SHA-256: 14ca877b444ae0d4d0bfd7709da763ff4c1434a73bc3d15251101facd33f7d83 -
VT
SHA-1: 4c740df32ceb14e93294855d124b47440a558571
File type: EXE/Windows
File size: 2.19 MB
File name: Internal.exe
ProtectionID: CvSig : 0x53445352 | SigGuid ADBF2837-3F60-4019-B1CD0144ED27A69F
PDB/VBP pathway: g:\dev\_current\smart card reader\X1_software\softwares\internal full\Src\X1\Release\X1.pdb
Compilation date: 2015-08-08 16:30:16
First seen: 2015-08-08 16:30:16
Name: X1 v1.1
Additional note: Code:
cf4ac1badfd87b60e9e81987a9959a18a6791c9ba5070e7980efd624dc75bc38.
From the same family:
X1 v1.1,
X1 Toronto.
Cosmetic reshacks from the 'x2 cartel':
X1 v4.1,
X1 v5.0,
X2G,
X2A,
X2A (nfc design),
X2A (mr_emv trial),
X2A Cracked,
X2,
X2.EMV.
Screenshot:
Mirror provided by vx-underground.org, thx!
(infected)