All About Cookies is an independent, advertising-supported website. Some of the offers that appear on this site are from third-party advertisers from which All About Cookies receives compensation. This compensation may impact how and where products appear on this site (including, for example, the order in which they appear).
All About Cookies does not include all financial or credit offers that might be available to consumers nor do we include all companies or all available products. Information is accurate as of the publishing date and has not been provided or endorsed by the advertiser.
The All About Cookies editorial team strives to provide accurate, in-depth information and reviews to help you, our reader, make online privacy decisions with confidence. Here's what you can expect from us:
- All About Cookies makes money when you click the links on our site to some of the products and offers that we mention. These partnerships do not influence our opinions or recommendations. Read more about how we make money.
- Partners are not able to review or request changes to our content except for compliance reasons.
- We aim to make sure everything on our site is up-to-date and accurate as of the publishing date, but we cannot guarantee we haven't missed something. It's your responsibility to double-check all information before making any decision. If you spot something that looks wrong, please let us know.
COM Surrogate, also known as dllhost.exe, is a legitimate Microsoft Windows process used to run Component Object Model (COM) objects. In short, COM Surrogate allows different parts of your software to communicate so they all work together.
Think of it like a washing machine. You have to set the temperature, spin cycle, timer, and agitation level. COM Surrogate would allow all those settings to tell the agitator, drum, water inlet valves, and drain pump when to add water and at what temperature, when to wash and spin, and when to announce that the load cycle is complete.
This means that COM Surrogate is a safe process that allows your Windows PC to run smoothly. The problem, however, is when malware imitates a safe process like COM Surrogate. People who write malware frequently do this to hide their malicious code in seemingly benign processes.
The more advanced malware becomes, the more often scammers will spoof legitimate processes like COM Surrogate to allow malware to run on your machine. It is very important that you do not remove COM Surrogate or other system files if you find it running on your machine unless a legitimate antivirus program flags it. Removing legitimate COM Surrogate processes can severely damage your machine’s operations.
This may seem confusing. You don’t want to damage your computer, but you also can’t allow a virus to run. So what do you do? Let’s explore how to identify the necessary COM Surrogate process from the virus as well as the best antivirus software for the job.
How to detect the COM Surrogate virus
How to safely remove it
How to avoid malware
FAQs
Bottom line
What is COM Surrogate and is it a virus?
No, COM Surrogate is not a virus. However, hackers can create malicious programs called Trojans that can look like legitimate processes. This can happen with COM Surrogate.
The COM Surrogate virus is designed to discreetly install on a victim’s machine and quietly run in the background. The virus could be spyware that lies in wait, stealing personal information, banking data, and other passwords. It could also add your machine to a botnet without your knowledge for DDoS attacks.
How to detect the COM Surrogate virus
As with most viruses, you can tell your computer is infected with a virus by running an antivirus scan. It's recommended that you let these scans run on a schedule so you can be sure that your computer is being checked every so often. The top-rated antivirus program that we tested is Avast.
If you want to manually detect the virus, you can check the Task Manager on your computer. While the real COM Surrogate uses almost no processing power, the virus would be using a significant amount. It's also always located in the System32 folder (usually called dllhost).
To verify these two aspects of the real COM Surrogate program, simply:
- Right click on your task bar and click Task Manager to open the program up.
- Look for COM Surrogate, dllhost, or dllhost.exe in the list of processes (it's normal for more than one of them to appear in the list).
- Check how many resources it's using in CPU, Memory, or Disk columns.
- If any instance is using very little resources (less than 1 MB of our memory) then it's likely the real program.
Then, right-click the COM Surrogate processes.
Choose Open File Location from the menu.
If it leads to dllhost or dllhost.exe located in the File Explorer location “\Windows\System32”, you’re running the legitimate process, not a virus.
If you don’t feel comfortable looking for the COM Surrogate process location on your own, a legitimate malware removal tool can find and remove a malicious form of COM Surrogate for you.
Even if you do locate the COM surrogate virus, we strongly advise removing it with a removal tool. The tool can locate all instances of the virus that may be hiding on your device to ensure it is completely clean.
