DotFab Blog » Malware Removal»How to Remove Win32/Reveton Infection (Ransomware Removal Guide)

How to Remove Win32/Reveton Infection (Ransomware Removal Guide)


This article explains about the wide-spread ransomware family Win32/Reveton and how to get rid of such kind of screen locker infection. Read for more.

Win32/Reveton is a ransomware family Trojan use for online fraud and the infamous FBI virus belongs to this ransomware family which threatens almost worldwide users online since the infection is tailored to location with anywhere possibilities. So be aware and take proper precaution.

If this threat asks you to pay a fine or fine, do not pay it. The message is a fraud.

This family of ransomware is featured with a full-screen lock message, also called lock screen, which usually disables any access to the system. It pretends to be from the FBI or some other national police force and tries to scare you into paying a fine to unlock your PC.

>> See more technical details about this Reveton ransomware.

Typically, this threat gets into your computer from a drive-by download attack. Also it might have installed itself on your PC if you visit a compromised webpage. Beware of the spam email that may contain links to the compromised webpage or the infected attachment.


What to Do If Getting Infected


You can try using below provided Reveton ransomware removal guide to get rid of this infection.

Reveton ransomware removal option 1: Safe Mode with Command Prompt Restore
Reveton ransomware removal option 2: Anvi Rescue Disk removal


Removal tips: both ways may need you download the antimalware Anvi Smart Defender to follow the step by step guide all the way in order to ensure clean the infection. BTW: for any question when using the tools, feel free to contact us.


Precaution for Prevention


It is a savvy idea to take proper precaution to prevent this nasty, tricky and risky Reveton infections. Below are some prevention tips:

  • > 1. Keep your system and installed applications up to date with the latest patches.
  • > 2. Use caution when visiting webpages.
  • > 3. Make full use of the security features of your internet browsers. See guides to turn on security features of IE, Firefox and Chrome.
  • > 4. The best bet to protect Windows is always the proper security suite, includes reliable antivirus, firewall and the like. Our recommendation is besides your main antivirus installed, you also need an alternative antimalware to reduce the risks of infections since no antivirus can offer 100% protection after all.
  • Antimalware Anvi Smart Defender safe download link:
  • > 5. Also you may use some practical utilities like Anvi Ad Blocker to reduce the risks of getting infected. Here this Anvi Ad Blocker is designed to block malicious websites, malicious ads including flash ads, which are one of the most used ways to spread malware infection. You can download and try this tool below:
  • Anvi Ad Blocker download link:
  • Please note this is a trial version of Anvi AD Blocker for 15 days free use. If you want to this tool stay for longer-time protection, just conveniently click here to buy it. View more here: Easy ads-free surfing with Anvi AD Blocker
  • > 6. Deny Flash
  • Most ransomware exploits Java or Flash vulnerabilities to load the malicious code. In some cases denying or disabling flash on your system may suspend some of the Reveton ransomware and enable the user to navigate through the infected system.
  • If this not a necessity for removal, skip to the removal options below these steps. To disable (deny) flash
  • 1.Visit:
  • Deny-Flash
  • 2. Select the “Deny” radio option


More Information about Win32/Reveton



When run, some variants of Trojan Win32/Revention copy themselves to your PC with variant or ransom name, in order to be hidden and settle down.  Also it will change the registry to runs each time you start your PC.

To bypass checks in Windows so that it can run, some Reveton variants may also add their dropped copy to the Data Execution Prevention (DEP) exceptions list.

To ensure the trojans loads every time you log on, some variants of Win32/Revention create shortcut file in the startup folder of the Windows with random name consistent of letters and digits, like jw3gf8j9.lnk. The threat will run by manually clicking the shortcut.

Besides, some of the Win32/Reveton variants drop a copy of rundll32.exe in the %Userprofile%\application data or systemfolder directory with the file name lsass.exe, in order to then launch the Trojan. And some others may create a short file with the file name <random file name>.dll.lnk.



Typically, the Win32/Reveton is often installed on a PC as a result of a drive-by-download attack, for instance, perfomed by an exploit pack, or you may encounter it if you visit a compromised webpage. There are also some users saying that they get infected after the open some spam email and click the embedded link to some webpages or download the attachments which has been infected.  So be aware and take precautions accordingly.



