NoVirusThanks Stream Detector is used to find hidden Alternate Data Streams (ADS) on NTFS drives as well as finding and deleting hidden alternate data streams used by malware and rootkits, which includes the infamous Backdoor.Rustock.A that used to hide its kernel-mode driver file into System32 folder as a stream.
After finding any alternate data streams; NoVirusThanks Stream Detector allows you to extract these streams, delete the file, delete unwanted streams, or export the list of found streams to a log file. This program can also list multiple hidden streams and can properly detect alternate data streams on an actual folder directory.
NoVirusThanks Stream Detector is perfect for forensic analysis in order to discover hidden files (such as archives, images, videos, executables, databases, etc) within the alternate data streams.
NoVirusThanks Stream Detector Features:
List all hidden Alternate Data Streams on NTFS drives
Support listing of multiple Alternate Data Streams
Option to extract or delete the selected streams
Export the complete scan report to a custom .LOG file
Detect Alternate Data Streams on an actual folderdirectory
Option to remove all streams with one single click
Option to ignore safe streams (like Zone.Identifier)
You can also create a custom file Alternate Data Stream
Show detailed information about all streams found
Search information about a file on Google search engine