Deutsch

What is config.exe?

The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the config.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.

Click to Run a Free Scan for config.exe related errors

Config.exe file information

Windows Task Manager with config
Config.exe process in Windows Task Manager

The process known as Configuration Utility for Intersil driver or Firefox or Starcraft belongs to software SpeedStream Wireless LAN or Firefox or Starcraft or D-Link DWL-650 Control Utility or Wireless LAN PC Card by Neesus Datacom (www.neesus.com) or Mozilla (www.mozilla.org).

Description: Config.exe is not essential for the Windows OS and causes relatively few problems. The file config.exe is located in the C:\Windows\System32 folder. Known file sizes on Windows 8/7/XP are 145,920 bytes (70% of all occurrences), 3,209,216 bytes, 270,336 bytes, 2,125,312 bytes or 151,552 bytes. http://www.file.net/process/config.exe.html 
Config.exe is a file with no information about its developer. The program has no visible window. The config.exe file is an unknown file in the Windows folder. The file is not a Windows system file. The process listens for or sends data on open ports to a LAN or the Internet. The application starts when Windows starts (see Registry key: MACHINE\Run, MACHINE\RunServices, MACHINE\User Shell Folders, Run, User Shell Folders). Config.exe is able to hide itself, record keyboard and mouse inputs and monitor applications. Therefore the technical security rating is 83% dangerous, however you should also read the user reviews.

Recommended: Identify config.exe related errors

External information from Paul Collins:
There are different files with the same name:

Important: Some malware also uses the file name config.exe, for example Trojan.PWS.Tibia.BG (detected by BitDefender), and Generic PWS.y (detected by McAfee). Therefore, you should check the config.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.

Score

User Comments

Came with a Netgear PCMCIA wireless network card
  Rupert  
Also comes with a DLink 650 WL - if found in C:\Program Files\D-Link\D-Link DWL-650 Control Utility\Config.exe. Mine shows a version 4.06.0.0, 284kb, and says "Configuration Utility for Intersil Driver"
  Jake  
Serious Samurize Config Editor
  Heinz Kunze   (further information)

Summary: Average user rating of config.exe: based on 4 votes with 3 user comments. One user thinks config.exe is essential for Windows or an installed application. 2 users think it's probably harmless. One user thinks it's neither essential nor dangerous.


Do you have additional information? Help other users!
What do you know about config.exe:
How would you rate it:
Link for more info:
Your Name:
 

Best practices for resolving config issues

A clean and tidy computer is the key requirement for avoiding problems with config. This means running a scan for malware, cleaning your hard drive using cleanmgr and sfc /scannow, uninstalling programs that you no longer need, checking for Autostart programs (using msconfig) and enabling Windows' Automatic Update. Always remember to perform periodic backups, or at least to set restore points.

Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off doing a repair of your installation, or in the case of Windows 8, executing the DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.

To help you analyze the config.exe process on your computer, the following programs have proven to be helpful: Security Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. Malwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.



Other processes

config.exe [all]