devil may cry 4 special edition. pc. codex...exe

The application devil may cry 4 special edition. pc. codex...exe has been detected as a potentially unwanted program by 5 anti-malware scanners. The file has been seen being downloaded from turbobitcdn5.com.
MD5:
20ac5bc638b7e84582398ccbd2d2c34b

SHA-1:
1fe85360590d54fcd46bb98b35de01a2adfd911f

SHA-256:
f60aea4a575c76c58f193ff13a79bc4e5875bcfa1b968226424d0b2e9f93116b

Scanner detections:
5 / 68

Status:
Potentially unwanted

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Analysis date:
11/28/2024 5:32:55 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Dropper-gen [Drp]
160518-2

Dr.Web
Trojan.Vittalia.11927
9.0.1.05190

Kaspersky
Trojan.Win32.Yakes
15.0.0.562

Microsoft Security Essentials
Threat.Undefined
1.223.968.0

Reason Heuristics
PUP.Vittalia.DB (M)
16.6.8.2

File size:
292 KB (299,008 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\devil may cry 4 special edition. pc. codex...exe

File PE Metadata
Compilation timestamp:
6/2/2016 3:56:23 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
3072:SdeBQe4DzX04D+mdj5iqB7bBviq03YyfadGK4J+yWPdYmjTv1FQDwXiT:SdeBQBDzXpdFRBHdLC0GJdVm3v7XiT

Entry address:
0x262D0

Entry point:
E8, 75, 80, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, EC, 61, 44, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 68, 47, 44, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, EC, 61, 44, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00...
 
[+]

Entropy:
5.3143

Code size:
231.5 KB (237,056 bytes)

The file devil may cry 4 special edition. pc. codex...exe has been seen being distributed by the following URL.