Result for 06390EA2FB2CB253C51F18451020BA352CA263DD

Query result

Key Value
CRC329A17B553
FileNamegoogle-droid-sans-fonts-20120715-12.el7.noarch.rpm
FileSize2596832
MD52D403E64CC9DFED77252E2686D045E19
OpSystemCode{'MfgCode': '1006', 'OpSystemCode': '362', 'OpSystemName': 'TBD', 'OpSystemVersion': 'none'}
PackageArchnoarch
PackageDescription The Droid typeface family was designed in the fall of 2006 by Ascender's Steve Matteson, as a commission from Google to create a set of system fonts for its Android platform. The goal was to provide optimal quality and comfort on a mobile handset when rendered in application menus, web browsers and for other screen text. The family was later extended in collaboration with other designers such as Pascal Zoghbi of 29ArabicLetters. Droid Sans is a humanist sans serif typeface designed for user interfaces and electronic communication.
PackageMaintainerFedora Project
PackageNamegoogle-droid-sans-fonts
PackageRelease12.el7
PackageVersion20120715
ProductCode{'ApplicationType': 'Security', 'Language': 'English', 'MfgCode': '82000', 'OpSystemCode': '51', 'ProductCode': '202232', 'ProductName': 'Tenable Core Offline Update ', 'ProductVersion': '2019-Q1'}
SHA-106390EA2FB2CB253C51F18451020BA352CA263DD
SHA-256254065F9980F228BCED938150ECF3A2E0BF8E127EAEB285B57C9E2BCC576AB11
SpecialCode
dbnsrl_modern_rds
insert-timestamp1646980089.9561548
sourceNSRL
hashlookup:children-total20
hashlookup:trust50

Network graph view

Children (Total: 20)

The searched file hash includes 20 children files known and seen by metalookup. A sample is included below:

Key Value
CRC328DC273D4
FileName./usr/share/fonts/google-droid/DroidSansFallback.ttf
FileSize3838696
KnownMaliciousmalshare.com
MD5D97171CB16F2F25583B51BAF5E8936AA
OpSystemCode362
ProductCode17393
SHA-10DA957B8CA2E7535D991B04B46A62FB52D2D54E8
SHA-2568FE329BFCAB968760BE992F1550428821C5B3AC4B246BD60DD8C1F9B7E26E2A0
SSDEEP49152:Dy0JemPXY3OGV/TCEJBiaqpW0c4MDSc/F6b2QU6xyd:DNJ3u5LbSc/Vd
SpecialCode
TLSHT13E06D69671804AF95290BF7CD58182FDF1C9FD084F874A438FAE6D353873569A8A0DB2
dbnsrl_modern_rds
insert-timestamp1646982716.580892
sourceNSRL
tar:gnameroot
tar:unameroot
Key Value
CRC326CCEFF77
FileName./usr/share/appdata/google-droid-sans.metainfo.xml
FileSize253
MD52809D6783C668D9F4D6033B82C37661A
OpSystemCode362
ProductCode17393
SHA-11174A467CD5AEC4DB790AAB0716DDDAB90C3B2F7
SHA-256D61CED0A0DBA738984EA5BDB023A85F37DC07695D75771BD7A4A0954A34817FC
SSDEEP6:TMVBd/A4/5v7wIqHCCO27FRhALi/oghAL0wGyG:TMHdI4/5vMIqHCCOqFXALi/vAL0wGyG
SpecialCode
TLSHT190D05E42B5E29523E1C0D642ABB4FE0FA750B50948DB809075A48C91199659912966CA
dbnsrl_modern_rds
insert-timestamp1646984325.7815459
sourceNSRL
Key Value
CRC32EB1B0289
FileName./etc/fonts/conf.d/65-google-droid-sans.conf
FileSize58
MD56C5CC8907C5A8565B73F60112033702E
OpSystemCode362
ProductCode17393
SHA-121A449A7E361522CDCFFF98DBE159AEFAF399AEB
SHA-256FA93C7B9DDC772AF070684F2E1C28C4A700C0EBADB5A0A141E7AA5BB5F05DAE4
SSDEEP3:7vWLUCdQDLETlJIQCwIckDDn:C/dQkJH2DD
SpecialCode
TLSHT1AAA00217A1196D778941C451F14909411A4813D0719A6101E77468555654098538AB45
dbnsrl_modern_rds
insert-timestamp1646991133.1970122
sourceNSRL
Key Value
CRC32CD1BDD33
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans-Bold.ttf
FileSize194488
KnownMaliciousmalshare.com
MD53C0F650C88F1DD66ABF4E2D86B2789B8
OpSystemCode362
ProductCode228302
RDS:package_id280153
SHA-1560E4BCAFDEBAF29645FBF92633A2AE0D2F9801F
SHA-2562F529A3E60C007979D95D29794C3660694217FB882429FB33919D2245FE969E9
SHA-5128C7F3B9FC97E0789CE4CA1ECD95F3E75A67FFAECD1896373368B8924D740D3E930A10C133ED83E8A6D8160FADAFDA54400C12FEDC9A921B7263E1D0F73F63F81
SSDEEP3072:lcM77D0fhWtStY60Gn6JkXNUBUdUKHL4I1/Y04+GpZ:KJWYCNIBXSCGKHLa04+4Z
SpecialCode
TLSHT15A147C8E17021B96FBC261B58278F3D4470BB737067B8A0F78F91539548A2B55DB0BCA
dbnsrl_android
insert-timestamp1751758677.1538324
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32311B9C70
FileNameusr/share/fonts/droid-nonlatin/DroidSansArabic.ttf
FileSize35880
KnownMaliciousmalshare.com
MD57225B2564C779D0F0C61BD960B7B0337
OpSystemCode362
ProductCode17393
RDS:package_id263769
SHA-160810A8AF8BF69DDE15C66628D4BC10E3BDCF8A4
SHA-25673AEB7F633544FD3129CDB1E855B2F55071E10961319670D4459D5E54E103E7F
SSDEEP768:lCCsIumNOjFunLtusN/dmFZX6KnM/Jr3BlJlzzs+g:lCP7jwZusN/dmFZX6KnMhr3HD3G
SpecialCode
TLSHT1D3F24D87F712B268EC13BB74C55607923F23DC157F33630BBA226695D41B0899E71B16
dbnsrl_modern_rds
insert-timestamp1654971198.4383013
sourcemodern.db
tar:gnameroot
tar:unameroot
Key Value
CRC32D84190CB
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans.ttf
FileSize190776
KnownMaliciousmalshare.com
MD59E94DECF013D3E2C9ADCC0B97CC5CE44
OpSystemCode362
ProductCode237596
RDS:package_id280153
SHA-162F2841F61E4BE66A0303CD1567ED2D300B4E31C
SHA-256F51B88945F4C1B236F44B8D55A2D304316869127E95248C435C23F1E4142A7DB
SHA-5120AC4A03BD238DAF68E5F7BB8FF307A8098B839C4C6EDE94EB28AF5FC8D250905DA8A9C77CF9FA8946610E7290FE84B3273184DBF71F0148522384AAEE86143EC
SSDEEP3072:M+b3K4MO6bJa5Tvp1fRtLHRVAnNNaKvv4wKpZ:M+m9OgMxv3fRBHcnnaKvv4wcZ
SpecialCode
TLSHT15A147D8A570357D6F7C261BA8374F2D84B1AB733063B4A0F69F91639508D2B41DB0BDA
dbnsrl_android
insert-timestamp1751758711.7608585
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F1E6B097
FileNameusr/share/fonts/droid-nonlatin/DroidSansHebrew-Bold.ttf
FileSize30280
KnownMaliciousmalshare.com
MD50CEC10073AB3500D8793782204B930E0
OpSystemCode362
ProductCode210700
RDS:package_id267789
SHA-16E71C7637CD5854E62729F5D79805888BB244653
SHA-256673ECA014D73F9547409F6E6A617F8C86E075C45C62568E34260D4FC73C7ADC6
SSDEEP768:wDxsIzmSbFMRzviMGgUyDoqRthofxhNa/ebeS4s6Dj2px0I5XMtGi9a:w15bFMRzvhsqrhofxhgNsYIx0I5XMgD
SpecialCode
TLSHT1A4D2080BE792CD08F6624B78D66377524B3ABCD1B77B838B61F406079C653D41862EE2
dbnsrl_android
insert-timestamp1751736737.5272357
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32C75A725C
FileNameusr/share/fonts/droid-nonlatin/DroidSansEthiopic-Regular.ttf
FileSize227928
KnownMaliciousmalshare.com
MD504A82C3989EBEF8A1ACB321D5C594F1B
OpSystemCode362
ProductCode204743
RDS:package_id204742
SHA-1885BBCF16DAD157EBBA7F94B50F94E37270E21D5
SHA-256D4EB4A19AB52B2AF1C510A8CE4E88C961DD628394341B71793471A1E25FC3D3C
SSDEEP3072:2dePa/JC9hXg2/eC6khTOW42c6C2bVPkkmtmTe+1NjZtHOAF:2OaxCrw2/eW42c6CymtmTe+1dbt
SpecialCode
TLSHT156243C47B341FF22F947B0BFC95392640A5730D05BBB84893E7105EA95BAA0ECC5B893
dbnsrl_android
insert-timestamp1751659549.1821787
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3266283D5A
FileNameusr/share/fonts/droid-nonlatin/DroidSansArmenian.ttf
FileSize13856
KnownMaliciousmalshare.com
MD5A9FF88AA54AAC6FE4C7A8980E6465BD4
OpSystemCode362
ProductCode204743
RDS:package_id244546
SHA-1942FAB6918C0DC9BF59F62AB15E3FD38736BBE8D
SHA-256EE0C9FA146F0C01898EDA7923D951CF91F465E7D06CE73D24BEDF618AB001AA8
SSDEEP384:CroQCHKrRYSp3W8QteNf6ZG5M8WXnEFm3Ua:CroQIKrRhFGteNYG5MB3z
SpecialCode
TLSHT1AB52FB5F67A3AF37D7935F38CBB266740F16FF110716A24F84D8891121538C1E89A3A9
dbnsrl_android
insert-timestamp1751750854.992655
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC325D21D6D7
FileNameusr/share/fonts/droid-nonlatin/DroidSansTamil-Bold.ttf
FileSize36448
KnownMaliciousmalshare.com
MD53C46D647CF6350C24663903B6D4E558E
OpSystemCode362
ProductCode204740
RDS:package_id204740
SHA-198ACB109F0AFFB04E1D7189EA7D3B614B92D9CF4
SHA-256031700C9410D0C3ED31D5008F4FA756EC3D9A4567C74B8453A3F953C74C69CCE
SSDEEP768:bcEevw8iwSCaN/8mbGY3ozgQeFJoeZLNWDaCNkS0LIZcCLysbQmxBqsFdf7Qmswz:bcEevw8qCaNHiY3o03FJoeZLNWDaCNkU
SpecialCode
TLSHT1D2F24B6AE3A78F0BF7131774502163631AA9EE71BB33839F21085969EC8D5D0CF117A9
dbnsrl_android
insert-timestamp1751659545.6222646
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot