Exterminate It! Antimalware

malpedia

Known threats:699,443 Last Update:August 10, 12:54

Testimonials

Dear Matt and Exterminate it,

Thank you so much. This seems to have fixed the problem. Wow. That virus was in there pretty deep. A*G didn't even identify it. S****t would just freeze up when I tried to run it. But the update from Exterminate It, removed it.

Again, thanks.

Kind Regards,
Rev. Mel C. Montgomery

Brother Mel

Total Security

How to Remove Total Security from Your Computer

To completely purge Total Security from your computer, you need to delete the files, folders, Windows registry keys and registry values associated with Total Security. These files, folders and registry elements are respectively listed in the Files, Folders, Registry Keys and Registry Values sections on this page.

For instructions on deleting the Total Security registry keys and registry values,
see How to Remove Total Security from the Windows Registry.

For instructions on deleting the Total Security files and folders,
see How to Delete Total Security Files (.exe, .dll, etc.)

How to Delete Total Security Files (.exe, .dll, etc.)^

The files and folders associated with Total Security are listed in the Files and Folders sections on this page.

To delete the Total Security files and folders:

  1. Using your file explorer, browse to each file and folder listed in the Folders and Files sections.
  2. Note: The paths use certain special folders (conventions) such as [%PROGRAM_FILES%]. Please note that these conventions are depending on Windows Version / Language. These conventions are explained here.
  3. Select the file or folder and press SHIFT+Delete on the keyboard.
  4. Click Yes in the confirm deletion dialog box.
  5. IMPORTANT: If a file is locked (in use by some application), its deletion will fail (the Windows will display a corresponding message).You can delete such locked files with the RemoveOnReboot utility. To delete a locked file, right-click on the file, select Send To->Remove on Next Reboot on the menu and restart your computer. You can install the RemoveOnReboot utility from here.
[%PROGRAM_FILES%]\TS
[%COMMON_STARTMENU%]\TS
[%PROGRAM_FILES_COMMON%]\TSUninstall
[%PROGRAMS%]\Total Security
[%COMMON_STARTMENU%]\TSC

How to Remove Total Security from the Windows Registry^

The Windows registry stores important system information such as system preferences, user settings and installed programs details as well as the information about the applications that are automatically run at start-up. Because of this, spyware, malware and adware often store references to their own files in your Windows registry so that they can automatically launch every time you start up your computer.

To effectively remove Total Security from your Windows registry, you must delete all the registry keys and values associated with Total Security, which are listed in the Registry Keys and Registry Values sections on this page.

IMPORTANT: Because the registry is a core component of your Windows system, it is strongly recommended that you back up the registry before you begin deleting keys and values. For information about backing up the Windows registry, refer to the Registry Editor online help.

To remove the Total Security registry keys and values:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK.
    The Registry Editor window opens. This window consists of two panes. The left pane displays folders that represent the registry keys arranged in hierarchical order. The right one lists the registry values of the currently selected registry key.
  3. To delete each registry key listed in the Registry Keys section, do the following:
    • Locate the key in the left pane of the Registry Editor window by sequentially expanding the folders according to the path indicated in the Registry Keys section. For example, if the path of a registry key is
      HKEY_LOCAL_MACHINE\software\FolderA\FolderB\KeyName1
      sequentially expand the HKEY_LOCAL_MACHINE, software, FolderA and FolderB folders.
    • Select the key name indicated at the end of the path (KeyName1 in the example above).
    • Right-click the key name and select Delete on the menu.
    • Click Yes in the Confirm Key Delete dialog box.
  4. To delete each registry value listed in the Registry Values section, do the following:
    • Display the value in the right pane of the Registry Editor window by sequentially expanding the folders in the left pane according to the path indicated in the Registry Values section and selecting the specified key name. For example, if the path of a registry value is
      HKEY_LOCAL_MACHINE\software\FolderA\FolderB\KeyName2,valueC=
      sequentially expand the HKEY_LOCAL_MACHINE, software, FolderA and FolderB folders and select the KeyName2 key to display the valueC value in the right pane.
    • In the right pane, select the value name indicated after a comma at the end of the path (valueC in the example above).
    • Right-click the value name and select Delete on the menu.
    • Click Yes in the Confirm Value Delete dialog box.
Registry Keys
HKEY_LOCAL_MACHINE\SOFTWARE\7AF62814A9873D1F2CD0C6643C64DAC3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TS
HKEY_LOCAL_MACHINE\SOFTWARE\14919ea49a8f3b4aa3cf1058d9a64cec
HKEY_LOCAL_MACHINE\SOFTWARE\0277E79EDA6B7FD303C7841EDE61AA81
HKEY_LOCAL_MACHINE\SOFTWARE\84A4C7EB08FB4EAAC534C35D070404BF
HKEY_LOCAL_MACHINE\SOFTWARE\01B88E62B60569B5E9D265110E6D5380
HKEY_LOCAL_MACHINE\SOFTWARE\58A57E5E20618490B387ED06D43C80F9
HKEY_LOCAL_MACHINE\SOFTWARE\8B47A2E03E61D790C5E693730D0CC423
HKEY_LOCAL_MACHINE\SOFTWARE\648AE28FFB5A37EBE5D2685468BD6A1E
HKEY_LOCAL_MACHINE\SOFTWARE\360D986C270A36AA4759A16925F8EA29
HKEY_LOCAL_MACHINE\SOFTWARE\6DAE768C4F501FA643C5A3DFD789D37D
HKEY_LOCAL_MACHINE\SOFTWARE\43FE4E2E2B23456966262B032830543D
HKEY_LOCAL_MACHINE\SOFTWARE\11C5FAAC68A95D44F63297963574032F
HKEY_LOCAL_MACHINE\SOFTWARE\2C4079A3E5C58944E9776D11F3B9347F
HKEY_LOCAL_MACHINE\SOFTWARE\860ABDF9F2700AA8E9A7B7422BA2CE56
HKEY_LOCAL_MACHINE\SOFTWARE\68F5674472EECCE1DB54A2B4B29FC1BF
HKEY_LOCAL_MACHINE\SOFTWARE\50422E02DD3E20052F867718216340B0
HKEY_LOCAL_MACHINE\SOFTWARE\059BE119ED6915178720FA8AF3CDEE57
HKEY_LOCAL_MACHINE\SOFTWARE\1CCDA00E1F79E32F59E507B437D00A07
HKEY_LOCAL_MACHINE\SOFTWARE\0F47C56E28CB4ECB39BD396C4006DF44
HKEY_LOCAL_MACHINE\SOFTWARE\8940B8B355868871FB20F25B2FD6B943
HKEY_LOCAL_MACHINE\SOFTWARE\08FC0109306B36BA58FF817808A5AF53
HKEY_LOCAL_MACHINE\SOFTWARE\8BDFABEA0E6908FAB689E2E73AEB00B3
HKEY_LOCAL_MACHINE\SOFTWARE\722D3A9AB5FF0FB8CB1A5E63ED2FA48C
HKEY_LOCAL_MACHINE\SOFTWARE\6DF6E1174747936B630221FDF88F0260
HKEY_LOCAL_MACHINE\SOFTWARE\54D0C582EDCD5C49CAA946A705E4A42C
HKEY_LOCAL_MACHINE\SOFTWARE\0C05F35E067F80E617AE0071768C29C0
HKEY_LOCAL_MACHINE\SOFTWARE\4104E561DA140DC72304066150179687
HKEY_LOCAL_MACHINE\SOFTWARE\4BCAB8983F2E1E4B7A683C19D97DEEDC
HKEY_LOCAL_MACHINE\SOFTWARE\759ED866A0EEE92EE8A764EE8D4545AB
HKEY_LOCAL_MACHINE\SOFTWARE\259E1D27DAAF65246E31D35922E12959
HKEY_LOCAL_MACHINE\SOFTWARE\3E3F1371B6679CD02401697111EFA872
HKEY_LOCAL_MACHINE\SOFTWARE\352838108A904677E537304F270A5F00
HKEY_LOCAL_MACHINE\SOFTWARE\95AB698B2CB54EEFA11023E68B119068
HKEY_LOCAL_MACHINE\SOFTWARE\73A7F16B0F8ADB1EC8CEF5498CF15616
HKEY_LOCAL_MACHINE\SOFTWARE\82193FD999F6399F93D6C87268ACB730
HKEY_LOCAL_MACHINE\SOFTWARE\545A0BCFA7DBABB04C263FC47155642E
