SpywareBlaster 4.1 - Hidden Code (ADS)

Discussion in 'SpywareBlaster & Other Forum' started by b737x, Aug 22, 2008.

Thread Status:
Not open for further replies.
  1. b737x

    b737x Registered Member

    Joined:
    Mar 12, 2005
    Posts:
    6
    Found NTFS Alternate Data Stream (ADS) attached to directory "TEMP"
    definitively (reproducible) created by SpywareBlaster 4.1:

    %ALLUSERSPROFILE%\Application Data\TEMP:5C321E34

    What is this suspicious hidden binary code (120 bytes) good for?
     
  2. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Email the programmers and ask them?
     
Loading...
Thread Status:
Not open for further replies.