Result for EA8D0833C4F810B068F5B02687F45623637D0004

Query result

Key Value
FileName./usr/lib/arm-linux-gnueabihf/libfakeroot/libfakeroot-sysv.so
FileSize31220
MD5A93776D0CA2B6C80756220AA83E8F173
SHA-1EA8D0833C4F810B068F5B02687F45623637D0004
SHA-2565E824192AE2FC5C3EC3A9AD2AF29DC74B0728592BA3FC3879F980A25C60E429D
SSDEEP768:GkUKjvCAuO8FcSfX1TAm72l9q9d20AICX:LHzAO8FcSfa54CX
TLSHT114E217ABB2DE997EC1C62B3199E70B02731BE885710F9D07820E72A21CB75DC5467EC5
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize21274
MD5BCD7ED6443C0411D610BBFE3DDDE43C8
PackageDescriptiontool for simulating superuser privileges - shared libraries fakeroot provides a fake "root environment" by means of LD_PRELOAD and SysV IPC (or TCP) trickery. It puts wrappers around getuid(), chown(), stat(), and other file-manipulation functions, so that unprivileged users can (for instance) populate .deb archives with root-owned files; various build tools use fakeroot for this by default. . This package contains the LD_PRELOAD libraries.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamelibfakeroot
PackageSectionutils
PackageVersion1.20-3ubuntu3
SHA-1E31536F4F1350449CDEA674A674F2DB6ACC84721
SHA-256178FBF09A3522F0875C3F069E07767DE7E8FD0306C691656462293DACB3AEB45