How to Remove “compose.exe”

What is compose.exe?

compose.exe is a legitimate file process developed by Spencer Kimball, Peter Mattis and the GIMP Development Team. It is known as GNU Image Manipulation Program Plug-In and it belongs to GNU Image Manipulation Program. You can locate the file in C:\Program Files.

The virus is created by malware authors and is named after compose.exe file.

Affected Platforms: Windows OS

How to determine if your computer is infected with compose.exe malware?

Look out for these symptoms to check if your PC is infected with compose.exe malware:

  • Unstable internet connection
  • compose.exe occupies extra CPU space
  • PC processing speed slows down
  • Browser often redirects to irrelevant websites
  • Browser is bombarded with hordes of popup ads
  • Computer screen freezes repeatedly

Take the following steps to diagnose your PC for possible compose.exe malware attack:

Step 1: Simultaneously press CTRL+ALT+DEL keys to open Task Manager.

Step 2: If you notice the file located outside C:\Program Files, perform an antivirus scan to get rid of the malware.

How to remove compose.exe malware from system using Comodo Antivirus?

Step 1: Download our award-winning Free Antivirus

Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.

Step 3: Select Customize Configuration option and arrange installers, configuration, and file location.

Step 4: Restart your PC after the installation gets over

Step 5: Wait for Comodo Internet Security to update the antivirus.

Step 6: Proceed with the quick scan that automatically begins after the update.

Step 7: If threats are found during the scanning, you will be notified through an alert screen.

Step 8: Comodo Antivirus will remove compose.exe malware from your computer including all other malwares!

11

Malware Entries

First Seen: 02 May 2010 at 4:14 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable bb79f0eac5b2c4b5
456a2785b0ee696f
570bf6ad
808f82160f53e11d
e4c1d29145b5118f
Unclassified
Malware
No N/A N/A Internal Submission N/A
2 N/A Executable ac463a87ee43599d
1fd497c9a562f683
ca761599
4f01763985cb3e62
626c68f6cd06fe32
TrojWare.Win
32.Trojan.Ag
ent.Gen
No N/A N/A Internal Submission N/A
3 N/A Executable eac2bc5e620a8350
e32322d2c80c3470
adfeb170
f9e52b8c23248c8b
4156f742d40a88ad
Packed.Win32
.MUPX.Gen
No N/A N/A Russian Federation N/A
4 Spencer Kimball, Peter Mattis and the GIMP Development Team Executable 9c58a197fe9ccc48
3e2cf3c85559026d
dae52568
b678786bd8081dde
47f2391f6b3c4319
Virus.Win32.
Sality.gen
No 2.8.10.0 2.8.10 Poland N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
61

Safe Entries

First Seen: 09 March 2009 at 11:35 am
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 Spencer Kimball, Peter Mattis and the GIMP Development Team Executable 4553b90f2908de0d
7ae5b09c02ca2761
499e4a09
bfaece41bdc80435
28281895ca9626d8
No 2.7.5.0 2.7.5 United States
2 Spencer Kimball, Peter Mattis and the GIMP Development Team Executable cd5ec72352d3905a
8ec385f3a8c9c420
45ffb5eb
a0e301e671ec67d2
eb1b7659d571cad5
Yes 2.8.14.0 2.8.14 Poland
3 N/A Executable 1bdb31227469d0af
ae172156313fc9ef
5a99fcb6
f8fe40f597025b7e
2ff6e95d5c9ec18e
No N/A N/A Japan
4 N/A Executable 0d382f675a81bc1d
416b3ade8ec05175
f21e7b5e
38bd2b78731369be
29d9ba6d3ff1aaa1
No N/A N/A Internal Submission
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security