× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8f5275f1a3c7d491d1c0806a880666c6a4453266f1cc4a9bd0747c15408706b8
File name: Network iControl.dll
Detection ratio: 0 / 56
Analysis date: 2017-01-29 17:09:18 UTC ( 2 years, 1 month ago )
Antivirus Result Update
Ad-Aware 20170129
AegisLab 20170129
AhnLab-V3 20170129
Alibaba 20170122
ALYac 20170129
Antiy-AVL 20170129
Arcabit 20170129
Avast 20170129
AVG 20170129
Avira (no cloud) 20170129
AVware 20170129
Baidu 20170125
BitDefender 20170129
CAT-QuickHeal 20170128
ClamAV 20170129
CMC 20170129
Comodo 20170129
CrowdStrike Falcon (ML) 20161024
Cyren 20170129
DrWeb 20170129
Emsisoft 20170129
ESET-NOD32 20170129
F-Prot 20170129
F-Secure 20170129
Fortinet 20170129
GData 20170129
Ikarus 20170129
Sophos ML 20170111
Jiangmin 20170129
K7AntiVirus 20170129
K7GW 20170129
Kaspersky 20170129
Kingsoft 20170129
Malwarebytes 20170129
McAfee 20170129
McAfee-GW-Edition 20170129
Microsoft 20170129
eScan 20170129
NANO-Antivirus 20170129
nProtect 20170129
Panda 20170129
Qihoo-360 20170129
Rising 20170129
Sophos AV 20170129
SUPERAntiSpyware 20170129
Symantec 20170129
Tencent 20170129
TheHacker 20170129
TotalDefense 20170129
TrendMicro 20170129
TrendMicro-HouseCall 20170129
Trustlook 20170129
VBA32 20170127
VIPRE 20170129
ViRobot 20170129
WhiteArmor 20170123
Yandex 20170128
Zillya 20170128
Zoner 20170129
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-14 03:14:35
Entry Point 0x00001570
Number of sections 7
PE sections
PE imports
RegFlushKey
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ImageList_BeginDrag
ImageList_SetBkColor
FlatSB_SetScrollInfo
ImageList_SetImageCount
FlatSB_GetScrollInfo
ImageList_DragMove
FlatSB_SetScrollProp
ImageList_Create
ImageList_GetDragImage
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
_TrackMouseEvent
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
FlatSB_SetScrollPos
ImageList_DragEnter
ImageList_Add
InitializeFlatSB
FlatSB_GetScrollPos
ImageList_DragShowNolock
ImageList_Remove
ImageList_Read
ImageList_EndDrag
GetDIBColorTable
DeleteEnhMetaFile
CreateFontIndirectW
GetWindowOrgEx
CreateHalftonePalette
SetStretchBltMode
GetCurrentPositionEx
GetTextMetricsW
ResizePalette
GetEnhMetaFileBits
GetPaletteEntries
MaskBlt
CombineRgn
GetClipBox
GetEnhMetaFilePaletteEntries
GetBitmapBits
Rectangle
GetBrushOrgEx
ExcludeClipRect
PlayEnhMetaFile
LineTo
DeleteDC
RestoreDC
GetPixel
CopyEnhMetaFileW
GetSystemPaletteEntries
SetPixel
SetWindowOrgEx
GetObjectW
BitBlt
SetViewportOrgEx
CreateDIBSection
RealizePalette
SetTextColor
GetDeviceCaps
RectVisible
SetEnhMetaFileBits
IntersectClipRect
FrameRgn
CreateBitmap
MoveToEx
CreatePalette
CreateBrushIndirect
CreateDIBitmap
GetRgnBox
SelectPalette
UnrealizeObject
GetDIBits
SaveDC
ExtCreateRegion
GdiFlush
SetROP2
GetDCOrgEx
CreateCompatibleDC
StretchBlt
SetBkMode
StretchDIBits
SetBrushOrgEx
CreateRectRgn
GetTextExtentPoint32W
GetNearestPaletteIndex
PatBlt
GetWinMetaFileBits
SetDIBColorTable
GetEnhMetaFileHeader
CreateSolidBrush
Polyline
GetStockObject
SelectObject
SetBkColor
SetWinMetaFileBits
DeleteObject
CreateCompatibleBitmap
CreatePenIndirect
SetThreadLocale
GetStdHandle
GetFileAttributesA
SetEvent
SignalObjectAndWait
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
IsDBCSLeadByteEx
GetCPInfo
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
WriteFile
WaitForSingleObject
GetStringTypeW
GetOEMCP
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
FindClose
InterlockedDecrement
GetFullPathNameW
OutputDebugStringA
WritePrivateProfileStringW
SetLastError
TlsGetValue
GlobalFindAtomW
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
GlobalAddAtomW
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetPrivateProfileStringW
SetFilePointer
InterlockedExchangeAdd
CreateThread
GetExitCodeThread
MulDiv
ExitThread
WaitForMultipleObjectsEx
GlobalAlloc
VirtualQueryEx
SetEndOfFile
GetVersion
InterlockedIncrement
CallNamedPipeW
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
FreeLibrary
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
LCMapStringW
DeleteFileA
GetDateFormatW
GetUserDefaultLCID
GetProcessHeap
CompareStringW
lstrcpyW
GlobalReAlloc
GetCurrentThreadId
ResetEvent
FindFirstFileW
IsValidLocale
GetProcAddress
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
GlobalDeleteAtom
GetSystemInfo
GlobalFree
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
lstrlenW
SwitchToThread
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
InterlockedCompareExchange
GetCurrentThread
lstrcpynW
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetModuleHandleW
FreeResource
FindResourceW
VirtualFree
Sleep
VirtualAlloc
AlphaBlend
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
GetErrorInfo
SysFreeString
VariantInit
RasEnumEntriesW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFileInfoW
PathFileExistsW
StrToIntW
RedrawWindow
GetForegroundWindow
SetWindowRgn
LoadBitmapW
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
WindowFromPoint
IntersectRect
PeekMessageA
CharUpperBuffW
SetMenuItemInfoW
SendMessageW
SetActiveWindow
GetDC
GetCursorPos
DrawTextA
GetMenu
SendMessageA
UnregisterClassW
GetClassInfoW
DefWindowProcW
DrawTextW
SetScrollPos
CallNextHookEx
MsgWaitForMultipleObjectsEx
GetClientRect
TrackPopupMenu
GetTopWindow
GetWindowTextW
MsgWaitForMultipleObjects
GetActiveWindow
GetMenuItemID
DestroyWindow
DrawEdge
GetParent
UpdateWindow
GetPropW
SetClassLongW
EnumWindows
ShowWindow
DrawFrameControl
SetPropW
GetDesktopWindow
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
GetIconInfo
SetParent
RegisterClassW
ScrollWindow
IsZoomed
GetWindowPlacement
LoadStringW
SetWindowLongW
GetKeyboardLayoutList
DrawMenuBar
EnableMenuItem
GetSubMenu
GetDCEx
GetKeyboardLayout
FillRect
EnumThreadWindows
GetSysColorBrush
IsWindowUnicode
CreateWindowExW
ReleaseDC
GetWindowLongW
GetMenuItemInfoW
IsChild
IsDialogMessageA
MapWindowPoints
RegisterWindowMessageW
ReleaseCapture
BeginPaint
OffsetRect
DefMDIChildProcW
GetScrollPos
CopyIcon
GetKeyboardLayoutNameW
KillTimer
MapVirtualKeyW
SetTimer
GetClipboardData
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetCapture
DrawIcon
EnumChildWindows
GetScrollRange
CharLowerW
ShowOwnedPopups
PostMessageW
InvalidateRect
WaitMessage
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
PtInRect
DrawIconEx
SetWindowTextW
CreateMenu
RemovePropW
ClientToScreen
GetKeyboardState
GetMenuItemCount
GetMenuState
IsDialogMessageW
LoadCursorW
GetSystemMenu
FindWindowExW
DispatchMessageW
InsertMenuW
SetForegroundWindow
SetFocus
GetMenuStringW
CharLowerBuffW
DrawTextExW
GetScrollInfo
FindWindowW
GetCapture
ScreenToClient
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
MessageBoxW
DefFrameProcW
SetMenu
LoadKeyboardLayoutW
MessageBoxA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
SystemParametersInfoA
TrackMouseEvent
DestroyIcon
wsprintfW
IsWindowVisible
SystemParametersInfoW
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
wsprintfA
CharNextW
CallWindowProcW
TranslateMDISysAccel
CreateIcon
GetCursor
GetFocus
InsertMenuItemW
GetKeyboardType
UnhookWindowsHookEx
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
PE exports
Number of PE resources by type
RT_STRING 16
RT_RCDATA 11
RT_GROUP_CURSOR 7
RT_CURSOR 7
Number of PE resources by language
NEUTRAL 26
ENGLISH US 15
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:08:14 04:14:35+01:00

