RAM Security Center

Product: IsIcoRes exe

Description:IsIcoRes exe

Download RAM Free Antivirus from here and remove threats from your device.

This page contains important information about security vulnerabilities that may affect specific versions of IsIcoRes exe products. Use this information to take corrective action to protect yourself from threats; in our effort to serve you better, you can also contact us for future advice related to IsIcoRes exe

File information 

Name
md5
Machine
Size Of Optional Header
Characteristics
Major Linker Version
Minor Linker Version
Size Of Code
Size Of Initialized Data
Size Of Uninitialized Data
Address Of Entry Point
Base Of Code
Base Of Data
Image Base
Section Alignment
File Alignment
Major Operating System Version
Minor Operating System Version
Major Image Version
Minor Image Version
Major Subsystem Version
Minor Subsystem Version
Size Of Image
Size Of Headers
Check Sum
Subsystem
Dll Characteristics
Size Of  Stack Reserve
Size Of Stack Commit
Size Of Heap Reserve
Size Of Heap Commit
Loader Flags
Number Of Rva And Sizes
Sections Nb
Sections Mean Entropy
Sections Min Entropy
Sections Max Entropy
Sections Mean Raw size
Sections Min Raw size
Section Max Raw size
Sections Mean Virtual size
Sections Min Virtual size
Section Max Virtual size
Imports Nb DLL
Imports Nb
Imports Nb Ordinal
Export Nb
Resources Nb
Resources Mean Entropy
Resources Min Entropy
Resources Max Entropy
Resources Mean Size
Resources Min Size
Resources Max Size
Load Configuration Size
Version Information Size
legitimate
ARPPRODUCTICON.exe
b8fb552b9ebcf10d3a8d79796dbdb6ea
332
224
271
6
0
16384
45056
0
4101
4096
20480
4194304
4096
4096
4
0
0
0
4
0
65536
4096
0
2
0
1048576
4096
1048576
4096
0
16
4
3.730525204
0.360350502
5.95492194
15360
4096
28672
12781.5
1952
24716
1
38
0
0
9
4.021426031
2.699131153
5.043978777
2685.444444
90
9640
0
16
1

Detection Report

We Tested and Compared with all other Antivirus remarks for Windows Compatibility DLL.

Acronis
Ad-Aware
AegisLab
AhnLab-V3
Alibaba
ALYac
Antiy-AVL
SecureAge APEX
Arcabit
Avast
Avast-Mobile
AVG
Avira (no cloud)
Baidu
BitDefender
Bkav
CAT-QuickHeal
ClamAV
CMC
Comodo
CrowdStrike Falcon
Cybereason
Cylance
Cyren
DrWeb
eGambit
Emsisoft
Endgame
eScan
ESET-NOD32
F-Prot
F-Secure
FireEye
Fortinet
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
GData
Ikarus
Jiangmin
K7AntiVirus
K7GW
Kaspersky
Kingsoft
Malwarebytes
MAX
McAfee
McAfee-GW-Edition
Microsoft
NANO-Antivirus
Palo Alto Networks
Panda
Qihoo-360
Rising
SentinelOne (Static ML)
Sophos AV
Sophos ML
SUPERAntiSpyware
Symantec
TACHYON
Tencent
TotalDefense
Trapmine
TrendMicro
TrendMicro-HouseCall
VBA32
ViRobot
Webroot
Yandex
Zillya
ZoneAlarm by Check Point
Zoner
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected
Not Detected

The first thing that will help you determine if a particular file is a legitimate Windows process or a virus is the location of the executable itself. For example, a process such as _IsIcoRes.exe should run from C:\Program Files\InstallShield\2011LE\System\ISMain.dll and not elsewhere.

To confirm, open Task Manager, go to View -> Select Columns and select “Image Path Name” to add a location column to your Task Manager. If you find a suspicious directory here, it may be a good idea to investigate this process further.

Another tool that can sometimes help you detect bad processes is Microsoft’s Process Explorer. Start the program (it does not require installation) and enable “Check captions” under Options. Now go to View -> Select Columns and add “Verified Signer” in one of the columns.

If a process’s ‘Verified Signer’ status is listed as ‘Unable to verify’, you should take a look at the process. Not all good Windows processes have a verified signature tag, but none of the bad ones either.

If you suspect that you may be infected with a virus, then you must attempt to fix it immediately. To delete the _IsIcoRes.exe virus, you should download and install a full security application like RAM Antivirus. Note that not all tools can detect every type of malware, so you may need to try several options before you’re successful.