dissect.target 3.17.dev37__py3-none-any.whl → 3.18.dev2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. dissect/target/exceptions.py +4 -0
  2. dissect/target/loaders/raw.py +7 -0
  3. dissect/target/plugins/apps/av/mcafee.py +3 -0
  4. dissect/target/plugins/apps/av/sophos.py +6 -0
  5. dissect/target/plugins/apps/av/symantec.py +6 -0
  6. dissect/target/plugins/apps/av/trendmicro.py +6 -0
  7. dissect/target/plugins/apps/browser/chromium.py +12 -0
  8. dissect/target/plugins/apps/browser/firefox.py +13 -1
  9. dissect/target/plugins/apps/browser/iexplore.py +6 -0
  10. dissect/target/plugins/os/unix/linux/cmdline.py +3 -0
  11. dissect/target/plugins/os/unix/linux/environ.py +3 -0
  12. dissect/target/plugins/os/unix/linux/processes.py +3 -0
  13. dissect/target/plugins/os/unix/linux/sockets.py +15 -0
  14. dissect/target/plugins/os/unix/log/atop.py +3 -0
  15. dissect/target/plugins/os/windows/activitiescache.py +3 -0
  16. dissect/target/plugins/os/windows/catroot.py +6 -0
  17. dissect/target/plugins/os/windows/lnk.py +3 -0
  18. dissect/target/plugins/os/windows/log/etl.py +9 -0
  19. dissect/target/plugins/os/windows/log/evt.py +3 -0
  20. dissect/target/plugins/os/windows/log/evtx.py +3 -0
  21. dissect/target/plugins/os/windows/log/pfro.py +3 -0
  22. dissect/target/plugins/os/windows/log/schedlgu.py +5 -2
  23. dissect/target/plugins/os/windows/prefetch.py +6 -0
  24. dissect/target/plugins/os/windows/recyclebin.py +3 -0
  25. dissect/target/plugins/os/windows/regf/appxdebugkeys.py +3 -0
  26. dissect/target/plugins/os/windows/regf/bam.py +3 -0
  27. dissect/target/plugins/os/windows/regf/clsid.py +3 -0
  28. dissect/target/plugins/os/windows/regf/firewall.py +3 -0
  29. dissect/target/plugins/os/windows/regf/muicache.py +3 -0
  30. dissect/target/plugins/os/windows/regf/recentfilecache.py +3 -0
  31. dissect/target/plugins/os/windows/regf/regf.py +6 -0
  32. dissect/target/plugins/os/windows/regf/runkeys.py +3 -0
  33. dissect/target/plugins/os/windows/regf/shimcache.py +3 -0
  34. dissect/target/plugins/os/windows/regf/trusteddocs.py +3 -0
  35. dissect/target/plugins/os/windows/regf/usb.py +3 -0
  36. dissect/target/plugins/os/windows/regf/userassist.py +3 -0
  37. dissect/target/plugins/os/windows/sam.py +3 -0
  38. dissect/target/plugins/os/windows/services.py +3 -0
  39. dissect/target/plugins/os/windows/wer.py +3 -0
  40. dissect/target/target.py +6 -1
  41. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/METADATA +1 -1
  42. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/RECORD +47 -47
  43. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/COPYRIGHT +0 -0
  44. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/LICENSE +0 -0
  45. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/WHEEL +0 -0
  46. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/entry_points.txt +0 -0
  47. {dissect.target-3.17.dev37.dist-info → dissect.target-3.18.dev2.dist-info}/top_level.txt +0 -0
@@ -114,3 +114,7 @@ class RegistryCorruptError(RegistryError):
114
114
 
115
115
  class ConfigurationParsingError(Error):
116
116
  """An error occurred during configuration parsing."""
117
+
118
+
119
+ class TargetPathNotFoundError(TargetError):
120
+ """The path to the target does not exist."""
@@ -1,6 +1,7 @@
1
1
  from pathlib import Path
2
2
 
3
3
  from dissect.target import container
4
+ from dissect.target.exceptions import TargetPathNotFoundError
4
5
  from dissect.target.loader import Loader
5
6
  from dissect.target.target import Target
6
7
 
@@ -8,6 +9,12 @@ from dissect.target.target import Target
8
9
  class RawLoader(Loader):
9
10
  """Load raw container files such as disk images."""
10
11
 
12
+ def __init__(self, path: Path, **kwargs):
13
+ if not path.exists():
14
+ raise TargetPathNotFoundError("Provided target path does not exist")
15
+
16
+ super().__init__(path, **kwargs)
17
+
11
18
  @staticmethod
12
19
  def detect(path: Path) -> bool:
13
20
  return not path.is_dir()
@@ -71,6 +71,9 @@ class McAfeePlugin(Plugin):
71
71
  """Return msc log history records from McAfee.
72
72
 
73
73
  Yields McAfeeMscLogRecord with the following fields:
74
+
75
+ .. code-block:: text
76
+
74
77
  hostname (string): The target hostname.
75
78
  domain (string): The target domain.
76
79
  ts (datetime): timestamp.
@@ -56,6 +56,9 @@ class SophosPlugin(Plugin):
56
56
  """Return alert log records from Sophos Hitman Pro/Alert.
57
57
 
58
58
  Yields HitmanAlertRecord with the following fields:
59
+
60
+ .. code-block:: text
61
+
59
62
  ts (datetime): Timestamp.
60
63
  alert (string): Type of Alert.
61
64
  description (string): Short description of the alert.
@@ -85,6 +88,9 @@ class SophosPlugin(Plugin):
85
88
  """Return log history records from Sophos Home.
86
89
 
87
90
  Yields SophosLogRecord with the following fields:
91
+
92
+ .. code-block:: text
93
+
88
94
  ts (datetime): Timestamp.
89
95
  description (string): Short description of the alert.
90
96
  path (path): Path to the infected file (if available).
@@ -293,6 +293,9 @@ class SymantecPlugin(Plugin):
293
293
  """Return log records.
294
294
 
295
295
  Yields SEPLogRecord with the following fields:
296
+
297
+ .. code-block:: text
298
+
296
299
  ts (datetime): Timestamp associated with the event.
297
300
  virus (string): Name of the virus.
298
301
  user (string): Name of the user associated with the event.
@@ -326,6 +329,9 @@ class SymantecPlugin(Plugin):
326
329
  """Return log firewall records.
327
330
 
328
331
  Yields SEPFirewallRecord with the following fields:
332
+
333
+ .. code-block:: text
334
+
329
335
  ts (datetime): Timestamp associated with the event.
330
336
  protocol (string): Protocol name associated with the firewall record.
331
337
  local_ip ("net.ipaddress"): Local IP address associated with the event.
@@ -71,6 +71,9 @@ class TrendMicroPlugin(Plugin):
71
71
  """Return Trend Micro Worry-free log history records.
72
72
 
73
73
  Yields TrendMicroWFLogRecord with the following fields:
74
+
75
+ .. code-block:: text
76
+
74
77
  hostname (string): The target hostname.
75
78
  domain (string): The target domain.
76
79
  ts (datetime): timestamp.
@@ -94,6 +97,9 @@ class TrendMicroPlugin(Plugin):
94
97
  """Return Trend Micro Worry-free firewall log history records.
95
98
 
96
99
  Yields TrendMicroWFFirewallRecord with the following fields:
100
+
101
+ .. code-block:: text
102
+
97
103
  hostname (string): The target hostname.
98
104
  domain (string): The target domain.
99
105
  ts (datetime): timestamp.
@@ -148,6 +148,9 @@ class ChromiumMixin:
148
148
  browser_name: The name of the browser as a string.
149
149
 
150
150
  Yields:
151
+
152
+ .. code-block:: text
153
+
151
154
  Records with the following fields:
152
155
  ts (datetime): Visit timestamp.
153
156
  browser (string): The browser from which the records are generated from.
@@ -209,6 +212,9 @@ class ChromiumMixin:
209
212
  browser_name: The name of the browser as a string.
210
213
 
211
214
  Yields:
215
+
216
+ .. code-block:: text
217
+
212
218
  Records with the following fields:
213
219
  ts_created (datetime): Cookie created timestamp.
214
220
  ts_last_accessed (datetime): Cookie last accessed timestamp.
@@ -284,6 +290,9 @@ class ChromiumMixin:
284
290
  browser_name: The name of the browser as a string.
285
291
 
286
292
  Yields:
293
+
294
+ .. code-block:: text
295
+
287
296
  Records with the following fields:
288
297
  ts_start (datetime): Download start timestamp.
289
298
  ts_end (datetime): Download end timestamp.
@@ -344,6 +353,9 @@ class ChromiumMixin:
344
353
  browser_name (str): Name of the browser to scan for extensions.
345
354
 
346
355
  Yields:
356
+
357
+ .. code-block:: text
358
+
347
359
  Records with the following fields:
348
360
  ts_install (datetime): Extension install timestamp.
349
361
  ts_update (datetime): Extension update timestamp.
@@ -132,6 +132,9 @@ class FirefoxPlugin(BrowserPlugin):
132
132
  """Return browser history records from Firefox.
133
133
 
134
134
  Yields BrowserHistoryRecord with the following fields:
135
+
136
+ .. code-block:: text
137
+
135
138
  ts (datetime): Visit timestamp.
136
139
  browser (string): The browser from which the records are generated from.
137
140
  id (string): Record ID.
@@ -193,6 +196,9 @@ class FirefoxPlugin(BrowserPlugin):
193
196
  browser_name: The name of the browser as a string.
194
197
 
195
198
  Yields:
199
+
200
+ .. code-block:: text
201
+
196
202
  Records with the following fields:
197
203
  ts_created (datetime): Cookie created timestamp.
198
204
  ts_last_accessed (datetime): Cookie last accessed timestamp.
@@ -232,6 +238,9 @@ class FirefoxPlugin(BrowserPlugin):
232
238
  """Return browser download records from Firefox.
233
239
 
234
240
  Yields BrowserDownloadRecord with the following fields:
241
+
242
+ .. code-block:: text
243
+
235
244
  ts_start (datetime): Download start timestamp.
236
245
  ts_end (datetime): Download end timestamp.
237
246
  browser (string): The browser from which the records are generated from.
@@ -315,7 +324,10 @@ class FirefoxPlugin(BrowserPlugin):
315
324
  def extensions(self) -> Iterator[BrowserExtensionRecord]:
316
325
  """Return browser extension records for Firefox.
317
326
 
318
- Yields BrowserExtensionRecord with the following fields::
327
+ Yields BrowserExtensionRecord with the following fields:
328
+
329
+ .. code-block:: text
330
+
319
331
  ts_install (datetime): Extension install timestamp.
320
332
  ts_update (datetime): Extension update timestamp.
321
333
  browser (string): The browser from which the records are generated.
@@ -131,6 +131,9 @@ class InternetExplorerPlugin(BrowserPlugin):
131
131
  """Return browser history records from Internet Explorer.
132
132
 
133
133
  Yields BrowserHistoryRecord with the following fields:
134
+
135
+ .. code-block:: text
136
+
134
137
  ts (datetime): Visit timestamp.
135
138
  browser (string): The browser from which the records are generated from.
136
139
  id (string): Record ID.
@@ -183,6 +186,9 @@ class InternetExplorerPlugin(BrowserPlugin):
183
186
  """Return browser downloads records from Internet Explorer.
184
187
 
185
188
  Yields BrowserDownloadRecord with the following fields:
189
+
190
+ .. code-block:: text
191
+
186
192
  ts_start (datetime): Download start timestamp.
187
193
  ts_end (datetime): Download end timestamp.
188
194
  browser (string): The browser from which the records are generated from.
@@ -29,6 +29,9 @@ class CmdlinePlugin(Plugin):
29
29
  Think of this output as the command line that the process wants you to see.
30
30
 
31
31
  Yields CmdlineRecord with the following fields:
32
+
33
+ .. code-block:: text
34
+
32
35
  hostname (string): The target hostname.
33
36
  domain (string): The target domain.
34
37
  ts (datetime): The starttime of the process.
@@ -27,6 +27,9 @@ class EnvironPlugin(Plugin):
27
27
  the environ(7) variable directly), this plugin will not reflect those changes.
28
28
 
29
29
  Yields EnvironmentVariableRecord with the following fields:
30
+
31
+ .. code-block:: text
32
+
30
33
  hostname (string): The target hostname.
31
34
  domain (string): The target domain.
32
35
  ts (datetime): The modification timestamp of the processes' environ file.
@@ -29,6 +29,9 @@ class ProcProcesses(Plugin):
29
29
  Each ``/proc/[pid]`` subdirectory contains various pseudo-files.
30
30
 
31
31
  Yields ProcProcessRecord with the following fields:
32
+
33
+ .. code-block:: text
34
+
32
35
  hostname (string): The target hostname.
33
36
  domain (string): The target domain.
34
37
  ts (datetime): The start time of the process.
@@ -78,6 +78,9 @@ class NetSocketPlugin(Plugin):
78
78
  """This plugin yields the packet sockets and available stats associated with them.
79
79
 
80
80
  Yields PacketSocketRecord with the following fields:
81
+
82
+ .. code-block:: text
83
+
81
84
  hostname (string): The target hostname.
82
85
  domain (string): The target domain.
83
86
  protocol (int): The captured protocol i.e. 0003 is ETH_P_ALL
@@ -101,6 +104,9 @@ class NetSocketPlugin(Plugin):
101
104
  """This plugin yields the unix sockets and available stats associated with them.
102
105
 
103
106
  Yields UnixSocketRecord with the following fields:
107
+
108
+ .. code-block:: text
109
+
104
110
  hostname (string): The target hostname.
105
111
  domain (string): The target domain.
106
112
  protocol (string): The protocol used by the socket.
@@ -117,6 +123,9 @@ class NetSocketPlugin(Plugin):
117
123
  """This plugin yields the raw and raw6 sockets and available stats associated with them.
118
124
 
119
125
  Yields NetSocketRecord with the following fields:
126
+
127
+ .. code-block:: text
128
+
120
129
  hostname (string): The target hostname.
121
130
  domain (string): The target domain.
122
131
  protocol (string): The protocol used by the socket.
@@ -140,6 +149,9 @@ class NetSocketPlugin(Plugin):
140
149
  """This plugin yields the udp and udp6 sockets and available stats associated with them.
141
150
 
142
151
  Yields NetSocketRecord with the following fields:
152
+
153
+ .. code-block:: text
154
+
143
155
  hostname (string): The target hostname.
144
156
  domain (string): The target domain.
145
157
  protocol (string): The protocol used by the socket.
@@ -163,6 +175,9 @@ class NetSocketPlugin(Plugin):
163
175
  """This plugin yields the tcp and tcp6 sockets and available stats associated with them.
164
176
 
165
177
  Yields NetSocketRecord with the following fields:
178
+
179
+ .. code-block:: text
180
+
166
181
  hostname (string): The target hostname.
167
182
  domain (string): The target domain.
168
183
  protocol (string): The protocol used by the socket.
@@ -270,6 +270,9 @@ class AtopPlugin(Plugin):
270
270
  - https://diablohorn.com/2022/11/17/parsing-atop-files-with-python-dissect-cstruct/
271
271
 
272
272
  Yields AtopRecord with fields:
273
+
274
+ .. code-block:: text
275
+
273
276
  hostname (string): The target hostname.
274
277
  process (string): The process name.
275
278
  cmdline (string): The command-line of the process.
@@ -77,6 +77,9 @@ class ActivitiesCachePlugin(Plugin):
77
77
  - https://salt4n6.com/2018/05/03/windows-10-timeline-forensic-artefacts/
78
78
 
79
79
  Yields ActivitiesCacheRecords with the following fields:
80
+
81
+ .. code-block:: text
82
+
80
83
  hostname (string): The target hostname.
81
84
  domain (string): The target domain.
82
85
  start_time (datetime): StartTime field.
@@ -105,6 +105,9 @@ class CatrootPlugin(Plugin):
105
105
  - https://docs.microsoft.com/en-us/windows-hardware/drivers/install/catalog-files
106
106
 
107
107
  Yields CatrootRecords with the following fields:
108
+
109
+ .. code-block:: text
110
+
108
111
  hostname (string): The target hostname.
109
112
  domain (string): The target domain.
110
113
  digest (digest): The parsed digest.
@@ -210,6 +213,9 @@ class CatrootPlugin(Plugin):
210
213
  - https://docs.microsoft.com/en-us/windows-hardware/drivers/install/catalog-files
211
214
 
212
215
  Yields CatrootRecords with the following fields:
216
+
217
+ .. code-block:: text
218
+
213
219
  hostname (string): The target hostname.
214
220
  domain (string): The target domain.
215
221
  digest (digest): The parsed digest.
@@ -51,6 +51,9 @@ class LnkPlugin(Plugin):
51
51
  """Parse all .lnk files in /ProgramData, /Users, and /Windows or from a specified path in record format.
52
52
 
53
53
  Yields a LnkRecord record with the following fields:
54
+
55
+ .. code-block:: text
56
+
54
57
  lnk_path (path): Path of the link (.lnk) file.
55
58
  lnk_name (string): Name of the link (.lnk) file.
56
59
  lnk_mtime (datetime): Modification time of the link (.lnk) file.
@@ -122,6 +122,9 @@ class EtlPlugin(Plugin):
122
122
 
123
123
  Yields dynamically created records based on the fields inside an ETL event.
124
124
  At least contains the following fields:
125
+
126
+ .. code-block:: text
127
+
125
128
  hostname (string): The target hostname.
126
129
  domain (string): The target domain.
127
130
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -140,6 +143,9 @@ class EtlPlugin(Plugin):
140
143
 
141
144
  Yields dynamically created records based on the fields inside an ETL event.
142
145
  At least contains the following fields:
146
+
147
+ .. code-block:: text
148
+
143
149
  hostname (string): The target hostname.
144
150
  domain (string): The target domain.
145
151
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -157,6 +163,9 @@ class EtlPlugin(Plugin):
157
163
 
158
164
  Yields dynamically created records based on the fields inside an ETL event.
159
165
  At least contains the following fields:
166
+
167
+ .. code-block:: text
168
+
160
169
  hostname (string): The target hostname.
161
170
  domain (string): The target domain.
162
171
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -125,6 +125,9 @@ class EvtPlugin(WindowsEventlogsMixin, plugin.Plugin):
125
125
 
126
126
  Yields dynamically created records based on the fields in the event.
127
127
  At least contains the following fields:
128
+
129
+ .. code-block:: text
130
+
128
131
  hostname (string): The target hostname.
129
132
  domain (string): The target domain.
130
133
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -47,6 +47,9 @@ class EvtxPlugin(WindowsEventlogsMixin, plugin.Plugin):
47
47
 
48
48
  Yields dynamically created records based on the fields in the event.
49
49
  At least contains the following fields:
50
+
51
+ .. code-block:: text
52
+
50
53
  hostname (string): The target hostname.
51
54
  domain (string): The target domain.
52
55
  ts (datetime): The TimeCreated_SystemTime field of the event.
@@ -41,6 +41,9 @@ class PfroPlugin(Plugin):
41
41
  - https://community.ccleaner.com/topic/49106-pending-file-rename-operations-log/
42
42
 
43
43
  Yields PfroRecords with fields:
44
+
45
+ .. code-block:: text
46
+
44
47
  hostname (string): The target hostname.
45
48
  domain (string): The target domain.
46
49
  ts (datetime): The parsed timestamp.
@@ -129,9 +129,12 @@ class SchedLgUPlugin(Plugin):
129
129
 
130
130
  Adversaries may use malicious ``.job`` files to gain persistence on a system.
131
131
 
132
- Yield:
132
+ Yields SchedLgURecord with fields:
133
+
134
+ .. code-block:: text
135
+
133
136
  ts (datetime): The timestamp of the event.
134
- job (str): The name of the ``.job`` file.
137
+ job (str): The name of the .job file.
135
138
  command (str): The command executed.
136
139
  status (str): The status of the event (finished, completed, exited, stopped).
137
140
  exit_code (int): The exit code of the event.
@@ -258,6 +258,9 @@ class PrefetchPlugin(Plugin):
258
258
  - https://www.geeksforgeeks.org/prefetch-files-in-windows/
259
259
 
260
260
  Yields PrefetchRecords with fields:
261
+
262
+ .. code-block:: text
263
+
261
264
  hostname (string): The target hostname.
262
265
  domain (string): The target domain.
263
266
  ts (datetime): Run timestamp.
@@ -269,6 +272,9 @@ class PrefetchPlugin(Plugin):
269
272
  with --grouped:
270
273
 
271
274
  Yields PrefetchRecords with fields:
275
+
276
+ .. code-block:: text
277
+
272
278
  hostname (string): The target hostname.
273
279
  domain (string): The target domain.
274
280
  ts (datetime): Run timestamp.
@@ -66,6 +66,9 @@ class RecyclebinPlugin(Plugin):
66
66
  Return files located in the recycle bin ($Recycle.Bin).
67
67
 
68
68
  Yields RecycleBinRecords with fields:
69
+
70
+ .. code-block:: text
71
+
69
72
  hostname (string): The target hostname
70
73
  domain (string): The target domain
71
74
  ts (datetime): The time of deletion
@@ -86,6 +86,9 @@ class AppxDebugKeysPlugin(Plugin):
86
86
  - https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/
87
87
 
88
88
  Yields AppXDebugKeyRecords with fields:
89
+
90
+ .. code-block:: text
91
+
89
92
  hostname (string): The target hostname.
90
93
  domain (string): The target domain.
91
94
  ts (datetime): The registry key last modified timestamp.
@@ -41,6 +41,9 @@ class BamDamPlugin(Plugin):
41
41
  """Parse bam and dam registry keys.
42
42
 
43
43
  Yields BamDamRecords with fields:
44
+
45
+ .. code-block:: text
46
+
44
47
  hostname (string): The target hostname.
45
48
  domain (string): The target domain.
46
49
  ts (datetime): The parsed timestamp.
@@ -55,6 +55,9 @@ class CLSIDPlugin(Plugin):
55
55
  HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\CLSID.
56
56
 
57
57
  Yields CLSIDRecords with fields:
58
+
59
+ .. code-block:: text
60
+
58
61
  hostname (string): The target hostname.
59
62
  domain (string): The target domain.
60
63
  ts (datetime): Last modified timestamp of the registry key.
@@ -26,6 +26,9 @@ class FirewallPlugin(Plugin):
26
26
  HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules registry key.
27
27
 
28
28
  Yields dynamic records with usually the following fields:
29
+
30
+ .. code-block:: text
31
+
29
32
  hostname (string): The target hostname.
30
33
  domain (string): The target domain.
31
34
  key (string): The rule key name.
@@ -48,6 +48,9 @@ class MuiCachePlugin(Plugin):
48
48
  - https://forensafe.com/blogs/muicache.html
49
49
 
50
50
  Yields MuiCacheRecords with fields:
51
+
52
+ .. code-block:: text
53
+
51
54
  hostname (string): The target hostname.
52
55
  domain (string): The target domain.
53
56
  index (varint): The index of the entry.
@@ -45,6 +45,9 @@ class RecentFileCachePlugin(Plugin):
45
45
  """Parse RecentFileCache.bcf.
46
46
 
47
47
  Yields RecentFileCacheRecords with fields:
48
+
49
+ .. code-block:: text
50
+
48
51
  hostname (string): The target hostname.
49
52
  domain (string): The target domain.
50
53
  path (uri): The parsed path.
@@ -49,6 +49,9 @@ class RegfPlugin(Plugin):
49
49
  Yields RegistryKeyRecords and RegistryValueRecords
50
50
 
51
51
  RegistryKeyRecord fields:
52
+
53
+ .. code-block:: text
54
+
52
55
  hostname (string): The target hostname.
53
56
  domain (string): The target domain.
54
57
  ts (datetime): The registry key last modified time.
@@ -57,6 +60,9 @@ class RegfPlugin(Plugin):
57
60
  source (string): The hive file path.
58
61
 
59
62
  RegistryValueRecord fields:
63
+
64
+ .. code-block:: text
65
+
60
66
  hostname (string): The target hostname.
61
67
  domain (string): The target domain.
62
68
  ts (datetime): The registry key last modified time.
@@ -61,6 +61,9 @@ class RunKeysPlugin(Plugin):
61
61
  - https://docs.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys
62
62
 
63
63
  Yields RunKeyRecords with fields:
64
+
65
+ .. code-block:: text
66
+
64
67
  hostname (string): The target hostname.
65
68
  domain (string): The target domain.
66
69
  ts (datetime): The registry key last modified timestamp.
@@ -318,6 +318,9 @@ class ShimcachePlugin(Plugin):
318
318
  - https://www.andreafortuna.org/2017/10/16/amcache-and-shimcache-in-forensic-analysis/
319
319
 
320
320
  Yields ShimcacheRecords with the following fields:
321
+
322
+ .. code-block:: text
323
+
321
324
  hostname (string): The target hostname.
322
325
  domain (string): The target domain.
323
326
  last_modified (datetime): The last modified date.
@@ -61,6 +61,9 @@ class TrustedDocumentsPlugin(Plugin):
61
61
 
62
62
  Yields records based on the values within the TrustRecords registry keys.
63
63
  At least contains the following fields:
64
+
65
+ .. code-block:: text
66
+
64
67
  application (string): Application name of the Office product that produced the TrustRecords registry key.
65
68
  document_path (path): Path to the document for which a TrustRecords entry is created.
66
69
  ts (datetime): The created time of the TrustRecord registry key.
@@ -93,6 +93,9 @@ class UsbPlugin(Plugin):
93
93
  HKLM\\SYSTEM\\CurrentControlSet\\Enum\\USBSTOR registry key.
94
94
 
95
95
  Yields UsbRegistryRecord with fields:
96
+
97
+ .. code-block:: text
98
+
96
99
  hostname (string): The target hostname
97
100
  domain (string): The target domain
98
101
  type (string): Type of USB device
@@ -72,6 +72,9 @@ class UserAssistPlugin(Plugin):
72
72
  - https://www.aldeid.com/wiki/Windows-userassist-keys
73
73
 
74
74
  Yields UserAssistRecords with fields:
75
+
76
+ .. code-block:: text
77
+
75
78
  hostname (string): The target hostname.
76
79
  domain (string): The target domain.
77
80
  ts (datetime): The entry timestamp.
@@ -356,6 +356,9 @@ class SamPlugin(Plugin):
356
356
  - https://en.wikipedia.org/wiki/Security_Account_Manager
357
357
 
358
358
  Yields SamRecords with fields:
359
+
360
+ .. code-block:: text
361
+
359
362
  rid (uint32): The RID.
360
363
  fullname (string): Parsed fullname.
361
364
  username (string): Parsed username.
@@ -72,6 +72,9 @@ class ServicesPlugin(Plugin):
72
72
  - https://artifacts-kb.readthedocs.io/en/latest/sources/windows/ServicesAndDrivers.html
73
73
 
74
74
  Yields ServiceRecords with fields:
75
+
76
+ .. code-block:: text
77
+
75
78
  hostname (string): The target hostname.
76
79
  domain (string): The target domain.
77
80
  ts (datatime): The last modified timestamp of the registry key.
@@ -155,6 +155,9 @@ class WindowsErrorReportingPlugin(Plugin):
155
155
 
156
156
  Yields dynamically created records based on the fields in the files. A record at least contains the following
157
157
  fields:
158
+
159
+ .. code-block:: text
160
+
158
161
  ts (datetime): The moment in time when the error event took place.
159
162
  version (string): WER file version.
160
163
  event_type (string): WER file event type.
dissect/target/target.py CHANGED
@@ -14,6 +14,7 @@ from dissect.target.exceptions import (
14
14
  PluginError,
15
15
  PluginNotFoundError,
16
16
  TargetError,
17
+ TargetPathNotFoundError,
17
18
  UnsupportedPluginError,
18
19
  VolumeSystemError,
19
20
  )
@@ -284,7 +285,11 @@ class Target:
284
285
  try:
285
286
  ldr = loader_cls(sub_entry, parsed_path=parsed_path)
286
287
  except Exception as e:
287
- getlogger(sub_entry).error("Failed to initiate loader: %s", e)
288
+ message = "Failed to initiate loader: %s"
289
+ if isinstance(e, TargetPathNotFoundError):
290
+ message = "%s"
291
+
292
+ getlogger(sub_entry).error(message, e)
288
293
  getlogger(sub_entry).debug("", exc_info=e)
289
294
  continue
290
295
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: dissect.target
3
- Version: 3.17.dev37
3
+ Version: 3.18.dev2
4
4
  Summary: This module ties all other Dissect modules together, it provides a programming API and command line tools which allow easy access to various data sources inside disk images or file collections (a.k.a. targets)
5
5
  Author-email: Dissect Team <dissect@fox-it.com>
6
6
  License: Affero General Public License v3
@@ -1,11 +1,11 @@
1
1
  dissect/target/__init__.py,sha256=Oc7ounTgq2hE4nR6YcNabetc7SQA40ldSa35VEdZcQU,63
2
2
  dissect/target/container.py,sha256=0YcwcGmfJjhPXUB6DEcjWEoSuAtTDxMDpoTviMrLsxM,9353
3
- dissect/target/exceptions.py,sha256=VVW_Rq_vQinapz-2mbJ3UkxBEZpb2pE_7JlhMukdtrY,2877
3
+ dissect/target/exceptions.py,sha256=ULi7NXlqju_d8KENEL3aimmfKTFfbNssfeWhAnOB654,2972
4
4
  dissect/target/filesystem.py,sha256=1i-lToeTX-HgQXQOYxPXH-90M_eq43W4FFzNDRdpgpk,60094
5
5
  dissect/target/loader.py,sha256=hjKInZAEcv43RiqxZJ0yBI4Y2YZ2-nrsKWu_BKrgba4,7336
6
6
  dissect/target/plugin.py,sha256=HAN8maaDt-Rlqt8Rr1IW7gXQpzNQZjCVz-i4aSPphSw,48677
7
7
  dissect/target/report.py,sha256=06uiP4MbNI8cWMVrC1SasNS-Yg6ptjVjckwj8Yhe0Js,7958
8
- dissect/target/target.py,sha256=jq0Ii8073GOfwfqRj7UMuJT5jTVvQ_FD9Vrl9TMGpVc,32180
8
+ dissect/target/target.py,sha256=8vg0VdEQuy5Ih5ewlm0b64o3HcJq_Nley4Ygyp2fLI4,32362
9
9
  dissect/target/volume.py,sha256=aQZAJiny8jjwkc9UtwIRwy7nINXjCxwpO-_UDfh6-BA,15801
10
10
  dissect/target/containers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
11
11
  dissect/target/containers/asdf.py,sha256=DJp0QEFwUjy2MFwKYcYqIR_BS1fQT1Yi9Kcmqt0aChM,1366
@@ -95,7 +95,7 @@ dissect/target/loaders/phobos.py,sha256=XtxF7FZXfZrXJruFUZUQzxlREyfc86dTxph7BNoN
95
95
  dissect/target/loaders/profile.py,sha256=5ylgmzEEGyBFW3izvb-BZ7dGByXN9OFyRnnggR98P9w,1667
96
96
  dissect/target/loaders/pvm.py,sha256=b-PvHNTbRVdOnf7-OR5dbikbDTCFlW85b-9Z8PEL2Cs,406
97
97
  dissect/target/loaders/pvs.py,sha256=dMqdYSBQtH9QLM3tdu0mokLBcn73edg_HUtYtqrdi6E,955
98
- dissect/target/loaders/raw.py,sha256=wfi1qnmLritNfBOqJbyEjsb2C8RjAZHO8IJ9R3XaNjI,412
98
+ dissect/target/loaders/raw.py,sha256=tleNWoO0BkC32ExBIPVOpzrQHXXHChZXoZr02oYuC8A,674
99
99
  dissect/target/loaders/remote.py,sha256=4cGCQfBwuhh5vo0zgVCK8V3I0w9SSWX3AjbW9eebPRg,9512
100
100
  dissect/target/loaders/res.py,sha256=8b178x05t9K31wOeP8yGD1IdR3RpiMGz7wcvtHmmHjk,8819
101
101
  dissect/target/loaders/smb.py,sha256=qP8m4Jq7hvAvUCF9jB4yr2Zut7p_R02_vxziNN3R1to,13070
@@ -114,18 +114,18 @@ dissect/target/loaders/xva.py,sha256=WmqdM9qGrZcChx0PiiTLyMTSatJIy_ItGO9cPMALQSE
114
114
  dissect/target/plugins/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
115
115
  dissect/target/plugins/apps/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
116
116
  dissect/target/plugins/apps/av/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
117
- dissect/target/plugins/apps/av/mcafee.py,sha256=4lro9iwcL2Vl9Lyy69Sk1D9JWSRTXv5yjpV6NJbbZXE,5409
118
- dissect/target/plugins/apps/av/sophos.py,sha256=gSfTvjBZMuT0hsL-p4oYxuYmakbqApoOYvL0lKYkSV4,4102
119
- dissect/target/plugins/apps/av/symantec.py,sha256=RFLyNW6FyuoGcirJ4xHbQM8oGjua9W4zXmC7YDF-H20,14109
120
- dissect/target/plugins/apps/av/trendmicro.py,sha256=jloy_N4hHAqF1sVIEeD5Q7LRYal3_os14Umk-hGaAR4,4613
117
+ dissect/target/plugins/apps/av/mcafee.py,sha256=YWrsB5kQFtXfhqi6mdMPMVk2qh_KCiOBiaTnbj8mVrM,5440
118
+ dissect/target/plugins/apps/av/sophos.py,sha256=TuO-ggdD5De0UTouzNF7-1iLULIOvr6FDktocnM0aF0,4164
119
+ dissect/target/plugins/apps/av/symantec.py,sha256=I1_zZ2ihKptB2JJ7sYZ7df0AgtK3KhWPsbDkc2m_hPA,14171
120
+ dissect/target/plugins/apps/av/trendmicro.py,sha256=ZhxL4IkzyHfR2xaNIzk-M-v-ITMuLG_yqq_0djqGMjU,4675
121
121
  dissect/target/plugins/apps/browser/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
122
122
  dissect/target/plugins/apps/browser/brave.py,sha256=EW1ubL10swHeV9CscfpE-SrNZozul_Ewj48LNRaG5Kg,2865
123
123
  dissect/target/plugins/apps/browser/browser.py,sha256=rBIwcgdl73gm-8APwx2jEUAYXRniXkqcdMr2UYj_tS8,4118
124
124
  dissect/target/plugins/apps/browser/chrome.py,sha256=hxS8gqpBwoCrPaxNpllIa6K9DtsSGzn6XXcUaHyes6w,3048
125
- dissect/target/plugins/apps/browser/chromium.py,sha256=1oaQhMN5mJysw0VIVpTEmRCAifgv-mUQxZwrGmGHqAQ,27875
125
+ dissect/target/plugins/apps/browser/chromium.py,sha256=N9hS-a45iEv_GyKhLZQR_FSkEjWlMA0f22eURBuxF5Y,27999
126
126
  dissect/target/plugins/apps/browser/edge.py,sha256=woXzZtHPWmfcV8vbxGKHELKru5JRb32MAXs43_b4K4E,2883
127
- dissect/target/plugins/apps/browser/firefox.py,sha256=Msicw-13AJWbXRRF6m_p4L84rXAjsIYGFRve29cPY2M,30806
128
- dissect/target/plugins/apps/browser/iexplore.py,sha256=MqMonoaM5lj0ZFqGwS4F-P1eLmnLvX7VQGE9S3hxXag,8739
127
+ dissect/target/plugins/apps/browser/firefox.py,sha256=ROrzhI2SV81E63hi5PRtyJveRrBacWNJ9FWZS_ondlk,30929
128
+ dissect/target/plugins/apps/browser/iexplore.py,sha256=g_xw0toaiyjevxO8g9XPCOqc-CXZp39FVquRhPFGdTE,8801
129
129
  dissect/target/plugins/apps/container/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
130
130
  dissect/target/plugins/apps/container/docker.py,sha256=67Eih9AfUbqsP-HlnlwoHi4rSAnVCZWM76sEyO_1m18,15316
131
131
  dissect/target/plugins/apps/remoteaccess/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
@@ -211,15 +211,15 @@ dissect/target/plugins/os/unix/esxi/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQ
211
211
  dissect/target/plugins/os/unix/esxi/_os.py,sha256=8kFFK9986zN8hXmDUWwdQHtbV33nWKerRuisg_xbsoQ,17504
212
212
  dissect/target/plugins/os/unix/linux/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
213
213
  dissect/target/plugins/os/unix/linux/_os.py,sha256=YJYwuq_iAinOrPqTE49Q4DLYMWBeRCly1uTbDvPhp6Q,2796
214
- dissect/target/plugins/os/unix/linux/cmdline.py,sha256=XIvaTL42DzeQGhqHN_RTMI5g8hbI2_wjzb7KZ0kPOM0,1591
215
- dissect/target/plugins/os/unix/linux/environ.py,sha256=FDf3_bNbaL5Qltnp0Ch-t8tp_6Lv3v9HY54qE4RWO7M,1850
214
+ dissect/target/plugins/os/unix/linux/cmdline.py,sha256=AyMfndt3UsmJtoOyZYC8nWq2GZg9oPvn8SiI3M4NxnE,1622
215
+ dissect/target/plugins/os/unix/linux/environ.py,sha256=UOQD7Xmu754u2oAh3L5g5snuz-gv4jbWbVy46qszYjo,1881
216
216
  dissect/target/plugins/os/unix/linux/iptables.py,sha256=qTzY5PHHXA33WnPYb5NESgoSwI7ECZ8YPoEe_Fmln-8,6045
217
217
  dissect/target/plugins/os/unix/linux/modules.py,sha256=H1S5CkpXttCVwzE2Ylz3jkvrCptN2f-fXcQ_hCB0FG0,2443
218
218
  dissect/target/plugins/os/unix/linux/netstat.py,sha256=MAC4ZdeNqcKpxT2ZMh1-7rjt4Pt_WQIRy7RChr7nlPk,1649
219
219
  dissect/target/plugins/os/unix/linux/proc.py,sha256=jm35fAasnNbObN2tpflwQuCfVYLDkTP2EDrzYG42ZSk,23354
220
- dissect/target/plugins/os/unix/linux/processes.py,sha256=sTQqZYPW-_gs7Z3f0wwsV6clUX4NK44GGyMiZToBIrg,1936
220
+ dissect/target/plugins/os/unix/linux/processes.py,sha256=rvDJWAp16WAJZ91A8_GJJIj5y0U7BNnU8CW_47AueKY,1967
221
221
  dissect/target/plugins/os/unix/linux/services.py,sha256=-d2y073mOXUM3XCzRgDVCRFR9eTLoVuN8FsZVewHzRg,4075
222
- dissect/target/plugins/os/unix/linux/sockets.py,sha256=11de73KiF2D2s1eyPBA4EWDpNsEzOunbj3YqSlMYZ2Y,9765
222
+ dissect/target/plugins/os/unix/linux/sockets.py,sha256=CXstlQt0tLcVSpvi0xOXJu580O6BGUBW3lJQt20aMUw,9920
223
223
  dissect/target/plugins/os/unix/linux/android/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
224
224
  dissect/target/plugins/os/unix/linux/android/_os.py,sha256=trmESlpHdwVu7wV18RevEhh_TsVyfKPFCd5Usb5-fSU,2056
225
225
  dissect/target/plugins/os/unix/linux/debian/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
@@ -245,7 +245,7 @@ dissect/target/plugins/os/unix/locate/locate.py,sha256=uXFcWAqoz_3eNWHhsGoEtkkhm
245
245
  dissect/target/plugins/os/unix/locate/mlocate.py,sha256=DhrFgxDQF-fMZaA0WK8Z-5o9i9iDsuTHW7MHJtWwz6o,4485
246
246
  dissect/target/plugins/os/unix/locate/plocate.py,sha256=Skb24ba_MVzM4nuDaZHw-ZmomIEZ3TJ7g5kHCvQViko,6545
247
247
  dissect/target/plugins/os/unix/log/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
248
- dissect/target/plugins/os/unix/log/atop.py,sha256=UmaqdnSmE8AO8bEj4drGSc1HH2n4Pdlxpwfa7RgraIY,16314
248
+ dissect/target/plugins/os/unix/log/atop.py,sha256=DdiTf-gVJJvvPbR36khU4388lxQzABaWI-95jLCGgSw,16345
249
249
  dissect/target/plugins/os/unix/log/audit.py,sha256=OjorWTmCFvCI5RJq6m6WNW0Lhb-poB2VAggKOGZUHK4,3722
250
250
  dissect/target/plugins/os/unix/log/auth.py,sha256=l7gCuRdvv9gL0U1N0yrR9hVsMnr4t_k4t-n-f6PrOxg,2388
251
251
  dissect/target/plugins/os/unix/log/journal.py,sha256=eiNNVLmKWFj4dTQX8PNRNgKpVwzQWEHEsKyYfGUAPXQ,17376
@@ -254,10 +254,10 @@ dissect/target/plugins/os/unix/log/messages.py,sha256=CXA-SkMPLaCgnTQg9nzII-7tO8
254
254
  dissect/target/plugins/os/unix/log/utmp.py,sha256=21tvzG977LqzRShV6uAoU-83WDcLUrI_Tv__2ZVi9rw,7756
255
255
  dissect/target/plugins/os/windows/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
256
256
  dissect/target/plugins/os/windows/_os.py,sha256=g5XGtruvyWx4YAhMpGZnAaIFWQqLNQpee_Ot7ROmD8w,12606
257
- dissect/target/plugins/os/windows/activitiescache.py,sha256=yY41YdCZk9e97Q8_rjZHknMUeOVDxgBG9VtXQHANUsQ,6710
257
+ dissect/target/plugins/os/windows/activitiescache.py,sha256=Q2aILnhJ2rp2AwEbWwyBuSLjMbGqaYJTsavSbfkcFKE,6741
258
258
  dissect/target/plugins/os/windows/adpolicy.py,sha256=rvsvywChfms7d2kMwXRVHZaf8zJ46WmMwYplGAYEax8,6984
259
259
  dissect/target/plugins/os/windows/amcache.py,sha256=ZZNOs3bILTf0AGkDkhoatndl0j39DXkstN7oOyxJECU,27188
260
- dissect/target/plugins/os/windows/catroot.py,sha256=eSfVqXvWWZpXoxKB1FT_evjXXNmlD7wHhA3lYpfQDeQ,11043
260
+ dissect/target/plugins/os/windows/catroot.py,sha256=wHW_p4M0aFonZJ2xZFIbgLbJopdCIXO9jVrGPHLsMLc,11105
261
261
  dissect/target/plugins/os/windows/cim.py,sha256=jsrpu6TZpBUh7VWI9AV2Ib5bebTwsvqOwRfa5gjJd7c,3056
262
262
  dissect/target/plugins/os/windows/clfs.py,sha256=begVsZ-CY97Ksh6S1g03LjyBgu8ERY2hfNDWYPj0GXI,4872
263
263
  dissect/target/plugins/os/windows/credhist.py,sha256=FX_pW-tU9esdvDTSx913kf_CpGE_1jbD6bkjDb-cxHk,7069
@@ -265,21 +265,21 @@ dissect/target/plugins/os/windows/datetime.py,sha256=tuBOkewmbCW8sFXcYp5p82oM5RC
265
265
  dissect/target/plugins/os/windows/defender.py,sha256=Vp_IP6YKm4igR765WvXJrHQ3RMu7FJKM3VOoR8AybV8,23737
266
266
  dissect/target/plugins/os/windows/env.py,sha256=-u9F9xWy6PUbQmu5Tv_MDoVmy6YB-7CbHokIK_T3S44,13891
267
267
  dissect/target/plugins/os/windows/generic.py,sha256=BSvDPfB9faU0uquMj0guw5tnR_97Nn0XAEE4k05BFSQ,22273
268
- dissect/target/plugins/os/windows/lnk.py,sha256=6_ciURYTa-LpgpHJsixoFUqkfSATHkEbk0xKiIZDGPU,8148
268
+ dissect/target/plugins/os/windows/lnk.py,sha256=On1k0PODYggQM1j514qFepBACCV2Z2u61Q4Ba6e3Y2c,8179
269
269
  dissect/target/plugins/os/windows/locale.py,sha256=yXVdclpUqss9h8Nq7N4kg3OHwWGDfjdfiLiUZR3wqv8,2324
270
270
  dissect/target/plugins/os/windows/notifications.py,sha256=64xHHueHwtJCc8RTAF70oa0RxvqfCu_DBPWRSZBnYZc,17386
271
- dissect/target/plugins/os/windows/prefetch.py,sha256=5hRxdIP9sIV5Q9TAScMjLbl_mImZ37abvdE_pAd6rh4,10398
272
- dissect/target/plugins/os/windows/recyclebin.py,sha256=4GSj0Q3YvONufnqANbnG0ffiMQyToCiL5s35Wmu4JOQ,4898
271
+ dissect/target/plugins/os/windows/prefetch.py,sha256=bDoJOWRp6vIHe1lf9HXNuNg5iyh5YqVw9s0P562VfKo,10460
272
+ dissect/target/plugins/os/windows/recyclebin.py,sha256=7UFjZg1NHWJyfjthhMBpQd3kGG8ZXe7H4Cu9U3QzjOs,4929
273
273
  dissect/target/plugins/os/windows/registry.py,sha256=EfqUkgbzaqTuq1kIPYNG1TfvJxhJE5X-TEjV3K_xsPU,12814
274
- dissect/target/plugins/os/windows/sam.py,sha256=ESQjaCIC17mKSU2y4GlLzkzJbsMJECPYlnVES36InQA,15447
275
- dissect/target/plugins/os/windows/services.py,sha256=_6YkuoZD8LUxk72R3n1p1bOBab3A1wszdB1NuPavIGM,6037
274
+ dissect/target/plugins/os/windows/sam.py,sha256=NTL6dez30i_E3R0mNmnYXMYc62DHqICWvpXy9g_2RY0,15478
275
+ dissect/target/plugins/os/windows/services.py,sha256=MoVPJ1GKpPaJrGd2DYtuHEmKqC2uOKRc5SZKB12goSs,6068
276
276
  dissect/target/plugins/os/windows/sru.py,sha256=sOM7CyMkW8XIXzI75GL69WoqUrSK2X99TFIfdQR2D64,17767
277
277
  dissect/target/plugins/os/windows/startupinfo.py,sha256=kl8Y7M4nVfmJ71I33VCegtbHj-ZOeEsYAdlNbgwtUOA,3406
278
278
  dissect/target/plugins/os/windows/syscache.py,sha256=WBDx6rixaVnCRsJHLLN_9YWoTDbzkKGbTnk3XmHSSUM,3443
279
279
  dissect/target/plugins/os/windows/tasks.py,sha256=8DRsIAuIJPaH_G18l8RYfnK_WkEqVx2xDJ1FnIc_i0g,5716
280
280
  dissect/target/plugins/os/windows/thumbcache.py,sha256=23YjOjTNoE7BYITmg8s9Zs8Wih2e73BkJJEaKlfotcI,4133
281
281
  dissect/target/plugins/os/windows/ual.py,sha256=TYF-R46klEa_HHb86UJd6mPrXwHlAMOUTzC0pZ8uiq0,9787
282
- dissect/target/plugins/os/windows/wer.py,sha256=1kwkBvgmEU1QRCLWVmUFNIWAqXEEGtAj2c8uj0iusOE,8625
282
+ dissect/target/plugins/os/windows/wer.py,sha256=ogecvKYxAvDXLptQj4cn0JLn1FxaXjeSuJWs4JgkoZs,8656
283
283
  dissect/target/plugins/os/windows/dpapi/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
284
284
  dissect/target/plugins/os/windows/dpapi/blob.py,sha256=oFhksgx2BAaeAbpPwOM-o0Dw5MKaMLGMF6ETdxIS708,5051
285
285
  dissect/target/plugins/os/windows/dpapi/crypto.py,sha256=_F1F2j1chQw-KLqfWvgL2mCkF3HSvdVnM78OZ0ph9hc,9337
@@ -289,30 +289,30 @@ dissect/target/plugins/os/windows/exchange/__init__.py,sha256=47DEQpj8HBSa-_TImW
289
289
  dissect/target/plugins/os/windows/exchange/exchange.py,sha256=ofoapuDQXefIX4sTzwNboyk5RztN2JEyw1OWl5cx-wo,1564
290
290
  dissect/target/plugins/os/windows/log/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
291
291
  dissect/target/plugins/os/windows/log/amcache.py,sha256=TabtjNx9Ve-u-Fn0K95A0v_SLGzn2YeNPHrcQvjVKJc,5877
292
- dissect/target/plugins/os/windows/log/etl.py,sha256=Rau1zqPJ5LL91j59nC4Jg81KF2t1uuMx-oQp9JK0a00,7049
293
- dissect/target/plugins/os/windows/log/evt.py,sha256=vK9XHc-hOxf6BbLKMNzGNlbCRWN2nlksQoCLdHqPgnw,7049
294
- dissect/target/plugins/os/windows/log/evtx.py,sha256=C1JM64GW7z82qT9K9hIiyCv0EFxszFD9GVvtUZUHdL4,6096
295
- dissect/target/plugins/os/windows/log/pfro.py,sha256=BCjg3OZzkIP4-HzRa1b1dPkDv_B4sbd78fl40obUVkM,2706
296
- dissect/target/plugins/os/windows/log/schedlgu.py,sha256=vzMOcCSrGRTMNQUZzvyQorZzbTNgs1UJiPe0zeOOupQ,5515
292
+ dissect/target/plugins/os/windows/log/etl.py,sha256=PWMTpgKWAtYNtmQfyoos4TtgH8gnbQN19Jw1GCEeHy0,7142
293
+ dissect/target/plugins/os/windows/log/evt.py,sha256=LsM9IgidOtAeGrtztO3ng2DAPmCMVydX3bqYz12dQ_4,7080
294
+ dissect/target/plugins/os/windows/log/evtx.py,sha256=P_hQT3ZFelqhXTH_8pbnSnCwEeSxJr8hiX0F3tK-4W4,6127
295
+ dissect/target/plugins/os/windows/log/pfro.py,sha256=qqXXQ7hY8CHVdYEibmAnJrIy9Szesvr7Re19Nj_GYPg,2737
296
+ dissect/target/plugins/os/windows/log/schedlgu.py,sha256=JaP8H8eTEypWXhx2aFSR_IMam6rQiksbLKhMr_U4fz8,5570
297
297
  dissect/target/plugins/os/windows/regf/7zip.py,sha256=Vc336zhS6R8W98GGlLtPJ_OR0vEP014QnBtYwbx_HUo,3217
298
298
  dissect/target/plugins/os/windows/regf/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
299
- dissect/target/plugins/os/windows/regf/appxdebugkeys.py,sha256=2GlbBZITBDhu3JKHgsGCd_6umHFgDw6OQA4g4rHg63E,3935
299
+ dissect/target/plugins/os/windows/regf/appxdebugkeys.py,sha256=X8MYLcD76pIZoIWwS_DgUp6q6pi2WO7jhZeoc4uGLak,3966
300
300
  dissect/target/plugins/os/windows/regf/auditpol.py,sha256=62WMlZwSzBb-99ujaeGkkOBui5qHOkvMHfACsqCmC0A,5140
301
- dissect/target/plugins/os/windows/regf/bam.py,sha256=W46KjD2bQC52qSajc2lNX36lkjzylKzH7xulnhEKrL8,2053
301
+ dissect/target/plugins/os/windows/regf/bam.py,sha256=iELyDeA-tdT6eXMZ5HHIVSAjH6vDvmS47D2xr4iX7Y8,2084
302
302
  dissect/target/plugins/os/windows/regf/cit.py,sha256=vErcoGfslyuZsaZiGbSGm6KxnJmUjobMwoy03jb6774,38244
303
- dissect/target/plugins/os/windows/regf/clsid.py,sha256=OvvA7Rwm29c1wXarXWXOMkqspA44oOQrQ_0rAJGYAU0,3601
304
- dissect/target/plugins/os/windows/regf/firewall.py,sha256=cDUj-dY6myWtPenI4Vrzp1u_1ndq0EtGDs78RoqSA0Y,3141
303
+ dissect/target/plugins/os/windows/regf/clsid.py,sha256=M121yHQgRDSGtXeShiB-RUuk_toHOFHLYwbHAP9SS8U,3632
304
+ dissect/target/plugins/os/windows/regf/firewall.py,sha256=-RUFjY4D-ua72vyvOTJyg-MpUbk9Syfo4TfgA7bV7Us,3172
305
305
  dissect/target/plugins/os/windows/regf/mru.py,sha256=HYg4UnbsjvzZKS9qcqxkocUeIGQieMLXPjkjgZ1qbTY,13560
306
- dissect/target/plugins/os/windows/regf/muicache.py,sha256=qoA7S8SiZakIreQqxc_QH1av6Lnlprf5SGr4s55b-8E,3707
306
+ dissect/target/plugins/os/windows/regf/muicache.py,sha256=-1IYfNpFjjk4WYyFUBJGLl7ahEGeUKqlaI1QwPNnfjA,3738
307
307
  dissect/target/plugins/os/windows/regf/nethist.py,sha256=QHbG9fmZNmjSVhrgqMvMo12YBaQedzeToS7ZD9eIJ28,3111
308
- dissect/target/plugins/os/windows/regf/recentfilecache.py,sha256=Wr6u7SajA9BtUiypztak9ASJZuimOtWfQUAlfvskjMg,1838
309
- dissect/target/plugins/os/windows/regf/regf.py,sha256=IbLnOurtlprXAo12iYRdw6fv5J45SuMAqt-mXVYaZi4,3357
310
- dissect/target/plugins/os/windows/regf/runkeys.py,sha256=f10jOPTJlUVDEhSiH9JSltKQ-V7zfa8iPX0nKl1gBXo,4247
308
+ dissect/target/plugins/os/windows/regf/recentfilecache.py,sha256=5JheHDmYc7udH-ZF7PwVTm0HfRY43diW0pmyyfHWZK0,1869
309
+ dissect/target/plugins/os/windows/regf/regf.py,sha256=D1GrljF-sV8cWIjWJ3zH7k52i1OWD8poEC_PIeZMEis,3419
310
+ dissect/target/plugins/os/windows/regf/runkeys.py,sha256=-2HcdnVytzCt1xwgAI8rHDnwk8kwLPWURumvhrGnIHU,4278
311
311
  dissect/target/plugins/os/windows/regf/shellbags.py,sha256=EKBWBjxvSfxc7WFKmICZs8QUJnjhsCKesjl_NHEnSUo,25621
312
- dissect/target/plugins/os/windows/regf/shimcache.py,sha256=4SHtwh-ajhgcyR2-vsBbjnsyBtEVPwlgk5j8e1TQkWM,9972
313
- dissect/target/plugins/os/windows/regf/trusteddocs.py,sha256=4g4m1FYljOpYqGG-7NGyj738Tfnz0uEaN2is2YzkMgg,3669
314
- dissect/target/plugins/os/windows/regf/usb.py,sha256=mfMQPKUct7fqpxJgquySrorPf5KWBzwWCLVKa9qSatc,7182
315
- dissect/target/plugins/os/windows/regf/userassist.py,sha256=kEthM9oDDBA6UbGxunbyTfXX320Z_2YlTMYoUQyxZyY,5469
312
+ dissect/target/plugins/os/windows/regf/shimcache.py,sha256=0THEJQtMHACAI70jrThMCrxAVgQv5XxqkRD1MY03VpE,10003
313
+ dissect/target/plugins/os/windows/regf/trusteddocs.py,sha256=3yvpBDM-Asg0rvGN2TwALGRm9DYogG6TxRau9D6FBbw,3700
314
+ dissect/target/plugins/os/windows/regf/usb.py,sha256=hR5fnqy_sint1YyWgm1-AMhGQ4MxJOH_Wz0vbYzr9p4,7213
315
+ dissect/target/plugins/os/windows/regf/userassist.py,sha256=36uI_tSGUx-lOUZ1Io_2ofHTLHzriFA3F6XMR61H0wc,5500
316
316
  dissect/target/plugins/os/windows/task_helpers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
317
317
  dissect/target/plugins/os/windows/task_helpers/tasks_job.py,sha256=-dCkJnyEiWG9nCK378-GswM5EXelrA_g3zDHLhSQMu0,21199
318
318
  dissect/target/plugins/os/windows/task_helpers/tasks_records.py,sha256=vpCyKqLQSzI5ymD1h5P6RncLEE47YtmjDFwKA16dVZ4,4046
@@ -340,10 +340,10 @@ dissect/target/volumes/luks.py,sha256=OmCMsw6rCUXG1_plnLVLTpsvE1n_6WtoRUGQbpmu1z
340
340
  dissect/target/volumes/lvm.py,sha256=wwQVR9I3G9YzmY6UxFsH2Y4MXGBcKL9aayWGCDTiWMU,2269
341
341
  dissect/target/volumes/md.py,sha256=j1K1iKmspl0C_OJFc7-Q1BMWN2OCC5EVANIgVlJ_fIE,1673
342
342
  dissect/target/volumes/vmfs.py,sha256=-LoUbn9WNwTtLi_4K34uV_-wDw2W5hgaqxZNj4UmqAQ,1730
343
- dissect.target-3.17.dev37.dist-info/COPYRIGHT,sha256=m-9ih2RVhMiXHI2bf_oNSSgHgkeIvaYRVfKTwFbnJPA,301
344
- dissect.target-3.17.dev37.dist-info/LICENSE,sha256=DZak_2itbUtvHzD3E7GNUYSRK6jdOJ-GqncQ2weavLA,34523
345
- dissect.target-3.17.dev37.dist-info/METADATA,sha256=lG1EhM84cgxqVPODtlB_Ruvy2WmoUgjrea3a9pSWu20,11300
346
- dissect.target-3.17.dev37.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
347
- dissect.target-3.17.dev37.dist-info/entry_points.txt,sha256=tvFPa-Ap-gakjaPwRc6Fl6mxHzxEZ_arAVU-IUYeo_s,447
348
- dissect.target-3.17.dev37.dist-info/top_level.txt,sha256=Mn-CQzEYsAbkxrUI0TnplHuXnGVKzxpDw_po_sXpvv4,8
349
- dissect.target-3.17.dev37.dist-info/RECORD,,
343
+ dissect.target-3.18.dev2.dist-info/COPYRIGHT,sha256=m-9ih2RVhMiXHI2bf_oNSSgHgkeIvaYRVfKTwFbnJPA,301
344
+ dissect.target-3.18.dev2.dist-info/LICENSE,sha256=DZak_2itbUtvHzD3E7GNUYSRK6jdOJ-GqncQ2weavLA,34523
345
+ dissect.target-3.18.dev2.dist-info/METADATA,sha256=CQlktWeUyWCrkDq9WKqNFR3gxHwKVUZ-9KDPop4n6s8,11299
346
+ dissect.target-3.18.dev2.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
347
+ dissect.target-3.18.dev2.dist-info/entry_points.txt,sha256=tvFPa-Ap-gakjaPwRc6Fl6mxHzxEZ_arAVU-IUYeo_s,447
348
+ dissect.target-3.18.dev2.dist-info/top_level.txt,sha256=Mn-CQzEYsAbkxrUI0TnplHuXnGVKzxpDw_po_sXpvv4,8
349
+ dissect.target-3.18.dev2.dist-info/RECORD,,