HKEY_LOCAL_MACHINE\SOFTWARE\7CEAE7235842CE17185FD71F144D4E01
HKEY_LOCAL_MACHINE\SOFTWARE\60A4B93C4C106764BA0F697226D8D64B
HKEY_LOCAL_MACHINE\SOFTWARE\6A4463E62172EB8E21BD5901FB607C68
HKEY_LOCAL_MACHINE\SOFTWARE\7AADC50AB414EA2256C27AE3DB4A5E2F
HKEY_LOCAL_MACHINE\SOFTWARE\6A78336FA2C80E131FD248A7B8DD09B4
HKEY_LOCAL_MACHINE\SOFTWARE\3E6C1D0F1236E782D12F269BB5F01A02
HKEY_LOCAL_MACHINE\SOFTWARE\8CE8946718067D995CD9E39A5EDBA9D1
HKEY_LOCAL_MACHINE\SOFTWARE\1B8B9789BB8D47CD6FF6A6521F77FC2E
HKEY_LOCAL_MACHINE\SOFTWARE\0AFFF5420D32F1D0202E69C8B4B7ED1B
HKEY_LOCAL_MACHINE\SOFTWARE\1D383CF6D74172691F69F63E6D7536B5
HKEY_LOCAL_MACHINE\SOFTWARE\3C3A3124A0FC8555018A4C26E7CE3AE8
HKEY_LOCAL_MACHINE\SOFTWARE\6AA95F40899924478C0C6E8A9949F763
HKEY_LOCAL_MACHINE\SOFTWARE\42CF6839DBF78F66F16C8D63A3160C15
HKEY_LOCAL_MACHINE\SOFTWARE\623FC96818CB8CAB0059437AEC967789
HKEY_LOCAL_MACHINE\SOFTWARE\50F9A20E1004DFAB570458189BCE04D9
HKEY_LOCAL_MACHINE\SOFTWARE\4E1C56590DAA7D479CD8B1DCB3D9B5B1
HKEY_LOCAL_MACHINE\SOFTWARE\4C6D623AAB47F8429DBA31020ADF2698
HKEY_LOCAL_MACHINE\SOFTWARE\4DD172D64EF3CC40320C6ACA11575F77
HKEY_LOCAL_MACHINE\SOFTWARE\82A017D92C1222214FD3BF541611CBD1
HKEY_LOCAL_MACHINE\SOFTWARE\3E11EFA386CE42C60B7D96AA9D477655
HKEY_LOCAL_MACHINE\SOFTWARE\936496C2696514705FBB99E337D65164
HKEY_LOCAL_MACHINE\SOFTWARE\7311E0F9B348DBE5B926C7B1444E0767
HKEY_LOCAL_MACHINE\SOFTWARE\6896C5BD3FDB2729FBA802B3ADBC7DCD
HKEY_LOCAL_MACHINE\SOFTWARE\240E45DD648E0C399F459E1101F3F898
HKEY_LOCAL_MACHINE\SOFTWARE\8F56BEB13E5A0865D5D7E31E7BC914B3
HKEY_LOCAL_MACHINE\SOFTWARE\5AE97B6029271FA5E62CE7EC0908F1D9
HKEY_LOCAL_MACHINE\SOFTWARE\574F3BF12C609495DAE9ACD17421DEAE
HKEY_LOCAL_MACHINE\SOFTWARE\4A3170029B41A3074D6068A6BEEBEDEE
HKEY_LOCAL_MACHINE\SOFTWARE\06E5F1EFAFE0F533FAB024BFB45D7E08
HKEY_LOCAL_MACHINE\SOFTWARE\874D3045B8EB430E3111B7E6F1653481
HKEY_LOCAL_MACHINE\SOFTWARE\1D5435EF2F17BBD9FE5672098F9A92A8
HKEY_LOCAL_MACHINE\SOFTWARE\619DE198380718C01F1737B7C8049458
HKEY_LOCAL_MACHINE\SOFTWARE\0B655A40B8817EB0F379DDC797A1E59F
HKEY_LOCAL_MACHINE\SOFTWARE\27E44B552C43216E20B6A11F8965B940
HKEY_LOCAL_MACHINE\SOFTWARE\433FD1F7616D4E85FAAC7EE6CBE085E2
HKEY_LOCAL_MACHINE\SOFTWARE\1FCCC0009C35C00F0ACE043636008193
HKEY_LOCAL_MACHINE\SOFTWARE\27E9D0938695DC746CE52A0AEEA492A2
HKEY_LOCAL_MACHINE\SOFTWARE\44B78C37E8D0E866D67173ECB1D5A178
HKEY_LOCAL_MACHINE\SOFTWARE\10E7DD53EB9A92474DFCD11DAABA8656
HKEY_LOCAL_MACHINE\SOFTWARE\6D9820971D4AB85567AE664A41161E88
HKEY_LOCAL_MACHINE\SOFTWARE\00FBD5DEC4064277515F49F6771653AF
HKEY_LOCAL_MACHINE\SOFTWARE\9D5B2948C80692B62657725B623E5364
HKEY_LOCAL_MACHINE\SOFTWARE\7DE0754051A448ABECC0C8E3482E04C4
HKEY_LOCAL_MACHINE\SOFTWARE\18AE6D7BE738B1354D7F70F8850ADB8D
HKEY_LOCAL_MACHINE\SOFTWARE\9DCA66000A8A1F9E8D3001DAFE4991FC
HKEY_LOCAL_MACHINE\SOFTWARE\98A5E9EA0856D28D2D8265150FD42FA2
HKEY_LOCAL_MACHINE\SOFTWARE\9A77D67B07420B3C71F1E93D5718BEDD
HKEY_LOCAL_MACHINE\SOFTWARE\8A15B26FEE1DE2D6CB27A36B42EE495E
HKEY_LOCAL_MACHINE\SOFTWARE\24FE8ED310BBC29072A2497605949914
HKEY_LOCAL_MACHINE\SOFTWARE\7407E4014AAA7E6C5DA498584897E76B
HKEY_LOCAL_MACHINE\SOFTWARE\93342B64EAAC2C6CDF0776F159CD52EA
HKEY_LOCAL_MACHINE\SOFTWARE\0B2AC298EA66F9310C0E155E0D5EC512
HKEY_LOCAL_MACHINE\SOFTWARE\15CF33EC2EA4371EE48A069572088794
HKEY_LOCAL_MACHINE\SOFTWARE\376BE5A7BE124E4140EA542D8ACEE19F
HKEY_LOCAL_MACHINE\SOFTWARE\4210305B1857253B91747EA16879F8DA
HKEY_LOCAL_MACHINE\SOFTWARE\1805237138E558FCDD9365A59CD499A0
HKEY_LOCAL_MACHINE\SOFTWARE\728BD54526CADACA1370F21FB2ABC0C5
HKEY_LOCAL_MACHINE\SOFTWARE\1EDBAB2A3D446736047CD4B28A58E750
HKEY_LOCAL_MACHINE\SOFTWARE\8818AD26A9ABCB695EC37C619EA518EB
HKEY_LOCAL_MACHINE\SOFTWARE\963A5578B7C8D7EDCC00FFD48EEC7E15
HKEY_LOCAL_MACHINE\SOFTWARE\0F64ED37C504C1F3322CDB77927DC9CF
HKEY_LOCAL_MACHINE\SOFTWARE\2DF4E3D73FF849988978F92F03ED409F
Registry Values
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]928779DBD270162B1E79E2892EE7622D=[%PROGRAM_FILES%]\TSC\tsc.exe
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]TS=[%PROGRAM_FILES%]\TS\tsc.exe
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]TS="[%PROGRAM_FILES%]\TS\tsc.exe"

