The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the iexplore.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Internet Explorer or NirCmd or Windows Explorer or Stub or Updater or ultimo
belongs to software Windows Internet Explorer (version 9, 8, 7) or Microsoft Windows Operating System or Internet Explorer (version 11, 11 Release Preview) or Microsoft Windows or Adobe Flash Player ActiveX or Adobe Flash Player (version 10 ActiveX, 11 ActiveX) or Super DVD Creator (version 9.8 Full, 9.8 Trial, 9.8 Trial Version) or WinX HD Video Converter Deluxe
by Microsoft (www.microsoft.com) or OTAN or NirSoft (www.nirsoft.net) or WinUpdate.
Description: The original iexplore.exe from Microsoft is an important part of Windows, but often causes problems. The file iexplore.exe is located in a subfolder of "C:\Program Files" or sometimes in a subfolder of the user's "Documents" folder (generally C:\Program Files\Internet Explorer\).
Known file sizes on Windows 10/8/7/XP are 638,816 bytes (30% of all occurrences), 625,664 bytes and 165 more variants.
The file is a Windows system file. It is a Microsoft signed file. The process uses ports to connect to or from a LAN or the Internet. The file is certified by a trustworthy company. Therefore the technical security rating is 6% dangerous; however you should also read the user reviews.
Recommended: Identify iexplore.exe related errors
Is iexplore.exe a virus? No, it is not. The true iexplore.exe file is a safe Microsoft Windows system process, called "Internet Explorer".
However, writers of malware programs, such as viruses, worms, and Trojans deliberately give their processes the same file name to escape detection. Viruses with the same file name are for instance Backdoor.Generic.250497 (detected by F-Secure), and Win32:Malware-gen (detected by Avast).
To ensure that no rogue iexplore.exe is running on your PC, click here to run a Free Malware Scan.
How to recognize suspicious variants?
If iexplore.exe is located in the C:\Windows\System32 folder, the security rating is 74% dangerous. The file size is 43,520 bytes (18% of all occurrences), 494,592 bytes and 8 more variants. The iexplore.exe file is not a Windows core file. There is no description of the program. The program is not visible. It is located in the Windows folder, but it is not a Windows core file. The program starts when Windows starts (see Registry key: MACHINE\Run, Run, User Shell Folders, RunOnce, MACHINE\RunServices, Userinit, scrfile, DEFAULT\Run). Iexplore.exe is able to monitor applications, record keyboard and mouse inputs and manipulate other programs.
If iexplore.exe is located in a subfolder of C:\Windows, the security rating is 17% dangerous. The file size is 93,184 bytes (20% of all occurrences), 634,648 bytes and 6 more variants. It is not a Windows core file. The file is a trustworthy file from Microsoft. Iexplore.exe is able to record keyboard and mouse inputs and monitor applications.
If iexplore.exe is located in the C:\Windows folder, the security rating is 73% dangerous. The file size is 110,592 bytes (50% of all occurrences), 41,522 bytes and 4 more variants.
If iexplore.exe is located in a subfolder of the user's profile folder, the security rating is 44% dangerous. The file size is 439,296 bytes (11% of all occurrences), 622,080 bytes and 7 more variants.
If iexplore.exe is located in a subfolder of C:\Windows\System32, the security rating is 72% dangerous. The file size is 708,608 bytes (50% of all occurrences), 614,912 bytes, 2,162,688 bytes or 684,032 bytes.
If iexplore.exe is located in a subfolder of C:\, the security rating is 52% dangerous. The file size is 31,232 bytes (66% of all occurrences) or 638,816 bytes.
If iexplore.exe is located in the Windows folder for temporary files, the security rating is 74% dangerous. The file size is 199,168 bytes.
External information from Paul Collins:
There are different files with the same name:
Important: Some malware camouflages itself as iexplore.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the iexplore.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with iexplore. This means running a scan for malware, cleaning your hard drive using cleanmgr and sfc /scannow, uninstalling programs that you no longer need, checking for Autostart programs (using msconfig) and enabling Windows' Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the iexplore.exe process on your computer, the following programs have proven to be helpful: Security Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. Malwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.