The genuine conhost.exe file is a software component of Microsoft Windows/Microsoft Server by Microsoft Corporation.
At least two "conhost.exe" programs exist, one an essential Microsoft Windows system process and one a Trojan. The Microsoft Console Host program resides in "C:\Windows\System32" and should not be removed. It was created for Windows 7 and Windows Server 2008 R2 to thwart malware exploitation. In WinXP, "console applications" without GUI's, run with parameters from the command prompt, used a kernel call to send messages to "CSRSS.exe" for processing. "CSRSS.exe" has local system account privileges, which some malware exploited. "Conhost.exe" is a step before "CSRSS.exe" which has only the application's privileges and frustrates such exploits. The older Trojan "conhost.exe" predates Microsoft's. It is a crypto-currency miner, in a temporary folder, using up to 100% of the CPU to find Bitcoin or Monero crypto-currency units on other computers and send them elsewhere. It may mean the dangerous TDSS botnet virus is present, which Kaspersky's free tool removes.
ConHost stands for Console Application Host
The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the conhost.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Console Window Host or bitcoin-miner or Boot Acceptance Application for Registry or Windows Service Pack or Host Process for Windows Services or Windows System Service Pack belongs to software Microsoft Windows Operating System or Bitcoin Miner or Host Process for Windows Services or Hotfix for Microsoft Visual Studio (version 2007) by Microsoft (www.microsoft.com) or Ufasoft (www.ufasoft.com).
Description: Conhost.exe is not essential for Windows and will often cause problems. The conhost.exe file is located in a subfolder of the user's profile folder or sometimes in the Windows folder for temporary files (usually C:\Users\USERNAME\AppData\Roaming\Microsoft\ or C:\Users\USERNAME\Anwendungsdaten\Microsoft\).
Known file sizes on Windows 10/8/7/XP are 169,984 bytes (5% of all occurrences), 169,472 bytes and 72 more variants.
It is a file with no information about its developer. The program is not visible. The file is not a Windows core file. The process is loaded during the Windows boot process (see Registry key: MACHINE\Run, Run, User Shell Folders, TaskScheduler, RunOnce, MACHINE\RunOnce, MACHINE\User Shell Folders, Shell Folders, win.ini, DEFAULT\User Shell Folders).
Conhost.exe is able to monitor applications.
Therefore the technical security rating is 67% dangerous; but you should also compare this rating with the user reviews.
Recommended: Identify conhost.exe related errors
Important: Some malware camouflages itself as conhost.exe, for example Backdoor:Win32/Cycbot.B (detected by Microsoft), and Backdoor.Win32.Gbot.bs or Trojan-Downloader.Win32.FraudLoad.yaws (detected by Kaspersky). Therefore, you should check the conhost.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with conhost. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the conhost.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.
mccicmservice.exe smax4pnp.exe lmanager.exe conhost.exe ccsvchst.exe wpdshserviceobj.dll wshelper.exe wlidsvc.exe mailruupdater.exe avgnt.exe hwdeviceservice64.exe [all]
Score
User Comments
Mike (further information)
Der kleine Held
Pete J
Superbyte
Mike (further information)
tanstaafl (further information)
(further information)
wes
Zenvidia (further information)
WinTech
Bubblegum
Gary
Michael Hill
Jarl Plottner
JW
Alvaro
wcanon
Hiro Protago
John Dough
Ash
B.A. Rose (further information)
M
MarkE R
Kushal Pardeshi
spread
Susan
Steven (further information)
Summary: Average user rating of conhost.exe: based on 63 votes with 34 user comments. 21 users think conhost.exe is essential for Windows or an installed application. 13 users think it's probably harmless. 4 users think it's neither essential nor dangerous. 13 users suspect danger. 12 users think conhost.exe is dangerous and recommend removing it. 9 users don't grade conhost.exe ("not sure about it").