Windows 디렉토리/파일 검색

Windows 아티팩트 검색

MD5SHA1경로(파일명)
ebc5f4a2033c997d9f9e02cef2986849 38034a586a9a983fc4b985506783cb5c50039b50 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group3\01a - Windows PowerShell.lnk
d104e597347c47bcc8006ce55685851e 4034896c076f623d03b639379d9579a8b829882c [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group3\01 - Command Prompt.lnk
6bf681d3855456ce8f559e9f32227c9a 0a1b609346dafae354d74b9be26ca67b2b48e913 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\$I30
e7dc96f8ae6d279d7b3de9baf1f4a0be 026ec7c376af3077890cb02048fe156144aad436 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini
85d7b0780dc8d2c7cce07c3bceec77d3 d175a44b914a09e7669f2320fba95da38a3a3d46 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\5 - Task Manager.lnk
eb34fbc2cea6bdd695becc79bb33d6f0 483d7910d5318a60d7cd4d8d40cc4931d8bb28cc [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\4 - Control Panel.lnk
5aeef797f4ce51683f3321c337ae9d85 9255e9042d130c504645a64beed00d4a4c233fd8 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\3 - Windows Explorer.lnk
c5366879141b580c4d525e5641ac19c3 510d0e63acaed1977cf778ca89d0d68e0ff987f6 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\2 - Search.lnk
b563f4d5e49d52ec85c83c2dd1d52a44 2e1f159f61c0caeb393bfe454b5638f19151e0e4 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group2\1 - Run.lnk
22f192fb4c42df0a72a2fa00f41ce01a 812043cf5560b200a6460a8d961eb1f0aba4595f [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini
fb99c516cba2f334dd31dbfae0a1b9a7 8063d824fa4163200fac5258e9ba79d18849e4f1 [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\WinX\Group1\1 - Desktop.lnk
d34c26423009e5802e4eb9bdb8a0c4ec 7150e7c73999d46e9e75580f677b57da78df6cba [NTFS]\[root]\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml
3d4c309f5ec11cd878d7bc888e1590df 8903fa020cd7efc2b8c61da53683c46be7bfe98c [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\$I30
59071590099d21dd439896592338bf95 6a521e1d2a632c26e53b83d2cc4b0edecfc1e68c [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms
5380d8a69fdbd9405b889409efa7c1ee 52ab95acfce4bc24578635ec383945bc0ea0d5fc [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms
a792b7d2876f82c4e71c1448ac58b2e3 355e31fd9360986c76c7083c2200348748435f45 [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf
68f3cb4780163a2dd525fe775d96f469 b8fbae0832170b3e5f5969a0916eb36a31c8e7c9 [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.LOG2
d1e796e1f495e481abe2037c1a101a48 b38d0061c26d4cc04f6e338f9082c15a63ed4240 [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.LOG1
59fa57071835440daa070cbced39c01f 8ce3990f4bfa8279380dee950694f76595ed698d [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\NTUSER.DAT
d41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 [NTFS]\[root]\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead