How to uninstall PrimaryIndexer adware
Written by Tomas Meskauskas on (updated)
What is PrimaryIndexer?
PrimaryIndexer is designed to serve advertisements, promote the Safe Finder website (by opening it through akamaihd.net) and change certain browser settings to the address of a fake search engine. In this way, the app functions as adware and a browser hijacker.
Research shows that PrimaryIndexer can read sensitive information as well. Commonly, people do not download adware intentionally and, therefore, apps of this type are categorized as potentially unwanted applications (PUAs).
In most cases, apps such as PrimaryIndexer serve banners, coupons, surveys, pop-ups and others. When clicked, they open dubious websites and, in some cases, cause unwanted downloads and installations by executing certain scripts.
Adware-type applications often collect browsing data (e.g., entered search queries, addresses of visited websites, IP addresses, geolocations). PrimaryIndexer can read sensitive data such as passwords, credit card details, telephone numbers and other personal information as well.
These details are misused to steal accounts, identities, and make fraudulent purchases, transactions, etc. Therefore, users who have PrimaryIndexer installed on the browsers and/or computers might become victims of identity theft, suffer monetary loss, lose access to personal accounts, experience problems relating to browsing safety, online privacy or other issues.
Additionally, this app changes browser settings to promote the address of a fake search engine. Generally, apps that are designed to promote fake search engines modify settings such as the address of the default search engine, homepage, and new tab.
Therefore, people are forced to visit a specific address when they open a browser, new tab, or enter search queries into the URL bar. Commonly, users cannot undo those changes as long as the app that made them is installed. These are the main reasons why PrimaryIndexer cannot be trusted and should never be downloaded or installed.
Name | Ads by PrimaryIndexer |
Threat Type | Adware, Mac malware, Mac virus. |
Detection Names | Avast (MacOS:AdAgent-L [Adw]), AVG (MacOS:AdAgent-L [Adw]), ESET-NOD32 (A Variant Of OSX/Adware.Synataeb.C), Kaspersky (Not-a-virus:HEUR:AdWare.OSX.Adload.h), Full List (VirusTotal). |
Additional Information | This application belongs to the Adload malware family. |
Symptoms | Your Mac becomes slower than normal, you see unwanted pop-up ads, you are redirected to dubious websites. |
Distribution methods | Deceptive pop-up ads, free software installers (bundling), fake Flash Player installers, torrent file downloads. |
Damage | Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites, loss of private information. |
Malware Removal (Mac) | To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
PrimaryIndexer is very similar to many other apps of this type including, for example, VentureSprint, RotatorAssist and OperationArchive.
Developers often advertise PUAs as useful and legitimate applications, however, they are useless and designed only to display advertisements, gather data, and promote fake search engines. If PrimaryIndexer or other adware-type software is already installed on the browser and/or computer, remove it immediately.
How did PrimaryIndexer install on my computer?
In most cases, people download and install adware and other PUAs when they click deceptive advertisements, or when they download/install other programs that have unwanted apps included into the set-ups as 'additional offers'.
Unwanted downloads and installations through deceptive ads occur when PUAs execute certain scripts, however, this happens only if people click them. As mentioned, PUAs are commonly downloaded and installed through download/installation set-ups.
Typically, information about these additionally-included apps can be found in "Custom", "Advanced", and other similar settings, however, many people leave these settings unchanged, thereby allowing additional PUAs to infiltrate with their regular software.
How to avoid installation of potentially unwanted applications
To prevent unwanted downloads and installations, download all software only from official websites and through direct download links. It is not safe to use third party downloaders, installers, unofficial websites, Peer-to-Peer networks or other such tools to download or install your software - they are often used to distribute PUAs and malicious apps.
Check "Custom", "Advanced" and other similar settings and decline offers to download or install additionally-included apps. Do not to click advertisements that appear on on dubious web pages. When clicked, these can open untrusted websites or cause unwanted downloads and installations.
Remove any unwanted extensions, plug-ins, and add-ons installed on the browser, and programs of this kind installed on the operating system immediately. If your computer is already infected with PrimaryIndexer, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate this adware.
Pop-up window displayed once PrimaryIndexer installation is complete:
PrimaryIndexer redirecting users to Safe Finder website via akamaihd.net:
PrimaryIndexer installed on Safari:
PrimaryIndexer installation folder:
Instant automatic Mac malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is PrimaryIndexer?
- STEP 1. Remove PrimaryIndexer related files and folders from OSX.
- STEP 2. Remove PrimaryIndexer ads from Safari.
- STEP 3. Remove PrimaryIndexer adware from Google Chrome.
- STEP 4. Remove PrimaryIndexer ads from Mozilla Firefox.
Video showing how to remove PrimaryIndexer adware using Combo Cleaner:
PrimaryIndexer adware removal:
Remove PrimaryIndexer-related potentially unwanted applications from your "Applications" folder:
Click the Finder icon. In the Finder window, select "Applications". In the applications folder, look for "MPlayerX", "NicePlayer", or other suspicious applications and drag them to the Trash. After removing the potentially unwanted application(s) that cause online ads, scan your Mac for any remaining unwanted components.
Remove adware-related files and folders
Click the Finder icon, from the menu bar. Choose Go, and click Go to Folder...
Check for adware generated files in the /Library/LaunchAgents/ folder:
In the Go to Folder... bar, type: /Library/LaunchAgents/
In the "LaunchAgents" folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - "installmac.AppRemoval.plist", "myppes.download.plist", "mykotlerino.ltvbit.plist", "kuklorest.update.plist", etc. Adware commonly installs several files with the exact same string.
Check for adware generated files in the ~/Library/Application Support/ folder:
In the Go to Folder... bar, type: ~/Library/Application Support/
In the "Application Support" folder, look for any recently-added suspicious folders. For example, "MplayerX" or "NicePlayer", and move these folders to the Trash.
Check for adware generated files in the ~/Library/LaunchAgents/ folder:
In the Go to Folder... bar, type: ~/Library/LaunchAgents/
In the "LaunchAgents" folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - "installmac.AppRemoval.plist", "myppes.download.plist", "mykotlerino.ltvbit.plist", "kuklorest.update.plist", etc. Adware commonly installs several files with the exact same string.
Check for adware generated files in the /Library/LaunchDaemons/ folder:
In the "Go to Folder..." bar, type: /Library/LaunchDaemons/
In the "LaunchDaemons" folder, look for recently-added suspicious files. For example "com.aoudad.net-preferences.plist", "com.myppes.net-preferences.plist", "com.kuklorest.net-preferences.plist", "com.avickUpd.plist", etc., and move them to the Trash.
Scan your Mac with Combo Cleaner:
If you have followed all the steps correctly, your Mac should be clean of infections. To ensure your system is not infected, run a scan with Combo Cleaner Antivirus. Download it HERE. After downloading the file, double click combocleaner.dmg installer. In the opened window, drag and drop the Combo Cleaner icon on top of the Applications icon. Now open your launchpad and click on the Combo Cleaner icon. Wait until Combo Cleaner updates its virus definition database and click the "Start Combo Scan" button.
Combo Cleaner will scan your Mac for malware infections. If the antivirus scan displays "no threats found" - this means that you can continue with the removal guide; otherwise, it's recommended to remove any found infections before continuing.
After removing files and folders generated by the adware, continue to remove rogue extensions from your Internet browsers.
Remove malicious extensions from Internet browsers
Remove malicious Safari extensions:
Open the Safari browser, from the menu bar, select "Safari" and click "Preferences...".
In the preferences window, select "Extensions" and look for any recently-installed suspicious extensions. When located, click the "Uninstall" button next to it/them. Note that you can safely uninstall all extensions from your Safari browser - none are crucial for regular browser operation.
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Safari.
Remove malicious extensions from Google Chrome:
Click the Chrome menu icon (at the top right corner of Google Chrome), select "More Tools" and click "Extensions". Locate all recently-installed suspicious extensions, select these entries and click "Remove".
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Google Chrome.
Remove malicious extensions from Mozilla Firefox:
Click the Firefox menu (at the top right corner of the main window) and select "Add-ons and themes". Click "Extensions", in the opened window locate all recently-installed suspicious extensions, click on the three dots and then click "Remove".
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Mozilla Firefox.
▼ Show Discussion