Consent.exe is the executable file for User Account Control (UAC) in Windows Vista. This process is a new security feature. UAC is also a component of Windows Server 2008.
Consent.exe or UAC allows users to perform common tasks as non-Administrative users, commonly referred to as standard users in Windows Vista. Users can also perform Administrative tasks without the need to switch between users, log off or use Run As.
By default, the consent.exe file is said to be found in the C:\Windows\System32 folder. Its size on Windows XP is 0 bytes. The most common size of the file on Windows Vista is found to be 81,920 bytes. The file has no visible window and has a security rating of 42% dangerous.
Is Consent.exe a Malware Program?
A rogue consent.exe is known to be circulating around. This rogue file is a dangerous malware that can spy on your online and PC activities to gather personal and confidential information about you. This is the reason why, if you have the slightest doubt, ensure that the consent.exe file on your computer is located within the default folder. Anywhere else, it is more likely to be a malware. At times, the malware file may even overwrite the legitimate file in its default folder. Therefore, you should also check the file size to make sure that it is consistent with verified file sizes. You can also right click and check Properties to see if Microsoft shows the file there.
How to Get Rid of Consent.exe Malware File
If you receive a suspicious error message or you find the consent.exe file on your PC behaving erratically or consuming a large amount of system resources, you must immediately scan your PC for malware infections. You must use the latest and up-to-date antivirus and antispyware tools . If any threats are detected remove them immediately. It is recommended that you run the scan at least twice, to ensure that no malicious file is left behind.
Malware programs, especially spyware and adware, are known to install malicious programs on your computer. This is the reason why, you may use the Add or Remove Programs, or an efficient third-party program uninstaller tool, such as Perfect Uninstaller, to scan for any suspicious programs and get rid of them.
Lastly, it is a good idea to use a good registry cleaner tool to thoroughly scan your registry and remove any malware entries from it. This will help you ensure complete removal of the malware from your computer.