Anti-Spyware | Hijack Hunter 188.8.131.52
Report a Bad Link
It is possible for the users to list files in custom folders and to dump the registry data from custom registry keys and values.
We have included also some features that can list all the executable files that are in suspicious folders commonly used by malware. The program displays also hidden files in suspicious folders, executable files in Temp Folder and system parameters that are commonly hijacked by recent malware and spyware.
MGID NEWS FEED: