CELib_x86.dll file report

MD5 f793acad87f2c1e0cfaef0026fcb06b8
Latest seen 2025-02-04 23:01:28 (a year ago)
First seen 2020-05-12 00:09:08 (5 years ago)
Size 1 MB
Publisher WeMod LLC
Product WeMod
Signed by WeMod LLC

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2020-05-12 00:09:08 (5 years ago); latest analysis 2025-02-04 23:01:28 (a year ago).

Publisher context

Company metadata: WeMod LLC. Product metadata: WeMod.

Digital signature

Signed by WeMod LLC. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

CELib_x86.dll is a Windows file recorded in the ThreatInfo database. It is associated with WeMod. The reported company name is WeMod LLC. The current detection status is Undefined, based on the latest analysis from 2025-02-04 23:01:28 (a year ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: WeMod
Company Name: WeMod LLC
MD5: f793acad87f2c1e0cfaef0026fcb06b8
Size: 1 MB
First Published: 2020-05-12 00:09:08 (5 years ago)
Latest Published: 2025-02-04 23:01:28 (a year ago)
Status: Undefined (on last analysis)
Analysis Date: 2025-02-04 23:01:28 (a year ago)
Signed By: WeMod LLC
Status: Valid

The signature on CELib_x86.dll is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%localappdata%\wemod\app-6.3.9\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.9\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.9\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.8\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked
%localappdata%\wemod\app-6.3.10\resources\app.asar.unpacked\static\unpacked

ThreatInfo has observed CELib_x86.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

16.7%
12.8%
7.7%
6.4%
5.1%
5.1%
5.1%
3.8%
3.8%
2.6%
2.6%
2.6%
2.6%
2.6%
2.6%
2.6%
2.6%
1.3%
1.3%
1.3%
1.3%
1.3%
1.3%
1.3%
1.3%
1.3%
1.3%

The strongest geographic signal for this file is United States with 16.7% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 96.3%
Windows 7 2.5%
Windows 8.1 1.3%

The most common operating system signal for CELib_x86.dll is Windows 10 with 96.3% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

CELib_x86.dll is identified as pe for 32 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 32
Image Base: 0x10000000
Entry Address: 0x0030a058

PE Sections:

Name Size of data MD5
123904 cc1ebdb758e0886b8c03a4232acd900a
17408 d2cc9503b786b80d111722515068654d
19456 718d92e15c45c7e37b9db5ce2f6a857a
0 00000000000000000000000000000000
512 ebada125896badb515b0899f70d0b46b
512 9a3f7f2578c4224f605297529c31e7f3
512 855392d43466f4288ba1049334d77a0d
512 8fabd08b7ff13fd8f1170545b16aa4e4
12800 95a37e64c75debc2edb981a069c59745
.edata 512 daabc97869cf339b70f74b3ae55857b1
.idata 512 21aa3b00dc5d011e29f03865dc972a4c
.rsrc 1024 660d6c1dbbf4170209282c408110804a
.wemod 0 00000000000000000000000000000000
.boot 1724416 444ea377a294ededdb1c607476295c8b

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: