Only Application Mac Virus

How irritating is this problem? (10 votes, average: 4.80)


This page aims to help you remove Only Application from Mac. Our removal instructions work for every version of Mac OS.

It can be quite unpleasant to get infected with a Trojan Horse like Only Application. Removing the malware can also be challenging because it can be very difficult to detect it inside the system. But letting the panic take over you is the last thing that would help you successfully remove the Trojan. That’s why we suggest you read the guide below, as it will give you some comprehensive explanation of how Only Application works, and what steps you can take to clean your computer from it.

Only Application

Only Application is a fake program that installs itself and asks for the user’s account and password credentials to initiate changes. Considering it was not installed with user consent, this makes Only Application a password-stealing trojan.


Usually, a threat like Only Application can sneak unnoticed inside your system when you interact with seemingly harmless (but compromised) links, applications, email attachments, pictures, ads, torrents, videos, or whatever other type of internet content you might think of. The moment you interact with the malicious transmitter, the Trojan typically gets inside your system without visible symptoms. Due to this stealth, in many cases, the victims may need months, or even years to realize that a damaging threat has been lurking in their computer. What is more, it is difficult to identify the malicious operations of a Trojan, as they typically run in the background of the system. This is one of the main reasons why the cyber criminals love Trojans like Only Application so much, and use them commonly as tools for the completion of various types of crimes.

What is Only Application?

Only Application is a trojan horse infecting Mac users through unknown means. It displays malevolent behavior by asking for the user to input his password, which it then sends back to whoever created Only Application.

Trojan horses can be programmed to perform a variety of illegal acts. Practically, the list might be unlimited, but below you’ll see some of the most common, and feared activities the hackers could use this kind of software for:

  • Ransomware distribution – Trojans might be engaged in distributing terrible threats like Ransomware, and other viruses. In most cases, the malware can act as a backdoor for the other virus infection, by sneaking in and creating system vulnerabilities, which can be exploited without the users’ knowledge.
  • Espionage – Hackers with malicious intentions can use a variety of spying methods on your computer with the help of the Trojan infection. The criminals can obtain any type of data they want, including your passwords, credit and debit card details, internet account details, and even your keystrokes. They may also gain access to your webcam, and mic, and spy on you, and your home.
  • System and file destruction – An infection such as Only Application can also be used to mess with your system, destroy information on your hard drive, or even crash your entire operating system. That’s why it is very important to remove the infection as quickly as possible before it manages to cause any serious and irreversible harm.

How can your system be protected?

Make sure you update your system frequently to protect it from the latest viruses, and install the latest security patches to eliminate system vulnerabilities that Trojans like Only Application, or other malware can exploit. Also, try to avoid shady or illegal websites, spam emails, suspicious advertisements, and links from unknown senders, as you never know where they may redirect you to. Still, remember that the Trojans can be very stealthy, and that’s why, for optimal protection, it is best to invest in reliable security software. If you’ve been infected with Only Application, the removal guide below will help you clean up your system, but in case you face any trouble, do not hesitate to use the professional removal tool attached to it.


Name Only Application
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Trojans rarely show visible symptoms and are hard to detect without security software.
Distribution Method  Some of the most common distribution methods include spam, torrents, infected software installers, malicious email attachments and infected links.
Detection Tool

Only Application Virus Uninstall


The first thing you need to do is to Quit Safari (if it is opened). If you have trouble closing it normally, you may need to Force Quit Safari:

You can choose the Apple menu and click on Force Quit.

Alternatively you can simultaneously press (the Command key situated next to the space bar), Option (the key right next to it) and Escape (the key located at the upper left corner of your keyboard).

If you have done it right a dialog box titled Force Quit Applications will open up.

In this new dialog window select Safari, then press the Force Quit button, then confirm with Force Quit again.

Close the dialog box/window.



Start Activity Monitor by opening up Finder, then proceed to activity-monitor

Once there, look at all the processes: if you believe any of them are hijacking your results, or are part of the problem, highlight the process with your mouse, then click the “i” button at the top. This will open up the following box:


Now click on Sample at the bottom:


Do this for all processes you believe are part of the threat, and run any suspicious files in our online virus scanner, then delete the malicious files:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result


The next step is to safely launch Safari again. Press and hold the Shift key while relaunching Safari. This will prevent Safari’s previously opened pages from loading again. Once Safari is opened up, you can release the Shift key.

On the off chance that you are still having trouble with scripts interrupting the closing of unwanted pages in Safari, you may need to take some additional measures.

First, Force Quit Safari again.

Now if you are using a Wi-Fi connection turn it off by selecting Wi-Fi off in you Mac’s Menu. If you are using a cable internet (Ethernet connection), disconnect the Ethernet cable.


Re-Launch Safari but don’t forget to press and hold the Shift button while doing it, so no previous pages can be opened up. Now, Click on Preferences in the Safari menu,

Preferences in Safari

and then again on the Extensions tab,

extensions in safari

Select and Uninstall any extensions that you don’t recognize by clicking on the Uninstall button. If you are not sure and don’t want to take any risks you can safely uninstall all extensions, none are required for normal system operation.

The threat has likely infected all of your browsers. The instructions below need to be applied for all browsers you are using.

Again select Preferences in the Safari Menu, but this time click on the Privacy tab,
Privacy in Safari

Now click on Remove All Website Data, confirm with Remove Now. Keep in mind that after you do this all stored website data will be deleted. You will need to sign-in again for all websites that require any form of authentication.

Still in the Preferences menu, hit the General tab

General Tab in Safari

Check if your Homepage is the one you have selected, if not change it to whatever you prefer.
Default Home Page

Select the History menu this time, and click on Clear History. This way you will prevent accidentally opening a problematic web page again.

firefox-512 How to Remove Only Application Virus From Firefox in OSX:

Open Firefoxclick on mozilla menu (top right) ——-> Add-onsHit Extensions next.

pic 6

The problem should be lurking somewhere around here –  Remove it. Then Refresh Your Firefox Settings.

chrome-logo-transparent-backgroundHow to Remove Only Application Virus From Chrome in OSX:

 Start Chrome, click chrome menu icon —–>More Tools —–> Extensions. There,  find the malware and  select  chrome-trash-icon.

pic 8

 Click chrome menu icon again, and proceed to Settings —> Search, the fourth tab, select Manage Search Engines.  Delete everything but the search engines you normally use. After that Reset Your Chrome Settings.

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment