icarusclient_jp.exe

SteamerWinClient Module

WeMade Online Co.,Ltd.

Publisher:
WeMade Online Co.,Ltd.  (signed and verified)

Product:
SteamerWinClient Module

Version:
1.0.1.43

MD5:
160776fb58dfc14d46093d006b25f959

SHA-1:
62f78dcf13992c78f4315f88ffaf98d6af5d0244

SHA-256:
c402f3e3367e552c316310da331b50af4ef8633153cd99b2522308bd4fa3aa26

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
1/13/2025 4:29:09 AM UTC  (today)

File size:
4.6 MB (4,814,264 bytes)

Product version:
1.0.1.43

Copyright:
Copyright 2011

Original file name:
SteamerWinClient.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\icarusclient_jp.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/14/2013 9:00:00 AM

Valid to:
12/14/2015 8:59:59 AM

Subject:
CN="WeMade Online Co.,Ltd.", OU=Contents development, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="WeMade Online Co.,Ltd.", L=Osaka-shi, S=Osaka, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6FD7A51E695E1E27DE03CF56F84247E8

File PE Metadata
Compilation timestamp:
2/25/2015 4:07:37 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:UcXQqqwgjc3ZlKeBlL1UAJFseSjn6s0tfYLMSbgsIOA+Ax:xblbJ16A35++

Entry address:
0xAF047

Entry point:
E8, 94, 3E, 01, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 10, 53, FF, 75, 10, 8D, 4D, F0, E8, B3, DD, FF, FF, 8B, 5D, 08, 85, DB, 75, 26, E8, C0, 15, 00, 00, C7, 00, 16, 00, 00, 00, E8, B4, 7D, 00, 00, 38, 5D, FC, 74, 07, 8B, 45, F8, 83, 60, 70, FD, B8, FF, FF, FF, 7F, E9, BF, 00, 00, 00, 57, 8B, 7D, 0C, 85, FF, 75, 27, E8, 92, 15, 00, 00, C7, 00, 16, 00, 00, 00, E8, 86, 7D, 00, 00, 80, 7D, FC, 00, 74, 07, 8B, 45, F8, 83, 60, 70, FD, B8, FF, FF, FF, 7F, E9, 8F, 00, 00, 00, 8B, 45, F0, 83, 78, 14...
 
[+]

Entropy:
6.8408

Code size:
944 KB (966,656 bytes)

The file icarusclient_jp.exe has been seen being distributed by the following URL.

Scan icarusclient_jp.exe - Powered by Reason Core Security