Ransomware

Ransomware is malicious software that encrypts the hard drive of the infected computer or the files holding important information. The hacker then extorts money from the computer’s owner in exchange for the possibility to have access to the data again.

Be Aware of the Following Ransomware Threats:

Cheqtwo, VirusRescue, VirusOut, Immunizr, ExtraAntivirus.

How Did My PC Get Infected with Total Security?^

The following are the most likely reasons why your computer got infected with Total Security:

  • Your operating system and Web browser's security settings are too lax.
  • You are not following safe Internet surfing and PC practices.

Downloading and Installing Freeware or Shareware

Small-charge or free software applications may come bundled with spyware, adware, or programs like Total Security. Sometimes adware is attached to free software to enable the developers to cover the overhead involved in created the software. Spyware frequently piggybacks on free software into your computer to damage it and steal valuable private information.

Using Peer-to-Peer Software

The use of peer-to-peer (P2P) programs or other applications using a shared network exposes your system to the risk of unwittingly downloading infected files, including malicious programs like Total Security.

Visiting Questionable Web Sites

When you visit sites with dubious or objectionable content, trojans-including Total Security, spyware and adware, may well be automatically downloaded and installed onto your computer.

Detecting Total Security^

The following symptoms signal that your computer is very likely to be infected with Total Security:

PC is working very slowly

Total Security can seriously slow down your computer. If your PC takes a lot longer than normal to restart or your Internet connection is extremely slow, your computer may well be infected with Total Security.

New desktop shortcuts have appeared or the home page has changed

Total Security can tamper with your Internet settings or redirect your default home page to unwanted web sites. Total Security may even add new shortcuts to your PC desktop.

Annoying popups keep appearing on your PC

Total Security may swamp your computer with pestering popup ads, even when you're not connected to the Internet, while secretly tracking your browsing habits and gathering your personal information.

E-mails that you didn't write are being sent from your mailbox

Total Security may gain complete control of your mailbox to generate and send e-mail with virus attachments, e-mail hoaxes, spam and other types of unsolicited e-mail to other people.