Solved

How do I identify if my C:\Windows\system32\wuauclt.exe file is legitimate?

Posted on 2007-11-17
1
2,446 Views
Last Modified: 2013-11-16
I am running XP Pro SP2 and still using Sygate as my firewall. This notified that Windows Update Automatic Updates had changed since the last time I used it and did I want to allow it access to which I answered yes. Sygate nevertheless blocked it and now the wireless icon in the notification area is continually glowing and the status shows it is receiving even though I am not connected. The file path in question is
C:\Windows\system32\wuauclt.exe and I note that *\wuauclt1.exe is also present in the system32 folder.

What should I do?
I have 3 screen shots that will flesh out the issue but cannot paste them here.
0
Comment
Question by:P-4N
1 Comment
 
LVL 15

Accepted Solution

by:
davidis99 earned 350 total points
ID: 20322403
Both of those are valid files.  You can verify them by comparing the versions and byte counts against the information in these articles - you'll need to check for the specific versions you have installed against several possible versions.  If your versions and byte counts match, they're legitimate files.
http://www.processlist.com/search?q=wuauclt.exe&x=0&y=0
http://www.processlist.com/search?q=wuauclt1.exe&x=0&y=0
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RV042G  Gigabit Dual WAN VPN Router error when saving Upnp list 3 55
Firewall connection 10 67
How to create one more DMZ subnet? 8 72
Sql Server Firewall Problems 2 66
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question