threshold-alpha.exe

GNU Image Manipulation Program

Jernej Simončič - Open Source Developer

Publisher:
Spencer Kimball, Peter Mattis and the GIMP Development Team  (signed by Jernej Simončič - Open Source Developer)

Product:
GNU Image Manipulation Program

Description:
GNU Image Manipulation Program Plug-In

Version:
2.8.0.0

MD5:
5a52476881fc778d3bc2e4187545febd

SHA-1:
1af560f3c90b9a1673492f8f6aaa48b54f839c34

SHA-256:
80dbd4afa55bf7835e50d4e9e0f5544b572932a5ef734209a28e08f40a00b782

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
5/2/2024 12:22:11 AM UTC  (today)

File size:
37.1 KB (38,032 bytes)

Product version:
2.8.0

Copyright:
Copyright © 1995-2012

Original file name:
threshold-alpha.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\gimp 2\lib\gimp\2.0\plug-ins\threshold-alpha.exe

Digital Signature
Authority:
Unizeto Technologies S.A.

Valid from:
10/12/2011 7:57:01 AM

Valid to:
10/11/2012 7:57:01 AM

Subject:
E=jernej@ena.si, CN=Jernej Simončič - Open Source Developer, O=Open Source Developer, C=SI

Issuer:
CN=Certum Level III CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
0172A7CF75BD61A461118DA260A5BD34

File PE Metadata
Compilation timestamp:
5/5/2012 3:24:28 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
2.22

Entry address:
0x14B0

Entry point:
48, 83, EC, 28, C7, 05, 02, 6C, 00, 00, 01, 00, 00, 00, E8, 6D, 1D, 00, 00, E8, B8, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 48, 83, EC, 28, C7, 05, E2, 6B, 00, 00, 00, 00, 00, 00, E8, 4D, 1D, 00, 00, E8, 98, FC, FF, FF, 90, 90, 48, 83, C4, 28, C3, 90, 57, 56, 53, 44, 89, C3, 83, EB, 01, 0F, 84, 91, 00, 00, 00, 41, 89, DA, 89, DF, 41, C1, EA, 04, 44, 89, D6, C1, E6, 04, 85, F6, 0F, 84, 8F, 00, 00, 00, 48, 8D, 41, 10, 83, FB, 0F, 4C, 8D, 5A, 10, 41, 0F, 97, C1, 48, 39, C2, 0F, 97, C0, 4C, 39, D9, 41, 0F...
 
[+]

Code size:
10.5 KB (10,752 bytes)

Scan threshold-alpha.exe - Powered by Reason Core Security