Severity scale:  

Reveton. Virus description and removal steps (2018 update)

removal by Ugnius Kiguolis - -   Also known as Trojan:Win32/Reveton.A | Type: Ransomware

Reveton – a malicious ransomware virus mimicking governmental authorities to swindle users' money

Reveton Trojan

Reveton – a dangerous ransomware[1] application which is known to display a fake governmental notice to its victims. Typically, it claims that the user was caught while performing illegal actions on his/her computer. The virus also disables its victims from using the computer/mobile device properly and requires specific ransom for unblocking it. Also known as Trojan:Win32/Reveton, this harmful program has mostly been spreading around Europe (Spain, France, Turkey, Italy),[2] the US, and other world's regions. Typically, crooks behind Reveton ransomware claim that they are representing a particular law enforcement authority which is situated in the victim's location. After starting infecting Windows OS, it switched to mobile devices. While it is unknown how active this malware is at the moment of writing, hackers who had used it for generating the money are known to be sentenced.[3]

Name Reveton 
Category Trojan horse/Ransomware
detected as Trojan:W32/Reveton; Ransom:Win32/Reveton; TROJ_REVETON.SM4; TROJ_REVETON.SM6
Users affected Users located in Europe, USA, Middle East
Purpose To lock the desktop screen and demand a ransom to unlock it
Can be tricky Once the virus locks the screen, it claims to be from a law enforcement authority (e.g., FBI, Police, etc.)
Distribution Dubious programs, spam emails
Deletion Install ReimageIntego and get rid of the infection ASAP

Reveton ransomware can be recognized as %USERPROFILE%\Start Menu\Programs\Startup\[reveton_filename].dll.lnk on Windows XP, and as %USERPROFILE%\AppData\Roaming\Microsoft\Windows\StartMenu\Programs\Startup\[reveton_filename]dll.lnk on Windows 7. As you can see from its location, it sets itself for launching once the PC is rebooted. 

If you see signs showing you the Reveton, e.g. you cannot use your computer, you are urged to pay a particular price to unlock your computer screen, your program's don't work, your computer's desktop is covered by an unusual warning, do not rush to follow commands of cybercriminals. We recommend staying away from any contact with these crooks as their main aim is to swindle the money. Even if you transfer the demanded payment, there is no guarantee that the crooks will keep their promise and unlock your desktop.

Nevertheless, Reveton can also be filled with other damaging abilities that are familiar with other Trojan infections. For example, such viruses might perform various actions in the background, monitor internet activities, run software without the user's permission and even seek for stealing personal information that can be found in the infected computer. 

If you overcome such infection, you need to remove Reveton as it is not just a Trojan that acts like a screen-locking ransomware-type virus. It can also install another malware on your computer or steal your personal data. For such purpose, we suggest using anti-malware tools such as ReimageIntego. Make sure you get rid of the threat as soon as you spot the first symptoms to avoid damaging consequences.

Be quick to perform the Reveton removal. After you do so, make sure you take some precautionary measures in the future. Trojans[4] can come together with regular software, or the harmful payload can be dropped as a spam message to the victim's email box. Be careful while performing any actions on the Internet.

Reveton virus Reveton - a dangerous infection which urges ransom to unlock the desktop screen. However, it can also act as a typical trojan horse.

Avoid serious malware by following tips of security experts

According to IT experts[5], various malware forms such as Trojans or ransomware-type viruses often distribute through spam messages. Crooks drop harmful payload straight to victims' email boxes. Virus-related content comes in the form of an attachment clipped to the phishing message or as a dubious link. If you click on such components and activate the damaging payload – you can get your computer infected with a serious infection.

Furthermore, various malware can spread widely throughout questionable web pages or software that is downloaded by using third-party installers. Avoid damaging consequences by installing strong antivirus protection. Make sure you keep the security tool always updated. If taken care of properly, this type of software will protect your system from various damaging components that might slip in the system secretly.

Get rid of Reveton without any delay

If you want to remove Reveton virus, you need to choose a professional anti-malware tool for such purpose. We recommend picking ReimageIntego, SpyHunter 5Combo Cleaner, or Malwarebytes. These types of programs will let you deal with the infection as effectively as possible. However, if you are thinking about manual elimination, notice that such a method is not possible for those who do not have experience in such situations.

After you perform the Reveton Trojan removal, make sure you do not forget to do one more necessary step. You need to carry out some system backups to make sure that the cyber threat has vanished successfully and there are no more damaging components left. Take care of your computer in the future – pay attention while browsing the web, do not open dubious email attachments and regularly update your antivirus program.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Reveton Trojan, follow these steps:

Remove Reveton Trojan using Safe Mode with Networking

Reboot your computer to Safe Mode with Networking by using these instructions:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Reveton Trojan

    Log in to your infected account and start the browser. Download ReimageIntego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Reveton Trojan removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Reveton Trojan using System Restore

Activate the System Restore feature and disable the virus. Follow these steps:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Reveton Trojan. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that Reveton Trojan removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Reveton Trojan and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

Removal guides in other languages

  1. Whambo says:
    July 1st, 2012 at 4:47 pm

    I dont know if the people here are vendors or what. Read below if you really want this thing off your computer…


    Start computer in safe mode WITH NETWORKING. Follow directions below. If safe mode is an issue, there is a way to get to your desktop in normal mode with possible conditions below

    Download, update, and run Malwarebytes FREE version from (If you have nerer heard of it and dont feel good about downloading it after getting burned by this virus already, just google it, there is information everywhere telling of its effectiveness.) These days you DO need to register for the free version, but its the only program that really roots garbage like this out. If you are having trouble getting onto the internet with safe mode (Be sure to choose safe mode with networking) there is a way to unlock your computer in normal mode. Read below.


    Windows Vista Home Premium – 64bit, Service Pack 2 and using the Aroura variant of the Firefox browser


    1: Start the infected computer normally. Let it start completely so the malware has a chance to start too.

    2: Press Ctrl+Alt+Delete to bring up the screen that lets you open up the task manager. (If you have tried this already you know that when you try to bring up the task manager it just returns you to the FBI threat page. This is not what were going for here… So dont worry. Go on to step 3.)

    **This is where timing comes into play. Youre going to have to be quick here.**

    3: After pressing Ctrl+Alt+Delete there should be a red power-down button/icon in the lower right hand corner of the screen. (It is an icon, not a button with text) Press the power down button and be ready to act quickly.

    4: As the computer shuts down the FBI page should disappear and you should be able to see your desktop for a moment. (How long this is probably depends on the speed of your computer, but all should give you long enough to do what you need to do here.) While you can see your desktop as the computer is shutting down double-click any program/program-shortcut there. If things go for you as they did for me, a screen should pop up telling you that there are programs are still running, giving you a choice to “Force Shutdown” or “Cancel”. CHOOSE “CANCEL” QUICKLY.

    5: You should have control of your PC at this point in normal mode. This enables you to have your full range of options for removal. After you have reached this point you need to download or update Malwarebytes and run the program. (If you want to run another virus scan you trust first, go for it. But Malwarebytes should be run as well. I intend to run it 3 times to check for stray files.)

    Good Luck!

  2. support says:
    July 2nd, 2012 at 7:26 am

    Thank you for the input but, MalwareBytes in not the only one product which removes spyware. In fact there are lots of spyware parasites where removal with rkill and malware bytes are far more complicated than using other reputable antispyware solution.

    We recommend malwareBytes along with other reputable products and testing which is the most optimal solution.

  3. Norman says:
    July 10th, 2012 at 2:36 am

    The way I got rid of it was by rebooting in safe mode with network (Used the F8 button on the keyboard), running MalwareBytes then Norton Power erase lastly. Both Malwarebytes and Norton power erase are free.

  4. Alexander Alesenko says:
    July 24th, 2012 at 2:12 pm

    Believe it or not guys, I just kill one on my XP by turning power switch off. With all viriety of this ransomware I cant say for sure was it Reveton or just some scripted replica. Though, if I got this one, then this simple way might help someone to remove it also.

  5. don says:
    August 13th, 2012 at 5:49 pm

    Help, the fbi window pops up in safe more too, any ideas?

  6. John says:
    August 17th, 2012 at 5:19 pm

    i have microsoft security essentials, and it is preventing and quarantining the impact of the FBI screen, but not removing the visus, but allows me to get the right SW to do that. it detects it hitting my PC about every 2 secs and puts it in quarantine.

  7. John says:
    August 30th, 2012 at 8:08 pm

    Also Microsoft as 2 different programs that you ban download and install to a self booting CD or USB stick using a clean computer of the same architect. (32 bit or 64 bit) The work by booting the computer into a pe environment which allows them to scan and remove the virus/malware having a chance to run. Also there is at least 1 program to unhide what the program has hidden (only if you have not cleared the temp files). I have used the Microsoft programs on infected computers that would not boot properly with good results. Also sometimes the malware installs a root kit which most antimalware and antivirus programs have problems with and it re-installs itself with every re-boot. Also consider using an anti-rootkit scanner to cure the recurrent portion of the problem.

  8. Thomas says:
    January 29th, 2015 at 2:03 am

    Whambo, I did the exact thing you described to get my desktop back in my control, just took a little time to figure it out. Wish Id had seen your post, but it does work. However, Malwarebytes did not find the Trojan for me, even after supposedly successfully updating and running a scan. I had to use a USB to reboot via a Hitman Pro reboot, described in other articles. With my particular Trojan, safemode or any sort did not work.

  9. Thomas says:
    January 29th, 2015 at 2:11 am

    To clarify a bit, I was able to use my infected PC to download Hitman Pro via a USB drive and start the process of Trojan removal. The next day, after another update, Malwarebytes DID find some baddies and removed them.

  10. al hayman says:
    March 16th, 2015 at 11:03 pm

    ICSPA (Reveton Trojan) rode in on an Adobe upgrade, and seized the machine. Jumped the firewall and the virus protector (McAfee). Was able to boot to safe mode and then go to a restore point a few days earlier. Then downloaded a new virus protector and it cleaned the system.

    Check the name of the Trojan in your registry by regedit, and then CTRL F with the name of the Trojan. Delete each entry. Do a “Find Next” till no more entries appear. The malware hides all over the place.

Your opinion regarding Reveton Trojan