Netwaw14.sys file report

MD5 e6c39453845afc7f97fe5bc8dbe7ea74
Latest seen 2025-04-16 23:00:54 (a year ago)
First seen 2025-04-16 23:00:54 (a year ago)
Size 5 MB
Publisher Intel Corporation

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2025-04-16 23:00:54 (a year ago); latest analysis 2025-04-16 23:00:54 (a year ago).

Publisher context

Company metadata: Intel Corporation. Product metadata: Intel® Wireless WiFi Link Adapter.

Digital signature

Signed by Intel Corporation;Microsoft Windows Hardware Compatibility Publisher. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

Netwaw14.sys is a Windows file recorded in the ThreatInfo database. It is associated with Intel® Wireless WiFi Link Adapter. The reported company name is Intel Corporation. The current detection status is Undefined, based on the latest analysis from 2025-04-16 23:00:54 (a year ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Intel® Wireless WiFi Link Adapter
Company Name: Intel Corporation
MD5: e6c39453845afc7f97fe5bc8dbe7ea74
Size: 5 MB
First Published: 2025-04-16 23:00:54 (a year ago)
Latest Published: 2025-04-16 23:00:54 (a year ago)
Status: Undefined (on last analysis)
Analysis Date: 2025-04-16 23:00:54 (a year ago)

The signature on Netwaw14.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%system%\driverstore\filerepository

ThreatInfo has observed Netwaw14.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is United States with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for Netwaw14.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

Netwaw14.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x0004b200

PE Sections:

Name Size of data MD5
.text 3971072 8f532a6e14c06983a059a6407cc60ab4
.rdata 655360 b86b824837fc0cca5084fe23a31705fa
.data 316928 67c194d5e4044ddd16ba675ba241203d
.pdata 187392 93abc69e301f6c5a25cbab81c268e9f4
PAGEcsrv 42496 0fe5b686fc7bccc91269491c48152453
PAGE 9216 96898f47e6b7c780beddba48ffbe67af
PAGEcsec 512 42eaeb5f2170bb2a442ebf0333f65fea
PAGEcjaw 3584 27257d90b65cd75872d14955b55c047e
PAGEcwfd 74240 908999f0ffcae40108dedafb1c569990
PAGEcimg 10240 db440a8ae111f72406e76e874e453819
PAGEccln 60928 ec8a40687261af0844826362887c096f
PAGEcsv_ 18944 328e780768de9851b858da207a91742a
PAGEcctw 512 7085eae747a065a137ac02e16d866d5b
PAGEdoid 12288 06da2e394e59db6966ef2c18061b4392
PAGEdcln 4096 9b96f212bad5213c8842baff2b009d48
PAGEdSlr 5120 e4e72beb1571359553c32ca188e603e1
PAGEdMag 5120 cd1f7198306239b557066f0356c3b075
PAGEdBla 5120 1fe7e56f079c4c2b54406d1347a0632a
PAGEdHrp 512 8b61c56879ce5c49b754073be057ecf3
PAGEdGfp 1024 54d2554ca87e19b66c9f3536f879fc16
PAGEdMrp 512 ce4de890a83a5fd5c8e04c5b567e4369
PAGEdFmp 1024 bac8210b5ee0a6593660f8e262d117a0
PAGEdWhp 1024 13de981f39fd7bac610080fd29b72f8c
PAGEdSim 512 428df749ea33a60c2fa89aee55648bbe
PAGEdFpg 512 dfc627304b2b49d83ebc4db04c7cb5fd
PAGEdSle 512 d466ad7c9f6503dfbad2be2f26a74118
PAGEdreg 62464 af852ec72944a4034824834fbe72d497
PAGEdimg 4096 e5cbaa2ee5015be2193d295b23b31918
PAGEdsv_ 512 f880be3d7a297133ad6af22165318ab8
PAGEdjaw 512 bf619eac0cdf3f68d496ea9344137e8b
INIT 4608 4e6cfe94c0a3e99d5e1e94ee78851dbd
.rsrc 39936 17bbb54bc74e6758e7da24ec2bb6bfd3
.reloc 34816 ba61f29a3bbba4a651b10f20f51d8b00

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: