fruit-ninja.exe

Sweet Gamer LLC

The application fruit-ninja.exe by Sweet Gamer has been detected as a potentially unwanted program by 6 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from installerlaunch-gn1.com.
Publisher:
Sweet Gamer LLC  (signed and verified)

MD5:
4efbf5ed7faf5855578cf29aa6a58736

SHA-1:
7e00ab7a42f56ee8df920d5a09c50599044ea2c2

SHA-256:
12a5a56f39e0acb42dfd8451ba31c176116252a324ae10b569fdc2b95dc798d2

Scanner detections:
6 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/23/2024 7:08:09 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:InstallCore-GD [PUP]
160518-2

Dr.Web
Adware.InstallCore.72
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Strictor.101483
11.5.0.6191

ESET NOD32
Win32/InstallCore.AU potentially unwanted application
8.0.319.0

F-Prot
W32/InstallCore.P.gen
4.6.5.141

Reason Heuristics
PUP.installCore.SweetGam (M)
16.6.23.5

File size:
1.1 MB (1,106,264 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\My documents\downloads\fruit-ninja.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/11/2011 12:00:00 AM

Valid to:
12/10/2012 11:59:59 PM

Subject:
CN=Sweet Gamer LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Sweet Gamer LLC, L=Sunrise, S=Florida, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4621306F285D000FDDD0445E05FEEF1E

File PE Metadata
Compilation timestamp:
6/19/1992 4:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:XJuE5Painm9s+uQArEXRFttQatkCMerFO:XJr5Painm90EXRFtZwe

Entry address:
0xCA640

Entry point:
55, 8B, EC, 83, C4, F0, B8, 3C, C5, 41, 00, E8, 57, D9, FF, FF, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.9138

Developed / compiled with:
Microsoft Visual C++

Code size:
828 KB (847,872 bytes)

The file fruit-ninja.exe has been seen being distributed by the following URL.

Remove fruit-ninja.exe - Powered by Reason Core Security