How to uninstall the MicroLookup adware from the operating system?
Written by Tomas Meskauskas on
(updated)
How to remove MicroLookup from Mac?
What is MicroLookup?
Typically, users do not download and install adware intentionally, for this reason MicroLookup (and other adware-type apps) is categorized as potentially unwanted application (PUA). It is known that MicroLookup is distributed via deceptive installer that is designed to look like the installer for Adobe Flash Player. This app generates advertisements and modifies browser's settings - it functions both as advertising-supported app and a browser hijacker. It is worthwhile to mention that quite often such apps collect browsing-related and/or other information as well.
In most cases apps like MicroLookup generate coupons, banners, surveys, pop-ups and/or ad other types of advertisements. It is common that when those ads get clicked, they open various questionable website or cause download and/or installation of some potentially unwanted application by executing certain scripts. This particular app modifies web browser's settings as well - it changes the address of a default search engine, homepage and new tab to the address of some fake search engine. In other words, it is designed to open a certain address when users open a browser (or new tab), or enter search queries into URL bar. Typically, browser hijackers promote fake search engines that do not generate any unique results or they generate results that may include links to untrustworthy sites. Additionally, it is likely that MicroLookup collects various information. For instance, browsing data such as IP addresses, entered search queries, addresses of opened/visited sites, geolocations. Although, it is possible that it collects sensitive information too. In such case its developers may sell gathered information to third parties (potentially cyber criminals) or they could misuse it to generate revenue in other ways. Therefore, it is not safe to have apps like MicroLookup installed on browsers and/or computers, their users may become victims of identity theft, encounter issues related to online privacy, browsing safety, and/or other problems.
Name | Ads by MicroLookup |
Threat Type | Adware, Mac malware, Mac virus |
Detection Names | Avast (MacOS:Adload-AD [Trj]), AVG (MacOS:Adload-AD [Trj]), ESET-NOD32 (A Variant Of OSX/TrojanDownloader.Adload.AE), Kaspersky (Not-a-virus:HEUR:AdWare.OSX.Cimpli.k), Full List (VirusTotal) |
Additional Information | This application belongs to Adload malware family. |
Symptoms | Your Mac becomes slower than normal, you see unwanted pop-up ads, you are redirected to dubious websites. |
Distribution methods | Deceptive pop-up ads, free software installers (bundling), fake Flash Player installers, torrent file downloads. |
Damage | Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites, loss of private information. |
Malware Removal (Mac) | To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
MicroLookup is very similar to many other apps, for example, WebAdviseSearch, PublicCharacterSearch, AimSearch. They are similar because are distributed via fake installers, serve advertisements and promote fake search engines. Another thing that most of them have in common is that they are useless to their users - their main purpose is to generate revenue for their developers. Either way, adware, browser hijackers and PUAs of other types should not be downloaded and installed.
How did MicroLookup install on my computer?
MicroLookup is distributed by disguising its installer as the installer for Adobe Flash Player. It is common that fake installers are used to distribute not only apps like MicroLookup but also malicious programs like Trojans, ransomware-type programs. Also, PUAs can be and often are distributed via through download and installation setups of other programs. Typically, users can decline offers to download and/or install included apps via "Custom", "Advanced" or other settings, or by unticking certain checkboxes that are available in download and/or installation setups. If users complete downloads and/or installations without doing that, they download and/or install PUAs as well. This marketing method for promotion of PUAss is known as "bundling". Additionally, unwanted downloads or installations can be caused by clicking deceptive advertisements, however, only the ones that are designed to run certain scripts.
How to avoid installation of potentially unwanted applications?
Software should be downloaded from official, legitimate websites and via direct links. Various third party downloaders, installers, Peer to-Peer networks (like torrent clients, eMule), questionable websites, etc., should not be used neither to download or install any software. Download and installation setups that contain settings like "Advanced", "Custom", or some checkboxes should be checked for offers to download and/or install unwanted, additionally included apps. Advertisements on untrustworthy websites should not be clicked, they can be designed to open other pages of this kind, or cause unwanted downloads, or even installations. If there are any unwanted, suspicious extensions, plug-ins or add-ons installed on a browser, then they should be removed. The same applies to programs of this kind that are installed on the operating system. If your computer is already infected with MicroLookup, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate this adware.
Files related to MicroLookup adware that need to be removed:
- ~/Library/Application Support/com.MicroLookup/MicroLookup
- ~/Library/Application Support/com.MicroLookupDaemon/MicroLookup
- ~/Library/LaunchAgents/com.MicroLookup.plist
- ~/Library/LaunchDaemons/com.MicroLookupDaemon.plist
IMPORTANT NOTE! Rogue setups/apps that promote the MicroLookup adware are designed to create a new device profile. Therefore, before taking any further removal steps, perform these actions:
1) Click the "Preferences" icon in the menu bar and select "Profiles"
2) Select the "MicroLookup" profile and delete it.
3) Perform a full system scan with Combo Cleaner anti-virus suite.
After performing these actions, you can proceed with further removal steps for this adware/browser hijacker.
Instant automatic Mac malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited three days free trial available.
Quick menu:
- What is MicroLookup?
- STEP 1. Remove MicroLookup related files and folders from OSX.
- STEP 2. Remove MicroLookup ads from Safari.
- STEP 3. Remove MicroLookup adware from Google Chrome.
- STEP 4. Remove MicroLookup ads from Mozilla Firefox.
Video showing how to remove adware and browser hijackers from a Mac computer:
MicroLookup adware removal:
Remove MicroLookup-related potentially unwanted applications from your "Applications" folder:
Click the Finder icon. In the Finder window, select "Applications". In the applications folder, look for "MPlayerX", "NicePlayer", or other suspicious applications and drag them to the Trash. After removing the potentially unwanted application(s) that cause online ads, scan your Mac for any remaining unwanted components.
Remove ads by microlookup related files and folders:
Click the Finder icon, from the menu bar. Choose Go, and click Go to Folder...
Check for adware-generated files in the /Library/LaunchAgents folder:
In the Go to Folder... bar, type: /Library/LaunchAgents
In the “LaunchAgents” folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - “installmac.AppRemoval.plist”, “myppes.download.plist”, “mykotlerino.ltvbit.plist”, “kuklorest.update.plist”, etc. Adware commonly installs several files with the same string.
Check for adware generated files in the /Library/Application Support folder:
In the Go to Folder... bar, type: /Library/Application Support
In the “Application Support” folder, look for any recently-added suspicious folders. For example, “MplayerX” or “NicePlayer”, and move these folders to the Trash.
Check for adware-generated files in the ~/Library/LaunchAgents folder:
In the Go to Folder bar, type: ~/Library/LaunchAgents
In the “LaunchAgents” folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - “installmac.AppRemoval.plist”, “myppes.download.plist”, “mykotlerino.ltvbit.plist”, “kuklorest.update.plist”, etc. Adware commonly installs several files with the same string.
Check for adware-generated files in the /Library/LaunchDaemons folder:
In the Go to Folder... bar, type: /Library/LaunchDaemons
In the “LaunchDaemons” folder, look for recently-added suspicious files. For example “com.aoudad.net-preferences.plist”, “com.myppes.net-preferences.plist”, "com.kuklorest.net-preferences.plist”, “com.avickUpd.plist”, etc., and move them to the Trash.
Scan your Mac with Combo Cleaner:
If you have followed all the steps in the correct order you Mac should be clean of infections. To be sure your system is not infected run a scan with Combo Cleaner Antivirus. Download it HERE. After downloading the file double click combocleaner.dmg installer, in the opened window drag and drop Combo Cleaner icon on top of the Applications icon. Now open your launchpad and click on the Combo Cleaner icon. Wait until Combo Cleaner updates it's virus definition database and click "Start Combo Scan" button.
Combo Cleaner will scan your Mac for malware infections. If the antivirus scan displays "no threats found" - this means that you can continue with the removal guide, otherwise it's recommended to remove any found infections before continuing.
After removing files and folders generated by the adware, continue to remove rogue extensions from your Internet browsers.
Ads by MicroLookup removal from Internet browsers:
Remove malicious extensions from Safari:
Remove ads by microlookup related Safari extensions:
Open Safari browser, from the menu bar, select "Safari" and click "Preferences...".
In the preferences window, select "Extensions" and look for any recently-installed suspicious extensions. When located, click the "Uninstall" button next to it/them. Note that you can safely uninstall all extensions from your Safari browser - none are crucial for normal browser operation.
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Safari.
Remove malicious plug-ins from Mozilla Firefox:
Remove ads by microlookup related Mozilla Firefox add-ons:
Open your Mozilla Firefox browser. At the top right corner of the screen, click the "Open Menu" (three horizontal lines) button. From the opened menu, choose "Add-ons".
Choose the "Extensions" tab and look for any recently-installed suspicious add-ons. When located, click the "Remove" button next to it/them. Note that you can safely uninstall all extensions from your Mozilla Firefox browser - none are crucial for normal browser operation.
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Mozilla Firefox.
Remove malicious extensions from Google Chrome:
Remove ads by microlookup related Google Chrome add-ons:
Open Google Chrome and click the "Chrome menu" (three horizontal lines) button located in the top-right corner of the browser window. From the drop-down menu, choose "More Tools" and select "Extensions".
In the "Extensions" window, look for any recently-installed suspicious add-ons. When located, click the "Trash" button next to it/them. Note that you can safely uninstall all extensions from your Google Chrome browser - none are crucial for normal browser operation.
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Google Chrome.
Click to post a comment