takeown.exe

Windows Ownership Utility

System UtilitySafePermissions
CPU Usage
0-8% during execution
Memory
1-25 MB
Location
C:\Windows\System32
Publisher
Microsoft Corporation

Quick Answer

takeown.exe is a safe Windows utility. It is a built-in command-line tool that lets administrators take ownership of files or folders to modify permissions.

Is it a Virus?
✔ NO - Safe
Must reside in C:\Windows\System32\takeown.exe (or C:\Windows\SysWOW64\takeown.exe on some 64-bit systems) and be digitally signed by Microsoft.
Warning
Changes ownership and ACLs
Misuse can grant or revoke access in ways that affect security. Use in controlled admin tasks only.
Can I Disable?
✔ YES
Takeown is a built-in Windows tool. If you won't use it, simply avoid running it; it will not run automatically.

What is takeown.exe?

takeown.exe is a Windows command-line utility that enables administrators to take ownership of files or folders when access is restricted. By acquiring ownership, you can apply new permissions and recover access after ACL issues, migrations, or inherited permission problems. It is a core part of Windows security tooling.

Takeown operates by altering the ACLs of the target object to set ownership to the requested user or administrator group, typically using switches like /F, /A, /R, and /D. It is commonly used in recovery and remediation scenarios where standard permissions blocks block access.

Quick Fact: Takeown has been available since early Windows NT lineage and remains a staple for permission recovery in Windows environments.

Types of Takeown Operations

Is takeown.exe Safe?

Yes, takeown.exe is safe when located in C:\Windows\System32 (or SysWOW64 on 64-bit systems) and digitally signed by Microsoft.

Is takeown.exe a Virus or Malware?

The legitimate takeown.exe is NOT a virus. Malware may mimic names; always verify location and signature.

How to Tell if takeown.exe is Legitimate or Malware

  1. File Location: Must be in C:\Windows\System32\takeown.exe or C:\Windows\SysWOW64\takeown.exe. Any takeown.exe outside these paths warrants suspicion.
  2. Digital Signature: Right-click takeown.exe in File Explorer > Properties > Digital Signatures. Should show a Microsoft-signed certificate.
  3. Version and Publisher: Check the file version and publisher in the Details tab; it should reflect Microsoft Corporation.
  4. Resource Usage During Run: Normal usage is minimal; unusually high CPU/memory during idle or in background is suspicious and warrants scan.

Red Flags: If takeown.exe appears in folders outside Windows system directories (e.g., C:\Users, AppData, Temp), runs without user action, has no digital signature, or uses excessive resources constantly, scan with Windows Defender or another AV.

Why Is takeown.exe Running on My PC?

takeown.exe runs when an administrator or a management script explicitly requests ownership changes. It does not run in the background by default unless invoked by a task or script.

Reasons it's running:

Can I Disable or Remove takeown.exe?

Yes, you can avoid using takeown.exe. It is a built-in Windows tool and cannot be uninstalled independently. Do not call it from scripts if not needed.

How to Stop takeown.exe

How to Stop Using or Minimally Impact Takeown

Common Problems: Takeown Fails or Permissions

If takeown.exe returns errors or behaves unexpectedly, review access, path accuracy, and administrative context.

Common Causes & Solutions

Quick Fixes:
1. Open an elevated Command Prompt
2. Run: takeown /F "C:\Path\To\Target" /A /R /D Y
3. If needed, follow with: icacls "C:\Path\To\Target" /grant Administrators:F /T
4. Verify ownership via: cacls or Get-Acl in PowerShell
5. Test access by attempting to modify the target file/folder

Frequently Asked Questions

Is takeown.exe a virus?

No. takeown.exe is a legitimate Windows tool used to reclaim ownership of files and folders. Ensure it is located at C:\Windows\System32\takeown.exe and has a Microsoft signature.

What does takeown.exe do?

takeown.exe changes the owner of a file or directory to the current user or Administrators, enabling permission changes when access is blocked by ACLs.

How do I use takeown to own a file?

Open an elevated CMD and run: takeown /F "C:\Path\To\File" /A; add /R for recursive targeting and /D Y to default to yes.

Can I take ownership of a folder recursively?

Yes. Use the /R switch to apply ownership changes to all files and subfolders within a directory (e.g., takeown /F "C:\Path" /R /A).

What should I do if I get Access Denied even as admin?

Verify path correctness, run from an elevated prompt, ensure the file system allows changes, and consider using icacls to grant ownership or modify ACLs as needed.

Where is takeown.exe located in Windows?

Takeown.exe is located in C:\Windows\System32\takeown.exe (and in some 64-bit systems, C:\Windows\SysWOW64\takeown.exe).

Related Processes