What is rqc.exe?
Originally developed by Microsoft Corporation, rqc.exe is a legitimate file process. This process is known as Windows NT Remove Quarantine Client and it belongs to Windows Operating System. It is located in C:\Windows\System32 by default.
rqc.exe virus is created when malware authors write virus files and name them after rqc.exe with an aim to spread virus on the internet.
Affected Platform: Windows OS
How to check if your computer is infected with rqc.exe malware?
If your system is affected by rqc.exe malware, you will notice one or several of the symptoms below:
- rqc.exe occupies an unusually large CPU memory
- Erratic internet connection
- Your browser is bombarded with annoying popup ads
- Computer screen freezes
- PC's processing speed suffers
- You are redirected to unknown websites
To pinpoint the virus file location, take the following steps:
Step 1: Press CTRL+ALT+DEL keys at once to open Task Manager.
Step 2: If you notice the file located outside C:\Windows\System32, you should run an antivirus scan to get rid of the malware.
How to remove rqc.exe malware from system using Comodo Cleaning Essentials?
You can either choose to remove rqc.exe and other malwares using Comodo Antivirus, or Comodo Cleaning Essentials (CCE) – both of which are absolutely free to download! CCE is a set of computer security tools designed to help you identify and remove malwares and unsafe processes from an infected computer.
To remove malwares using CCE, take the following steps:
- Check the system requirements and download the feature-rich CCE suite for free.
- After installation, choose the type of scan you want to perform. CCE offers 3 scan options to get rid of malwares from a PC:
- Smart Scan: Does a scan on critical areas of your system.
- Full Scan: Does a complete scan of your system.
- Custom Scan: Does a scan only on selected items.
Additionally, it's recommended that you approve of any updates that the CCE will prompt you about to ensure it does a better job of identifying all the latest threats.
- Click 'Next' to view the results.
- Click 'Apply' to apply the selected operations to the threats. The selected operations will be applied.
First Seen: 10 September 2010 at 2:51 am
No. | Company | File Type | SHA1 | MD5 | Malware Name |
Digitally Signed |
File Version |
Product Version |
Submitted From |
Malware Behavior |
---|---|---|---|---|---|---|---|---|---|---|
1 | Microsoft Corporation | Executable | d2c0eff893b788c0 d26b28fc84792805 685dda0e |
24f1c563d80efb6b af77406e6a6848f5 |
Virus.Win32. Sality.q |
No | 5.2.3790.3 959 (srv03_sp2 _rtm.07021 6-1710) |
5.2.3790.3 959 |
![]() |
N/A |
2 | Microsoft Corporation | Executable | c0d8588a9c966297 9a236b2b0e4875e3 f34e4265 |
b23cf0754027ef4a a4fee65e8e76f0cc |
MalCrypt.Ind us! |
No | 5.2.3790.3 959 (srv03_sp2 _rtm.07021 6-1710) |
5.2.3790.3 959 |
![]() |
N/A |
3 | AVG Technologies CZ, s.r.o. | Executable | ff347dc5004c4a65 751a2aae23b663d7 c27bbc52 |
4213926316365900 1de40ec199e69114 |
TrojWare.Win 32.TrojanDow nloader.Frau dLoad.AH |
No | 9.0.0.832 | 9.0.0.832 | ![]() |
N/A |
4 | Microsoft Corporation | Executable | 8ff5f7a47924a3c3 cb4bccb3fed72e44 1654a935 |
288c51e40f66eb39 fbfa19b547c1d8d2 |
Virus.Win32. Sality.gen |
No | 5.2.3790.3 959 (srv03_sp2 _rtm.07021 6-1710) |
5.2.3790.3 959 |
![]() |
N/A |
First Seen: 27 June 2008 at 10:21 am
No. | Company | File Type | SHA1 | MD5 | Digitally Signed |
File Version |
Product Version |
Submitted From |
---|---|---|---|---|---|---|---|---|
1 | Microsoft Corporation | Executable | b53e654624210681 05951aeea781b3b3 f8e12221 |
8e3b1e7548f96f47 dfbaa31d8db61a75 |
No | 5.2.3790.3 959 (srv03_sp2 _rtm.07021 6-1710) |
5.2.3790.3 959 |
![]() |
2 | Microsoft Corporation | Executable | 1e6c738567cc06ad 211cdb758108c88b 20cb6868 |
d0d8fe22890454fc ca7c6df75e66a40d |
No | 10.0.19041 .1 (WinBuild. 160101.080 0) |
10.0.19041 .1 |
![]() |
3 | Microsoft Corporation | Executable | a5dedd090f70d10b 08d777ba624a950b 2779db95 |
79ea03b5e74cf933 a9e29090b9a40440 |
No | 6.1.7601.1 7514 (win7sp1_r tm.101119- 1850) |
6.1.7601.1 7514 |
![]() |
4 | N/A | Executable | f9bf9d3f61a22036 52704343553c14c8 b06ad06a |
6d46de3985305216 f3312e6f559d8a09 |
No | N/A | N/A | ![]() |