RAM Security Center

Product: aspnetca exe

Description:aspnetca exe

Download RAM Free Antivirus from here and remove threats from your device.

This page contains important information about security vulnerabilities that may affect specific versions of aspnetca exe products. Use this information to take corrective action to protect yourself from threats; in our effort to serve you better, you can also contact us for future advice related to aspnetca exe

File information 

Name
md5
Machine
Size Of Optional Header
Characteristics
Major Linker Version
Minor Linker Version
Size Of Code
Size Of Initialized Data
Size Of Uninitialized Data
Address Of Entry Point
Base Of Code
Base Of Data
Image Base
Section Alignment
File Alignment
Major Operating System Version
Minor Operating System Version
Major Image Version
Minor Image Version
Major Subsystem Version
Minor Subsystem Version
Size Of Image
Size Of Headers
Check Sum
Subsystem
Dll Characteristics
Size Of  Stack Reserve
Size Of Stack Commit
Size Of Heap Reserve
Size Of Heap Commit
Loader Flags
Number Of Rva And Sizes
Sections Nb
Sections Mean Entropy
Sections Min Entropy
Sections Max Entropy
Sections Mean Raw size
Sections Min Raw size
Section Max Raw size
Sections Mean Virtual size
Sections Min Virtual size
Section Max Virtual size
Imports Nb DLL
Imports Nb
Imports Nb Ordinal
Export Nb
Resources Nb
Resources Mean Entropy
Resources Min Entropy
Resources Max Entropy
Resources Mean Size
Resources Min Size
Resources Max Size
Load Configuration Size
Version Information Size
legitimate
aspnetca.exe
49c25811f0496070c486381155154fdb
332
224
258
9
0
184832
14848
0
63457
4096
192512
16777216
4096
512
6
1
6
1
6
1
212992
1024
250641
3
33088
262144
8192
1048576
4096
0
16
4
4.424299334
1.610585739
6.542553467
48640
1536
184832
49664
1768
184546
8
199
0
938
2
4.248787435
3.540794827
4.956780043
803
686
920
72
16
1

Detection Report

We Tested and Compared with all other Antivirus remarks for Windows Compatibility DLL.

Acronis
Ad-Aware
AegisLab
AhnLab-V3
Alibaba
ALYac
Antiy-AVL
SecureAge APEX
Arcabit
Avast
Avast-Mobile
AVG
Avira (no cloud)
Baidu
BitDefender
Bkav
CAT-QuickHeal
ClamAV
CMC
Comodo
CrowdStrike Falcon
Cybereason
Cylance
Cyren
DrWeb
eGambit
Emsisoft
Endgame
eScan
ESET-NOD32
F-Prot
F-Secure
FireEye
Fortinet
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
GData
Ikarus
Jiangmin
K7AntiVirus
K7GW
Kaspersky
Kingsoft
Malwarebytes
MAX
McAfee
McAfee-GW-Edition
Microsoft
NANO-Antivirus
Palo Alto Networks
Panda
Qihoo-360
Rising
SentinelOne (Static ML)
Sophos AV
Sophos ML
SUPERAntiSpyware
Symantec
TACHYON
Tencent
TotalDefense
Trapmine
TrendMicro
TrendMicro-HouseCall
VBA32
ViRobot
Webroot
Yandex
Zillya
ZoneAlarm by Check Point
Zoner
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected

The first thing that will help you determine if a particular file is a legitimate Windows process or a virus is the location of the executable itself. With aspnetca.exe for example, its path will probably be something like C:\Program Files\Microsoft Corporation\Windows 10 Operating System\aspnetca.exe To determine its path, open Task Manager, go to View -> Select Columns, and select “Image Path Name” to add a location column to your Task Manager. If you find a suspicious directory here, it may be a good idea to investigate this process further. Another tool that can sometimes help you detect bad processes is Microsoft’s Process Explorer. Start the program (it does not require installation) and enable “Check captions” under Options. Now go to View -> Select Columns and add “Verified Signer” in one of the columns. If a process’s ‘Verified Signer’ status is listed as ‘Unable to verify’, you should take a look at the process. Not all good Windows processes have a verified signature tag, but none of the bad ones either.