What is accicons.exe?
accicons.exe is a legitimate file process developed by Microsoft Corporation. This process is known as Microsoft Office Component and it belongs to Microsoft Office System. You can locate the file in C:\Program Files. The virus is created by malware authors and is named after accicons.exe file.
Affected Platform: Windows OS
How to check if your computer is infected with accicons.exe malware?
Keep an eye for the following symptoms to check if your PC is infected with accicons.exe malware:
- Unstable internet connection
- Browser redirects to unwanted websites
- PC performance slows down
- Browser is bombarded with hordes of popup ads
- System screen freezes repeatedly
If you find any of the above mentioned symptoms, take the following steps to be sure about the malware infection:
1) Press CTRL+ALT+DEL keys to open Task Manager.
2) Go to the process tab and right-click on the accicons.exe file and open its location.
If the file is located outside C:\Program Files, then you should take measures to get rid of the malware.
How to remove accicons.exe malware from system with Comodo Cleaning Essentials?
Comodo Cleaning Essentials (CCE) incorporates antivirus software with unique features like auto-sandboxing to identify and obstruct every suspicious process running on an endpoint with a single click. To remove accicons.exe malware using CCE, follow the steps mentioned below:
Step 1: Download the CCE suite.
Step 2: To start the application, double-click on the CCE.exe file.
Step 3: It then probes the antivirus to initiate a full system scan to identify and remove any existing malicious files.
Step 4: If threats are found during the scanning, you will be prompted with an alert screen.
Step 5: Comodo Cleaning Essentials will remove accicons.exe malware from your computer including all other malwares!
No. | Company | File Type | SHA1 | MD5 | Malware Name |
Digitally Signed |
File Version |
Product Version |
Submitted From |
Malware Behavior |
---|---|---|---|---|---|---|---|---|---|---|
1 | N/A | Executable | a45aaabc427f20cc 828014d34d030547 64f7967d |
84283f82524c2d67 d323d0cdb3f964dc |
Win32.Neshta .A |
No | N/A | N/A | ![]() |
N/A |
2 | N/A | Executable | c1db662632717632 b21ffecea609f406 107bd9e2 |
558dc23909fe1f86 931fe207b6febb13 |
Virus.Win32. Virut.CE |
No | N/A | N/A | ![]() |
N/A |
3 | N/A | Executable | f8c845daf48c75e4 2932df9281ad28f8 33789758 |
d7a7a88cbfb250f8 6b96cf536f6570b2 |
TrojWare.Win 32.Spy.E |
No | N/A | N/A | ![]() |
N/A |
4 | Windows | Executable | e352157c4db7a21a 5acd26a64c180a8b 6e1545c5 |
8814201418e3d296 04911f36c874776d |
TrojWare.Win 32.Fareit.RG Y |
No | 1.09.0005 | 1.09.0005 | ![]() |
N/A |
No. | Company | File Type | SHA1 | MD5 | Digitally Signed |
File Version |
Product Version |
Submitted From |
---|---|---|---|---|---|---|---|---|
1 | N/A | Executable | 5b0fcdef67013f1c d02853bfc9b7d0a0 a56a836f |
f4977aa4f0c2d1a0 444bc2d300959cb0 |
Yes | N/A | N/A | ![]() |
2 | Microsoft Corporation | Executable | f5621e5b9b756af2 657831fe32237412 c67e7981 |
f80f839907226ef1 062c8ce47434ed5e |
Yes | 16.0.15330 .20000 |
16.0.15330 .20000 |
![]() |
3 | N/A | Executable | 58ad2d1aeb9e64b1 fd90912f5258324b e1402481 |
f1f5b21d59ce61b0 284fd8ac33ac9725 |
Yes | N/A | N/A | ![]() |
4 | Microsoft Corporation | Executable | 5a3b064f67550211 2283d31d9814fad4 47a8a317 |
281bcdde5ee296c7 68c709b0f0857e29 |
Yes | 16.0.15225 .20212 |
16.0.15225 .20212 |
![]() |
- 4 items per page
- 8 items per page
- 16 items per page
- 32 items per page