chomp.exe

The executable chomp.exe has been detected as malware by 37 anti-virus scanners. It runs as a scheduled task under the Windows Task Scheduler named Popper triggered to execute each time a user logs in.
MD5:
8d91aff665ace47a69efd2715eb091d2

SHA-1:
3b69cc08a6521b235aab50b3327e33f9d425a011

SHA-256:
0d59a9098b28cd0090f53faaaae23ef82e31b5fe472e79613457cf6e176099a0

Scanner detections:
37 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/26/2024 11:07:39 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Virtob.Gen.12
958

Agnitum Outpost
Win32.Virut.AB.Gen
7.1.1

AhnLab V3 Security
Win32/Virut.F
2014.06.22

Avira AntiVirus
W32/Virut.Gen
7.11.30.172

avast!
Win32:Vitro
140617-1

AVG
Win32/Virut
2014.0.3972

Baidu Antivirus
Virus.Win32.Virut.$NBP
4.0.3.14622

Bitdefender
Win32.Virtob.Gen.12
1.0.20.865

Bkav FE
W32.Vetor.PE
1.3.0.4959

Dr.Web
Win32.Virut.56
9.0.1.05190

Emsisoft Anti-Malware
Win32.Virtob.Gen.12
8.14.06.22.06

ESET NOD32
Win32/Virut.NBP virus
7.0.302.0

Fortinet FortiGate
W32/Virut.CE
6/22/2014

F-Prot
W32/Virut.E.gen
4.6.5.141

F-Secure
Win32.Virtob.Gen.12
11.2014-22-06_1

G Data
Win32.Virtob.Gen.12
14.6.24

IKARUS anti.virus
Virus.Win32.Virut
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12484

Kaspersky
Virus.Win32.Virut
15.0.0.463

McAfee
W32/Virut.n.gen
5600.7092

Microsoft Security Essentials
Threat.Undefined
1.177.411.0

MicroWorld eScan
Win32.Virtob.Gen.12
15.0.0.519

NANO AntiVirus
Virus.Win32.Virut.hpeg
0.28.0.60253

Norman
Virut.HL
11.20140622

nProtect
Virus/W32.Virut.Gen
14.06.22.01

Panda Antivirus
W32/Sality.AO
14.06.22.06

Qihoo 360 Security
Virus.Win32.Virut.M
1.0.0.1015

Quick Heal
W32.Virut.G
6.14.14.00

Rising Antivirus
PE:Win32.Virut.ec!1608462
23.00.65.14620

Sophos
W32/Scribble-B
4.98

Total Defense
Win32/Virut.17408
37.0.11014

Trend Micro House Call
PE_VIRUX.R
7.2.173

Trend Micro
PE_VIRUX.R
10.465.22

Vba32 AntiVirus
Virus.Virut.14
3.12.26.3

VIPRE Antivirus
Threat.410756
29708

ViRobot
Win32.Virut.AM
2011.4.7.4223

Zillya! Antivirus
Virus.Virut.Win32.1938
2.0.0.1833

File size:
261 KB (267,264 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\diag\chomp.exe

File PE Metadata
Compilation timestamp:
11/29/2010 8:59:13 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:XhDgNyq2u10N/6MuapoCykQ7Q7DD+HJWsoBfKlkESLUGZfV5feFT+n:X1u10NSlamQb+p0fKlFSrjMs

Entry address:
0x41D2E

Entry point:
83, 3C, 24, FE, 8B, E4, 77, FE, 8D, 64, 24, CC, 83, F9, 31, 60, 86, D2, 83, EC, DC, F7, D1, E8, F4, 00, 00, 00, 4B, 66, 4B, 75, FC, F6, C4, 6D, 42, FF, 73, 3C, 59, 86, D2, 81, E9, FD, FF, FF, 7F, 0F, 83, E5, FF, FF, FF, 90, 81, D9, E6, 13, 00, 00, 71, DC, F6, D6, 8D, 31, 80, DC, 8A, FF, B4, 19, E4, 13, 00, 80, 83, C4, 04, 66, 81, 44, 24, FC, B0, BA, 75, C2, 8B, F5, F6, D1, 68, C5, B7, D0, FC, B4, CB, E8, CE, 00, 00, 00, 89, 74, 24, 44, E8, 2D, FF, FF, FF, 87, D7, 90, 89, 44, 24, 34, 83, E8, 04, 90, 87, D6...
 
[+]

Entropy:
6.7756

Code size:
164.5 KB (168,448 bytes)

Scheduled Task
Task name:
Popper

Trigger:
Logon (Runs on logon)


Remove chomp.exe - Powered by Reason Core Security