{"id":9082,"date":"2020-12-19T09:14:39","date_gmt":"2020-12-19T08:14:39","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=9082"},"modified":"2022-03-25T14:15:42","modified_gmt":"2022-03-25T13:15:42","slug":"performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/","title":{"rendered":"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>We are glad to announce significant performance improvements in the latest versions of THOR.<\/p>\n<p>We&#8217;ve refactored several processing units to bulk scan elements that have previously been checked each at a time. These changes affect the modules &#8220;Eventlog&#8221;, &#8220;Registry&#8221;, &#8220;RegistryHive&#8221; and &#8220;Logscan&#8221;.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The performance improvements are impressive, especially on systems with big Windows event logs or log files on disk, but also on systems that contain a lot of registry hives like domain controllers or multi-user systems.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/12\/Screenshot-2020-12-18-at-12.13.19.png&#8221; title_text=&#8221;Screenshot 2020-12-18 at 12.13.19&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/12\/Screenshot-2020-12-18-at-12.13.31.png&#8221; title_text=&#8221;Screenshot 2020-12-18 at 12.13.31&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/12\/Screenshot-2020-12-18-at-12.13.49.png&#8221; title_text=&#8221;Screenshot 2020-12-18 at 12.13.49&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/12\/Screenshot-2020-12-18-at-12.13.58.png&#8221; title_text=&#8221;Screenshot 2020-12-18 at 12.13.58&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2020\/12\/Screenshot-2020-12-18-at-12.14.10.png&#8221; title_text=&#8221;Screenshot 2020-12-18 at 12.14.10&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.7.7&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>As these changes result in significant speed benefits, we&#8217;ve decided to exclude some elements from the &#8220;max-file-size&#8221; limit.<\/p>\n<p>In the past, log files or registry hives bigger than &#8220;max-file-size&#8221; (default 12MB) have been skipped in normal scan modes. Only in intense (&#8211;intense) and lab scanning mode (&#8211;fsonly \/ &#8211;lab in TechPreview) these files have been included and analyzed with the respective modules.<\/p>\n<p>THOR v10.5.9 and THOR v10.6.2 TechPreview now include these elements in their deeper analysis during file system scans. This could lead to longer scan times in some cases. We believe that overall scans turn out to be suprisingly faster and would be interested in feedback on the scan durations in your environments.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are glad to announce significant performance improvements in the latest versions of THOR. We&#8217;ve refactored several processing units to bulk scan elements that have previously been checked each at a time. These changes affect the modules &#8220;Eventlog&#8221;, &#8220;Registry&#8221;, &#8220;RegistryHive&#8221; and &#8220;Logscan&#8221;.\u00a0The performance improvements are impressive, especially on systems with big Windows event logs or log files on disk, but also on systems that contain a lot of registry hives like domain controllers or multi-user systems.\u00a0As these changes result in significant speed benefits, we&#8217;ve decided to exclude some elements from the &#8220;max-file-size&#8221; limit. In the past, log files or registry hives bigger than &#8220;max-file-size&#8221; (default 12MB) have been skipped in normal scan modes. Only in intense (&#8211;intense) and lab scanning mode (&#8211;fsonly \/ &#8211;lab in TechPreview) these files have been included and analyzed with the respective modules. THOR v10.5.9 and THOR v10.6.2 TechPreview now include these elements in their deeper analysis during file system scans. This could lead to longer scan times in some cases. We believe that overall scans turn out to be suprisingly faster and would be interested in feedback on the scan durations in your environments.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[46,32],"tags":[90,170,592,593,89,520,463,117,59,584,5,48],"class_list":["post-9082","post","type-post","status-publish","format-standard","hentry","category-newsletter","category-thor","tag-analysis","tag-file","tag-hive","tag-improvement","tag-log","tag-performance","tag-registry","tag-scan","tag-sigma","tag-techpreview","tag-thor","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2 - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2\",\"datePublished\":\"2020-12-19T08:14:39+00:00\",\"dateModified\":\"2022-03-25T13:15:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\"},\"wordCount\":479,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"analysis\",\"file\",\"hive\",\"improvement\",\"log\",\"performance\",\"registry\",\"scan\",\"Sigma\",\"techpreview\",\"thor\",\"YARA\"],\"articleSection\":[\"Newsletter\",\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\",\"name\":\"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2 - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2020-12-19T08:14:39+00:00\",\"dateModified\":\"2022-03-25T13:15:42+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2 - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2","datePublished":"2020-12-19T08:14:39+00:00","dateModified":"2022-03-25T13:15:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/"},"wordCount":479,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["analysis","file","hive","improvement","log","performance","registry","scan","Sigma","techpreview","thor","YARA"],"articleSection":["Newsletter","THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/","url":"https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/","name":"Performance Refactoring in THOR v10.5.9 and THOR TechPreview v10.6.2 - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2020-12-19T08:14:39+00:00","dateModified":"2022-03-25T13:15:42+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2020\/12\/19\/performance-refactoring-in-thor-v10-5-9-and-thor-techpreview-v10-6-2\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/9082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=9082"}],"version-history":[{"count":6,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/9082\/revisions"}],"predecessor-version":[{"id":9096,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/9082\/revisions\/9096"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=9082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=9082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=9082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}