Short bio

Riskware.iStealer is Malwarebytes' detection name for a commercial system monitor application distributed by Kizar Labs. Riskware.iStealer may have the capabilities to harvest stored credentials, keystrokes, screenshots, network activity, and more from computers where the software is installed. Riskware.iStealer may covertly monitor user behavior and harvest personally identifiable information including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity.

Riskware.iStealer may be capable of the covert collection of screenshots, video recordings, or the ability to activate any connected camera or microphone. Collected information may be stored locally and later retrieved, or may be transmitted to an online service or location.


Riskware.iStealer may run as a start-up entry and may be visible as running processes on compromised machines. Alternatively, Riskware.iStealer may also be configured in a manner which prevents visible processes and start-up entries.

Type and source of infection

Riskware.iStealer may be distributed using various methods. This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, this software may be installed by an individual with physical or remote access to the computer.


Malwarebytes protects users from the installation of Riskware.iStealer.

Malwarebytes detects and removes Riskware.iStealer.


Malwarebytes can detect and remove many Riskware.iStealer infections without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Malwarebytes removal log

A Malwarebytes log of removal will look similar to this:

Malwarebytes www.malwarebytes.com

-Log Details- Scan Date: 3/26/18 Scan Time: 11:37 PM Log File: e5113647-3180-11e8-8224-00ffc8517b86.json Administrator: Yes

-Software Information- Version: Components Version: 1.0.322 Update Package Version: 1.0.4500 License: Premium

-System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: DE-WIN7\Fwiplayer

-Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 295863 Threats Detected: 4 Threats Quarantined: 0 (No malicious items detected) Time Elapsed: 2 min, 47 sec

-Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect

-Scan Details- Process: 1 Backdoor.Agent, C:\USERS\FWIPLAYER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\DON.EXE, No Action By User, [1051], [36025],1.0.4500


Registry Key: 0 (No malicious items detected)

Registry Value: 0 (No malicious items detected)

Registry Data: 0 (No malicious items detected)

Data Stream: 0 (No malicious items detected)

Folder: 0 (No malicious items detected)

File: 2 Backdoor.Agent, C:\USERS\FWIPLAYER\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\DON.EXE, No Action By User, [1051], [36025],1.0.4500 Trojan.PasswordStealer, C:\USERS\FWIPLAYER\APPDATA\ISTEALER 6.3 LEGENDS.EXE, No Action By User, [3590], [83662],1.0.4500

Physical Sector: 0 (No malicious items detected)



Associated files: iStealer.exe

Select your language

New Buy Online Partner Icon Warning Icon