Well, not really. They are more properly referred to as Context Menus for Explorer, when d7 is loaded by default it installs these on the live machine. Here are the items added, with a short explanation.
Context Menu Items
- Work with File – A single context menu item designed to replace ALL of the others, for those who want all the functionality without all the clutter.
- Google This – Google search for the file name.
- Google with Full Path – Same as above, with the path of the file included. If it is in a user profile directory, my code removes the username from the path.
- Find Dups – Find duplicate files based on MD5 hash.
- Search Registry – Search the registry for the selected file name.
- Find Target File (WinXP/Vista) – Use on a shortcut, this opens the target in Explorer. Same as “Open File Location” in built-in with Windows 7.
- Copy Path to Clipboard – Copies the path/filename of the selected dir/file to the clipboard!
- Run with Parameters – A nifty function to use command line parameters (switches) with any executable without having to open a command prompt. It also optionally saves parameter history!
- Take Ownership/Permissions – Take ownership (AND assign yourself permissions) of the file or directory (and it’s contents)
- Copy to Folder – Self explanatory!
- Move to Folder – Self explanatory!
- Open in Notepad (All File Types) – Opens any file in Notepad.
- Command Prompt Here – This should be self explanatory!
- Register / Unregister – Register/Unregister any applicable file with regsvr32.exe
- Rename to .RENAMED – Renames the file first, with the extension .RENAMED, then creates a dummy directory (or vice versa) to prevent the file from being recreated.
- Delete Options – Installs the two items below.
- Delete and Record – Deletes the file using d7’s delete methods and records the deleted file to a report. This option does send the object to the Recycle Bin.
- Delete not Recycle – Same as above, but doesn’t attempt to place the object in the Recycle Bin
- Check Existence on TBC – What? A TBC is what I call a “Tech Bench Computer” and this function is useful if you’re running d7 in offline mode, if you’ve attached an infected HDD to your TBC for scanning/removal. While you’re browsing the file system of the attached/offline hard drive, if you run across an unknown DLL or such, you can choose this. It checks to see if the same file exists on your TBC (i.e. within the host operating system,) and if so, it compares various attributes to the file in question.
- Add to Malware List – This adds file system objects to the Pre-MalwareScan blacklisting, and also deletes them.
- Unlock File – Applies techniques to attempt to unlock a locked/in-use file such as a DLL for example.
Requiring 3rd Party Tools
- Secure Deletion – This option utilizes Sysinternals SDelete.exe to securely delete files. The delete function runs 3 passes for the overwriting part of the secure deletion process (by default, SDelete.exe only runs 1 pass.)
- Defrag File/Dir – This option utilizes Sysinternals Contig.exe to defrag one file at a time. When used on a directory structure, it defragments all files in that directory, and it’s subdirectories.
- Is DLL Loaded? – Uses Sysinternals ListDLLs to determine if the selected DLL file is loaded by any processes.
- Upload to Virus Total – Utilizes the Virus Total Uploader to upload the selected file to www.virustotal.com for analysis.