dissect.target.plugins.os.windows.log.evtx#

Module Contents#

Classes#

EvtxPlugin

Plugin for fetching and parsing Windows Eventlog Files (*.evtx)

Functions#

Attributes#

dissect.target.plugins.os.windows.log.evtx.re_illegal_characters#
dissect.target.plugins.os.windows.log.evtx.EVTX_GLOB = '*.evtx'#
class dissect.target.plugins.os.windows.log.evtx.EvtxPlugin(target)#

Bases: dissect.target.plugins.os.windows.log.evt.WindowsEventlogsMixin, dissect.target.plugin.Plugin

Plugin for fetching and parsing Windows Eventlog Files (*.evtx)

RECORD_NAME = 'filesystem/windows/evtx'#
LOGS_DIR_PATH = 'sysvol/windows/system32/winevt/logs'#
NEEDLE = b'ElfChnk\x00'#
CHUNK_SIZE = 65536#
evtx(log_file_glob: str = EVTX_GLOB, logs_dir: str | None = None) Generator[flow.record.Record, None, None]#

Return entries from Windows Event log files (*.evtx).

Windows Event log is a detailed record of system, security and application notifications. It can be used to diagnose a system or find future issues. Up until Windows XP the extension .evt was used, hereafter .evtx became the new standard.

References

Yields dynamically created records based on the fields in the event. At least contains the following fields:

hostname (string): The target hostname. domain (string): The target domain. ts (datetime): The TimeCreated_SystemTime field of the event. Provider_Name (string): The Provider_Name field of the event. EventID (int): The EventID of the event.

scraped_evtx() Generator[flow.record.Record, None, None]#

Return EVTX log file records scraped from target disks

dissect.target.plugins.os.windows.log.evtx.format_value(value: Any) Any#