query.exe
- File Path:
C:\Windows\SysWOW64\query.exe
- Description: MultiUser Query Utility
Hashes
Type | Hash |
---|---|
MD5 | BCB053556213C5755EAEF97D2F68BF0C |
SHA1 | 49B715FBEC24F1B1787DCD8D1658757BAFB8186A |
SHA256 | 856EA448CE7E099496A0C9D7783FFFD2A28E9F1F931D2146714AB7640C39BADA |
SHA384 | 81848D8F554C4C1E6F02FC8C7E9AAFDAC373EABE8F20CF6BC8B2B2B9D30F8A887355EC9FF04606B62F6AE0F383FB9242 |
SHA512 | F1C504270EDD6FCD7401979ED6DB86C5DF3C4E58D440E521D83D62CD5DB72C08791B423ADC543B4C54F3BB0C6489FB7AF46A924571E2F4AB94A302516F7FD706 |
SSDEEP | 192:+WzogF5/eyf1wzT4Fce1pN/1mt2Wco7kPAWW3Wd8:HVDGyf1wzT4ieh/1qlwPAWW3W |
IMP | EC309FD93AE54D1FFDF17E744E71C366 |
PESHA1 | 972E27D94CFCDA78CC1C0C9E299C58F1D3081A5F |
PE256 | 7CC838D6491EF4498196B06C020BCDDCC0D4FA29428E51817D1EBC4A63A95AA2 |
Runtime Data
Usage (stdout):
QUERY { PROCESS | SESSION | TERMSERVER | USER }
Usage (stderr):
Invalid parameter(s)
QUERY { PROCESS | SESSION | TERMSERVER | USER }
Loaded Modules:
Path |
---|
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\wow64.dll |
C:\Windows\System32\wow64cpu.dll |
C:\Windows\System32\wow64win.dll |
C:\Windows\SysWOW64\query.exe |
Signature
- Status: Signature verified.
- Serial:
33000001C422B2F79B793DACB20000000001C4
- Thumbprint:
AE9C1AE54763822EEC42474983D8B635116C8452
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: query.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.17763.1 (WinBuild.160101.0800)
- Product Version: 10.0.17763.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/68
- VirusTotal Link: https://www.virustotal.com/gui/file/856ea448ce7e099496a0c9d7783fffd2a28e9f1f931d2146714ab7640c39bada/detection/
File Similarity (ssdeep match)
File | Score |
---|---|
C:\Windows\SysWOW64\change.exe | 54 |
C:\Windows\SysWOW64\reset.exe | 82 |
Additional Info*
*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.
query commands
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
Displays information about processes, sessions, and Remote Desktop Session Host servers. To find out what’s new in the latest version, see What’s New in Remote Desktop Services in Windows Server.
Syntax
query process
query session
query termserver
query user
Parameters
Parameter | Description |
---|---|
query process | Displays information about processes running on an Remote Desktop Session Host server. |
query session | Displays information about sessions on a Remote Desktop Session Host server. |
query termserver | Displays a list of all Remote Desktop Session Host servers on the network. |
query user | Displays information about user sessions on a Remote Desktop Session Host server. |
Additional References
MIT License. Copyright (c) 2020-2021 Strontic.