TotalWipeOut ransomware - How to remove

TotalWipeOut ransomware is designed to infect victims’ computers through bogus email attachments, silently run malicious processes in the background, stop Windows security and lock all personal files, afterward asking for a ransom for the decryption key. Found at the end of August by the MalwareHunterTeam TotalWipeOut virus is reported to be demanding for a 1XMR (USD $100) for the ability to access the encrypted files in a multi-language ransom note. However, unfortunately for the crooks, they forgot to add their contact email or even crypto-wallet address, therefore even victims that are willing to pay for their unavailable data, won’t be able to do so.

So you probably are wondering what to do in this case. TotalWipeOut ransomware can be solved by deleting the virus first and then trying to restore the files. There are no decryption tools available yet since this is a new infection, but if crooks forgot to add their email, they may have forgotten other things as well, leaving some opportunities for you to restore the precious encrypted data. Below in this article, you will find our detailed guide on how to step-by-step get rid of TotalWipeOut threat and possibly get your photos, documents, videos back.

What is TotalWipeOut ransomware

TotalWipeOut is a crypto-infection, whose main goal is to get ransom money from victims, who want to get their encrypted files back. To ensure developer’s anonymity, they ask to get the payment in cryptocurrency, this case Monero. (See why crooks are ditching Bitcoin) Ransomware type of malware is one of the most notorious threats you can end up with and you probably have heard about other famous threats like WannaCry, SamSam, Locky that easily did damage worth of millions of dollars, not only to simple users but companies as well. While TotalWipeOut ransomware is indeed a version of the same kind of dangerous virus too, judging from many factors, we assume that it was made by the beginner level crooks.

totalwipeout ransomware virus

As you may know there is an open-source Github project called HiddenTear that was uploaded years ago as an example for cyber scientists to study the ransomware mechanism but was misused by many greedy hackers, that would alter the ransom note, extension and the name of the sample cryptovirus and spread it to corporations and other internet users. TotalWipeOut ransomware is not a HiddenTear copy, yet it does not seem like a new unique brand of crypto infection and has the resemblance to a few other threats like SARansom,  NinjaLocRyuk, and Fox.

How to recogniseTotalWipeOut ransomware

  • AES algorithm encryption
  • Locked files’ extension – .TW
  • Ransom request for 1XMR (Monero)
  • Main executable file TotalWipeOut.exe
  • Ransom note: _______READ_FOR_YOUR_FILES_______

AES cipher is used by the virus to lock targeted personal files in a matter of seconds, once the infection settles in the victim’s computer. This is done at the same time as many other processes, like modifying registry, scanning the system, stopping antivirus and basically trying to prevent everything from interrupting TotalWipeOut ransomware from running successfully. Once the encryption is done and files become inaccessible for the user, who does not have the decrypting key, virus appends the .TW string to their names, so the user would see all the precious files locked and get a dose of shock, which should push them to pay the ransom.

The ransom note that is dropped on the screen is called _______READ_FOR_YOUR_FILES_______ and contains explanation in 9 languages (English, Russian, Thai, Spanish, Portuguese, Japanese, Hindi and etc. ). Judging from it we assume that it is supposed to target the broad spectrum of countries around the world, however, to be as successful as WannaCry, crooks should definitely work on adding their contact email to the ransom note, in the first place. The ransom note basically says in every language:

Hello. All of the files may have been encrypted. If this is the case, the price of the decryption tool is 1 XMR / $ 200 ~

Hola. Todos los archivos pueden haber sido encriptados. Si este es el caso, el precio de la herramienta de descifrado es 1 XMR / $ 200 ~

For more technical details and report you can take a look at the VirusTotal.com. Clearly, no matter the few mistakes TotalWipeOut is the scary and dangerous threat that should be taken care of instantly. The removal of all related files and cleaning modified registry keys should be your first and main task before even trying to unlock the files. To see what are the best methods scroll below.

How is TotalWipeOut virus distributed

Distribution of ransomware, especially not a very professional one like TotalWipeOut virus, is mainly through malspam and email phishing campaign. This way the threat developers don’t have to demonstrate technical skills in order to place the malicious TotalWipeOut ransomware in many victims’ computers. These bogus emails reach various recipients pretending to be important information from hotels, clients, employers/employees, HR, healthcare facilities, banks and etc. But the email message itself is usually short and not very descriptive, but powerful enough to cause the victim to open the attachment or click on an included hyperlink.

TotalWipeOut ransomware’s main file is TotalWipeOut.exe, but it is usually hidden with another name and different format, for example, .doc file, that asks to enable macros. This is crucial to know because sometimes we don’t look close to the sender and open whatever we get from anyone because of curiosity, resulting in malware infections. Overall ransomware like TotalWipeOut virus, have many other spreading possibilities, yet most likely they are too difficult for crooks to do.

How to remove TotalWipeOut ransomware

There are a couple of ways you can get rid of TotalWipeout virus – automatic and manual. They are both effective and can solve the infection, yet the main removal technique that will be the most helpful for you is the malware removal tool. Even the cyber veterans sometimes come across issues when deleting virtual parasites manually, because each variant is different, therefore TotalWipeOut can end up messing up registry keys or hiding its files in directories that other ransomware usually wouldn’t, furthermore give a hard time terminating them. In cases like this anti-spyware does everything for you. We recommend to try Spyhunter (they are both legitimate and great programs, but to each their own, so pick your favorite).

These security tools are made to take care of the nasty viruses of all kinds that start bothering you after your current antivirus fails or you decide to irresponsibly search online without precaution. Another great thing about the anti-malware programs is that they can help prevent further infections because of the large database they have with all the malicious URLs which will be blocked trying to send you a TotalWipeOut ransomware or any other virus. Surely, feel free to pick other programs from our Reviews page.

Automatic Malware removal tools

Download Spyhunter for Malware detection
(Win)

Note: Spyhunter trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions,

Download Combo Cleaner for Malware detection
(Mac)

Note: Combo Cleaner trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions, Refund Policy ,

How to uninstall TotalWipeOut yourself and recover locked files

As we said before, TotalWipeOut can be uninstalled manually with no additional security products. However, this is a long and challenging process, which requires attention to follow our guide below, and slightly advanced computer knowledge to handle the situation if the removal will not go as planned. If you will carefully do everything from our instructions, then TotalWipeOut ransomware will be long gone and you can start recovering your inaccessible data.

Mind you, you should not try to recover files while the TotalWipeOut virus is completely gone. That is another reason why we do prefer automatic removal tool which cleans the system and lets the user know that the threat is not present anymore, rather than just assuming that deleting it manually worked. Anyway, because there is no official decryptor released yet, you should try recovering some files with Shadow Volume Copies or with the data restoring software mentioned below in the instructions as well. Worst case scenario, just keep the locked files and wait for the decryptor.


How to recover TotalWipeOut ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before TotalWipeout has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of TotalWipeOut ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to TotalWipeout. You can check other tools here.  

Step 3. Restore TotalWipeOut ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually TotalWipeout tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover TotalWipeOut ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *