The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the Config.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Configuration Utility for Intersil driver or Firefox or Starcraft belongs to software Firefox or Starcraft or Wireless LAN PC Card by Neesus Datacom (www.neesus.com) or Mozilla (www.mozilla.org) or www.guangsu.cn.
Description: Config.exe is not essential for Windows and will often cause problems. The file Config.exe is located in a subfolder of "C:\Program Files".
Known file sizes on Windows 10/8/7/XP are 290,816 bytes (71% of all occurrences), 1,861,064 bytes or 908,248 bytes.
The program is loaded during the Windows boot process (see Registry key: MACHINE\User Shell Folders, Run, MACHINE\Run, MACHINE\RunServices, User Shell Folders). It is not a Windows core file. It is a file with no information about its developer. The program has no visible window. Config.exe is able to record keyboard and mouse inputs, monitor applications and manipulate other programs. Therefore the technical security rating is 49% dangerous, however you should also read the user reviews.
Recommended: Identify Config.exe related errors
If Config.exe is located in a subfolder of the user's profile folder, the security rating is 68% dangerous. The file size is 94,208 bytes (50% of all occurrences) or 943,117 bytes. The file is a file with no information about its developer. The process starts upon Windows startup (see Registry key: MACHINE\User Shell Folders, Run, MACHINE\Run, MACHINE\RunServices, User Shell Folders). The Config.exe file is not a Windows core file. Config.exe is able to record keyboard and mouse inputs, monitor applications and manipulate other programs.
If Config.exe is located in C:\, the security rating is 56% dangerous. The file size is 750,550 bytes. Config.exe is a file with no information about its developer. The program is not visible. The Config.exe file is not a Windows core file. Config.exe is able to record keyboard and mouse inputs.
External information from Paul Collins:
There are different files with the same name:
Important: Some malware camouflages itself as Config.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder, for example Trojan-PSW.Win32.Tibia.di (detected by F-Secure), and Trojan-PSW.Win32.Tibia.di (detected by Kaspersky). Therefore, you should check the Config.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with Config. This means running a scan for malware, cleaning your hard drive using cleanmgr and sfc /scannow, uninstalling programs that you no longer need, checking for Autostart programs (using msconfig) and enabling Windows' Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the Config.exe process on your computer, the following programs have proven to be helpful: Security Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. Malwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.