This article will focus on Stuxnet’s windows infection methods and spreading methods. The tricks were used by stuxnet and the evidences behind the criminals of stuxnet. Download the Article in PDF - 2.17 MB Table Of Contents 1. Introduction: 2. Payload: 3. Suspects: 4. Technical Details: 4.1.Stuxnet Live Cycle 4.2. Main Dropper (~WTR4132.TMP) 4.3. Main Stuxnet DLL 4.3.1. Escalating the Privilege