Question
Installflashplayer.exe (potentially scraping memory)
Greetings,
I've been receiving these notices through cb Defense service that flash player is trying to run/install but the end users aren't trying to install anything. Here is the sequence of events leading up to the 'Potential scraping memory'.
Is this something I need to worry about?
| Event Order | Event |
|---|---|
| 1 | The file C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe was first detected on a local disk. The device was on the corporate network using the public address ###.###.###.### (located in {Corporate Office Location}, United States). The file is signed and is part of Adobe Flash Player Installer/Uninstaller by Adobe. The file was created by the application C:\windows\syswow64\flashplayerinstaller.exe . |
| 2 | The application C:\windows\syswow64\flashplayerinstaller.exe invoked the application C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe. |
| 3 | The application C:\windows\syswow64\flashplayerinstaller.exe attempted to invoke the application "C:\Windows\SysWOW64\Macromed\Temp\{5717F047-4307-4149-B4E1-99F8DC5D800B}\InstallFlashPlayer.exe", by calling the function "CreateProcessW". The operation was successful. |
| 4 | The application C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe attempted to enable executable memory, by calling the function "NtProtectVirtualMemory". The operation was successful. |
| 5 | The application C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe attempted to list all processes, by calling the function "NtQuerySystemInformation". The operation failed. |
| 6 | The application C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe attempted to open the process "System", by calling the function "OpenProcess". The operation was blocked by the operating system. |
| 7 | The application C:\windows\syswow64\macromed\temp\{5717f047-4307-4149-b4e1-99f8dc5d800b}\installflashplayer.exe attempted to read the memory of "C:\Windows\System32\lsass.exe" (potentially scraping memory), by calling the function "NtReadVirtualMemory". The operation was blocked and the application terminated by Cb Defense. |
Thank You for your time.
