Severity scale:  
  (98/100)

Mercury ransomware. How to remove? (Uninstall guide)

removal by Linas Kiguolis - - | Type: Ransomware

Mercury ransomware is a file-locking virus that promises the decryption key after the ransom is transferred

Mercury ransomware
Mercury ransomware is a file locking virus which uses AES encryption to block documents on the infected PC.

Mercury ransomware is a cryptolocker which uses the AES encryption algorithm[1] to lock various files such as images, videos, audios, text documents, databases, etc. This cyber threat can reach the computer system via phishing email messages and rogue content that comes attached together. After such illegitimate infiltration, .Mercury files ransomware modifies the Windows Registry and creates multiple new entries. Moreover, the virus ads the .Mercury extension to each blocked document. After the encryption process is finished, victims receive a ransom message !!!READ_IT!!!.txt. Cybercrooks ask for a specific amount of money in Bitcoin for the decryption tool. Furthermore, criminals provide the getmydata@india.com and mydataback@aol.com email addresses as a way to make contact and discuss all payment details.

Name Mercury
Type Ransomware virus
Danger level Very high. Locks files and turns them unusable, can have other dangerous abilities
Appendix .Mercury
Ransom note !!!READ_IT!!!.txt
Contacts given getmydata@india.com,  mydataback@aol.com
Other possible features Disabling the antivirus, deleting shadow copies, eliminating files after encryption, etc.
Distribution sources Spam messages, third-party networks
Removal process Detect rogue content with Reimage and remove the virus

Mercury virus might have a wide range of other damaging abilities such as:

  • disabling the antivirus program;
  • deleting shadow volume copies of locked files;
  • stopping the Windows Recovery process;
  • automatically terminating some documents after encryption;
  • opening a path for other malware forms.[2]

As you see, Mercury ransomware might have various unpleasant abilities which might harm your computer system even more and the cyber threat will become even harder to get rid of. Furthermore, cybercriminals offer 1 file for free decryption to gain the victims' trust. However, you should NEVER believe in these people. If there is no rush and data recovery is not necessary at the moment, we suggest avoiding contact with the hackers and transferring any money to their accounts.

A better option would be to perform the Mercury ransomware removal by using strong and reliable anti-malware tools. Also, you can use a program such as Reimage or Malwarebytes MalwarebytesCombo Cleaner to detect all malware-laden components that might be hiding in your computer system. After the elimination is completed, you can start thinking about data recovery options. Our recommendation would be to take a look at the below-provided file restoring tools that might be helpful for this purpose.

Note that criminals who spread ransomware viruses always use strong encryption algorithms such as RSA, AES, or SHA. These codes are almost impossible to identify as they differ each time. Nevertheless, crooks store them on remote servers where the encryption and decryption keys are unreachable for any other people. However, remove Mercury virus and avoid unnecessary money losses by declining offers to pay the demanded ransom price.

According to cybersecurity experts from Virusai.lt,[3] it is advisable to store copies of important documents on remote devices such as USB flash drives or remote servers such as iCloud. This will allow you to protect all valuable files from the encryption of dangerous viruses such as Mercury ransomware. One more thing, if you decide to use a USB drive, make sure that you keep it unplugged from your machine when it is out of use.

Tricky emails might distribute ransomware

Cybercriminals often send tricky emails to their victims. For example, the crooks might send a message that is an imitation of a letter that came from a worldwide company such as eBay. This way victims easily get convinced to open the email message and attachments that are clipped to it. However, this might relate in the secret installation of malware. You can prevent such activity by avoiding opening emails that you were not expecting to receive recently.

Moreover, ransomware viruses can be distributed thru some third-party networks such as Torrents.[4] As these websites come improperly disclosed, they do not fit the security requirements and often lack recommended protection. Stay away from all non-original pages and eliminate all suspicious ones you enter. Moreover, be careful whenever you perform browsing activity – do not click on questionable hyperlinks, do not download unknown programs, etc.

Terminate Mercury ransomware from the system permanently

Spotting files with the .Mercury appendix means that your documents are locked by the ransomware virus. If you want to reverse such changes, first you need to remove Mercury virus from your computer system and get rid of malware-related components. For such purpose, use only reputable and expert-tested anti-malware software as other options are not available for this case – ransomware is too hard to terminate on your own.

After you perform the Mercury ransomware removal, refresh the entire computer system to make sure that all hazardous components were disabled. Also, do not forget to stay cautious to avoid similar infections in the future. Remember to take care of all valuable data by storing copies of it on remote servers or devices. Once the elimination is finished, take a look out our below-given data recovery third-party software.

Offer
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Malwarebytes.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Combo Cleaner.

To remove Mercury virus, follow these steps:

Remove Mercury using Safe Mode with Networking

Disable the virus's activity by using Safe Mode with Networking. Activate this option by performing below-given steps:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Mercury

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Mercury removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Mercury using System Restore

Turn on the System Restore function to disable the ransomware virus by following these instructions:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Mercury. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Mercury removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Mercury from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files were encrypted by the ransomware virus, you can try recovering them by performing our provided methods.

If your files are encrypted by Mercury, you can use several methods to restore them:

Use Data Recovery Pro for file restoring purposes:

This tool can truly be helpful if used as required.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Mercury ransomware;
  • Restore them.

Windows Previous Versions feature might recover locked files:

If you have enabled the System Restore function in the past, you can give this method a try.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try Shadow Explorer to recover some data:

The Shadow Explorer tool might be truly helpful for data recovery purposes, however, make sure that Mercury ransomware did not damage or delete Shadow Volume Copies of locked files.

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

No official Mercury ransomware decryptor has been released yet.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Mercury and other ransomwares, use a reputable anti-spyware, such as Reimage, Malwarebytes MalwarebytesCombo Cleaner or Plumbytes Anti-MalwareMalwarebytes Malwarebytes

About the author

Linas Kiguolis
Linas Kiguolis - Expert in social media

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Linas Kiguolis
About the company Esolutions

References