Result for 276EFB4BB3D705A726CA589D570E17C5CFE8BF83

Query result

Key Value
FileNamegoogle-droid-fonts-20121204-3.3.1.noarch.rpm
FileSize3235988
MD5F71F089B5664338C56A3927DA463B365
PackageArchnoarch
PackageDescriptionThe Droid family of fonts consists of Droid Sans, Droid Sans Mono and Droid Serif. Each contains extensive character set coverage including Western Europe, Eastern/Central Europe, Baltic, Cyrillic, Greek and Turkish support. The Droid Sans regular font also includes support for Simplified and Traditional Chinese, Japanese and Korean support for the GB2312, Big 5, JIS 0208 and KSC 5601 character sets respectively. Droid was designed by Ascender's Steve Matteson to provide optimal quality and comfort on a mobile handset when rendered in application menus, web browsers and for other screen text. - Ascender Press Release, http://www.ascendercorp.com/pr/2007-11-12/
PackageMaintainerhttps://www.suse.com/
PackageNamegoogle-droid-fonts
PackageRelease3.3.1
PackageVersion20121204
RDS:package_id263809
SHA-1276EFB4BB3D705A726CA589D570E17C5CFE8BF83
SHA-25688673BDCE3CBEEA2EEA68F503F908B6A05F879E20B55CC0E47CBC916A937629A
insert-timestamp1654958800.7329192
sourcemodern.db
hashlookup:children-total27
hashlookup:trust50

Network graph view

Children (Total: 27)

The searched file hash includes 27 children files known and seen by metalookup. A sample is included below:

Key Value
CRC32FA4F3856
FileNameusr/share/fonts/droid-nonlatin/DroidNaskh-Regular.ttf
FileSize89456
MD57DD126665934CB87EEE82454054602A0
OpSystemCode362
ProductCode204743
RDS:package_id204742
SHA-105881B74068771647F4215860161E47FBC902C23
SHA-25698D6735C3D52FD970241AFF50785A674B934C672CBFA83185269E89F2983408A
SHA-512327280AD4B977F9289AD971577FED1F5921730A433D6F364C7125B28FA3CD06371544E42705E43EC8AA77068975DBC6D01B3C5D4624CB6E41D9ABFE7BD2798F9
SSDEEP1536:imnEdC3DGwp1VDI4TOGye8stEfv3yQLJhEjommrqhZhikhvtd9eX5:IdmG47DNqGye16vCQVhEj/mrqnhikGX5
SpecialCode
TLSHT11F934C57F7538F1FE3116EB9DB222B406EAB2C30FB7A558BCE29428E70E77084554606
dbnsrl_android
insert-timestamp1751659549.1665258
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC324CACAF14
FileNameDroidSansMono.ttf
FileSize108128
MD5A7E484743F6796F092CD859819CB5FC8
OpSystemCode362
ProductCode204019
RDS:package_id202730
SHA-10B75601F8EF8E111BABB6ED11DE6573F7178CE44
SHA-256DB19A1FDABA41CC4A2FEC0330E5C15E71C6DD68A3EF074F4F28268828B45C862
SSDEEP1536:zIFSR5OCpFVUwR0rJLG13yX49WpZrYX84i9NrbbGASYa4pQFFNstQV4CA:nXpFVrRplyo4ZrYX84i91bzSYtN84CA
SpecialCode
TLSHT1A0B36D0FDB131F19FA536B75C6E133E0DBA5B804A316D21B174A43A3B9DD3909AC4B29
dbnsrl_android
insert-timestamp1751712191.0209074
sourceRDS_2025.03.1_android.db
Key Value
CRC320F9E3C87
FileName./usr/share/texlive/texmf-dist/fonts/truetype/public/droid/DroidSerif-Bold.ttf
FileSize185228
KnownMaliciousmalshare.com
MD53B6C3214B028DEBD9F175B63F71508E0
OpSystemCode362
ProductCode223756
RDS:package_id280942
SHA-1294FA99CEAF6077AB633B5A7C7DB761E2F76CF8C
SHA-256C746C6383A03EFFBCAD6CCB028E4B39E87071FF1A146A24FB2110A23E05776BB
SSDEEP3072:iSJZesxZ8IvIuUY+nrBDCMf4IETHhbsYd7UVViiFfW3SOGxL47ybJVu:ioZjjUYUBB3E7hbBQZW3exL4ebJVu
SpecialCode
TLSHT156048D5EA7022F25D692B674C3B4F3D01B2BB4056B07C61B3AE89A32598D158DFC4FC6
dbnsrl_android
insert-timestamp1751759277.7681499
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC324AAEBBCD
FileNameusr/share/fonts/droid-nonlatin/DroidNaskh-Regular-SystemUI.ttf
FileSize111520
MD51F4E70DBE9B031925DFA4F98687E40BE
OpSystemCode362
ProductCode204743
RDS:package_id244546
SHA-13123B7374FD55FFD507DFF424025AEC0DCEA51D6
SHA-25620278A0F500A5F3D2DB4EFBE21F38D1CBB0CAE9BD8F712DE831E358C24F20D35
SSDEEP3072:5HQBu1RVLzrXM+04aNL8axYjZfC9zhi0h/6:5HQBu1RFv8+HaNLnxYd69z4
SpecialCode
TLSHT12EB34A63E3E3CF8EE3A12E34DF7522523BE7B9209577870FD812426DB5E71404864A62
dbnsrl_android
insert-timestamp1751750854.9992228
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32076F6DB1
FileNameusr/share/fonts/droid-nonlatin/DroidNaskh-Bold.ttf
FileSize92836
MD5635B94457BE6E71186A3C9C9C90673E6
OpSystemCode362
ProductCode183711
RDS:package_id263769
SHA-151B79738CED264878F289F93469FC56BDFB11748
SHA-2564E07D031ACB20F40A0F12DBFEE347641BD6BF24FD32AD02F9C22675264AB6F2B
SSDEEP1536:UzmKQ9Kw/C58bPrb85bi/16RjzXpP34ZgKJnDo7v08rFCLZhie0R05:UD8bPU5bi/1uzXpP349I08rsNhiQ5
SpecialCode
TLSHT122934C47F7538F5FE311AEB9CB622B816B5B2C20BB6696C7DE25928F71F33084454602
dbnsrl_modern_rds
insert-timestamp1654971198.403192
sourcemodern.db
tar:gnameroot
tar:unameroot
Key Value
CRC32CD1BDD33
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans-Bold.ttf
FileSize194488
KnownMaliciousmalshare.com
MD53C0F650C88F1DD66ABF4E2D86B2789B8
OpSystemCode362
ProductCode228302
RDS:package_id280153
SHA-1560E4BCAFDEBAF29645FBF92633A2AE0D2F9801F
SHA-2562F529A3E60C007979D95D29794C3660694217FB882429FB33919D2245FE969E9
SHA-5128C7F3B9FC97E0789CE4CA1ECD95F3E75A67FFAECD1896373368B8924D740D3E930A10C133ED83E8A6D8160FADAFDA54400C12FEDC9A921B7263E1D0F73F63F81
SSDEEP3072:lcM77D0fhWtStY60Gn6JkXNUBUdUKHL4I1/Y04+GpZ:KJWYCNIBXSCGKHLa04+4Z
SpecialCode
TLSHT15A147C8E17021B96FBC261B58278F3D4470BB737067B8A0F78F91539548A2B55DB0BCA
dbnsrl_android
insert-timestamp1751758677.1538324
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC324A6DDA47
FileNameusr/share/fonts/droid-nonlatin/DroidKufi-Bold.ttf
FileSize81220
KnownMaliciousmalshare.com
MD51B89EB34F74A02C0681727FAADF48466
OpSystemCode362
ProductCode233326
RDS:package_id263537
SHA-1590865ADD23D8C0B0DA1ED52BB453277D824E195
SHA-256B9699E2C12780E649D7541EA8713377B3A04663D778823CD252CD7FEEE4A2024
SSDEEP1536:hv6PX8mQnge1QF0hCjamoZtQZC+lsQ8YdXb3dTCWd0Cl/+5XvufNrpoJEhiYlZn6:Ppt6oZf+lsQ8YdXrdb+5fuFruuhiYn9c
SpecialCode
TLSHT1D5832A83E342DB2DE3527EF9CB6657513A776C24FF79428BDD62A3ACB1D35084460A02
dbnsrl_android
insert-timestamp1751756005.0933213
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32D84190CB
FileName./usr/share/texlive/texmf-dist/fonts/truetype/ascender/droid/droidsans/DroidSans.ttf
FileSize190776
KnownMaliciousmalshare.com
MD59E94DECF013D3E2C9ADCC0B97CC5CE44
OpSystemCode362
ProductCode237596
RDS:package_id280153
SHA-162F2841F61E4BE66A0303CD1567ED2D300B4E31C
SHA-256F51B88945F4C1B236F44B8D55A2D304316869127E95248C435C23F1E4142A7DB
SHA-5120AC4A03BD238DAF68E5F7BB8FF307A8098B839C4C6EDE94EB28AF5FC8D250905DA8A9C77CF9FA8946610E7290FE84B3273184DBF71F0148522384AAEE86143EC
SSDEEP3072:M+b3K4MO6bJa5Tvp1fRtLHRVAnNNaKvv4wKpZ:M+m9OgMxv3fRBHcnnaKvv4wcZ
SpecialCode
TLSHT15A147D8A570357D6F7C261BA8374F2D84B1AB733063B4A0F69F91639508D2B41DB0BDA
dbnsrl_android
insert-timestamp1751758711.7608585
mimetypefont/sfnt
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32F1E6B097
FileNameusr/share/fonts/droid-nonlatin/DroidSansHebrew-Bold.ttf
FileSize30280
KnownMaliciousmalshare.com
MD50CEC10073AB3500D8793782204B930E0
OpSystemCode362
ProductCode210700
RDS:package_id267789
SHA-16E71C7637CD5854E62729F5D79805888BB244653
SHA-256673ECA014D73F9547409F6E6A617F8C86E075C45C62568E34260D4FC73C7ADC6
SSDEEP768:wDxsIzmSbFMRzviMGgUyDoqRthofxhNa/ebeS4s6Dj2px0I5XMtGi9a:w15bFMRzvhsqrhofxhgNsYIx0I5XMgD
SpecialCode
TLSHT1A4D2080BE792CD08F6624B78D66377524B3ABCD1B77B838B61F406079C653D41862EE2
dbnsrl_android
insert-timestamp1751736737.5272357
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot
Key Value
CRC32732BD35F
FileNameusr/share/fonts/droid-nonlatin/DroidSansThai.ttf
FileSize35480
KnownMaliciousmalshare.com
MD559416BD6A6672DE4B1D253BE32A94E77
OpSystemCode362
ProductCode210700
RDS:package_id244546
SHA-1792F2B9EE2DCB2FEADC17500FCFC131A5B1CDAF4
SHA-256EF0194FF30B2C1A53873DE9E62044DA98AD4A7C6666B153D8B5C46727D9D0AD5
SSDEEP768:Gy5C8TsIumaLDJsMwYHSxMEXX8XFy4JrxQ+tpGr:Gy079e/YQ1XX8XFy4JrW
SpecialCode
TLSHT115F24D51FBC3BE3BDB92AD78C6B613701B2B983A3B27631E69501874D9B7404D490B53
dbnsrl_android
insert-timestamp1751750854.9981213
sourceRDS_2025.03.1_android.db
tar:gnameroot
tar:unameroot