# File and Folder Query

- [Query for malicious file types in all users and system temp directories](/blugenie/artifacts/tactical-artifacts-by-category/file-and-folder-query/query-for-malicious-file-types-in-all-users-and-system-temp-directories.md): AID2201202326.YAML
- [Query Malicious file types from any directory not including the default OS and Install directories](/blugenie/artifacts/tactical-artifacts-by-category/file-and-folder-query/query-malicious-file-types-from-any-directory-not-including-the-default-os-and-install-directories.md): AID2201220858.YAML
- [Query all users for their Powershell Profile content for Powershell, Powershell\_ISE, and VS Code](/blugenie/artifacts/tactical-artifacts-by-category/file-and-folder-query/query-all-users-for-their-powershell-profile-content-for-powershell-powershell_ise-and-vs-code.md): AID2201232312.YAML
- [Query to Determine if any lolbin files are installed outside the normal OS and Program Files dir's](/blugenie/artifacts/tactical-artifacts-by-category/file-and-folder-query/query-to-determine-if-any-lolbin-files-are-installed-outside-the-normal-os-and-program-files-dirs.md): AID2201232312.YAML
