Severity scale:  

Trojan.floxif removal instructions

removal by Linas Kiguolis - - | Type: Malware

Trojan.floxif – a Trojan horse which was spread via the hacked version of CCleaner 

The illustration of Floxif trojan

Trojan.floxif is a malware[1] infection that was active during the period of August 15 and September 12, 2017, and infected more than 2 million users worldwide.[2] The virus entered machines with the help of the popular PC repair software CCleaner's executable, which cybercriminals managed to hack and insert malicious payload. After the infiltration, the Floxif virus gathered a large amount of data about the system (such as installed software, unique ID number, MAC address, etc.) and sent it off to Command and Control[3] server. Also, the malicious software is capable of downloading and installing additional threats on the system, although no evidence was discovered of it doing so.

Name Trojan.floxif
Type Trojan horse
Other detections Win32/Floxif, Trojan.floxif.trace, Win32/Floxif.A, etc.[4]
Infiltration Hacked CCleaner executable
Affected versions CCleaner (5.33.6162) or CCleaner Cloud (1.07.3191)
Active Between August 15 and September 12, 2017
Status Patched
Elimination Use reputable security software like Reimage Reimage Cleaner Intego or SpyHunter 5Combo Cleaner to get rid of malware

Floxif Trojan was installed in the main program’s executable – CCleaner.exe. Therefore, the virus entered the system if a user downloaded hacked versions of CCleaner (5.33.6162) or CCleaner Cloud (1.07.3191) programs. However, the virus was only active on a 32-bit Windows OS. Additionally, Trojan.floxif did not execute its payload if the victim was not using administrator's account.

Researchers detected several versions of the Trojan.floxif virus. However, most of them act similarly. They might steal a bunch of information about a victim, including technical details about a targeted computer, such as:

  • the name of the targeted computer,
  • the list of installed programs,
  • the list of active processes,
  • MAC addresses of the first 3 network adapters,
  • unique computer’s ID.

Besides, the so-called Trojan.Floxif malware might also track personal victim’s information, such as login credentials or credit card data. Nevertheless, it also operates as a keylogger; it might also install other malicious programs, such as ransomware, soon after connecting to its remote server.

Thus, it goes without saying that Trojan.Floxif removal is crucial to protect your computer, data and sensitive information. Users who installed CCleaner between August 15 and September 12 are advised to update the program and scan the device with reputable malware removal tool, such as Reimage Reimage Cleaner Intego or SpyHunter 5Combo Cleaner. These steps will help to terminate the Trojan.

The image of Floxif virus
Floxif virus was spreading with a corrupted version of CCleaner.

The activity of the Trojan.PRForm.A

As mentioned before, the Trojan.floxif injected malicious code to the original CCleaner’s executable. Thus, when users downloaded this program, they installed malware as well. When CCleaner malware is installed, it immediately downloads a symsrv.dll file to this directory:

C:\Program Files\Common Files\System\symsrv.dll

Furthermore, it creates a specific Windows Registry sub-key:


Besides, it might also make other modifications in the registry in order to execute malicious tasks and hide in the system. Furthermore, Floxif connects to several Windows APIs and tries to delete important system files:

%Program Files%\Common Files\System\symsrv.dll.dat

As you can see, this dangerous Trojan horse cause numerous system changes and pose a danger to the user’s privacy. Therefore, CCleaner users are urged to remove Trojan.Floxif virus from the device immediately.

Distribution of the malicious programs went to the next level

Authors of the CCleaner 5.33 virus managed to hack the original program’s executable. Therefore, they injected malicious code to a legitimate program and managed to infect around 2.27 million people who installed a compromised version of the CCleaner which was available on the developers (Piriform) website since August 15th, 2017.

Trojan.floxif malware
Trojan.floxif is malware designed to steal personal information and send it off to a remote server.

Besides, the latest research data reports that the trojan launched targeted attacks towards technology giants, such as Microsoft, Samsung, Sony, etc. It is reported that trojan affected about 20 computers[5] owned by these companies.

Security experts from Sweden report that everyone who downloaded this program might have been infected with the CCleaner virus. Thus, users should update it to the latest version immediately. Scanning the system with professional antivirus is also recommended to make sure that any malicious components were not left on the system.

Crucial steps to take after Trojan.floxif attack

To remove Trojan.floxif from the device and protect your personal information from cyber criminals, you should complete these three important tasks:

  1. Update CCleaner to 5.34 version (or higher).
  2. Run a full system scan with reputable malware removal software.
  3. Change passwords.

Updating CCleaner to the latest version may not be enough. To perform proper Trojan.floxif removal, you should also check the device with professional security software, such as Reimage Reimage Cleaner Intego. This step is necessary because hackers might still have access to your computer or install malware. Once you run antivirus or malware removal tool, all dangerous components will be eliminated.

When the Floxif is removed entirely, you should also change social network, email, banking, and other accounts’ passwords. It’s unknown what sensitive data hackers managed to steal. Thus, you have to make sure that criminals do not have access to your accounts.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Floxif virus, follow these steps:

Remove Floxif using Safe Mode with Networking

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Floxif

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Floxif removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Floxif using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Floxif. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Floxif removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Floxif and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.

It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.

About the author

Linas Kiguolis
Linas Kiguolis - Expert in social media

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Linas Kiguolis
About the company Esolutions


Removal guides in other languages

Your opinion regarding Floxif virus