Information about cdefrag.exe

cdefrag.exe

cdefrag.exe is a Windows file recorded in the ThreatInfo database. It is associated with Disk D?efrag. The reported company name is Auslog?ics. The current detection status is Undefined, based on the latest analysis from 2021-05-06 20:51:03 (4 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Disk D?efrag
Company Name: Auslog?ics
MD5: 0d25a32e0b559ce7d964ee65e5f1d4eb
Size: 649 KB
First Published: 2020-03-03 18:27:43 (6 years ago)
Latest Published: 2021-05-06 20:51:03 (4 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-05-06 20:51:03 (4 years ago)
Signed By: Auslogics Labs Pty Ltd
Status: Valid

The signature on cdefrag.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics
%programfiles%\auslogics

ThreatInfo has observed cdefrag.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

16.7%
8.3%
8.3%
8.3%
8.3%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%
4.2%

The strongest geographic signal for this file is Russian Federation with 16.7% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 64.0%
Windows 7 32.0%
Windows XP 4.0%

The most common operating system signal for cdefrag.exe is Windows 10 with 64.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

cdefrag.exe is identified as pe for 32 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x00082a00

PE Sections:

Name Size of data MD5
.text 527872 fee1633861d541ea6edccad39e7e37f0
.itext 3072 950e15fa292af5cfc2af2589707b3bc7
.data 17408 fdb1f656a344b741e384b21d4ef6ee45
.bss 0 00000000000000000000000000000000
.idata 44032 1c9de3fe4cfb7b8503bcf841c58e73f3
.edata 512 0fe11977bceab9ab83765f881347664d
.tls 0 00000000000000000000000000000000
.rdata 512 6b0e27106f95cefec6079eaa9e8130ac
.rsrc 54784 740e2b85e37b18696fce6862cc3c7527

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: