Remove Rapid V1 Virus and Restore .no_more_ransom Files

Remove Rapid V1 Virus and Restore .no_more_ransom Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Rapid v1 Virus image ransomware note .no_more_ransom  extension

The Rapid V1 virus has been released with a new strain that encrypts target user data with the .no_more_ransom extension. This new version shows that the criminals behind it are interested in its continued development. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus.

Threat Summary

NameRapid V1 virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .no_more_ransom extension and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Rapid V1 virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Rapid V1 virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Rapid v1 Virus – Update November 2018

November 2018 brings a newer variant of the Rapid v1 Virus to the cybersecurity sphere. The following ransom note is the updated version for Rapid v1 Virus:

The ransom note states:

Hello, dear friend!

All your files have been ENCRYPTED

Do you really want to restore your files?

write to our email – or
and tell us your unique ID – NWFCC3AN

As you can see above, the note remains almost the same, but offers two email addresses for contacting the cybercriminals, instead of one. These two emails are the following:


With that the other parts of the Rapid v1 Virus remain more or less the same. If anything new arises related to the ransomware, this article will get duly updated.

Rapid v1 Virus – Distribution Ways

A new release of the Rapid v1 virus shows that there is continued interest in spreading this particular ransomware. The newly devised strains use the most common methods as the earlier releases.

One of the most popular distribution methods is the coordination of SPAM messages. They are designed to appear as legitimate notifications that are regularly received by computer users. The virus files can be either attached directly or linked in the body contents.

A similar strategy is to create fake web pages that can coerce the users into thinking that they have accessed a legitimate vendor site or download portal. These two methods are commonly used to spread malicious payloads. A common form is inclusion of malicious macros in documents of various types: rich text documents, presentations, spreadsheets and databases. Once they are opened by the users a notification prompt will pop-up asking them to enable the built-in content. If this is done the virus infection will begin. The other payload mechanism is the construction of a virus setup file — this is done by taking the real application installers of well-known software and manipulating them with the Rapid v1 code. The criminals typically choose popular choices — from creativity suites to system utilities.

All kinds of scripts can be used to aid the infections — banners, pop-ups and ads.

Rapid v1 Virus – In-Depth Analysis

The Rapid v1 attacks that utilize the .no_more_ransom extension represent an updated release of the same ransomware family. It is very likely that the same common model of infection is followed. This prescribes that the first actions will feature a data collection component. It can scan the infected system for the presence of information that can be of use to the hackers. This module can harvest personal data about the victims which can be used to expose their identity. Other data that is harvested includes campaign metrics that can optimize the ongoing attacks by hijacking user settings, operating system values and a list of the installed hardware components.

This information can then be processed by Rapid v1 virus’s stealth protection — a module that has the ability to scan the system for any applications or services that can interfere with the correct execution of the threat. This part of the engine can bypass or altogether delete anti-virus programs, sandbox environments and virtual machine hosts.

Following the successful infiltration of the hosts a variety of different operating system changes can follow. A dangerous modification is the change of Windows Registry entries. When they affect the operating system overall performance will suffer. And when strings belonging to user-installed software are changed then certain functions may not be accessible.

The associated Rapid v1 virus infection engine can identify and delete Shadow Volume Copies and System Restore Data. This means that the victims will need to resort to the use of a quality restore solution.

Following this a Trojan component can be started. A typical case would be the creation of an encrypted connection to a hacker-controlled server. It allows the criminals to spy on the victims in real-time, take over control of their computers and deploy other threats as prescribed.

The Rapid v1 virus and its .no_more_ransom extension variant is configured on a modular framework which allows criminals to further customize the threats.

Rapid v1 Virus — Encryption

Once all prior components have complete the associated ransomware component will be launched. It uses a built-in list of target file type extensions which typically processes the following data:

  • Archives
  • Documents
  • Databases
  • Music
  • Images
  • Videos

The processed files will be renamed with the .no_more_ransom extension. The ransomware note may have different names, one of the captured versions contains the following message:

Hello, dear friend!
All your files have been ENCRYPTED
Do you really want to restore your files?
Write to our email –
and tell us your unique ID-

Remove Rapid V1 Ransomware Virus and Restore .no_more_ransom Files

If your computer got infected with the Rapid V1 ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.


Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus


  1. AvatarDanny

    Please give me the best solution to restore all my encrypted files followed bu the extension .no_more_ransom.

  2. AvatarAaron C
  3. AvatarSemy

    Je pense avoir chopé la dernière version….
    En revanche aucun moyen d’installer spyhunter….Je peux l’installer en mode sans échec ou pas ?
    Merci d’avance

    1. AvatarMilena Dimitrova

      Hi Semy,
      SpyHunter’s installation will only work in normal mode, so for the automatic removal to work, please boot back into normal mode from Safe Boot.

  4. AvatarEliodoro

    el pasado 9 de enero de 2019 fue atacado mi pc y me encriptaron los archivos, la extensión de los archivos es “*.no_more_ransom”.
    En las carpetas dejaron un fichero llamador “How Recovery Files.txt” con el siguiente texto:
    Hello, dear friend!
    All your files have been ENCRYPTED
    Do you really want to restore your files?
    Write to our email – …………

    El programa Spyhunter 5 no me ha detectado nada extraño en el sistema.
    La última copia de seguridad es de hace 2 meses.
    ¿Cómo podría desencriptar los archivos?
    Gracias de antemano

  5. Avatarluis

    Me paso lo mismos. No he encontrado solucion.


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share