Result for 4C2E7504A2A21345F8E3259D503B90E480F40C7A

Query result

Key Value
FileSize4313748
MD597F72C68735200F07EEC53CD2F7456C6
PackageDescriptionhandheld device font with extensive style and language support The Droid family of fonts consists of Droid Sans (Regular and Bold), Droid Sans Mono (Regular) and Droid Serif (Regular, Bold, Italic and BoldItalic). . Each contains extensive character set coverage including Western Europe, Eastern/Central Europe, Baltic, Cyrillic, Greek and Turkish support. The Droid Sans regular font also includes support for Arabic, Simplified and Traditional Chinese, Hebrew, Japanese, Korean and Thai. . Droid was designed by Ascender's Steve Matteson and hinted to provide optimal quality for screen text.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefonts-droid
PackageSectionfonts
PackageVersion20111207+git-1ubuntu1
SHA-14C2E7504A2A21345F8E3259D503B90E480F40C7A
SHA-2560E94DA7BCAE7AD672EB3FAE001F654E7C834558B94949ED918958F129D478FE9
hashlookup:children-total24
hashlookup:trust50

Network graph view

Children (Total: 24)

The searched file hash includes 24 children files known and seen by metalookup. A sample is included below:

Key Value
FileName./etc/fonts/conf.avail/65-droid-sans-fonts.conf
FileSize7695
MD5FD72BCA3218E0BD96E83FB21E4D73385
SHA-1099AF5AB62ED0EA2AE171E0962E8959E55F92E30
SHA-2566FCDDF3615FB196489E2BD0C484EC7A7AAC71501160C1965DB22DF6D638D6E80
SSDEEP96:oozwkaWgvqDvq2vquvqwvqdev4vJvhvlvLY:R
TLSHT1EDF1C8F645FAAA683D8495236BF8791A7E91D9BB017730E8F8CE36040F1B84701F3599
Key Value
CRC321E4B2393
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsansmono/DroidSansMono.ttf
FileSize119380
KnownMaliciousmalshare.com
MD578C0DE8ABF66567262EE5E4E653FC11C
OpSystemCode362
ProductCode230096
RDS:package_id273013
SHA-1133FB6CF26EA073B456FB557B94CE8C46143B117
SHA-25612B552DE765DC1265D64F9F5566649930DDE4DBA07DA0251D9F92801E70A1047
SHA-512B109674D8FB6EBD0D040FF8EE9B65FB7183CE4D99A28D85ED8A7232852ADB7F9C050FF96546AD0814C5EF79511442333F214C34F5B9C66FB77092E32BC87E2F0
SSDEEP3072:B3CXpFV/JBpKNSZrYfe4i9VbxSYX3o4Cr:B3CZFV3INSYe4i99AYo4Q
SpecialCode
TLSHT1A5C37E0F8B136F19ED532FB5C7E12390DB65B808A306C31B668A57A375DF3905A84F29
dbnsrl_android
insert-timestamp1751761315.1404276
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC328A569256
FileNameDroidNaskh-Bold.ttf
FileSize383016
MD5628EED6A13592D092E6B5130498D82C1
OpSystemCode362
ProductCode209432
RDS:package_id209432
SHA-11D2FEDBFB69BDC2E022DD5751715A0E68F34F99D
SHA-256C4BEDE56A29596754F317AAC3DA05E3792D8C9CD58CC5F8A85AAB1F1C335A142
SSDEEP6144:t/UkSVf0FUcrShqxWV+HnOJ+F6aFol+ZDlZGQ2oblBqnl1CNTsyF8BjTFoOARSUI:t8ku09rSoWSnOJ+F6aFol+ZDlZGQ2obi
SpecialCode
TLSHT1A784A74E5B6F06E195072BE142AF2D47363BB133194DA45CADA733BCD2A5FD81A2C213
dbnsrl_android
insert-timestamp1751663542.2122166
sourceRDS_2025.03.1_android.db
Key Value
CRC320F9E3C87
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Bold.ttf
FileSize185228
KnownMaliciousmalshare.com
MD53B6C3214B028DEBD9F175B63F71508E0
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1294FA99CEAF6077AB633B5A7C7DB761E2F76CF8C
SHA-256C746C6383A03EFFBCAD6CCB028E4B39E87071FF1A146A24FB2110A23E05776BB
SSDEEP3072:iSJZesxZ8IvIuUY+nrBDCMf4IETHhbsYd7UVViiFfW3SOGxL47ybJVu:ioZjjUYUBB3E7hbBQZW3exL4ebJVu
SpecialCode
TLSHT156048D5EA7022F25D692B674C3B4F3D01B2BB4056B07C61B3AE89A32598D158DFC4FC6
dbnsrl_android
insert-timestamp1751759277.7681499
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3261CF55F6
FileName./usr/share/bug/ttf-staypuft/script
FileSize55
MD5672370EFCA8BFFA183E2828907E0365D
OpSystemCode362
ProductCode7576
RDS:package_id304063
SHA-12C397F31DB65AB66735B1606E59D0C9C9324271D
