Jeaks Music Toolbar
Posted: November 8, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 1/10 |
---|---|
Infected PCs: | 2,989 |
First Seen: | November 8, 2011 |
---|---|
Last Seen: | October 17, 2021 |
OS(es) Affected: | Windows |
The Jeaks Music Toolbar is a Potentially Unwanted Program that provides additional links for your Web browser, most of which currently are nonfunctional (due to the age of this software, along with its dearth of updates). What functions the Jeaks Music Toolbars do have that work are concerned with promoting the Jeaks.com domain and the entities associated with it, such as online gaming websites. Malware researchers have seen evidence sufficient to categorize the site as potentially unsafe to any visitors. Therefore, deleting the Jeaks Music Toolbar with suitable PC security software is advised, if not necessarily insisted upon, for your computer's safety.
The Old-Time Tune that can Still Trouble Today's Browser
The Jeaks Music Toolbar is a PUP that claims that the Jeaks Music Toolbar provides increased access to music-related media, but has few intentions besides redirecting you to unwanted sites. The last known redirects from the Jeaks Music Toolbar were formatted to load a sub-domain of Jeaks.com, which currently redirects to an online casino website. Neither site currently has any unsafe content, although malware researchers do not recommend visiting them (for motives that will become apparent at the time of elaboration).
The Jeaks Music Toolbar's website, while lacking in exploits or threat downloads, does have a history full of other unsafe and questionable activities. These include engaging in phishing attacks that collect classified information via false pretenses, as well as benefiting from spam-related activities, such as sending e-mail advertisements. Multiple PC security companies have blacklisted the Jeaks Music Toolbar's website for these reasons, and malware experts suggest that you keep your interactions with Jeaks.com to a bare minimum.
Besides its redirects, the Jeaks Music Toolbar also has been known to attempt to update itself automatically. Modern versions of Windows appear to be able to block this activity until consent is given, which is fortunate, considering that any software that updates itself automatically is a notable security issue.
Quieting the Browser Music that Played without Asking
The Jeaks Music Toolbar has very few features that even theoretically could help your Web-browsing experience, and, like most PUPs, removing the Jeaks Music Toolbar is the default, recommended reaction to its installation. Current installation packages for the Jeaks Music Toolbars are bundled with installers for file-downloading software like eMule, and may also be included in 'premium' versions that aren't authorized by their official companies. If you bother to scan these files before launching them, a competent anti-malware product should be able to detect most bundle-installer utilities, including those that would be used for the Jeaks Music Toolbar and other toolbars.
Even though the Jeaks Music Toolbar is an old PUP whose distribution was most significant in 2008, 2014 has its fair share of identical PUPs that perform equally non-beneficial acts on your Web browser. If you are ever considering whether or not a toolbar is worth being used, take into account the reputation of the associated company. Little information or negative information usually is indicative of the relevant software 'product' being a fake, with no purpose besides generating profit off of your traffic – just like the Jeaks Music Toolbar.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%PROGRAMFILES%\Jeaks Music\JeaksSvr.exe
File name: JeaksSvr.exeSize: 221.18 KB (221184 bytes)
MD5: 8e21e9b9e987d9ba3392765ee45ca212
Detection count: 2,818
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Jeaks Music
Group: Malware file
Last Updated: November 6, 2019
jeaks-music-setup.exe
File name: jeaks-music-setup.exeSize: 699.31 KB (699319 bytes)
MD5: aee4291792a0bf58776e30743f13ad65
Detection count: 11
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 17, 2022
Registry Modifications
HKEY..\..\..\..{RegistryKeys}Software\Microsoft\Internet Explorer\Approved Extensions\{8503C2C2-8AB4-421F-9EC4-B6FF10A46A28}Software\Microsoft\Internet Explorer\Approved Extensions\{A8DA9765-6797-4E9F-9342-04163E5E7B3D}SOFTWARE\Microsoft\Internet Explorer\Toolbar\{8503c2c2-8ab4-421f-9ec4-b6ff10a46a28}SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{8503c2c2-8ab4-421f-9ec4-b6ff10a46a28}
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.