Remove NRansom Reborn Virus - Restore Encrypted Files

Remove NRansom Reborn Virus – Restore Encrypted Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article will help you remove NRansom Reborn virus effectively. Follow the ransomware removal instructions provided at the end of the article.

NRansom Reborn is a cryptovirus that encrypts your files and demands a ransom to get them restored back to normal. The NRansom Reborn virus wants you to send fifteen nude photos to a protonmail address in order to get the unlock code for the ransom screen and get access back to your files. Continue to read the article and see how you can recover your files.

Threat Summary

NameNRansom Reborn
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer machine and demands that you play a game to recover them.
SymptomsThe ransomware will encrypt some of your files. All locked files will become unusable after their encryption.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by NRansom Reborn


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss NRansom Reborn.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

NRansom Reborn Virus – Infection Techniques

NRansom Reborn ransomware might spread its infection in various ways. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you execute it in any way – your computer system will become infected. You can see the detections of such a file on the VirusTotal service shown below:

NRansom Reborn ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful, could also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware found in the forum section.

NRansom Reborn Virus – A Closer Look

NRansom Reborn is a virus that encrypts your files and shows a window with instructions on the screen of your computer system. This virus appears to be a new variant of the nRansom Ransomware.

NRansom Reborn ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

After encryption the NRansom Reborn virus shows the following screen:

That ransom message states the following:


I have finally awaken

Your computer has been locked. Don’t worry, your
files are safe and are easily accessible by closing
But how do you close this window?
The button at the bottom will close this window.
However, it will only close if you have the unlock
Getting the unlock code is easy. Go to protonmail
and send an email to me. my address is
Send me 15 of your nudes and
then I will give you the unlock code

The code goes here—–> Unlock
Hitler did nothing wrong

The note of the NRansom Reborn ransomware states that your files are encrypted and that you need an unlock code to get your files back to normal. The ransomware author want you to send fifteen nude photos with a message to the following email address:


However, you should not contact the cybercriminals or pay any ransom. Continue to read below to see how you could unlock your files.

NRansom Reborn Virus – Encryption Process

What is known for the encryption process of the NRansom Reborn ransomware is that every file that gets encrypted will become unusable.

The full list with the targeted extensions of files which are sought to get encrypted is currently unknown and if it becomes known, it will be posted here as an update to the article.

The files used most by users and which are probably encrypted are from the following categories:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

The ransomware might not even have an unlock code, which effectively returns all of your files back to normal. If the code is found, the article will get duly updated.

An unlock code has been found by the malware researcher Michael Gillespie. That unlock code is the following:


The NRansom Reborn cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

If your computer device was infected with this ransomware and your files were locked, know that your system might have leftover files of the ransomware or some other malware or both. It is always a good idea to scan your computer with a security program to make sure it is clean and that your computer is better protected against similar threats. Read below how you can prevent further access of the ransomware and to protect your personal computer in the future.

Remove NRansom Reborn Virus and Restore Encrypted Files

If your computer got infected with the NRansom Reborn ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.


Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share