Threat Database Rogue Anti-Virus Program Windows Crucial Scanner

Windows Crucial Scanner

Threat Scorecard

Ranking: 4,501
Threat Level: 10 % (Normal)
Infected Computers: 739
First Seen: April 14, 2012
Last Seen: September 20, 2023
OS(es) Affected: Windows

Windows Crucial Scanner Image

Windows Crucial Scanner is part of a large batch of malware in the FakeVimes family that was released in 2012. According to ESG Security analysts, Windows Crucial Scanner has no actual anti-virus effectiveness and is part of a common online scam. The FakeVimes family of malware is a notorious family of rogue anti-spyware programs that have attacked computer systems since 2009. The batch of FakeVimes clones that include Windows Crucial Scanner is particularly dangerous because of the inclusion of a rootkit component, often a variant of the Sirefef or ZeroAccess rootkit. This makes rogue anti-virus programs released in 2012 (such as Windows Crucial Scanner) to be particularly difficult to remove. Like previous versions of malware in this family, Windows Crucial Scanner uses file names containing a characteristic string comprised of three random letters.

Windows Crucial Scanner also has the capacity to detect file processes associated with known security applications and attempt to stop them. Examples of malware in the Windows Crucial Scanner family include programs with names like Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst.

Thanks to the fact that clones of Windows Crucial Scanner have been around for several years, most security programs have no problem handling a Windows Crucial Scanner infection. However, the removal of its associated rootkit will usually require the help of a specialized application for rootkit removal.

How Windows Crucial Scanner is Used to Attempt to Steal Your Money

The Windows Crucial Scanner scam consists in trying to convince computer users that their computer system is under attack by a horde of Trojans and viruses. This is done through the use of authentic-looking error messages and security alerts designed to alarm the victim. Then, Windows Crucial Scanner directs the victim's web browser or uses additional pop-up messages to lead the victim to purchase a supposed 'full version" of Windows Crucial Scanner. Windows Crucial Scanner claims that Windows Crucial Scanner cannot remove these supposed malware infections in the victim's computer unless a registration code is entered into its interface.

ESG security analysts have found that entering a registration code will stop most of the error messages, but will not remove the Windows Crucial Scanner infection itself. However, this can aid in removing this malware threat from the infected computer system. The registration code 0W000-000B0-00T00-E0020 can be used to aid in Windows Crucial Scanner's removal, although it is crucial to note that as long as Windows Crucial Scanner remains on the infected computer system Windows Crucial Scanner will continue to cause problems and expose the victim's computer to additional malware infections.

Windows Crucial Scanner Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

File System Details

Windows Crucial Scanner may create the following file(s):
# File Name Detections
1. %AppData%\Protector-[RANDOM 3 CHARACTERS].exe
2. %AppData%\NPSWF32.dll
3. %Desktop%\Windows Crucial Scanner.lnk
4. %CommonStartMenu%\Programs\Windows Crucial Scanner.lnk
5. %AppData%\result.db

Registry Details

Windows Crucial Scanner may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-4-7_2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winupdate.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRunDll.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "ahwohainwk"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidef.exe

Trending

Most Viewed

Loading...