Result for 03F1D9A406B6D993F0C299E168FAA4FC771DEBFE

Query result

Key Value
MD5F3B1284353AE91EAFEA43A45BB8124EB
PackageArchnoarch
PackageDescription The Droid typeface family was designed in the fall of 2006 by Ascender's Steve Matteson, as a commission from Google to create a set of system fonts for its Android platform. The goal was to provide optimal quality and comfort on a mobile handset when rendered in application menus, web browsers and for other screen text. The family was later extended in collaboration with other designers such as Pascal Zoghbi of 29ArabicLetters. Droid Serif is a contemporary serif typeface family designed for comfortable reading on screen. Droid Serif is slightly condensed to maximize the amount of text displayed on small screens. Vertical stress and open forms contribute to its readability while its proportion and overall design complement its companion Droid Sans. The Arabic block was designed by Pascal Zoghbi of 29ArabicLetters under the Droid Naskh name.
PackageMaintainerFedora Project
PackageNamegoogle-droid-serif-fonts
PackageRelease8.fc22
PackageVersion20120715
SHA-103F1D9A406B6D993F0C299E168FAA4FC771DEBFE
SHA-256CB8115EEBFFE977E8E91B948F78C5DE42BFF932D0B24EA91519DBB756A82052F
hashlookup:children-total11
hashlookup:trust50

Network graph view

Children (Total: 11)

The searched file hash includes 11 children files known and seen by metalookup. A sample is included below:

Key Value
CRC32E82808BF
FileName./usr/share/xbmc/addons/skin.confluence/fonts/NOTICE.txt
FileSize10695
KnownMaliciousmalshare.com
MD59645F39E9DB895A4AA6E02CB57294595
OpSystemCode362
ProductCode17075
RDS:package_id202812
SHA-199F19B0797783BE8EAA32D67553B20AB343A2085
SHA-25638751245389E1E23F73E6F5384B5CBE7FA972CC4410C5ADC9C04B082A0B9561A
SHA-512AF15F175FAE59C230152639D481C2960F9122D7494B7B687499E1AE1C98A9DF2F347E410724895C1BB3FF18EDC3B2F9035B56E876A98BA97CBB3BAB674D0C65E
SSDEEP192:lbHbH5U6G5KXSD9VYUKhu1JVF9hFGvV/QiGkS594drFjuHYx5dvTrLhX:lbHe9vlKM1zJlFvmNz5VrR
SpecialCode
TLSHT1CF22523FBB48037716C201A2B78764CBF21E903F3B552568314CD1681F6B96593FB6AA
dbnsrl_legacy
insert-timestamp1751710256.7982275
mimetypetext/plain
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3205E972FF
FileName./usr/share/fontconfig/conf.avail/65-google-droid-serif.conf
FileSize1432
MD57DB18CF9DF70EE41FBAB444C80117EC6
OpSystemCode362
ProductCode163702
SHA-11476E92DFE36F6917545DD193971A16D3F343AF8
SHA-256311C79E55FC58E83F066377393E59865518DCBE09B51E5FE3459B69FBAC3B6AF
SSDEEP24:2dbnnvj9vgurI9XengfhLrb5CX2+yJX2+tam22RDOam/Mt:cbnnL9vguU9ungJLf5qgomhdRm/I
SpecialCode
TLSHT12621EAF555F546803A80A617B7B47E477EA0DEAB50B770E5B4CE3A004F9E98301B3359
dbnsrl_modern_rds
insert-timestamp1646985620.5233574
sourceNSRL
tar:gnameroot
tar:unameroot
Key Value
CRC32FC4DAA6A
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Regular.ttf
FileSize172916
KnownMaliciousmalshare.com
MD5E18165CE2B700B1B4DACA82E276FCAC5
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1805C5F975E02F488FA1DD1DD0D44ED4F93B0FAB4
SHA-256AE32140265DBE0DFDE24B9ABD222BE9210A531888F014FF9B2326ABA2D6FD777
SSDEEP3072:AIVimyEc4ealpgp9uQEB00KYlnrum5hF8wkEf3OnfZqPdkh4LybJVu:RirEc4eyDHuyFRPOcPdkh4ObJVu
SpecialCode
TLSHT1A6F39E0D77072F19E6E67A7AC3B8F2F4461AAC065B03852335E48A7314DE1A85FC4BD8
dbnsrl_android
insert-timestamp1751759277.9929862
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC320F9E3C87
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Bold.ttf
FileSize185228
KnownMaliciousmalshare.com
MD53B6C3214B028DEBD9F175B63F71508E0
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1294FA99CEAF6077AB633B5A7C7DB761E2F76CF8C
SHA-256C746C6383A03EFFBCAD6CCB028E4B39E87071FF1A146A24FB2110A23E05776BB
SSDEEP3072:iSJZesxZ8IvIuUY+nrBDCMf4IETHhbsYd7UVViiFfW3SOGxL47ybJVu:ioZjjUYUBB3E7hbBQZW3exL4ebJVu
SpecialCode
TLSHT156048D5EA7022F25D692B674C3B4F3D01B2BB4056B07C61B3AE89A32598D158DFC4FC6
dbnsrl_android
insert-timestamp1751759277.7681499
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC328A9C5149
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Italic.ttf
FileSize177560
KnownMaliciousmalshare.com
MD51262AD9A9F243EF2E7C80C0BB5F0060D
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1BDD8AAD5E6AC546D11E7378BDFABEAC7CCBDADFC
SHA-25602C0108DEA583E393FBCBEC39C7093E9A3095A09D65E37FAFFF9A9B7A89123A4
SSDEEP3072:9sIQKPhrrz85GRmS4UJoBiY89AFi09mGotPcKmnnsr41ybJYt:9sIQ0FmPUmBiY8UijtPc1n04EbJYt
SpecialCode
TLSHT186048E1EA7016F26E9E5367AC730F3F04627B817EA139B1E7AF5027598991E85E40FC0
dbnsrl_android
insert-timestamp1751759277.7669547
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3297AFF6F0
FileName./etc/fonts/conf.d/65-google-droid-serif.conf
FileSize59
MD5393D917BD32E768DE6EBEF4D2FEF4A1A
OpSystemCode362
ProductCode17393
SHA-1DFDED1E75DB933FAE0D9BE9DC76F4E64D9E67C90
SHA-2562FC566E3F7FF6BCD9B0584AFBAF96B75334EF13FFEF55B6D9046DED7138C8FA8
SSDEEP3:7vWLUCdQDLETlJIQCwIckrLdLD:C/dQkJH2rLN
SpecialCode
TLSHT149A02203E0002FB38800C020F00B2C000A0C03C0202C2200A3A008008000080030AB02
dbnsrl_modern_rds
insert-timestamp1647059706.2628415
sourceNSRL
Key Value
CRC3252953D43
FileName./usr/share/fonts/google-droid/DroidNaskh-Bold.ttf
FileSize94620
KnownMaliciousmalshare.com
MD50968720CD2BFEB792DA963C918C4B9A6
OpSystemCode362
ProductCode17393
SHA-155E22B2E04690AFAFC1F8C186F0CD06F8F24F1E2
SHA-256D4649FD5DBE3B8C1D334373EBDD6C587ED2C4B613BC1AF998463A23205CDEFAF
SSDEEP1536:cRmmUmapMb/rTlK5750H3FKJbkSDBdp1oHBxmWi3fANO6J3rHJxfUcrS/ZhiH2+g:cAMb/lK5750H3F2kSDBdp1oHBxmWi3fp
SpecialCode
TLSHT1CC934C87D7539F0FE311AEB9CB622B417A672C20B7B696CBDE19928F71F33484454602
dbnsrl_modern_rds
insert-timestamp1647009970.954902
sourceNSRL
tar:gnameroot
tar:unameroot
Key Value
CRC32447B82A6
FileName./usr/share/appdata/google-droid-serif.metainfo.xml
FileSize254
MD555D3825B30E375CB7E103FB2994C5293
OpSystemCode362
ProductCode17393
SHA-1DA174303928655D729136B77B6B8E2F9C62CB772
SHA-256F09DF1344100D131399C23628DAA4DF4B42D4414EAA28F73DFC762AE9C274A2C
SSDEEP6:TMVBd/A4/5v7wIqHCCO2rZ9dFRhALi/oghAL0wGyG:TMHdI4/5vMIqHCCOwdFXALi/vAL0wGyG
SpecialCode
TLSHT181D05E42B5E28263E1C0D242ABB5FE0FA750B50958DF409076A48C9169D559912966CA
dbnsrl_modern_rds
insert-timestamp1647056791.3919032
sourceNSRL
Key Value
CRC32529A771C
FileNameDroidNaskh-Regular.ttf
FileSize91340
KnownMaliciousmalshare.com
MD5791F577DDC8E608EF0D842D070BCAC23
OpSystemCode362
ProductCode236301
RDS:package_id245458
SHA-152598A6494F0A62D2A9CF0BC280A676C7262A2C4
SHA-2565F8A99466DB9566C5248677741870B3D15C678D9C6E53BF803BC908063F0848B
SSDEEP1536:gmEo+q3b+A5NNroI7muy/+cENEXvHyHJlZ5c7R6eWrCxphi2e4uziH2us:T+e+Yrr1Kuy/+N6vSHJP5c7RNWrCXhiZ
SpecialCode
TLSHT168935D97D7538B1FE311AEB9CB122B416DB72C20F7BA968BCE29428E30F77084454716
dbnsrl_android
insert-timestamp1751752769.6845205
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F5DEAE68
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-BoldItalic.ttf
FileSize190304
KnownMaliciousmalshare.com
MD51F5DC2BF62705A7D09533B1538C9C173
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1B7F2D37C3A062BE671774FF52F4FD95CBEF813CE
SHA-2561ABA99421B31AFE890182663270C28BC619F00D8746234DA3DDA054CD5BF09B0
SSDEEP3072:Qsoij4exRRzvzlpW7NrpyTorMc+5gBJF/kwqAPBi7HSMF/Z34qybJYt:MUbzvjgNlIEfs1AYDSMF/Z34XbJYt
SpecialCode
TLSHT162046D0E93023B26D5E275B9C374F3E04B2B7816A703852A7AB45671B9F919C9DD0FC2
dbnsrl_android
insert-timestamp1751759277.7623222
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3210BAB8E4
FileName./usr/share/xbmc/addons/skin.confluence/fonts/README.txt
FileSize692
KnownMaliciousmalshare.com
MD583544262A86F1F1EC761E75897DF92BC
OpSystemCode362
ProductCode17075
RDS:package_id271027
SHA-1CA43E37F59DDE52C5FD4BFCC172237BD0B443262
SHA-256C8B88077052FED912B3F724C0ED230C501CF4E18833AF7CA44338D3CD0B093E2
SSDEEP12:OI4IEGMFj27bYCQSsU0E+9o/HQknd7Gps2ERGkf4mXfNy:f4Ipn1sU0E+4HQk1Gps2ZmVy
SpecialCode
TLSHT18E01CB393A80A77317C0819A7F1F98CB924AD198394F4799241DC199073912E46F82E0
dbnsrl_legacy
insert-timestamp1751740150.735279
sourceRDS_2025.03.1_android.db
tar:gnamebin
tar:unameroot