In my Windows 7 install, I partitioned my hard drive into C: and E: and I redirected the following folders from my User profile folder to E:
- Application Data
- Contacts
- Desktop
- Favorites
- My Documents
- My Music
- My Pictures
- My Scans
- My Videos
My User profile folder itself, along with the rest of its contents, is/are still on c: in their original locations. Also, my FF profile folder is on E:.
The beauty of doing this is that I can restore images of c: without affecting the data in the folders I put on E:.
I know most malware installs to, and lives on, the System (c:) partition, so that when I restore an uninfected image to c:, those infections are magically and perfectly healed.
My question is, other than malware that runs as I open an infected file (like MS Office, pdf, exe, etc), are there other kinds of malwares that could reside/hide in one of the folders on E: (so that they would survive after I restored an uninfected image to C:)?
Also, for malware types that actually install/place infection files around a computer, does anyone know of any that would automatically place any of its files into any of those folders I redirected to my E: drive?
Update: I edited to list the exact folders redirected to e:
Update 2: Anyone else know of any malware like I'm asking about?