gimpressionist.exe

GNU Image Manipulation Program

Open Source Developer,Jernej Simončič

Publisher:
Spencer Kimball, Peter Mattis and the GIMP Development Team  (signed by Open Source Developer,Jernej Simončič)

Product:
GNU Image Manipulation Program

Description:
GNU Image Manipulation Program Plug-In

Version:
2.8.4.0

MD5:
38cc52d8cdfef95224740f873dd79380

SHA-1:
807282e9a89dd69d0c98f5061fda297e35c2efda

SHA-256:
e85bbd13eecca64ba1f1ffbdc35a49ae1a31d6f91f0dd23e614df8d8a70a741f

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/30/2024 10:29:57 AM UTC  (today)

File size:
143.9 KB (147,304 bytes)

Product version:
2.8.4

Copyright:
Copyright © 1995-2013

Original file name:
gimpressionist.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\gimp 2\lib\gimp\2.0\plug-ins\gimpressionist.exe

Digital Signature
Authority:
Unizeto Technologies S.A.

Valid from:
10/9/2012 4:53:26 AM

Valid to:
10/9/2013 4:53:26 AM

Subject:
E=jernej@ena.si, CN="Open Source Developer,Jernej Simončič", O=-, C=SI

Issuer:
CN=Certum Level III CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
4E0319B2D3551EAE211C0E6F8DF61828

File PE Metadata
Compilation timestamp:
2/6/2013 3:44:04 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
2.23

Entry address:
0x14B0

Entry point:
48, 83, EC, 28, C7, 05, 72, 1B, 02, 00, 01, 00, 00, 00, E8, 6D, 47, 01, 00, E8, B8, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 48, 83, EC, 28, C7, 05, 52, 1B, 02, 00, 00, 00, 00, 00, E8, 4D, 47, 01, 00, E8, 98, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 57, 56, 53, 48, 83, EC, 50, 48, C7, 44, 24, 48, 00, 00, 00, 00, 48, 89, CB, E8, 68, 27, 01, 00, 48, 83, 3D, 68, CB, 01, 00, 00, 48, 89, C7, 0F, 84, 79, 01, 00, 00, E8, 7A, 30, 01, 00, 48, 89, D9, 48, 89, C6, E8, 77, 30, 01, 00, 48, 89, F2, 48, 89, C1, E8...
 
[+]

Entropy:
6.1931

Code size:
88.5 KB (90,624 bytes)

Scan gimpressionist.exe - Powered by Reason Core Security