operation7.exe

The application operation7.exe has been detected as a potentially unwanted program by 21 anti-malware scanners. This is a setup program which is used to install the application. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.descarga-programas.com.
MD5:
6c3eb8a65d67a2d5fa28f40af726f0bc

SHA-1:
113a7a193736fffb333744851627864f5e0972e7

SHA-256:
475b018f18caf477197be2a7b95cee0ff5b4f3959f4bda04920440c173f0870b

Scanner detections:
21 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/26/2024 9:53:28 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.Adware
7.1.1

Avira AntiVirus
PUA/InstallCore.Gen
8.3.2.4

avast!
Win32:InstallCore-CF [PUP]
2014.9-160325

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.16325

Clam AntiVirus
Win.Trojan.Installcore-44
0.98/21511

Comodo Security
UnclassifiedMalware
23964

Dr.Web
Adware.InstallCore.54
9.0.1.085

ESET NOD32
Win32/InstallCore.Y potentially unwanted
10.12859

Fortinet FortiGate
W32/InstallCore.Y
3/25/2016

K7 AntiVirus
Trojan
13.212.18407

Malwarebytes
v2016.03.25.08

McAfee
Artemis!6C3EB8A65D67
5600.6450

NANO AntiVirus
Riskware.Win32.Downware.vqzba
1.0.14.5380

Qihoo 360 Security
HEUR/Malware.QVM20.Gen
1.0.0.1077

Reason Heuristics
PUP.InstallCore.ENG (M)
16.3.25.8

Rising Antivirus
PE:Malware.Generic(Thunder)!1.A1C4 [F]
23.00.65.16323

SUPERAntiSpyware
Adware.InstallCore
9244

Trend Micro House Call
TSPY_INSTALLCORE_BK080391.TOMC
7.2.85

Trend Micro
TSPY_INSTALLCORE_BK080391.TOMC
10.465.25

Vba32 AntiVirus
Adware.InstallCore.gen
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
46466

File size:
1.1 MB (1,129,592 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\operation7.exe

File PE Metadata
Compilation timestamp:
6/19/1992 5:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:zlCHqtAvNs1xN4Js9MXbzy9Y8/HaRkZrn45KLbRAYXaT9DVvCT:zlCoAFsXNjmXbzyu84kZr45KLbRAYKT6

Entry address:
0xC2290

Entry point:
55, 8B, EC, 83, C4, F0, B8, D8, 1B, 41, 00, E8, 42, DA, FF, FF, 8B, 44, 24, 08, 2B, C5, 8B, 54, 24, 04, 89, 42, 04, 8B, 35, E4, 35, 46, 00, EB, 3C, 8B, 5E, 08, 8B, 7E, 0C, 03, FB, 3B, EB, 76, 02, 8B, DD, 3B, 7C, 24, 08, 76, 04, 8B, 7C, 24, 08, 3B, FB, 76, 1E, 6A, 04, 68, 00, 10, 00, 00, 2B, FB, 57, 53, E8, 26, FC, FF, FF, 85, C0, 75, 0A, 8B, 44, 24, 04, 33, D2, 89, 10, EB, 0A, 8B, 36, 81, FE, E4, 35, 46, 00, 75, BC, 83, C4, 0C, 5D, 5F, 5E, 5B, C3, 8B, C0, 53, 56, 57, 55, 51, 8B, D8, 8B, F3, 81, C6, FF, 0F...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
788 KB (806,912 bytes)

The file operation7.exe has been seen being distributed by the following URL.

Remove operation7.exe - Powered by Reason Core Security