SHA-256E99B8BCE7D691CFD996BCC237A281EA98D34B40FC1563A70B8C4408769282DF0
SHA-51258A518B40F5E9BE4866B165E25A5F4923E60FFADD8170635F6EC05CB12C97D3B1A6A1A254410DB781EDB571A50D79F5D06987A608FB21E4ED10E350684757199
SSDEEP3:TKH4vrOGI9UXAaJwEeCh0n:hTOGNA4h0
SpecialCode
TLSHT1E5900276000D591AB58A0C24A7496FB04986659C190735D765066416D4D47473155706
dbnsrl_legacy
insert-timestamp1751766787.8397539
mimetypetext/x-shellscript
nsrl-sha256rds241-sha256.zip
sourceRDS_2025.03.1_android.db
Key Value
CRC32CD1BDD33
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans-Bold.ttf
FileSize194488
KnownMaliciousmalshare.com
MD53C0F650C88F1DD66ABF4E2D86B2789B8
OpSystemCode362
ProductCode228302
RDS:package_id280153
SHA-1560E4BCAFDEBAF29645FBF92633A2AE0D2F9801F
SHA-2562F529A3E60C007979D95D29794C3660694217FB882429FB33919D2245FE969E9
SHA-5128C7F3B9FC97E0789CE4CA1ECD95F3E75A67FFAECD1896373368B8924D740D3E930A10C133ED83E8A6D8160FADAFDA54400C12FEDC9A921B7263E1D0F73F63F81
SSDEEP3072:lcM77D0fhWtStY60Gn6JkXNUBUdUKHL4I1/Y04+GpZ:KJWYCNIBXSCGKHLa04+4Z
SpecialCode
TLSHT15A147C8E17021B96FBC261B58278F3D4470BB737067B8A0F78F91539548A2B55DB0BCA
dbnsrl_android
insert-timestamp1751758677.1538324
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
FileName./usr/share/games/wesnoth/1.12/fonts/DroidSansFallbackFull.ttf
FileSize5300184
MD5CE43A69925354B4CA932496F1B9736E8
SHA-15D5585DB75D4AA85BA71FB433422C2A756C0C3D0
SHA-256EF275EB8CB6380DBF8C7A897A780D4132623519BE4EE17340FECD77F2A2C697A
SSDEEP49152:dETY/ah6g3OGV/TCEJBiaqpW0c4MDSc/F6b2QU6xy+BYJwfI96McoS5W25C9B1qF:dJ/aT5LbSc/VhJSIgMfQIpO+LkX
TLSHT12D36299175848EB95250FF7CD99182EEF18DFC088F824A43CEAE6D352C735196CA4DB2
tar:gnameroot
tar:unameroot
Key Value
CRC32D84190CB
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans.ttf
FileSize190776
KnownMaliciousmalshare.com
MD59E94DECF013D3E2C9ADCC0B97CC5CE44
OpSystemCode362
ProductCode237596
RDS:package_id280153
SHA-162F2841F61E4BE66A0303CD1567ED2D300B4E31C
SHA-256F51B88945F4C1B236F44B8D55A2D304316869127E95248C435C23F1E4142A7DB
SHA-5120AC4A03BD238DAF68E5F7BB8FF307A8098B839C4C6EDE94EB28AF5FC8D250905DA8A9C77CF9FA8946610E7290FE84B3273184DBF71F0148522384AAEE86143EC
SSDEEP3072:M+b3K4MO6bJa5Tvp1fRtLHRVAnNNaKvv4wKpZ:M+m9OgMxv3fRBHcnnaKvv4wcZ
SpecialCode
TLSHT15A147D8A570357D6F7C261BA8374F2D84B1AB733063B4A0F69F91639508D2B41DB0BDA
dbnsrl_android
insert-timestamp1751758711.7608585
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F1E6B097
FileNameusr/share/fonts/droid-nonlatin/DroidSansHebrew-Bold.ttf
FileSize30280
KnownMaliciousmalshare.com
MD50CEC10073AB3500D8793782204B930E0
OpSystemCode362
ProductCode210700
RDS:package_id267789
SHA-16E71C7637CD5854E62729F5D79805888BB244653
SHA-256673ECA014D73F9547409F6E6A617F8C86E075C45C62568E34260D4FC73C7ADC6
SSDEEP768:wDxsIzmSbFMRzviMGgUyDoqRthofxhNa/ebeS4s6Dj2px0I5XMtGi9a:w15bFMRzvhsqrhofxhgNsYIx0I5XMgD
SpecialCode
TLSHT1A4D2080BE792CD08F6624B78D66377524B3ABCD1B77B838B61F406079C653D41862EE2
dbnsrl_android
insert-timestamp1751736737.5272357
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32FC4DAA6A
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Regular.ttf
FileSize172916
KnownMaliciousmalshare.com
MD5E18165CE2B700B1B4DACA82E276FCAC5
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1805C5F975E02F488FA1DD1DD0D44ED4F93B0FAB4
SHA-256AE32140265DBE0DFDE24B9ABD222BE9210A531888F014FF9B2326ABA2D6FD777
SSDEEP3072:AIVimyEc4ealpgp9uQEB00KYlnrum5hF8wkEf3OnfZqPdkh4LybJVu:RirEc4eyDHuyFRPOcPdkh4ObJVu
SpecialCode
TLSHT1A6F39E0D77072F19E6E67A7AC3B8F2F4461AAC065B03852335E48A7314DE1A85FC4BD8
dbnsrl_android
insert-timestamp1751759277.9929862
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot