Skip to content

Releases: kacos2000/Jumplist-Browser

JumplistBrowser

18 Feb 01:56
0ea1eae
Compare
Choose a tag to compare

[Updates]

  • Added more extended info on Serialized Property Store entries e.g.:

    image

  • Added a couple more ItemID extension types

  • Fixed a few minor bugs/errors

to be continued ..

MD5: A1374D15284B45ECDD0CCDD24BFB673F
SHA256: 17EADCDCDF23588F0FE977F640D33C8AD29A97DF9B16E423CF6EC447285DD1F8

JumplistBrowser

17 Feb 01:54
91bb237
Compare
Choose a tag to compare

[Updates]

  • Added more extended info on Serialized Property Store entries plus a few more ItemID extension types

    image

to be continued ..

MD5: 9D4E539CF4C73EB7817ACB38401E26F6
SHA256: 7F479C061439CC3366622EBC07653B32D8DFE041850D2AFFD2C28D03636C016E

JumplistBrowser

15 Feb 22:39
fc13091
Compare
Choose a tag to compare

[Updates]

  • Added more extended info on LinkTargetIDList ItemIDLists including embedded ItemIDs and Serialized Property Store entries
    image

  • More to be added ..

MD5: A42342D0603892DA1BF6180C27EE52BE
SHA256: 2DA2F8B1AAD9D07A33F2B2DFAA764F94D7D3A8476DC65973E2EE20AB2CF1925E

JumplistBrowser

12 Feb 20:57
ece14b6
Compare
Choose a tag to compare

[Updates]

  • Added extended info on LinkTargetIDList ItemIDLists e.g.:

    image

  • More to be added ..

MD5: D8CE6BDCADE93FEDD6D2BCC949CCDBDF
SHA256: E62241CEDD9B8D12DB582E3422B261AC80D5100A0DF7BD6ECFECD972D6E91821

JumplistBrowser

24 Jan 18:51
6dc6b99
Compare
Choose a tag to compare

[Update]

  • Added option to 'Open File With' for examination of the selected file with other tools like a Hex Editor
    [Note]: Be very careful when dealing with possible malicious LNK files !!

  • Added option to copy the Selected file's Full File path

    image image

  • Updated the LNK Slack parts

  • Minor correction (copy paste mishap)

MD5: A9E0BAB2F1A3E45C35C8E5D53D6A387D
SHA256: 6526C557D3B354A81BC9EE88EEEC9BABB141B279BC5DC07B73A3368A4711A729

JumplistBrowser

23 Jan 23:05
80e323a
Compare
Choose a tag to compare

[Update]

  • Added LNK Block Sizes & Slack Size *1
    image
    image

  • Added Tooltip on the 'Command Arguments' split per 100 characters eg:
    image

  • Will show LNK Slack if it exists, allowing copy of the Hex Code
    image

  • Other minor updates

Note *1: The Slack size = the actual LNK Filesize - the Shotcut Size (Total of the LNK block sizes)
When copying either the 'Command Arguments' or the 'Link Slack', I suggest pasting to Notepad first and inspect before doing anything else.

MD5: 4B14FB429A22A7E793517FE9DDEECFEC
SHA256: C1CD6A1531EFB6CA6FA351695DD0E03482003DA6A938DBE0C3C30B26CD593CCC

JumplistBrowser (x64)

16 Jan 01:29
9efccea
Compare
Choose a tag to compare

[Update]

  • Minor update

MD5: 463B68957B29A8F24AD3B868A5772634
SHA256: 11B66D052EF44874E857A7B43951ED4DB538C76EED73D2F4CD2479E31C25FC5B

JumplistBrowser (x64)

07 Dec 17:10
ae23860
Compare
Choose a tag to compare

[Update]

  • Added ExtraData info from KnownFolderDataBlock, SpecialFolderDataBlock, EnvironmentVariableDataBlock, ConsoleDataBlock and ConsoleFEDataBlock
  • Fixed issue with Knownfolder paths
  • Other minor changes

MD5: 09050E1A385BF97AD3643D16C60CBC99
SHA256: 7B6847B90FC44C38021EF50ABB57C5983845A6C53AA8B5C76451782189261936

JumplistBrowser (x64)

04 Dec 20:02
567b484
Compare
Choose a tag to compare

[Update]

  • Found a way to reverse the 'Knownfolder' replacement done by the ShellLink .Net lib, so LinkTargetID Name & Target Path should now appear correctly mostly (instead of being translated to local machine paths):
    Display Name: notes.txt
    Target Path: [MyDocuments]\notes.txt

[Known Issue]

  • The 'Downloads' 'Knownfolder' still shows the current user's Downloads path (its not in the list of [enum]::GetNames([System.Environment+SpecialFolder]) items)

[To Do]

  • [ ] Manually parse 'LinkTargetIDLists'

MD5: EF847F994AE8403E6676618FA56BBA55
SHA256: 40D935DC64B2B5857671304A96130233A6F1BF01D12F5715255A7FA9909DBF61

JumplistBrowser (x64)

03 Dec 17:23
ff81157
Compare
Choose a tag to compare

[Update]

  • Replaced 'Network Provider Types' from the ones listed here to this one which is more comprehensive (Curiously, 0x00020000, the most commonly used flag (LanMan) was omitted from the [ms-shllink] 'NetworkProviderType' documentation !!)
    Example output Network Provider Type: 0x00020000 (WNNC_NET_LANMAN)

  • New List:

    Hex Value Vendor
    00010000 WNNC_NET_MSNET
    00020000 WNNC_NET_LANMAN
    00030000 WNNC_NET_NETWARE
    00040000 WNNC_NET_VINES
    00050000 WNNC_NET_10NET
    00060000 WNNC_NET_LOCUS
    00070000 WNNC_NET_SUN_PC_NFS
    00080000 WNNC_NET_LANSTEP
    00090000 WNNC_NET_9TILES
    000A0000 WNNC_NET_LANTASTIC
    000B0000 WNNC_NET_AS400
    000C0000 WNNC_NET_FTP_NFS
    000D0000 WNNC_NET_PATHWORKS
    000E0000 WNNC_NET_LIFENET
    000F0000 WNNC_NET_POWERLAN
    00100000 WNNC_NET_BWNFS
    00110000 WNNC_NET_COGENT
    00120000 WNNC_NET_FARALLON
    00130000 WNNC_NET_APPLETALK
    00140000 WNNC_NET_INTERGRAPH
    00150000 WNNC_NET_SYMFONET
    00160000 WNNC_NET_CLEARCASE
    00170000 WNNC_NET_FRONTIER
    00180000 WNNC_NET_BMC
    00190000 WNNC_NET_DCE
    001A0000 WNNC_NET_AVID
    001B0000 WNNC_NET_DOCUSPACE
    001C0000 WNNC_NET_MANGOSOFT
    001D0000 WNNC_NET_SERNET
    001E0000 WNNC_NET_RIVERFRONT1
    001F0000 WNNC_NET_RIVERFRONT2
    00200000 WNNC_NET_DECORB
    00210000 WNNC_NET_PROTSTOR
    00220000 WNNC_NET_FJ_REDIR
    00230000 WNNC_NET_DISTINCT
    00240000 WNNC_NET_TWINS
    00250000 WNNC_NET_RDR2SAMPLE
    00260000 WNNC_NET_CSC
    00270000 WNNC_NET_3IN1
    00290000 WNNC_NET_EXTENDNET
    002A0000 WNNC_NET_STAC
    002B0000 WNNC_NET_FOXBAT
    002C0000 WNNC_NET_YAHOO
    002D0000 WNNC_NET_EXIFS
    002E0000 WNNC_NET_DAV
    002F0000 WNNC_NET_KNOWARE
    00300000 WNNC_NET_OBJECT_DIRE
    00310000 WNNC_NET_MASFAX
    00320000 WNNC_NET_HOB_NFS
    00330000 WNNC_NET_SHIVA
    00340000 WNNC_NET_IBMAL
    00350000 WNNC_NET_LOCK
    00360000 WNNC_NET_TERMSRV
    00370000 WNNC_NET_SRT
    00380000 WNNC_NET_QUINCY
    00390000 WNNC_NET_OPENAFS
    003A0000 WNNC_NET_AVID1
    003B0000 WNNC_NET_DFS
    003C0000 WNNC_NET_KWNP
    003D0000 WNNC_NET_ZENWORKS
    003E0000 WNNC_NET_DRIVEONWEB
    003F0000 WNNC_NET_VMWARE
    00400000 WNNC_NET_RSFX
    00410000 WNNC_NET_MFILES
    00420000 WNNC_NET_MS_NFS
    00430000 WNNC_NET_GOOGLE
    00440000 WNNC_NET_NDFS

MD5: 46387B795FB5BECB5216C1751BADAE59
SHA256: 561D1C82742247A2E282081BCEB222E41F93B97BD08B46151258C460FC1DAA8B