Gridinsoft Logo
File Icon

The gimp-2.10.exe (GNU Image Manipulation Program) File Analysis

Technical Analysis

File Name gimp-2.10.exe
File Type
PE32+ executable (GUI) x86-64, for MS Windows
Scanner Version 1.0.216.174
Database Version 2025-05-13 13:00:26 UTC

Clean File

No threats detected by our scanner

0%
Detection Rate
9,034,728
File Size (bytes)
2025-05-13
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
b17116499ac2e29e1e299f9aba415182
SHA1
f26fe547d7f4f125da36845e0e023e542c46850a
SHA256
714b40dd119827318d6e70bb4e38987366e9d6b219d7be9ef82181e60cfc3a11
SHA512
e72aa24a5739b9e1eab014018b3d8eb94d28008f1f3299f23f8003bcbd16dcc3512c479c82341896f8d9eb92a34d2064b02fe88b51f38332cd48d0fd3cdd32bf
ImpHash
081414a4b2cde22baa1193f6b9aa3baa

PE Analysis

Basic Information

Icon
Hash: cdd6aeef9d7ac0fda6d91c4b6307d1ef
Fuzzy: 0f3191bf1b758fbd88f20cb1e55c352a
dHash: 6c13713971938ef0
Image Base 0x140000000
Entry Point 0x1400013d0
Compilation Time 2024-05-03 13:50:35
Checksum 0x008a5311 (Actual: 0x008a5311)
OS Version 4.0
PEiD Signatures PE32+ executable (GUI) x86-64, for MS Windows
Digital Signature OK
Imports 37 libraries
Exports 2 functions
Resources 25 Resources
Sections 13 Sections

Version Information

CompanyName Spencer Kimball, Peter Mattis and the GIMP Development Team
FileDescription GNU Image Manipulation Program
FileVersion 2.10.38.0
InternalName gimp-2.10
OriginalFilename gimp-2.10.exe
ProductName GNU Image Manipulation Program
ProductVersion 2.10.38
LegalCopyright Copyright © 1995-2024
Translation 0x0409 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 4,502,440 bytes 4,502,528 bytes 6.23 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ A25A391D37C87DBF2EEFBBD772AA9E0E
.data 0x0044d000 13,152 bytes 13,312 bytes 3.18 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE E0C0FB0C296883E078A97A0A6EA56762
.rdata 0x00451000 3,562,560 bytes 3,563,008 bytes 3.32 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 4DB72F33DFE85409F89EE677734A05E7
.pdata 0x007b7000 176,748 bytes 177,152 bytes 6.34 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 74C7C50E07C708A6CDF2A7ED8AA7FA9A
.xdata 0x007e3000 199,084 bytes 199,168 bytes 4.61 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ F62008083234046B52036FE6CC4E35AF
.bss 0x00814000 64,192 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.edata 0x00824000 136 bytes 512 bytes 1.71 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 821C02FCB72438B8556F873DAFDF9858
.idata 0x00825000 143,020 bytes 143,360 bytes 4.89 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE AF40D5F1E8373EF1D316C334D8D662DA
.CRT 0x00848000 96 bytes 512 bytes 0.32 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 3F704880304BA551FD965E6D538E518F
.tls 0x00849000 16 bytes 512 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE BF619EAC0CDF3F68D496EA9344137E8B
.rsrc 0x0084a000 254,944 bytes 254,976 bytes 6.57 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D4BB6FDF3065FCD46590CEA664310C1E
.reloc 0x00889000 22,324 bytes 22,528 bytes 5.45 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 545AC80E3C8496282359C91DE0E1B65E
/4 0x0088f000 24 bytes 512 bytes 0.45 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 820A1FB37E4B6592F4B4DBAD80667B69
Entropy Analysis Alert

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 25 (252,359 bytes)
Resource Type Count Total Size Percentage
RT_ICON 21 249,975 bytes
99.1%
RT_GROUP_ICON 2 306 bytes
0.1%
RT_VERSION 1 880 bytes
0.3%
RT_MANIFEST 1 1,198 bytes
0.5%

Certificate Chain Analysis

Certificate Information
Product GNU Image Manipulation Program
Description GNU Image Manipulation Program
File Version 2.10.38.0
Original Name gimp-2.10.exe
Signing Date 04:40 PM 05/03/2024 (399 days ago)
Verification Status Signed
Signers Jernej Simončič; Certum Code Signing 2021 CA; Certum Trusted Network CA 2
Counter Signers Sectigo RSA Time Stamping Signer #4; Sectigo RSA Time Stamping CA; Sectigo
Internal Name gimp-2.10
Copyright Copyright © 1995-2024
Certificate Chain Summary
Jernej Simončič #1 Primary
Validity Period: 2024-02-29 06:22:15 → 2027-02-28 06:22:14
Signature Algorithm: sha256RSA
Serial Number: 04 C7 F0 B4 A0 58 C8 67 A8 17 49 52 55 7C FA 2F
Certum Code Signing 2021 CA #2 Chain
Validity Period: 2021-05-19 05:32:18 → 2036-05-18 05:32:18
Signature Algorithm: sha384RSA
Serial Number: 99 A3 80 0A 26 55 3B 65 AB DC 6E 84 A6 B3 EA 39
Sectigo RSA Time Stamping Signer #4 #3 Chain
Validity Period: 2023-05-03 00:00:00 → 2034-08-02 23:59:59
Signature Algorithm: sha384RSA
Serial Number: 39 4C 25 E1 7C A0 6D 27 A8 65 E2 3B D9 1D 22 D4
Sectigo RSA Time Stamping CA #4 Chain
Validity Period: 2019-05-02 00:00:00 → 2038-01-18 23:59:59
Signature Algorithm: sha384RSA
Serial Number: 30 0F 6F AC DD 66 98 74 7C A9 46 36 A7 78 2D B9

✓ This file has been digitally signed and the certificate chain has been verified

  • The signature ensures file integrity and authenticity from the publisher
  • Timestamping proves when the signature was applied
Certificate Verification Status

OK

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
This file passed all security checks, but stay vigilant. New malware variants appear daily that can evade detection. Always verify files come from official sources and check digital signatures when available.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware