What is tor.exe?

The genuine tor.exe file is a software component of Tor Core by The Tor Project.
The “Tor Core” (tor.exe) is open-source software created and maintained byThe Tor Project, Inc., a nonprofit corporation in Seattle, WA, USA. The Tor Core, together with the Tor Browser, (a modification of Mozilla Firefox), enables use of volunteer “relays” for anonymity by Internet users worldwide, especially in countries where active Internet censorship and surveillance exist, (China, Russia, and others). Like the slaves freed by 19th-century America’s “Underground Railroad”, encrypted messages are passed among relays using random paths with each knowing only its predecessor and successor, reaching unique “exit” relays that decrypt and transmit to the final destination (website). The Tor Project began as a U.S. Navy project and still receives 80 percent of its funding from different parts of the United States government. The simplest method for uninstalling the Tor Browser Bundle appears to be deleting the extract folder created when Tor was installed.

TOR stands for The Onion Router

The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the tor.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.

Click to Run a Free Scan for tor.exe related errors

Tor.exe file information

Windows Task Manager with tor
Tor.exe process in Windows Task Manager

The process known as Tor Win32 Service belongs to software Privoxy or Polipo or Hide My IP Address or ChrisPC Free Anonymous Proxy by IronKey (

Description: Tor.exe is not essential for the Windows OS and causes relatively few problems. Tor.exe is located in a subfolder of "C:\Program Files" or sometimes in a subfolder of Windows folder for temporary files. Known file sizes on Windows 10/8/7/XP are 3,233,806 bytes (51% of all occurrences), 2,897,422 bytes and 52 more variants. 
There is no information about the author of the file. Tor.exe is not a Windows system file. The program has no visible window. Tor.exe is able to monitor applications. Therefore the technical security rating is 65% dangerous, however you should also read the user reviews.

Uninstalling this variant: In case of any problems with tor.exe, you can uninstall the program using the Control Panel ⇒ Uninstall a ProgramPrivoxy or Polipo.

Recommended: Identify tor.exe related errors

Important: Some malware camouflages itself as tor.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the tor.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.


User Comments

An anonymous Internet communication system
  psh   (further information)
Provides an anonymous Internet comunication system
  David   (further information)
Tor is a proxy for TCP communication into a distributed network of anonymous servers, called onion routers.
Privacy enhancing software from Electronic Frontiers Foundation
  Pawel   (further information)
tor is hosted by The Electronic Frontier Foundation
Anonymous Internet connexion. Sponsored by
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.
  Jay   (further information)
TOR.exe is part of TORPARK (the privacy focused edition of firefox) - kill it, it's not essential to windows!
  Jerry Walsh  
The Exe, which is in the TOR/Vidalia Packet(with Privoxy). Use it, when you want be anonymous.
    (further information)
careful: legit (in program files) if not masquaraded virus (windows folder)
It is part of Vidalia project
  Hubert Capp   (further information)
is a safe file to run a private and safe Internet Browsing
the onion router - used for anonymous web surfing via an encrypted network of proxy servers
  Andy Scharbarth  
program for hiding IP address; I cant get it out all the way either
  cici   (further information)
can be used by trojan wins.exe
easy to kill. simply find it with a *tor* search and rename it by putting you rinitials in front of it. then if it turns out some SW package you're running needs it, go back and fix the rename.
A legitimate tor.exe is an essential file used in anonymous networking. Because it has an open-source license, it is included in various file-sharing software and in proxy servers (for anonymous browsing). If located under "C:\\Program Files" or "C:\\Program Files (x86)" it is likely part of a legitimate program. Do you recognize the program whose folder it is in?
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor.exe is a derivate of the popular open-sourced browser Firefox, pre-configured to be connected to the Tor network. This software has been downloaded purposely and displays NO danger to the system at all.
  Ruben Anders   (further information)

Rating chart

Summary: Average user rating of tor.exe: based on 26 votes with 19 user comments. 16 users think tor.exe is essential for Windows or an installed application. 5 users think it's probably harmless. 3 users think it's neither essential nor dangerous. 2 users suspect danger. 3 users don't grade tor.exe ("not sure about it").

Do you have additional information?
What do you know about tor.exe:
How would you rate it:
Link for more info:
Your Name:

Best practices for resolving tor issues

A clean and tidy computer is the key requirement for avoiding problems with tor. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.

Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.

To help you analyze the tor.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.

Other processes

tor.exe [all]