dissect.target 3.17.dev37__py3-none-any.whl → 3.18.dev2__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (47) hide show
  1. dissect/target/exceptions.py +4 -0
  2. dissect/target/loaders/raw.py +7 -0
  3. dissect/target/plugins/apps/av/mcafee.py +3 -0
  4. dissect/target/plugins/apps/av/sophos.py +6 -0
  5. dissect/target/plugins/apps/av/symantec.py +6 -0
  6. dissect/target/plugins/apps/av/trendmicro.py +6 -0
  7. dissect/target/plugins/apps/browser/chromium.py +12 -0
  8. dissect/target/plugins/apps/browser/firefox.py +13 -1
  9. dissect/target/plugins/apps/browser/iexplore.py +6 -0
  10. dissect/target/plugins/os/unix/linux/cmdline.py +3 -0
  11. dissect/target/plugins/os/unix/linux/environ.py +3 -0
  12. dissect/target/plugins/os/unix/linux/processes.py +3 -0
  13. dissect/target/plugins/os/unix/linux/sockets.py +15 -0
  14. dissect/target/plugins/os/unix/log/atop.py +3 -0
  15. dissect/target/plugins/os/windows/activitiescache.py +3 -0
  16. dissect/target/plugins/os/windows/catroot.py +6 -0
  17. dissect/target/plugins/os/windows/lnk.py +3 -0
  18. dissect/target/plugins/os/windows/log/etl.py +9 -0
  19. dissect/target/plugins/os/windows/log/evt.py +3 -0
  20. dissect/target/plugins/os/windows/log/evtx.py +3 -0
  21. dissect/target/plugins/os/windows/log/pfro.py +3 -0
  22. dissect/target/plugins/os/windows/log/schedlgu.py +5 -2
  23. dissect/target/plugins/os/windows/prefetch.py +6 -0
  24. dissect/target/plugins/os/windows/recyclebin.py +3 -0
  25. dissect/target/plugins/os/windows/regf/appxdebugkeys.py +3 -0
  26. dissect/target/plugins/os/windows/regf/bam.py +3 -0
  27. dissect/target/plugins/os/windows/regf/clsid.py +3 -0
  28. dissect/target/plugins/os/windows/regf/firewall.py +3 -0
  29. dissect/target/plugins/os/windows/regf/muicache.py +3 -0
  30. dissect/target/plugins/os/windows/regf/recentfilecache.py +3 -0
  31. dissect/target/plugins/os/windows/regf/regf.py +6 -0
  32. dissect/target/plugins/os/windows/regf/runkeys.py +3 -0
  33. dissect/target/plugins/os/windows/regf/shimcache.py +3 -0
  34. dissect/target/plugins/os/windows/regf/trusteddocs.py +3 -0
  35. dissect/target/plugins/os/windows/regf/usb.py +3 -0
  36. dissect/target/plugins/os/windows/regf/userassist.py +3 -0
  37. dissect/target/plugins/os/windows/sam.py +3 -0
  38. dissect/target/plugins/os/windows/services.py +3 -0
  39. dissect/target/plugins/os/windows/wer.py +3 -0
  40. dissect/target/target.py +6 -1
  41. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/METADATA +1 -1
  42. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/RECORD +47 -47
  43. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/COPYRIGHT +0 -0
  44. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/LICENSE +0 -0
  45. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/WHEEL +0 -0
  46. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/entry_points.txt +0 -0
  47. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/top_level.txt +0 -0
@@ -114,3 +114,7 @@ class RegistryCorruptError(RegistryError):
114
114
 
115
115
  class ConfigurationParsingError(Error):
116
116
  """An error occurred during configuration parsing."""
117
+
118
+
119
+ class TargetPathNotFoundError(TargetError):
120
+ """The path to the target does not exist."""
@@ -1,6 +1,7 @@
1
1
  from pathlib import Path
2
2
 
3
3
  from dissect.target import container
4
+ from dissect.target.exceptions import TargetPathNotFoundError
4
5
  from dissect.target.loader import Loader
5
6
  from dissect.target.target import Target
6
7
 
@@ -8,6 +9,12 @@ from dissect.target.target import Target
8
9
  class RawLoader(Loader):
9
10
  """Load raw container files such as disk images."""
10
11
 
12
+ def __init__(self, path: Path, **kwargs):
13
+ if not path.exists():
14
+ raise TargetPathNotFoundError("Provided target path does not exist")
15
+
16
+ super().__init__(path, **kwargs)
17
+
11
18
  @staticmethod
12
19
  def detect(path: Path) -> bool:
13
20
  return not path.is_dir()
@@ -71,6 +71,9 @@ class McAfeePlugin(Plugin):
71
71
  """Return msc log history records from McAfee.
72
72
 
73
73
  Yields McAfeeMscLogRecord with the following fields:
74
+
75
+ .. code-block:: text
76
+
74
77
  hostname (string): The target hostname.
75
78
  domain (string): The target domain.
76
79
  ts (datetime): timestamp.
@@ -56,6 +56,9 @@ class SophosPlugin(Plugin):
56
56
  """Return alert log records from Sophos Hitman Pro/Alert.
57
57
 
58
58
  Yields HitmanAlertRecord with the following fields:
59
+
60
+ .. code-block:: text
61
+
59
62
  ts (datetime): Timestamp.
60
63
  alert (string): Type of Alert.
61
64
  description (string): Short description of the alert.
@@ -85,6 +88,9 @@ class SophosPlugin(Plugin):
85
88
  """Return log history records from Sophos Home.
86
89
 
87
90
  Yields SophosLogRecord with the following fields:
91
+
92
+ .. code-block:: text
93
+
88
94
  ts (datetime): Timestamp.
89
95
  description (string): Short description of the alert.
90
96
  path (path): Path to the infected file (if available).
@@ -293,6 +293,9 @@ class SymantecPlugin(Plugin):
293
293
  """Return log records.
294
294
 
295
295
  Yields SEPLogRecord with the following fields:
296
+
297
+ .. code-block:: text
298
+
296
299
  ts (datetime): Timestamp associated with the event.
297
300
  virus (string): Name of the virus.
298
301
  user (string): Name of the user associated with the event.
@@ -326,6 +329,9 @@ class SymantecPlugin(Plugin):
326
329
  """Return log firewall records.
327
330
 
328
331
  Yields SEPFirewallRecord with the following fields:
332
+
333
+ .. code-block:: text
334
+
329
335
  ts (datetime): Timestamp associated with the event.
330
336
  protocol (string): Protocol name associated with the firewall record.
331
337
  local_ip ("net.ipaddress"): Local IP address associated with the event.
@@ -71,6 +71,9 @@ class TrendMicroPlugin(Plugin):
71
71
  """Return Trend Micro Worry-free log history records.
72
72
 
73
73
  Yields TrendMicroWFLogRecord with the following fields:
74
+
75
+ .. code-block:: text
76
+
74
77
  hostname (string): The target hostname.
75
78
  domain (string): The target domain.
76
79
  ts (datetime): timestamp.
@@ -94,6 +97,9 @@ class TrendMicroPlugin(Plugin):
94
97
  """Return Trend Micro Worry-free firewall log history records.
95
98
 
96
99
  Yields TrendMicroWFFirewallRecord with the following fields:
100
+
101
+ .. code-block:: text
102
+
97
103
  hostname (string): The target hostname.
98
104
  domain (string): The target domain.
99
105
  ts (datetime): timestamp.
@@ -148,6 +148,9 @@ class ChromiumMixin:
148
148
  browser_name: The name of the browser as a string.
149
149
 
150
150
  Yields:
151
+
152
+ .. code-block:: text
153
+
151
154
  Records with the following fields:
152
155
  ts (datetime): Visit timestamp.
153
156
  browser (string): The browser from which the records are generated from.
@@ -209,6 +212,9 @@ class ChromiumMixin:
209
212
  browser_name: The name of the browser as a string.
210
213
 
211
214
  Yields:
215
+
216
+ .. code-block:: text
217
+
212
218
  Records with the following fields:
213
219
  ts_created (datetime): Cookie created timestamp.
214
220
  ts_last_accessed (datetime): Cookie last accessed timestamp.
@@ -284,6 +290,9 @@ class ChromiumMixin:
284
290
  browser_name: The name of the browser as a string.
285
291
 
286
292
  Yields:
293
+
294
+ .. code-block:: text
295
+
287
296
  Records with the following fields:
288
297
  ts_start (datetime): Download start timestamp.
289
298
  ts_end (datetime): Download end timestamp.
@@ -344,6 +353,9 @@ class ChromiumMixin:
344
353
  browser_name (str): Name of the browser to scan for extensions.
345
354
 
346
355
  Yields:
356
+
357
+ .. code-block:: text
358
+
347
359
  Records with the following fields:
348
360
  ts_install (datetime): Extension install timestamp.
349
361
  ts_update (datetime): Extension update timestamp.
@@ -132,6 +132,9 @@ class FirefoxPlugin(BrowserPlugin):
132
132
  """Return browser history records from Firefox.
133
133
 
134
134
  Yields BrowserHistoryRecord with the following fields:
135
+
136
+ .. code-block:: text
137
+
135
138
  ts (datetime): Visit timestamp.
136
139
  browser (string): The browser from which the records are generated from.
137
140
  id (string): Record ID.
@@ -193,6 +196,9 @@ class FirefoxPlugin(BrowserPlugin):
193
196
  browser_name: The name of the browser as a string.
194
197
 
195
198
  Yields:
199
+
200
+ .. code-block:: text
201
+
196
202
  Records with the following fields:
197
203
  ts_created (datetime): Cookie created timestamp.
198
204
  ts_last_accessed (datetime): Cookie last accessed timestamp.
@@ -232,6 +238,9 @@ class FirefoxPlugin(BrowserPlugin):
232
238
  """Return browser download records from Firefox.
233
239
 
234
240
  Yields BrowserDownloadRecord with the following fields:
241
+
242
+ .. code-block:: text
243
+
235
244
  ts_start (datetime): Download start timestamp.
236
245
  ts_end (datetime): Download end timestamp.
237
246
  browser (string): The browser from which the records are generated from.
@@ -315,7 +324,10 @@ class FirefoxPlugin(BrowserPlugin):
315
324
  def extensions(self) -> Iterator[BrowserExtensionRecord]:
316
325
  """Return browser extension records for Firefox.
317
326
 
318
- Yields BrowserExtensionRecord with the following fields::
327
+ Yields BrowserExtensionRecord with the following fields:
328
+
329
+ .. code-block:: text
330
+
319
331
  ts_install (datetime): Extension install timestamp.
320
332
  ts_update (datetime): Extension update timestamp.
321
333
  browser (string): The browser from which the records are generated.
@@ -131,6 +131,9 @@ class InternetExplorerPlugin(BrowserPlugin):
131
131
  """Return browser history records from Internet Explorer.
132
132
 
133
133
  Yields BrowserHistoryRecord with the following fields:
134
+
135
+ .. code-block:: text
136
+
134
137
  ts (datetime): Visit timestamp.
135
138
  browser (string): The browser from which the records are generated from.
136
139
  id (string): Record ID.
@@ -183,6 +186,9 @@ class InternetExplorerPlugin(BrowserPlugin):
183
186
  """Return browser downloads records from Internet Explorer.
184
187
 
185
188
  Yields BrowserDownloadRecord with the following fields:
189
+
190
+ .. code-block:: text
191
+
186
192
  ts_start (datetime): Download start timestamp.
187
193
  ts_end (datetime): Download end timestamp.
188
194
  browser (string): The browser from which the records are generated from.
@@ -29,6 +29,9 @@ class CmdlinePlugin(Plugin):
29
29
  Think of this output as the command line that the process wants you to see.
30
30
 
31
31
  Yields CmdlineRecord with the following fields:
32
+
33
+ .. code-block:: text
34
+
32
35
  hostname (string): The target hostname.
33
36
  domain (string): The target domain.
34
37
  ts (datetime): The starttime of the process.
@@ -27,6 +27,9 @@ class EnvironPlugin(Plugin):
27
27
  the environ(7) variable directly), this plugin will not reflect those changes.
28
28
 
29
29
  Yields EnvironmentVariableRecord with the following fields:
30
+
31
+ .. code-block:: text
32
+
30
33
  hostname (string): The target hostname.
31
34
  domain (string): The target domain.
32
35
  ts (datetime): The modification timestamp of the processes' environ file.
@@ -29,6 +29,9 @@ class ProcProcesses(Plugin):
29
29
  Each ``/proc/[pid]`` subdirectory contains various pseudo-files.
30
30
 
31
31
  Yields ProcProcessRecord with the following fields:
32
+
33
+ .. code-block:: text
34
+
32
35
  hostname (string): The target hostname.
33
36
  domain (string): The target domain.
34
37
  ts (datetime): The start time of the process.
@@ -78,6 +78,9 @@ class NetSocketPlugin(Plugin):
78
78
  """This plugin yields the packet sockets and available stats associated with them.
79
79
 
80
80
  Yields PacketSocketRecord with the following fields:
81
+
82
+ .. code-block:: text
83
+
81
84
  hostname (string): The target hostname.
82
85
  domain (string): The target domain.
83
86
  protocol (int): The captured protocol i.e. 0003 is ETH_P_ALL
@@ -101,6 +104,9 @@ class NetSocketPlugin(Plugin):
101
104
  """This plugin yields the unix sockets and available stats associated with them.
102
105
 
103
106
  Yields UnixSocketRecord with the following fields:
107
+
108
+ .. code-block:: text
109
+
104
110
  hostname (string): The target hostname.
105
111
  domain (string): The target domain.
106
112
  protocol (string): The protocol used by the socket.
@@ -117,6 +123,9 @@ class NetSocketPlugin(Plugin):
117
123
  """This plugin yields the raw and raw6 sockets and available stats associated with them.
118
124
 
119
125
  Yields NetSocketRecord with the following fields:
126
+
127
+ .. code-block:: text
128
+
120
129
  hostname (string): The target hostname.
121
130
  domain (string): The target domain.
122
131
  protocol (string): The protocol used by the socket.
@@ -140,6 +149,9 @@ class NetSocketPlugin(Plugin):
140
149
  """This plugin yields the udp and udp6 sockets and available stats associated with them.
141
150
 
142
151
  Yields NetSocketRecord with the following fields:
152
+
153
+ .. code-block:: text
154
+
143
155
  hostname (string): The target hostname.
144
156
  domain (string): The target domain.
145
157
  protocol (string): The protocol used by the socket.
@@ -163,6 +175,9 @@ class NetSocketPlugin(Plugin):
163
175
  """This plugin yields the tcp and tcp6 sockets and available stats associated with them.
164
176
 
165
177
  Yields NetSocketRecord with the following fields:
178
+
179
+ .. code-block:: text
180
+
166
181
  hostname (string): The target hostname.
167
182
  domain (string): The target domain.
168
183
  protocol (string): The protocol used by the socket.
@@ -270,6 +270,9 @@ class AtopPlugin(Plugin):
270
270
  - https://diablohorn.com/2022/11/17/parsing-atop-files-with-python-dissect-cstruct/
271
271
 
272
272
  Yields AtopRecord with fields:
273
+
274
+ .. code-block:: text
275
+
273
276
  hostname (string): The target hostname.
274
277
  process (string): The process name.
275
278
  cmdline (string): The command-line of the process.
@@ -77,6 +77,9 @@ class ActivitiesCachePlugin(Plugin):
77
77
  - https://salt4n6.com/2018/05/03/windows-10-timeline-forensic-artefacts/
78
78
 
79
79
  Yields ActivitiesCacheRecords with the following fields:
80
+
81
+ .. code-block:: text
82
+
80
83
  hostname (string): The target hostname.
81
84
  domain (string): The target domain.
82
85
  start_time (datetime): StartTime field.
@@ -105,6 +105,9 @@ class CatrootPlugin(Plugin):
105
105
  - https://docs.microsoft.com/en-us/windows-hardware/drivers/install/catalog-files
106
106
 
107
107
  Yields CatrootRecords with the following fields:
108
+
109
+ .. code-block:: text
110
+
108
111
  hostname (string): The target hostname.
109
112
  domain (string): The target domain.
110
113
  digest (digest): The parsed digest.
@@ -210,6 +213,9 @@ class CatrootPlugin(Plugin):
210
213
  - https://docs.microsoft.com/en-us/windows-hardware/drivers/install/catalog-files
211
214
 
212
215
  Yields CatrootRecords with the following fields:
216
+
217
+ .. code-block:: text
218
+
213
219
  hostname (string): The target hostname.
214
220
  domain (string): The target domain.
215
221
  digest (digest): The parsed digest.
@@ -51,6 +51,9 @@ class LnkPlugin(Plugin):
51
51
  """Parse all .lnk files in /ProgramData, /Users, and /Windows or from a specified path in record format.
52
52
 
53
53
  Yields a LnkRecord record with the following fields:
54
+
55
+ .. code-block:: text
56
+
54
57
  lnk_path (path): Path of the link (.lnk) file.
55
58
  lnk_name (string): Name of the link (.lnk) file.
56
59
  lnk_mtime (datetime): Modification time of the link (.lnk) file.
@@ -122,6 +122,9 @@ class EtlPlugin(Plugin):
122
122
 
123
123
  Yields dynamically created records based on the fields inside an ETL event.
124
124
  At least contains the following fields:
125
+
126
+ .. code-block:: text
127
+
125
128
  hostname (string): The target hostname.
126
129
  domain (string): The target domain.
127
130
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -140,6 +143,9 @@ class EtlPlugin(Plugin):
140
143
 
141
144
  Yields dynamically created records based on the fields inside an ETL event.
142
145
  At least contains the following fields:
146
+
147
+ .. code-block:: text
148
+
143
149
  hostname (string): The target hostname.
144
150
  domain (string): The target domain.
145
151
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -157,6 +163,9 @@ class EtlPlugin(Plugin):
157
163
 
158
164
  Yields dynamically created records based on the fields inside an ETL event.
159
165
  At least contains the following fields:
166
+
167
+ .. code-block:: text
168
+
160
169
  hostname (string): The target hostname.
161
170
  domain (string): The target domain.
162
171
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -125,6 +125,9 @@ class EvtPlugin(WindowsEventlogsMixin, plugin.Plugin):
125
125
 
126
126
  Yields dynamically created records based on the fields in the event.
127
127
  At least contains the following fields:
128
+
129
+ .. code-block:: text
130
+
128
131
  hostname (string): The target hostname.
129
132
  domain (string): The target domain.
130
133
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -47,6 +47,9 @@ class EvtxPlugin(WindowsEventlogsMixin, plugin.Plugin):
47
47
 
48
48
  Yields dynamically created records based on the fields in the event.
49
49
  At least contains the following fields:
50
+
51
+ .. code-block:: text
52
+
50
53
  hostname (string): The target hostname.
51
54
  domain (string): The target domain.
52
55
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -41,6 +41,9 @@ class PfroPlugin(Plugin):
41
41
  - https://community.ccleaner.com/topic/49106-pending-file-rename-operations-log/
42
42
 
43
43
  Yields PfroRecords with fields:
44
+
45
+ .. code-block:: text
46
+
44
47
  hostname (string): The target hostname.
45
48
  domain (string): The target domain.
46
49
  ts (datetime): The parsed timestamp.
@@ -129,9 +129,12 @@ class SchedLgUPlugin(Plugin):
129
129
 
130
130
  Adversaries may use malicious ``.job`` files to gain persistence on a system.
131
131
 
132
- Yield:
132
+ Yields SchedLgURecord with fields:
133
+
134
+ .. code-block:: text
135
+
133
136
  ts (datetime): The timestamp of the event.
134
- job (str): The name of the ``.job`` file.
137
+ job (str): The name of the .job file.
135
138
  command (str): The command executed.
136
139
  status (str): The status of the event (finished, completed, exited, stopped).
137
140
  exit_code (int): The exit code of the event.
@@ -258,6 +258,9 @@ class PrefetchPlugin(Plugin):
258
258
  - https://www.geeksforgeeks.org/prefetch-files-in-windows/
259
259
 
260
260
  Yields PrefetchRecords with fields:
261
+
262
+ .. code-block:: text
263
+
261
264
  hostname (string): The target hostname.
262
265
  domain (string): The target domain.
263
266
  ts (datetime): Run timestamp.
@@ -269,6 +272,9 @@ class PrefetchPlugin(Plugin):
269
272
  with --grouped:
270
273
 
271
274
  Yields PrefetchRecords with fields:
275
+
276
+ .. code-block:: text
277
+
272
278
  hostname (string): The target hostname.
273
279
  domain (string): The target domain.
274
280
  ts (datetime): Run timestamp.
@@ -66,6 +66,9 @@ class RecyclebinPlugin(Plugin):
66
66
  Return files located in the recycle bin ($Recycle.Bin).
67
67
 
68
68
  Yields RecycleBinRecords with fields:
69
+
70
+ .. code-block:: text
71
+
69
72
  hostname (string): The target hostname
70
73
  domain (string): The target domain
71
74
  ts (datetime): The time of deletion
@@ -86,6 +86,9 @@ class AppxDebugKeysPlugin(Plugin):
86
86
  - https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/
87
87
 
88
88
  Yields AppXDebugKeyRecords with fields:
89
+
90
+ .. code-block:: text
91
+
89
92
  hostname (string): The target hostname.
90
93
  domain (string): The target domain.
91
94
  ts (datetime): The registry key last modified timestamp.
@@ -41,6 +41,9 @@ class BamDamPlugin(Plugin):
41
41
  """Parse bam and dam registry keys.
42
42
 
43
43
  Yields BamDamRecords with fields:
44
+
45
+ .. code-block:: text
46
+
44
47
  hostname (string): The target hostname.
45
48
  domain (string): The target domain.
46
49
  ts (datetime): The parsed timestamp.
@@ -55,6 +55,9 @@ class CLSIDPlugin(Plugin):
55
55
  HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\CLSID.
56
56
 
57
57
  Yields CLSIDRecords with fields:
58
+
59
+ .. code-block:: text
60
+
58
61
  hostname (string): The target hostname.
59
62
  domain (string): The target domain.
60
63
  ts (datetime): Last modified timestamp of the registry key.
@@ -26,6 +26,9 @@ class FirewallPlugin(Plugin):
26
26
  HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules registry key.
27
27
 
28
28
  Yields dynamic records with usually the following fields:
29
+
30
+ .. code-block:: text
31
+
29
32
  hostname (string): The target hostname.
30
33
  domain (string): The target domain.
31
34
  key (string): The rule key name.
@@ -48,6 +48,9 @@ class MuiCachePlugin(Plugin):
48
48
  - https://forensafe.com/blogs/muicache.html
49
49
 
50
50
  Yields MuiCacheRecords with fields:
51
+
52
+ .. code-block:: text
53
+
51
54
  hostname (string): The target hostname.
52
55
  domain (string): The target domain.
53
56
  index (varint): The index of the entry.
@@ -45,6 +45,9 @@ class RecentFileCachePlugin(Plugin):
45
45
  """Parse RecentFileCache.bcf.
46
46
 
47
47
  Yields RecentFileCacheRecords with fields:
48
+
49
+ .. code-block:: text
50
+
48
51
  hostname (string): The target hostname.
49
52
  domain (string): The target domain.
50
53
  path (uri): The parsed path.
@@ -49,6 +49,9 @@ class RegfPlugin(Plugin):
49
49
  Yields RegistryKeyRecords and RegistryValueRecords
50
50
 
51
51
  RegistryKeyRecord fields:
52
+
53
+ .. code-block:: text
54
+
52
55
  hostname (string): The target hostname.
53
56
  domain (string): The target domain.
54
57
  ts (datetime): The registry key last modified time.
@@ -57,6 +60,9 @@ class RegfPlugin(Plugin):
57
60
  source (string): The hive file path.
58
61
 
59
62
  RegistryValueRecord fields:
63
+
64
+ .. code-block:: text
65
+
60
66
  hostname (string): The target hostname.
61
67
  domain (string): The target domain.
62
68
  ts (datetime): The registry key last modified time.
@@ -61,6 +61,9 @@ class RunKeysPlugin(Plugin):
61
61
  - https://docs.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys
62
62
 
63
63
  Yields RunKeyRecords with fields:
64
+
65
+ .. code-block:: text
66
+
64
67
  hostname (string): The target hostname.
65
68
  domain (string): The target domain.
66
69
  ts (datetime): The registry key last modified timestamp.
@@ -318,6 +318,9 @@ class ShimcachePlugin(Plugin):
318
318
  - https://www.andreafortuna.org/2017/10/16/amcache-and-shimcache-in-forensic-analysis/
319
319
 
320
320
  Yields ShimcacheRecords with the following fields:
321
+
322
+ .. code-block:: text
323
+
321
324
  hostname (string): The target hostname.
322
325
  domain (string): The target domain.
323
326
  last_modified (datetime): The last modified date.
@@ -61,6 +61,9 @@ class TrustedDocumentsPlugin(Plugin):
61
61
 
62
62
  Yields records based on the values within the TrustRecords registry keys.
63
63
  At least contains the following fields:
64
+
65
+ .. code-block:: text
66
+
64
67
  application (string): Application name of the Office product that produced the TrustRecords registry key.
65
68
  document_path (path): Path to the document for which a TrustRecords entry is created.
66
69
  ts (datetime): The created time of the TrustRecord registry key.
@@ -93,6 +93,9 @@ class UsbPlugin(Plugin):
93
93
  HKLM\\SYSTEM\\CurrentControlSet\\Enum\\USBSTOR registry key.
94
94
 
95
95
  Yields UsbRegistryRecord with fields:
96
+
97
+ .. code-block:: text
98
+
96
99
  hostname (string): The target hostname
97
100
  domain (string): The target domain
98
101
  type (string): Type of USB device
@@ -72,6 +72,9 @@ class UserAssistPlugin(Plugin):
72
72
  - https://www.aldeid.com/wiki/Windows-userassist-keys
73
73
 
74
74
  Yields UserAssistRecords with fields:
75
+
76
+ .. code-block:: text
77
+
75
78
  hostname (string): The target hostname.
76
79
  domain (string): The target domain.
77
80
  ts (datetime): The entry timestamp.
@@ -356,6 +356,9 @@ class SamPlugin(Plugin):
356
356
  - https://en.wikipedia.org/wiki/Security_Account_Manager
357
357
 
358
358
  Yields SamRecords with fields:
359
+
360
+ .. code-block:: text
361
+
359
362
  rid (uint32): The RID.
360
363
  fullname (string): Parsed fullname.
361
364
  username (string): Parsed username.
@@ -72,6 +72,9 @@ class ServicesPlugin(Plugin):
72
72
  - https://artifacts-kb.readthedocs.io/en/latest/sources/windows/ServicesAndDrivers.html
73
73
 
74
74
  Yields ServiceRecords with fields:
75
+
76
+ .. code-block:: text
77
+
75
78
  hostname (string): The target hostname.
76
79
  domain (string): The target domain.
77
80
  ts (datatime): The last modified timestamp of the registry key.
@@ -155,6 +155,9 @@ class WindowsErrorReportingPlugin(Plugin):
155
155
 
156
156
  Yields dynamically created records based on the fields in the files. A record at least contains the following
157
157
  fields:
158
+
159
+ .. code-block:: text
160
+
158
161
  ts (datetime): The moment in time when the error event took place.
159
162
  version (string): WER file version.
160
163
  event_type (string): WER file event type.
dissect/target/target.py CHANGED
@@ -14,6 +14,7 @@ from dissect.target.exceptions import (
14
14
  PluginError,
15
15
  PluginNotFoundError,
16
16
  TargetError,
17
+ TargetPathNotFoundError,
17
18
  UnsupportedPluginError,
18
19
  VolumeSystemError,
19
20
  )
@@ -284,7 +285,11 @@ class Target:
284
285
  try:
285
286
  ldr = loader_cls(sub_entry, parsed_path=parsed_path)
286
287
  except Exception as e:
287
- getlogger(sub_entry).error("Failed to initiate loader: %s", e)
288
+ message = "Failed to initiate loader: %s"
289
+ if isinstance(e, TargetPathNotFoundError):
290
+ message = "%s"
291
+
292
+ getlogger(sub_entry).error(message, e)
288
293
  getlogger(sub_entry).debug("", exc_info=e)
289
294
  continue
290
295
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: dissect.target
3
- Version: 3.17.dev37
3
+ Version: 3.18.dev2
4
4
  Summary: This module ties all other Dissect modules together, it provides a programming API and command line tools which allow easy access to various data sources inside disk images or file collections (a.k.a. targets)
5
5
  Author-email: Dissect Team <dissect@fox-it.com>
6
6
  License: Affero General Public License v3
@@ -1,11 +1,11 @@
1
1
  dissect/target/__init__.py,sha256=Oc7ounTgq2hE4nR6YcNabetc7SQA40ldSa35VEdZcQU,63
2
2
  dissect/target/container.py,sha256=0YcwcGmfJjhPXUB6DEcjWEoSuAtTDxMDpoTviMrLsxM,9353
3
- dissect/target/exceptions.py,sha256=VVW_Rq_vQinapz-2mbJ3UkxBEZpb2pE_7JlhMukdtrY,2877
3
+ dissect/target/exceptions.py,sha256=ULi7NXlqju_d8KENEL3aimmfKTFfbNssfeWhAnOB654,2972
4
4
  dissect/target/filesystem.py,sha256=1i-lToeTX-HgQXQOYxPXH-90M_eq43W4FFzNDRdpgpk,60094
5
5
  dissect/target/loader.py,sha256=hjKInZAEcv43RiqxZJ0yBI4Y2YZ2-nrsKWu_BKrgba4,7336
6
6
  dissect/target/plugin.py,sha256=HAN8maaDt-Rlqt8Rr1IW7gXQpzNQZjCVz-i4aSPphSw,48677
7
7
  dissect/target/report.py,sha256=06uiP4MbNI8cWMVrC1SasNS-Yg6ptjVjckwj8Yhe0Js,7958
8
- dissect/target/target.py,sha256=jq0Ii8073GOfwfqRj7UMuJT5jTVvQ_FD9Vrl9TMGpVc,32180
8
+ dissect/target/target.py,sha256=8vg0VdEQuy5Ih5ewlm0b64o3HcJq_Nley4Ygyp2fLI4,32362
9
9
  dissect/target/volume.py,sha256=aQZAJiny8jjwkc9UtwIRwy7nINXjCxwpO-_UDfh6-BA,15801
10
10
  dissect/target/containers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
11
11
  dissect/target/containers/asdf.py,sha256=DJp0QEFwUjy2MFwKYcYqIR_BS1fQT1Yi9Kcmqt0aChM,1366
@@ -95,7 +95,7 @@ dissect/target/loaders/phobos.py,sha256=XtxF7FZXfZrXJruFUZUQzxlREyfc86dTxph7BNoN
95
95
  dissect/target/loaders/profile.py,sha256=5ylgmzEEGyBFW3izvb-BZ7dGByXN9OFyRnnggR98P9w,1667
96
96
  dissect/target/loaders/pvm.py,sha256=b-PvHNTbRVdOnf7-OR5dbikbDTCFlW85b-9Z8PEL2Cs,406
97
97
  dissect/target/loaders/pvs.py,sha256=dMqdYSBQtH9QLM3tdu0mokLBcn73edg_HUtYtqrdi6E,955
98
- dissect/target/loaders/raw.py,sha256=wfi1qnmLritNfBOqJbyEjsb2C8RjAZHO8IJ9R3XaNjI,412
98
+ dissect/target/loaders/raw.py,sha256=tleNWoO0BkC32ExBIPVOpzrQHXXHChZXoZr02oYuC8A,674
99
99
  dissect/target/loaders/remote.py,sha256=4cGCQfBwuhh5vo0zgVCK8V3I0w9SSWX3AjbW9eebPRg,9512
100
100
  dissect/target/loaders/res.py,sha256=8b178x05t9K31wOeP8yGD1IdR3RpiMGz7wcvtHmmHjk,8819
101
101
  dissect/target/loaders/smb.py,sha256=qP8m4Jq7hvAvUCF9jB4yr2Zut7p_R02_vxziNN3R1to,13070
@@ -114,18 +114,18 @@ dissect/target/loaders/xva.py,sha256=WmqdM9qGrZcChx0PiiTLyMTSatJIy_ItGO9cPMALQSE
114
114
  dissect/target/plugins/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
115
115
  dissect/target/plugins/apps/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
116
116
  dissect/target/plugins/apps/av/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
117
- dissect/target/plugins/apps/av/mcafee.py,sha256=4lro9iwcL2Vl9Lyy69Sk1D9JWSRTXv5yjpV6NJbbZXE,5409
118
- dissect/target/plugins/apps/av/sophos.py,sha256=gSfTvjBZMuT0hsL-p4oYxuYmakbqApoOYvL0lKYkSV4,4102
119
- dissect/target/plugins/apps/av/symantec.py,sha256=RFLyNW6FyuoGcirJ4xHbQM8oGjua9W4zXmC7YDF-H20,14109
120
- dissect/target/plugins/apps/av/trendmicro.py,sha256=jloy_N4hHAqF1sVIEeD5Q7LRYal3_os14Umk-hGaAR4,4613
117
+ dissect/target/plugins/apps/av/mcafee.py,sha256=YWrsB5kQFtXfhqi6mdMPMVk2qh_KCiOBiaTnbj8mVrM,5440
118
+ dissect/target/plugins/apps/av/sophos.py,sha256=TuO-ggdD5De0UTouzNF7-1iLULIOvr6FDktocnM0aF0,4164
119
+ dissect/target/plugins/apps/av/symantec.py,sha256=I1_zZ2ihKptB2JJ7sYZ7df0AgtK3KhWPsbDkc2m_hPA,14171
120
+ dissect/target/plugins/apps/av/trendmicro.py,sha256=ZhxL4IkzyHfR2xaNIzk-M-v-ITMuLG_yqq_0djqGMjU,4675
121
121
  dissect/target/plugins/apps/browser/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
122
122
  dissect/target/plugins/apps/browser/brave.py,sha256=EW1ubL10swHeV9CscfpE-SrNZozul_Ewj48LNRaG5Kg,2865
123
123
  dissect/target/plugins/apps/browser/browser.py,sha256=rBIwcgdl73gm-8APwx2jEUAYXRniXkqcdMr2UYj_tS8,4118
124
124
  dissect/target/plugins/apps/browser/chrome.py,sha256=hxS8gqpBwoCrPaxNpllIa6K9DtsSGzn6XXcUaHyes6w,3048
125
- dissect/target/plugins/apps/browser/chromium.py,sha256=1oaQhMN5mJysw0VIVpTEmRCAifgv-mUQxZwrGmGHqAQ,27875
125
+ dissect/target/plugins/apps/browser/chromium.py,sha256=N9hS-a45iEv_GyKhLZQR_FSkEjWlMA0f22eURBuxF5Y,27999
126
126
  dissect/target/plugins/apps/browser/edge.py,sha256=woXzZtHPWmfcV8vbxGKHELKru5JRb32MAXs43_b4K4E,2883
127
- dissect/target/plugins/apps/browser/firefox.py,sha256=Msicw-13AJWbXRRF6m_p4L84rXAjsIYGFRve29cPY2M,30806
128
- dissect/target/plugins/apps/browser/iexplore.py,sha256=MqMonoaM5lj0ZFqGwS4F-P1eLmnLvX7VQGE9S3hxXag,8739
127
+ dissect/target/plugins/apps/browser/firefox.py,sha256=ROrzhI2SV81E63hi5PRtyJveRrBacWNJ9FWZS_ondlk,30929
128
+ dissect/target/plugins/apps/browser/iexplore.py,sha256=g_xw0toaiyjevxO8g9XPCOqc-CXZp39FVquRhPFGdTE,8801
129
129
  dissect/target/plugins/apps/container/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
130
130
  dissect/target/plugins/apps/container/docker.py,sha256=67Eih9AfUbqsP-HlnlwoHi4rSAnVCZWM76sEyO_1m18,15316
131
131
  dissect/target/plugins/apps/remoteaccess/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
@@ -211,15 +211,15 @@ dissect/target/plugins/os/unix/esxi/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQ
211
211
  dissect/target/plugins/os/unix/esxi/_os.py,sha256=8kFFK9986zN8hXmDUWwdQHtbV33nWKerRuisg_xbsoQ,17504
212
212
  dissect/target/plugins/os/unix/linux/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
213
213
  dissect/target/plugins/os/unix/linux/_os.py,sha256=YJYwuq_iAinOrPqTE49Q4DLYMWBeRCly1uTbDvPhp6Q,2796
214
- dissect/target/plugins/os/unix/linux/cmdline.py,sha256=XIvaTL42DzeQGhqHN_RTMI5g8hbI2_wjzb7KZ0kPOM0,1591
215
- dissect/target/plugins/os/unix/linux/environ.py,sha256=FDf3_bNbaL5Qltnp0Ch-t8tp_6Lv3v9HY54qE4RWO7M,1850
214
+ dissect/target/plugins/os/unix/linux/cmdline.py,sha256=AyMfndt3UsmJtoOyZYC8nWq2GZg9oPvn8SiI3M4NxnE,1622
215
+ dissect/target/plugins/os/unix/linux/environ.py,sha256=UOQD7Xmu754u2oAh3L5g5snuz-gv4jbWbVy46qszYjo,1881
216
216
  dissect/target/plugins/os/unix/linux/iptables.py,sha256=qTzY5PHHXA33WnPYb5NESgoSwI7ECZ8YPoEe_Fmln-8,6045
217
217
  dissect/target/plugins/os/unix/linux/modules.py,sha256=H1S5CkpXttCVwzE2Ylz3jkvrCptN2f-fXcQ_hCB0FG0,2443
218
218
  dissect/target/plugins/os/unix/linux/netstat.py,sha256=MAC4ZdeNqcKpxT2ZMh1-7rjt4Pt_WQIRy7RChr7nlPk,1649
219
219
  dissect/target/plugins/os/unix/linux/proc.py,sha256=jm35fAasnNbObN2tpflwQuCfVYLDkTP2EDrzYG42ZSk,23354
220
- dissect/target/plugins/os/unix/linux/processes.py,sha256=sTQqZYPW-_gs7Z3f0wwsV6clUX4NK44GGyMiZToBIrg,1936
220
+ dissect/target/plugins/os/unix/linux/processes.py,sha256=rvDJWAp16WAJZ91A8_GJJIj5y0U7BNnU8CW_47AueKY,1967
221
221
  dissect/target/plugins/os/unix/linux/services.py,sha256=-d2y073mOXUM3XCzRgDVCRFR9eTLoVuN8FsZVewHzRg,4075
222
- dissect/target/plugins/os/unix/linux/sockets.py,sha256=11de73KiF2D2s1eyPBA4EWDpNsEzOunbj3YqSlMYZ2Y,9765
222
+ dissect/target/plugins/os/unix/linux/sockets.py,sha256=CXstlQt0tLcVSpvi0xOXJu580O6BGUBW3lJQt20aMUw,9920
223
223
  dissect/target/plugins/os/unix/linux/android/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
224
224
  dissect/target/plugins/os/unix/linux/android/_os.py,sha256=trmESlpHdwVu7wV18RevEhh_TsVyfKPFCd5Usb5-fSU,2056
225
225
  dissect/target/plugins/os/unix/linux/debian/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
@@ -245,7 +245,7 @@ dissect/target/plugins/os/unix/locate/locate.py,sha256=uXFcWAqoz_3eNWHhsGoEtkkhm
245
245
  dissect/target/plugins/os/unix/locate/mlocate.py,sha256=DhrFgxDQF-fMZaA0WK8Z-5o9i9iDsuTHW7MHJtWwz6o,4485
246
246
  dissect/target/plugins/os/unix/locate/plocate.py,sha256=Skb24ba_MVzM4nuDaZHw-ZmomIEZ3TJ7g5kHCvQViko,6545
247
247
  dissect/target/plugins/os/unix/log/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
248
- dissect/target/plugins/os/unix/log/atop.py,sha256=UmaqdnSmE8AO8bEj4drGSc1HH2n4Pdlxpwfa7RgraIY,16314
248
+ dissect/target/plugins/os/unix/log/atop.py,sha256=DdiTf-gVJJvvPbR36khU4388lxQzABaWI-95jLCGgSw,16345
249
249
  dissect/target/plugins/os/unix/log/audit.py,sha256=OjorWTmCFvCI5RJq6m6WNW0Lhb-poB2VAggKOGZUHK4,3722
250
250
  dissect/target/plugins/os/unix/log/auth.py,sha256=l7gCuRdvv9gL0U1N0yrR9hVsMnr4t_k4t-n-f6PrOxg,2388
251
251
  dissect/target/plugins/os/unix/log/journal.py,sha256=eiNNVLmKWFj4dTQX8PNRNgKpVwzQWEHEsKyYfGUAPXQ,17376
@@ -254,10 +254,10 @@ dissect/target/plugins/os/unix/log/messages.py,sha256=CXA-SkMPLaCgnTQg9nzII-7tO8
254
254
  dissect/target/plugins/os/unix/log/utmp.py,sha256=21tvzG977LqzRShV6uAoU-83WDcLUrI_Tv__2ZVi9rw,7756
255
255
  dissect/target/plugins/os/windows/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
256
256
  dissect/target/plugins/os/windows/_os.py,sha256=g5XGtruvyWx4YAhMpGZnAaIFWQqLNQpee_Ot7ROmD8w,12606
257
- dissect/target/plugins/os/windows/activitiescache.py,sha256=yY41YdCZk9e97Q8_rjZHknMUeOVDxgBG9VtXQHANUsQ,6710
257
+ dissect/target/plugins/os/windows/activitiescache.py,sha256=Q2aILnhJ2rp2AwEbWwyBuSLjMbGqaYJTsavSbfkcFKE,6741
258
258
  dissect/target/plugins/os/windows/adpolicy.py,sha256=rvsvywChfms7d2kMwXRVHZaf8zJ46WmMwYplGAYEax8,6984
259
259
  dissect/target/plugins/os/windows/amcache.py,sha256=ZZNOs3bILTf0AGkDkhoatndl0j39DXkstN7oOyxJECU,27188
260
- dissect/target/plugins/os/windows/catroot.py,sha256=eSfVqXvWWZpXoxKB1FT_evjXXNmlD7wHhA3lYpfQDeQ,11043
260
+ dissect/target/plugins/os/windows/catroot.py,sha256=wHW_p4M0aFonZJ2xZFIbgLbJopdCIXO9jVrGPHLsMLc,11105
261
261
  dissect/target/plugins/os/windows/cim.py,sha256=jsrpu6TZpBUh7VWI9AV2Ib5bebTwsvqOwRfa5gjJd7c,3056
262
262
  dissect/target/plugins/os/windows/clfs.py,sha256=begVsZ-CY97Ksh6S1g03LjyBgu8ERY2hfNDWYPj0GXI,4872
263
263
  dissect/target/plugins/os/windows/credhist.py,sha256=FX_pW-tU9esdvDTSx913kf_CpGE_1jbD6bkjDb-cxHk,7069
@@ -265,21 +265,21 @@ dissect/target/plugins/os/windows/datetime.py,sha256=tuBOkewmbCW8sFXcYp5p82oM5RC
265
265
  dissect/target/plugins/os/windows/defender.py,sha256=Vp_IP6YKm4igR765WvXJrHQ3RMu7FJKM3VOoR8AybV8,23737
266
266
  dissect/target/plugins/os/windows/env.py,sha256=-u9F9xWy6PUbQmu5Tv_MDoVmy6YB-7CbHokIK_T3S44,13891
267
267
  dissect/target/plugins/os/windows/generic.py,sha256=BSvDPfB9faU0uquMj0guw5tnR_97Nn0XAEE4k05BFSQ,22273
268
- dissect/target/plugins/os/windows/lnk.py,sha256=6_ciURYTa-LpgpHJsixoFUqkfSATHkEbk0xKiIZDGPU,8148
268
+ dissect/target/plugins/os/windows/lnk.py,sha256=On1k0PODYggQM1j514qFepBACCV2Z2u61Q4Ba6e3Y2c,8179
269
269
  dissect/target/plugins/os/windows/locale.py,sha256=yXVdclpUqss9h8Nq7N4kg3OHwWGDfjdfiLiUZR3wqv8,2324
270
270
  dissect/target/plugins/os/windows/notifications.py,sha256=64xHHueHwtJCc8RTAF70oa0RxvqfCu_DBPWRSZBnYZc,17386
271
- dissect/target/plugins/os/windows/prefetch.py,sha256=5hRxdIP9sIV5Q9TAScMjLbl_mImZ37abvdE_pAd6rh4,10398
272
- dissect/target/plugins/os/windows/recyclebin.py,sha256=4GSj0Q3YvONufnqANbnG0ffiMQyToCiL5s35Wmu4JOQ,4898
271
+ dissect/target/plugins/os/windows/prefetch.py,sha256=bDoJOWRp6vIHe1lf9HXNuNg5iyh5YqVw9s0P562VfKo,10460
272
+ dissect/target/plugins/os/windows/recyclebin.py,sha256=7UFjZg1NHWJyfjthhMBpQd3kGG8ZXe7H4Cu9U3QzjOs,4929
273
273
  dissect/target/plugins/os/windows/registry.py,sha256=EfqUkgbzaqTuq1kIPYNG1TfvJxhJE5X-TEjV3K_xsPU,12814
274
- dissect/target/plugins/os/windows/sam.py,sha256=ESQjaCIC17mKSU2y4GlLzkzJbsMJECPYlnVES36InQA,15447
275
- dissect/target/plugins/os/windows/services.py,sha256=_6YkuoZD8LUxk72R3n1p1bOBab3A1wszdB1NuPavIGM,6037
274
+ dissect/target/plugins/os/windows/sam.py,sha256=NTL6dez30i_E3R0mNmnYXMYc62DHqICWvpXy9g_2RY0,15478
275
+ dissect/target/plugins/os/windows/services.py,sha256=MoVPJ1GKpPaJrGd2DYtuHEmKqC2uOKRc5SZKB12goSs,6068
276
276
  dissect/target/plugins/os/windows/sru.py,sha256=sOM7CyMkW8XIXzI75GL69WoqUrSK2X99TFIfdQR2D64,17767
277
277
  dissect/target/plugins/os/windows/startupinfo.py,sha256=kl8Y7M4nVfmJ71I33VCegtbHj-ZOeEsYAdlNbgwtUOA,3406
278
278
  dissect/target/plugins/os/windows/syscache.py,sha256=WBDx6rixaVnCRsJHLLN_9YWoTDbzkKGbTnk3XmHSSUM,3443
279
279
  dissect/target/plugins/os/windows/tasks.py,sha256=8DRsIAuIJPaH_G18l8RYfnK_WkEqVx2xDJ1FnIc_i0g,5716
280
280
  dissect/target/plugins/os/windows/thumbcache.py,sha256=23YjOjTNoE7BYITmg8s9Zs8Wih2e73BkJJEaKlfotcI,4133
281
281
  dissect/target/plugins/os/windows/ual.py,sha256=TYF-R46klEa_HHb86UJd6mPrXwHlAMOUTzC0pZ8uiq0,9787
282
- dissect/target/plugins/os/windows/wer.py,sha256=1kwkBvgmEU1QRCLWVmUFNIWAqXEEGtAj2c8uj0iusOE,8625
282
+ dissect/target/plugins/os/windows/wer.py,sha256=ogecvKYxAvDXLptQj4cn0JLn1FxaXjeSuJWs4JgkoZs,8656
283
283
  dissect/target/plugins/os/windows/dpapi/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
284
284
  dissect/target/plugins/os/windows/dpapi/blob.py,sha256=oFhksgx2BAaeAbpPwOM-o0Dw5MKaMLGMF6ETdxIS708,5051
285
285
  dissect/target/plugins/os/windows/dpapi/crypto.py,sha256=_F1F2j1chQw-KLqfWvgL2mCkF3HSvdVnM78OZ0ph9hc,9337
@@ -289,30 +289,30 @@ dissect/target/plugins/os/windows/exchange/__init__.py,sha256=47DEQpj8HBSa-_TImW
289
289
  dissect/target/plugins/os/windows/exchange/exchange.py,sha256=ofoapuDQXefIX4sTzwNboyk5RztN2JEyw1OWl5cx-wo,1564
290
290
  dissect/target/plugins/os/windows/log/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
291
291
  dissect/target/plugins/os/windows/log/amcache.py,sha256=TabtjNx9Ve-u-Fn0K95A0v_SLGzn2YeNPHrcQvjVKJc,5877
292
- dissect/target/plugins/os/windows/log/etl.py,sha256=Rau1zqPJ5LL91j59nC4Jg81KF2t1uuMx-oQp9JK0a00,7049
293
- dissect/target/plugins/os/windows/log/evt.py,sha256=vK9XHc-hOxf6BbLKMNzGNlbCRWN2nlksQoCLdHqPgnw,7049
294
- dissect/target/plugins/os/windows/log/evtx.py,sha256=C1JM64GW7z82qT9K9hIiyCv0EFxszFD9GVvtUZUHdL4,6096
295
- dissect/target/plugins/os/windows/log/pfro.py,sha256=BCjg3OZzkIP4-HzRa1b1dPkDv_B4sbd78fl40obUVkM,2706
296
- dissect/target/plugins/os/windows/log/schedlgu.py,sha256=vzMOcCSrGRTMNQUZzvyQorZzbTNgs1UJiPe0zeOOupQ,5515
292
+ dissect/target/plugins/os/windows/log/etl.py,sha256=PWMTpgKWAtYNtmQfyoos4TtgH8gnbQN19Jw1GCEeHy0,7142
293
+ dissect/target/plugins/os/windows/log/evt.py,sha256=LsM9IgidOtAeGrtztO3ng2DAPmCMVydX3bqYz12dQ_4,7080
294
+ dissect/target/plugins/os/windows/log/evtx.py,sha256=P_hQT3ZFelqhXTH_8pbnSnCwEeSxJr8hiX0F3tK-4W4,6127
295
+ dissect/target/plugins/os/windows/log/pfro.py,sha256=qqXXQ7hY8CHVdYEibmAnJrIy9Szesvr7Re19Nj_GYPg,2737
296
+ dissect/target/plugins/os/windows/log/schedlgu.py,sha256=JaP8H8eTEypWXhx2aFSR_IMam6rQiksbLKhMr_U4fz8,5570
297
297
  dissect/target/plugins/os/windows/regf/7zip.py,sha256=Vc336zhS6R8W98GGlLtPJ_OR0vEP014QnBtYwbx_HUo,3217
298
298
  dissect/target/plugins/os/windows/regf/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
299
- dissect/target/plugins/os/windows/regf/appxdebugkeys.py,sha256=2GlbBZITBDhu3JKHgsGCd_6umHFgDw6OQA4g4rHg63E,3935
299
+ dissect/target/plugins/os/windows/regf/appxdebugkeys.py,sha256=X8MYLcD76pIZoIWwS_DgUp6q6pi2WO7jhZeoc4uGLak,3966
300
300
  dissect/target/plugins/os/windows/regf/auditpol.py,sha256=62WMlZwSzBb-99ujaeGkkOBui5qHOkvMHfACsqCmC0A,5140
301
- dissect/target/plugins/os/windows/regf/bam.py,sha256=W46KjD2bQC52qSajc2lNX36lkjzylKzH7xulnhEKrL8,2053
301
+ dissect/target/plugins/os/windows/regf/bam.py,sha256=iELyDeA-tdT6eXMZ5HHIVSAjH6vDvmS47D2xr4iX7Y8,2084
302
302
  dissect/target/plugins/os/windows/regf/cit.py,sha256=vErcoGfslyuZsaZiGbSGm6KxnJmUjobMwoy03jb6774,38244
303
- dissect/target/plugins/os/windows/regf/clsid.py,sha256=OvvA7Rwm29c1wXarXWXOMkqspA44oOQrQ_0rAJGYAU0,3601
304
- dissect/target/plugins/os/windows/regf/firewall.py,sha256=cDUj-dY6myWtPenI4Vrzp1u_1ndq0EtGDs78RoqSA0Y,3141
303
+ dissect/target/plugins/os/windows/regf/clsid.py,sha256=M121yHQgRDSGtXeShiB-RUuk_toHOFHLYwbHAP9SS8U,3632
304
+ dissect/target/plugins/os/windows/regf/firewall.py,sha256=-RUFjY4D-ua72vyvOTJyg-MpUbk9Syfo4TfgA7bV7Us,3172
305
305
  dissect/target/plugins/os/windows/regf/mru.py,sha256=HYg4UnbsjvzZKS9qcqxkocUeIGQieMLXPjkjgZ1qbTY,13560
306
- dissect/target/plugins/os/windows/regf/muicache.py,sha256=qoA7S8SiZakIreQqxc_QH1av6Lnlprf5SGr4s55b-8E,3707
306
+ dissect/target/plugins/os/windows/regf/muicache.py,sha256=-1IYfNpFjjk4WYyFUBJGLl7ahEGeUKqlaI1QwPNnfjA,3738
307
307
  dissect/target/plugins/os/windows/regf/nethist.py,sha256=QHbG9fmZNmjSVhrgqMvMo12YBaQedzeToS7ZD9eIJ28,3111
308
- dissect/target/plugins/os/windows/regf/recentfilecache.py,sha256=Wr6u7SajA9BtUiypztak9ASJZuimOtWfQUAlfvskjMg,1838
309
- dissect/target/plugins/os/windows/regf/regf.py,sha256=IbLnOurtlprXAo12iYRdw6fv5J45SuMAqt-mXVYaZi4,3357
310
- dissect/target/plugins/os/windows/regf/runkeys.py,sha256=f10jOPTJlUVDEhSiH9JSltKQ-V7zfa8iPX0nKl1gBXo,4247
308
+ dissect/target/plugins/os/windows/regf/recentfilecache.py,sha256=5JheHDmYc7udH-ZF7PwVTm0HfRY43diW0pmyyfHWZK0,1869
309
+ dissect/target/plugins/os/windows/regf/regf.py,sha256=D1GrljF-sV8cWIjWJ3zH7k52i1OWD8poEC_PIeZMEis,3419
310
+ dissect/target/plugins/os/windows/regf/runkeys.py,sha256=-2HcdnVytzCt1xwgAI8rHDnwk8kwLPWURumvhrGnIHU,4278
311
311
  dissect/target/plugins/os/windows/regf/shellbags.py,sha256=EKBWBjxvSfxc7WFKmICZs8QUJnjhsCKesjl_NHEnSUo,25621
312
- dissect/target/plugins/os/windows/regf/shimcache.py,sha256=4SHtwh-ajhgcyR2-vsBbjnsyBtEVPwlgk5j8e1TQkWM,9972
313
- dissect/target/plugins/os/windows/regf/trusteddocs.py,sha256=4g4m1FYljOpYqGG-7NGyj738Tfnz0uEaN2is2YzkMgg,3669
314
- dissect/target/plugins/os/windows/regf/usb.py,sha256=mfMQPKUct7fqpxJgquySrorPf5KWBzwWCLVKa9qSatc,7182
315
- dissect/target/plugins/os/windows/regf/userassist.py,sha256=kEthM9oDDBA6UbGxunbyTfXX320Z_2YlTMYoUQyxZyY,5469
312
+ dissect/target/plugins/os/windows/regf/shimcache.py,sha256=0THEJQtMHACAI70jrThMCrxAVgQv5XxqkRD1MY03VpE,10003
313
+ dissect/target/plugins/os/windows/regf/trusteddocs.py,sha256=3yvpBDM-Asg0rvGN2TwALGRm9DYogG6TxRau9D6FBbw,3700
314
+ dissect/target/plugins/os/windows/regf/usb.py,sha256=hR5fnqy_sint1YyWgm1-AMhGQ4MxJOH_Wz0vbYzr9p4,7213
315
+ dissect/target/plugins/os/windows/regf/userassist.py,sha256=36uI_tSGUx-lOUZ1Io_2ofHTLHzriFA3F6XMR61H0wc,5500
316
316
  dissect/target/plugins/os/windows/task_helpers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
317
317
  dissect/target/plugins/os/windows/task_helpers/tasks_job.py,sha256=-dCkJnyEiWG9nCK378-GswM5EXelrA_g3zDHLhSQMu0,21199
318
318
  dissect/target/plugins/os/windows/task_helpers/tasks_records.py,sha256=vpCyKqLQSzI5ymD1h5P6RncLEE47YtmjDFwKA16dVZ4,4046
@@ -340,10 +340,10 @@ dissect/target/volumes/luks.py,sha256=OmCMsw6rCUXG1_plnLVLTpsvE1n_6WtoRUGQbpmu1z
340
340
  dissect/target/volumes/lvm.py,sha256=wwQVR9I3G9YzmY6UxFsH2Y4MXGBcKL9aayWGCDTiWMU,2269
341
341
  dissect/target/volumes/md.py,sha256=j1K1iKmspl0C_OJFc7-Q1BMWN2OCC5EVANIgVlJ_fIE,1673
342
342
  dissect/target/volumes/vmfs.py,sha256=-LoUbn9WNwTtLi_4K34uV_-wDw2W5hgaqxZNj4UmqAQ,1730
343
- dissect.target-3.17.dev37.dist-info/COPYRIGHT,sha256=m-9ih2RVhMiXHI2bf_oNSSgHgkeIvaYRVfKTwFbnJPA,301
344
- dissect.target-3.17.dev37.dist-info/LICENSE,sha256=DZak_2itbUtvHzD3E7GNUYSRK6jdOJ-GqncQ2weavLA,34523
345
- dissect.target-3.17.dev37.dist-info/METADATA,sha256=lG1EhM84cgxqVPODtlB_Ruvy2WmoUgjrea3a9pSWu20,11300
346
- dissect.target-3.17.dev37.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
347
- dissect.target-3.17.dev37.dist-info/entry_points.txt,sha256=tvFPa-Ap-gakjaPwRc6Fl6mxHzxEZ_arAVU-IUYeo_s,447
348
- dissect.target-3.17.dev37.dist-info/top_level.txt,sha256=Mn-CQzEYsAbkxrUI0TnplHuXnGVKzxpDw_po_sXpvv4,8
349
- dissect.target-3.17.dev37.dist-info/RECORD,,
343
+ dissect.target-3.18.dev2.dist-info/COPYRIGHT,sha256=m-9ih2RVhMiXHI2bf_oNSSgHgkeIvaYRVfKTwFbnJPA,301
344
+ dissect.target-3.18.dev2.dist-info/LICENSE,sha256=DZak_2itbUtvHzD3E7GNUYSRK6jdOJ-GqncQ2weavLA,34523
345
+ dissect.target-3.18.dev2.dist-info/METADATA,sha256=CQlktWeUyWCrkDq9WKqNFR3gxHwKVUZ-9KDPop4n6s8,11299
346
+ dissect.target-3.18.dev2.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
347
+ dissect.target-3.18.dev2.dist-info/entry_points.txt,sha256=tvFPa-Ap-gakjaPwRc6Fl6mxHzxEZ_arAVU-IUYeo_s,447
348
+ dissect.target-3.18.dev2.dist-info/top_level.txt,sha256=Mn-CQzEYsAbkxrUI0TnplHuXnGVKzxpDw_po_sXpvv4,8
349
+ dissect.target-3.18.dev2.dist-info/RECORD,,