Difference between revisions of "StripADS"

From SpybotWiki
Jump to: navigation, search
m (Usage format)
(added info box)
Line 1: Line 1:
Scans for an ADS attached to an existing file.
+
{{SbiCmdInfo
 +
|SYNTAX = StripADS
 +
|PENAME = SpybotSD.exe
 +
|PEVERSION = 1.4 or later
 +
|GROUP = Files
 +
|MINUPDATE = n/a
 +
|ADVFILEPARAMS = yes (fourth)
 +
|ADVREGPARAMS = no
 +
|ADVBUILDPARAMS = yes (fourth)
 +
|ADVSPECIALPARAMS = no
 +
}}Scans for an ADS attached to an existing file.
  
 
==Usage==
 
==Usage==

Revision as of 14:17, 22 February 2008

StripADS
Group Files
Main Application Version 1.4 or later
Required Update n/a
File Parameters yes (fourth)
Registry Parameters no
Build Parameters yes (fourth)
Special Parameters no

Scans for an ADS attached to an existing file.

Usage

StripADS:<description>,<filename>,<ads name>[,advanced file parameters[,advanced file parameters for ads stream]]

Examples

StripADS:"<$FILE_EXE>","<$WINDIR>\*.exe",":malware:$DATA","","filesize=197352,md5=23812A64B891E8230F8283D51044886C"

This faked example would detect an alternative data stream named malware attached to any .exe file in the Windows folder that has a size of 197352 bytes and the specified MD5 hash.

Description

This command can be used to remove ADS streams from files.

  1. It starts, as usual, with a description parameter. Description templates are welcomed here for a localized end user experience. Wildcards, or after version 1.5.2 generic Algo-Prefixes, are allowed here. AP
  2. Specify the name and path of the file that has the ADS attached. Use path templates if possible. Wildcards, or after version 1.5.2 generic Algo-Prefixes, are allowed here. AP PT
  3. Specify the name of the attached ADS. PT
  4. Use advanced file parameters to clearly identify the file.
  5. Use advanced file parameters to clearly identify the attached stream.

Scan Results

  • The ADS file.

See also

Similar commands