Block you from using your PC

As part of its payload, win32/Reveton displays a full-screen page that takes over the PC desktop, rendering your PC unusable. The image is a fake warning that pretends to be from some legitimate agencies which demands the payment of a fine.

Pay the fine (obviously fake) will not necessarily return your PC to a usable state.


Below are some images of the localized lock screen of variants of Win32/Reveton family may display:

The lock screen pretending to be from United Sates Homeland Security-Removal Guide


An lock page pretending to be from the United States Department of Justice- Removal Guide

Department of justice ransomware lock screen

The lock page of another reveton ransomware infeciton localized in Lithuanian to attack Lithuanians.


The screen locker that pretends to be from the New Scotland Yard, Metropolitan Police and Strathclyde Police-Removal Guide

Metropolitan Police virus

An lock page pretending from the Bundespolizei, or German Federal Police, National Cyber Crimes Unit. -Removal Guide

Reventon lock page localized in German

Reveton ransomware lock pages that pretend to be from the FBI-Removal Guide


FBI Moneygram virus



fbi ransomware

FBI-Cybercrime-Division-ICSPA-virus USA

FBI MoneyPak virus

FBI Ultimate Game Card Ransomware removal guide->


A reventon lock screen pretending to be from the Computer Crime & Intellectual Property Sectionof the United States Department of Justice-Removal Guide

Computer Crime & Intellectual Property Section United States Department of Justice ransomware


A reveton lock screen that pretends to be from the Guardia di Finanza, or Italian Financial Guard-Removal Guide

Guardia di Finanza, or Italian Financial Guard ransomware reventon



An image of reveton lock page that pretends to be from the Cuerpro Nacional De Policia, or National Police Corps of Spain-

Cuerpro Nacional De Policia, or National Police Corps of Spain ransomware reventon lock screen


and more…

Each of these images may also has several versions. Everyone should be alerted about this fraud.


Downloads and runs other malware components


Win32/Reveton can download and run customized DLL payloads or a DLL file stored in a container file with a random name and a .pad or .pff extension. This can be either performed to download the dll to injects into the browser process (including Chrome, IE, Firefox and Opera) and display the fraudulent message, or steal information.


Modifies Internet browser settings

Some variants of Win32/Reveton may modify Internet Explorer settings by making a number of registry modifications to disable Internet Explorer security warnings, or lock the Internet Explorer toolbar, or lower Internet zone security settings, and so on.


Modifies system settings

Some variants may also modify registry entries to disable Task Manager or hide icons from appearing on your desktop.


Ends processes

To prevent you from ending the malware process, some variants of Win32/Reveton may end the process taskmgr.exe as soon as it is run.



More >>


It is noticed that the Win32/Reveton using a variety of legitimate payment and financial transfer services for the scam, including the following:


These providers have nothing to do with the Win32/Reveton.

If you believe you are a victim of fraud involving one of these services, you should contact them, along with your local authorities.


BTW: To make the message more authentic and scary, some Reveton ransomware may also take advantages of the online free services of IP addresses detection, never ever be tricked by this.


Most-spread Ransomware Infections 2013:

FBI Moneypak virus, Department of Justice Moneypak virus, FBI CyberCrime Division virus, Your Computer Has Been Blocked virus, Relodit virus, ICE Cyber Crime Center Moneypak virus, United States Courts virus, FBI “System Failure” virus, International Cyber Security Protection Alliance virus, Spamhaus Moneypak virus, Joint Chiefs of Staff Moneypak virus, Moneygram virus, Computer Crime and Intellectual Property Section CCIPS virus, U.S. Department of Homeland Security Moneypak virus, FBI Cybercrime Division ICSPA virus, United States Cyber Security virus, FBI Department of Defense virus, Mandiant U.S.A. Cyber Security virus, International Police Association ( I.P.A ) virus, Ministry of Public Safety Canada virus (a.k.a. Canadian Association of Chiefs of Police virus), Royal Canadian Mounted Police virus, Ministry of Public Safety Canada virus, AFP Ukash virus, AMCA, ACC ransomware, Internet Police Department virus, PCeU virus, Cheschire Police Authority virus, Europol Interpol virus, United Kingdom Police virus, Serious (Serios) Organised Crime Agency virus,Guardians of the Peace of Ireland Garda virus,  Centre for Critical Infrastructure Protection (CCIP) virus, New Zealand e-Crime lab virus, Arma dei Carabinieri virus, Polícia de Segurança Publica Portuguese Virus, NSA Internet Surveillance Program PRISM virus, Interpol Department of Cybercrime virus, FBI Anti-Piracy Warning Moneypak virus, Child Pornography computer blocked virus, PRISM Your Computer Has Been Locked virus, Metropolitan British Police Interpol virus, Spanish Police Virus, Uprava Kriminalistične Policije virus, Federal Department of Justice and Police virus, Internet Crime Compliant Center virus, SUISA virus, cyberlocker your computer has been blocked virus, your personal files have been encrypted cryptolocker virus, Policia Federal Mexico Virus, etc.


