PUP.Patcher.M

Threat Scorecard

Popularity Rank: 15,142
Threat Level: 10 % (Normal)
Infected Computers: 248
First Seen: December 22, 2010
Last Seen: March 4, 2026
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda Trj/Genetic.gen
AVG Agent3.SRN
Fortinet W32/Nbdd.N!tr.bdr
Ikarus Backdoor.Win32.Venik
Antiy-AVL Backdoor/Win32.Nbdd
Sophos Mal/Agent-IM
Comodo Backdoor.Win32.Agent.KYU
Kaspersky HEUR:Trojan.Win32.Generic
Avast Win32:PcClient-ZE [Trj]
F-Prot W32/Dropper.AHSW
K7AntiVirus Trojan
McAfee Generic BackDoor!fdd
CAT-QuickHeal Backdoor.PcClient
Panda Bck/PcClient.JJ
AVG BackDoor.Agent.AFYO

File System Details

PUP.Patcher.M may create the following file(s):
# File Name MD5 Detections
1. Rimnt99k.dll 3e4ac741090359855eb45872b6e8cb6e 23
2. Windows.exe b2e4fa087596f170dccb5ffeb0051015 17
3. RsmbtwC.dll 442251851e450f57ef21eeeacf2b32d0 4
4. RsmttuC.dll 0f11716d23b31ba71f76a7b2945035e2 1

Analysis Report

General information

Family Name: PUP.Patcher.M
Packers: UPX
Signature status: No Signature

Known Samples

MD5: af809f397ad51a49a752172fa0eeed44
SHA1: d5e0d5c0a212cd03cfe245d9f5680469daacd199
SHA256: 677E2A57B03C46D99C270528C67093E14E01E7231D04DF841A9D8C95E6CA4B37
File Size: 62.46 KB, 62464 bytes
MD5: cbb092ced40d00931387f67bb2acfda1
SHA1: f4f1c1e0363d522db2d56f68d3fa254c9ebc08ba
SHA256: F62CF993F9E0C1A583514436E5E515BDC0878654A481DE7062CE2D87E9A41330
File Size: 14.85 KB, 14848 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • HighEntropy
  • No Version Info
  • packed
  • x86

Block Information

Total Blocks: 9
Potentially Malicious Blocks: 9
Whitelisted Blocks: 0
Unknown Blocks: 0

Visual Map

x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Keygen.M
  • Patcher.B
  • Patcher.M

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...