Improve company productivity with a Business Account.Sign Up

x
?
Solved

How do I identify if my C:\Windows\system32\wuauclt.exe file is legitimate?

Posted on 2007-11-17
1
Medium Priority
?
2,461 Views
Last Modified: 2013-11-16
I am running XP Pro SP2 and still using Sygate as my firewall. This notified that Windows Update Automatic Updates had changed since the last time I used it and did I want to allow it access to which I answered yes. Sygate nevertheless blocked it and now the wireless icon in the notification area is continually glowing and the status shows it is receiving even though I am not connected. The file path in question is
C:\Windows\system32\wuauclt.exe and I note that *\wuauclt1.exe is also present in the system32 folder.

What should I do?
I have 3 screen shots that will flesh out the issue but cannot paste them here.
0
Comment
Question by:P-4N
1 Comment
 
LVL 15

Accepted Solution

by:
davidis99 earned 1400 total points
ID: 20322403
Both of those are valid files.  You can verify them by comparing the versions and byte counts against the information in these articles - you'll need to check for the specific versions you have installed against several possible versions.  If your versions and byte counts match, they're legitimate files.
http://www.processlist.com/search?q=wuauclt.exe&x=0&y=0
http://www.processlist.com/search?q=wuauclt1.exe&x=0&y=0
0

Featured Post

NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
To export Lotus Notes to Outlook PST or Exchange and Domino Server files to Exchange Server or PST files with ease, go for Kernel for Lotus Notes to Outlook conversion tool. Through the video, you can watch the conversion process. A common user with…

588 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question