Sei sulla pagina 1di 12

NSA virus is a PRISM scam to collect non-existent ransom for infringement of national laws by MoneyPak payment method.

Hence, S! "ir#s is also called MoneyPak "ir#s. It is a "ir#s with ad"anced comp#ter tech to be capable of hi$acking web camera, detecting IP address and displaying the date when law-breaking acti"ity is detected.

%ho#gh attaching fig#res of police and some official badges, among which there is one from Mandiant Sec#rity !gency, S! sealed screen message cannot deny its real property as a "ir#s since no official department wo#ld collect fines by s#ddenly locking #p a comp#ter.

What can NSA Virus Harm Computer?


!side from blocking comp#ter from being #sed by P& #sers, S! "ir#s is capable of imposing additional harms to a machine, which is

seldom known by people. S! "ir#s r#ns based on %ro$an programs that are made to bind themsel"es to system ser"ices, leading to tro#bles like disabled Safe Mode and #nresponsi"e keyboard. %hat's why some P& #sers cannot log into some forms of Safe Mode and gain no progress by pressing &trl, !lt and (el key combination together. ! %ro$an is commonly known to copy itself at a rapid speed, meaning more b#ild-in ser"ices are anticipated to be o#t of operation if S! "ir#s keeps ali"e on a comp#ter. %he worst thing sho#ld be the capability to open #p a backdoor which is a fa"orable way for "ir#s to start their intr#si"e infiltration. )ne sho#ld bear in mind that infiltration of ransomware like S! "ir#s aims at not only r#ining target system to threaten "ictims to s#bmit large amo#nt of money, b#t also fetching personal information stored in system programs. %o open #p a backdoor and transfer collected information, S! "ir#s only need to modify registry entries and make f#ll #se of ports that we seldom #se. !ct#ally, according to %&P*IP protocol, each comp#ter has +,,,-, terminals. In other word, a lot of information can be exchanged thro#gh the backdoor. %o crown it all, the loose terminals gi"e chances for deadly "ir#s to attack the target comp#ter, which is the reason why "ictims enco#nter resid#al damages after they ha"e s#ccessf#lly remo"ed S! "ir#s. .hether it is for the sake of comp#ter health or information sec#rity, one sho#ld h#rry #p to remo"e S! "ir#s. Self-help g#ides are offered hereinafter. /e noted that some expert comp#ter skills are needed to a"oid any slight de"iation from the following steps, ens#ring no #nexpected dysf#nctions happen. If yo# need any instant help, yo# are welcome to cons#lt 0ilma%ech online experts here.

Self-help Guide to Remove NSA Virus


Case A Safe Mode with Networking is not disabled by NSA virus yet.
Step1. Access Safe ode !ith Net!or"in#.

.indows 1

Press !lt,&trl and delete key together at screen.

S! "ir#s sealed

Please hold shift key and click on power b#tton together to select Restart. Highlight %ro#bleshoot option with arrow keys and hit 2nter key. 3o into !d"anced options.

Hit Restart b#tton again. Please hit 4, to get into safe mode with networking.

.indows 5*6P*0ista

7eep tapping on 841 key9 as the comp#ter is booting #p b#t before .indows la#nches.

Highlight 8Safe Mode with etworking9 option on 8.indows !d"anced )ptions Men#9 screen. Press 2nter key.

Step$. %isa&le startup items of NSA virus.

.indows 1

%ype :%ask' on &harms bar on Start screen. 4ind and tick items related to S! "ir#s. Press :(isable' option to remo"e S! "ir#s.

.indows 5*6P*0ista

;a#nch Search* R#n box from Start men#. %ype :msconfig' and hit 2nter key. 4ind and tick related items. Press :(isable !ll' option to remo"e S! "ir#s.

Step'.(nter data&ase and modif) re#istr) "e)s there.

.indows 1

%ype :regedit' in Search charm.

Hit 2nter key. Press and hold &trl<4 to search for .inlogon.

;ocate key labeled Shell in the right pane. Right click on it and replace it with :explorer.exe' to ens#re the following steps mo"e smoothly.

.indows 5*6P*0ista

Press .in key

and R key together and p#t in :regedit'.

Press and hold &trl<4 to search for .inlogon when a new window pops #p. ;ocate key labeled Shell in the right pane. Right click on it and replace it with :explorer.exe' to ens#re the following steps mo"e smoothly.

In case yo# are conf#sed to which 8.inlogon9 to locate beca#se yo# ha"e fo#nd too many "ersions of it or yo# cannot find any, yo# are welcome to get instant help by li"e chatting with online experts here.

Step*. Sho! hidden files to remove items of NSA virus under C+ !indo!s.

.indows 1

)pen .indows 2xplorer by clicking on .indows 2xplorer application from Start Screen.

Hit 0iew tab to tick :4ile name extensions' and :Hidden items' options. a"igate to Roaming folder and %emp folder respecti"ely in & (isk to remo"e files with abnormal name.

.indows 5*6P*0ista

)pen :&ontrol Panel' from Start men# and search for :4older )ptions'. =nder 0iew tab to tick :Show hidden files and folders and nontick Hide protected operating system files >Recommended?' and then click :)7'. a"igate to Roaming folder and %emp folder respecti"ely in (ri"e & to remo"e files with abnormal name.

Case , - .Safe

ode !ith Net!or"in#/ is disa&led.

)ne can also create new #ser acco#nt from cmd lines and remo"e S! "ir#s there. Howe"er, s#ch method can cons#me m#ch energy and time. %o S! "ir#s @#ickly, one can #se system &(*(0( to help repair the infected comp#ter. .indows 6P

Insert .indows 6P &( into the dri"e >if !#toplay kicks in, exit o#t of it?. Hold .in key and R key together to bring #p a box. &opy and paste :sfc *scannow' within the text box and hit 2nter key. .indows 4ile Protection Ser"ice scans all protected files and "erifies integrity, replacing any files with which it finds a problem. /e patient and allow this process to proceed completely.

Restart yo#r comp#ter once this process is completed.

.indows 5

P#t .indows 5 &( in yo#r optical dri"e. Restart to boot from the (0(. )n the 8Install .indows9 screen, make the appropriate selections for lang#age, time, and keyboard, and then click 8 ext9. )n the next screen, click 8Repair Ao#r &omp#ter9. In 8System Reco"ery )ptions9, select which operating system yo# want to restore if any are listed, and click 8 ext9. %he 8System Reco"ery )ptions9 screen shows #p and select 8Start#p Repair9.

.indows 0ista

Insert .indows 0ista (0( and restart the comp#ter with the (0( in. Press any key to boot from &( or (0(' is displayed in black backgro#nd. Press any key to start the booting process.

! new screen will appear saying :.indows is loading files'. !nother small progress bar appears after se"eral min#tes. Select yo#r lang#age and keyboard lang#age and click ext b#tton when yo# are gi"en options. &lick on the Repair Ao#r &omp#ter option at the bottom left of install screen. )nce the :0ista installation' is located, highlight it and then click the ext b#tton. Ao# will see the pict#re belowB

&lick on Start#p Repair and let the wiCard finish. It is perfectly normal that the comp#ter restarts after it finishes the process.

.indows 1

%ype :!d"anced' on Start screen.. &lick Settings category. Select !d"anced start#p options. 3eneral P& Settings screen appears. Scroll down to the bottom to select !d"anced start#p. Press on Restart now. Select %ro#bleshoot.

Select !d"anced options. &lick on !#tomatic Repair. ;og in the =ser !cco#nt yo# wish to repair. !#tomatic repair will now start. !fter a while, yo#r comp#ter will a#tomatically restartD please lea"e it to complete all the process.

0ind Reminder+ e"er forget to restart comp#ter after complete all the remo"al steps gi"en abo"e. So far, man#al method is highly recommended when it comes to ransomware like S! "ir#s. Many people are prone to employ sec#rity #tilities to help get rid of "ir#s. /#t when the whole comp#ter is froCen #p, it is impossible to r#n a scan #nless another desktop is f#nctional in certain mode. !ccording to report by "ictims on pop#lar comp#ter for#ms, it has been known that S! "ir#s manages to come back after reboot e"en tho#gh anti-"ir#s programs did remo"e some malicio#s items. S! "ir#s is %ro$an geared. %h#s it is enabled to bind itself to system ser"ices and

implement harmf#l deeds with a fra#d#lent image of system ser"ice r#nning in backgro#ndD copy itself to m#ltiple sections and make them interplay with each other, so that the deleted item will reprod#ce when another programs is la#nched by #sers. 2xtremely el#si"e S! becomes, it is diffic#lt to be remo"ed by programs. %herefore, we ha"e to change settings and delete "icio#s items by hand. .ith s#fficient comp#ter knowledge, one can easily tell the fra#d#lent ones from gen#ine ones. Sho#ld one be comp#ter illiterate, one can also remo"e S! "ir#s with ease #nder the g#idance of 0ilma%ech online s#pport if one clicks here to start a li"e chat.

Potrebbero piacerti anche