.BACKUP Files Virus (CryptoMix) – Remove + Decrypt Your Files

.BACKUP Files Virus (CryptoMix) – Remove + Decrypt Your Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created in order to explain to you what is the .BACKUP files virus nad how to remove this ransowmare from your computer plus decrypt files, encrypted by it without paying ransom.

CryptoMix ransomware has once more been updated to a newer varint, following the latest .FILE variant which came out earlier this year. The virus is now using the .BACKUP file extesnion which it ads to the files that have been encrypted by it and in addition to that, it also uses what appears to be a ransom note with the same name as the previous version, called _HELP_INSTRUCTION.TXT. This ransom note aims to get victims to to contect the cyber-criminals via one of their many e-mails, the main of which is backuppc@tuta.io. Be advised to read this article if you have fallen victim to this variant of CryptoMix, since it aims to show you how you can remove this ransomware infection and restore files that have been encrypted by it for free.

Threat Summary

Name.BACKUP Files Virus
TypeRansomware, Cryptovirus
Short DescriptionEncrypts the files on your computer and asks you to pay ransom in order to decrypt them.
SymptomsFiles are encrypted with the file extension .BACKUP added after their names and the virus also drops a ransom note, called _HELP_INSTRUCTION.TXT.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .BACKUP Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .BACKUP Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.BACKUP Files Virus – How Does It Spread

The main method which is used by the .BACKUP files ransomware is to target you via e-mail messages, mostly malicious spam. These e-mail campaigns use deceptive tactics to trick you into opening the attachments within them and they often pretend as the files attached are:

  • Invoice for a purchase.
  • An order confirmation file.
  • A fake bank account report.
  • New funds into your account.
  • Receipt.
  • A fake digital signature.

These e-mails are often pretending as if they come from big companies, like eBay, DHL, FedEx, PayPal and several others. In addition to this, the e-mails are also masked with fake claims that they originate from employees of those organizations, for example:

In addition to via e-mails, the malwar emay also use other methods to infect your PC, such as upload the infection file on torrent or other suspicious sites as a legitimate setup of a program, licence activator or a portable app of some sort.

.BACKUP Ransomware – Analysis

As soon as the .BACKUP files virus has infected your computer, it may immediately drop it’s payload files directly in the system folders of Windows:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • Receipt.
  • %Temp%

Among the malicious files is the ransom note of the .BACKUP file variant of CryptoMix ransomware. It is named _HELP_INSTRUCTION.txt and just like previous versions of this virus, it aims to get victims to contact the crooks via e-mail:

Attention! All Your data was encrypted!

For specific informartion, please send us an email with Your ID number:

Please send email to all email addresses! We will help You as soon as possible!



After this, the ransomware also drops another executable type of file in the %ProgramData% directory, which runs a script that stops some services of Windows, primarily related to the backups of your computer. This happens by running the following service stop commands in Windows Command prompt:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

The last of the commands aims to delete the shadow volume copies of the infected computer and hence make their recovery more difficult than before.

.BACKUP Ransomware – Encryption

The .BACKUP files virus starts the encryption process by firstly scanning for the files it aims to encrypt on your computer. These files include documents, videos, archives and many other often used types of files. The virus scans for them based on their file extensions, which are the following:


After this is done, the .BACKUP variant of CryptoMix ransomware also adds it’s file extension and completely renames the files as they appear to look like the image below shows:

Luckily, the fiels are decryptable for free so keep reading this article, if you have become a victim of this ransomware and want to decrypt your files for free.

Remove CryptoMix Ransomware and Decrypt .BACKUP Files for Free

In order to remove this variant of CryptoMix ransomware virus, we recommend that you follow the removal instructions underneath this article. They are divided in manual and automatic removal instructions and their end goal is to help you delete this infection whichever way seems easier for you.

After removing CryptoMix ransomware, you should follow the steps in the “Decryption Process” paragraph for .BACKUP files underneath the removal manual, so that you can decrypt your files for free, but before starting the decryption, we do advise that you backup your encrypted files, just in case.

1. Boot Your PC In Safe Mode to isolate and remove .BACKUP Files Virus files and objects
2.Find malicious files created by .BACKUP Files Virus on your PC

Automatically remove .BACKUP Files Virus by downloading an advanced anti-malware program

1. Remove .BACKUP Files Virus with SpyHunter Anti-Malware Tool and back up your data

.BACKUP Ransomware – Decryption Process

Before any decryption process by this virus begins, recommendations are to use an advanced anti-malware tool to remove the infection and then to back-up the encrypted files by creating several copies of them on different removable drives or in the cloud.

Then, we advise you to follow these steps:

Step #1: Download “CryptoMix Fix” tool from Avast’s website. Link to the download page, you can locate below:


Make sure to save the file somewhere where you can easily find it:

Step #2: Run the program and click on the “Next” button.

Step #3: Choose the drive which you want to be scanned for encrypted files and click on “Next” once more. You can also add a folder that has important files, by clicking on the “Add Folder” button on the bottom-right:

Step #4: Find an original file and it’s encrypted analogue. If you struggle finding an original file, please check the default Windows folders of a non-infected PC with the same version of Windows as yours:

→ For newer Windows (8, 8.1, 10):
For Windows 7 and earlier:

Step #5: Upload the files in the blank fields of the next step of the Avast CryptoMix Fix decryptor:

Step #6: Paste the password from your version of CryptoMix in the next field in case you know it:

And now all that is left is to run the decryptor and it will begin to do it’s magic.

.FILE CryptoMix Decryption – The Bottom Line

As a conclusion, it is vital to know that if you have decrypted your files successfully, you are in great luck, because there are many ransomware victims who still haven’t. This is why we at SensorsTechForum are committed to educating users how to avoid such infections before they even happen. To learn how to prevent ransomware viruses and other malware infections from infecting your computer via e-mail, please read the related article below:


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share