Step-by-Step Malware Removal Instructions

Tdsshark.xyz POP-UP Scam (Mac)
Mac Virus

Tdsshark.xyz POP-UP Scam (Mac)

rdsshark.xyz is one of many deceptive websites used to deceive visitors into downloading and installing various applications. Generally, these web pages promote potentially unwanted applications (PUAs), however, it is possible that they will also promote legitimate apps. In any case, websites t

PoulightStealer Malware
Trojan

PoulightStealer Malware

As its name suggests, PoulightStealer is a malicious program that steals various information. The cyber criminals responsible might use the details to generate revenue. Research shows that PoulightStealer targets applications such as FileZilla, Steam, Skype and Telegram, however, other apps might

ProcessSign Adware (Mac)
Mac Virus

ProcessSign Adware (Mac)

ProcessSign is one of many potentially unwanted applications (PUAs) categorized as adware. Adware serves various intrusive advertisements. Furthermore, these apps often track and record information. Note that users often download and install PUAs inadvertently. Generally, adware such as Pr

SearchSkilledData Adware (Mac)
Mac Virus

SearchSkilledData Adware (Mac)

SearchSkilledData belongs to a family of adware-type applications called AdLoad. Therefore, this application is designed to display various advertisements. Research shows that SearchSkilledData promotes a fake search engine and might gather various information. This app operates as adware and a

Coronavirus Face Mask Email Virus
Phishing/Scam

Coronavirus Face Mask Email Virus

"Coronavirus Face Mask" is a scam email designed to proliferate Agent Tesla malware. The message uses the coronavirus pandemic to further its scheme. The email claims that recipients can order disposable face masks and forehead thermometers, however, rather than providing information concerning t

SearchZilla Browser Hijacker
Browser Hijacker

SearchZilla Browser Hijacker

SearchZilla is advertised as an app which improves the browsing experience. In fact, it changes browser settings to promote feed.search-zilla.com, the address of a fake search engine. Apps that operate in this way are classified as browser hijackers. Note that, as well as promoting fake search eng

Neshta Malware
Trojan

Neshta Malware

Neshta is malicious software that infects executable (.exe) system files and uses them to collect system information. It might also target removable storage devices and network shares. Neshta sends the information to a web server controlled by cyber criminals. Research shows that this malware is

Tongda2000 Ransomware
Ransomware

Tongda2000 Ransomware

Discovered by Jirehlov, Tongda2000 is one of many ransomware-type programs designed to encrypt files, change filenames and create/display ransom messages. Tongda2000 renames all files by appending "1" to their extensions. For example, it renames a file named "1.jpg" to "1.jpg1", and so on. It cre

Easy File Convert Promos Adware
Adware

Easy File Convert Promos Adware

Easy File Convert Promos is advertised as a program that converts documents, images, video and audio files to various formats. In fact, it also feeds users with various advertisements and is categorized as adware. These apps are also classified as potentially unwanted applications (PUAs), since pe

My Login Hub Browser Hijacker
Browser Hijacker

My Login Hub Browser Hijacker

The My Login Hub application supposedly provides quick access to various email accounts - users can supposedly access them directly from a newly opened tab. In fact, My Login Hub is actually a browser hijacker, a potentially unwanted application (PUA). Generally, browser hijackers promote the addr