Jump to content
Francis

accicons.exe

Recommended Posts

Hi all

Is detected a windows 7 file. Or is this a real malware?

post-20125-1256722016_thumb.jpg

Share this post


Link to post
Share on other sites

Ah ha it belongs to microsoft office access 2003 as via the logo.

Do you still wont me to upload it?

Share this post


Link to post
Share on other sites

Hope I'm not breaching protocol by jumping in on the conversation, but I'm having the same issues with pretty much all of the Office 2003 files located in C:\Windows\Installer\{90110409-6000-11D3-8CFE-0150048383C9} as of database 3047. This is a fresh install of 7 Ultimate x64 and I know the files are clean. I'm attaching the full contents for your examination (had to divide in 2 parts due size limits).

Regards.

Part1.rar

Share this post


Link to post
Share on other sites

I don't have room for Part2 due to size limits so I've uploaded it to my webspace. If you need me to attach via some other method, please advise.

Part2

Share this post


Link to post
Share on other sites

I just checked again and I cant replicate any of these .I am going to need a developers log and hope to get a hit there .

Share this post


Link to post
Share on other sites

Hello, I am experiencing this problem as well.

Notice of Trojan.FakeAlert started today with first quickscan using database version 3047.

c:\Windows\Installer\{90110409-6000-11D3-8CFE-0150048383C9}\accicons.exe

After selecting to quarantine and full shutdown and restart same message, same directory, but with the executable file wordicon.exe.

Looking forward to finding out what is up and if this is a problem or false positive. Don't mean to interrupt the conversation, but if I can help in anyway with upload, please let me know. Thanks.

Share this post


Link to post
Share on other sites

I am trying something that is a long shot to fix this in the next update . If this does not work I have one last option to use till the bug is patched in 1.42 .

Either way I will get this fixed today .

Share this post


Link to post
Share on other sites

Hi,

In windows 7 with MS office 2003, i received 3 programs that were spotted as malware:

outicon.exe ref#25835

misc.exe ref#69684

xlicons.exe ref#71163

wordicon.exe ref#79205

since then, all my MS office icons have disappeared. Eset Nod32, didn't pointed out those files

so I am wondering if they aren't malware in the first place. They are in quarantine at the moment.

Share this post


Link to post
Share on other sites

For those of you having this issue, the developers are aware of the problem and Bruce Harrison is in the process of correcting it. Please see this post for additional info.

Thanks :)

Share this post


Link to post
Share on other sites

I would be more than happy to help out to verify that it has been corrected, but unfortunately I don't have MS Office of any sort on my computer, so of course I haven't gotten any MBAM protection alerts. :)

Share this post


Link to post
Share on other sites

Updated rules to version 3050. Problem remains on my system (Windows XP SP3), the files are still being detected by the real-time scanner.

Share this post


Link to post
Share on other sites

Updated to Version 3050 Rules.

Icons restored from quarantine.

All fine.

Vista Business SP1

MS Office 2003

Thanks Bruce

Share this post


Link to post
Share on other sites
@Night Raven: Please try rebooting your system and see if they are still detected. Post back to let us know.

Thanks :)

Rebooted but to no avail. MBAM's real-time protection still thinks those files are evil. :)

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.