LINE for the Script———-
 

PLEASE MAKE SURE NO WORD WRAPPING IS HAPPENING IN YOUR SCRIPT!!!

1. Two files are needed. the script and a .txt file with the registry keys
2. You must be an admin on the machine.
3. Drag and Drop the .txt file onto the script! Thats it!!!
 
This information is provided "AS IS" with no warranties expressed or implied.

Leave a Reply

Your email address will not be published. Required fields are marked *