Result for 413834B18CE2EE31D9383DC60BB3C539DF20A4AC

Query result

Key Value
FileNamepeutils.py
FileSize18554
MD54586A691C23F23415113D8E82E7481AB
RDS:package_id294775
SHA-1413834B18CE2EE31D9383DC60BB3C539DF20A4AC
SHA-256E0BDEAEDB4D732FD6BD17352F9854AA9AA038EE68CE186C5F1C2B863EF309302
SSDEEP384:71o4Y3g6i9MPSZkn2ozg2orT6prYAvpz/u:5o4hfiZn2Qg2AIYoW
TLSHT19A82326EF504222C829354B69C8B90A56F26B8EB11D0143CBCFDD2583F5873497F1AFA
insert-timestamp1696448944.9123077
sourcedb.sqlite
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize62908
MD5394AFF074C8A9A226B47255E6609D116
PackageDescriptionPortable Executable (PE) parsing module for Python pefile is a Python module to read and work with Portable Executable (PE) files. Most of the information in the PE header is accessible, as well as all the sections, section information and data. . All the basic PE file structures are available with their default names as attributes of the returned instance. . Processed elements such as the import table are made available with lowercase names, to differentiate them from the upper case basic structure names. . pefile has been tested against the limits of valid PE headers; that is, Windows malware. Lots of packed malware attempt to abuse the format beyond its standard use. . Some of the tasks that pefile makes possible are: * Modifying and writing back to the PE image * Header inspection * Section analysis * Retrieving data * Warnings for suspicious and malformed values * Packer detection with PEiD signatures * PEiD signature generation
PackageMaintainerHilko Bengen <bengen@debian.org>
PackageNamepython3-pefile
PackageSectionpython
PackageVersion2021.9.3-1
SHA-1C9C89717A41CB560838F93E16ACA2CAA1A4E974A
SHA-256A424EBECDFBA09087002885041DF7AA6DE50CE64FD26CE93121242CF830C8B12