How to remove Rapid V3 Ransomware and decrypt .no_more_ransom, .nano, .ezymn and .rpd files

Standard

Rapid V3 Ransomware (a.k.a Rapid 3.0 Ransomware) is new iteration of notorious Rapid Ransomware. This version uses AES encryption algorithm and can append following extensions to user files: .no_more_ransom, .ezymn, .rpd, .[5-random-characters]. Currently, there is no decryptor with confirmed working capacity for Rapid V3 Ransomware. However, using backups, recovery software or other advices from this page can help you recover encoded files. Virus uses the same template for ransom note. Some variation create ransom note with name: How Recovery Files.txt. Rapid V3 Ransomware extorts 0,7 BitCoins (BTC) for recovering files from decryption. Users can contact developers using e-mail demonslay335@rape.lol, which is reference to and mockery of a famous security researcher from Bleeping Computer forum, who has nickname “demonslay335”. There is information about the victims from the following countries: USA, Iran, Germany, Japan, Benin, South Korea, Indonesia, Spain, Malaysia, India.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close