NETwsn04.sys threat report

MD5 3ed2efdb115e1808b61eceee99db919b
Latest seen 2024-10-03 23:04:58 (2 years ago)
First seen 2024-10-03 23:04:58 (2 years ago)
Size 2 MB
Publisher Intel Corporation

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Generic. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Generic
Recommended action
Scan and remove
Last analysis
2024-10-03 23:04:58 (2 years ago)
File hash
3ed2efdb115e1808b61eceee99db919b
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Generic.

Timeline

First seen 2024-10-03 23:04:58 (2 years ago); latest analysis 2024-10-03 23:04:58 (2 years ago).

Publisher context

Company metadata: Intel Corporation. Product metadata: Intel® Wireless WiFi Link Adapter.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

NETwsn04.sys is a Windows file recorded in the ThreatInfo database. It is associated with Intel® Wireless WiFi Link Adapter. The reported company name is Intel Corporation. The current detection status is Trojan.Generic, based on the latest analysis from 2024-10-03 23:04:58 (2 years ago).

If NETwsn04.sys appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Generic.

Product Name: Intel® Wireless WiFi Link Adapter
Company Name: Intel Corporation
MD5: 3ed2efdb115e1808b61eceee99db919b
Size: 2 MB
First Published: 2024-10-03 23:04:58 (2 years ago)
Latest Published: 2024-10-03 23:04:58 (2 years ago)
Status: Trojan.Generic (on last analysis)
Analysis Date: 2024-10-03 23:04:58 (2 years ago)
NETwsn04.sys detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%sysdrive%\drivers\options\01_wlan\intel\wlan\win7plus\win32\drivers

ThreatInfo has observed NETwsn04.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Germany with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for NETwsn04.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

NETwsn04.sys is identified as pe for 32 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x002cf000

PE Sections:

Name Size of data MD5
.text 1709568 9cf2b2dccb082866d7526ab67401a9ee
.rdata 268288 c46e6fe32784309da7db5cd6083af412
.data 188928 d05bfe3c0c7c668a12c62e80526c34ae
PAGEcsrv 52224 4be99bd7b61e46b59a2a23b3827d93ca
PAGEcjaw 58880 b1858c07c6a2db2745ccf9b122765b24
PAGEcnlo 512 144a76bf41d6fa1221802f693e0fa0fe
PAGEcsec 29184 ebf177a58ac5e8b5e36ded97f28d69c3
PAGEccln 29184 87a9ff9bafc0ebe4cdc6ee75ef124284
PAGEcsv_ 25600 e1d91aa1c64dd763f105435ea74a79ee
PAGEcpsm 5120 7d7321d51da6a0ff3ceeeceb2da36975
PAGE 512 eeb07d8affc9aefa6968677b51944b13
PAGEcast 6144 5419e948f91b9679d513d44bb3568579
PAGEcwfd 34816 27e4d7cfebc215764ee48386b389eeea
PAGEcimg 3584 ca82c9829306f0ce102868005da6d792
PAGEcctw 1536 a49c00767eaf67044b12d97e854c4137
PAGEdcln 2048 bc023ab4c09d331167fcfcc25dd3e7bc
PAGEdsv_ 2560 e9a1713d7079bf356a84ba8ac5457873
PAGEDATA 512 bf619eac0cdf3f68d496ea9344137e8b
PAGEdreg 257024 a80359f197c769af34d8d2a06743d2a3
PAGEdSnd 1536 ccbd1c9bf02c4e95006ea7aa7724a30e
PAGEdSnF 1536 e26891a431af139b456564a310f1d1bb
PAGEdWsP 1536 c52262c0455a188d89c3beb67e5b585a
PAGEdPsr 2560 2ba49b7cbb17405252a4fe661673c9fe
PAGEdStn 1536 ea9413aaacc36a736f7824673cad9498
PAGEdscn 512 8672a4d2ffffe8b8c4936f2ef2b283f0
PAGEdjaw 1024 55cbccbe226d0b7c83911b0890e5a2ca
PAGEdctw 512 dddcc03e2b592ffd37f7ac3ccb835596
PAGEdimg 1024 948db7d609291553915ec64caef8aa2b
INIT 4096 f1df6684c6605b2417ec9155ca514184
.rsrc 42496 123d83b39878f88281e3b176ce2b84f0
.reloc 68096 680598a513d3300f7ea245fe119cea75

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: