Fix Spoolsv.exe Error

Purpose of spoolsv.exe

The spoolsv.exe (Windows Printer Spooler Service) is an important component of the printing interface.

The main function of spoolsv.exe is to provide necessary data to the printer and to queue printing tasks. Spoolsv.exe works by transferring data in a buffer from where the process retrieves the data when the printer requires it. Users can continue working while spoolsv.exe is storing data in a buffer. Also, as spoolsv.exe queues various printing tasks, the user can carry out other operations and does not need to wait for each printing task to finish.

By default, the spoolsv.exe process is initialized when Windows loads and continues to run in the background until the computer is shut down. The spoolsv.exe file is launched when the printer is in use and is visible in the Windows Task Manager.

Spoolsv.exe Error

Error Message

“Spoolsv.exe - Application Error
The instruction at "0x77fcc2c0" referenced memory at "0x00000000".
The memory could not be written."

What cause the Spoolsv.exe – Application Error?

Typically, the above error occurs due to the presence of a large number of .SHD and .SPL files in the spool directory.

How can I resolve this error?

To fix the error, delete the .SHD and .SPL files from the system. To remove .SHD and .SPL files in Windows XP, perform the following steps:

  1. Click Start and then click the Run command.
  2. Type services.msc and press Enter to open the Services window.
  3. Locate and right-click Spooler service and click Stop.
  4. Double-click on the My Computer icon on your desktop.
  5. Browse to C:\Windows\System32\Spool\Printers (for Windows XP/Windows Vista/Windows 7) or C:\Winnt\System32\Spool\Printers (for Windows NT/Windows 2000).
  6. Next, Delete all the .SHD and .SPL files.
  7. Now, open the TMP (temporary) folder and delete all the files that are old.
  8. Go back to the Services window, right-click Spooler service, and click Start.

Notes:

  • In the above steps C:\ is understood to be the drive on which Windows is installed. If you have installed Windows on some other drive, replace the letter C with the letter of that drive.
  • If you are unable to delete .SHD and .SPL files in Normal Mode, restart Windows in Safe Mode and delete these files. To restart Windows in Safe Mode, press the F8 key as computer restarts, select the Safe Mode option (using the arrow keys) and press Enter.

Spoolsv.exe high CPU usage issue

Spoolsv.exe is consuming 99%-100% of CPU resources and causing your system to freeze up.

What causes 100% CPU Usage by Spoolsv.exe?

Generally, this happens when there are some printer jobs in the Windows spool.

How can I resolve this error?
 
To repair the issue manually remove the print jobs. To do this, you need to complete the following steps:

  1. Click Start, click Run, type services.msc and press Enter.
    Services window will be displayed.
  2. Right-click Spooler service and click Stop.
  3. Open My Computer, navigate to C:\Windows\System32\Spool\Printers (for Windows XP/Vista/7) or C:\Windows\System32\Spool\Printers (for Windows NT/2000).
  4. Delete all the files present in this folder.
  5. Right-click Spooler service in the Services window and click Start to enable the service.

Spoolsv.exe – Security Report

The genuine spoolsv.exe is a safe file from Microsoft. However, a malicious file by the same name, spoolsv.exe has also been recorded. The malicious spoolsv.exe is used by attackers to gain access to your computer from remote locations.

For your reference, below is a list of threats that are known to be associated with the spoolsv.exe file:

Win32/Xema.worm.103424.B [AhnLab]
W32/Vetor-A [Sophos]
W32/Dzan-E [Sophos]
W32/Autorun.worm.gen [McAfee]
W32.Virut.U [Symantec]
Downloader.Trojan [Symantec]
Generic VB.b [McAfee]
Mal/Basine-A, Mal/Behav-160, Mal/Emogen-E, Mal/Basine-C [Sophos]
Mal/Basine-C [Sophos]
Mal/Behav-160, Mal/Behav-009 [Sophos]
Mal/Packer, Mal/Basine-A, Mal/Behav-160, Mal/Emogen-E, Mal/Basine-C [Sophos]
Mal/Packer, Mal/Behav-160, Mal/Emogen-E [Sophos]
Mal/Packer, Mal/Behav-160, Mal/Emogen-E, Mal/Behav-009 [Sophos]
New Malware.d [McAfee]
New Malware.fa [McAfee]
PE_RUNGBU.C [Trend Micro]
PE_RUNGBU.G-O [Trend Micro]
PE_TENGA.A [Trend Micro]
Trojan.KillAV!sd6 [PC Tools]
Trojan-Downloader.Win32.Banload [Ikarus]
Trojan-Downloader.Win32.Banload.bat [Kaspersky Lab]
Trojan-Downloader.Win32.Calac [Ikarus]
TrojanDownloader:Win32/Horst.Q [Microsoft]
Worm.Rungbu.A [PC Tools]
Win32/Rungbu [AhnLab]
Win32.SuspectCrc [Ikarus]
W32.SillyFDC [Symantec]
W32.Dzan [Ikarus]
Virus:Win32/Hipak.A [Microsoft]
Virus.Win32.Warezov [Ikarus]
Virus.Win32.Virut.q [Kaspersky Lab]
Virus.Win32.Oliga [Ikarus]
Trojan-PSW.Bancos [PC Tools]
TrojanDropper:Win32/Agent.FG [Microsoft]
Trojan Horse [Symantec]
PWS-Banker!bdv [McAfee]