spellersvc.exe

RaclSvc Module

GJ Networks

The application spellersvc.exe by GJ Networks has been detected as a potentially unwanted program by 20 anti-malware scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘Speller’.
Publisher:
GJ Networks  (signed and verified)

Product:
RaclSvc Module

Version:
1, 0, 0, 1

MD5:
4c23ba35ca06fd2055a0d9ec6069de97

SHA-1:
997e3f65d3cafcea3ec52af8d66a0ecbb9c5aa15

SHA-256:
e507152d6fe252e7325b10fae699081c764e7febce85e44190b26968d177e1fb

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
4/24/2024 6:17:22 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.532921
1137

Agnitum Outpost
Adware.Kraddare
7.1.1

AhnLab V3 Security
PUP/Win32.Speller
2013.12.05

Avira AntiVirus
SPR/Tool.284072
7.11.117.220

avast!
Win32:Adware-APT [PUP]
2014.9-131224

AVG
Fake_AntiSpyware
2014.0.3615

Baidu Antivirus
AdWare.Win32.Kraddare
4.0.3.131224

Bitdefender
Application.Generic.532921
1.0.20.1790

Comodo Security
UnclassifiedMalware
17382

ESET NOD32
Win32/Adware.Kraddare.FJ (variant)
7.9129

G Data
Application.Generic.532921
13.12.22

IKARUS anti.virus
Win32.AdWare.AJY
t3scan.2.2.29

Malwarebytes
Adware.KorAd
v2013.12.24.11

McAfee
Artemis!4C23BA35CA06
5600.7271

MicroWorld eScan
Application.Generic.532921
14.0.0.1074

nProtect
Adware/W32.KrAdword.285256
13.12.04.01

Reason Heuristics
PUP.Startup.GJNetworks.K
14.2.16.7

SUPERAntiSpyware
Adware.KorAd
10887

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
23996

ViRobot
Adware.Agent.285256
2011.4.7.4223

File size:
278.6 KB (285,256 bytes)

Product version:
1, 0, 0, 1

Copyright:
Copyright 2012

Original file name:
RaclSvc.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\speller\spellersvc.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
12/12/2011 9:00:00 AM

Valid to:
12/12/2013 8:59:59 AM

Subject:
CN=GJ Networks, O=GJ Networks, L=Dongjak-gu, S=Seoul, C=KR

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
3F796579DD55F89DFE34DF13DCBF595F

File PE Metadata
Compilation timestamp:
10/24/2012 4:43:43 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:cJUoC5BaIpqD9e4HFAuS/IKYLrWmEjIbxf/8yluMLSQbt:cJgA+q6/IJGnjIbx3zlNSQbt

Entry address:
0x1E361

Entry point:
E8, 22, 41, 00, 00, E9, 79, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, 97, 08, 00, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 66, 8B, 08, 40, 40, 66, 85, C9, 75, F6, 2B, 45, 08, D1, F8, 48, 5D, C3, 3B, 0D, 00, A9, 43, 00, 75, 02, F3, C3, E9, 7F, 41, 00, 00, 8B, FF, 55, 8B, EC, 51, 8B, 4D, 08, 53, 56, 57, 33, FF, 89, 7D, FC, 3B, CF, 0F, 84, 81, 00, 00, 00, 8B, 55, 0C, 3B, D7, 75, 07, 39, 7D, 10, 75, 75, EB, 05, 39, 7D, 10, 74, 6E, 39, 7D, 14, 75, 07, 39, 7D, 18, 75, 64, EB, 05, 39, 7D, 18, 74, 5D, 39, 7D, 1C, 75, 07...
 
[+]

Entropy:
6.4019

Code size:
192.5 KB (197,120 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Speller

Command:
C:\Program Files\speller\spellersvc.exe


Remove spellersvc.exe - Powered by Reason Core Security