Result for E44C66B65C4DE781544F5E071D59951614DE0CD7

Query result

Key Value
FileSize3037750
MD5AA649F318639D0AFD29CBA0806C46FC1
PackageDescriptionhandheld device font with extensive style and language support The Droid family of fonts consists of Droid Sans (Regular and Bold), Droid Sans Mono (Regular) and Droid Serif (Regular, Bold, Italic and BoldItalic). . Each contains extensive character set coverage including Western Europe, Eastern/Central Europe, Baltic, Cyrillic, Greek and Turkish support. The Droid Sans regular font also includes support for Arabic, Simplified and Traditional Chinese, Hebrew, Japanese, Korean and Thai. . Droid was designed by Ascender's Steve Matteson and hinted to provide optimal quality for screen text.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefonts-droid
PackageSectionfonts
PackageVersion1:4.3-3ubuntu1.2
SHA-1E44C66B65C4DE781544F5E071D59951614DE0CD7
SHA-256F05A38AE84FD30D372EC302EE94A916092E54E244E5018AA263514A73A157A23
hashlookup:children-total23
hashlookup:trust50

Network graph view

Children (Total: 23)

The searched file hash includes 23 children files known and seen by metalookup. A sample is included below:

Key Value
CRC32FA4F3856
FileNameusr/share/fonts/droid-nonlatin/DroidNaskh-Regular.ttf
FileSize89456
MD57DD126665934CB87EEE82454054602A0
OpSystemCode362
ProductCode204743
RDS:package_id204742
SHA-105881B74068771647F4215860161E47FBC902C23
SHA-25698D6735C3D52FD970241AFF50785A674B934C672CBFA83185269E89F2983408A
SHA-512327280AD4B977F9289AD971577FED1F5921730A433D6F364C7125B28FA3CD06371544E42705E43EC8AA77068975DBC6D01B3C5D4624CB6E41D9ABFE7BD2798F9
SSDEEP1536:imnEdC3DGwp1VDI4TOGye8stEfv3yQLJhEjommrqhZhikhvtd9eX5:IdmG47DNqGye16vCQVhEj/mrqnhikGX5
SpecialCode
TLSHT11F934C57F7538F1FE3116EB9DB222B406EAB2C30FB7A558BCE29428E70E77084554606
dbnsrl_android
insert-timestamp1751659549.1665258
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC321E4B2393
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsansmono/DroidSansMono.ttf
FileSize119380
KnownMaliciousmalshare.com
MD578C0DE8ABF66567262EE5E4E653FC11C
OpSystemCode362
ProductCode230096
RDS:package_id273013
SHA-1133FB6CF26EA073B456FB557B94CE8C46143B117
SHA-25612B552DE765DC1265D64F9F5566649930DDE4DBA07DA0251D9F92801E70A1047
SHA-512B109674D8FB6EBD0D040FF8EE9B65FB7183CE4D99A28D85ED8A7232852ADB7F9C050FF96546AD0814C5EF79511442333F214C34F5B9C66FB77092E32BC87E2F0
SSDEEP3072:B3CXpFV/JBpKNSZrYfe4i9VbxSYX3o4Cr:B3CZFV3INSYe4i99AYo4Q
SpecialCode
TLSHT1A5C37E0F8B136F19ED532FB5C7E12390DB65B808A306C31B668A57A375DF3905A84F29
dbnsrl_android
insert-timestamp1751761315.1404276
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC320F9E3C87
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Bold.ttf
FileSize185228
KnownMaliciousmalshare.com
MD53B6C3214B028DEBD9F175B63F71508E0
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1294FA99CEAF6077AB633B5A7C7DB761E2F76CF8C
SHA-256C746C6383A03EFFBCAD6CCB028E4B39E87071FF1A146A24FB2110A23E05776BB
SSDEEP3072:iSJZesxZ8IvIuUY+nrBDCMf4IETHhbsYd7UVViiFfW3SOGxL47ybJVu:ioZjjUYUBB3E7hbBQZW3exL4ebJVu
SpecialCode
TLSHT156048D5EA7022F25D692B674C3B4F3D01B2BB4056B07C61B3AE89A32598D158DFC4FC6
dbnsrl_android
insert-timestamp1751759277.7681499
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC3261CF55F6
FileName./usr/share/bug/ttf-staypuft/script
FileSize55
MD5672370EFCA8BFFA183E2828907E0365D
OpSystemCode362
ProductCode7576
RDS:package_id304063
SHA-12C397F31DB65AB66735B1606E59D0C9C9324271D
SHA-256E99B8BCE7D691CFD996BCC237A281EA98D34B40FC1563A70B8C4408769282DF0
SHA-51258A518B40F5E9BE4866B165E25A5F4923E60FFADD8170635F6EC05CB12C97D3B1A6A1A254410DB781EDB571A50D79F5D06987A608FB21E4ED10E350684757199
SSDEEP3:TKH4vrOGI9UXAaJwEeCh0n:hTOGNA4h0
SpecialCode
TLSHT1E5900276000D591AB58A0C24A7496FB04986659C190735D765066416D4D47473155706
dbnsrl_legacy
insert-timestamp1751766787.8397539
mimetypetext/x-shellscript
nsrl-sha256rds241-sha256.zip
sourceRDS_2025.03.1_android.db
Key Value
CRC321E22FE3B
FileName./etc/fonts/conf.avail/65-droid-sans-fallback.conf
FileSize313
MD5F55FCBB03EE96865FD3630FCF085E6C4
OpSystemCode362
ProductCode163576
RDS:package_id263769
SHA-143C4EE82AAE581B5F42CC760A48EB0E20444292B
SHA-256BEE6335012FC7F29DC4EED88124A056C4702F25A7A6651DFBB5A8A3FCB7F4A4D
SSDEEP6:TMVcqbcuLs2+WIWNYh9sYoKdMPdHHEWsAfpcE2l3UsYoKdMPdHHEWsAfpcxLn:TMuN2GPW89hCdRVBclEhCdRVBctn
SpecialCode
TLSHT15DE0CD2D29581F1431A48607B309359B49CEADFC85BF5007304B7D108C94BC939ED6CF
dbnsrl_modern_rds
insert-timestamp1654971661.6904445
sourcemodern.db
Key Value
CRC32D50EDEB5
FileNameusr/share/fonts/droid-nonlatin/DroidSansFallbackFull.ttf
FileSize4529044
MD5B572AFE5D10D92CB5D53E05EFAED26E1
OpSystemCode362
ProductCode238930
RDS:package_id280389
SHA-14A4A38D0DEA96CBEFD3FD4658B4DBEE77956C328
SHA-25697320619B0F1CE4A7CDA74CF064A0CE44EF3091287BC42755597E177CCCF94C2
SHA-512125B93D8B1A1AB81EBDF6FE472D61E69BE64FC0A4FFB9E74C50026E7385C1E1FF726A612A54A51B54E8245E714349251DE9EA6C7304BE1E1E083C3D04810B130
SSDEEP49152:OwRYJGk1Px93OGV/TCEJBiaqpW0c4MDSc/F6b2QU64zcGk6kOyk:AH1z5LbSc/qs
SpecialCode
TLSHT1CB26E69175814AA93250FF7DD58181FDF1CAFC0C4F824E4BCAAA7D7528335292CA4DBA
dbnsrl_android
insert-timestamp1751758360.87544
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32076F6DB1
FileNameusr/share/fonts/droid-nonlatin/DroidNaskh-Bold.ttf
FileSize92836
MD5635B94457BE6E71186A3C9C9C90673E6
OpSystemCode362
ProductCode183711
RDS:package_id263769
SHA-151B79738CED264878F289F93469FC56BDFB11748
SHA-2564E07D031ACB20F40A0F12DBFEE347641BD6BF24FD32AD02F9C22675264AB6F2B
SSDEEP1536:UzmKQ9Kw/C58bPrb85bi/16RjzXpP34ZgKJnDo7v08rFCLZhie0R05:UD8bPU5bi/1uzXpP349I08rsNhiQ5
SpecialCode
TLSHT122934C47F7538F5FE311AEB9CB622B816B5B2C20BB6696C7DE25928F71F33084454602
dbnsrl_modern_rds
insert-timestamp1654971198.403192
sourcemodern.db
tar:gnameroot
tar:unameroot
Key Value
CRC32CD1BDD33
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans-Bold.ttf
FileSize194488
KnownMaliciousmalshare.com
MD53C0F650C88F1DD66ABF4E2D86B2789B8
OpSystemCode362
ProductCode228302
RDS:package_id280153
SHA-1560E4BCAFDEBAF29645FBF92633A2AE0D2F9801F
SHA-2562F529A3E60C007979D95D29794C3660694217FB882429FB33919D2245FE969E9
SHA-5128C7F3B9FC97E0789CE4CA1ECD95F3E75A67FFAECD1896373368B8924D740D3E930A10C133ED83E8A6D8160FADAFDA54400C12FEDC9A921B7263E1D0F73F63F81
SSDEEP3072:lcM77D0fhWtStY60Gn6JkXNUBUdUKHL4I1/Y04+GpZ:KJWYCNIBXSCGKHLa04+4Z
SpecialCode
TLSHT15A147C8E17021B96FBC261B58278F3D4470BB737067B8A0F78F91539548A2B55DB0BCA
dbnsrl_android
insert-timestamp1751758677.1538324
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32D84190CB
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans.ttf
FileSize190776
KnownMaliciousmalshare.com
MD59E94DECF013D3E2C9ADCC0B97CC5CE44
OpSystemCode362
ProductCode237596
RDS:package_id280153
SHA-162F2841F61E4BE66A0303CD1567ED2D300B4E31C
SHA-256F51B88945F4C1B236F44B8D55A2D304316869127E95248C435C23F1E4142A7DB
SHA-5120AC4A03BD238DAF68E5F7BB8FF307A8098B839C4C6EDE94EB28AF5FC8D250905DA8A9C77CF9FA8946610E7290FE84B3273184DBF71F0148522384AAEE86143EC
SSDEEP3072:M+b3K4MO6bJa5Tvp1fRtLHRVAnNNaKvv4wKpZ:M+m9OgMxv3fRBHcnnaKvv4wcZ
SpecialCode
TLSHT15A147D8A570357D6F7C261BA8374F2D84B1AB733063B4A0F69F91639508D2B41DB0BDA
dbnsrl_android
insert-timestamp1751758711.7608585
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F1E6B097
FileNameusr/share/fonts/droid-nonlatin/DroidSansHebrew-Bold.ttf
FileSize30280
KnownMaliciousmalshare.com
MD50CEC10073AB3500D8793782204B930E0
OpSystemCode362
ProductCode210700
RDS:package_id267789
SHA-16E71C7637CD5854E62729F5D79805888BB244653
SHA-256673ECA014D73F9547409F6E6A617F8C86E075C45C62568E34260D4FC73C7ADC6
SSDEEP768:wDxsIzmSbFMRzviMGgUyDoqRthofxhNa/ebeS4s6Dj2px0I5XMtGi9a:w15bFMRzvhsqrhofxhgNsYIx0I5XMgD
SpecialCode
TLSHT1A4D2080BE792CD08F6624B78D66377524B3ABCD1B77B838B61F406079C653D41862EE2
dbnsrl_android
insert-timestamp1751736737.5272357
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot