× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 153be9a3d34ab276ec95a500ab1aef8eb94d3fcd8ad67499eb6484760118bf7e
File name: 153be9a3d34ab276ec95a500ab1aef8eb94d3fcd8ad67499eb6484760118bf7e....
Detection ratio: 0 / 67
Analysis date: 2018-11-20 02:54:22 UTC ( 6 months ago )
Antivirus Result Update
Ad-Aware 20181120
AegisLab 20181120
AhnLab-V3 20181119
Alibaba 20180921
ALYac 20181120
Antiy-AVL 20181120
Arcabit 20181120
Avast 20181120
Avast-Mobile 20181119
AVG 20181120
Avira (no cloud) 20181120
Babable 20180918
Baidu 20181119
BitDefender 20181120
Bkav 20181119
CAT-QuickHeal 20181119
ClamAV 20181119
CMC 20181119
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181120
Cyren 20181120
DrWeb 20181120
eGambit 20181120
Emsisoft 20181120
Endgame 20181108
ESET-NOD32 20181120
F-Prot 20181120
F-Secure 20181120
Fortinet 20181120
GData 20181120
Ikarus 20181119
Sophos ML 20181108
Jiangmin 20181120
K7AntiVirus 20181119
K7GW 20181119
Kaspersky 20181120
Kingsoft 20181120
Malwarebytes 20181120
MAX 20181120
McAfee 20181120
McAfee-GW-Edition 20181120
Microsoft 20181120
eScan 20181120
NANO-Antivirus 20181120
Palo Alto Networks (Known Signatures) 20181120
Panda 20181119
Qihoo-360 20181120
Rising 20181120
SentinelOne (Static ML) 20181011
Sophos AV 20181120
SUPERAntiSpyware 20181114
Symantec 20181119
Symantec Mobile Insight 20181108
TACHYON 20181120
Tencent 20181120
TheHacker 20181118
TotalDefense 20181118
TrendMicro 20181120
TrendMicro-HouseCall 20181120
Trustlook 20181120
VBA32 20181119
ViRobot 20181119
Webroot 20181120
Yandex 20181119
Zillya 20181119
ZoneAlarm by Check Point 20181120
Zoner 20181120
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 1998-2018 Epic Games, Inc. All Rights Reserved.

Product Unreal Engine
Original name EpicGamesLauncher.exe
Internal name EpicGamesLauncher
Description EpicGamesLauncher
Signature verification Signed file, verified signature
Signing date 9:44 PM 11/3/2018
Signers
[+] Epic Games Inc.
Status Valid
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 2/18/2018
Valid to 12:59 AM 3/2/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 67908AAC3342FA3CEA0CAF422BD61294C60B3138
Serial number 51 02 9B 3B 9C B4 8F A0 76 FA 2D A8 7A 91 DB 42
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine x64
Compilation timestamp 2018-11-03 20:26:24
Entry Point 0x018ACE1C
Number of sections 7
PE sections
Overlays
MD5 deba4d88b0a6a444cd3fea04f74da5fe
File type data
Offset 34904576
Size 6032
Entropy 7.35
PE imports
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegDeleteTreeW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
CheckTokenMembership
RegQueryValueExW
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
GetSidSubAuthority
RegisterEventSourceW
OpenProcessToken
DeregisterEventSource
DuplicateToken
RegOpenKeyExW
RegOpenKeyExA
GetTokenInformation
DuplicateTokenEx
GetUserNameW
RegDeleteValueW
RegEnumKeyExW
CreateProcessWithTokenW
RegEnumKeyExA
RegQueryInfoKeyA
CreateWellKnownSid
RegEnumValueW
RegSetValueExW
FreeSid
ReportEventW
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteKeyExW
SetNamedSecurityInfoW
ChooseFontW
GetDeviceCaps
SwapBuffers
GetTextMetricsW
CreateRectRgn
DeleteDC
CreateFontIndirectW
SelectObject
GetTextExtentPoint32W
PtInRegion
ChoosePixelFormat
SetPixelFormat
CreateRoundRectRgn
CreateCompatibleDC
DeleteObject
CreateFontW
ImmSetCompositionWindow
ImmNotifyIME
ImmDestroyContext
ImmGetContext
ImmCreateContext
ImmSetCandidateWindow
ImmGetDescriptionW
ImmGetIMEFileNameW
ImmGetProperty
ImmReleaseContext
ImmGetCompositionStringW
ImmAssociateContext
IcmpCloseHandle
GetAdaptersAddresses
GetAdaptersInfo
IcmpSendEcho
IcmpCreateFile
GetStdHandle
GetDriveTypeW
CancelIoEx
ReleaseMutex
FileTimeToSystemTime
GetOverlappedResult
WaitForSingleObject
LockResource
GetFileAttributesW
GetFileSize
QueryFullProcessImageNameW
GetLocalTime
GetProcessId
CreatePipe
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
SetFilePointer
ExpandEnvironmentStringsA
VerifyVersionInfoA
SetErrorMode
GetLogicalDrives
InitializeSListHead
GetLocaleInfoW
WideCharToMultiByte
WriteFile
GetTimeZoneInformation
GetUserPreferredUILanguages
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
GetExitCodeProcess
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
SetConsoleWindowInfo
AllocConsole
TlsGetValue
MoveFileW
SetFileAttributesW
GetTickCount
OutputDebugStringA
VirtualQuery
SetLastError
PeekNamedPipe
OpenThread
LoadResource
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
ExitProcess
SetConsoleScreenBufferSize
InitializeCriticalSectionEx
VerSetConditionMask
LoadLibraryExA
SetThreadPriority
SetThreadErrorMode
RtlVirtualUnwind
GetSystemDefaultLCID
InitializeProcThreadAttributeList
MultiByteToWideChar
VerifyVersionInfoW
GetSystemPowerStatus
FormatMessageA
GetModuleHandleA
GlobalMemoryStatus
CreateSemaphoreA
CreateThread
RtlCaptureStackBackTrace
DeleteCriticalSection
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
GetSystemDirectoryA
GetUserDefaultLocaleName
SetHandleInformation
ReleaseSRWLockShared
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
GetVersion
InitializeSRWLock
GetNumberFormatW
WriteConsoleW
CreateToolhelp32Snapshot
FindClose
EnterCriticalSection
GetSystemTime
LoadLibraryW
DeviceIoControl
GetVersionExW
SetEvent
QueryPerformanceCounter
AcquireSRWLockShared
SetConsoleTextAttribute
TlsAlloc
VirtualProtect
LoadLibraryA
FreeLibrary
FlushConsoleInputBuffer
AcquireSRWLockExclusive
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetConsoleScreenBufferInfo
GetProcessHeap
GetComputerNameW
GetTimeFormatW
GetDllDirectoryW
SetCriticalSectionSpinCount
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
RtlLookupFunctionEntry
ResetEvent
FreeConsole
CreateFileMappingA
FindFirstFileW
ReleaseSRWLockExclusive
WaitForMultipleObjects
GlobalLock
GetLongPathNameW
GetTempPathW
CreateEventW
ReadDirectoryChangesW
CreateFileW
GetConsoleWindow
UpdateProcThreadAttribute
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
GetCurrencyFormatW
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
AttachConsole
SystemTimeToFileTime
CreateFileMappingW
GetSystemInfo
lstrlenA
GetProcessTimes
GetThreadLocale
GlobalUnlock
WaitForSingleObjectEx
Process32NextW
CreateProcessW
GetUserGeoID
Module32FirstW
SwitchToThread
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
GetFinalPathNameByHandleW
SetFileTime
GetCommandLineW
RaiseException
SetThreadAffinityMask
K32GetProcessMemoryInfo
Process32FirstW
GetCurrentThread
GetTickCount64
SuspendThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
GetGeoInfoA
ReadFile
RtlCaptureContext
CloseHandle
SetDllDirectoryW
GetACP
GetModuleHandleW
GetFileAttributesExW
DeleteProcThreadAttributeList
GetLogicalProcessorInformation
GetProcessHandleCount
UnmapViewOfFile
FindResourceW
SleepEx
VirtualFree
Sleep
SetConsoleCtrlHandler
SystemTimeToTzSpecificLocalTime
VirtualAlloc
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
_Inf
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?_BADOFF@std@@3_JB
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?uncaught_exception@std@@YA_NXZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0_Lockit@std@@QEAA@H@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@V?$fpos@U_Mbstatet@@@2@@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
??1_Lockit@std@@QEAA@XZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?id@?$ctype@D@std@@2V0locale@2@A
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Xlength_error@std@@YAXPEBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??Bid@locale@std@@QEAA_KXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?_Xout_of_range@std@@YAXPEBD@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?_Ios_base_dtor@ios_base@std@@CAXPEAV12@@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?tellp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ
?_Xbad_alloc@std@@YAXXZ
??_7ios_base@std@@6B@
IdnToAscii
SysFreeString
VariantCopy
VariantClear
SysAllocString
glTexSubImage2D
glTexImage2D
glDisable
wglCreateContext
glStencilMask
glBindTexture
glEnable
glStencilOp
wglGetProcAddress
glBlendFunc
glDeleteTextures
wglMakeCurrent
glViewport
glTexEnvi
glAlphaFunc
wglDeleteContext
glPolygonMode
glGenTextures
glTexParameteri
glStencilFunc
glGetIntegerv
glScissor
glPixelStorei
CallNtPowerInformation
SetupDiOpenDevRegKey
CM_Get_Device_IDW
SetupDiGetClassDevsExW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SHGetFolderPathW
SHCreateItemFromParsingName
SHChangeNotify
SHGetKnownFolderPath
ShellExecuteW
SHGetSpecialFolderLocation
ShellExecuteExW
Shell_NotifyIconW
GetForegroundWindow
SetWindowRgn
UnregisterHotKey
SetWindowLongPtrW
PostQuitMessage
SetWindowPos
IsWindow
ClientToScreen
WindowFromPoint
SetActiveWindow
DispatchMessageW
GetCursorPos
ReleaseDC
SendMessageW
UnregisterClassW
GetClientRect
AllowSetForegroundWindow
GetTopWindow
ShowCursor
MsgWaitForMultipleObjects
GetActiveWindow
DestroyWindow
RegisterHotKey
GetUserObjectInformationW
GetParent
UpdateWindow
EnumWindows
GetRawInputDeviceList
ShowWindow
EnumDisplayMonitors
PeekMessageW
EnableWindow
SetWindowPlacement
GetSystemMenu
TranslateMessage
IsWindowEnabled
SetClipboardData
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
SetWindowLongW
RegisterRawInputDevices
IsIconic
EnumDisplayDevicesW
GetKeyboardLayout
SwitchToThisWindow
MonitorFromPoint
GetTouchInputInfo
CreateWindowExW
GetWindowLongW
GetWindowInfo
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
EmptyClipboard
DefWindowProcW
MapVirtualKeyW
ClipCursor
GetClipboardData
GetSystemMetrics
EnableMenuItem
GetWindowRect
SetCapture
ReleaseCapture
GetProcessWindowStation
GetRawInputData
SetWindowTextW
GetRawInputDeviceInfoA
GetDlgItem
ScreenToClient
LoadCursorW
LoadIconW
GetDC
SetForegroundWindow
OpenClipboard
GetAsyncKeyState
SetLayeredWindowAttributes
EndDialog
SendInput
GetCapture
GetShellWindow
GetWindowThreadProcessId
MessageBoxW
RegisterClassExW
MoveWindow
DialogBoxParamW
AdjustWindowRectEx
LoadCursorFromFileW
MsgWaitForMultipleObjectsEx
DisableProcessWindowsGhosting
SetDlgItemTextW
GetKeyState
GetWindowLongPtrW
CloseTouchInputHandle
RegisterTouchWindow
SetCursorPos
SystemParametersInfoW
MonitorFromWindow
SetRect
MonitorFromRect
GetFocus
CloseClipboard
SetCursor
_purecall
memset
wcschr
__RTDynamicCast
__intrinsic_setjmp
strchr
__vcrt_InitializeCriticalSectionEx
__C_specific_handler
__std_exception_copy
memcmp
strrchr
__std_terminate
wcsrchr
_CxxThrowException
longjmp
__CxxFrameHandler3
memcpy
strstr
__RTtypeid
memmove
__std_type_info_compare
wcsstr
_set_purecall_handler
__std_exception_destroy
memchr
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
HttpQueryInfoW
InternetSetStatusCallbackW
InternetQueryOptionW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestW
InternetOpenW
InternetGetConnectedState
InternetAttemptConnect
InternetGetLastResponseInfoW
HttpOpenRequestW
timeGetTime
timeBeginPeriod
Ord(301)
Ord(50)
Ord(143)
Ord(79)
Ord(41)
Ord(22)
Ord(46)
Ord(211)
Ord(30)
Ord(60)
Ord(200)
Ord(33)
Ord(32)
Ord(26)
Ord(27)
Ord(35)
getaddrinfo
htonl
shutdown
accept
ioctlsocket
WSAStartup
WSACleanup
freeaddrinfo
connect
getsockname
WSCEnumProtocols
WSAResetEvent
htons
WSASetLastError
select
WSAWaitForMultipleEvents
gethostname
getsockopt
recv
WSACloseEvent
ntohl
inet_addr
send
ntohs
WSAGetLastError
listen
__WSAFDIsSet
inet_pton
WSAEventSelect
gethostbyname
getpeername
WSACreateEvent
closesocket
WSAIoctl
InetNtopW
setsockopt
WSASetEvent
socket
bind
getprotobyname
recvfrom
WSAEnumNetworkEvents
sendto
getservbyname
Ord(3)
Ord(2)
strtol
strtoul
_wcstoui64
strtod
wcstombs
_wtof
atoi
atol
_strtoi64
strtoll
_wtoi64
wcstod
wcstoul
_wtoi
_stat64
_fstat64
_stat64i32
calloc
realloc
malloc
_set_new_mode
free
_isnan
modf
cos
log
fabs
floor
atan
pow
_finite
sqrt
ceil
logf
atan2
fmod
sinf
sin
__setusermatherr
powf
tan
asin
_configure_narrow_argv
_get_narrow_winmain_command_line
_register_onexit_function
_set_app_type
__sys_nerr
terminate
_register_thread_local_exe_atexit_callback
abort
_initialize_onexit_table
_endthreadex
_cexit
_c_exit
raise
_errno
_invalid_parameter_noinfo_noreturn
_getpid
_seh_filter_exe
exit
_initialize_narrow_environment
_initterm_e
_exit
signal
strerror
_beginthreadex
_initterm
_crt_atexit
__stdio_common_vsscanf
fread
fclose
_setmode
fgets
fflush
fopen
feof
__acrt_iob_func
fputc
fwrite
fseek
_open
fputs
ftell
_fileno
ferror
_close
__stdio_common_vfprintf
__p__commode
_wfopen
__stdio_common_vsprintf
_write
_lseeki64
_read
__stdio_common_vfwprintf
_set_fmode
__stdio_common_vswprintf
strncmp
iswalnum
_wcsnicmp
strcat
strtok_s
isprint
toupper
isdigit
towupper
strlen
strncpy
strncat
isalnum
isxdigit
wcslen
isalpha
_strdup
towlower
iswalpha
isspace
iswxdigit
tolower
wcsncpy
islower
isgraph
wcsncmp
_stricmp
iswupper
strpbrk
iswpunct
iswlower
iswdigit
strcpy
iswspace
_strnicmp
isupper
strcmp
__daylight
__timezone
clock
_time64
_tzset
_localtime64
__tzname
_gmtime64
rand
srand
qsort
bsearch
BCryptGenRandom
D3D11CreateDevice
SymSetOptions
MiniDumpWriteDump
SymInitializeW
SymGetSymFromAddr64
SymGetModuleInfoW64
SymRefreshModuleList
SymGetOptions
StackWalk64
SymGetModuleBase64
SymGetLineFromAddr64
SymGetModuleInfo64
SymFunctionTableAccess64
DwmSetWindowAttribute
DwmIsCompositionEnabled
DwmExtendFrameIntoClientArea
CreateDXGIFactory
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
RevokeDragDrop
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
CoCreateInstance
CreateBindCtx
GetRunningObjectTable
CoTaskMemFree
CoSetProxyBlanket
PE exports
Number of PE resources by type
RT_ICON 13
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

InitializedDataSize
10260992

ImageVersion
0.0

ProductName
Unreal Engine

FileVersionNumber
8.2.1.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

ImageFileCharacteristics
Executable, Large address aware

CharacterSet
Unicode

LinkerVersion
14.13

FileTypeExtension
exe

OriginalFileName
EpicGamesLauncher.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
2018:11:03 21:26:24+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
EpicGamesLauncher

ProductVersion
8.2.1-4538456+++Portal+Release-Live

FileDescription
EpicGamesLauncher

OSVersion
6.0

FileOS
Win32

LegalCopyright
Copyright 1998-2018 Epic Games, Inc. All Rights Reserved.

MachineType
AMD AMD64

CompanyName
Epic Games, Inc.

CodeSize
26221056

FileSubtype
0

ProductVersionNumber
8.2.1.0

EntryPoint
0x18ace1c

ObjectFileType
Dynamic link library

File identification
MD5 eabe0721b761c0e44a76e3a5a38a8796
SHA1 6f13f5cb2d9af4f30101390204211f1e0e0928d1
SHA256 153be9a3d34ab276ec95a500ab1aef8eb94d3fcd8ad67499eb6484760118bf7e
ssdeep
393216:cdvgIOPMfP5iE1j2x8MQ90sntNMRpLjw5hWxOCYLABjesVYGrRae+Jsyo:W2xhVdVYW8g

authentihash 6785018658899167c4b94c15655b303c67e234261602722f57fe4a4f54fdb989
imphash 49d9754dd2df86774c09556be309c488
File size 33.3 MB ( 34910608 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
64bits peexe assembly signed overlay

VirusTotal metadata
First submission 2018-11-14 12:15:00 UTC ( 6 months ago )
Last submission 2018-11-14 12:15:00 UTC ( 6 months ago )
File names EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher.exe
EpicGamesLauncher
EpicGamesLauncher.exe
153be9a3d34ab276ec95a500ab1aef8eb94d3fcd8ad67499eb6484760118bf7e.file
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!