File details
File name: oodag.exe
Name: O&O Defrag
Description: O&O Defrag Agent (Win32)
Version: 14.5.543
Size: 3.1 MB
Original file name: oodag.exe
Digital certificate
Certificate authority:
VeriSign
Resource utilization
 | CPU utilization averages |
Total CPU: 0.0000395181%
Privileged CPU:
0.0000189000%

User CPU:
0.00002061813745%

Privileged CPU time: 2418.02 ms
Privileged CPU time /min: 0 ms
CPU cycle count:
1,371,531,750
CPU cycle count /min: 117,203,515
Context switches /sec:
3
 | Memory utilization averages |
Committed memory:
83.98 MB
Peak committed memory: 87.3 MB
Paged memory:
9.7 MB
Peak paged memory: 11.64 MB
Paged system memory:
126.89 KB
Non-paged system memory: 22.53 KB
Working set memory:
13.91 MB
Peak working set memory: 16.09 MB
Min working set memory: 12.75 MB
Private memory:
9.7 MB
Page faults:
3,298,543
Page faults /min: 553
 | Process I/O averages |
Total read operations:
82
Read operations /min: 1
Total read transfer: 1.84 MB
Read transfer /min: 324 Bytes
Total write operations:
7
Write operations /min: 1
Total write transfer: 124.3 KB
Write transfer /min: 21 Bytes
Total other operations:
11,419
Other operations /min: 2
Total other transfer: 324.49 MB
Other Transfer /min: 55.74 KB
Resources
Handle count average: 240
Thread count average: 13
Thread resource averages
Total CPU: 0.000498476210%
Privileged CPU: 0.000126100095%
User CPU: 0.000372376115%
CPU Cycle count /sec: 376,782
Context switches /sec: 1
Module memory size: 3.15 MB
Total CPU: 0.000177724983%
Privileged CPU: 0.000016926189%
User CPU: 0.000160798794%
CPU Cycle count /sec: 7,485
Module memory size: 124 KB
Process details
Runs as (owner): System
Integrety level: System
Windows platform: 64-bit
Runs as a service: Yes
Parent Process
Process Command
"C:\Program Files\OO Software\Defrag\oodag.exe"
Service details
Name: OODefragAgent
Network connectivity
TCP: localhost on port 50300
Image hashes
MD5: 1cd34a17b36dd143ce212ae776a97f9e
SHA-1: e0b082ae439c45218282ef83fd07c7f732c912b2
SHA-256: 9207f03285f977437f40278bc959483ac1888648204d7545f8709eb237c3e0b0
PE image details
Subsystem: Windows GUI
File packed: No
Import Table
advapi32.dll

CreateServiceW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyW
RegDeleteKeyW
CloseServiceHandle
DeleteAce
AddAccessDeniedAce
AddAce
GetAclInformation
GetAce
MakeSelfRelativeSD
GetSecurityDescriptorLength
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
MakeAbsoluteSD
GetLengthSid
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
EqualSid
AllocateAndInitializeSid
FreeSid
GetUserNameW
RegisterEventSourceW
DeregisterEventSource
ReportEventW
LookupAccountNameW
OpenThreadToken
OpenProcessToken
GetTokenInformation
RegQueryValueW
LookupAccountSidW
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyW
RegCreateKeyExW
RegOpenKeyExW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
ControlService
OpenServiceW
DeleteService
QueryServiceStatus
OpenSCManagerW
RegisterServiceCtrlHandlerExW
InitiateSystemShutdownExW
ConvertStringSidToSidW
iphlpapi.dll

kernel32.dll

TlsFree
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
GetThreadLocale
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoW
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
InterlockedExchange
SetConsoleCtrlHandler
VirtualQuery
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
VirtualAlloc
FatalAppExitA
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
ExitProcess
GetModuleHandleA
GetFileAttributesW
HeapReAlloc
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
GetFileAttributesExW
HeapDestroy
HeapCreate
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
CloseHandle
ResumeThread
SetThreadPriority
CreateEventW
FreeLibrary
WaitForSingleObject
GetLastError
GetVersionExW
GetExitCodeProcess
CreateProcessA
DeleteFileA
FlushFileBuffers
WriteFile
CreateFileA
GetTempPathA
TerminateThread
Sleep
WaitForMultipleObjects
GetLocalTime
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
GlobalFree
GetCommandLineW
SetErrorMode
GetVersion
GetProcAddress
LoadLibraryW
SetEvent
GetSystemPowerStatus
GetSystemDirectoryW
ResetEvent
SetWaitableTimer
CreateWaitableTimerW
ReadFile
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
DeleteFileW
RemoveDirectoryW
GetFileSize
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
SystemTimeToFileTime
FileTimeToSystemTime
LocalFileTimeToFileTime
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
GetSystemInfo
LocalFree
FormatMessageW
GetTickCount
SetLastError
WideCharToMultiByte
lstrlenW
CreateThread
LoadLibraryA
GetSystemDirectoryA
QueryPerformanceFrequency
UnhandledExceptionFilter
SetFilePointer
CreateDirectoryW
GetCurrentThreadId
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetCurrentThread
SetEndOfFile
GetCurrentProcessId
FileTimeToLocalFileTime
WriteConsoleW
GetSystemTime
GetStdHandle
AllocConsole
GetComputerNameW
MultiByteToWideChar
GetVersionExA
GetStartupInfoW
ExitThread
MoveFileW
GetSystemTimeAsFileTime
TerminateProcess
VirtualFree
CreateMutexW
ReleaseMutex
WriteProcessMemory
VirtualProtect
ExpandEnvironmentStringsW
SetThreadExecutionState
GetFileSizeEx
GetComputerNameExW
InterlockedCompareExchange
HeapSetInformation
RtlUnwind
EncodePointer
DecodePointer
GetTimeFormatW
GetDateFormatW
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
netapi32.dll

NetLocalGroupEnum
NetLocalGroupGetMembers
NetUserDel
NetLocalGroupDelMembers
NetGroupDel
NetUserAdd
NetGroupAddUser
NetGroupAdd
NetWkstaGetInfo
NetLocalGroupAddMembers
NetGetDCName
NetApiBufferFree
NetGroupGetUsers
ntdll.dll

RtlTimeFieldsToTime
RtlUpperChar
ZwQueryDirectoryFile
ZwFreeVirtualMemory
ZwAllocateVirtualMemory
ZwFlushBuffersFile
RtlInitAnsiString
RtlOemStringToUnicodeString
RtlFreeUnicodeString
RtlFindMessage
RtlUnwind
ZwOpenProcess
ZwQueryObject
ZwDuplicateObject
RtlQueryEnvironmentVariable_U
RtlInitString
LdrLoadDll
LdrGetProcedureAddress
LdrUnloadDll
RtlCompareUnicodeString
ZwDelayExecution
ZwWaitForMultipleObjects
ZwClearEvent
ZwQueryEvent
ZwFsControlFile
RtlPrefixUnicodeString
ZwQuerySymbolicLinkObject
ZwQueryVolumeInformationFile
ZwOpenSymbolicLinkObject
RtlAdjustPrivilege
ZwDeviceIoControlFile
RtlUnicodeStringToAnsiString
RtlReleaseResource
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlDeleteResource
RtlInitializeResource
RtlEqualUnicodeString
ZwSetInformationThread
ZwResumeThread
RtlDeleteCriticalSection
ZwSuspendThread
RtlInitializeCriticalSection
RtlCreateUserThread
RtlEnterCriticalSection
ZwResetEvent
ZwSetEvent
RtlLeaveCriticalSection
ZwTerminateThread
ZwCreateEvent
ZwWaitForSingleObject
RtlUnicodeStringToOemString
RtlInitUnicodeString
RtlSystemTimeToLocalTime
ZwQuerySystemTime
ZwClose
ZwReadFile
ZwQueryInformationFile
ZwOpenFile
ZwQuerySystemInformation
ZwQueryInformationProcess
ZwQueryInformationThread
RtlUpcaseUnicodeChar
_wcsicmp
_allmul
NtQueryInformationProcess
NtOpenProcess
wcsrchr
memmove
NtQuerySystemInformation
_chkstk
_memicmp
RtlGetVersion
_alldvrm
_fltused
memcpy
memset
wcschr
NtQuerySystemTime
_alldiv
_aulldiv
NtClose
_wcsnicmp
NtReadFile
NtQueryInformationFile
NtOpenFile
RtlTryEnterCriticalSection
NtFreeVirtualMemory
NtAllocateVirtualMemory
NtDeleteFile
NtSetInformationFile
RtlDosPathNameToNtPathName_U
NtCreateFile
NtWriteFile
RtlDecompressBuffer
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
NtSetEvent
NtTerminateThread
NtWaitForSingleObject
NtCreateEvent
NtClearEvent
NtFsControlFile
NtQueryEvent
NtWaitForMultipleObjects
NtCreateKey
RtlConvertExclusiveToShared
NtCreateMutant
NtQueryValueKey
NtSetValueKey
NtDeviceIoControlFile
NtQueryVolumeInformationFile
NtQueryInformationThread
NtDelayExecution
RtlConvertSharedToExclusive
NtFlushBuffersFile
NtReleaseMutant
NtDuplicateObject
NtQueryObject
RtlExpandEnvironmentStrings_U
NtOpenKey
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlLocalTimeToSystemTime
NtQueryDirectoryFile
RtlCompareString
NtOpenThread
_wtoi
_wcslwr
_aullshr
strstr
RtlTimeToTimeFields
ole32.dll

CoInitialize
CoUninitialize
CLSIDFromProgID
CoCreateInstance
CoTaskMemFree
StringFromCLSID
OleRun
CLSIDFromString
StringFromGUID2
CoCreateGuid
CoInitializeSecurity
CoInitializeEx
setupapi.dll

CM_Get_Parent
CM_Locate_DevNodeW
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Registry_PropertyW
CM_Get_Device_IDW
CM_Get_Device_ID_Size
CM_Get_Device_ID_ListW
CM_Get_Device_ID_List_SizeW
SetupDiDestroyDeviceInfoList
shell32.dll

user32.dll

SystemParametersInfoW
OpenDesktopW
CloseDesktop
DefWindowProcW
wsprintfW
MessageBoxW
LoadStringW
ExitWindowsEx
DestroyWindow
RegisterClassExW
CreateWindowExW
UnregisterClassW
GetMessageW
DispatchMessageW
TranslateMessage
KillTimer
PostQuitMessage
SetTimer
SendMessageW
version.dll

GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ws2_32.dll

WSAConnect
WSAAccept
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSAEventSelect
WSAEnumProtocolsW
WSACloseEvent
WSASocketW
WSACreateEvent
getnameinfo