nokia_care_suite_5_0_msi_setup.exe
ISfreemium
The file is a bundle distribution and utilizes the installCore download manager to distribute this potentially unwanted software. The application nokia_care_suite_5_0_msi_setup.exe by ISfreemium has been detected as adware by 9 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.windows8downloads.com and multiple other hosts.
File name:
nokia_care_suite_5_0_msi_setup.exe
MD5:
1f0f5ac79c6a24e8c69b402941f2f410
SHA-1:
e16b151670f921ae8ecfbd2d0f49d91ea81bb372
SHA-256:
22094557ad5c89033fa97908ba44a8b5f7bb0b4ae1c927e31491377cd2c6a73f
Scanner detections:
9 / 68
Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.
Analysis date:
11/23/2024 10:09:16 AM UTC (today)
Scan engine
Detection
Engine version
Boost by Reason
Adware.Installer.ISfreemium.EE
2013.7.27.1
Dr.Web
Adware.InstallCore.124
9.0.1.0329
ESET NOD32
Win32/InstallCore.CA.gen (variant)
7.8614
F-Prot
W32/InstallCore.R.gen
v6.4.7.1.166
K7 AntiVirus
Unwanted-Program
13.170.9117
McAfee
Artemis!1F0F5AC79C6A
5600.7270
Reason Heuristics
PUP.Installer.ISfreemium.EE
14.8.7.18
Trend Micro House Call
TROJ_GEN.F47V0726
7.2.208
VIPRE Antivirus
InstallCore.b
19914
File size:
617.8 KB (632,672 bytes)
File type:
Executable application (Win32 EXE)
Common path:
C:\users\{user}\downloads\nokia_care_suite_5_0_msi_setup.exe
Authority:
COMODO CA Limited
Valid from:
7/2/2013 5:00:00 PM
Valid to:
7/3/2014 4:59:59 PM
Subject:
CN=ISfreemium, O=ISfreemium, STREET=63 Rothschild 63 BV, L=Tel-Aviv, S=N/A, PostalCode=65785, C=IL
Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Serial number:
009B517CAF08AA1A85822DB0CE5E9169FE
Compilation timestamp:
6/19/1992 3:22:17 PM
Code size:
36 KB (36,864 bytes)
The file nokia_care_suite_5_0_msi_setup.exe has been seen being distributed by the following 2 URLs.