ancient-jewels.exe

Play Turtle, LLC

The application ancient-jewels.exe by Play Turtle has been detected as adware by 7 anti-malware scanners. This is a setup program which is used to install the application. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from installerlaunch-pp1.com.
Publisher:
Play Turtle, LLC  (signed and verified)

MD5:
f355265fda60247dd277a052455c36a7

SHA-1:
710063b73ee8dd447abdb1996bfae8e9179a1a6f

SHA-256:
ad810887728e47ef0216bd4311b8bc9459cde026c164f08f027766431fcc1601

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
12/26/2024 7:49:01 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Adware-gen [Adw]
160327-1

AVG
Adware InstallCore.LW
2015.0.4355

Dr.Web
Adware.InstallCore.22
9.0.1.05190

Emsisoft Anti-Malware
Application.InstallCore.AQ
11.5.0.6191

ESET NOD32
Win32/InstallCore.BP potentially unwanted application
7.0.302.0

F-Prot
W32/InstallCore.B.gen
4.6.5.141

Reason Heuristics
PUP.EpicPlay.PlayTurt (M)
16.4.8.15

File size:
521.1 KB (533,632 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\ancient-jewels.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/10/2011 12:00:00 AM

Valid to:
12/9/2012 11:59:59 PM

Subject:
CN="Play Turtle, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Play Turtle, LLC", L=Plantation, S=Florida, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1FBA05C4A16403C30CAF42A3523B1862

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:yUjvK/Y9bVy6eL1TptQydOdEnQdFg45pdnXvLf0vHUkl4nirzYvVj:1rVReLrOdEmC2970v0kl4ngON

Entry address:
0x106F10

Entry point:
60, BE, 00, 00, 49, 00, 8D, BE, 00, 10, F7, FF, C7, 87, 10, 77, 0C, 00, 47, 72, 3B, 23, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.8482

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
480 KB (491,520 bytes)

The file ancient-jewels.exe has been seen being distributed by the following URL.

Remove ancient-jewels.exe - Powered by Reason Core Security