Result for A4FA13F45FDE9D4ECD422D052BB8077F9B6744E2

Query result

Key Value
MD589FA83EE0AB2385B3B20414F93CE2740
PackageArchx86_64
PackageDescriptionLeechCraft is a modular "Internet client" application. LeechCraft allows to browse the web, read RSS/Atom feeds, download files via BitTorrent, HTTP, FTP and DC, automatically stream, download or play podcasts and other media files and much more. Features can be added via plugins that can be integrated with each other, while staying abstract from the exact implementation. This package contains the main LeechCraft executable, which connects all the plugins with each other, routes requests between them, tracks dependencies and performs several other housekeeping tasks.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameleechcraft
PackageReleaselp151.3.5
PackageVersion0.6.70+git.10870.g558588d6ec
SHA-1A4FA13F45FDE9D4ECD422D052BB8077F9B6744E2
SHA-25670C7DC41716A352F5DEE398CCE063AB76725EE856ADA01EC9B2422AF26950F8F
hashlookup:children-total298
hashlookup:trust50

Network graph view

Children (Total: 298)

The searched file hash includes 298 children files known and seen by metalookup. A sample is included below:

Key Value
CRC32F27932F6
FileNameso.png
FileSize527
MD54BE2FFC4D06DE407434A877DC03FF88B
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-100EA6A1FAF41F92DF2F7DFD3B0244859FF7367A0
SHA-256C1EE2A03D7D92ED81609C610F6BB8B1C211E4DA3018162DFF14CEE0D96C65451
SHA-512D883BD338588FAB2CEDC05AA432CD45E9A7CB970EB73D965D656B34C134D0E9D40EBDBBF4A806C2079D16B3E337053E1B6D3F264C5FAD2E0882FFB12127B3989
SSDEEP12:6v/7s3LhTsj90c5g+zaC8LylCnAVt6Y8NVN9:5TS9Dgo8tnhVNV
SpecialCode
TLSHT175F075D9E3F2CA65C52A44A64DD34231FA850CE815725260570C453F2D72B8AC4E8F08
dbnsrl_legacy
insert-timestamp1751729311.6971235
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC32690C6FAC
FileNameuz.png
FileSize515
MD537E4BDB64229F4624CACEC7D4297214D
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-10263CA512BE200463DDAEE0989A41285D6207BCA
SHA-256A2870E6E9927C9FF0B80E6A58B95ADB3463714F00733E9C3DDD3BE1A2D5D17B5
SHA-512790B216B37EF79A5A6E5DD6FE76050D4CA371E8E61FD09BD48610A5B934024D6E0901469975F105FD7C2C25B173DB8F3356214D6FC5F179D86FD5BE377209FFB
SSDEEP12:6v/7s3LclTwIkNWTksRLKaPLaJg5WecdFPU6E7+WPv2vwdUTww8w1:GTHkNWToajaJ+WeC2bxnItTbX
SpecialCode
TLSHT1A9F075E9C049F340D20E10A388C6C8C0D0428B8CDA420362615D083B24F46144AAAF4D
dbnsrl_legacy
insert-timestamp1751729298.462035
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC32EC5E4372
FileNamesi.png
FileSize510
KnownMaliciousmalshare.com
MD5D94EA79A5A8E0B6900941A1271C58191
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-10399012909DE5FAE983B175BBA5C82C14F047EFC
SHA-256A2EB02E5EE0CDFB2911E2AE65CB45E070E116CD9C471422E62C9710246FE7209
SHA-512AF9718F608FCF41676818B3B5242E6A4A81966E15EBD617A9ADC1160ACFADF41AD131130DDD5BC84CF69BF7D2D47E8872D079D24AAC8E8741FC7962F941F7A10
SSDEEP12:6v/7s3L4UiUKSpU9eeKFHCSHMKeNKTbow9DX:qmUcRFYKqIboEDX
SpecialCode
TLSHT130F00EEAE2215B3C5B3DAF866385454638910AE2C0E2A2542311AC1A116AE18C38CCDB
dbnsrl_legacy
insert-timestamp1751729291.1595876
mimetypeimage/png
nsrl-sha256rds241-sha256.zip
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC32E89AD1B8
FileNamenz.png
FileSize639
KnownMaliciousmalshare.com
MD5179CC39A58E324DF1E9A19A5EAE9DCA0
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-104BC0619390C660DBD5BA4CFB5AD3C0EECF0273B
SHA-256095EBBA705AB72032D0C17CA3936F7012A404A778A23A685C2CF943F22D9880E
SHA-5123B474B7ABF5AEA7F43559E020AC5B582CCDFB2EB16DED6E252B4DD4B4FCC6941C7F94C66E222502AE5CBA76E1E3E203643A1AA9FB2B5AB74D5731526A7E9E1F3
SSDEEP12:6v/7s3Lr8HmvckN+wlOZIM6p0X9ppKnp4bIGuyPdFwlylXCG3G:D8Gvh+wlOGlpKFbIrU3G
SpecialCode
TLSHT180F0024131E008EAEC2447722EA15FB4B2F15FED174B43F92ED99DB68E14747A0E2586
dbnsrl_legacy
insert-timestamp1751729288.1541338
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
