RAM Security Center
Product: aspnetca exe
Description:aspnetca exe
Download RAM Free Antivirus from here and remove threats from your device.
This page contains important information about security vulnerabilities that may affect specific versions of aspnetca exe products. Use this information to take corrective action to protect yourself from threats; in our effort to serve you better, you can also contact us for future advice related to aspnetca exe
File information
Name md5 Machine Size Of Optional Header Characteristics Major Linker Version Minor Linker Version Size Of Code Size Of Initialized Data Size Of Uninitialized Data Address Of Entry Point Base Of Code Base Of Data Image Base Section Alignment File Alignment Major Operating System Version Minor Operating System Version Major Image Version Minor Image Version Major Subsystem Version Minor Subsystem Version Size Of Image Size Of Headers Check Sum Subsystem Dll Characteristics Size Of Stack Reserve Size Of Stack Commit Size Of Heap Reserve Size Of Heap Commit Loader Flags Number Of Rva And Sizes Sections Nb Sections Mean Entropy Sections Min Entropy Sections Max Entropy Sections Mean Raw size Sections Min Raw size Section Max Raw size Sections Mean Virtual size Sections Min Virtual size Section Max Virtual size Imports Nb DLL Imports Nb Imports Nb Ordinal Export Nb Resources Nb Resources Mean Entropy Resources Min Entropy Resources Max Entropy Resources Mean Size Resources Min Size Resources Max Size Load Configuration Size Version Information Size legitimate |
aspnetca.exe 49c25811f0496070c486381155154fdb 332 224 258 9 0 184832 14848 0 63457 4096 192512 16777216 4096 512 6 1 6 1 6 1 212992 1024 250641 3 33088 262144 8192 1048576 4096 0 16 4 4.424299334 1.610585739 6.542553467 48640 1536 184832 49664 1768 184546 8 199 0 938 2 4.248787435 3.540794827 4.956780043 803 686 920 72 16 1 |
Detection Report
We Tested and Compared with all other Antivirus remarks for Windows Compatibility DLL.
Acronis Ad-Aware AegisLab AhnLab-V3 Alibaba ALYac Antiy-AVL SecureAge APEX Arcabit Avast Avast-Mobile AVG Avira (no cloud) Baidu BitDefender Bkav CAT-QuickHeal ClamAV CMC Comodo CrowdStrike Falcon Cybereason Cylance Cyren DrWeb eGambit Emsisoft Endgame eScan ESET-NOD32 F-Prot F-Secure FireEye Fortinet |
Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected |
GData Ikarus Jiangmin K7AntiVirus K7GW Kaspersky Kingsoft Malwarebytes MAX McAfee McAfee-GW-Edition Microsoft NANO-Antivirus Palo Alto Networks Panda Qihoo-360 Rising SentinelOne (Static ML) Sophos AV Sophos ML SUPERAntiSpyware Symantec TACHYON Tencent TotalDefense Trapmine TrendMicro TrendMicro-HouseCall VBA32 ViRobot Webroot Yandex Zillya ZoneAlarm by Check Point Zoner |
Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected Not Detected |
The first thing that will help you determine if a particular file is a legitimate Windows process or a virus is the location of the executable itself. With aspnetca.exe for example, its path will probably be something like C:\Program Files\Microsoft Corporation\Windows 10 Operating System\aspnetca.exe To determine its path, open Task Manager, go to View -> Select Columns, and select “Image Path Name” to add a location column to your Task Manager. If you find a suspicious directory here, it may be a good idea to investigate this process further. Another tool that can sometimes help you detect bad processes is Microsoft’s Process Explorer. Start the program (it does not require installation) and enable “Check captions” under Options. Now go to View -> Select Columns and add “Verified Signer” in one of the columns. If a process’s ‘Verified Signer’ status is listed as ‘Unable to verify’, you should take a look at the process. Not all good Windows processes have a verified signature tag, but none of the bad ones either.