How to Remove “accicons.exe”

What is accicons.exe?

accicons.exe is a legitimate file process developed by Microsoft Corporation. This process is known as Microsoft Office Component and it belongs to Microsoft Office System. You can locate the file in C:\Program Files. The virus is created by malware authors and is named after accicons.exe file.

Affected Platform: Windows OS

How to check if your computer is infected with accicons.exe malware?

Keep an eye for the following symptoms to check if your PC is infected with accicons.exe malware:

  • Unstable internet connection
  • Browser redirects to unwanted websites
  • PC performance slows down
  • Browser is bombarded with hordes of popup ads
  • System screen freezes repeatedly

If you find any of  the above mentioned symptoms, take the following steps to be sure about the malware infection:

1) Press CTRL+ALT+DEL keys to open Task Manager.

2) Go to the process tab and right-click on the accicons.exe file and open its location.

If the file is located outside C:\Program Files, then you should take measures to get rid of the malware.

How to remove accicons.exe malware from system with Comodo Cleaning Essentials?

Comodo Cleaning Essentials (CCE) incorporates antivirus software with unique features like auto-sandboxing to identify and obstruct every suspicious process running on an endpoint with a single click. To remove accicons.exe malware using CCE, follow the steps mentioned below:

Step 1: Download the CCE suite.

Step 2: To start the application, double-click on the CCE.exe file.

Step 3: It then probes the antivirus to initiate a full system scan to identify and remove any existing malicious files.

Step 4: If threats are found during the scanning, you will be prompted with an alert screen.

Step 5: Comodo Cleaning Essentials will remove accicons.exe malware from your computer including all other malwares!

12

Malware Entries

First Seen: 13 July 2017 at 11:14 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable 6afc426c85564776
98763e5821b77764
4efb1a52
2f2a267e6d66c365
da5097e07135f90d
EmailWorm.Wi
n32.Runonce.
~v001
Yes N/A N/A Zambia N/A
2 N/A Executable f8c845daf48c75e4
2932df9281ad28f8
33789758
d7a7a88cbfb250f8
6b96cf536f6570b2
TrojWare.Win
32.Spy.E
No N/A N/A Nigeria N/A
3 N/A Executable 144c8d653b09fca6
c11257627e15b56d
bddaab42
a1b8d1f27495a05f
7e511c3e7285c2be
EmailWorm.Wi
n32.Runonce.
~v001
Yes N/A N/A 154.72.79.212/32 N/A
4 N/A Executable 8451940067ed1ab6
6e1f23f3facd8af3
6e8e7a9e
35f4e7d23b864ea5
7464ff7317ff149f
TrojWare.Win
32.Delf.NRJ
No N/A N/A Kenya N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
9

Safe Entries

First Seen: 05 July 2009 at 12:59 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable 58ad2d1aeb9e64b1
fd90912f5258324b
e1402481
f1f5b21d59ce61b0
284fd8ac33ac9725
Yes N/A N/A 198.20.167.84/32
2 N/A Executable 4a4a1709e961386e
6ce4398d9866feab
8943ca20
08457294c7e98c5d
3e5ee8cdc25fa537
Yes N/A N/A United States
3 N/A Executable 9a50651e6d026194
67f6e5162e9e207d
f37e5df4
e03e9c0856e731d7
73f227f52069f323
Yes N/A N/A Poland
4 N/A Executable 0c9e9f46cf59a95d
9627ab7b654af0f6
ff969046
b067ea7d33641ecc
17787fd106e86518
Yes N/A N/A United States
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Antivirus Protection protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security