Result for 1126EB1317F0FD4A341C385D7BDA8DBA049A0C52

Query result

Key Value
MD5E55D8AE35B58EFF14794C8AC96F01CDB
PackageArchnoarch
PackageDescription The Droid font family was designed in the fall of 2006 by Ascenders Steve Matteson, as a commission from Google to create a set of system fonts for its Android platform. The goal was to provide optimal quality and comfort on a mobile handset when rendered in application menus, web browsers and for other screen text. The family was later extended in collaboration with other designers such as Pascal Zoghbi of 29ArabicLetters. Droid Sans is a humanist sans serif font family designed for user interfaces and electronic communication. The Arabic block was initially designed by Steve Matteson of Ascender under the Droid Kufi name, with consulting by Pascal Zoghbi of 29ArabicLetters to finalize the font family.
PackageMaintainerovitters <ovitters>
PackageNamegoogle-droid-sans-fonts
PackageRelease1.mga8
PackageVersion20200215
SHA-11126EB1317F0FD4A341C385D7BDA8DBA049A0C52
SHA-25658775F8D428C4EFF4C8BD4759B66D78C4D76E323891E1A57A3C3BB60F55CFC44
hashlookup:children-total21
hashlookup:trust50

Network graph view

Children (Total: 21)

The searched file hash includes 21 children files known and seen by metalookup. A sample is included below:

Key Value
CRC32CD1BDD33
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans-Bold.ttf
FileSize194488
KnownMaliciousmalshare.com
MD53C0F650C88F1DD66ABF4E2D86B2789B8
OpSystemCode362
ProductCode228302
RDS:package_id280153
SHA-1560E4BCAFDEBAF29645FBF92633A2AE0D2F9801F
SHA-2562F529A3E60C007979D95D29794C3660694217FB882429FB33919D2245FE969E9
SHA-5128C7F3B9FC97E0789CE4CA1ECD95F3E75A67FFAECD1896373368B8924D740D3E930A10C133ED83E8A6D8160FADAFDA54400C12FEDC9A921B7263E1D0F73F63F81
SSDEEP3072:lcM77D0fhWtStY60Gn6JkXNUBUdUKHL4I1/Y04+GpZ:KJWYCNIBXSCGKHLa04+4Z
SpecialCode
TLSHT15A147C8E17021B96FBC261B58278F3D4470BB737067B8A0F78F91539548A2B55DB0BCA
dbnsrl_android
insert-timestamp1751758677.1538324
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC324A6DDA47
FileNameusr/share/fonts/droid-nonlatin/DroidKufi-Bold.ttf
FileSize81220
KnownMaliciousmalshare.com
MD51B89EB34F74A02C0681727FAADF48466
OpSystemCode362
ProductCode233326
RDS:package_id263537
SHA-1590865ADD23D8C0B0DA1ED52BB453277D824E195
SHA-256B9699E2C12780E649D7541EA8713377B3A04663D778823CD252CD7FEEE4A2024
SSDEEP1536:hv6PX8mQnge1QF0hCjamoZtQZC+lsQ8YdXb3dTCWd0Cl/+5XvufNrpoJEhiYlZn6:Ppt6oZf+lsQ8YdXrdb+5fuFruuhiYn9c
SpecialCode
TLSHT1D5832A83E342DB2DE3527EF9CB6657513A776C24FF79428BDD62A3ACB1D35084460A02
dbnsrl_android
insert-timestamp1751756005.0933213
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32D84190CB
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans.ttf
FileSize190776
KnownMaliciousmalshare.com
MD59E94DECF013D3E2C9ADCC0B97CC5CE44
OpSystemCode362
ProductCode237596
RDS:package_id280153
SHA-162F2841F61E4BE66A0303CD1567ED2D300B4E31C
SHA-256F51B88945F4C1B236F44B8D55A2D304316869127E95248C435C23F1E4142A7DB
SHA-5120AC4A03BD238DAF68E5F7BB8FF307A8098B839C4C6EDE94EB28AF5FC8D250905DA8A9C77CF9FA8946610E7290FE84B3273184DBF71F0148522384AAEE86143EC
SSDEEP3072:M+b3K4MO6bJa5Tvp1fRtLHRVAnNNaKvv4wKpZ:M+m9OgMxv3fRBHcnnaKvv4wcZ
SpecialCode
TLSHT15A147D8A570357D6F7C261BA8374F2D84B1AB733063B4A0F69F91639508D2B41DB0BDA
dbnsrl_android
insert-timestamp1751758711.7608585
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F1E6B097
FileNameusr/share/fonts/droid-nonlatin/DroidSansHebrew-Bold.ttf
FileSize30280
KnownMaliciousmalshare.com
MD50CEC10073AB3500D8793782204B930E0
OpSystemCode362
ProductCode210700
RDS:package_id267789
SHA-16E71C7637CD5854E62729F5D79805888BB244653
SHA-256673ECA014D73F9547409F6E6A617F8C86E075C45C62568E34260D4FC73C7ADC6
SSDEEP768:wDxsIzmSbFMRzviMGgUyDoqRthofxhNa/ebeS4s6Dj2px0I5XMtGi9a:w15bFMRzvhsqrhofxhgNsYIx0I5XMgD
SpecialCode
TLSHT1A4D2080BE792CD08F6624B78D66377524B3ABCD1B77B838B61F406079C653D41862EE2
dbnsrl_android
insert-timestamp1751736737.5272357
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
FileName./etc/fonts/conf.d/65-google-droid-sans-fonts.conf
FileSize72
MD59AD171C18E2A20A56398729A109AFEC0
SHA-174374B0A82E8581828955ED47981DED3A14534FA
SHA-25638418672E712C74CD2FC91600AAAD3AE67315DCD4D5DAF95257EFD105C66E65D
SSDEEP3:gDGvWLUCdQDLETlJIQCwIckAKM1D:83/dQkJH2vM1D
TLSHT16CA0222BF0383C338A00C800F0080C002F080BE0320AAA80B33C083002A00AC038AB08
Key Value
CRC32732BD35F
FileNameusr/share/fonts/droid-nonlatin/DroidSansThai.ttf
FileSize35480
KnownMaliciousmalshare.com
MD559416BD6A6672DE4B1D253BE32A94E77
OpSystemCode362
ProductCode210700
RDS:package_id244546
SHA-1792F2B9EE2DCB2FEADC17500FCFC131A5B1CDAF4
SHA-256EF0194FF30B2C1A53873DE9E62044DA98AD4A7C6666B153D8B5C46727D9D0AD5
SSDEEP768:Gy5C8TsIumaLDJsMwYHSxMEXX8XFy4JrxQ+tpGr:Gy079e/YQ1XX8XFy4JrW
SpecialCode
TLSHT115F24D51FBC3BE3BDB92AD78C6B613701B2B983A3B27631E69501874D9B7404D490B53
dbnsrl_android
insert-timestamp1751750854.9981213
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32C75A725C
FileNameusr/share/fonts/droid-nonlatin/DroidSansEthiopic-Regular.ttf
FileSize227928
KnownMaliciousmalshare.com
MD504A82C3989EBEF8A1ACB321D5C594F1B
OpSystemCode362
ProductCode204743
RDS:package_id204742
SHA-1885BBCF16DAD157EBBA7F94B50F94E37270E21D5
SHA-256D4EB4A19AB52B2AF1C510A8CE4E88C961DD628394341B71793471A1E25FC3D3C
SSDEEP3072:2dePa/JC9hXg2/eC6khTOW42c6C2bVPkkmtmTe+1NjZtHOAF:2OaxCrw2/eW42c6CymtmTe+1dbt
SpecialCode
TLSHT156243C47B341FF22F947B0BFC95392640A5730D05BBB84893E7105EA95BAA0ECC5B893
dbnsrl_android
insert-timestamp1751659549.1821787
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3266283D5A
FileNameusr/share/fonts/droid-nonlatin/DroidSansArmenian.ttf
FileSize13856
KnownMaliciousmalshare.com
MD5A9FF88AA54AAC6FE4C7A8980E6465BD4
OpSystemCode362
ProductCode204743
RDS:package_id244546
SHA-1942FAB6918C0DC9BF59F62AB15E3FD38736BBE8D
SHA-256EE0C9FA146F0C01898EDA7923D951CF91F465E7D06CE73D24BEDF618AB001AA8
SSDEEP384:CroQCHKrRYSp3W8QteNf6ZG5M8WXnEFm3Ua:CroQIKrRhFGteNYG5MB3z
SpecialCode
TLSHT1AB52FB5F67A3AF37D7935F38CBB266740F16FF110716A24F84D8891121538C1E89A3A9
dbnsrl_android
insert-timestamp1751750854.992655
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC325D21D6D7
FileNameusr/share/fonts/droid-nonlatin/DroidSansTamil-Bold.ttf
FileSize36448
KnownMaliciousmalshare.com
MD53C46D647CF6350C24663903B6D4E558E
OpSystemCode362
ProductCode204740
RDS:package_id204740
SHA-198ACB109F0AFFB04E1D7189EA7D3B614B92D9CF4
SHA-256031700C9410D0C3ED31D5008F4FA756EC3D9A4567C74B8453A3F953C74C69CCE
SSDEEP768:bcEevw8iwSCaN/8mbGY3ozgQeFJoeZLNWDaCNkS0LIZcCLysbQmxBqsFdf7Qmswz:bcEevw8qCaNHiY3o03FJoeZLNWDaCNkU
SpecialCode
TLSHT1D2F24B6AE3A78F0BF7131774502163631AA9EE71BB33839F21085969EC8D5D0CF117A9
dbnsrl_android
insert-timestamp1751659545.6222646
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC320E80B90D
FileNameusr/share/fonts/droid-nonlatin/DroidSansEthiopic-Bold.ttf
FileSize222592
KnownMaliciousmalshare.com
MD533B9CC730CA8ECABFBF5DFBD69B2402E
OpSystemCode362
ProductCode183711
RDS:package_id263769
SHA-199D13029EA0AC0F448FFF24E4ED2D709B7D10BB0
SHA-2566CB21486C6EF7147F72097D15D706CB6AFF9420E2A0ACF8604127FF215A3DA8A
SSDEEP3072:b11iniEKbVe/Yg6DcRpYyWLNSpJs+fNIcw/j/9Nu3iZtHGhAF:p0iRJg6DcRp0wG+k/9ZbGW
SpecialCode
TLSHT185240A47F341FD36FA87A077C501A4A54A6331E107EB90C93E7106E998AB64ECC39AD7
dbnsrl_modern_rds
insert-timestamp1654971198.4310122
sourcemodern.db
tar:gnameroot
tar:unameroot