opera_1152_int_setup.exe

Opera Software ASA

This is a self-extracting archive and installer. The file has been seen being downloaded from get10.opera.com.
Publisher:
Opera Software ASA  (signed and verified)

MD5:
a9344c7dae27e4fa36f0f50aa1ad7a64

SHA-1:
d66909f037f55527a2f4c767313d8934f424f201

SHA-256:
9cc8e525ec6135ea193b0eab18a39c0c7243549231945935bc52d9fe9fa4d71a

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/27/2024 1:36:32 AM UTC  (today)

File size:
9.8 MB (10,313,416 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\opera_1152_int_setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/27/2010 3:00:00 AM

Valid to:
1/29/2013 2:59:59 AM

Subject:
CN=Opera Software ASA, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Opera Software ASA, S=Oslo, C=NO

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13C8351AECE71C731158980F575F4133

File PE Metadata
Compilation timestamp:
7/22/2007 5:33:09 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:Duthhfk+HRv5WZF43U4bWUGuCaIrOr0h3pqPzV3HQfkxRyCVYOExxpJ:DQhBkMTWZF43NbWUnC60h3I7VgGECVYb

Entry address:
0x11DE6

Entry point:
55, 8B, EC, 6A, FF, 68, E0, 49, 41, 00, 68, E0, 1D, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, 28, 41, 41, 00, 59, 83, 0D, 64, 97, 41, 00, FF, 83, 0D, 68, 97, 41, 00, FF, FF, 15, 2C, 41, 41, 00, 8B, 0D, 40, 93, 41, 00, 89, 08, FF, 15, 30, 41, 41, 00, 8B, 0D, 3C, 93, 41, 00, 89, 08, A1, 34, 41, 41, 00, 8B, 00, A3, 60, 97, 41, 00, E8, 1C, 01, 00, 00, 39, 1D, 90, 91, 41, 00, 75, 0C, 68, 6E, 1F, 41, 00, FF, 15, 38, 41...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
73 KB (74,752 bytes)

The file opera_1152_int_setup.exe has been seen being distributed by the following URL.