Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Recognizeable As Malware?


  • Please log in to reply
3 replies to this topic

#1 LonMon

LonMon

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Location:Connecticut
  • Local time:05:27 PM

Posted 26 August 2008 - 07:45 AM

I have a file that seems to be running at startup (I have yet to run Startup Inspector - but will) anyway the logo in the tray says DataAgent and it seems to be coming from C:\ARIS\DataAgnt.exe though I have yet to confirm. Add Remove shows no instance of installing this so might this be a single executable (sort of like HJT) that I can just delete? Call me curious. I am now running Norton Endpoint Security in unmanaged mode (a benefit from work) and hopefully that will cut down on this stuff. Call me curious.

LonMon

Technology is fundamentally worthless if you don't understand the problem you are trying to solve.

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,769 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:27 PM

Posted 26 August 2008 - 11:24 AM

Anytime you come across a suspicious file for which you cannot find any information about, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to jotti's virusscan or virustotal.com. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Post back with the results of the file analysis.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 LonMon

LonMon
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Location:Connecticut
  • Local time:05:27 PM

Posted 27 August 2008 - 07:27 AM

Thanks Quietman i will do that. Meanwhile I am going to rip out Norton Endpoint because while it is effective it is an incredible resource hog!
Technology is fundamentally worthless if you don't understand the problem you are trying to solve.

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,769 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:27 PM

Posted 27 August 2008 - 07:37 AM

Yes, Norton certainly is a bit resource heavy. Good luck.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users