SpywareBlaster 4.1 - Hidden Code (ADS)

Discussion in 'SpywareBlaster & Other Forum' started by b737x, Aug 22, 2008.

Thread Status:
Not open for further replies.
  1. b737x

    b737x Registered Member

    Joined:
    Mar 12, 2005
    Posts:
    6
    Found NTFS Alternate Data Stream (ADS) attached to directory "TEMP"
    definitively (reproducible) created by SpywareBlaster 4.1:

    %ALLUSERSPROFILE%\Application Data\TEMP:5C321E34

    What is this suspicious hidden binary code (120 bytes) good for?
     
  2. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Email the programmers and ask them?
     
Loading...
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.