How to remove Adware and Malware - SELF HELP


Got your PC infected with malicious trojan. No need to worry, you can get all your PC related problem fixed by following the link given below:
Are you the owner of ? or Promoting it in someway ?
Why not just mention or link to the actual software involved for the disinfection? For Adguard Members Which is "SpyHunter-Installer". . .
SpyHunter's scanner is for malware detection. You have the choice of buying SpyHunter for malware removal.
Which is Not a free software, and I don't know what or why this site link you've given "links" to a file showing a different hash ??? Then original software. . .
SHA256: c271a85476adf0981d51f40b0ff9cbba54a5c1a00009f176c1085544203d9abf
SHA256: 394338b4dca049c9bdd630d823f2a400967689240d49d60946c6c9db56376dbc

Your posted link is an informational Guide of sorts for MANUAL and Automatic Removal - IT'S THAT Automatic Removal Tool THAT I'm CONCERNED WITH ! as well as the link given to other than the developer and vender as original software.

Facts: = VirusTotal results -
Detection ratio: 1 / 64
Analysis date: 2017-06-08 05:43:42 UTC
Detection ratio: 1 / 64 = URL Scanner Result - Fortinet - Malware site

Affiliate Discloser (affiliate marketing) - posted on this site:
DISCLAIMER>Terms Of Use>8. Governing Law
Any claim relating to web site shall be governed by the laws of the State of Delhi, India without regard to its conflict of law provisions.

This Software downloaded from
SHA256: c271a85476adf0981d51f40b0ff9cbba54a5c1a00009f176c1085544203d9abf
File name: SpyHunter-Installer.exe
Detection ratio: 1 / 59
Analysis date: 2017-06-08 06:53:55 UTC
Detection ratio: 1 / 59 = FILE Scanner Results - Malwarebytes - PUP.Optional.SpyHunter

Detection ratio: 1 / 61
Analysis date: 2017-06-08 21:13:54 UTC

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This Software downloaded from
SHA256: 394338b4dca049c9bdd630d823f2a400967689240d49d60946c6c9db56376dbc
File name: SpyHunter-Installer.exe
Detection ratio: 1 / 61
Analysis date: 2017-06-08 06:55:45 UTC
Detection ratio: 1 / 61 = FILE Scanner Results - Malwarebytes - PUP.Optional.SpyHunter

Detection ratio: 0 / 64
Analysis date: 2017-06-08 05:44:43 UTC
Detection ratio: 0 / 64 = Clean site

Then SpyHunter homepage download gives this-

My post is for passing on the information that I've found out to my fellow Adguard Members - that's all :)
Gass :D
Last edited:


Beta Tester
I am still liking Malwarebytes 3.0 because it has a Ransomware detector which is extremely important currently, it is still slightly buggy but much better and worth a look, NO I don't sell it, I'm just a lifetime licensed user of Malwarebytes


7 Free Ransomware Decryption Tools for Windows

Over the past few years ransomware has been on the rise, and more and more computer users are being affected by them. Once your system gets infected with ransomware, it encrypts all your data and holds it for a ransom (usually asking a few hundred dollars to unencrypt) that there's no guarantee of.
Ransomware is profitable for its creators and very devastating for the users. Thankfully, many researchers and security firms have created free decryption tools to decrypt the files or data encrypted by ransomware. If you are affected by ransomware, here are some free ransomware decryption tools that can help you get your data back.

A Few Things to Know

(1.) Before using any ransomware decryption tool, make sure that you’ve removed the infection from your system with a capable and up-to-date anti-virus or anti-malware software. Otherwise, the ransomware may encrypt all your files as soon as you decrypt them. If on a Windows machine be sure to do a software update and patch anything that's currently offered to the threat or your system.

(2.) There is no universal decryption tool to decrypt the data encrypted by ransomware. So before using a ransomware decryption tool, you first need to identify the ransomware. Once identified, you can use the decryption tool specifically designed to deal with that ransomware. Generally, you can identify the ransomware by simply looking at the warning message presented by the ransomware (take a screenshot) or by the extension of an encrypted file.

(3.) Each ransomware decryption tool has its own instructions on how to use it. So do read the usage guide thoroughly before using the decryption tool.

1. NoMoreRansom -
Considering the severity of ransomware, a joint campaign called NoMoreRansom was initiated by Intel Security, Europol, Dutch National Police, and Kaspersky Lab. This coalition educates users and provides free decryption tools to recover encrypted data. As of writing this, NoRansomware website has more than 40 decryption tools supplied by different security researchers, firms, and other members of the organization. If you don’t know which ransomware attacked your system, upload two sample files from your PC. As soon as you upload them, the website will identify the ransomware and provide you with the required decryption tool, if available.

