Anonymous ID: 37e515 Sept. 24, 2018, 6:10 a.m. No.3163572   🗄️.is 🔗kun   >>3661 >>4003

Ramirez (second accuser) is represented by Stan Garnett. He was the Boulder DA who led the Boulder keystone cops on the wild goose chase that botched the Jonbenet murder investigation.

Anonymous ID: 37e515 Sept. 24, 2018, 6:31 a.m. No.3163722   🗄️.is 🔗kun   >>3760 >>4003

>>3163682

 

Some details - limited attack vector.

 

WaitList.dat

‘WaitList.dat’ (WaitList) is a data file which has been found to contain stripped text from email, contact and document files. The population of data within WaitList is associated with the ‘Microsoft Windows Search Indexer’ process. This process locks the WaitList file on a live system.

WaitList is located in the following directory on Windows 8.1 and 10 systems (may exist on other OS versions, however I do not have systems to test this):

C:\Users\%User%\AppData\Local\Microsoft\InputPersonalization\TextHarvester\WaitList.dat

I have only identified WaitList on PCs which have utilized touch screen handwriting recognition features. My own touch screen laptop did not contain this file, as I had not used the feature. In order to test its creation, I setup and began using the handwriting recognition in OneNote, and WaitList was soon automatically created. The following morning full text extracts of all emails I had received overnight were populated within WaitList.

Registry comparison before and after my test showed the following registry key modifications:

 

Key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\InputPersonalization