qprocess.exe

  • File Path: C:\Windows\SysWOW64\qprocess.exe
  • Description: Query Process Utility

Hashes

Type Hash
MD5 6C731AF0B86FA5ADF1B3E75556FF7D2A
SHA1 6F4F6C36379E86B3E22A5E568D968D71D0E0E341
SHA256 23E556151BCA6472A7885AA78A812EC783B4498D036CB2BAAE1D22442111CDD9
SHA384 D663C0AFF111510BF0B341616CD6DCBC40AD1A6830E1F6DD7C692170F220CAD2F29DE31B619C6034D7CC898D35385DF9
SHA512 EE6A997BF5F0C78A40DC802C6D212FFA948390E16E81395FEAA47809A93E4EB78F95A95DBCEEB46EE51C47BACE67D675C5A297EA3879266D9167B523CB74D3F0
SSDEEP 384:yAFeyeTX4z4D2CKk8FrSPEDKJhoE882eaU2H9JWLME+2We9q:9Eyerlqk8W2dcV9
IMP AAB82838221289B44013358AF9976ECD
PESHA1 785A89900898C0F1E66BAEE53CD40EDC345FA8B0
PE256 1695A76BFB6544106B4A00EDC7C89AF824B0D8CEE1BD3BBABD0567F77DFB73F5

Runtime Data

Usage (stdout):

Displays information about processes.

QUERY PROCESS [* | processid | username | sessionname | /ID:nn | programname]
  [/SERVER:servername]

  *                  Display all visible processes.
  processid          Display process specified by processid.
  username           Display all processes belonging to username.
  sessionname        Display all processes running at sessionname.
  /ID:nn             Display all processes running at session nn.
  programname        Display all processes associated with programname.
  /SERVER:servername The Remote Desktop Session Host server to be queried.

Usage (stderr):

Invalid parameter(s)
Displays information about processes.

QUERY PROCESS [* | processid | username | sessionname | /ID:nn | programname]
  [/SERVER:servername]

  *                  Display all visible processes.
  processid          Display process specified by processid.
  username           Display all processes belonging to username.
  sessionname        Display all processes running at sessionname.
  /ID:nn             Display all processes running at session nn.
  programname        Display all processes associated with programname.
  /SERVER:servername The Remote Desktop Session Host server to be queried.

Loaded Modules:

Path
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\System32\wow64.dll
C:\Windows\System32\wow64cpu.dll
C:\Windows\System32\wow64win.dll
C:\Windows\SysWOW64\qprocess.exe

Signature

  • Status: Signature verified.
  • Serial: 33000001C422B2F79B793DACB20000000001C4
  • Thumbprint: AE9C1AE54763822EEC42474983D8B635116C8452
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: qprocess.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.17763.1 (WinBuild.160101.0800)
  • Product Version: 10.0.17763.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 32-bit

File Scan

  • VirusTotal Detections: 0/67
  • VirusTotal Link: https://www.virustotal.com/gui/file/23e556151bca6472a7885aa78a812ec783b4498d036cb2baae1d22442111cdd9/detection/

Possible Misuse

The following table contains possible examples of qprocess.exe being misused. While qprocess.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma proc_creation_win_susp_commands_recon_activity.yml - qprocess DRL 1.0
signature-base gen_suspicious_strings.yar $ = “qprocess” CC BY-NC 4.0

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


qprocess

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012

Displays information about processes that are running on a Remote Desktop Session Host server. To find out what’s new in the latest version, see What’s New in Remote Desktop Services in Windows Server.

[!NOTE] This command is the same as the query process command.

Additional References


MIT License. Copyright (c) 2020-2021 Strontic.