Bloodhound.Exploit.451
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 1,977 |
| Threat Level: | 10 % (Normal) |
| Infected Computers: | 10,187 |
| First Seen: | February 21, 2012 |
| Last Seen: | February 6, 2026 |
| OS(es) Affected: | Windows |
Bloodhound.Exploit.451 is a Trojan that functions as a heuristic detection for malicious files that propagate by exploiting the Microsoft Windows 'Msvcrt.dll' Remote Buffer Overflow Vulnerability (BID 51913). Bloodhound.Exploit.451 is unintentionally installed onto a computer system by visiting a website that hosts infected advertisements. Bloodhound.Exploit.451 tries to drop more malware infections onto the infected computer system. Bloodhound.Exploit.451 can destroy an affected computer system and reduce PC performance. Remove Bloodhound.Exploit.451 before it harms your PC.
Table of Contents
Analysis Report
General information
| Family Name: | PUP.GameHack.HE |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
96b657c17f89de45024f043a3ec1d559
SHA1:
51e6d4a6a0cdeee7ccd10fe597be3debd77c5c2a
SHA256:
A3F7CA0BE103AAC4C4E0DA5C3565199E1983089D1708888B8FE965AECEA53EDE
File Size:
940.54 KB, 940544 bytes
|
|
MD5:
02d62291b244c165852ae789014cb5c9
SHA1:
481464550c355ccd4925e5f27f377e026b13867c
SHA256:
08D6758CA2EF1242B37068614C37F10FC5FF0EB4494EC55519228C8639561B35
File Size:
2.62 MB, 2622464 bytes
|
|
MD5:
11e3beae2f88c8479926e8902369cdb6
SHA1:
a0567ee74ee4638a8489a47b435abf26bd471a5b
SHA256:
93036B1E461D110FD0F98B65F4499F8995835171DF895863E1E5D635BCB4AE07
File Size:
2.17 MB, 2165248 bytes
|
|
MD5:
fe218d514c16493501e7ce5f189cfb40
SHA1:
7eeeda331c8f4fc7900818f39676e7488bd38111
SHA256:
945BA39A1C79569DED850CC47557DE1B799F1B09B5F3EFF8D0D90BDFFF717928
File Size:
1.57 MB, 1566208 bytes
|
|
MD5:
7f05eb167d367ee6761911001e8f5e08
SHA1:
72d5d38d11f1a8b536278ae4d25ebea8fb388daf
SHA256:
BCAA15D066FEDAF08C27162C71059951CF8AFA290EFB7505FFB47FE584739940
File Size:
4.29 MB, 4294656 bytes
|
Show More
|
MD5:
758c424e215eaeb69a6f2ecc05223e7b
SHA1:
098dc2691fbd1f457819ee37d107f2e6990cc34d
SHA256:
1D3F2B9F936E98D3D9CD92B90B7F14C0BC841CADB8D6724FD12C7CEBE3534E81
File Size:
505.34 KB, 505344 bytes
|
|
MD5:
5dc81cae95dafc82af12fd647f5bdd02
SHA1:
9d3a06823bcd784f323cd865d9fd99cf0db04db1
SHA256:
D50453DAF775E928283925AC0244B90C43E72C4D28FC8A9B4B559FEE71E507F7
File Size:
3.76 MB, 3757568 bytes
|
|
MD5:
5fcbe668461aadc84e32061475df23b2
SHA1:
09105e112e880887942afd1d555c6ee0e3f5dfb4
SHA256:
46F0772209BE5AE2177E28E2B8E5922D1D3F44792DBFC57C569C8973F5C53A1C
File Size:
1.77 MB, 1770496 bytes
|
|
MD5:
5e197b177cb362bc422881a14150f63a
SHA1:
85fcbf22f4168f0a620a8b95cda242a9a8525b84
SHA256:
A8520582D83DEB930D437712065C2678F94206AE7844D193D109862B7204133D
File Size:
2.30 MB, 2304512 bytes
|
|
MD5:
0e0feb0dfeea41bdfd37776365580f5e
SHA1:
5845eece35de9a53a69fb2a003f50c8e04605b43
SHA256:
E0676A61735B182C723E0F971EFA400EC1BDAAFF12E5D1BCCABD591204CBA046
File Size:
2.21 MB, 2208256 bytes
|
|
MD5:
459067711df586909141d05f0e295e67
SHA1:
27587879f8c01ac85fd60b5347512d1c51aa6c6b
SHA256:
35D7B69DC1D20E95801FB2A816183744BEE889BD2A2F745DF76C3DD94859C3F7
File Size:
983.04 KB, 983040 bytes
|
|
MD5:
87777662dc35f735ad05a679dc398656
SHA1:
3ba55fdbd05dbd33af5692993ec3e2d098cacbdb
SHA256:
95076C8DA2C82A2596908B4B660836D9B9C8C1EA48739F8594CEA80B748BA872
File Size:
4.54 MB, 4539904 bytes
|
|
MD5:
530e48431ca13284523a94358a88a963
SHA1:
f8e7b3547733d51a34cf3232053ef1d71167f256
SHA256:
63FC471F7258C3AF57D27A8A366D49D1E4C4280CD2F53A09BB2E02E0ABE30F9B
File Size:
4.63 MB, 4630528 bytes
|
|
MD5:
e16569cb8a06f5121452a92f74791647
SHA1:
29a8f886161e0a6c64220145bb4e083b23ccfb2f
SHA256:
4662D6E15F1E4DFC562CDE522482CE686FC4486D3EBC5E5C7DB555333E517A7B
File Size:
1.55 MB, 1552896 bytes
|
|
MD5:
94911b4df8814a5a9f11442dff38c041
SHA1:
bc48656cde3fe1ab3aad11fc90fa1bdc2f6acea2
SHA256:
9A5321E528F11FB7DBA86115395657B5E158ECE212FA1823CB2A6E292186AAFC
File Size:
5.23 MB, 5231104 bytes
|
|
MD5:
206612e49e02d84f5918d72392c47992
SHA1:
82be8343c0e591ffaa2f7a944f7cd082e3c0996c
SHA256:
C77EDEEC636B0C856AE365BE99E76F0E59C14D60A3F4B7E0621FC7CD82E67D5B
File Size:
3.49 MB, 3493376 bytes
|
|
MD5:
6055156c2fd820d9fff9aceae61853bd
SHA1:
538cc9138b07ce9f16a5606db3182e5b49ad8001
SHA256:
7FABBB8414C137BAA1C5F8122E996DAA96CC39E9D896D326BB41F4479E9910C4
File Size:
2.75 MB, 2749952 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have resources
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks | aveash |
| Original Filename |
|
| Private Build | 00037305 |
| Product Name |
|
| Product Version |
|
File Traits
- 2+ executable sections
- dll
- fptable
- HighEntropy
- imgui
- JMC
- No Version Info
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 12,954 |
|---|---|
| Potentially Malicious Blocks: | 305 |
| Whitelisted Blocks: | 10,532 |
| Unknown Blocks: | 2,117 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.AIVD
- Agent.XCC
- Downloader.Agent.CN
- Dropper.Agent.JE
- Farfli.X
Show More
- Gamehack.BUB
- Gamehack.ECB
- Gamehack.EGA
- Gamehack.HEG
- Kryptik.CBLB
- Kryptik.GFM
- Warzone.A
- Zusy.AC
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\windows\syswow64\baseobjectswapper.log | Generic Write,Read Attributes |
| c:\windows\syswow64\protocol.dmp | Generic Write,Read Attributes |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
| Network Winsock2 |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\51e6d4a6a0cdeee7ccd10fe597be3debd77c5c2a_0000940544.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\481464550c355ccd4925e5f27f377e026b13867c_0002622464.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a0567ee74ee4638a8489a47b435abf26bd471a5b_0002165248.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7eeeda331c8f4fc7900818f39676e7488bd38111_0001566208.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\72d5d38d11f1a8b536278ae4d25ebea8fb388daf_0004294656.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\098dc2691fbd1f457819ee37d107f2e6990cc34d_0000505344.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\09105e112e880887942afd1d555c6ee0e3f5dfb4_0001770496.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\85fcbf22f4168f0a620a8b95cda242a9a8525b84_0002304512.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\29a8f886161e0a6c64220145bb4e083b23ccfb2f_0001552896.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\538cc9138b07ce9f16a5606db3182e5b49ad8001_0002749952.,LiQMAxHB
|