Need to structure the response with sections: what it is, how to identify, steps to remove if malicious, prevention tips. Avoid technical jargon where possible. Maybe include a note about not ending processes without knowing what they do, to prevent system instability.