Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

75534 31.82%
9b859 31.82%
aeb2a 2.27%
d8f51 20.45%
17f78 2.27%
6b302 4.55%
66d14 2.27%
664da 4.55%
(Note, Huawei Technologies Co. publishes each variation of this file with the same version, but the hashes are unique.)

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegCloseKey, RegOpenKeyExA, RegQueryValueExA
kernel32.dll
CloseHandle, CreateDirectoryA, CreateMutexA, CreateSemaphoreA, CreateThread, CreateToolhelp32Snapshot, GetCurrentDirectoryA, GetCurrentProcess, GetCurrentThreadId, GetDriveTypeA, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameW, GetModuleHandleA, GetPrivateProfileStringA, GetProcAddress, GetVersionExA, InterlockedDecrement, InterlockedIncrement, MultiByteToWideChar, Process32First, Process32Next, ReleaseMutex, ReleaseSemaphore, SetLastError, Sleep, TerminateThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, WaitForSingleObject, DeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, InterlockedExchange, IsDBCSLeadByteEx, LeaveCriticalSection, WideCharToMultiByte
libgcc_s_dw2-1.dll
_Unwind_DeleteException, _Unwind_GetDataRelBase, _Unwind_GetIPInfo, _Unwind_GetLanguageSpecificData, _Unwind_GetRegionStart, _Unwind_GetTextRelBase, _Unwind_RaiseException, _Unwind_Resume, _Unwind_Resume_or_Rethrow, _Unwind_SetGR, _Unwind_SetIP, __deregister_frame_info, __emutls_get_address, __register_frame_info, __udivdi3, __umoddi3
mingwm10.dll
__mingwthr_key_dtor
msvcrt.dll
DllMain
qtcore4.dll
_Z5qFreePv, _ZN10QByteArray7reallocEi, _ZN10QByteArrayC1EPKc, _ZN10QTextCodec12codecForNameERK10QByteArray, _ZN11QVectorData4freeEPS_i, _ZN16QCoreApplication18applicationDirPathEv, _ZN16QCoreApplication4argcEv, _ZN16QCoreApplication4argvEv, _ZN4QDirC1ERK7QString, _ZN4QDirD1Ev, _ZN5QCharC1Ec, _ZN5QFile11permissionsERK7QString, _ZN5QFile14setPermissionsERK7QString6QFlagsINS_10PermissionEE, _ZN5QFile4copyERK7QStringS2_, _ZN5QFile4openE6QFlagsIN9QIODevice12OpenModeFlagEE, _ZN5QFile5closeEv, _ZN5QFile6existsERK7QString, _ZN5QFile6removeEv, _ZN5QFileC1ERK7QString, _ZN5QFileD1Ev, _ZN7QString11shared_nullE, _ZN7QString14fromWCharArrayEPKwi, _ZN7QString16codecForCStringsE, _ZN7QString16fromAscii_helperEPKci, _ZN7QString4freeEPNS_4DataE, _ZN7QString6appendERKS_, _ZN7QString7replaceERKS_S1_N2Qt15CaseSensitivityE, _ZN7QString7replaceEiiRKS_, _ZN7QString8fromUtf8EPKci, _ZN7QString9fromAsciiEPKci, _ZN7QStringaSERKS_, _ZN8QProcess13startDetachedERK7QString, _ZN8QProcess7executeERK7QString, _ZN8QVariantC1EPKc, _ZN8QVariantD1Ev, _ZN9QFileInfoC1ERK7QString, _ZN9QFileInfoD1Ev, _ZN9QIODevice5writeEPKcx, _ZN9QListData7detach3Ev, _ZN9QSettings10beginGroupERK7QString, _ZN9QSettings8endGroupEv, _ZN9QSettingsC1ERK7QStringNS_6FormatEP7QObject, _ZN9QSettingsD1Ev, _ZNK10QStringRef8toStringEv, _ZNK10QTextCodec9toUnicodeEPKc, _ZNK4QDir5mkdirERK7QString, _ZNK4QDir6existsERK7QString, _ZNK5QFile4sizeEv, _ZNK7QString11lastIndexOfERKS_iN2Qt15CaseSensitivityE, _ZNK7QString11toLocal8BitEv, _ZNK7QString12toWCharArrayEPw, _ZNK7QString5toIntEPbi, _ZNK7QString6toUtf8Ev, _ZNK7QString7indexOfERKS_iN2Qt15CaseSensitivityE, _ZNK7QString7toAsciiEv, _ZNK7QString8endsWithERK5QCharN2Qt15CaseSensitivityE, _ZNK7QStringeqERK13QLatin1String, _ZNK7QStringeqERKS_, _ZNK8QVariant8toStringEv, _ZNK9QFileInfo6existsEv, _ZNK9QSettings5valueERK7QStringRK8QVariant, _ZNK5QFile6existsEv
qtnetwork4.dll
_ZN17QNetworkInterface13allInterfacesEv, _ZN17QNetworkInterfaceC1ERKS_, _ZN17QNetworkInterfaceD1Ev, _ZN20QNetworkAddressEntryD1Ev, _ZNK17QNetworkInterface14addressEntriesEv, _ZNK17QNetworkInterface5flagsEv
qtxml4.dll
_ZN11QDomElement12setAttributeERK7QStringS2_, _ZN11QDomElementC1ERKS_, _ZN11QDomElementC1Ev, _ZN11QDomElementaSERKS_, _ZN12QDomDocument10setContentEP9QIODevicebP7QStringPiS4_, _ZN12QDomDocument10setContentERK7QStringbPS0_PiS4_, _ZN12QDomDocument13createElementERK7QString, _ZN12QDomDocument14createTextNodeERK7QString, _ZN12QDomDocumentC1Ev, _ZN12QDomDocumentD1Ev, _ZN12QDomNodeListD1Ev, _ZN16QXmlStreamReader15readElementTextEv, _ZN16QXmlStreamReader8readNextEv, _ZN16QXmlStreamReader9setDeviceEP9QIODevice, _ZN16QXmlStreamReaderC1Ev, _ZN16QXmlStreamReaderD1Ev, _ZN16QXmlStreamWriter14writeAttributeERK7QStringS2_, _ZN16QXmlStreamWriter15writeEndElementEv, _ZN16QXmlStreamWriter16writeEndDocumentEv, _ZN16QXmlStreamWriter16writeTextElementERK7QStringS2_, _ZN16QXmlStreamWriter17setAutoFormattingEb, _ZN16QXmlStreamWriter17writeStartElementERK7QString, _ZN16QXmlStreamWriter18writeStartDocumentEv, _ZN16QXmlStreamWriterC1EP9QIODevice, _ZN16QXmlStreamWriterD1Ev, _ZN19QXmlStreamAttributeD1Ev, _ZN8QDomNode11appendChildERKS_, _ZN8QDomNode11removeChildERKS_, _ZN8QDomNode12insertBeforeERKS_S1_, _ZN8QDomNode12replaceChildERKS_S1_, _ZN8QDomNode12setNodeValueERK7QString, _ZN8QDomNodeD1Ev, _ZN8QDomNodeD2Ev, _ZN8QDomNodeaSERKS_, _ZNK11QDomElement7tagNameEv, _ZNK11QDomElement9attributeERK7QStringS2_, _ZNK12QDomDocument15documentElementEv, _ZNK12QDomDocument8toStringEi, _ZNK12QDomNodeList4itemEi, _ZNK12QDomNodeList6lengthEv, _ZNK16QXmlStreamReader10attributesEv, _ZNK16QXmlStreamReader4nameEv, _ZNK16QXmlStreamReader5atEndEv, _ZNK16QXmlStreamReader9tokenTypeEv, _ZNK20QXmlStreamAttributes5valueERK7QString, _ZNK8QDomNode10childNodesEv, _ZNK8QDomNode10firstChildEv, _ZNK8QDomNode11nextSiblingEv, _ZNK8QDomNode17firstChildElementERK7QString, _ZNK8QDomNode18nextSiblingElementERK7QString, _ZNK8QDomNode6isNullEv, _ZNK8QDomNode8nodeNameEv, _ZNK8QDomNode9nodeValueEv, _ZNK8QDomNode9toElementEv, _ZNK16QXmlStreamReader5errorEv
shell32.dll
SHGetFolderPathA
Export table
CreatePlugin
ReleasePlugin

