Threat Database Trojans HackTool:Win32/Patcher.D

HackTool:Win32/Patcher.D

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 1,701
Threat Level: 50 % (Medium)
Infected Computers: 64,737
First Seen: November 22, 2012
Last Seen: February 5, 2026
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
AVG Generic30.AMTI
AhnLab-V3 Trojan/Win32.FakeAV
Kaspersky Trojan.Win32.FakeAV.oshe
Avast Win32:FakeAV-EEG [Trj]
AntiVir SPR/Cain.7992528
Kaspersky not-a-virus:PSWTool.Win32.Cain.284
F-Prot W32/Backdoor2.HMWL
K7AntiVirus Backdoor
McAfee PWCrack-Cain
AVG HackTool.MCQ
AntiVir SPR/UltraSurf.A.1
Kaspersky not-a-virus:NetTool.Win32.UltraSurf.gu
K7AntiVirus RemoteTool
AVG Generic30.AMBN
Fortinet W32/Pincav.CLLG!tr

SpyHunter Detects & Remove HackTool:Win32/Patcher.D

File System Details

HackTool:Win32/Patcher.D may create the following file(s):
# File Name MD5 Detections
1. ca_setup.exe 6fd3c21ef5e301a91e44d2666d9dc90c 258
2. xnbiqwby.dll 8408f944b27201aef5b3785167241884 93
3. U998.exe 7a69ea0b15862846e124cd70cef1a448 86
4. kefzorofx.dll 4721e7530bbb70b252f672bc6ee407e3 58
5. rPE.sys 9ba69c21950479ce0f958dd3240db5d6 24
6. usbhc.sys 666372e9bf260bcaa96b85066078275e 14
7. displaydrivers.exe baf9fd30cfe7cca9a9ea435e743419e8 9
8. wgsdgsdgdsgsd.exe 8eb7a135045db08d9c77b374bc32cdb0 6
9. skymonk_24243443_77.exe 949dc2cdaa70289c1394a872f17374b0 5
10. 2009016142.Adobe_Flash_win.exe b1a76dbfbebfa5641fc1827b05c4fd70 5
11. antim32.exe 5db46e27037310a20ba153d6702f6bd1 4
12. RMActivate_ssp.exe 1e17d3fecee94cb2fe0b1bfe70cc9eb2 3
13. stifolo.dll a25b468edf73c46545d3d29bd365999a 3
14. winldr.exe 4212a41ab67ba55c7a6a79ff030119ae 2
15. tTEvbsKqrbOXLI.exe 9ac0c8b795b6bdc11be79a48f062ccf5 2
16. 4207.exe 831ab49c4eaaee0833bff6b112d3bfdf 1
17. UIAutomationCore.exe 79342474962eda125aad8fcd92820c87 1
18. thawbrkr.exe cf1f7d9c2c40cb7dee4486b5d10bd723 1
19. exoljsv.exe eb1e2f7ece9938a9bd8dd59dcfae3d6a 1
20. Nbt.exe 9b48cc94a29da18cea15684a91f5dc9a 1

Analysis Report

General information

Family Name: HackTool.Patcher.B
Signature status: No Signature

Known Samples

MD5: ce64b03650dae0172c2fdd2958e1afa0
SHA1: c778997992ff3c45a70780705abd9d55d42ae158
SHA256: 1ABBC8DE4C0A0C08EE1CF972B3F4CA4CAB7BCCC1C3553EF0FC90F1A76B7D3FE6
File Size: 57.34 KB, 57344 bytes
MD5: 2f941f7dad3392e23814b1712f463981
SHA1: 199ed5bf30068f5ac90e62c20d68d060cdfde603
SHA256: 8856F9771A581778A4BF222462D75F917661B39F8C6BE935D937E7D74F937123
File Size: 240.64 KB, 240640 bytes
MD5: d66289bb0455d047804fbe6b686895dc
SHA1: 84194bc166e3869a95c1d09d4090c36b4626f83f
SHA256: 056B5FE084478CD78DDBE8936F888E5DACDB2B38CF3ED6B19389591BAA363EDD
File Size: 1.06 MB, 1061376 bytes
MD5: cb2c0bc1902ff3294af444a068632a0d
SHA1: f167cbd31c467a0b5b5bc95693ae9c3eba2700cb
SHA256: 63CB7F1AF064FF1DB54E73781D6D21CF3E33B31E9B8AA704FC560BE4FB03CA0E
File Size: 457.22 KB, 457216 bytes
MD5: 6ea58085bf5901e36cee44e953e7bb2a
SHA1: bad3a7a1144dfb1a16db84c98172273acf78206c
SHA256: A27328A3EADD0AD50C6226A9B62700AAC668EBE3D40485327836422BFC70D62A
File Size: 227.33 KB, 227328 bytes
Show More
MD5: 5539b8e219195d5c4a46e2bdabba2ac5
SHA1: 7bec13ed90eaea46f0aeedf3082f0fea0c03e897
SHA256: C2446CE42B2FE83575BB7F3905D0B6ECB6BC38E16C8A6014DDF5C8AA0C8DA3C6
File Size: 11.26 KB, 11264 bytes
MD5: 563fc2e92a4d282467c9910e3ea21449
SHA1: 3fe1d8181680060d550facd328e7f660c91a517d
SHA256: 8D9AC7BD8D83F2A179CBE9B8AAE427761ECA749D0059BA5DF72F5E582A077628
File Size: 122.88 KB, 122880 bytes
MD5: 98727de361904fa0962d2aca68494441
SHA1: ea0eb777b8aef78b1d6e26d1fe7d75d43483caf3
SHA256: AD217264CB9696F6A613847651C0E09B870656495EE348E72C76C19C2169AE61
File Size: 62.98 KB, 62976 bytes
MD5: 4ed4347aa55836ef094f0f2cec216bb1
SHA1: df65d42bb0113216812c8dec5e3da07c54d6dcb7
SHA256: EE6670AA25B73FCCF26661A98FE0CF360874A48B996D57D19FC786D2D48986B9
File Size: 119.81 KB, 119808 bytes
MD5: 5c61b70f64f72611afeab26b8e22b518
SHA1: 872cef6e7c7f99c32d9ba82eee572cb66127f1df
SHA256: 0D73CE0D7BA8C8BF0A0B2FFB99E5AB7A8A38FC91EB2744E2614D19DD362DEB9F
File Size: 11.26 KB, 11264 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • .UPX
  • 2+ executable sections
  • dll
  • HighEntropy
  • MPRESS
  • MPRESS Win32
  • Native MPRESS x86
  • No Version Info
  • packed
  • PEC2
Show More
  • PECompact v2.20
  • SusSec
  • upx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 27
Potentially Malicious Blocks: 24
Whitelisted Blocks: 3
Unknown Blocks: 0

Visual Map

x x x x x x x x x x x x x x x x x x 0 x x x x 0 0 x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Patcher.A
  • Patcher.B
  • Patcher.C

Files Modified

File Attributes
c:\users\user\appdata\local\temp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\bassmod.dll Generic Write,Read Attributes
c:\windows\syswow64\bassmod.dll Generic Write,Read Attributes
c:\windows\syswow64\muzika.xm Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ea0eb777b8aef78b1d6e26d1fe7d75d43483caf3_0000062976.,LiQMAxHB

Trending

Most Viewed

Loading...