spolsvsc.exe

Remote Service Application

Microsoft Corp.

The executable spolsvsc.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘explorerupdate’. The file has been seen being downloaded from dosya.co.
Publisher:
Microsoft Corp.

Product:
Remote Service Application

Version:
1, 0, 0, 1

MD5:
565be89b906e29027af2886e57a541b7

SHA-1:
3488ceb126ed2aa6c1f45e0015ecfbdb00ad0c5a

SHA-256:
1def0a9e586af12e26090375d05826483b248edcfd530f69b44ef0e5b36c17c4

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/25/2024 12:54:14 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Backdoor.Meta (M)
16.7.10.12

File size:
878 KB (899,072 bytes)

Product version:
4, 0, 0, 0

Copyright:
Copyright (C) 1999

Original file name:
MSRSAAP.EXE

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\spolsvsc.exe

File PE Metadata
Compilation timestamp:
6/7/2012 8:59:53 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:m9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h1fuLZM:CZ1xuVVjfFoynPaVBUR8f+kN10EB3foy

Entry address:
0x8F888

Entry point:
55, 8B, EC, B9, 30, 00, 00, 00, 6A, 00, 6A, 00, 49, 75, F9, 51, 53, 56, 57, B8, E0, E3, 48, 00, E8, 2F, 7E, F7, FF, 33, C0, 55, 68, 56, 06, 49, 00, 64, FF, 30, 64, 89, 20, 6A, 00, E8, 2A, 07, F8, FF, A1, B0, 48, 49, 00, C6, 00, 01, E8, 21, B7, FF, FF, B2, 01, A1, 80, DE, 48, 00, E8, 19, E6, FF, FF, A3, E8, C3, 49, 00, 33, D2, 55, 68, 09, FA, 48, 00, 64, FF, 32, 64, 89, 22, 8D, 4D, EC, BA, 70, 06, 49, 00, A1, E8, C3, 49, 00, E8, 68, E6, FF, FF, 8B, 55, EC, A1, 38, 4B, 49, 00, E8, 7F, 5C, F7, FF, 8D, 55, E0...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
573 KB (586,752 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
explorerupdate

Command:
C:\users\{user}\appdata\local\temp\{random}.tmp\spolsvsc.exe


The file spolsvsc.exe has been seen being distributed by the following URL.

Remove spolsvsc.exe - Powered by Reason Core Security