Windows Crucial Scanner removal for good

andy | April 14, 2012

Windows Crucial Scanner, in fact, is a rogue program. This is not some kind of software that can render the desired security protection for your system. And, by the way, its scan is just the imitation of a real one. It is not possible to identify actual threats within such a short period of time. Still, here comes Windows Crucial Scanner and within less than one minute reports quite a bunch of infections detected by it. Surely, there is something really wrong with it. Well, there is nothing to be surprised simply because this is a fake anti-virus you’ve caught.


From the very first moments upon its successful installation Windows Crucial Scanner reports about various threats identified by it. None of them is real, but the plan of the hoax is to make you scared. It would tell you that you must immediately remove all viruses revealed by it, but first you would be instructed by the badware to make payment for its license. As you see, this is a typical rogue approach applied by this scareware. First of all, you must realize that the threats identified by it are not even available on your system. Secondly, when real cyber enemies do try to enter your workstation Windows Crucial Scanner would not help you to terminate their infiltration attempts. Neither will it be able to remove them or fix serious vulnerabilities of your PC. Thus, it is not logical to keep this rogueware sample on your machine. You will need to download GridinSoft Trojan Killer to remove this pest. If you have problems doing this please contact us immediately.

Windows Crucial Scanner automatic remover:

Windows Crucial Scanner manual remover:

Delete Windows Crucial Scanner files:
%AppData%NPSWF32.dll
%AppData%Protector-.exe
%AppData%result.db
%CommonStartMenu%ProgramsWindows Crucial Scanner.lnk
%Desktop%Windows Crucial Scanner.lnk
Delete Windows Crucial Scanner registry entries:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableRegedit” = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableRegistryTools” = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem “EnableLUA” = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “Inspector”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionSettings “net” = “2012-4-7_2″
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionSettings “UID” = “ahwohainwk”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsadvxdwin.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsaswRunDll.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsaswUpdSv.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsatcon.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsbidef.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdvp95.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsinetlnfo.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsMSASCui.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsozn695m5.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsrtvscn95.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionstds-3.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionswinupdate.exe

Leave a comment

*