Skip to content

Instantly share code, notes, and snippets.

@mark05e
Last active May 3, 2024 23:09
Show Gist options
  • Save mark05e/708123de4c095ffb4f735c131d8cc783 to your computer and use it in GitHub Desktop.
Save mark05e/708123de4c095ffb4f735c131d8cc783 to your computer and use it in GitHub Desktop.
PowerShell script to forcefully remove Webroot SecureAnywhere. It is recommended to run the script twice, with a reboot after the first run.
# Removes Webroot SecureAnywhere by force
# Run the script once, reboot, then run again
# Webroot SecureAnywhere registry keys
$RegKeys = @(
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\WRUNINST",
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WRUNINST",
"HKLM:\SOFTWARE\WOW6432Node\WRData",
"HKLM:\SOFTWARE\WOW6432Node\WRCore",
"HKLM:\SOFTWARE\WOW6432Node\WRMIDData",
"HKLM:\SOFTWARE\WOW6432Node\webroot",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WRUNINST",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WRUNINST",
"HKLM:\SOFTWARE\WRData",
"HKLM:\SOFTWARE\WRMIDData",
"HKLM:\SOFTWARE\WRCore",
"HKLM:\SOFTWARE\webroot",
"HKLM:\SYSTEM\ControlSet001\services\WRSVC",
"HKLM:\SYSTEM\ControlSet001\services\WRkrn",
"HKLM:\SYSTEM\ControlSet001\services\WRBoot",
"HKLM:\SYSTEM\ControlSet001\services\WRCore",
"HKLM:\SYSTEM\ControlSet001\services\WRCoreService",
"HKLM:\SYSTEM\ControlSet001\services\wrUrlFlt",
"HKLM:\SYSTEM\ControlSet002\services\WRSVC",
"HKLM:\SYSTEM\ControlSet002\services\WRkrn",
"HKLM:\SYSTEM\ControlSet002\services\WRBoot",
"HKLM:\SYSTEM\ControlSet002\services\WRCore",
"HKLM:\SYSTEM\ControlSet002\services\WRCoreService",
"HKLM:\SYSTEM\ControlSet002\services\wrUrlFlt",
"HKLM:\SYSTEM\CurrentControlSet\services\WRSVC",
"HKLM:\SYSTEM\CurrentControlSet\services\WRkrn",
"HKLM:\SYSTEM\CurrentControlSet\services\WRBoot",
"HKLM:\SYSTEM\CurrentControlSet\services\WRCore",
"HKLM:\SYSTEM\CurrentControlSet\services\WRCoreService",
"HKLM:\SYSTEM\CurrentControlSet\services\wrUrlFlt"
)
# Webroot SecureAnywhere startup registry item paths
$RegStartupPaths = @(
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
)
# Webroot SecureAnywhere folders
$Folders = @(
"%ProgramData%\WRData",
"%ProgramData%\WRCore",
"%ProgramFiles%\Webroot",
"%ProgramFiles(x86)%\Webroot",
"%ProgramData%\Microsoft\Windows\Start Menu\Programs\Webroot SecureAnywhere"
)
# Try to Uninstall - https://community.webroot.com/webroot-secureanywhere-antivirus-12/pc-uninstallation-option-missing-from-control-panel-34688
Start-Process -FilePath "${Env:ProgramFiles(x86)}\Webroot\WRSA.exe" -ArgumentList "-uninstall" -Wait -ErrorAction SilentlyContinue
Start-Process -FilePath "${Env:ProgramFiles}\Webroot\WRSA.exe" -ArgumentList "-uninstall" -Wait -ErrorAction SilentlyContinue
# Stop & Delete Webroot SecureAnywhere service
sc.exe stop WRSVC
sc.exe stop WRCoreService
sc.exe stop WRSkyClient
sc.exe delete WRSVC
sc.exe delete WRCoreService
sc.exe delete WRSkyClient
# Stop Webroot SecureAnywhere process
Stop-Process -Name "WRSA" -Force
# Remove Webroot SecureAnywhere registry keys
ForEach ($RegKey in $RegKeys) {
Write-Host "Removing $RegKey"
Remove-Item -Path $RegKey -Force -Recurse -ErrorAction SilentlyContinue
}
# Remove Webroot SecureAnywhere registry startup items
ForEach ($RegStartupPath in $RegStartupPaths) {
Write-Host "Removing WRSVC from $RegStartupPath"
Remove-ItemProperty -Path $RegStartupPath -Name "WRSVC"
}
# Remove Webroot SecureAnywhere folders
ForEach ($Folder in $Folders) {
Write-Host "Removing $Folder"
Remove-Item -Path "$Folder" -Force -Recurse -ErrorAction SilentlyContinue
}
@kzieres61
Copy link

Just an update, I know this thing is from 2022, but I just used it 09.28.23 using the RMM (system user) and it 100% removed webroot!!!!

This was a LIFE SAVER Thank you!

@AndyHendriksNL
Copy link

Thank you for this script, ran this today (20-10-2023) with an agent procedure in Kaseya. It executes the powershell as the SYSTEM user, worked like a charm.

@mark05e
Copy link
Author

mark05e commented Oct 21, 2023

Thank you for sharing your experience @DomingoMontoya @kzieres61 @xAndyxNL

@Westone58
Copy link

02/22/2024: Successfully ran this script remotely (from a local server to a W10-64 domain member) via a psexec window started as SYSTEM (psexec -s \remote_workstation_name cmd), then invoked powershell in the psexec window and ran the script. Following reboot, all WebRoot services and folders were gone from the workstation. This will be a time saver.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment