Report Overview

  1. Visited public
    2025-05-28 19:16:44
    Tags
  2. URL

    listen-hard.com/4.zip?sn=46/

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.196.56

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
9

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
listen-hard.comunknown2024-01-302014-11-262025-05-28

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    listen-hard.com/4.zip?sn=46/

  2. IP

    104.21.84.192

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    7.8 MB (7768946 bytes)

  2. Hash

    87d16099a2d27eedc82b54e5c30ec4d0

    ea43cf7afdd09c7ac238842f5aee77134cd1f407

  1. Archive (28)

  2. FilenameMd5File type
    avutil-51.dll
    2a8b8a15a58edf3b443083ec29894e54
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 9 sections
    libtoxcore.dll
    1622f6b4d637dc6a18a38d9a00f16080
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
    NationalFlag.db
    db5783f2b6bc611962fb85ef9ca09e1d
    PNG image data, 24 x 16, 8-bit/color RGBA, non-interlaced
    Qt6Network.dll
    be6f48130ed58685f260578be020e2cc
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 13 sections
    avutil-51.dll
    2a8b8a15a58edf3b443083ec29894e54
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 9 sections
    libtoxcore.dll
    1622f6b4d637dc6a18a38d9a00f16080
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
    NationalFlag.db
    db5783f2b6bc611962fb85ef9ca09e1d
    PNG image data, 24 x 16, 8-bit/color RGBA, non-interlaced
    Qt6Network.dll
    be6f48130ed58685f260578be020e2cc
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 13 sections
    avutil-51.dll
    2a8b8a15a58edf3b443083ec29894e54
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 9 sections
    libtoxcore.dll
    1622f6b4d637dc6a18a38d9a00f16080
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
    NationalFlag.db
    db5783f2b6bc611962fb85ef9ca09e1d
    PNG image data, 24 x 16, 8-bit/color RGBA, non-interlaced
    Qt6Network.dll
    be6f48130ed58685f260578be020e2cc
    PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows, 13 sections
    client32.exe
    ee75b57b9300aab96530503bfae8a2f2
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    client32.ini
    6a3cdfcef8af627a4b443abe7b4d26c5
    ASCII text, with CRLF line terminators
    HTCTL32.DLL
    2d3b207c8a48148296156e5725426c7f
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    msvcr100.dll
    0e37fbfa79d349d672456923ec5fbbe3
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 4 sections
    netsup.bat
    33fd9214242cdc7e7424d62f2fcfe3a1
    DOS batch file, ASCII text, with CRLF line terminators
    nskbfltr.inf
    26e28c01461f7e65c402bdf09923d435
    Windows setup INFormation
    NSM.ini
    88b1dab8f4fd1ae879685995c90bd902
    Generic INItialization configuration [Features]
    NSM.LIC
    390c964070626a64888d385c514f568e
    ASCII text, with CRLF line terminators
    pcicapi.dll
    dcde2248d19c778a41aa165866dd52d0
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    PCICHEK.DLL
    a0b9388c5f18e27266a31f8c5765b263
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    PCICL32.DLL
    00587238d16012152c2e951a087f2cc9
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
    remcmdstub.exe
    1768c9971cea4cc10c7dd45a5f8f022a
    PE32 executable (console) Intel 80386, for MS Windows, 5 sections
    TCCTL32.DLL
    eab603d12705752e3d268d86dff74ed4
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 5 sections
    binkawin.asi
    f415f94065be11ed9a3b55a5d9baeae7
    PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
    avformat-53.dll
    c5ccb86cd745746b9908031a54315f90
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 10 sections
    avutil-51.dll
    2a8b8a15a58edf3b443083ec29894e54
    PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows, 9 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
GET listen-hard.com/4.zip?sn=46/
104.21.84.192200 OK7.8 MB