querystrategy.dll

By Huawei Technologies Co. (Signed)

Remove querystrategy.dll
MD5:   17f784217f53a1b3aebf766de3a8095c
SHA1:   6aae5f7de4bcaeede507760347dbe470589643fe
SHA256:   a749652f6d7859c841968fd2e8ba734adee79ec7659a51f93f567155586b05dc

Overview

querystrategy.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by Huawei Technologies Co. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:querystrategy.dll
Typical file path:C:\ProgramData\vivacom 3g usb modem\onlineupdate\querystrategy.dll
Size:815.5 KB (835,072 bytes)
Certificate
Issued to:Huawei Technologies Co.
Authority (CA):VeriSign
Digital DNA
PE subsystem:Windows Console
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 43.18%
Windows 7 Home Basic 11.36%
Windows 7 Home Premium 11.36%
Windows 8 Pro 6.82%
Windows 7 Professional 6.82%
Microsoft Windows XP 6.82%
Windows 8 4.55%
Windows 8 Single Language 2.27%
Windows 8.1 Pro 2.27%
Windows 7 Starter 2.27%
Windows Vista Home Premium 2.27%

Distribution by countryDistribution by country

India installs about 15.91% of querystrategy.dll.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 23.81%
Acer 21.43%
Sony 19.05%
Hewlett-Packard 16.67%
Toshiba 14.29%
Samsung 4.76%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE