Netwtw04.sys file report

MD5 51c119893a361b11f7096be05065661b
Latest seen 2023-06-02 23:59:46 (2 years ago)
First seen 2023-06-02 23:59:46 (2 years ago)
Size 8 MB
Publisher Intel Corporation

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2023-06-02 23:59:46 (2 years ago); latest analysis 2023-06-02 23:59:46 (2 years ago).

Publisher context

Company metadata: Intel Corporation. Product metadata: Intel® Wireless WiFi Link Adapter.

Digital signature

Signed by Intel Corporation;Microsoft Windows Hardware Compatibility Publisher. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

Netwtw04.sys is a Windows file recorded in the ThreatInfo database. It is associated with Intel® Wireless WiFi Link Adapter. The reported company name is Intel Corporation. The current detection status is Undefined, based on the latest analysis from 2023-06-02 23:59:46 (2 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: Intel® Wireless WiFi Link Adapter
Company Name: Intel Corporation
MD5: 51c119893a361b11f7096be05065661b
Size: 8 MB
First Published: 2023-06-02 23:59:46 (2 years ago)
Latest Published: 2023-06-02 23:59:46 (2 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2023-06-02 23:59:46 (2 years ago)

The signature on Netwtw04.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%commonappdata%\outbyte\driver updater\2.x\temp

ThreatInfo has observed Netwtw04.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Spain with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for Netwtw04.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

Netwtw04.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x00050fb0

PE Sections:

Name Size of data MD5
.text 4606976 8a8f7ead1794958abca3e7aebe3a9cf8
.rdata 807936 706693dd8ba268e3680289ce57c3d63c
.data 151552 ecfa703bf1f8cf2169d0280efdc87cfa
.pdata 185856 ea316c87d44526fc9185ae4c3ac64558
PAGEcsrv 87552 fa14e372a25ac4975f5be5f644092553
PAGEcjaw 103424 5480aebba238a35f72c37904c83412fb
PAGEcwfd 121344 1a97a9fd0ac31c5df97a3d30e3d57664
PAGE 1536 7d8d18cc503836181a053d65b364d3f5
PAGEcnlo 2048 4617280785f088a6750cd2e0ec5bd326
PAGEccln 95232 3995e681c539899e69e7303bab7bb209
PAGEcsec 25600 062bbee408e9eb300e88690258963092
PAGEcsv_ 71680 1e0c43644dbeac83ab9bbe1feeea9bd8
PAGEcimg 8704 4cccaf0fb71f7d0c2c228882495acf19
PAGEcpsm 6144 754461e75436c0a9058519765c66348b
PAGEcctw 6144 7ee363dd080de7b1b5ccd58fe237cfbb
PAGEdoid 26624 93438065f5f32de1bd17094192dd6cc7
PAGEdcln 4096 0b41f8a699aa651c349065836b78d323
PAGEdsv_ 2560 3dad592b368a6baccc7fb0050bea3e3d
PAGEdreg 265216 549f9feb39cea24c764802a30be18a16
PAGEdStn 1024 14098fc456e7601851b25b4eb963e316
PAGEdSnd 512 065b5d4c6b5c08ce85ec9978d4ec43f8
PAGEdSnF 1024 93f2ea55aa36eb89e359813450aba027
PAGEdWsP 1024 16d10dc0dcefcd565c51d0b65eec24cf
PAGEdPsr 2048 42ac354a2e98a1f73456a498f0ef7eec
PAGEdThP 512 7fb656f5f4a1b4ffa56d259b7c18bb26
PAGEdQua 1024 8c13f6f19bc812d4c0a25d06026da821
PAGEdjaw 1536 0534211935e9396a14fed966755c505d
PAGEdctw 512 dddcc03e2b592ffd37f7ac3ccb835596
PAGEdimg 512 31c7c69e000598491c7e49e1b059c3f9
PAGEdrlg 2097152 b2d1236c286a3c0704224fe4105eca49
INIT 5120 44234ea4e77ec8d1bea88eb62713307c
.rsrc 46080 49fb8304505817dee527b1c1e13f272c
.reloc 27136 d9a17e7c8b4e573361a7fb55aca13cab

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: