W32/Agent.AQP!tr.dldr also known as W32/Dadobra.A.gen!Eldorado, TR/ATRAPS.A.1685, Downloader.Generic13.CLMG.
Malware Analysis of W32/Agent.AQP!tr.dldr – PMROJECT1.EXE
Created files:
%Local Appdata%\Google\Chrome\User Data\Default\Web Data-journal
%Local Appdata%\Google\Chrome\User Data\lockfile
%Program Files%\FlashSockv01\Pmroject1.exe
Autostart registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdatedv01: “%Program Files%\FlashSockv01\Pmroject1.exe”
Detected by UnHackMe:
PMROJECT1.EXE
Default location: %PROGRAM FILES%\FLASHSOCKV01\PMROJECT1.EXE
Dropper hash(md5): a60009592c4e6f2f5e7ca6dbb12a2c22