Reveton Ransomware Removal Guide

This tutorial suits the removal of Ukash, PaysafeCard, MoneyPak and CashU ransomware.

Removal Option 1-Safe Mode with Command Prompt Restore


Step 1> Launch your PC into Safe Mode with Command Prompt.


Remove all floppy disks, CDs and DVDs from your computer, and restart. During the start, keep pressing F8 key till the Advanced Windows Options Menu shows up and then use the arrow key on the keyboard to highlight the Safe Mode with Command Prompt option and then press Enter. See detailed instructions on how to boot Windows to Safe Mode




Note: make sure you login your computer with administrative privileges. (login as admin)


Step 2> Type explorer to access


Once the Command Prompt window appears you only have few seconds to type “explorer” and hit Enter. If you fail to do so within 2-3 seconds, the ransomware virus will not allow you to type anymore.


Command Prompt window



Step >3 Once Windows Explorer shows up browse to:

  • Win XP: C:\windows\system32\restore\rstrui.exe and press Enter
  • Win Vista/7/8: C:\windows\system32\rstrui.exe and press Enter



Step 4> Restore


Follow all steps to restore or recover your computer system to an earlier time and date (restore point), before infection.



Please note that chances are this virus may delete all of your stored restore points and then you may need to switch to option 2 to try the troubleshoot now.


Step 5> Scan bad leftovers and restart


Download, install, update and run the antimalware Anvi Smart Defender (direct download: to scan out and remove the bad leftovers in case it turns back. And then restart the computer to ensure the computer is all right.

Tips: Some ransomware can also modify your browser settings. If so, you can just reset your web browser or reinstall a new one. See guide to reset IE, Firefox and Chrome here.

BTW: after the virus removal, you are highly recommended to maintain/optimize your computer system using a tool like Cloud System Booster Cloud System Booster ( It is a computer system cleaner/optimizer which can basically maintain your system performance. If you want a deep optimization, hard disk defragment would be a good idea. You may try the Anvi Ultimate Defrag ( for efficiency defragment if the need arises.



Removal Option 2-Remove the Ransomware using Anvi Rescue Disk


In most cases of computer infected by ransomware, your PC would be totally blocked from any operation, including safe mode runing. Then, you can use the Anvi Rescue Disk to fix the issue together with the antimalware Anvi Smart Defender. Some patience and time is needed for this removal emthod. If any question in the process, please feel free to send your email below to our online Technical Support for timely help.
Below is a video of ransomware removal using Anvi Rescue Disk for your reference.


Step 1> Download the Anvi Rescue Disk iso image file


Download the Anvi Rescue Disk iso image file Rescue.iso and the USB disk production tool BootUsb.exe from Anvisoft official site. (Both are packaged in the file offered to download below.)

Direct download link:

Please kindly note that Rescue.iso is a large file to download; please be patient while it downloads.


Step 2> Record the Anvi Rescue Disk iso image to USB drive.


You can also record the iso image to a CD/DVD. We will introduce the steps to record iso image to a CD/DVD in following guide.


To record the Anvi Rescue Disk iso image to USB drive:

1. Firstly find a clean computer with correct internet connection and then connect your USB driver to the clean computer. You’d better backup your important data and format your USB drive before using it to record the iso image.

2. Locate your download folder and double-click on BootUsb.exe to start it. And then click “Choose File” button to browser into your download folder and select Rescue.iso file as your source file.

USB burning


3. Select the path of USB drive, such as Drive H:

4. Click “Start Burning” to start the burn of USB Rescue Disk boot drive.

5.Please close BootUsb.exe tool after you successfully burn the file to the USB drive when you get the following message.



Now, you have bootable Anvi Rescue Disk to repair your computer.


