Windows Crucial Scanner DescriptionWindows Crucial Scanner is part of a large batch of malware in the FakeVimes family that was released in 2012. According to ESG Security analysts, Windows Crucial Scanner has no actual anti-virus effectiveness and is part of a common online scam. The FakeVimes family of malware is a notorious family of rogue anti-spyware programs that have attacked computer systems since 2009. The batch of FakeVimes clones that include Windows Crucial Scanner is particularly dangerous because of the inclusion of a rootkit component, often a variant of the Sirefef or ZeroAccess rootkit. This makes rogue anti-virus programs released in 2012 (such as Windows Crucial Scanner) to be particularly difficult to remove. Like previous versions of malware in this family, Windows Crucial Scanner uses file names containing a characteristic string comprised of three random letters. Windows Crucial Scanner also has the capacity to detect file processes associated with known security applications and attempt to stop them. Examples of malware in the Windows Crucial Scanner family include programs with names like Windows Antibreaking System, Windows Processes Accelerator and Windows Cleaning Tools. Thanks to the fact that clones of Windows Crucial Scanner have been around for several years, most security programs have no problem handling a Windows Crucial Scanner infection. However, the removal of its associated rootkit will usually require the help of a specialized application for rootkit removal.
How Windows Crucial Scanner is Used to Attempt to Steal Your MoneyThe Windows Crucial Scanner scam consists in trying to convince computer users that their computer system is under attack by a horde of Trojans and viruses. This is done through the use of authentic-looking error messages and security alerts designed to alarm the victim. Then, Windows Crucial Scanner directs the victim's web browser or uses additional pop-up messages to lead the victim to purchase a supposed 'full version" of Windows Crucial Scanner. Windows Crucial Scanner claims that Windows Crucial Scanner cannot remove these supposed malware infections in the victim's computer unless a registration code is entered into its interface. ESG security analysts have found that entering a registration code will stop most of the error messages, but will not remove the Windows Crucial Scanner infection itself. However, this can aid in removing this malware threat from the infected computer system. The registration code 0W000-000B0-00T00-E0020 can be used to aid in Windows Crucial Scanner's removal, although it is crucial to note that as long as Windows Crucial Scanner remains on the infected computer system Windows Crucial Scanner will continue to cause problems and expose the victim's computer to additional malware infections.
Infected with Windows Crucial Scanner? Scan Your PC for FreeDownload SpyHunter’s Spyware Scanner
to Detect Windows Crucial Scanner
Security Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.
Screenshots & Other Imagery
What is 'Windows Crucial Scanner' Program VideoTip: Turn your sound ON and watch the video in Full Screen mode to fully experience how Windows Crucial Scanner infects a computer.
Our MalwareTracker shows malware activity across the world. Explore real-time data of Windows Crucial Scanner outbreaks and other threats from global to local level.
File System Details
Windows Crucial Scanner creates the following file(s):
|#||File Name||Size||MD5||Detection Count|
|1||Windows Crucial Scanner.lnk||13|
|4||%AppData%\Protector-[RANDOM 3 CHARACTERS].exe||N/A|
|6||%Desktop%\Windows Crucial Scanner.lnk||N/A|
|7||%CommonStartMenu%\Programs\Windows Crucial Scanner.lnk||N/A|
Windows Crucial Scanner creates the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-4-7_2"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "ahwohainwk"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRunDll.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidef.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winupdate.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0