(HA and AR may return 404 error if they haven't already stumbled across the sample of interest.) There is before each hash a quick link access to their virustotal scan report, and also a hybrid-analysis and any.run link. If you are curious about how that kind of things work (how they handle smart cards, code similarities, etc.), you have here a list of +100 hashes to beggin your investigations. I wasted a whole week-end building this list to see what look like the 'emv fraud landscape' for fun, and also to have a trace of which name correspond to which hash. Hacktool:Win32/EMVSoft malware list Gallery with hashes of samples related to fraud softwares who aim to clone credit card datas on EMV chip.