Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 22 additions & 1 deletion docs/cwa/scripts/cpu-temperature-monitor-create.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,4 +106,25 @@ This script is designed to establish a remote monitoring system for Windows comp
- Files on Machine
- Remote Monitor
## Attachments
[CPUTempMon.exe](<../../../static/attachments/itg/14323116/CPUTempMon.exe>)
[CPUTempMon.exe](<../../../static/attachments/itg/14323116/CPUTempMon.exe>)

## FAQ

1) Can the process `C:\ProgramData_automation\script\CPUTempMon\CPUTempMon.exe` be detected as a malware threat?

Yes, this has recently been detected as a threat via Defender in one of the partners' environments.

Name: VulnerableDriver:WinNT/Winring0
ID: 2147937641
Severity: Severe
Category: Trojan
Path: file:_C:\ProgramData_automation\script\CPUTempMon\CPUTempMon.sys
Detection Origin: Local machine
Detection Type: FastPath
Detection Source: Real-Time Protection
User: NT AUTHORITY\SYSTEM
Process Name: C:\ProgramData_automation\script\CPUTempMon\CPUTempMon.exe
Security intelligence Version: AV: 1.445.23.0, AS: 1.445.23.0, NIS: 1.445.23.0
Engine Version: AM: 1.1.26010.1, NIS: 1.1.26010.1

So, please whitelist the `C:\ProgramData_automation\script\CPUTempMon\CPUTempMon.exe` before implementation in production so that you don't get the noisy ticket bombardment.