opera_1060_ru_setup.exe

Opera Software ASA

This is a self-extracting archive and installer. The file has been seen being downloaded from cs07.superfiles.me.
Publisher:
Opera Software ASA  (signed and verified)

MD5:
75d0a388009be51bc4169e1649978705

SHA-1:
3c743c7e646faa392413c829969ce2838ece1d0a

SHA-256:
b3211756e74ce4be6ee0aedf02d33337440fb46f67fca76443590b327cf71416

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/5/2024 4:42:10 AM UTC  (today)

File size:
10.4 MB (10,910,344 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\opera_1060_ru_setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/27/2010 2:00:00 AM

Valid to:
1/29/2013 1:59:59 AM

Subject:
CN=Opera Software ASA, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Opera Software ASA, S=Oslo, C=NO

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13C8351AECE71C731158980F575F4133

File PE Metadata
Compilation timestamp:
12/6/2007 10:35:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:WIKkW3U9enS3+rRWHEOTqCoiFu6GADsR1u8q/IvrNKD2UN5dnJ2eHzV2mvKg+qH3:WIKhU9entrRMVTqCwAYR1AWrNcJl0eVN

Entry address:
0x11FE4

Entry point:
55, 8B, EC, 6A, FF, 68, 80, 89, 41, 00, 68, 0C, 1F, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 88, 81, 41, 00, 33, D2, 8A, D4, 89, 15, E0, 02, 42, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, DC, 02, 42, 00, C1, E1, 08, 03, CA, 89, 0D, D8, 02, 42, 00, C1, E8, 10, A3, D4, 02, 42, 00, 6A, 01, E8, 96, 0E, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C3, 00, 00, 00, 59, E8, 48, 09, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B2, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
92 KB (94,208 bytes)

The file opera_1060_ru_setup.exe has been seen being distributed by the following URL.