Result for 08EC3E610F4A5F16A8AF8B22DE86116A463AF348

Query result

Key Value
CRC3202A409CF
FileName./var/lib/prey/modules/alert/platform/linux/functions
FileSize2270
MD57B8BB5200B05AF7A9C6320E3F6FE9C4F
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
ProductCode{'ApplicationType': 'software collection', 'Language': 'English', 'MfgCode': '369', 'OpSystemCode': '51', 'ProductCode': '13453', 'ProductName': 'LXFDVD 142', 'ProductVersion': 'March 2011'}
SHA-108EC3E610F4A5F16A8AF8B22DE86116A463AF348
SHA-256BF0C465FD8A3AAD3A1BE19BFBBE921CBB7A01947600A3F9049302E6CA6891D1B
SSDEEP48:YTu8nkr1igLptFMnF9dBc+5g34/tcXuwM8tk/qiD/n0/NA4ny9WGv:J1zL2PcBomYCiHI/nyh
SpecialCode
TLSHT18A41461ED16F0F5727A217F4B53AE642960CABD02D976C6220ECFDBC20E82359DF0841
dbnsrl_modern_rds
insert-timestamp1646981048.203524
sourceNSRL
hashlookup:parent-total4
hashlookup:trust70

Network graph view

Parents (Total: 4)

The searched file hash is included in 4 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize526386
MD51281E3E8AAA1171969ADAAAE44843B48
PackageDescriptionutility for tracking stolen computers Prey is a lightweight program to help track and recover a stolen laptop. . It comprises a shell script which calls out on a regular basis to either a server run by the Prey project, or a URL defined by the system administrator. A graphical configuration tool is also provided in order to maintain the simple config file.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNameprey
PackageSectionutils
PackageVersion0.6.2-1
SHA-130FA7C56DA8FB7A1B755B3E0027F65BDD42626D8
SHA-25612C397C53964A3E9590DC0087CFD7D75C6FE233E4212A9288579E903367AE4E3
Key Value
FileSize651538
MD52A7EA4B08921FF960C77EDADD6A42B63
PackageDescriptionutility for tracking stolen computers Prey is a lightweight program to help track and recover a stolen laptop. . It comprises a shell script which calls out on a regular basis to either a server run by the Prey project, or a URL defined by the system administrator. A graphical configuration tool is also provided in order to maintain the simple config file.
PackageMaintainerFacundo Guerrero <guerremdq@gmail.com>
PackageNameprey
PackageSectionutils
PackageVersion0.6.2-1
SHA-116F17390270085D58F7A6072149882FD82387425
SHA-256D25885127FB770E290C9BDD4E3C6BEF4620A94335485CD4A0E75348603650E61
Key Value
FileSize526284
MD5655C7452F4542A2305D1C002F07D7CB8
PackageDescriptionutility for tracking stolen computers Prey is a lightweight program to help track and recover a stolen laptop. . It comprises a shell script which calls out on a regular basis to either a server run by the Prey project, or a URL defined by the system administrator. A graphical configuration tool is also provided in order to maintain the simple config file.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNameprey
PackageSectionutils
PackageVersion0.6.2-1.1
SHA-14AD2E7B489C426F851E6F337341FD94F2AC5DAFA
SHA-2561F6701EC5946170FCB881378D5809BD5DDABD2575A86042BF31C39DFD260D428
Key Value
FileSize651288
MD5C2E0AB2DE264A03DDEAB5C702A478A7C
PackageDescriptionutility for tracking stolen computers Prey is a lightweight program to help track and recover a stolen laptop. . It comprises a shell script which calls out on a regular basis to either a server run by the Prey project, or a URL defined by the system administrator. A graphical configuration tool is also provided in order to maintain the simple config file.
PackageMaintainerFacundo Guerrero <guerremdq@gmail.com>
PackageNameprey
PackageSectionutils
PackageVersion0.6.2-1.1
SHA-182EC296118240168F89C20D26192E4AD983511CD
SHA-256BD5D0106AD53F13D4AD25EBDD34550410BE2068AC3A0FEE3B3A979BA3CA56B69