Binary Validation
Applies to: Patch My PC Publisher
Two-Phase Binary Validation Model
Binary validation within Patch My PC follows a two-phase security model. Validation does not occur at a single checkpoint. Instead, it is enforced through 2 independent validation phases designed to protect against vendor distribution compromise, tampering, unauthorized file substitution, and post release modification.
The objective is straightforward. The file deployed to client devices must be byte for byte identical to the file originally obtained from the official vendor source and validated by Patch My PC.
Binary validation occurs in two distinct phases:
Phase 1: Pre release validation and catalog creation The vendor binary is acquired, hashed, malware scanned, validated, and recorded in catalog metadata prior to release. This ensures only verified content enters the catalog.
Phase 2: Runtime validation during publishing When a customer publishes an update, the binary is downloaded again directly from the vendor. Its cryptographic hash is recalculated and compared against the authoritative hash stored in the catalog. Publishing proceeds only if the hashes match exactly.

If either phase fails, the update does not proceed.
Phase 1: Pre-release Validation and Catalog Creation
Official Vendor Download
When a new third party update is added to the Patch My PC catalog, the binary is downloaded directly from the vendor’s official distribution source. This may be the vendor’s public download endpoint or official content delivery network.
At the time of acquisition, the following data is captured and recorded in the catalog metadata:
The exact vendor download URL
The cryptographic hash of the binary
The version and associated metadata
The recorded hash becomes the authoritative integrity reference for that update. This hash is later used during publishing to ensure that the file downloaded inside a customer environment is byte for byte identical to the file originally obtained and validated.
If the file were modified at any point after acquisition, whether through vendor mirror compromise, tampering, or corruption, the hash value would change. A mismatch results in publishing being halted.
In the example below, the catalog metadata contains both the original vendor download URL and the base64 encoded cryptographic hash. These values are used later in the validation process to confirm integrity.

This integrity anchoring step establishes a cryptographic trust reference before the catalog is ever signed or distributed. Subsequent validation steps rely on this recorded hash to prevent altered or substituted binaries from being published.
Malware and Reputation Scanning
Before the update is approved for release, the binary undergoes malware validation.
Where file size permits, the binary is uploaded to VirusTotal and scanned across dozens of antivirus engines. The results are reviewed as part of the validation process.
In the example below, the 1Password installer URL is analyzed by VirusTotal. The scan result shows 0 detections out of 94 engines, indicating that no participating security vendor flagged the file or URL as malicious at the time of analysis.

This multi engine scanning step provides broad threat intelligence coverage across commercial and open source detection platforms and reduces the risk of introducing malicious or compromised vendor content into the catalog.
Manual Review and Expert Validation
Automated scanning is only one layer of validation. If any antivirus engine flags a file in VirusTotal, the result triggers manual review by the catalog team.
It is not uncommon for one or two engines to flag a file while the majority report it as clean. This can happen due to:
Heuristic or behavioral detections
Machine learning false positives
Reputation scoring anomalies
Aggressive or overly sensitive signatures
When a detection occurs, the catalog team performs additional validation. This may include:
Reviewing the detection name and severity
Comparing results across engines to identify outliers
Verifying the vendor’s digital signature
Cross-checking the hash against the official vendor source
Reviewing additional threat intelligence sources
This human validation step is a key benefit of a curated catalog model. Automated scanning alone cannot always distinguish between a false positive and a real risk. Expert review ensures flagged software is properly investigated before release.
If a detection represents genuine risk, the update does not proceed. If it is confirmed to be a false positive, it may proceed after validation.
Catalog Creation
After validation:
The binary’s metadata, hash, and download URL are embedded into the catalog metadata
The catalog is compiled into a CAB file
The catalog is dual code-signed using a hardware-backed DigiCert certificate
This signing step cryptographically protects the integrity of the metadata, including the stored hash values.
When a catalog has been signed and released, details of the addition, including VirusTotal results can be found at https://patchmypc.com/catalog-release.

Before the catalog metadata is evaluated for publishing by the Publisher, its hash is validated. This can be observed in the PatchMyPC-PackageService.log

Phase 2: Runtime Validation During Publishing
Hash Verification
After downloading the binary, the Publisher calculates its cryptographic hash. That calculated hash is compared to the original hash recorded during catalog creation.
Publishing proceeds only if the hashes match exactly. Specifically, if:
The vendor distribution point were compromised
The file were altered after initial validation
A malicious file were served from the same URL
The hash comparison would fail and publishing would stop. The update would not be published into WSUS, ConfigMgr, or Intune.
The hash (digest) verification can be observed in the PatchMyPC.log.

Supply Chain Integrity Controls
This two-phase validation model protects against several supply chain risks:
Vendor mirror compromise
Content tampering after initial release
Man-in-the-middle content replacement
Unauthorized file substitution
Even if a vendor server were compromised after catalog release, the stored hash prevents altered binaries from being published.
The catalog’s digital signature protects metadata integrity. The hash validation protects binary integrity.
Both controls must succeed for publishing to proceed.
Last updated
Was this helpful?