2. Rakhni Decryptor -
Rakhni Decryptor is designed by Kaspersky Lab to decrypt files encrypted by some of the more famous ransomware. These ransomware varients include Rakhni, Agent.iih, Aura, Crysis (version 2 and 3), Autoit, Rotor, Pletor, Lamer, Lortok, Cryptokluchen, Chimera, Democry, and TeslaCrypt (version 3 and 4). Rakhni Decryptor is also updated to decrypt files encrypted by Dharma ransomware.

3. Rannoh Decryptor -
Rannoh Decryptor was also developed by Kaspersky Lab. Just like Rakhni Decryptor, Rannoh can decrypt files encrypted by Rannoh, CryptXXX (versions 1, 2 and 3), Fury, Cryakl, AutoIt, Polyglot aka Marsjoke, and Crybola. Kaspersky Lab has also released several other ransomware decryption tools to help you decrypt data encrypted by other ransomware.

4. Emsisoft Ransomware Decryption Tools -
Emsisoft released several free ransomware decryption tools to quickly decrypt files encrypted by some of the major ransomware. These ransomware variants include but are not limited to BadBlock, Apocalyse, Xorist, ApocalypseVM, Stampado, Fabiansomware, Philadelphia, Al-Namrood, FenixLocker, Globe (version 1, 2, and 3), OzozaLocker, GlobeImposter, NMoreira, CryptON, Cry128, and Amnesia (version 1 and 2). Just identify the ransomware you were infected with and download the decryptor, if available

5. Avast Ransomware Decryption Tools -
Just like Emsisoft, Avast released several ransomware decryption tools. Using the provided tools you can decrypt data encrypted by AES_NI, BTCWare, CrySiS, HiddenTear, NoobCrypt, SZFLocker, XData, Alcatraz Locker, FindZip, etc. Just head over to the download page, identify the ransomware using the instructions and download the decryption tool.

6. AVG Ransomware Decryption Tools -
AVG also released multiple decryption tools for ransomware like Apocalypse BadBlock, Bart, Crypt888, Legion, SZFLocker, and TeslaCrypt. The good thing is the AVG download page tells you how to identify the said ransomware and helps you download the appropriate decryption tool.

7. WanaKiwi -
Most are probably familiar with the recent WannaCry ransomware which successfully spread to more than 100 countries. WanaKiwi is based on Wanadecrypt and provides a simple way to decrypt or recover the files encrypted by WannaCry. The decryptor supports Windows XP, Windows Vista, Windows 7, Windows Server 2003 and 2008. However, the caveat is that it can only recover your files if the system has not been rebooted after the infection. If your system is rebooted or if the Wannacry process has been killed, WanaKiwi cannot recover your files.

NOTE: Some of these 7 duplicate some of the others in their offerings, then one question to ask yourselves is how your going to download them on an already infected system (so some advanced planning is needed), I would caution against restarting or shutting down your system after an infection, but by all means disconnect it's internet connection till you have and understand a remedy. (That's just me though and you can do as you wish).
This is just passing on some knowledge to my fellow Adguard Members. PS: hope I was right to say "FREE" in my title as I believed most are, if not all are.
Edited from original Sourced contents:

Gass :D


New Member
Quite interesting but this post is outdated I'm afraid. Written in 2016, things have changed a lot. You don't need to install multiple antimalware or excessive bloatware to get rid of those pesky adwares and malware.

[ TL;DR New Updated Security Manual Guide Here - ]

The fact that
you should
absolutely avoid software like CCleaner Or AVG Or Any other AVAST Owned/Maintained products in 2020 should be in Bold. Reason being :

1. CCleaner was hacked to push a malicious update to hack into almost 3 million of its consumers 2017 [] 2017

AVAST Online Security & Avast Secure Browser were caught spying on its users in 2019 [ ]

3. Avast's Owned & Maintained Internal Server was hacked and breached & Let Hackers Have Access To Their System For Two weeks! []

Malwarebytes is no more considered A top choice in free antimalware range of products following Low malware signature database qualities and poor management like pushing buggy updates that causes chaos among its consumers [ ]

Adding Excessive Tools like PUP cleaner will just bloat your system
. Almost all the good antimalware detect unwanted hidden installers as PUP today.

And A lot more correction to be done in this guide. To save you folks time and the fact that Im bored in COVID19 lockdown crises, I wrote a whole new Detailed guide from the scratch which includes Free, Secure & Reliable [at the time of writing] products and advice to secure your Windows/Mac/Linux/Android/iOS, For absolutely no cost. Here is The Updated May 2020 Self-Help Guide [Prevent Breach Or Recover From Breach] -

Improving the new guide is always welcomed.

Behold The Journey To A Better & Secure Digital Life, Lets Work Together :)