Exposing the Scam Behind TorGPT: Uncovering the Hidden Threat
A few months ago, a friend handed me a file named TorGPT.exe, claiming it was a cutting-edge AI tool that wasn’t functioning on their system. The demo video looked promising, and out of curiosity, I decided to test it on my own machine. However, due to an issue with .NET dependencies, it failed to execute, and I put it aside, forgetting about it.
Recently, while working on a forensic analysis algorithm, the file caught my attention again. Running it through my tools revealed shocking findings: TorGPT.exe wasn’t just malfunctioning—it was a sophisticated malware dropper. It deployed SpyNote malware, a dangerous spyware capable of compromising systems. This report documents my analysis, evidence, and findings to expose the malicious intent behind this scam.
Caution
This report is for educational and ethical purposes only. The information contained herein aims to expose malicious campaigns and aid in defending against them. Under no circumstances should this analysis be used for unauthorized activities or malicious intent.
- TorGPT.exe is a dropper malware disguised as an AI-based application.
- It exploits victims' systems by delivering SpyNote malware and other malicious payloads.
- Some contacted domains and IPs are known to mislead investigators by:
- Using legitimate-looking endpoints.
- Returning errors, such as
{"BadRequest":"An endpoint for the request '' is not valid for this service"}, to evade detection.
- It is part of a larger scam targeting unsuspecting users with fake AI tools.
- If you are looking for more technical details, see the sections below for a detailed breakdown.
- Name:
TorGPT.exe - Type: Win32 Executable
- Detected: 43/75 antivirus engines flagged this as malicious.
-
cfb22ef7-547c-4043-b2cc-30ae6b292def.dll
- Type: Win32 DLL
- Size: 462.00 KB
- Purpose: Likely used for malicious injection or persistence.
- Detection Rate: Associated with multiple malicious executables like
TJprojMainandSpyNote X.exe.
-
Bundled files within the dropper:
54198208c5df802eca64c371bcc5cffafb1a4303fc24b065c6b6ca08ee84fbc4eab2000b93112b85257650d597275c571cdedc13eee01c0b9568250fb83e82d1- Additional hashes provided in the artifacts section.
The following diagram illustrates the execution chain of TorGPT.exe:
TorGPT.exe
├── Drops: cfb22ef7-547c-4043-b2cc-30ae6b292def.dll
│ ├── Executes: SpyNote X.exe (Multiple Variants)
│ └── Executes: TJprojMain.exe
└── Bundled Payloads:
├── Obfuscated Payload 1 (54198208c5d...)
├── Obfuscated Payload 2 (eab2000b93...)
└── Other malicious files
- TorGPT.exe initiates execution.
- Drops cfb22ef7-547c-4043-b2cc-30ae6b292def.dll, which acts as a loader for:
- SpyNote X.exe (multiple malicious binaries detected).
- TJprojMain.exe, associated with spyware activity.
- query.prod.cms.rt.microsoft.com
- Domain Created: February 2, 1991
- Registrar: MarkMonitor Inc.
- url is legitimate but used to misleads investigators by making fake requests.
- url return:
{"BadRequest":"An endpoint for the request '' is not valid for this service"} - This tactic is used to deter automated analysis and manual investigation.
- 184.25.191.235 (United States, ASN: 16625)
- 192.229.211.108 (United States, ASN: 15133)
- 20.99.133.109 (United States, ASN: 8075)
- 20.99.186.246 (United States, ASN: 8075)
- 23.216.147.76 (United States, ASN: 20940)
Note
Some IPs appear inactive or return 404 errors when queried. However, historical data links them to command-and-control (C2) operations and other malicious campaigns.
- Do not execute unknown files: Always verify the source and integrity of files before running them.
- Use up-to-date antivirus software: Modern security tools can detect and quarantine such threats.
- Analyze suspicious files in a sandboxed environment: Avoid running them on your primary system.
- Block malicious domains and IPs: Add the listed domains and IPs to your firewall or security appliance.
- Report incidents to authorities: Share findings with cybersecurity organizations for wider awareness.
- Be cautious of misleading indicators: Legitimate-looking domains or IPs returning errors may still be part of a malware delivery chain.
Note
All the findings and artifacts, including hashes and related files, are stored for further analysis. Contributions to this repository are welcome to expand on indicators of compromise (IOCs) and additional research.
If you've made it this far, you likely want to dive deeper into the technical details.
This section is where the real forensic analysis comes to life.
Get ready for a comprehensive breakdown of the evidence and the inner workings of the malicious software.
| Property | Value |
|---|---|
| Name | TorGPT.exe |
| MD5 | 0510475cbbfd2001438a2cef052328ab |
| SHA-1 | ca031654255f58f29d2c1d99075ca00edaf52255 |
| SHA-256 | c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd |
| Vhash | 21703675151550c32292660828 |
| Authentihash | 0cef7c356eae1b52225daa33bd197072952be622b39e057e3822d0fe2365a6e4 |
| Imphash | f34d5f2d4577ed6d9ceec516c1f5a744 |
| SSDEEP | 196608:Y9cWyqfiAPEmTU9VWRc8Unf8zFpeUc37T1AGFX6rhDzVxfj2PFN9sWf:LWpfdE2KnfapeV316rhDz/fj2PFZf |
| TLSH | T11AD622023A504D66D076A7F99893EA3CB3722EF81920C64B16F2EE5BFD523D41D3D681 |
| File Type | Win32 EXE, executable, windows, win32, pe, peexe |
| Magic | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| TrID | Generic CIL Executable (.NET, Mono, etc.) (44.1%) Windows Control Panel Item (generic) (34.8%) Win64 Executable (generic) (6.3%) Win32 Dynamic Link Library (generic) (3.9%) Win16 NE executable (generic) (3%) |
| DetectItEasy | PE32 Library: Costura.Fody Library: .NET (v4.0.30319) Linker: Microsoft Linker |
| Magika | PEBIN |
| File Size | 12.18 MB (12774400 bytes) |
| PEiD Packer | .NET executable |
| Property | Value |
|---|---|
| Creation Time | 2079-11-17 05:53:41 UTC |
| Property | Value |
|---|---|
| Signature Verification | File is not signed |
| File Version Information | Copyright © 2024 |
| Product | TorGPT |
| Description | TorGPT |
| Original Name | TorGPT.exe |
| Internal Name | TorGPT.exe |
| File Version | 1.0.0.0 |
| Comments | We Learn We Did |
| Property | Value |
|---|---|
| Module Version Id | 83e9492f-ea46-405a-a293-5797d18df38c |
| TypeLib Id | b5221054-69ed-43e7-91d8-19422d294f5b |
| Target Machine | Intel 386 or later processors and compatible processors |
| Compilation Timestamp | 2079-11-17 05:53:41 UTC |
| Entry Point | 12550430 |
| Contained Sections | 3 |
| Sections | Name |
| .text | |
| .rsrc | |
| .reloc |
mscoree.dll
- RT_GROUP_ICON: 1
- RT_VERSION: 1
- RT_MANIFEST: 1
- RT_ICON: 1
- NEUTRAL: 4
| Property | Value |
|---|---|
| SHA-256 | 356ee6b3db9ac3b6ee43a638795c1d41177d3d70ac3e9f2bfd70e3bd90d6f3ae |
| File Type | unknown |
| Type | RT_ICON |
| Language | NEUTRAL |
| Entropy | 3.8 |
| Chi2 | 15171917 |
| SHA-256 | fa10977a1c455d978f9a0d67211d109adfde5718848df251379eadda8ed12485 |
| File Type | ICO |
| Type | RT_GROUP_ICON |
| Language | NEUTRAL |
| Entropy | 2.02 |
| Chi2 | 1797.6 |
| SHA-256 | 941289decf43635430ec2750965d87f47dcec71c431f2c46204fb |
| File Type | unknown |
| Type | RT_VERSION |
| Language | NEUTRAL |
| Entropy | 3.31 |
| Chi2 | 69319.71 |
| SHA-256 | 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a |
| File Type | unknown |
| Type | RT_MANIFEST |
| Language | NEUTRAL |
| Entropy | 5 |
| Chi2 | 4719.86 |
| Property | Value |
|---|---|
| Common Language Runtime metadata version | 1.1 |
| CLR version | v4.0.30319 |
| Assembly name | TorGPT.exe |
| Metadata header Relative Virtual Address | 12516664 |
| Assembly flags | COMIMAGE_FLAGS_ILONLY, COMIMAGE_FLAGS_32BITREQUIRED |
| Entry point token | 100663378 |
| RVA entry point | 1494348 |
| Resources va | 11022315 |
| Streams | Size |
| #GUID | |
| #Blob | |
| #US | |
| #~ | |
| #Strings |
TorGPT.Properties.Resources.resourcesYourEvilChatbotApp.Form1.resourcesYourEvilChatbotApp.ImageGenForm.resourcesYourEvilChatbotApp.intro.resourcescostura.costura.dll.compressedcostura.costura.pdb.compressedcostura.metadatacostura.microsoft.extensions.configuration.abstractions.dll.compressedcostura.microsoft.extensions.configuration.dll.compressedcostura.microsoft.extensions.configuration.fileextensions.dll.compressedcostura.microsoft.extensions.configuration.newtonsoftjson.dll.compressedcostura.microsoft.extensions.fileproviders.abstractions.dll.compressedcostura.microsoft.extensions.fileproviders.physical.dll.compressedcostura.microsoft.extensions.filesystemglobbing.dll.compressedcostura.microsoft.extensions.primitives.dll.compressedcostura.newtonsoft.json.dll.compressedcostura.system.buffers.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.system.memory.dll.compressedcostura.system.numerics.vectors.dll.compressedcostura.system.runtime.compilerservices.unsafe.dll.compressedcostura.system.valuetuple.dll.compressed
Newtonsoft.Json v11.0.0.0System.Drawing v4.0.0.0System.Net.Http v4.2.0.0System v4.0.0.0mscorlib v4.0.0.0System.Windows.Forms v4.0.0.0System.Speech v4.0.0.0System.Core v4.0.0.0
| Property | Value |
|---|---|
| majorversion | 1 |
| hashalgid | 32772 |
| flags_text | afPA_None |
| name | TorGPT |
Main File: TorGPT.exe
|
+-- Dropped Files
| |
| +-- cfb22ef7-547c-4043-b2cc-30ae6b292def.dll (Win32 DLL, 462.00 KB)
| |
| +-- Execution Parents
| | |
| | +-- TJprojMain (Win32 EXE, 70/74 detections)
| | +-- TorGPT.exe (Win32 EXE, 43/75 detections)
| | +-- SpyNote X.exe (Win32 EXE, 45/72 detections)
| | +-- SpyNote X.exe (Win32 EXE, 43/72 detections)
| | +-- TJprojMain (Win32 EXE, 69/74 detections)
| |
| +-- Bundled Files
| |
| +-- 54198208c5df802eca64c371bcc5cffafb1a4303fc24b065c6b6ca08ee84fbc4 (file)
| +-- eab2000b93112b85257650d597275c571cdedc13eee01c0b9568250fb83e82d1 (file)
| +-- 0cc0c39c5edb5d2a08642eb60e1f402890f279b12dd54248851c63a33cb6c748 (file)
| +-- 2bcfd9a1239552778a799f683bf11428dd0a82a8bb21955106cf0d7c2f477560 (file)
| +-- df4b1dc9bd96567d23815718432fb5fa254559cec78aac3645876839d2e28825 (file)
|
+-- Bundled Files
| |
| +-- 1 (XML)
| +-- 9b2837b8b5f37c4661b9d9e9559c757ef5c454d181cf9c127e566ab197f0ab06 (file)
| +-- fa10977a1c455d978f9a0d67211d109adfde5718848df251379eadda8ed12485 (file)
| +-- 83252b25376bbdb062beed858c3639e4283fb072aeb22266e8f35e3d9e199568 (file)
| +-- 353a1ec7b5d932a0cde20205a718ebb1466d076981bf9b9ced55e2b6f7ea2907 (file)
| +-- 097553aa7c4e47f2186e049a37791726713b7cf28b1996605970c40b29e37713 (file)
|
+-- Contacted Domains
| |
| +-- query.prod.cms.rt.microsoft.com (Created: 1991-02-02, Registrar: MarkMonitor Inc.)
|
+-- Contacted IPs
|
+-- 184.25.191.235 (Autonomous System: 16625, Country: US)
+-- 192.229.211.108 (Autonomous System: 15133, Country: US)
+-- 20.99.133.109 (Autonomous System: 8075, Country: US)
+-- 20.99.186.246 (Autonomous System: 8075, Country: US)
+-- 23.216.147.76 (Autonomous System: 20940, Country: US)
| Type | Text | Has Detections | Type Tag |
|---|---|---|---|
| file | TorGPT.exe | true | peexe |
| Type | Text | File Type | Name | File Size |
|---|---|---|---|---|
| file | Win32 DLL | cfb22ef7-547c-4043-b2cc-30ae6b292def.dll | 462.00 KB |
| Type | Text | File Type | Name |
|---|---|---|---|
| file | XML | 1 | |
| file | file | 9b2837b8b5f37c4661b9d9e9559c757ef5c454d181cf9c127e566ab197f0ab06 | |
| file | file | fa10977a1c455d978f9a0d67211d109adfde5718848df251379eadda8ed12485 | |
| file | file | 83252b25376bbdb062beed858c3639e4283fb072aeb22266e8f35e3d9e199568 | |
| file | file | 353a1ec7b5d932a0cde20205a718ebb1466d076981bf9b9ced55e2b6f7ea2907 | |
| file | file | 097553aa7c4e47f2186e049a37791726713b7cf28b1996605970c40b29e37713 |
| Scanned | Detections | Type | Name |
|---|---|---|---|
| 2023-12-20 | 70/74 | Win32 EXE | TJprojMain |
| 2024-08-09 | 43/75 | Win32 EXE | TorGPT.exe |
| 2024-03-26 | 45/72 | Win32 EXE | SpyNote X.exe |
| 2024-07-09 | 43/72 | Win32 EXE | SpyNote X.exe |
| 2024-05-26 | 69/74 | Win32 EXE | TJprojMain |
| Type | Name |
|---|---|
| file | 54198208c5df802eca64c371bcc5cffafb1a4303fc24b065c6b6ca08ee84fbc4 |
| file | eab2000b93112b85257650d597275c571cdedc13eee01c0b9568250fb83e82d1 |
| file | 0cc0c39c5edb5d2a08642eb60e1f402890f279b12dd54248851c63a33cb6c748 |
| file | 2bcfd9a1239552778a799f683bf11428dd0a82a8bb21955106cf0d7c2f477560 |
| file | df4b1dc9bd96567d23815718432fb5fa254559cec78aac3645876839d2e28825 |
| Domain | Created | Registrar |
|---|---|---|
| query.prod.cms.rt.microsoft.com | 1991-02-02 | MarkMonitor Inc. |
| IP | Autonomous System | Country |
|---|---|---|
| 184.25.191.235 | 16625 | US |
| 192.229.211.108 | 15133 | US |
| 20.99.133.109 | 8075 | US |
| 20.99.186.246 | 8075 | US |
| 23.216.147.76 | 20940 | US |
System.ObjectSystem.TypeSystem.RuntimeTypeHandleSystem.EventArgsSystem.StringSystem.IDisposableSystem.EventHandlerSystem.ExceptionSystem.UriSystem.CharSystem.ActionSystem.EnvironmentSystem.StringSplitOptionsSystem.STAThreadAttributeSystem.AppDomainSystem.StringComparisonSystem.ByteSystem.ResolveEventArgsSystem.ResolveEventHandlerSystem.Action1System.MulticastDelegateSystem.IAsyncResultSystem.AsyncCallbackSystem.ValueTypeSystem.GCSystem.ArraySystem.RuntimeFieldHandleSystem.IntPtrSystem.GuidSystem.Int32System.Resources.ResourceManagerSystem.Globalization.CultureInfoSystem.Reflection.AssemblySystem.Reflection.AssemblyNameSystem.Reflection.AssemblyNameFlagsSystem.Reflection.AssemblyTitleAttributeSystem.Reflection.AssemblyDescriptionAttributeSystem.Reflection.AssemblyConfigurationAttributeSystem.Reflection.AssemblyCompanyAttributeSystem.Reflection.AssemblyProductAttributeSystem.Reflection.AssemblyCopyrightAttributeSystem.Reflection.AssemblyTrademarkAttributeSystem.Reflection.AssemblyFileVersionAttributeSystem.ComponentModel.EditorBrowsableAttributeSystem.ComponentModel.EditorBrowsableStateSystem.ComponentModel.IContainerSystem.ComponentModel.ComponentResourceManagerSystem.ComponentModel.ISupportInitializeSystem.ComponentModel.ComponentSystem.CodeDom.Compiler.GeneratedCodeAttributeSystem.Diagnostics.DebuggerNonUserCodeAttributeSystem.Diagnostics.DebuggerStepThroughAttributeSystem.Diagnostics.DebuggerHiddenAttributeSystem.Diagnostics.DebuggableAttributeSystem.Diagnostics.ProcessSystem.Runtime.CompilerServices.CompilerGeneratedAttributeSystem.Runtime.CompilerServices.AsyncVoidMethodBuilderSystem.Runtime.CompilerServices.AsyncStateMachineAttributeSystem.Runtime.CompilerServices.AsyncTaskMethodBuilder1System.Runtime.CompilerServices.AsyncTaskMethodBuilderSystem.Runtime.CompilerServices.IAsyncStateMachineSystem.Runtime.CompilerServices.TaskAwaiter1System.Runtime.CompilerServices.TaskAwaiterSystem.Runtime.CompilerServices.CompilationRelaxationsAttributeSystem.Runtime.CompilerServices.RuntimeCompatibilityAttributeSystem.Runtime.CompilerServices.RuntimeHelpersSystem.Configuration.ApplicationSettingsBaseSystem.Configuration.SettingsBaseSystem.Windows.Forms.FormSystem.Windows.Forms.ButtonSystem.Windows.Forms.TextBoxSystem.Windows.Forms.RichTextBoxSystem.Windows.Forms.LabelSystem.Windows.Forms.PictureBoxSystem.Windows.Forms.ControlSystem.Windows.Forms.ClipboardSystem.Windows.Forms.MessageBoxSystem.Windows.Forms.DialogResultSystem.Windows.Forms.MessageBoxButtonsSystem.Windows.Forms.MessageBoxIconSystem.Windows.Forms.ImageLayoutSystem.Windows.Forms.ButtonBaseSystem.Windows.Forms.FlatStyleSystem.Windows.Forms.PictureBoxSizeModeSystem.Windows.Forms.ContainerControlSystem.Windows.Forms.AutoScaleModeSystem.Windows.Forms.FormStartPositionSystem.Windows.Forms.TextBoxBaseSystem.Windows.Forms.SaveFileDialogSystem.Windows.Forms.FileDialogSystem.Windows.Forms.CommonDialogSystem.Windows.Forms.TimerSystem.Windows.Forms.FormBorderStyleSystem.Windows.Forms.FormClosedEventHandlerSystem.Windows.Forms.FormClosedEventArgsSystem.Windows.Forms.ApplicationSystem.Windows.Forms.ScreenSystem.Net.Http.HttpClientSystem.Net.HttpFormUrlEncodedContentSystem.Net.Http.HttpResponseMessageSystem.Net.Http.HttpContentSystem.Net.Http.MultipartFormDataContentSystem.Net.Http.StreamContentSystem.Net.Http.HttpMessageInvokerSystem.Net.Http.ByteArrayContentSystem.Speech.Synthesis.SpeechSynthesizerSystem.Speech.Synthesis.PromptSystem.Collections.Generic.List1System.Collections.Generic.KeyValuePair2System.Collections.Generic.IEnumerable1System.Collections.Generic.IEnumerator1System.Collections.Generic.Dictionary2System.Threading.Tasks.Task1System.Threading.Tasks.TaskSystem.Threading.Tasks.ParallelSystem.Threading.Tasks.ParallelLoopResultNewtonsoft.Json.Linq.JObjectNewtonsoft.Json.Linq.JTokenSystem.Drawing.ColorSystem.Drawing.ImageSystem.Drawing.PointSystem.Drawing.SizeSystem.Drawing.FontSystem.Drawing.FontStyleSystem.Drawing.GraphicsUnitSystem.Drawing.SystemColorsSystem.Drawing.ContentAlignmentSystem.Drawing.SizeFSystem.Drawing.IconSystem.Drawing.RectangleSystem.Drawing.BitmapSystem.Drawing.Graphicsuncategorized.ControlCollectionuncategorized.SpecialFolderuncategorized.DebuggingModesSystem.IO.FileStreamSystem.IO.FileModeSystem.IO.StreamSystem.IO.PathSystem.IO.FileInfoSystem.IO.DirectorySystem.IO.MemoryStreamSystem.IO.FileSystem.IO.DirectoryInfoSystem.Linq.EnumerableSystem.Collections.IEnumeratorSystem.Drawing.Imaging.ImageFormatSystem.Drawing.Imaging.PixelFormatSystem.IO.Compression.DeflateStreamSystem.IO.Compression.CompressionModeSystem.Threading.MonitorSystem.Threading.InterlockedSystem.Threading.ThreadSystem.Runtime.InteropServices.ComVisibleAttributeSystem.Runtime.InteropServices.GuidAttributeSystem.Runtime.InteropServices.MarshalSystem.Runtime.Versioning.TargetFrameworkAttributeSystem.Net.WebClientSystem.Net.ServicePointManagerSystem.Net.SecurityProtocolTypeSystem.Collections.Specialized.NameValueCollectionSystem.Text.RegularExpressions.RegexSystem.Text.RegularExpressions.MatchSystem.Text.RegularExpressions.CaptureSystem.Security.Principal.WindowsIdentitySystem.Security.Principal.SecurityIdentifierSystem.Security.Principal.IdentityReference
kernel32.dllkernel32
kernel32.dll: ExitProcess, LoadLibrary, GetProcAddress, VirtualProtect, AllocConsolekernel32: GetModuleHandle, LoadLibrary, GetProcAddress
query.prod.cms.rt.microsoft.com
20.99.186.246:443192.229.211.108:80184.25.191.235:443(query.prod.cms.rt.microsoft.com)23.216.147.76:44320.99.133.109:443
fontfabrik.comipapi.cowww.apache.orgwww.carterandcone.coml(Note: The domain seems to have a typo, should bewww.carterandcone.com)www.fontbureau.comwww.fonts.comwww.founder.com.cnwww.galapagosdesign.comwww.goodfont.co.krwww.jiyu-kobo.co.jpwww.sajatypeworks.comwww.sakkal.comwww.sandoll.co.krwww.tiro.comwww.typography.net(Note: The domain seems to have a typo, should bewww.typography.com)www.urwpp.de(Note: The domain seems to have a typo, should bewww.urwpp.de)www.zhongyicts.com.cn
http://fontfabrik.comhttp://www.apache.org/licenses/LICENSE-2.0http://www.carterandcone.comhttp://www.carterandcone.com/designershttp://www.carterandcone.com/designers/cabarga.htmlhttp://www.carterandcone.com/designers/frere-jones.htmlhttp://www.carterandcone.com/designers8http://www.carterandcone.com/designersGhttp://www.carterandcone.com/designers?http://www.fontbureau.comhttp://www.founder.com.cn/cn/bThehttp://www.founder.com.cn/cn/cThehttp://www.galapagosdesign.com/staff/dennis.htmhttp://www.goodfont.co.krhttp://www.jiyu-kobo.co.jphttp://www.sajatypeworks.comhttp://www.sakkal.comhttp://www.tiro.comhttp://www.typography.netDhttps://://www.urwpp.deDPleasehttp://www.zhongyicts.com.cn
https://://ipapi.co/iphttps://ipapi.co/ip%shttps://www.ipapi.co/iphttps://www.zhongyicts.com.cn
- `https://www.zhongyicts.com.cn"
https://www.zhongyicts.com.cn(Note: The domain seems to have a typo, should bewww.zhongyicts.com.cn)
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TorGPT_@SamsExploit.exe.logC:\Users\user\AppData\Local\Temp\tmpDA49.tmpC:\Users\user\AppData\Local\Temp\tmpDA49.tmp\3b9e0ce4-2017-4161-ae61-37f7d58d2d9a.dllC:\Users\user\Desktop\TorGPT_@SamsExploit.exeC:\Users\user\Desktop\TorGPT_@SamsExploit.exe.configC:\WINDOWS\FONTS\AGENCYB.TTFC:\WINDOWS\FONTS\AGENCYR.TTFC:\WINDOWS\FONTS\ALGER.TTFC:\WINDOWS\FONTS\ANTQUAB.TTFC:\WINDOWS\FONTS\ANTQUAB.TTFC:\WINDOWS\FONTS\ANTQUAI.TTFC:\WINDOWS\FONTS\ARIAL.TTFC:\WINDOWS\FONTS\ARIALBD.TTFC:\WINDOWS\FONTS\ARIALBI.TTFC:\WINDOWS\FONTS\ARIALI.TTFC:\WINDOWS\FONTS\ARIALN.TTFC:\WINDOWS\FONTS\ARIALN.TTFC:\WINDOWS\FONTS\ARIALNBI.TTFC:\WINDOWS\FONTS\ARIALNI.TTFC:\WINDOWS\FONTS\ARIBLK.TTFC:\WINDOWS\FONTS\ARLRDBD.TTFC:\WINDOWS\FONTS\BAHNS93.TTFC:\WINDOWS\FONTS\BAUHS.TTFC:\WINDOWS\FONTS\BAHNS93.TTFC:\WINDOWS\FONTS\BAUHSB.TTFC:\WINDOWS\FONTS\BAUHS93.TTFC:\WINDOWS\FONTS\BAUHSB.TTFC:\WINDOWS\FONTS\BAUHS93.TTFC:\WINDOWS\FONTS\BAHNSR.TTFC:\WINDOWS\FONTS\BAUHS93.TTFC:\WINDOWS\FONTS\BELLHC.TTFC:\WINDOWS\FONTS\BELLHC.TTFC:\WINDOWS\FONTS\BOD_B.TTFC:\WINDOWS\FONTS\BOD_PSTC.TTFC:\WINDOWS\FONTS\BOOKOS.TTFC:\WINDOWS\FONTS\BOD_PSTC.TTFC:\WINDOWS\FONTS\BOOKOS.TTFC:\WINDOWS\FONTS\BOD_PSTC.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOOKOS.TTFC:\WINDOWS\FONTS\BROADW.TTFC:\WINDOWS\FONTS\BRITANic.TTFC:\WINDOWS\FONTS\BRLNSB.TTFC:\WINDOWS\FONTS\BRLNSDB.TTFC:\WINDOWS\FONTS\BRLNSR.TTFC:\WINDOWS\FONTS\BROADW.TTFC:\WINDOWS\FONTS\BRLNSB.TTFC:\WINDOWS\FONTS\CASTELAR.TTFC:\WINDOWS\FONTS\BOD_B.TTFC:\WINDOWS\FONTS\CASTELAR.TTFC:\WINDOWS\FONTS\BOD_PSTC.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BOD_R.TTFC:\WINDOWS\FONTS\BRADHITC.TTFC:\WINDOWS\FONTS\BRITANIC.TTFC:\WINDOWS\FONTS\BRLNSR.TTFC:\WINDOWS\FONTS\BRLNSR.TTFC:\WINDOWS\FONTS\BROADW.TTFC:\WINDOWS\FONTS\BROADW.TTFC:\WINDOWS\FONTS\BRUSHSCI.TTFC:\WINDOWS\FONTS\COPIA.TTFC:\WINDOWS\FONTS\COPT0.TTFC:\WINDOWS\FONTS\COMIC.TTFC:\WINDOWS\FONTS\COMICI.TTFC:\WINDOWS\FONTS\CONSOLA.TTFC:\WINDOWS\FONTS\COOPBL.TTFC:\WINDOWS\FONTS\GABRIOLA.TTFC:\WINDOWS\FONTS\GADUGI.TTFC:\WINDOWS\FONTS\GADUGIB.TTFC:\WINDOWS\FONTS\GARA.TTFC:\WINDOWS\FONTS\GARABD.TTFC:\WINDOWS\FONTS\GARAIT.TTFC:\WINDOWS\FONTS\GEORGIA.TTFC:\WINDOWS\FONTS\GEORGIAI.TTFC:\WINDOWS\FONTS\GEORGIAZ.TTFC:\WINDOWS\FONTS\GIGI.TTFC:\WINDOWS\FONTS\GILBI____.TTFC:\WINDOWS\FONTS\GIL_____.TTFC:\WINDOWS\FONTS\GILC_____.TTFC:\WINDOWS\FONTS\GILI_____.TTFC:\WINDOWS\FONTS\GLECB.TTFC:\WINDOWS\FONTS\GLSNECB.TTFC:\WINDOWS\FONTS\GOTHIC.TTFC:\WINDOWS\FONTS\GOTHICB.TTFC:\WINDOWS\FONTS\GOTHICBI.TTFC:\WINDOWS\FONTS\GOTHICI.TTFC:\WINDOWS\FONTS\GOTHICCN.TTFC:\WINDOWS\FONTS\GOTHICCN.TTFC:\WINDOWS\FONTS\GOTHICIT.TTFC:\WINDOWS\FONTS\GOTHICN.TTFC:\WINDOWS\FONTS\GOTHIC.ttfC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARNGTON.TTFC:\WINDOWS\FONTS\HARNGTON.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWDC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARNGTON.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARNGTON.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWOWI.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWSI.TTFC:\WINDOWS\FONTS\HARLOWSI.TTF
C:\Users\user\AppData\Local\Temp\tmp2B81.tmp\5198dbfb-4c95-493e-8898-39266ef039aa.dllC:\Users\user\AppData\Local\Temp\tmpDA49.tmp\3b9e0ce4-2017-4161-ae61-37f7d58d2d9a.dllC:\Users\user\AppData\RoamingC:\ProgramData\Microsoft\Windows\WER\Temp\WER1D66.tmp.WERInternalMetadata.xml0:\Users\user\AppData\Local\Temp\tmp2B81.tmp\5198dbfb-4c95-493e-8898-39266ef039aa.dll
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D66.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E50.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E80.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER2382.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER2392.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2393.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER296C.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER296D.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A47.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A58.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A87.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A88.tmp.txtC:\Windows\System32\spp\store\2.0\cache\cache.datC:\Users\user\AppData\Local\Temp\tmpDA49.tmp
%USERPROFILE%\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TorGPT_@SamsExploit.exe.log%USERPROFILE%\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd.exe.log%USERPROFILE%\AppData\Local\Temp\tmpE87B.tmp%USERPROFILE%\AppData\Local\Temp\tmpE87B.tmp\8a45efc6-43dc-47c5-a83e-918ad0207457.dll%USERPROFILE%\AppData\Local\Temp\tmpF57B.tmp%USERPROFILE%\AppData\Local\Temp\tmpF57B.tmp\c9768aec-9e91-4ef8-a55d-c1d878e73bf7.dllC:\ProgramData\Microsoft\Windows\WER\Temp\WER1D66.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER1D66.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E50.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E50.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E80.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER1E80.