How to remove the COM Surrogate virus
The safest way to remove the COM Surrogate virus is with antivirus software. Simply open your preferred antivirus program and choose the option to run a full scan. This may take some time, but it's OK to let the scan run while you complete other tasks away on the device.
If your antivirus software is set up to automatically remove malicious files, you should be all set once the scan is complete. If your antivirus is NOT set up to automatically remove malicious files, it'll identify the files for you and allow them to either quarantine or delete them. Afterward, restart your computer and complete another scan to ensure success.
Here’s a list of some of the best antivirus software we’ve tested so you can feel secure that your system is safe:
Antivirus | |||
Star rating | |||
Price | $29.00–$49.00/yr (first year only) | $29.99–$249.99/yr | $29.99–$99.99/first yr |
# of devices protected | 4 - 8 | Unlimited | 1 - 10 |
Malware scans | Manual and scheduled | Manual and scheduled | Manual and scheduled |
Real-time protection | |||
EICAR test results | 2/3 | 3/3 | 3/3 |
Firewall | |||
Phishing protection | |||
Compatibility | Windows, Mac, Android, iOS, Chrome, Edge, Opera, Safari | Windows, Mac, Android, iOS, Chrome, Firefox, Safari, Edge | Windows, Mac, Android, iOS |
Extras | Password manager, ad blocker, VPN | Parental controls, performance optimization tools, VPN | Password manager, VPN, dark web monitoring, parental controls, privacy monitor, identity theft protection, cloud backup |
24/7 customer support | |||
Learn more | Get TotalAV | Get McAfee | Get Norton 360 |
Again, it’s very important that you don’t attempt to remove instances of COM Surrogate on your own without a malware removal tool. COM Surrogate is a real tool that helps the different sections of your computer work together. Deleting the actual process will create significant problems and hinder your machine’s operation. Always use a removal tool.
How to avoid malware
Utilize the tools below to stay safe online. The COM Surrogate virus spreads through social engineering, malicious website links, infected attachments, and unpatched or cracked software.
- Use a VPN: VPNs encrypt your data and hide your IP address to mask you from hackers.
- Use antivirus software: Good antivirus software will detect, stop, and delete malicious files. Keep this patched so you’re always protected with the latest version.
- Use multifactor authentication (MFA): Turn MFA on for all your accounts where it’s available. If someone steals your credentials, this can help protect your accounts by requiring authorization from a second device.
- Patch management: Regularly updating your software and installing the latest patches as they’re released will ensure you’re running the safest versions of your tools.
- Learn about social engineering scams: Social engineering scams like phishing and watering hole attacks can infect your computer. Know how to spot and avoid them.
- Use complex passwords: If you can, use a password generator and one of the best password managers to create strong passwords.
- Monitor your accounts: It’s very important to monitor your financial and credit reporting accounts. Odd behavior may be an indication of a virus stealing your data.
- Say no to links and attachments: If you don’t know where the link came from or you weren’t expecting an email with an attachment, don’t click on it.
COM Surrogate virus FAQs
How do I know if my computer has the COM Surrogate virus?
Without checking the process location, you may wonder if your computer has the COM Surrogate virus because of odd activity on your bank or credit accounts. Or your computer may be running slower, since the virus utilizes your CPU usage. Use the method outlined above to check the COM Surrogate process location.
How is the COM Surrogate virus spread?
It’s spread through infected email attachments, malicious online advertisements, social engineering attacks, and software cracks.
Bottom line
COM Surrogate is a legitimate process running on Windows machines to allow communication between different components of the Windows operating system. It’s not a virus or malware, but it has the potential for hackers to modify it with a virus or malware hidden behind the COM Surrogate name. Never try to delete the virus or malware on your own, as you could accidentally delete one of your computer’s core operating processes.
If you see the COM Surrogate process pop up in your task manager and it’s consuming a lot of your CPU or memory resources, it is likely a virus. Use professional antivirus software or malware removal tools to eliminate all aspects of the virus from your computer.
By regularly updating your operating system and antivirus software, avoiding social engineering scams, and using good internet hygiene, you’ll greatly reduce your chances of becoming a victim of cybercrimes.