× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2390f84dc86eb7256f1317156c20b6a2cf42193ddec2cbcf9f9b894ef8a8b9d6
File name: PCI-Zx64.exe
Detection ratio: 0 / 50
Analysis date: 2014-04-20 21:49:21 UTC ( 3 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20140420
AegisLab 20140420
Yandex 20140420
AhnLab-V3 20140420
AntiVir 20140420
Antiy-AVL 20140420
Avast 20140420
AVG 20140420
Baidu-International 20140419
BitDefender 20140420
Bkav 20140418
ByteHero 20140420
CAT-QuickHeal 20140418
ClamAV 20140420
CMC 20140417
Commtouch 20140420
Comodo 20140420
DrWeb 20140420
Emsisoft 20140420
ESET-NOD32 20140420
F-Prot 20140420
F-Secure 20140420
Fortinet 20140420
GData 20140420
Ikarus 20140420
Jiangmin 20140420
K7AntiVirus 20140418
K7GW 20140418
Kaspersky 20140420
Kingsoft 20140420
Malwarebytes 20140420
McAfee 20140420
McAfee-GW-Edition 20140420
Microsoft 20140420
eScan 20140420
NANO-Antivirus 20140420
Norman 20140420
nProtect 20140420
Panda 20140420
Qihoo-360 20140411
Rising 20140420
Sophos AV 20140420
SUPERAntiSpyware 20140420
Symantec 20140420
TheHacker 20140419
TotalDefense 20140420
TrendMicro 20140420
TrendMicro-HouseCall 20140420
VBA32 20140418
VIPRE 20140420
ViRobot 20140420
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem that targets 64bit architectures.
FileVersionInfo properties
Copyright
Freeware

Product PCI-Z
Original name PCI-Z.exe
Internal name PCI-Z
File version 1.3
Description PCI-Z uses PCI ID Repository to detect PCI(-E/-X) devices without drivers.
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 4:12 PM 7/3/2017
PE header basic information
Target machine x64
Compilation timestamp 2014-04-20 21:45:54
Entry Point 0x00001000
Number of sections 6
PE sections
Overlays
MD5 cdb02daf516b31dab78d1e5fb59f9199
File type data
Offset 811520
Size 6912
Entropy 7.62
PE imports
GetUserNameA
ImageList_GetIconSize
InitCommonControlsEx
ImageList_Destroy
ImageList_AddMasked
ImageList_Replace
ImageList_Create
CreateStatusWindowA
ImageList_Remove
ImageList_ReplaceIcon
ImageList_Add
GetOpenFileNameA
GetSaveFileNameA
SetDIBits
CreatePen
SetStretchBltMode
GetObjectType
GetObjectA
CreateDCA
LineTo
DeleteDC
SetPixel
IntersectClipRect
BitBlt
CreateDIBSection
SetTextColor
CreateBitmap
MoveToEx
GetStockObject
GetDIBits
CreateCompatibleDC
StretchBlt
StretchDIBits
SelectObject
CreateSolidBrush
SetBkColor
DeleteObject
CreateCompatibleBitmap
CreateToolhelp32Snapshot
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
ReadFile
GetSystemInfo
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
HeapDestroy
ExitProcess
TlsAlloc
FlushFileBuffers
GetVersionExA
LoadLibraryA
GetLocalTime
CreatePipe
GetCurrentProcess
SetConsoleCtrlHandler
GetCurrentProcessId
ReleaseSemaphore
WaitForMultipleObjects
AllocConsole
DeleteFileA
GetCurrentDirectoryA
Module32First
MultiByteToWideChar
GetCommandLineA
GetProcAddress
GetConsoleScreenBufferInfo
GetCurrentThread
GlobalUnlock
SetFilePointer
QueryPerformanceFrequency
CreateSemaphoreA
CreateThread
TlsFree
GetModuleHandleA
DeleteCriticalSection
FindFirstFileA
WriteFile
SetConsoleTitleA
CloseHandle
FreeConsole
GetComputerNameA
GlobalMemoryStatusEx
DuplicateHandle
HeapReAlloc
GlobalLock
SetFileAttributesA
GetDriveTypeA
GetProcessAffinityMask
CreateProcessA
GetTimeZoneInformation
WriteConsoleA
WideCharToMultiByte
InitializeCriticalSection
HeapCreate
CreateFileW
GlobalAlloc
VirtualFree
FindClose
TlsGetValue
Sleep
GetTickCount
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
RevokeDragDrop
CoInitialize
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
ShellExecuteExA
MapWindowPoints
GetForegroundWindow
RedrawWindow
DrawStateA
DestroyMenu
SetWindowPos
IsWindow
DispatchMessageA
ScreenToClient
SetActiveWindow
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetWindowTextLengthA
GetActiveWindow
LoadImageA
MsgWaitForMultipleObjects
GetWindowTextA
EnumPropsExA
GetKeyState
DestroyWindow
GetMessageA
GetParent
SetPropA
EnumWindows
ShowWindow
GetPropA
CreateIconFromResourceEx
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
GetIconInfo
SetClipboardData
GetSystemMetrics
IsZoomed
RegisterClassA
GetWindowLongA
CreateMenu
FillRect
GetSysColorBrush
CreateAcceleratorTableA
IsChild
SetFocus
SetCapture
GetScrollPos
SetWindowLongPtrA
RegisterWindowMessageA
DefWindowProcA
GetClipboardData
CharLowerA
GetWindowRect
PostMessageA
ReleaseCapture
EnumChildWindows
RemovePropA
CreatePopupMenu
CreateWindowExA
BringWindowToTop
ClientToScreen
LoadCursorA
LoadIconA
TrackPopupMenu
DestroyAcceleratorTable
ValidateRect
CreateIconFromResource
SetForegroundWindow
OpenClipboard
EmptyClipboard
DrawTextA
FindWindowA
GetWindowThreadProcessId
AppendMenuA
DrawFrameControl
SetMenu
MoveWindow
MessageBoxA
AdjustWindowRectEx
GetSysColor
RegisterClassExA
SystemParametersInfoA
DestroyIcon
IsWindowVisible
SetCursorPos
GetWindowLongPtrA
SetRect
InvalidateRect
DefFrameProcA
SetWindowTextA
TranslateAcceleratorA
CallWindowProcA
GetClassNameA
GetFocus
CloseClipboard
SetCursor
timeBeginPeriod
__WSAFDIsSet
recv
socket
bind
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
ioctlsocket
connect
sendto
recvfrom
htons
closesocket
gethostbyaddr
select
strncmp
rand
malloc
__iob_func
sscanf
setlocale
pow
fread
fclose
strcat
_stricmp
fprintf
printf
fflush
fopen
strlen
strncpy
frexp
fabs
floor
fwrite
wcslen
wcscmp
_strdup
sprintf
memcmp
_setjmp
memset
longjmp
tolower
free
ceil
atoi
atof
memcpy
_gmtime64
strstr
memmove
_mktime64
strcpy
_localtime64
modf
_strnicmp
strcmp
Number of PE resources by type
RT_ICON 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 5
PE resources
ExifTool file metadata
SubsystemVersion
5.2

LinkerVersion
2.5

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.3.0.1

Email
info@pci-z.com

Website
http://www.pci-z.com/

LanguageCode
Neutral

FileFlagsMask
0x0000

FileDescription
PCI-Z uses PCI ID Repository to detect PCI(-E/-X) devices without drivers.

CharacterSet
Unicode

InitializedDataSize
355840

EntryPoint
0x1000

OriginalFileName
PCI-Z.exe

MIMEType
application/octet-stream

LegalCopyright
Freeware

FileVersion
1.3

TimeStamp
2014:04:20 22:45:54+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
PCI-Z

ProductVersion
1.3

UninitializedDataSize
0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
AMD AMD64

CompanyName
Bruno Banelli

CodeSize
468480

ProductName
PCI-Z

ProductVersionNumber
1.3.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 5b488e4fbc7cb6352e302e94d6409d49
SHA1 d18015aecd7b7dcc8d3811e1e80602deec40c4a2
SHA256 2390f84dc86eb7256f1317156c20b6a2cf42193ddec2cbcf9f9b894ef8a8b9d6
ssdeep
12288:ipoqUpRrWgZUurUwVXFDpQ5rzT3W+7scZTxMsbF2Z65qh6ck1w:imzQj+Uw7DpuzTm+7TxZbE65qhG1

authentihash f02eaf34054d43df73c3878dbdbee8d7514d9581e6f4a929eb9450f66f29e874
imphash a64ac02f7889c115438bd0a4167eb1dc
File size 799.3 KB ( 818432 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (console) Mono/.Net assembly

TrID Win64 Executable (generic) (87.2%)
Generic Win/DOS Executable (6.3%)
DOS Executable Generic (6.3%)
VXD Driver (0.0%)
Tags
64bits peexe assembly overlay

VirusTotal metadata
First submission 2014-04-20 21:49:21 UTC ( 3 years, 4 months ago )
Last submission 2017-07-03 15:12:49 UTC ( 1 month, 2 weeks ago )
File names 2390f84dc86eb7256f1317156c20b6a2cf42193ddec2cbcf9f9b894ef8a8b9d6.exe
PCI-Z.exe
file-7380966_exe
pci-zx64.exe
PCI-Z
PCI-Zx64.exe
PCI-Z.exe
PCI-Zx64.exe
PCI-Zx64.exe
PCI-Zx64 (1).exe
PCI-Zx64.exe
PCI-Zx64.exe
vti-rescan
PCI-Zx64.exe
PCI-Zx64.exe
PCI-Zx64.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!