opera_next_15.0.1147.18_setup.exe

Opera Software ASA

This is a setup and installation application. The file has been seen being downloaded from cluster.online.ua.
Publisher:
Opera Software ASA  (signed and verified)

MD5:
ad9344ff02320c910542125295e81724

SHA-1:
6ce01aa2626f48764d1d99c57a1de94642801bd1

SHA-256:
70e74befce74d9ada5aade0c2b7d8af260ce6868dc333133ff500c2556ace496

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 1:49:20 PM UTC  (today)

File size:
24.3 MB (25,505,112 bytes)

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\opera_next_15.0.1147.18_setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/17/2013 1:00:00 AM

Valid to:
2/17/2016 12:59:59 AM

Subject:
CN=Opera Software ASA, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Opera Software ASA, L=Oslo, S=Oslo, C=NO

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
76952FFF53962455B352C661C2CA65E5

File PE Metadata
Compilation timestamp:
12/30/2012 9:49:43 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
786432:ogWPPWy1vj47dzVRV/+gN7cx8HBGN7fwss:ZWn5a/+gNgx8sxoF

Entry address:
0x12DCF

Entry point:
55, 8B, EC, 6A, FF, 68, 50, 5E, 41, 00, 68, 60, 2F, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, DC, 41, 41, 00, 59, 83, 0D, 84, A9, 41, 00, FF, 83, 0D, 88, A9, 41, 00, FF, FF, 15, E0, 41, 41, 00, 8B, 0D, 7C, 89, 41, 00, 89, 08, FF, 15, E4, 41, 41, 00, 8B, 0D, 78, 89, 41, 00, 89, 08, A1, E8, 41, 41, 00, 8B, 00, A3, 80, A9, 41, 00, E8, 1D, 01, 00, 00, 39, 1D, 50, 87, 41, 00, 75, 0C, 68, 58, 2F, 41, 00, FF, 15, EC, 41...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
74 KB (75,776 bytes)

The file opera_next_15.0.1147.18_setup.exe has been seen being distributed by the following URL.