Posted 10 hours ago10 hr Several times now, Microsoft Defender for Endpoint has identified the following file as malware and has quaratined it:Filename: pulsewayhardware.sysHashes: Hash SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299Hash SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5Threat: Winring0Defender engine version1.1.25050.6Defender Mocamp version4.18.25040.2VirusTotal link:https://www.virustotal.com/gui/file/11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5DetectionVirusTotal detection ratio2/72Malware detectedVulnerableDriver:WinNT/Winring0Object detailsFile size14.54 KBIs PEtrueIssuerGlobalSign ObjectSign CASignerNoriyuki MIYAZAKIPE metadataOriginal nameWinRing0.sysCompanyOpenLibSys.orgProductWinRing0DescriptionWinRing0File prevalenceOrganization devices5Organization cloud apps0Worldwide devices10k+Worldwide observed devicesTimeFirst seenMar 3, 2013 6:00:43 AMLast seenJun 13, 2025 5:47:56 AMIs this an actual Pulseway file and has anyone else experienced this on any of their agents? What other info can I provide?And before anyone asks, I only deploy agents from the SaaS Pulseway server instance.Thanks,Bart B.
Create an account or sign in to comment