SHA-256: e3db277da551621b102ac5ee545e772aa25799fa941c1e06bbc69fe4142af7cf -
VT
SHA-1: f0486f3f81e766c1ca1dbf32878f7645f8070c7c
File type: EXE/Windows
File size: 2.13 MB
File name: X1.exe
ProtectionID: CvSig : 0x53445352 | SigGuid DABFDF5D-C4AD-44B2-AA607DD464350219
PDB/VBP pathway: g:\dev\_current\smart card reader\Toronto_Card\Src\X1\Release\TorontoCard.pdb
Compilation date: 2015-09-19 06:05:35
First seen: 2016-03-22 20:50:39
Name: X1 Toronto
Actor: 652228289
Additional note: Just X1 v1.1 with auth
replace 00416846 - JE SHORT 0041687B
by: JMP SHORT 0041687B, to patch the auth.
From the same family:
X1 v1.1,
X1 v1.1.
Cosmetic reshacks from the 'x2 cartel':
X1 v4.1,
X1 v5.0,
X2G,
X2A,
X2A (nfc design),
X2A (mr_emv trial),
X2A Cracked,
X2,
X2.EMV.
Screenshot:
Mirror provided by vx-underground.org, thx!
(infected)