FileType
Win32 DLL

PEType
PE32

CodeSize
860160

LinkerVersion
5.0

FileTypeExtension
dll

InitializedDataSize
159744

SubsystemVersion
5.0

EntryPoint
0x1570

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 74cd409f7b043cb13949ebf54032c346
SHA1 d130d95488a814642329726b85454be98da90532
SHA256 8f5275f1a3c7d491d1c0806a880666c6a4453266f1cc4a9bd0747c15408706b8
ssdeep
24576:atO+YtTMwxgJsJ6W1AATPEhAE0OxqwO5IjnMeI2qG0pSkIIZIIIvIIZIIIIHIBsT:0O+Y1MwxgJsJKI2qG+SkIIZIIIvIIZI0

authentihash 1d6cc61c955a69744fe678f08d4f23e4ce42ec55f54e7ef6cdb02552503146ef
imphash 1761ee2f0fbb6c8dc05d36a44493eb44
File size 1.1 MB ( 1123840 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (33.4%)
Windows screen saver (30.8%)
Win32 Dynamic Link Library (generic) (15.5%)
Win32 Executable (generic) (10.6%)
Generic Win/DOS Executable (4.7%)
Tags
pedll

VirusTotal metadata
First submission 2014-03-01 21:28:08 UTC ( 5 years ago )
Last submission 2017-01-29 17:09:18 UTC ( 2 years, 1 month ago )
File names Network iControl.dll
Network iControl.dll
Network iControl.dll
Network iControl.dll
Network iControl.dll
Network iControl.dll
network icontrol.dll
Network iControl.dll
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!