cofvopjy.exe

The application cofvopjy.exe has been detected as a potentially unwanted program by 8 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Cofvopjy”. While running, it connects to the Internet address fm-dyn-111-95-240-46.fast.net.id on port 443.
MD5:
ea1e08901c3fe217cfc15d5865424ca4

SHA-1:
f7575b46bdd75fc08a8339f278ee62cbc6be1859

SHA-256:
525100c52ba7316188e5df1c92b66adbfae8a05a522a5223ebd7c7c85a5276d3

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
11/30/2024 7:59:00 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.209411
570

AhnLab V3 Security
PUP/Win32.Pennybee
2015.07.14

Arcabit
Trojan.Graftor.D33203
1.0.0.425

Bitdefender
Gen:Variant.Graftor.209411
1.0.20.975

Emsisoft Anti-Malware
Gen:Variant.Graftor.209411
8.15.07.14.04

F-Secure
Gen:Variant.Graftor.209411
11.2015-14-07_3

G Data
Gen:Variant.Graftor.209411
15.7.25

MicroWorld eScan
Gen:Variant.Graftor.209411
16.0.0.585

File size:
1.9 MB (2,020,864 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\shopperz12072015\cofvopjy.exe

File PE Metadata
Compilation timestamp:
7/13/2015 8:13:04 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:Df3d38SzFtxgvrYGnPtQtO2AT5cp/XTnpf6:b318SJ74YGFj25Ff

Entry address:
0x14C183

Entry point:
E8, F7, B5, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 38, 6C, 5D, 00, E8, 77, 1A, 00, 00, E8, 7E, 4F, 00, 00, 0F, B7, F0, 6A, 02, E8, C4, 42, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 93, 4E, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
1.5 MB (1,530,368 bytes)

Service
Display name:
Cofvopjy

Type:
Win32OwnProcess

Depends on:
RPCSS


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to userscloud.com  (188.213.242.146:443)

TCP (HTTP SSL):
Connects to fm-dyn-111-95-240-46.fast.net.id  (111.95.240.46:443)

Remove cofvopjy.exe - Powered by Reason Core Security