Exploiting Utilman.exe to recover Windows passwords
Sometimes you must do bad things to regain control of Windows. Yes, I know there are simpler ways, but this laundry list does work.
- Boot the computer from a DVD or a USB stick.
- Begin the installation procedure.
- Select Repair your computer in the lower left corner.
- Select the right Windows installation and make note of the drive letter.
- Select the command prompt.
- Navigate to the proper drive letter, e.g.
N:
. - Change to the
\Windows\System32
directory. - Rename the existing
Utilman.exe
toUtilman.exe.original
. - Copy
cmd.exe
toUtilman.exe
. - Reboot the computer.
- Click on the accessibility icon in the lower left corner.
- Use the command
net user username password
to change the password of the user indicated, or - Use the command
net user Administrator /active:yes
to activate the local Administrator account, and if necessary - Use the command
net user Administrator new-password
to set the password to a known value. - Boot the computer once more from the DVD or USB stick.
- Begin the installation procedure.
- Select Repair your computer in the lower left corner.
- Select the right Windows installation and make note of the drive letter.
- Select the command prompt.
- Navigate to the proper drive letter, e.g.
N:
. - Change to the
\Windows\System32
directory. - Delete the existing
Utilman.exe
. - Rename the existing
Utilman.exe.original
back toUtilman.exe
. - Reboot the computer and remove the DVD or USB stick
In fact, I’m amazed that most people don’t realise the huge benefit of having a separate administrative account purely for the maintenance of the system, their own account with a low set of privileges for day to day use, and the local Administrator as a standby recovery account, all with good and known passwords. Do such owners find it confusing having three account icons on the login screen?