The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the conhost.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Console Window Host or bitcoin-miner or Hôte de la fenêtre de la console or Host de ventana de consola or Host Process for Windows Services
belongs to software Microsoft Windows Operating System or Bitcoin Miner or Système d’exploitation Microsoft Windows or Sistema operativo Microsoft Windows or Host Process for Windows Services
by Microsoft (www.microsoft.com) or Ufasoft (www.ufasoft.com).
Description: The original conhost.exe from Microsoft is an important part of Windows, but often causes problems. The conhost.exe file is located in the C:\Windows\System32 folder.
Known file sizes on Windows 10/8/7/XP are 271,360 bytes (92% of all occurrences), 300,032 bytes and 4 more variants.
It is a Windows system file. The program is not visible. The file is a Microsoft signed file. Conhost.exe is able to record keyboard and mouse inputs. Therefore the technical security rating is 3% dangerous, however you should also read the user reviews.
Recommended: Identify conhost.exe related errors
Is conhost.exe a virus? No, it is not. The true conhost.exe file is a safe Microsoft Windows system process, called "Console Window Host".
However, writers of malware programs, such as viruses, worms, and Trojans deliberately give their processes the same file name to escape detection. Viruses with the same file name are e.g. Trojan:Win32/Alureon.FM or Backdoor:Win32/Cycbot.B (detected by Microsoft), and not-a-virus:RiskTool.Win32.BitCoinMiner.amv or Packed.Win32.Krap.hy (detected by Kaspersky).
To ensure that no rogue conhost.exe is running on your PC, click here to run a Free Malware Scan.
How to recognize suspicious variants?
If conhost.exe is located in a subfolder of the user's profile folder, the security rating is 65% dangerous. The file size is 169,984 bytes (5% of all occurrences), 191,488 bytes and 59 more variants. There is no description of the program. The program is not visible. It is not a Windows system file. The software starts upon Windows startup (see Registry key: MACHINE\Run, Run, User Shell Folders, MACHINE\User Shell Folders, RunOnce, MACHINE\RunOnce, exefile). Conhost.exe is able to monitor applications.
If conhost.exe is located in a subfolder of "C:\Program Files", the security rating is 66% dangerous. The file size is 156,672 bytes (7% of all occurrences), 6,656 bytes and 21 more variants. The program has no file description. The program is not visible. The file is not a Windows core file. The program is loaded during the Windows boot process (see Registry key: MACHINE\Run, Run, User Shell Folders, MACHINE\User Shell Folders, RunOnce, MACHINE\RunOnce, exefile). Conhost.exe is able to monitor applications.
If conhost.exe is located in a subfolder of C:\Windows, the security rating is 60% dangerous. The file size is 267,776 bytes (78% of all occurrences), 657,920 bytes or 338,432 bytes.
If conhost.exe is located in the C:\Windows folder, the security rating is 80% dangerous. The file size is 1,231,360 bytes.
If conhost.exe is located in a subfolder of C:\, the security rating is 42% dangerous. The file size is 267,776 bytes.
If conhost.exe is located in a subfolder of Windows folder for temporary files, the security rating is 42% dangerous. The file size is 152,064 bytes.
If conhost.exe is located in the "C:\Program Files" folder, the security rating is 54% dangerous. The file size is 98,816 bytes.
Important: Some malware disguises itself as conhost.exe, particularly when not located in the C:\Windows\System32 folder. Therefore, you should check the conhost.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with conhost. This means running a scan for malware, cleaning your hard drive using cleanmgr and sfc /scannow, uninstalling programs that you no longer need, checking for Autostart programs (using msconfig) and enabling Windows' Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the conhost.exe process on your computer, the following programs have proven to be helpful: Security Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. Malwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.