Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

75534 31.82%
9b859 31.82%
aeb2a 2.27%
d8f51 20.45%
17f78 2.27%
6b302 4.55%
66d14 2.27%
664da 4.55%
(Note, Huawei Technologies Co. publishes each variation of this file with the same version, but the hashes are unique.)

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegCloseKey, RegOpenKeyExA, RegQueryValueExA
kernel32.dll
CloseHandle, CreateDirectoryA, CreateMutexA, CreateSemaphoreA, CreateThread, CreateToolhelp32Snapshot, GetCurrentDirectoryA, GetCurrentProcess, GetCurrentThreadId, GetDriveTypeA, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameW, GetModuleHandleA, GetPrivateProfileStringA, GetProcAddress, GetVersionExA, InterlockedDecrement, InterlockedIncrement, MultiByteToWideChar, Process32First, Process32Next, ReleaseMutex, ReleaseSemaphore, SetLastError, Sleep, TerminateThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, WaitForSingleObject, DeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, InterlockedExchange, IsDBCSLeadByteEx, LeaveCriticalSection, WideCharToMultiByte
libgcc_s_dw2-1.dll
_Unwind_DeleteException, _Unwind_GetDataRelBase, _Unwind_GetIPInfo, _Unwind_GetLanguageSpecificData, _Unwind_GetRegionStart, _Unwind_GetTextRelBase, _Unwind_RaiseException, _Unwind_Resume, _Unwind_Resume_or_Rethrow, _Unwind_SetGR, _Unwind_SetIP, __deregister_frame_info, __emutls_get_address, __register_frame_info, __udivdi3, __umoddi3
mingwm10.dll
__mingwthr_key_dtor
msvcrt.dll
DllMain
qtcore4.dll
_Z5qFreePv, _ZN10QByteArray7reallocEi, _ZN10QByteArrayC1EPKc, _ZN10QTextCodec12codecForNameERK10QByteArray, _ZN11QVectorData4freeEPS_i, _ZN16QCoreApplication18applicationDirPathEv, _ZN16QCoreApplication4argcEv, _ZN16QCoreApplication4argvEv, _ZN4QDirC1ERK7QString, _ZN4QDirD1Ev, _ZN5QCharC1Ec, _ZN5QFile11permissionsERK7QString, _ZN5QFile14setPermissionsERK7QString6QFlagsINS_10PermissionEE, _ZN5QFile4copyERK7QStringS2_, _ZN5QFile4openE6QFlagsIN9QIODevice12OpenModeFlagEE, _ZN5QFile5closeEv, _ZN5QFile6existsERK7QString, _ZN5QFile6removeEv, _ZN5QFileC1ERK7QString, _ZN5QFileD1Ev, _ZN7QString11shared_nullE, _ZN7QString14fromWCharArrayEPKwi, _ZN7QString16codecForCStringsE, _ZN7QString16fromAscii_helperEPKci, _ZN7QString4freeEPNS_4DataE, _ZN7QString6appendERKS_, _ZN7QString7replaceERKS_S1_N2Qt15CaseSensitivityE, _ZN7QString7replaceEiiRKS_, _ZN7QString8fromUtf8EPKci, _ZN7QString9fromAsciiEPKci, _ZN7QStringaSERKS_, _ZN8QProcess13startDetachedERK7QString, _ZN8QProcess7executeERK7QString, _ZN8QVariantC1EPKc, _ZN8QVariantD1Ev, _ZN9QFileInfoC1ERK7QString, _ZN9QFileInfoD1Ev, _ZN9QIODevice5writeEPKcx, _ZN9QListData7detach3Ev, _ZN9QSettings10beginGroupERK7QString, _ZN9QSettings8endGroupEv, _ZN9QSettingsC1ERK7QStringNS_6FormatEP7QObject, _ZN9QSettingsD1Ev, _ZNK10QStringRef8toStringEv, _ZNK10QTextCodec9toUnicodeEPKc, _ZNK4QDir5mkdirERK7QString, _ZNK4QDir6existsERK7QString, _ZNK5QFile4sizeEv, _ZNK7QString11lastIndexOfERKS_iN2Qt15CaseSensitivityE, _ZNK7QString11toLocal8BitEv, _ZNK7QString12toWCharArrayEPw, _ZNK7QString5toIntEPbi, _ZNK7QString6toUtf8Ev, _ZNK7QString7indexOfERKS_iN2Qt15CaseSensitivityE, _ZNK7QString7toAsciiEv, _ZNK7QString8endsWithERK5QCharN2Qt15CaseSensitivityE, _ZNK7QStringeqERK13QLatin1String, _ZNK7QStringeqERKS_, _ZNK8QVariant8toStringEv, _ZNK9QFileInfo6existsEv, _ZNK9QSettings5valueERK7QStringRK8QVariant, _ZNK5QFile6existsEv
qtnetwork4.dll
_ZN17QNetworkInterface13allInterfacesEv, _ZN17QNetworkInterfaceC1ERKS_, _ZN17QNetworkInterfaceD1Ev, _ZN20QNetworkAddressEntryD1Ev, _ZNK17QNetworkInterface14addressEntriesEv, _ZNK17QNetworkInterface5flagsEv
qtxml4.dll
_ZN11QDomElement12setAttributeERK7QStringS2_, _ZN11QDomElementC1ERKS_, _ZN11QDomElementC1Ev, _ZN11QDomElementaSERKS_, _ZN12QDomDocument10setContentEP9QIODevicebP7QStringPiS4_, _ZN12QDomDocument10setContentERK7QStringbPS0_PiS4_, _ZN12QDomDocument13createElementERK7QString, _ZN12QDomDocument14createTextNodeERK7QString, _ZN12QDomDocumentC1Ev, _ZN12QDomDocumentD1Ev, _ZN12QDomNodeListD1Ev, _ZN16QXmlStreamReader15readElementTextEv, _ZN16QXmlStreamReader8readNextEv, _ZN16QXmlStreamReader9setDeviceEP9QIODevice, _ZN16QXmlStreamReaderC1Ev, _ZN16QXmlStreamReaderD1Ev, _ZN16QXmlStreamWriter14writeAttributeERK7QStringS2_, _ZN16QXmlStreamWriter15writeEndElementEv, _ZN16QXmlStreamWriter16writeEndDocumentEv, _ZN16QXmlStreamWriter16writeTextElementERK7QStringS2_, _ZN16QXmlStreamWriter17setAutoFormattingEb, _ZN16QXmlStreamWriter17writeStartElementERK7QString, _ZN16QXmlStreamWriter18writeStartDocumentEv, _ZN16QXmlStreamWriterC1EP9QIODevice, _ZN16QXmlStreamWriterD1Ev, _ZN19QXmlStreamAttributeD1Ev, _ZN8QDomNode11appendChildERKS_, _ZN8QDomNode11removeChildERKS_, _ZN8QDomNode12insertBeforeERKS_S1_, _ZN8QDomNode12replaceChildERKS_S1_, _ZN8QDomNode12setNodeValueERK7QString, _ZN8QDomNodeD1Ev, _ZN8QDomNodeD2Ev, _ZN8QDomNodeaSERKS_, _ZNK11QDomElement7tagNameEv, _ZNK11QDomElement9attributeERK7QStringS2_, _ZNK12QDomDocument15documentElementEv, _ZNK12QDomDocument8toStringEi, _ZNK12QDomNodeList4itemEi, _ZNK12QDomNodeList6lengthEv, _ZNK16QXmlStreamReader10attributesEv, _ZNK16QXmlStreamReader4nameEv, _ZNK16QXmlStreamReader5atEndEv, _ZNK16QXmlStreamReader9tokenTypeEv, _ZNK20QXmlStreamAttributes5valueERK7QString, _ZNK8QDomNode10childNodesEv, _ZNK8QDomNode10firstChildEv, _ZNK8QDomNode11nextSiblingEv, _ZNK8QDomNode17firstChildElementERK7QString, _ZNK8QDomNode18nextSiblingElementERK7QString, _ZNK8QDomNode6isNullEv, _ZNK8QDomNode8nodeNameEv, _ZNK8QDomNode9nodeValueEv, _ZNK8QDomNode9toElementEv, _ZNK16QXmlStreamReader5errorEv
shell32.dll
SHGetFolderPathA
Export table
CreatePlugin
ReleasePlugin

querystrategy.dll

By Huawei Technologies Co. (Signed)

Remove querystrategy.dll
MD5:   aeb2abc77ba3c5232086d5f658374934
SHA1:   f8b837fff1acb49c6b7448cfc7b5f56992df6683
SHA256:   13e0e16744601fc2961a78a4297ddbd41c92904ef50c5c23db530687cc95ba24

Overview

querystrategy.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by Huawei Technologies Co. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:querystrategy.dll
Typical file path:C:\ProgramData\vivacom 3g usb modem\onlineupdate\querystrategy.dll
Size:374.5 KB (383,488 bytes)
Certificate
Issued to:Huawei Technologies Co.
Authority (CA):VeriSign
Digital DNA
PE subsystem:Windows Console
File packed:No
Code language:Microsoft Visual C++
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 43.18%
Windows 7 Home Basic 11.36%
Windows 7 Home Premium 11.36%
Windows 8 Pro 6.82%
Windows 7 Professional 6.82%
Microsoft Windows XP 6.82%
Windows 8 4.55%
Windows 8 Single Language 2.27%
Windows 8.1 Pro 2.27%
Windows 7 Starter 2.27%
Windows Vista Home Premium 2.27%

Distribution by countryDistribution by country

India installs about 15.91% of querystrategy.dll.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Dell 23.81%
Acer 21.43%
Sony 19.05%
Hewlett-Packard 16.67%
Toshiba 14.29%
Samsung 4.76%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE