How to Remove “outicon.exe”

13

Malware Entries

First Seen: 17 October 2009 at 6:39 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable f92b20c00a4af350
7f73f96be8c332dc
19fc091f
f9e0bec386bc69cd
a43ea565824590bf
Virus.Win32.
Virut.Ce
No N/A N/A India N/A
2 N/A Executable 3cfc9d1bfd8b45de
710f2d9bb3dd9b82
ded515c0
024d513f6ab3f967
2a64af457907ca03
Virus.Win32.
Sality.Q
No N/A N/A Russian Federation N/A
3 N/A Executable 40030d57dc91f514
3b6847314979ad70
600ac660
6df010a82caeb098
3a10172d75068657
Virus.Win32.
Sality.Q
No N/A N/A Russian Federation N/A
4 N/A Executable adea990d07c50f3c
3b5f5ffb9c976fad
c5bfe5e7
e5b6e81902a8ae05
b8c827f5b5af7186
Win32.Neshta
.A
No N/A N/A Romania N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
42

Safe Entries

First Seen: 04 June 2008 at 7:07 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable 17e853243444afab
2f21c635d8e761a1
5be17955
023255aafcbd5470
f0213ba1b7805438
No N/A N/A Russian Federation
2 N/A Executable 8c3f2485cd91aaa2
e64eb41be04da89a
d581b756
ccbed1279eca9150
893206e7377ba389
No N/A N/A United States
3 N/A Executable abceb863b83b0376
4b06aa0d560985f3
7d760fac
a54ff28673efc0c4
f59863452b070a6f
No N/A N/A Satellite Provider
4 N/A Executable 17e853243444afab
2f21c635d8e761a1
5be17955
023255aafcbd5470
f0213ba1b7805438
No N/A N/A Ukraine
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks