JS:ScriptPE-Inf
Posted: September 12, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 97 |
First Seen: | September 12, 2012 |
---|---|
OS(es) Affected: | Windows |
JS:ScriptPE-Inf is a general label for malicious JavaScript code; JS:ScriptPE-Inf-related attacks tend to be associated with overtly malicious or hacked websites that load browser exploits without many (or any) visible symptoms. Because JS:ScriptPE-Inf is a generic alert, its attacks can result in any number of consequences for your computer, although some of the most popular such payloads include ZeroAccess rootkits, browser hijackers, ransomware Trojans from the Ukash Virus family and FakePAV-based fake security programs. Tight browser security is paramount to blocking JS:ScriptPE-Inf attacks, and SpywareRemove.com malware researchers also recommend that you keep anti-malware software with web-browsing safety features as a second line of defense to prevent JS:ScriptPE-Inf from installing malware onto your computer.
JS:ScriptPE-Inf: Just the Humblest of the Malware Delivery Men
As a JavaScript (not to be confused with Java, a related but distinct program from the same company) program, JS:ScriptPE-Inf can be deflected by updates to JavaScript that patch its vulnerabilities, by changing your browser's settings to keep JavaScript disabled for hazardous websites or even by just uninstalling JavaScript entirely. Most anti-malware products also should include web browser-protecting features that can block JS:ScriptPE-Inf and similar forms of malicious content as they're loaded – which often occur without any visible signs. JS:ScriptPE-Inf attacks often use iFrames and/or obfuscated web addresses to circumvent default browser security.
SpywareRemove.com malware researchers have found that most attacks with JS:ScriptPE-Inf's constraints are responsible for launching drive-by-downloads to install malicious software without the victim's permission. The ultimate infection that results from a JS:ScriptPE-Inf attack can include (but isn't restricted to):
- Rootkits that infect or replace system components with their own code, allowing them to gain root access to your PC while launching themselves automatically. Many rootkits, such as Sirefef, have a habit of working in groups of multiple components that protect each other from detection and deletion.
- Spyware programs that steal confidential information (bank passwords, etc) by monitoring your activities or even injecting phishing attacks into your browser's web pages.
- Adware programs that display pop-ups, change your browser's settings or use redirects to promote websites like Search.fantastigames.com.
- Rogue security scanners that display inaccurate warnings as part of a scam to steal money in their registration processes. Examples include Real Registry Cleaner, Windows Efficiency Accelerator and Windows Recovery Series.
What to Do When JS:ScriptPE-Inf is Part of Your Web-Browsing Content
If you see alerts for JS:ScriptPE-Inf regularly, chances are high that your PC has become infected by a browser hijacker that's redirecting you to JS:ScriptPE-Inf-related content. SpywareRemove.com malware experts recommend that you use anti-malware software to remove any PC threats related to JS:ScriptPE-Inf, including any malware that's installed by JS:ScriptPE-Inf, itself. In some cases, you may see unusual error messages, pop-ups or blank web pages corresponding to JS:ScriptPE-Inf attacks, although these symptoms aren't guaranteed to appear.
JS:ScriptPE-Inf many aliases include Trojan.JS.IFrame!IK, HEUR:Trojan.Script.Iframer, Trojan.JS.IFrame, SCRIPT.Virus and JS/TrojanDownloader.Iframe.NKE, although most anti-malware programs will have their own, brand-specific labels for JS:ScriptPE-Inf.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 18.11 KB (18110 bytes)
MD5: 174ec133fea55dd462274597077b1980
Detection count: 79
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: September 13, 2012
file.exe
File name: file.exeSize: 13.54 KB (13541 bytes)
MD5: e7e3d9424b622e743fbf5165080dab0a
Detection count: 78
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: September 13, 2012
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.