Malware

Win32/Agent.PTM (file analysis)

Malware Removal

The Win32/Agent.PTM is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/Agent.PTM virus can do?

  • Reads data out of its own binary image
  • A process created a hidden window
  • Uses Windows utilities for basic functionality
  • A process attempted to delay the analysis task by a long amount of time.
  • Creates a hidden or system file

How to determine Win32/Agent.PTM?


File Info:

crc32: 4E10367D
md5: 184320a057e455555e3be22e67663722
name: 388f5bc2f088769b361dfe8a45f0d5237c4580b287612422a03babe6994339ff
sha1: a43a8f748e931201f690e4532e2f51329f04e3d4
sha256: 388f5bc2f088769b361dfe8a45f0d5237c4580b287612422a03babe6994339ff
sha512: 66a6bca41c36924a92e20593d9ef31c8cfb49b27001ecce7da17399455d3c2b2bf4c9728afcaa80ba89cca4ff5badc6a904e22faf109493045805c342632a38e
ssdeep: 6144:4f/4UN9ltp0rG8V26R7aJO4n0Bu0hqFbQmt1dPHmeuQaDqIZ3eiRH3AdKy9HGeo0:4YUrfJI7CO4Jb7t1dq1DqIZyjmN0
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: xa9 Microsoft Corporation. All rights reserved.
InternalName: rundll32.exe
FileVersion: 2, 0, 0, 2
CompanyName: Microsoft Corporation
SpecialBuild: 2, 0, 0, 2
Comments: Windows Help Service
ProductName: Microsoftxae Windowsxae Operating System
ProductVersion: 2, 0, 0, 2
FileDescription: Windows Help Service
OriginalFilename: rundll32.exe
Translation: 0x0409 0x04b0

Win32/Agent.PTM also known as:

BkavW32.EncapterLTC.Trojan
MicroWorld-eScanGen:Variant.Graftor.181965
FireEyeGeneric.mg.184320a057e45555
CAT-QuickHealWorm.Hokobot.A5
McAfeeGeneric.dgg
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Explosive.tpk7
SangforMalware
K7AntiVirusTrojan ( 000f45a71 )
BitDefenderGen:Variant.Graftor.181965
K7GWTrojan ( 000f45a71 )
Cybereasonmalicious.057e45
SymantecTrojan.Gen.2
APEXMalicious
AvastWin32:Explosive-I [Trj]
ClamAVWin.Trojan.Explosive-6479674-0
GDataGen:Variant.Graftor.181965
KasperskyHEUR:Trojan.Win32.Generic
AlibabaWorm:Win32/Hokobot.03d0c290
NANO-AntivirusTrojan.Win32.Explosive.dpzrri
ViRobotTrojan.Win32.Explosive.611231
RisingWorm.Hokobot!8.5646 (TFE:5:LNOwhNulKsC)
Endgamemalicious (high confidence)
EmsisoftGen:Variant.Graftor.181965 (B)
ComodoMalware@#3hx49zbz6nakr
F-SecureHeuristic.HEUR/AGEN.1011697
DrWebTrojan.DownLoader9.11247
ZillyaTrojan.Explosive.Win32.14
TrendMicroBKDR_EXPLOSIVE.A
McAfee-GW-EditionBehavesLike.Win32.RansomWannaCry.hh
Trapminemalicious.high.ml.score
SophosTroj/Explos-A
IkarusTrojan.Win32.Hokobot
JiangminTrojan/Explosive.j
WebrootW32.Explosive
AviraHEUR/AGEN.1011697
MAXmalware (ai score=100)
Antiy-AVLTrojan/Win32.AGeneric
ArcabitTrojan.Graftor.D2C6CD
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftWorm:Win32/Hokobot.A!dha
AhnLab-V3Trojan/Win32.Agent.C779360
Acronissuspicious
VBA32BScope.Trojan.KillFiles
ALYacGen:Variant.Graftor.181965
Ad-AwareGen:Variant.Graftor.181965
CylanceUnsafe
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Agent.PTM
TrendMicro-HouseCallBKDR_EXPLOSIVE.A
YandexTrojan.Explosive!
FortinetW32/Agent.PTM!tr
BitDefenderThetaGen:NN.ZexaF.32519.Lu1@a0dDQlmi
AVGWin32:Explosive-I [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_90% (W)
Qihoo-360HEUR/QVM08.0.Malware.Gen

How to remove Win32/Agent.PTM?

Win32/Agent.PTM removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment