Windows Crucial Scanner

Windows Crucial Scanner Description

ScreenshotWindows Crucial Scanner is part of a large batch of malware in the FakeVimes family that was released in 2012. According to ESG Security analysts, Windows Crucial Scanner has no actual anti-virus effectiveness and is part of a common online scam. The FakeVimes family of malware is a notorious family of rogue anti-spyware programs that have attacked computer systems since 2009. The batch of FakeVimes clones that include Windows Crucial Scanner is particularly dangerous because of the inclusion of a rootkit component, often a variant of the Sirefef or ZeroAccess rootkit. This makes rogue anti-virus programs released in 2012 (such as Windows Crucial Scanner) to be particularly difficult to remove. Like previous versions of malware in this family, Windows Crucial Scanner uses file names containing a characteristic string comprised of three random letters.

Windows Crucial Scanner also has the capacity to detect file processes associated with known security applications and attempt to stop them. Examples of malware in the Windows Crucial Scanner family include programs with names like Windows Defence Counsel, My Security Engine, Smart Internet Protection 2011, Windows Be-on-Guard Edition, Enterprise Suite, Windows Antibreach Tool, Windows AntiBreach Patrol, Windows Activity Booster, Home Safety Essentials, Windows Abnormality Checker, Windows Advanced Toolkit, Windows First-Class Protector, Extra Antivirus, Personal Internet Security 2011, System Protection Tools, Smart Security, Total Anti Malware Protection, My Security Shield, Windows Guard Solutions, Smart Internet Protection 2012, Fast Antivirus 2009, Best Malware Protection, Windows Expert Console, VirusSecurity, Windows Antivirus Tool, Personal Security Sentinel, Windows Antivirus Patch, Home Malware Cleaner, Windows Enterprise Suite, Internet Security Suite, PC Security Guardian, CleanUp Antivirus, Keep Center Keeper, Virus Doctor, Windows Enterprise Defender, Windows Advanced Security Center, My Security Wall, Live PC Care, Windows Guardian Angel, Additional Guard, Windows Activity Debugger, Windows Custom Management, System Smart Security, Windows Antivirus Booster, Security Master AV, Windows AntiHazard Helper, Windows Efficiency Accelerator, Windows Custodian Utility, Best Antivirus Software, Windows Antivirus Care, Internet Security Essentials, Volcano Security Suite, Windows Antivirus Patrol, Smart Anti-Malware Protection, Windows Functionality Checker, Windows Efficiency Master, Windows Defence Unit, Windows Daily Adviser, Windows Custom Safety, Windows Accelerator Pro, Windows Control Series, Windows Antihazard Solution, Windows Active Guard, Windows Efficiency Console, Security Antivirus, Antivirus Smart Protection, Strong Malware Defender, Windows Advanced User Patch, Windows Antivirus Machine, PC Live Guard, Windows Basic Antivirus, Windows Active Defender, Windows Guard Tools, Windows Defence Master, Smart Engine, Windows AntiHazard Center, Windows Antivirus Suite, Activate Ultimate Protection, Live Enterprise Suite, Windows Cleaning Toolkit, Windows AntiBreach Helper, Smart Virus Eliminator, Windows Antivirus Release, Windows Care Taker, Windows Anti-Malware Patch, Windows Defending Center, Windows Antivirus Rampart, Windows Efficiency Kit, Virus Melt, Windows Firewall Constructor, Windows Antivirus Helper, Windows Debug Center, Windows Expert Series, Windows Active HotSpot, Anti-Malware Lab and Windows AntiBreach Suite.

Thanks to the fact that clones of Windows Crucial Scanner have been around for several years, most security programs have no problem handling a Windows Crucial Scanner infection. However, the removal of its associated rootkit will usually require the help of a specialized application for rootkit removal.

How Windows Crucial Scanner is Used to Attempt to Steal Your Money

The Windows Crucial Scanner scam consists in trying to convince computer users that their computer system is under attack by a horde of Trojans and viruses. This is done through the use of authentic-looking error messages and security alerts designed to alarm the victim. Then, Windows Crucial Scanner directs the victim's web browser or uses additional pop-up messages to lead the victim to purchase a supposed 'full version" of Windows Crucial Scanner. Windows Crucial Scanner claims that Windows Crucial Scanner cannot remove these supposed malware infections in the victim's computer unless a registration code is entered into its interface.

ESG security analysts have found that entering a registration code will stop most of the error messages, but will not remove the Windows Crucial Scanner infection itself. However, this can aid in removing this malware threat from the infected computer system. The registration code 0W000-000B0-00T00-E0020 can be used to aid in Windows Crucial Scanner's removal, although it is crucial to note that as long as Windows Crucial Scanner remains on the infected computer system Windows Crucial Scanner will continue to cause problems and expose the victim's computer to additional malware infections.

Infected with Windows Crucial Scanner? Scan Your PC for Free

Download SpyHunter’s Spyware Scanner
to Detect Windows Crucial Scanner

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

Screenshots & Other Imagery

Tip: Turn your sound ON and watch the video in Full Screen mode to fully experience how Windows Crucial Scanner infects a computer.

Windows Crucial Scanner Video

Infection Statistics

Our MalwareTracker shows malware activity across the world. Explore real-time data of Windows Crucial Scanner outbreaks and other threats from global to local level.

File System Details

Windows Crucial Scanner creates the following file(s):
# File Name Size MD5 Detection Count
1 Windows Crucial Scanner.lnk 13
2 %APPDATA%\Protector-sakmgr.exe 247,744 7e15110323010cd1cbab8d662f3d2455 3
3 %APPDATA%\Protector-gmkm.exe 1,965,568 ac8bdab9e290a7f910a56fa7c04e2a43 2
4 %AppData%\Protector-[RANDOM 3 CHARACTERS].exe N/A
5 %AppData%\NPSWF32.dll N/A
6 %Desktop%\Windows Crucial Scanner.lnk N/A
7 %CommonStartMenu%\Programs\Windows Crucial Scanner.lnk N/A
8 %AppData%\result.db N/A

Registry Details

Windows Crucial Scanner creates the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-4-7_2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winupdate.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRunDll.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "ahwohainwk"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidef.exe

Site Disclaimer

Leave a Reply

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as-is:
What is 10 + 13 ?