——Alternative Option


You can also record Anvi Rescue Disk iso image to a DV/DVD. Any CD/DVD record software is fine for burn iso image. If you don’t have any, you can download and install Nero Burning ROM and ImgBurn. Here we will use Nero Burning ROM for demonstration purpose.

Please open and start Nero Burning ROM and select Burn Image from the drop-down menu of the Recorder.

CD/DVD recorder


1. Locate your download folder and select Rescue.iso file as your source file and then click Open button.




2. Click Burn button to start record the iso image. After a few minutes, you will have a bootable Anvi Rescue Disk to repair your computer.


burn compiliation


Step 3> Configure your infected computer to boot from the USB drive/DV/DVD


Restart your infected computer and configure it to boot from USB drive/DV/DVD that recorded Anvi Rescue Disk.

Basically , you can use F8 to load USB boot menu.

For different motherboard, you may need to use the Delete or F2, F11 keys, to load the BIOS menu. Normally, the information on how to enter the BIOS menu is displayed on the screen at the start of the OS boot.

boot menu instruction


The keys F1, F8, F10, F12 might be used for some motherboards, as well as the following key combinations:

  • • Ctrl+Esc
  • • Ctrl+Ins
  • • Ctrl+Alt
  • • Ctrl+Alt+Esc
  • • Ctrl+Alt+Enter
  • • Ctrl+Alt+Del
  • • Ctrl+Alt+Ins
  • • Ctrl+Alt+S

If you can enter Boot Menu directly then simply select your CD/DVD-ROM as your 1st boot device.

If you can’t enter Boot Menu directly then simply use Delete key to enter BIOS menu. Select Boot from the main BIOS menu and then select Boot Device Priority. After that, set USB drive or CD/DVD-ROM as your 1st Boot Device. Save changes and exist BIOS menu.


Step> 4 Boot your computer from Anvi Rescue Disk.


After that let’s boot your computer from Anvi Rescue Disk.

1. Restart your computer. After restart, a message will appear on the screen: press any key to enter the menu. So, press Enter or any other key to load the Anvi Rescue Disk

2. please selected your preferred language and press Enter to continue.

Anvi Rescue disk language setting


Step> 5 Run the Anvi Rescue Disk to scan and repair.


1. Now you are in the mini Operating system, please double-click Rescue tool to start Anvi Rescue disk.

Anvi Rescue Disk
Important note: make sure that your computer is connected to network connection before you run a scan on your computer. If you fail to connect your computer to Internet, please check the tutorial on network configuration in this article: Network Troubleshooting Tips for Ransomware Removal Using Anvi Rescue Disk

Connection established


2. Please run a full scan by clicking the “Scan Computer” button in the middle of the program to detect and kill the PC lockup virus.


Anvi Rescue disk scan


3. Clicking “Fix Now” to Remove the detected threats detected by Anvi Rescue Disk.

Anvi Rescue disk fix now


4. Switch to Repair tab. Scan and fix the registry error with the “Repair” module of Anvi Rescue Disk.


Anvi Rescue disk repair


Important Notice: You must repair the registry error after kill the virus. Otherwise, you would be disabled to boot your Windows without fixing registry damaged by the virus.


Step>6 Download Anvi Smart Defender antimalware to ensure a clean computer.


After the repair, your computer should be clean and resuced from the evil claw of the ransomware infection. However, many professionally crafted ransomware variants have evolved to be very persistant, that is to say, harder to remove, so you are highly recommended to download the antimalware Anvi Smart Defender by clicking Yes button on the prompted window to fulfill the download.


Download ASD in Rescue Disk


After the download, please restart your computer to normal Windows mode and then go to the folder: C:\Users\[username]\Downloads

Find the downloaded file asdsetup.exe and double click its file to install it and then start it to perform a full scan on your computer sytem, in order to ensure the computer is clean from any associated infections or leftovers.

After the scan, remove any detected infections and then you can have a clean computer now.

Tips: Some ransomware can also modify your browser settings. If so, you can just reset your web browser or reinstall a new one. See guide to reset IE, Firefox and Chrome here.


BTW: after the virus removal, you are highly recommended to maintain/optimize your computer system using a tool like Cloud System Booster Cloud System Booster ( It is a computer system cleaner/optimizer which can basically maintain your system performance. If you want a deep optimization, hard disk defragment would be a good idea. You may try the Anvi Ultimate Defrag (downoad: for efficiency defragment if the need arises.