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER2382.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2382.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER2392.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2392.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2393.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2393.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER296C.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER296C.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER296D.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER296D.tmp.WERInternalMetadata.xmlC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A47.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A47.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A58.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A58.tmp.csvC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A87.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A87.tmp.txtC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A88.tmpC:\ProgramData\Microsoft\Windows\WER\Temp\WER2A88.tmp.txtC:\Windows\System32\spp\store\2.0\cache\cache.datC:\Windows\System32\spp\store\2.0\data.dat.tmpC:\Users\user\AppData\Local\Temp\tmpDA49.tmp\3b9e0ce4-2017-4161-ae61-37f7d58d2d9a.dll
HKEY_CURRENT_USER\EUDC\1252HKEY_CURRENT_USER\SOFTWARE\Microsoft\.NETFramework\XMLHKEY_CURRENT_USER\Software\Microsoft\.NETFrameworkHKEY_CURRENT_USER\Software\Microsoft\CTF\DirectSwitchHotkeysHKEY_CURRENT_USER\Software\Microsoft\FusionHKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\C:|Users|user|Desktop|TorGPT_@SamsExploit.exeHKEY_CURRENT_USER\Software\Microsoft\Installer\Assemblies\GlobalHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ExplorerHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\KnownFoldersHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell FoldersHKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\ExplorerHKEY_CURRENT_USER_ClassesHKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\InstanceHKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance\DisabledHKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\NamespacesHKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000323-0000-0000-C000-000000000046}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Users|user|Desktop|TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Assemblies\GlobalHKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000323-0000-0000-C000-000000000046}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InprocHandlerHKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InprocHandler32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InprocServer32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\LocalServerHKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\LocalServer32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\TreatAsHKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\NamespacesHKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00000134-0000-0000-C000-000000000046}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00000134-0000-0000-C000-000000000046}\ProxyStubClsid32HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00000160-0000-0000-C000-000000000046}HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00000160-0000-0000-C000-000000000046}\ProxyStubClsid32HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\ServicingHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\PackagesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.Accessibility__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Core__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Data.SqlXml__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Drawing__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Net.Http__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Numerics__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Security__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Speech__31bf3856ad364e35HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Windows.Forms__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.Accessibility__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Core__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Data.SqlXml__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Drawing__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Net.Http__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Numerics__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Security__b03f5f7f11d50a3aHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Speech__31bf3856ad364e35HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Windows.Forms__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\FullHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLinkHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallbackHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\ImpactHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Microsoft Sans SerifHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassIdHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Foundation.Diagnostics.AsyncCausalityTracerHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Foundation.Diagnostics.AsyncCausalityTracer\CustomAttributesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Globalization.LanguageHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsRuntime\ActivatableClassId\Windows.Globalization.Language\CustomAttributesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlockHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-1015118539-3749460369-599379286-1001\Installer\Assemblies\C:|Users|user|Desktop|TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Managed\S-1-5-21-1015118539-3749460369-599379286-1001\Installer\Assemblies\GlobalHKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppxHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\AppContextHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\Policy\APTCAHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\Policy\StandardsHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\XMLHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\policy\standards\v4.0.30319HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\policy\v4.0HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319\SKUs\defaultHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\CTFHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\CTF\Compatibility\TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Defaults\Provider Types\Type 001HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Defaults\Provider Types\Type 024HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Defaults\Provider\Microsoft Enhanced RSA and AES Cryptographic ProviderHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Defaults\Provider\Microsoft Strong Cryptographic ProviderHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\FusionHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\NET Framework Setup\NDP\v4\FullHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\OLEHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\OLEAUTHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\OLE\DiagnosisHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Ole\ExtensionsHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLinkHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\FontSubstitutesHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallbackHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\FolderDescriptions\{3EB685DB-65F9-4CF6-A03A-E3EF65729F3D}HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\FolderDescriptions\{3EB685DB-65F9-4CF6-A03A-E3EF65729F3D}\PropertyBagHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\FolderDescriptions\{5E6C858F-0E22-4760-9AFE-EA3317B67173}HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\FolderDescriptions\{5E6C858F-0E22-4760-9AFE-EA3317B67173}\PropertyBagHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\OOBEHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\WindowsStoreHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\UILanguages\en-USHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\InterfaceSpecificParameters\{44C728A6-CC3C-434D-B238-E5B6541E3476}HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{3882a85b-858a-11eb-b9e1-806e6f6e6963}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\CustomLocaleHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session ManagerHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Segment HeapHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\Cryptography\ConfigurationHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\InterfaceSpecificParametersHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\ParametersHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FontCache\ParametersHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\ParametersHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{3882A85B-858A-11EB-B9E1-806E6F6E6963}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{44C728A6-CC3C-434D-B238-E5B6541E3476}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3882A85B-858A-11EB-B9E1-806E6F6E6963}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{44C728A6-CC3C-434D-B238-E5B6541E3476}HKEY_LOCAL_MACHINE\Software\ClassesHKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\InstanceHKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{FAE3D380-FEA4-4623-8C75-C6B61110B681}\Instance\DisabledHKEY_LOCAL_MACHINE\Software\Microsoft\COM3HKEY_LOCAL_MACHINE\Software\Microsoft\CryptographyHKEY_LOCAL_MACHINE\Software\Microsoft\FusionHKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\DefaultHKEY_LOCAL_MACHINE\Software\Microsoft\OleHKEY_LOCAL_MACHINE\Software\Microsoft\Ole\FeatureDevelopmentPropertiesHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Disable8And16BitMitigationHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution OptionsHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TorGPT_@SamsExploit.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\OEMHKEY_LOCAL_MACHINE\Software\Microsoft\WindowsRuntimeHKEY_LOCAL_MACHINE\Software\Microsoft\Wow64\x86HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\CryptographyHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\.NETFrameworkHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\.NETFramework\NGen\Policy\v4.0HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\.NETFramework\Policy\HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\.NETFramework\v4.0.30319\SKUs\HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\AvalonGraphicsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Cryptography\DESHashSessionKeyBackwardHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Cryptography\OffloadHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\DirectWriteHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\InputHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\LanguageOverlay\OverlayPackages\en-USHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\OLEHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\OLE\AppCompatHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\OLE\TracingHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\RpcHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\StrongNameHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersionHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlagsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\GRE_InitializeHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution OptionsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\ProfileListHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1015118539-3749460369-599379286-1001HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\FolderDescriptionsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\KnownFolderSettingsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySideHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\SideBySide\AssemblyStorageRootsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\DwmHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\MUI\SettingsHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\System\DNSClientHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows NT\DnsClientHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\WindowsNT\RpcHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows\DisplayHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows\ExplorerHKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows\Safer\CodeIdentifiersHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\ComputerName\ActiveComputerNameHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystemHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LsaHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicyHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\MUI\Settings\LanguageHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\MUI\UILanguagesHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\MUI\UILanguages\PendingDeleteHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\NLS\LanguageHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\NLS\CustomLocaleHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\NLS\ExtendedLocaleHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\NLS\Sorting\IdsHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\NLS\Sorting\VersionsHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\OptionHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session ManagerHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Srp\GP\DLLHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\StateSeparation\RedirectionMap\KeysHKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DNSHKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\ParametersHKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{3882A85B-858A-11EB-B9E1-806E6F6E6963}HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{44C728A6-CC3C-434D-B238-E5B6541E3476}HKEY_LOCAL_MACHINE\System\SetupHKEY_USERS.DEFAULTHKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
%SAMPLEPATH%\TorGPT_@SamsExploit.exe%SAMPLEPATH%\c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd.exeC:\Windows\System32\wuapihost.exeC:\Users\user\Desktop\TorGPT_@SamsExploit.exe
%SAMPLEPATH%\TorGPT_@SamsExploit.exe%SAMPLEPATH%\c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd.exeC:\Windows\System32\wuapihost.exe -Embedding
%SAMPLEPATH%\TorGPT_@SamsExploit.exe%SAMPLEPATH%\c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd.exeC:\Windows\System32\wuapihost.exe
3952: explorer.exe3228: TorGPT_@SamsExploit.exe616: svchost.exe2944: wuapihost.exe
1204: TorGPT_@SamsExploit.exe
- Runtime modules
%SAMPLEPATH%\c77eabee5160b93b7f5242b351d1c3648105e9b1c567ebc1e1c005408191d9dd.exe%USERPROFILE%\AppData\Local\Temp\tmpE87B.tmp\8a45efc6-43dc-47c5-a83e-918ad0207457.dll%USERPROFILE%\AppData\Local\Temp\tmpF57B.tmp\c9768aec-9e91-4ef8-a55d-c1d878e73bf7.dll