SHA-256: 10d8998094e9bdd9951a2edcc9cec3540628712b325682b21dba02b6650d97c9 -
VT
SHA-1: dba04f832d2e6c53b28759311d0c8e6aa813e72b
File type: EXE/Windows
File size: 1.85 MB
File name: MainApplication.exe
ProtectionID: [!] ASProtect SKE v2.72 or higher detected !
[CompilerDetect] -> Borland Delphi (unknown version) - 20% probability
PDB/VBP pathway: g:\dev\_current\smart card reader\NoProtect_bk\Src\X1\Release\X1.pdb
Compilation date: 2015-08-07 18:04:19
First seen: 2020-12-24 00:53:43
Name: X2A Cracked
Additional note: Similar to
6cb6a3e75965ebacf1f6d72096a90e9d80be6d1c9d6ebd7dd9453992140a9d5c.
Related to the .pdb path, it can be seen in
memory.
From the same family:
X1 v1.1,
X1 v1.1,
X1 Toronto.
Cosmetic reshacks from the 'x2 cartel':
X1 v4.1,
X1 v5.0,
X2G,
X2A,
X2A (nfc design),
X2A (mr_emv trial),
X2,
X2.EMV.
Screenshot:
Mirror provided by vx-underground.org, thx!
(infected)