Netwtw04.sys threat report

MD5 5ab5c57f6defeb8584a3baa09d803ac0
Latest seen 2022-06-07 23:08:08 (3 years ago)
First seen 2019-08-02 21:07:32 (6 years ago)
Size 7 MB
Publisher Intel Corporation

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Generic. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Generic
Recommended action
Scan and remove
Last analysis
2022-06-07 23:08:08 (3 years ago)
File hash
5ab5c57f6defeb8584a3baa09d803ac0
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Generic.

Timeline

First seen 2019-08-02 21:07:32 (6 years ago); latest analysis 2022-06-07 23:08:08 (3 years ago).

Publisher context

Company metadata: Intel Corporation. Product metadata: Intel® Wireless WiFi Link Adapter.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

Netwtw04.sys is a Windows file recorded in the ThreatInfo database. It is associated with Intel® Wireless WiFi Link Adapter. The reported company name is Intel Corporation. The current detection status is Trojan.Generic, based on the latest analysis from 2022-06-07 23:08:08 (3 years ago).

If Netwtw04.sys appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Generic.

Product Name: Intel® Wireless WiFi Link Adapter
Company Name: Intel Corporation
MD5: 5ab5c57f6defeb8584a3baa09d803ac0
Size: 7 MB
First Published: 2019-08-02 21:07:32 (6 years ago)
Latest Published: 2022-06-07 23:08:08 (3 years ago)
Status: Trojan.Generic (on last analysis)
Analysis Date: 2022-06-07 23:08:08 (3 years ago)
Netwtw04.sys detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%localappdata%\slimware utilities inc\driverupdate\backups\20190720t091948231033\pci
%sysdrive%\windows.old\windows\winsxs
%sysdrive%\windows.old\windows\system32\driverstore\filerepository

ThreatInfo has observed Netwtw04.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

66.7%
33.3%

The strongest geographic signal for this file is Afghanistan with 66.7% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for Netwtw04.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

Netwtw04.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x000297c0

PE Sections:

Name Size of data MD5
.text 3632128 b5e51ac310f0f94adc92ec8f427c2bf0
.rdata 728064 ef627346098b001186400b40af3592e1
.data 151552 75780c8d56cebce8e4a4001c0f31fd26
.pdata 196608 e9677c25ce081ddd235f35546ee6ac48
PAGEcsrv 83456 be797fbcf62b3fff63967adb7b4b8790
PAGEcjaw 83456 502d0080ed6575d7a3c8d63c0f7677b2
PAGEcwfd 116736 6e9aa485615e7e95cc31e608ca597a3f
PAGE 25600 b10ab202b649719cbe87245623c44435
PAGEcnlo 1024 531a4b1b43ddfcb23625ae2b8214df5b
PAGEccln 95744 4de04d9e24df98bceb9f19156655472d
PAGEcsec 31232 cfdf9577e69e2a54f0cdd7941d798980
PAGEcsv_ 57344 14a3df2d1921c145e4c49ba767e4e4f1
PAGEcimg 6144 4095c82f4d6679dfd07e79a380e11ea9
PAGEcpsm 6656 420b2a8c4bc9d4b5c49f901fe9da4f8f
PAGEcctw 2560 4dee811803e05766596e0432476022d7
PAGEdoid 29184 f17f84a0c745129c341c3e3582a38f63
PAGEdcln 4096 b4ab78174051165b47bd67dd15610486
PAGEdsv_ 2560 3dad592b368a6baccc7fb0050bea3e3d
PAGEDATA 512 bf619eac0cdf3f68d496ea9344137e8b
PAGEdreg 265216 d47a07b681134f5d9fc43eb594ba4e82
PAGEdStn 1024 b3923b735df65d34dee2adba4708bc67
PAGEdSnd 512 41dcbc19e0b40d144c0de41e12d43703
PAGEdSnF 1024 3a7872692b1c55703af74fc024a84058
PAGEdWsP 1024 6636b646ab20d25b2e772e800cde2b00
PAGEdPsr 2048 c56527efa75796d4ad45c0b2263cda93
PAGEdThP 512 7c82741494361378d4683dadc17f12ad
PAGEdQua 1024 79d6d3320a0d42071581662b1ffdba67
PAGEdjaw 1536 2cfd3b2d2a7d4863ce1adb60139e6f85
PAGEdctw 512 dddcc03e2b592ffd37f7ac3ccb835596
PAGEdimg 2048 5e88d47d66e04e5612ff67a0d2dda1b1
PAGEdrlg 2097152 b2d1236c286a3c0704224fe4105eca49
INIT 4608 34d5919a88894b276177aaeb51dac015
.rsrc 46080 c6ccbdd0da99bb230385b2f6581b0f89
.reloc 27136 5c141f0b8f8c8d34e0512aa879f9176d

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: