{"id":1097,"date":"2017-09-22T07:41:49","date_gmt":"2017-09-22T07:41:49","guid":{"rendered":"https:\/\/www.adlice.com\/?p=1097\/"},"modified":"2022-12-21T10:33:38","modified_gmt":"2022-12-21T10:33:38","slug":"ccleaner-installe-malware-floxif","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/","title":{"rendered":"CCleaner Installe le Malware Floxif"},"content":{"rendered":"\n<p><strong>La version 5.33 du populaire logiciel de nettoyage CCleaner a \u00e9t\u00e9 compromise<\/strong> pour installer le malware Floxif en utilisant une m\u00e9thode d&#8217;injection de DLL. Les anciennes et nouvelles versions du logiciel ne sont pas affect\u00e9es, et <strong>Avast (la soci\u00e9t\u00e9 propri\u00e9taire de CCleaner) pr\u00e9tend que la mise \u00e0 jour vers la version 5.34 du logiciel supprime le malware<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mise \u00e0 jour : 21 septembre<\/h2>\n\n\n\n<p><strong><a href=\"http:\/\/blog.talosintelligence.com\/2017\/09\/ccleaner-c2-concern.html\">La soci\u00e9t\u00e9 Talos a d\u00e9couvert<\/a> que l&#8217;infection suppos\u00e9e dormante filtrait simplement les machines pour trouver des cibles sp\u00e9cifiques<\/strong> via le server C&amp;C (command and control). Apr\u00e8s avoir analys\u00e9 le code pr\u00e9sent sur le serveur, ils ont d\u00e9couvert un fichier contenant une liste de cibles potentielles, incluant <strong>Cisco, Samsung ainsi que d&#8217;autres grandes corporations<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone dt-pswp-item\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/image13.png\"><img decoding=\"async\" width=\"315\" height=\"543\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/image13.png\" alt=\"ccleaner floxif\" class=\"wp-image-1095\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/image13.png 315w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/image13-174x300.png 174w\" sizes=\"(max-width: 315px) 100vw, 315px\" \/><\/a><figcaption class=\"wp-element-caption\">Talos credits<\/figcaption><\/figure>\n\n\n\n<p>Ils ont \u00e9galement d\u00e9couvert que 20 machines appartenant \u00e0 ces organisations <strong>avaient \u00e9t\u00e9 infect\u00e9es par une deuxi\u00e8me vague de code malveillant<\/strong>. Pour le moment, nous ne savons pas ce que r\u00e9alise ce code. Une <strong>autre cl\u00e9 de registre contenant un malware (ex\u00e9cut\u00e9 plus tard par l&#8217;infection) a \u00e9t\u00e9 trouv\u00e9e<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted lang:default decode:true\">HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WbemPerf\\001\nHKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WbemPerf\\002\nHKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WbemPerf\\003\nHKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WbemPerf\\004\nHKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\WbemPerf\\HBP<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Que s&#8217;est-il pass\u00e9 ?<\/h2>\n\n\n\n<p><strong>Toutes les grandes compagnies utilisent une m\u00e9thodologie nomm\u00e9e &#8220;Int\u00e9gration et d\u00e9ploiement continu&#8221;<\/strong>, qui permet de simplifier, de rendre plus rapide et de s\u00e9curiser la mise \u00e0 jour des applications (tests y compris). Habituellement, ceci n\u00e9cessite une machine d\u00e9di\u00e9e o\u00f9 le code source est compil\u00e9 pour obtenir le nouveau fichier binaire\/installeur<strong>. <\/strong><\/p>\n\n\n\n<p><strong>Cette machine a \u00e9galement la responsabilit\u00e9 de signer le fichier d\u00e9finitif<\/strong> de mani\u00e8re \u00e0 s&#8217;assurer qu&#8217;aucune version alt\u00e9r\u00e9e de l&#8217;application ne puisse se propager en utilisant le nom de la compagnie (<a href=\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\">voir l&#8217;article concernant la signature de code<\/a>).<\/p>\n\n\n\n<p>Il est fort probable (m\u00eame si non confirm\u00e9) que <strong>cette machine ait \u00e9t\u00e9 compromise et que des hackers en aient obtenu l&#8217;acc\u00e8s<\/strong>. Ils ont alors soit modifi\u00e9 le code source (peu probable) ou <strong> ajout\u00e9 une routine de modification (patch) sur le fichier final<\/strong>, juste avant que le processus de signature de code ne prenne place (tr\u00e8s probable).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le Patch<\/h2>\n\n\n\n<p><strong>Le binaire officiel de CCleaner a \u00e9t\u00e9 patch\u00e9 de mani\u00e8re \u00e0 utiliser la <a href=\"https:\/\/isc.sans.edu\/diary\/How+Malware+Defends+Itself+Using+TLS+Callback+Functions\/6655\">m\u00e9thode du callback TLS<\/a><\/strong>. Cela signifie que le <strong>callback TLS est ex\u00e9cut\u00e9, avant m\u00eame le v\u00e9ritable point d&#8217;entr\u00e9e du binaire<\/strong>. De cette mani\u00e8re, le malware ex\u00e9cute son propre code avant de lancer le programme l\u00e9gitime.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/tls_callback.jpg\"><img decoding=\"async\" width=\"1191\" height=\"801\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/tls_callback.jpg\" alt=\"ccleaner floxif\" class=\"wp-image-1088\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/tls_callback.jpg 1191w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/tls_callback-300x202.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/tls_callback-1024x689.jpg 1024w\" sizes=\"(max-width: 1191px) 100vw, 1191px\" \/><\/a><\/figure>\n\n\n\n<p>Dans cette routine, le malware <strong>ex\u00e9cute ce qui semble \u00eatre un loader PE, en utilisant la m\u00e9thode de cr\u00e9ation et d&#8217;ex\u00e9cution de Tas (Heap)<\/strong>. La <strong>charge utile est une DLL encrypt\u00e9e (XOR) stock\u00e9e sans ent\u00eates PE<\/strong> (de mani\u00e8re \u00e0 \u00e9viter de se faire d\u00e9tecter par les antivirus), et une fois charg\u00e9e lance un nouveau thread qui ex\u00e9cutera le code du malware.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/eop.jpg\"><img decoding=\"async\" width=\"1089\" height=\"780\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/eop.jpg\" alt=\"ccleaner floxif\" class=\"wp-image-1087\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/eop.jpg 1089w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/eop-300x215.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/eop-1024x733.jpg 1024w\" sizes=\"(max-width: 1089px) 100vw, 1089px\" \/><\/a><\/figure>\n\n\n\n<p>Le code du malware <strong>utilise la cl\u00e9 de registre suivante pour y stocker des informations<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted lang:default decode:true\">HKLM\\SOFTWARE\\Piriform\\Agomo<\/pre>\n\n\n\n<p>Pour le moment, <strong>le malware ne semble pas agressif et se contente d&#8217;enregistrer des donn\u00e9es concernant la machine<\/strong> (nom, adresse IP, etc&#8230;). Cependant, <strong>ceci pourrait tr\u00e8s vite changer si le propri\u00e9taire du malware d\u00e9cidait d&#8217;envoyer des ordres diff\u00e9rents<\/strong> depuis le server C&amp;C. Il <strong>pourrait demander d&#8217;installer un Ransomware<\/strong>, par exemple.<\/p>\n\n\n\n<p><strong>Mise \u00e0 jour : Le serveur C&amp;C ainsi que les noms de domaines DGA ont \u00e9t\u00e9 saisis, ainsi en th\u00e9orie le malware ne peut plus rien faire \u00e0 pr\u00e9sent<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Suppression<\/h2>\n\n\n\n<p><strong>Avast pr\u00e9tend que mettre CCleaner \u00e0 jour vers la version 5.34 r\u00e9sout le probl\u00e8me et supprime le malware<\/strong>. Cependant, <strong><a href=\"https:\/\/www.adlice.com\/fr\/roguekiller\/\" target=\"_blank\" rel=\"noreferrer noopener\">RogueKiller (version 12.11.16 et sup\u00e9rieure)<\/a> d\u00e9tecte la version infect\u00e9e de CCleaner<\/strong>, ainsi que les cl\u00e9s de registre utilis\u00e9es par le malware.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/floxif_removal.jpg\"><img decoding=\"async\" width=\"962\" height=\"653\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/floxif_removal.jpg\" alt=\"\" class=\"wp-image-1089\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/floxif_removal.jpg 962w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/09\/floxif_removal-300x204.jpg 300w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Links<\/h2>\n\n\n\n<p>&#8211; <a href=\"http:\/\/blog.talosintelligence.com\/2017\/09\/avast-distributes-malware.html\">http:\/\/blog.talosintelligence.com\/2017\/09\/avast-distributes-malware.html<\/a><br>&#8211; <a href=\"http:\/\/blog.talosintelligence.com\/2017\/09\/ccleaner-c2-concern.html\">http:\/\/blog.talosintelligence.com\/2017\/09\/ccleaner-c2-concern.html<\/a><br>&#8211; <a href=\"https:\/\/www.piriform.com\/news\/blog\/2017\/9\/18\/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users\">https:\/\/www.piriform.com\/news\/blog\/2017\/9\/18\/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users<\/a><br>&#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ccleaner-compromised-to-distribute-malware-for-almost-a-month\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/ccleaner-compromised-to-distribute-malware-for-almost-a-month\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu&#8217;il s&#8217;est pass\u00e9 et si vous \u00eates infect\u00e9.<\/p>\n","protected":false},"author":1,"featured_media":955,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36,103],"tags":[20,562,563,113,72],"class_list":["post-1097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","category-guide","tag-analyse","tag-ccleaner-fr","tag-floxif-fr","tag-roguekiller-fr","tag-suppression","category-36","category-103","description-off"],"views":3014,"yoast_score":73,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CCleaner Installe le Malware Floxif \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"L&#039;outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu&#039;il s&#039;est pass\u00e9 et si vous \u00eates infect\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CCleaner Installe le Malware Floxif \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"L&#039;outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu&#039;il s&#039;est pass\u00e9 et si vous \u00eates infect\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-22T07:41:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:33:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1209\" \/>\n\t<meta property=\"og:image:height\" content=\"862\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"CCleaner Installe le Malware Floxif\",\"datePublished\":\"2017-09-22T07:41:49+00:00\",\"dateModified\":\"2022-12-21T10:33:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\"},\"wordCount\":673,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg\",\"keywords\":[\"analyse\",\"ccleaner\",\"floxif\",\"roguekiller\",\"suppression\"],\"articleSection\":[\"Analysis\",\"Guide\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\",\"url\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\",\"name\":\"CCleaner Installe le Malware Floxif \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg\",\"datePublished\":\"2017-09-22T07:41:49+00:00\",\"dateModified\":\"2022-12-21T10:33:38+00:00\",\"description\":\"L'outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu'il s'est pass\u00e9 et si vous \u00eates infect\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg\",\"width\":1209,\"height\":862},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CCleaner Installe le Malware Floxif\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/fr\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CCleaner Installe le Malware Floxif \u2022 Adlice Software","description":"L'outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu'il s'est pass\u00e9 et si vous \u00eates infect\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/","og_locale":"fr_FR","og_type":"article","og_title":"CCleaner Installe le Malware Floxif \u2022 Adlice Software","og_description":"L'outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu'il s'est pass\u00e9 et si vous \u00eates infect\u00e9.","og_url":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2017-09-22T07:41:49+00:00","article_modified_time":"2022-12-21T10:33:38+00:00","og_image":[{"width":1209,"height":862,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"\u00c9crit par":"tigzy","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"CCleaner Installe le Malware Floxif","datePublished":"2017-09-22T07:41:49+00:00","dateModified":"2022-12-21T10:33:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/"},"wordCount":673,"publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","keywords":["analyse","ccleaner","floxif","roguekiller","suppression"],"articleSection":["Analysis","Guide"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/","url":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/","name":"CCleaner Installe le Malware Floxif \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","datePublished":"2017-09-22T07:41:49+00:00","dateModified":"2022-12-21T10:33:38+00:00","description":"L'outil populaire CCleaner a \u00e9t\u00e9 compromis et installe le malware Floxif. D\u00e9couvrez ce qu'il s'est pass\u00e9 et si vous \u00eates infect\u00e9.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/05\/ccleaner.jpg","width":1209,"height":862},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/fr\/ccleaner-installe-malware-floxif\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/fr\/"},{"@type":"ListItem","position":2,"name":"CCleaner Installe le Malware Floxif"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/fr\/#website","url":"https:\/\/www.adlice.com\/fr\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/fr\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/1097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/comments?post=1097"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/1097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media\/955"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media?parent=1097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/categories?post=1097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/tags?post=1097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}