How to Delete the VBS Virus

Techwalla may earn compensation through affiliate links in this story. Learn more about our affiliate and product review process here.
Infected computer.

The VBS virus creates Autorun.inf files in root directories, making the virus execute whenever those directories are accessed. It is a notoriously difficult virus to get rid of. The virus infects computers through malicious webpages. Most antivirus software will have trouble removing this virus completely, making manual removal the best option.

Advertisement

Step 1

Hold down the "Ctrl," "Alt" and "Delete" keys simultaneously to open the Task Manager. Select the "Processes" tab and end the "dxdlg.exe" and "wscript.exe" processes.

Video of the Day

Step 2

Click the "Start" menu, type "regedit" and press "Enter." Locate the registry key "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon." In the window pane on the right, select "Userinit." Delete all values other than "C:windowssystem32userinit.exe."

Advertisement

Step 3

Open the folder "C:\WINDOWS\System32." Delete the files "dxdlg.exe" and "boot.vbs."

Step 4

Open the "Start" menu again and select the search function. Search your entire hard drive for "boot.vbs" and "kinza.exe." If you are using Vista or Windows 7, select "Computer" from the "Start" menu. Search in the box in the top-right corner. Delete every copy of these two files you find.

Advertisement

Advertisement

Step 5

Open the "Start" menu, right-click on "My Computer" and select "Properties." Select the "System Restore" tab and click the "Turn off System Restore" check box. In Vista and Windows 7, click "Start," "Control Panel" and "System and Maintenance," and select "System protection" from the left pane. Unselect the C: drive from the Automatic Restore Points box and click "Apply."

Step 6

Restart your computer. Run a virus scan to confirm that the virus has been deleted.

Video of the Day

Advertisement

Advertisement

references

Report an Issue

screenshot of the current page

Screenshot loading...