How to remove TEST ransomware and restore .test files

That article is about Test virus that penetrates users' machines around the world, and encrypt their files. Here you can find important information about Test (Cryptomix) virus, ransomware removal and decryption tips.

Test ransomware virus

TEST is a new variant of CryptoMix virus. It changes file name's to unconnected letters like IDJRNC93IDNQC12LDS93NCSFD AND adds .TEST extension. Ransomware infects computer mostly with help of e-mail spam and Trojans. Occasionally fraudsters use exploits to take control over the PC, but they are speedily corrected. When infection takes place, ransomware reviews the hard disc, determines the quantity of folders to be cyphered and their general price. Currently, any modern ransomware knows how to encrypt video, image, text and audio info in all most used extensions. Ransomware cyphers all folders, but the ones that could be business documents go first. All software in the system will be untouched because scammers are interested only in information. The operation is performed via famous RSA and AES algorithms, and its intricacy is so high that it can't be bruteforced. This is the base for unbelievable effectuality of ransomware in recent years: common PC operator, even having a fairly good experience in suchlike things, won't ever be able to get back the files, and will need to pay the price. The sole manner to decrypt the information is to find the fraudster's webpage and obtain the master key. Sometimes it is possible to withdraw these keys through faults in viruse's program code. _HELP_INSTRUCTION txt file appears in each folder with encrypted files.

Test ransomware virus

For all kinds of undesired software, one statement is true: it's much easier to prevent it than to cure it. Unfortunately, most people understand the significance of computer literacy just when ransomware infects their machines. To protect your workstation, you have to understand a few simple rules:

    • Monitor the condition of your machine. Information encryption is a complex act that uses a lot of PC resources. In few minutes of infection, the CPU speed decreases, and the encrypting process emerges in Process Manager. You may anticipate this event and shut down the computer before information will be totally spoiled. Surely, some information will be damaged, but the rest of them will remain intact.
    • Do not admit any changes to the system, coming from unknown programs. If the laptop is infected by virus, it will seek to delete all copies of the data, to make the decryption less possible. However deleting of shadow copies requires admin rights and confirmation from the user. If you'll stop for few seconds before confirming the changes, it can save your files and your money.
    • Be careful with the messages that contain something more than a message. The #1 pattern of scam letters is the notification about prize winning or package obtaining. You also should be careful with business correspondence, especially if the sender's address and the content is unknown. lawsuits, reports, Invoices for goods or services, summaries and suchlike sensitive documents don't come without warning, and you, as a minimum, should know the sender. In all other cases it is a fraud.

Virus removal isn't solution of the whole issue - it's just a first move on the long road before the complete data recovery.


Attention! All Your data was encrypted!

For specific informartion, please send us an email with Your ID number:

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Please send email to all email addresses! We will help You as soon as possible!


To recover the data you should follow the advices in the special chapter of this entry. In case of ransomware we don't publish manual removal instruction, because its complication and the likeliness of errors is too high for common customer. We do not recommend anyone to delete the virus in manual mode, since it has numerous defensive mechanisms that could counteract you. Many malware can totally delete cyphered information, or part of it, when trying to uninstall the virus. To avoid this, follow the advices below.

Removal instruction

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner


Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

bwd  Instructions 1/2  fwd

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

If you performed all actions, described in above paragraph - it's time to restore the files. It's impossible to decypher the data, but we'll recover them via Windows functionality and the extra software. There are the few exceptions, but usually file recovery takes plenty of time and money. If you can't wait and are going to get back the data by hand - here's the useful entry on that topic: article about files decryption.

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.