Discover our Resources →
Learn how to protect your Windows PC from malware and other threats.Application Control
Control your PC apps and their behaviors.What’s that .exe?
Is that executable safe, or a threat?SpyShelter PC Protection
Learn how to protect your PC from bad apps.Registry Protection
Protect your Windows Registry from harm.How to prevent Screenshots
Learn how to prevent unauthorized Screenshots.Executable Directory
Our ultimate directory of Windows PC executables.The file c2wtshost.exe is associated with the Claims to Windows Token Service (C2WTS) in Microsoft Windows environments. This service is primarily utilized in SharePoint and SQL Server Reporting Services (SSRS) configurations to facilitate the conversion of claims-based identities into Windows tokens. This conversion is essential for authenticating and authorizing user access to resources that rely on Windows authentication, especially when integrating with external systems that do not natively support claims-based authentication.
For example, in SharePoint environments configured to use claims-based authentication, services like Excel Services or PerformancePoint Services may need to access external data sources that require Windows authentication. In such cases, C2WTS facilitates the necessary identity translation to allow seamless access to these resources.
It's important to note that the use of C2WTS is typically limited to specific enterprise scenarios involving complex authentication requirements. In standard home or small business Windows setups, encountering this service is uncommon. Therefore if you see this .exe on a home PC it may not be necessary and can probably be disabled or quarantined by SpyShelter.
Below are 4 simple steps you can take to see if the c2wtshost.exe process is safe or malware.
Researched by Carl @ SpyShelter Labs
A Trojan is a harmful software that pretends to be a legitimate program or file to deceive users into downloading it. It can steal personal information, damage files, or give hackers control over the infected device.
Download SpyShelter to see detailed safety information about every .exe on your PC.
Check your PC for threatsWe’ve found Microsoft Windows should be the publisher of c2wtshost.exe.
How do we know? Our SpyShelter cybersecurity labs focuses on monitoring different types of Windows PC executables and their behaviors for our popular SpyShelter Antispyware software. Learn more about us, and how our cybersecurity team studies Windows PC executables/processes.
The publisher of an executable is the entity responsible for its distribution and authenticity. Most processes/executables on your PC should be signed. The signature on the executable should have been verified through a third party whose job it is to make sure the entity is who it says it is. Find an unsigned executable? You should consider scanning any completely unsigned .exe on your PC.
Our team at SpyShelter has been studying Windows PC executables for over 15 years, to help fight against spyware, malware, and other threats. SpyShelter has been featured in publications like The Register, PC Magazine, and many others. Now we’re working to share free, actionable, and easy to understand information about Windows executables (processes) with the world, to help as many people as possible keep their devices safe. Learn more about us on our "About SpyShelter” page.
Have any questions? Please join our free public SpyShelter PC Security Forum and talk cybersecurity with our USA-based team. We love talking about PC Security and we’d like to get to know you.
Join our PC security forum →