Severity scale:  

Remove Hermes 2.0 ransomware / virus (Decryption Methods Included) - Virus Removal Instructions

removal by Olivia Morelli - - | Type: Ransomware

The number of Hermes 2.0 ransomware attacks proliferates after the initial Hermes version gets decrypted

Today we have a sample of Hermes 2.0 virus, which we are going to describe in a minute. It is common that once malware analysts manage to crack a ransomware and release a decrypter for it, a new version of the virus emerges shortly[1]. This is exactly what happened with Hermes ransomware virus – a malware analyst Fabian Wosar analyzed a sample of Hermes and demonstrated how a decrypter is created[2]. The researcher released almost 4-hour length video[3] showing how he analyzed the virus behavior. It seems that Hermes ransomware authors have learned a thing or two from the video as well, as they rushed to release Hermes 2.0 malware shortly after Fabian’s video was publicized. The new ransomware version is improved, and it is unlikely that it will be easy to reverse this one. Just like the previous version, it seeks to collect ransoms; however, we highly recommend you not to pay it (in case this virus manages to intrude into your PC system) and remove Hermes 2.0 virus using a reliable malware removal tool such as Reimage Reimage Cleaner Intego or Malwarebytes.

Hermes 2.0 ransomware is written in C++ language[4]. After invading the computer system, it encrypts files using an RSA-2048 algorithm and puts some information in a file called DECRYPT_INFORMATION.html, which it saves on the desktop and possibly some other locations in the computer system. This .html file is actually a ransom note, which cybercriminals create only to deliver information on how the victim can recover his/hers files. The ransomware also creates a file called UNIQUE_ID_DO_NOT_REMOVE, which holds victim’s unique ID number. After completing these tasks, the ransomware deletes Volume Shadow Copies[5] by running this command: vssadmin Delete Shadows /all /quietvssadmin.
Hermes 2.0 ransomware virusDECRYPT_INFORMATION.HTML file, which Hermes 2.0 ransomware leaves in all compromised computers.

Questions about Hermes 2.0 ransomware virus

The virus doesn’t inform the victim about the version of the virus – just like the previous virus, it displays HERMES RANSOMWARE at the top of the ransom note. The virus asks to contact ransomware authors via email and suggests sending them three encrypted files, which criminals “kindly” suggest decrypting because they want to convince the victim that their decryptor works. Remember that such frauds will do everything to convince you to pay them, but do not expect to get anything in return! Cyber criminal can just simply take your money and make off. Their aim is to convince you to pay, not to care about you after you pay the ransom fee. Therefore, we suggest you think about Hermes 2.0 removal because as long as it stays in the system, it becomes much more vulnerable to further computer threats.

How did Hermes 2.0 virus get into my PC?

Hermes 2.0 ransomware is likely to be distributed using traditional ransomware distribution techniques – you can get this virus via email or alongside an illegal download, so think twice before opening that email attachment sent to you by a stranger or executing keygens and other programs designed to bypass paid software registration. Cyber criminals definitely know what files or programs engage victims’ attention, so they will do their best trying to provide you with them. Be very careful because criminals might try to impersonate employees of Amazon, Paypal, or even healthcare organizations just to trick you into opening a malicious email attachment that they send out to thousands of computer users. If you opened a questionable email attachment recently, it could be the reason why Hermes malware contaminated your PC. Please, be aware of general ransomware distribution techniques and do not let cyber criminals deceive you ever again!

Hermes 2.0 removal tutorial

Although Hermes ransomware used to be a fearsome virus and despite the fact that it wasn’t that powerful (if compared to other ransomware viruses such as Locky or Cerber), you should not stop applying security patches to your computer system. As you can see, a new version of the ransomware was released, and if you are reading this line at the moment, it is likely that you are looking for instructions on how to remove Hermes 2.0 virus. Our team recommends installing and continuously updating Reimage Reimage Cleaner Intego software because we believe it is one of the top anti-malware programs nowadays, which can help you with Hermes 2.0 removal. Before you let anti-malware program to do its job, run the computer in Safe Mode with Networking first.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Hermes 2.0 virus, follow these steps:

Remove Hermes 2.0 using Safe Mode with Networking

The first thing you need to do when you try to remove a ransomware virus is to prepare your PC for this task. To avoid any unexpected interruptions, restart your computer using instructions given below. These guidelines are meant to help you with Hermes 2.0 removal.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Hermes 2.0

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Hermes 2.0 removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Hermes 2.0 using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Hermes 2.0. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Hermes 2.0 removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Hermes 2.0 from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If Hermes 2 encrypted your files, most likely you will not be able to restore them (at least for a while). In such situations, backup is needed. We really hope that you have a backup because in terms of ransomware attacks, backup is the only way to avoid a complete data loss. However, if you do not have it, you should try one of these data recovery options.

If your files are encrypted by Hermes 2.0, you can use several methods to restore them:

Data Recovery Pro

There is no 100% guarantee that Data Recovery Pro will restore your files, but it doesn’t hurt to try, right? This program is designed to recover corrupted, deleted, or missing files, and it might help you in this situation, too.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Hermes 2.0 ransomware;
  • Restore them.

System Restore Point

Try this method if you are sure that you created a System Restore Point in the past.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Hermes decryptor

If Hermes 2.0 Decryptor will ever be created, we assume that the initial version, which is available to download here (Hermes Decryption Tool), will be updated, too.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Hermes 2.0 and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions


  1. Dzeus says:
    March 16th, 2017 at 9:40 am

    Thank you for your help. I will try to remove Hermes ransomware now…

  2. neringa says:
    March 16th, 2017 at 9:41 am

    I cannot believe how stupid I was. My curiosity killed my files. Why did I have to open that damned email attachment???

  3. Leenie says:
    March 16th, 2017 at 9:42 am

    Such a fancy name for such a stupid virus.

  4. Teyana89 says:
    March 16th, 2017 at 9:42 am

    I have a backup, so I dont need to worry about my files. Thanks God! And my husband, for telling me to backup data!

Your opinion regarding Hermes 2.0 ransomware virus