How to Remove “accicons.exe”

What is accicons.exe?

accicons.exe is a legitimate file process developed by Microsoft Corporation. This process is known as Microsoft Office Component and it belongs to Microsoft Office System. You can locate the file in C:\Program Files. The virus is created by malware authors and is named after accicons.exe file.

Affected Platform: Windows OS

How to check if your computer is infected with accicons.exe malware?

Keep an eye for the following symptoms to check if your PC is infected with accicons.exe malware:

  • Unstable internet connection
  • Browser redirects to unwanted websites
  • PC performance slows down
  • Browser is bombarded with hordes of popup ads
  • System screen freezes repeatedly

If you find any of  the above mentioned symptoms, take the following steps to be sure about the malware infection:

1) Press CTRL+ALT+DEL keys to open Task Manager.

2) Go to the process tab and right-click on the accicons.exe file and open its location.

If the file is located outside C:\Program Files, then you should take measures to get rid of the malware.

How to remove accicons.exe malware from system with Comodo Cleaning Essentials?

Comodo Cleaning Essentials (CCE) incorporates antivirus software with unique features like auto-sandboxing to identify and obstruct every suspicious process running on an endpoint with a single click. To remove accicons.exe malware using CCE, follow the steps mentioned below:

Step 1: Download the CCE suite.

Step 2: To start the application, double-click on the CCE.exe file.

Step 3: It then probes the antivirus to initiate a full system scan to identify and remove any existing malicious files.

Step 4: If threats are found during the scanning, you will be prompted with an alert screen.

Step 5: Comodo Cleaning Essentials will remove accicons.exe malware from your computer including all other malwares!

11

Malware Entries

First Seen: 24 March 2018 at 3:41 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable 3d69cbe24441f528
a422153f987ac2c3
8344e460
da41613d885f71dd
6549515de37e3ee0
Worm.Win32.D
elf.nj
No N/A N/A Indonesia N/A
2 N/A Executable f8c845daf48c75e4
2932df9281ad28f8
33789758
d7a7a88cbfb250f8
6b96cf536f6570b2
TrojWare.Win
32.Spy.E
No N/A N/A Nigeria N/A
3 N/A Executable 8451940067ed1ab6
6e1f23f3facd8af3
6e8e7a9e
35f4e7d23b864ea5
7464ff7317ff149f
TrojWare.Win
32.Delf.NRJ
No N/A N/A Kenya N/A
4 N/A Executable 4f679a0ee796af7f
84eb6c275aac18b2
6f32ff8a
bc272c4af8fc7f6e
7d62bceeb13b27eb
Worm.Win32.D
elf.nj
No N/A N/A Indonesia N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
6

Safe Entries

First Seen: 05 July 2009 at 12:59 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable 4a4a1709e961386e
6ce4398d9866feab
8943ca20
08457294c7e98c5d
3e5ee8cdc25fa537
Yes N/A N/A United States
2 N/A Executable 9a50651e6d026194
67f6e5162e9e207d
f37e5df4
e03e9c0856e731d7
73f227f52069f323
Yes N/A N/A Poland
3 N/A Non-executable cd2c8e89bfb8b4f6
df91785092c23631
aa772045
1fc7100a4fcf6325
5308749eeab76e88
No N/A N/A 198.20.167.84/32
4 N/A Executable 09583002013f8f51
bd8f6c759c0195ff
44b0b83d
07c5ff05e1cf1862
586dc809645a6a12
Yes N/A N/A United States
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Antivirus Protection protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security