Solved

How do I identify if my C:\Windows\system32\wuauclt.exe file is legitimate?

Posted on 2007-11-17
1
2,451 Views
Last Modified: 2013-11-16
I am running XP Pro SP2 and still using Sygate as my firewall. This notified that Windows Update Automatic Updates had changed since the last time I used it and did I want to allow it access to which I answered yes. Sygate nevertheless blocked it and now the wireless icon in the notification area is continually glowing and the status shows it is receiving even though I am not connected. The file path in question is
C:\Windows\system32\wuauclt.exe and I note that *\wuauclt1.exe is also present in the system32 folder.

What should I do?
I have 3 screen shots that will flesh out the issue but cannot paste them here.
0
Comment
Question by:P-4N
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 15

Accepted Solution

by:
davidis99 earned 350 total points
ID: 20322403
Both of those are valid files.  You can verify them by comparing the versions and byte counts against the information in these articles - you'll need to check for the specific versions you have installed against several possible versions.  If your versions and byte counts match, they're legitimate files.
http://www.processlist.com/search?q=wuauclt.exe&x=0&y=0
http://www.processlist.com/search?q=wuauclt1.exe&x=0&y=0
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question