help.exe

GNU Image Manipulation Program

Open Source Developer, Jernej Simončič

Publisher:
Spencer Kimball, Peter Mattis and the GIMP Development Team  (signed by Open Source Developer, Jernej Simončič)

Product:
GNU Image Manipulation Program

Description:
GNU Image Manipulation Program Plug-In

Version:
2.8.16.0

MD5:
0a2b24ee8835e901954efada662c38ba

SHA-1:
5d0c1ed3d5a3b244abd5b3163f9243139925dd36

SHA-256:
49e049b8e84c605b1971f2226fd9d840547e6609380fdbbdf9cc76fa62e438ea

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/23/2024 12:09:58 PM UTC  (today)

File size:
45.1 KB (46,176 bytes)

Product version:
2.8.16

Copyright:
Copyright © 1995-2015

Original file name:
help.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\gimp 2\lib\gimp\2.0\plug-ins\help.exe

Digital Signature
Authority:
Unizeto Technologies S.A.

Valid from:
8/4/2015 1:00:08 AM

Valid to:
8/3/2016 1:00:08 AM

Subject:
E=jernej|s-os@eternallybored.org, CN="Open Source Developer, Jernej Simončič", O=Open Source Developer, C=SI

Issuer:
CN=Certum Level III CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
62AB3B7382E25B5D63AD773503D963B1

File PE Metadata
Compilation timestamp:
4/5/1971 11:08:00 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x14D0

Entry point:
48, 83, EC, 28, 48, 8B, 05, 15, 5A, 00, 00, C7, 00, 01, 00, 00, 00, E8, 2A, 1D, 00, 00, E8, C5, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 66, 66, 66, 66, 66, 2E, 0F, 1F, 84, 00, 00, 00, 00, 00, 48, 83, EC, 28, 48, 8B, 05, E5, 59, 00, 00, C7, 00, 00, 00, 00, 00, E8, FA, 1C, 00, 00, E8, 95, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 90, 57, 56, 53, 48, 83, EC, 70, 4C, 89, C3, 4C, 89, CE, 89, D7, E8, 74, 19, 00, 00, 48, 8D, 0D, B5, 4A, 00, 00, 48, 89, C2, E8, FD...
 
[+]

Entropy:
5.8276

Code size:
14 KB (14,336 bytes)

Scan help.exe - Powered by Reason Core Security