SHA-256: 6cb6a3e75965ebacf1f6d72096a90e9d80be6d1c9d6ebd7dd9453992140a9d5c -
VT
SHA-1: 1a72b1c303ee3ca79aed16da22f97ce563f01e2f
File type: EXE/Windows
File size: 15.46 MB
File name: MainApplication.exe
ProtectionID: [CompilerDetect] -> Borland Delphi (unknown version) - 60% probability
Compilation date: 2015-08-07 18:04:19
First seen: 2020-12-19 08:00:33
Name: X2A (mr_emv trial)
Actor: mr_emv
Additional note: Serial:
LVUWAQOAAAA+oBurz1nigC5dfztwldBKtJIIXFAZH+rqw1QYPe5BR8Uq8C0qF9wQ
jCAtsSZWz4LHBKFe6JQnROIJJ20gg2eGHWHtfHXy8MhKMrWHqmpiAv6YAoUAfVXp
ru6OyEaViAbmwYUtq1uVPIrKklIHSOFkOFSYhu863c/lcGlKJWGNFTKPf1lAQTqL
GHPpRl32r7swgLuUvIG81/7iL6xlDWef1dugvIhHR/0/+QaSC7d3E6OL/VcjZwpZ
RrHtTM2641ltooytOfnfjE+siFT3NEnoj+k04HpjER5RrLLVgbHUz5pFpMK799yX
vQ/hGxywRIGAAAAA
Similar to
10d8998094e9bdd9951a2edcc9cec3540628712b325682b21dba02b6650d97c9.
From the same family:
X1 v1.1,
X1 v1.1,
X1 Toronto.
Cosmetic reshacks from the 'x2 cartel':
X1 v4.1,
X1 v5.0,
X2G,
X2A,
X2A (nfc design),
X2A Cracked,
X2,
X2.EMV.
Screenshot:
Mirror provided by vx-underground.org, thx!
(infected)