Consent.exe â€“ File Information
The consent.exe file is associated with User Account Control (UAC) in Windows Vista. The file is the executable for UAC and when a regular (non-administrator) user needs to elevate itself to the administrator, UAC displays the elevation dialog box using consent.exe.
By default, in Windows Vista the consent.exe file is located in C:\Windows\System32 folder. The most common size of the consent.exe file is 81,920 bytes.
Consent.exe â€“ Security Rating
The genuine consent.exe is a safe file from Microsoft. However, many malware are known to masquerade as consent.exe.
That is why it is important for you to ensure that consent.exe running on your computer is a genuine process or not.
How to confirm if consent.exe is genuine Microsoft file
One way of doing this is by checking the properties of consent.exe file. First, use the inbuilt Search utility to locate all the instances of consent.exe file on your Windows system and check their location.
The genuine consent.exe file is located in C:\Windows\System32 folder. Right-click the consent.exe file, click Properties and see if Microsoft is listed as the Manufacturer of the file. Also, check if a digital signature is provided that validates the file as the genuine Microsoft file.
In case, you find the consent.exe file is located somewhere else or Microsoft is not the manufacturer, chances are that the file is illegitimate and you will be better of by removing the rogue file. It is recommended that you donâ€™t try to directly delete the file. Instead, run a malware scan using reliable and advanced security software and delete the malicious consent.exe and its associated malware.
At this point, you may also run a registry scan using a reliable registry cleaning utility, such as PCHealthBoost. This is required because malware programs often add incorrect or harmful entries into the registry that may corrupt your Windows registry and make your Windows computer unstable.
Consent.exe virus â€“ File behavior
The consent.exe virus is used by attackers to steal your personal and confidential information. The following file behavior is associated with the consent.exe virus:
- Resists interrogation by security products
- Uses low level functions to hide itself from the user and security processes.
- Does Process Hijacking (writes to another processâ€™s virtual memory)
Consent.exe is trying to access the Internet â€“ Should I allow it?
Well, this is your call. Although it is known that the genuine consent.exe tries to connect to the Internet, why it needs the Internet is not clear.
If you have verified that the consent.exe is a genuine file, then there is no threat in allowing it to access the Internet. At the same time, no harmful effects were recorded when users prevented the genuine consent.exe from accessing the Internet.
So, it is up to you to either allow or disallow the consent.exe file from accessing the Internet. What we recommend is that you always verify consent.exe is a genuine file before allowing it to have access to the Internet. Your computer may become vulnerable if consent.exe is not a legitimate file and you allow it to have Internet access.