Stop redirects to and from performprogressiveuberfile.icu
Written by Tomas Meskauskas on (updated)
What is performprogressiveuberfile[.]icu?
performprogressiveuberfile[.]icu is one of many deceptive websites that should not be visited or trusted. When opened, it displays fake error messages or redirects people to other untrustworthy sites that advertise dubious applications including Advanced Mac Booster.
In fact, this app is just one example from many of apps promoted via dubious sites opened through performprogressiveuberfile[.]icu. Browsers often open performprogressiveuberfile[.]icu due to potentially unwanted apps (PUA) installed on them.
If performprogressiveuberfile[.]icu does not open another dubious website, it displays deceptive content - listing other sites disguised as the official Apple website. It informs visitors that their operating systems (for example, MacOS 10.14 Mojave) are infected with viruses.
To remove them, visitors are encouraged to scan their systems by clicking the "Start Scan", "Scan Now", or other similar button, otherwise the viruses (supposedly present on the system) will cause further damage such as loss of photos, apps, and other files.
If refreshed, performprogressiveuberfile[.]icu displays another page that contains identical information (but for a different version of MacOS) and encourages visitors to scan their systems. Clicking the buttons can initiate a fake system scan. Once finished, this offers download of another dubious application, which supposedly removes the aforementioned viruses.
In other cases, performprogressiveuberfile[.]icu opens a website that advertises an untrustworthy app. At time of research, the app was Advanced Mac Booster, however, this might vary at different times. In any case, do not trust, download, or install apps promoted on dubious websites (or those opened by other deceptive sites such as performprogressiveuberfile[.]icu).
Browsers usually open deceptive websites such as performprogressiveuberfile[.]icu due to PUAs installed on the system. Typically, these apps collect data and/or feed users with ads. They collect details such as users' IP addresses, geolocations, URLs of visited websites, entered search queries, and so on.
Developers send the data to other parties who misuse it to generate revenue. The details might include personal, sensitive information. Furthermore, many PUAs display coupons, banners, surveys pop-ups, and other intrusive ads. Once clicked, these lead to dubious websites or run scripts that start the download or installation processes of other PUAs.
Name | performprogressiveuberfile.icu pop-up |
Threat Type | Mac malware, Mac virus. |
Fake Claim | This scam site claims that it has detected a virus or opens another dubious website used to advertise an unwanted app. |
Promoted Unwanted Application | Advanced Mac Booster |
Detection Names | Forcepoint ThreatSeeker (Suspicious), Kaspersky (Malware), Full List Of Detections (VirusTotal) |
Serving IP Address | 34.233.15.214 |
Symptoms | Your Mac becomes slower than normal, you see unwanted pop-up ads, you are redirected to dubious websites. |
Distribution methods | Deceptive pop-up ads, free software installers (bundling), fake flash player installers, torrent file downloads. |
Damage | Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites, loss of private information. |
Malware Removal (Mac) | To eliminate possible malware infections, scan your Mac with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
There are more pages that are similar to performprogressiveuberfile[.]icu, for example, apple.com-mac-optimization[.]xyz, apple.com-mac-optimizer[.]icu and apple.com-shield-guard[.]live.
Typically, these pages trick people into downloading (and installing) some dubious application that supposedly remove viruses or fix other problems that were detected by a particular deceptive pages. It is never a good idea to trust these pages or use apps that are advertised on them.
PUAs that open these untrustworthy pages are usually advertised by their developers as useful, legitimate apps, however, mostthe times they just open dubious pages, feed users with ads and gather various information.
How did potentially unwanted applications install on my computer?
In most cases, people download and install apps of this type inadvertently by clicking dubious ads or when software developers use the "bundling" method. Bundling is a deceptive marketing method that developers use to tick people into downloading and/or installing PUAs with other software.
To achieve this, they include these apps in the set-ups of other programs and do not disclose the information properly. Related information is usually hidden in "Custom"/"Advanced" and other options of the settings. Furthermore, many users allow potentially unwanted apps to be downloaded or installed by default when they leave the settings unchecked and unchanged.
How to avoid installation of potentially unwanted applications
To avoid unwanted downloads/installations, do not download programs or files from untrustworthy websites, using third party downloaders, torrent clients, eMule (and other Peer-to-Peer networks), or other similar sources. Do use third party installers. All programs should be downloaded from official websites and via direct download links.
If a setup contains settings such as "Custom", "Advanced", check them and decline offers to download/install unwanted apps. Do not click intrusive ads, especially if displayed on dubious websites, since they can cause redirects to other, potentially malicious pages.
Browsers usually open dubious sites or contain ads due to PUAs. If this is the case, remove all unwanted, suspicious extensions, add-ons, and plug-ins installed on the browser and programs installed on the operating system. If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for macOS to automatically eliminate them.
Examples of fake error messages displayed by the performprogressiveuberfile[.]icu website:
Your MacOS 10.14 Mojave Is Infected With 3 Viruses:
Your system is infected with 3 viruses:
Your OS High Sierra is infected with (3) viruses!:
Installer of the Advanced Mac Booster app:
Advanced Mac Booster app:
Instant automatic Mac malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of Mac malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner for Mac
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is performprogressiveuberfile[.]icu?
- STEP 1. Remove PUA related files and folders from OSX.
- STEP 2. Remove rogue extensions from Safari.
- STEP 3. Remove rogue add-ons from Google Chrome.
- STEP 4. Remove potentially unwanted plug-ins from Mozilla Firefox.
Video showing how to potentially unwanted applications promoted via performprogressiveuberfile[.]icu scam website using Combo Cleaner:
Potentially unwanted applications removal:
Remove potentially unwanted applications from your "Applications" folder:
Click the Finder icon. In the Finder window, select "Applications". In the applications folder, look for "MPlayerX", "NicePlayer", or other suspicious applications and drag them to the Trash. After removing the potentially unwanted application(s) that cause online ads, scan your Mac for any remaining unwanted components.
Remove adware-related files and folders
Click the Finder icon, from the menu bar. Choose Go, and click Go to Folder...
Check for adware generated files in the /Library/LaunchAgents/ folder:
In the Go to Folder... bar, type: /Library/LaunchAgents/
In the "LaunchAgents" folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - "installmac.AppRemoval.plist", "myppes.download.plist", "mykotlerino.ltvbit.plist", "kuklorest.update.plist", etc. Adware commonly installs several files with the exact same string.
Check for adware generated files in the ~/Library/Application Support/ folder:
In the Go to Folder... bar, type: ~/Library/Application Support/
In the "Application Support" folder, look for any recently-added suspicious folders. For example, "MplayerX" or "NicePlayer", and move these folders to the Trash.
Check for adware generated files in the ~/Library/LaunchAgents/ folder:
In the Go to Folder... bar, type: ~/Library/LaunchAgents/
In the "LaunchAgents" folder, look for any recently-added suspicious files and move them to the Trash. Examples of files generated by adware - "installmac.AppRemoval.plist", "myppes.download.plist", "mykotlerino.ltvbit.plist", "kuklorest.update.plist", etc. Adware commonly installs several files with the exact same string.
Check for adware generated files in the /Library/LaunchDaemons/ folder:
In the "Go to Folder..." bar, type: /Library/LaunchDaemons/
In the "LaunchDaemons" folder, look for recently-added suspicious files. For example "com.aoudad.net-preferences.plist", "com.myppes.net-preferences.plist", "com.kuklorest.net-preferences.plist", "com.avickUpd.plist", etc., and move them to the Trash.
Scan your Mac with Combo Cleaner:
If you have followed all the steps correctly, your Mac should be clean of infections. To ensure your system is not infected, run a scan with Combo Cleaner Antivirus. Download it HERE. After downloading the file, double click combocleaner.dmg installer. In the opened window, drag and drop the Combo Cleaner icon on top of the Applications icon. Now open your launchpad and click on the Combo Cleaner icon. Wait until Combo Cleaner updates its virus definition database and click the "Start Combo Scan" button.
Combo Cleaner will scan your Mac for malware infections. If the antivirus scan displays "no threats found" - this means that you can continue with the removal guide; otherwise, it's recommended to remove any found infections before continuing.
After removing files and folders generated by the adware, continue to remove rogue extensions from your Internet browsers.
Remove malicious extensions from Internet browsers
Remove malicious Safari extensions:
Open the Safari browser, from the menu bar, select "Safari" and click "Preferences...".
In the preferences window, select "Extensions" and look for any recently-installed suspicious extensions. When located, click the "Uninstall" button next to it/them. Note that you can safely uninstall all extensions from your Safari browser - none are crucial for regular browser operation.
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Safari.
Remove malicious extensions from Google Chrome:
Click the Chrome menu icon (at the top right corner of Google Chrome), select "More Tools" and click "Extensions". Locate all recently-installed suspicious extensions, select these entries and click "Remove".
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Google Chrome.
Remove malicious extensions from Mozilla Firefox:
Click the Firefox menu (at the top right corner of the main window) and select "Add-ons and themes". Click "Extensions", in the opened window locate all recently-installed suspicious extensions, click on the three dots and then click "Remove".
- If you continue to have problems with browser redirects and unwanted advertisements - Reset Mozilla Firefox.
▼ Show Discussion