SoftwareBundler:Win32/FakeDiX
Posted: September 1, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 10,024 |
---|---|
Threat Level: | 9/10 |
Infected PCs: | 1,497 |
First Seen: | September 1, 2015 |
---|---|
Last Seen: | September 27, 2023 |
OS(es) Affected: | Windows |
You should be careful not to allow the dangerous Trojan SoftwareBundler:Win32/FakeDiX to reach your system. It has an extensive negative influence over the infected systems, and the adverse consequences may even include monetary losses. As its name suggests, SoftwareBundler:Win32/FakeDiX most often enters bundled with other programs. While most people have no clues whatsoever that they are about to install more than they have planned, SoftwareBundler:Win32/FakeDiX silently enters and roots deep into the Operating System (OS). The vicious Trojan may also insert its malicious codes into some seemingly innocent email attachments – including .pdf files and Office documents. When it settles in, SoftwareBundler:Win32/FakeDiX will create some new files in your system. If you have some knowledge about computers, you may locate %TEMP%\is-u2id6.tmp\_isetup\_shfoldr.dll and %TEMP%\is-u2id6.tmp\idp.dll. Besides the Dynamic-link library files (.dll), the malware also creates registry subkeys to make sure it will be running whenever your PC is on. This tactic also makes it hard to eradicate the cyber threat. To trouble the removal process even more, SoftwareBundler:Win32/FakeDiX injects its codes into various running processes. When the preparatory phase is over, the Trojan connects your PC to Command and Control (C&C) servers manager by the hackers. With their help, these people may steal essential personal information from your hard drives. Since the traffic goes both ways, they may also download additional types of malware. Once SoftwareBundler:Win32/FakeDiX is in control of your system, your online actions may also be recorded, and the culprits may obtain your passwords. Upon any suspicions that you may be infected, you should scan your PC to delete SoftwareBundler:Win32/FakeDiX.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.