FileName./usr/share/leechcraft/qml5/org/LC/common/TimedHoverArea.qml
FileSize499
MD5A765128BD1725206BBF52491145EFB20
SHA-105748B133DCD8E5EABB9CE30B1DD6288A4A5CCBE
SHA-25694602D713F52A7060FBE9D0CCAE300DAF536FFF8000609FD9FA8E7B4A3F7D1B2
SSDEEP12:IZSSwwxVNY0N8JbuK83Iikm4FE4hwcm82j7:IgJwx40N8Jbv84ikdZhwcm82j7
TLSHT1DEF0820B5B571D220AC70B557D93243677ACCA47920680207BBF82909F512E8736672B
Key Value
CRC3237E3A1C7
FileNamept.png
FileSize554
KnownMaliciousmalshare.com
MD55B8AB69AC52129BD32A3927F1B94D170
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-1058ABF2F3E55994F2D952DBE8619BF9AD190635C
SHA-256BA636F1CB6BFD323DAC1FB079CD002B5D486ED5EFF54F4C4744B81316B257E96
SHA-512F590D64F2E4407C3746B580DD94938D5288F0799E6BCE082218639C80500DCB39110A75049D0C3F54977BAFE1F9FFD212EA5B4C4A275658AF5DAF7C5A9E52A58
SSDEEP12:6v/7s3LUDVxEexm9/fcwcavyqauIzelN+jbkmaH7ITMqZlx9:OMexm93c5avvRmaHsMqZln
SpecialCode
TLSHT138F026A8AE146072CE391662220B6438FD579F4BA9558228AC874E447EF8D09E6D7B80
dbnsrl_legacy
insert-timestamp1751729305.3359838
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC32ED7DCFFF
FileNamelk.png
FileSize627
KnownMaliciousmalshare.com
MD54E90C553F186C9776976B5B11DBA4EA4
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-1059DC716AB8DED249C638CB978B7829298E807B3
SHA-2562EA160F5AA9C7155D9B0A15029AFE24E4309294B3B61FAB6F79442481C6F3C53
SHA-512E81CF68658D4A18FF5CFDF529CFBBA0A3DAFF15BFFBE73CE5F2B758D80FEB77D406B0381579727867C08C42ADB77A1A48C647EBE375DF78B7D991EC5E93CFCE5
SSDEEP12:6v/7s3LrZI1OqKHfYioZTtxAm5JB/oZBkBCXnX9KS7LG9ww2U:DZIOqKItggoF7LKww2U
SpecialCode
TLSHT16DF062C12588847080080A896ADAD490E4D61E564E7A81ABB547F01D27334A2045653D
dbnsrl_legacy
insert-timestamp1751729306.9883626
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC321E1A5B9D
FileName./usr/share/i2p/docs/icons/flags/fo.png
FileSize474
KnownMaliciousmalshare.com
MD5D0E6B0A3FDB4E2271B5B5057BD969966
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-105EA2820DD584FF2296EDB45B5AAE194F5321B85
SHA-2565B9E9E43B1F7969C97A72B65DE12AFD2429E83D1E644FC21ECA48B59A489D82A
SHA-512079AD3ED891EA76757F27B1CC841EBBB85FD7133F3AC1E23CA23661DA2DB12A161D1A91ACB866751DF85DD4C02DC5144528CCC77E442CD58170E2C20E615B550
SSDEEP6:6v/lhPUtqMl0znDs1Hz3xXrmrDcOjXMEogaMxxUtfP5mctMzBIWHvpSeJToqudRZ:6v/7s3L9z3FkaMklJONbHvK3R+8L
SpecialCode
TLSHT1BFF0B3C7D3B00CA0E2A622D13B775370F03A0CACAC650A0F284E10A238B9200CAE06E8
dbnsrl_legacy
insert-timestamp1751729292.5480616
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC328BB10F62
FileNameas.png
FileSize647
KnownMaliciousmalshare.com
MD596E49204E758277B6720584C4D844ECC
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-10628B4658024559820D908DC541B16676225F43C
SHA-2563EF7F1B82B2F28CAE0C7DF163C5CE9227EF37244DA85118374869FC5F2E05868
SHA-51216363FAE8431677648EB0357D30BEF20D10A625D5BEDDC4DA7EA77CAA66A07FE98ABB24A446374F468DC0A7564050A93DD857C7B87A97E309D0320FDCBF5D2EE
SSDEEP12:6v/7s3LrrkobHS0j+vPVVg8KO8TF7w9yd2N9l/uFuUxH6oOS6yaI4KFFVA6ZPm35:DrlbHS0wCFTFk9+qHmc6K/i4KFTZPemm
SpecialCode
TLSHT1ADF068C1A1008452D9F566FC014247F5D1370F2383B4C22C5E24E55F775180729A9747
dbnsrl_legacy
insert-timestamp1751729306.9812925
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot
Key Value
CRC32ECDE55A7
FileNamemk.png
FileSize664
KnownMaliciousmalshare.com
MD5617997CBCAAFAEA0035A4C0474AE16DD
OpSystemCode362
ProductCode12601
RDS:package_id262488
SHA-106C9BBEF1AB139B2A8987895E079D2E0E7495964
SHA-2563C47FE838CAB9F56788986F6D46B0B57BCC31B7E7365F6D152BD33DD8C57C48C
SHA-51268535070D3588C12B30CD703FC6A9583EEC5256144BFC492AC52B16F9119BFFE64B132937C580EA5582FD6D9CFCD5AB1EA2EE6ED8671AE90E8C62A7273DAF903
SSDEEP12:6v/7s3Lr3jvzUDq3ndp+bad2v2ui4JFa7lw/ccd4hm84s2h1v9bCy3KoEyxPMgnN:Dz7B3dp+P25/Avs2hTbSQPMgnsc
SpecialCode
TLSHT17E0123CDF3249434E5B628B296C046F8E1145EE1CBA602856F5AC057267AA0560B07CE
dbnsrl_legacy
insert-timestamp1751729291.1527596
mimetypeimage/png
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot