super-mario.exe

Play Turtle, LLC

The application super-mario.exe by Play Turtle has been detected as adware by 8 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Play Turtle, LLC  (signed and verified)

MD5:
59b7c738376028c0e7c52be25ef1b39c

SHA-1:
a145d302ebfe46e08fa22e4abe1096919f94460a

SHA-256:
286027e9ed861134ee26f4ec9efc93cd4ceaf5e069ca0812a14e1006412f3353

Scanner detections:
8 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/24/2024 1:21:14 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.InstallCore.AQ
5813571

avast!
Win32:Adware-gen [Adw]
160112-0

AVG
Adware InstallCore.LW
2015.0.4489

Emsisoft Anti-Malware
Application.InstallCore.AQ
10.0.0.5366

ESET NOD32
Win32/InstallCore.BP potentially unwanted application
7.0.302.0

Norman
Application.InstallCore.AQ
11.01.2016 17:30:26

Reason Heuristics
PUP.EpicPlay.PlayTurtle (M)
16.1.16.13

VIPRE Antivirus
Threat.4150696
46426

File size:
521.1 KB (533,632 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\super-mario.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/10/2011 12:00:00 AM

Valid to:
12/9/2012 11:59:59 PM

Subject:
CN="Play Turtle, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Play Turtle, LLC", L=Plantation, S=Florida, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1FBA05C4A16403C30CAF42A3523B1862

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:yUjvK/Y9bVy6eL1TptQydOdEnQdFg45pdnXvLf0vHUkl4nirzYvVj:1rVReLrOdEmC2970v0kl4ngON

Entry address:
0x106F10

Entry point:
60, BE, 00, 00, 49, 00, 8D, BE, 00, 10, F7, FF, C7, 87, 10, 77, 0C, 00, 47, 72, 3B, 23, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.8482

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
480 KB (491,520 bytes)

Remove super-mario.exe - Powered by Reason Core Security