IOC Report
Proxy32.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Proxy32.exe
"C:\Users\user\Desktop\Proxy32.exe"

URLs

Name
IP
Malicious
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.thawte.com0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
51F000
unkown
page readonly
BBB000
stack
page read and write
F2B000
heap
page read and write
F3D000
heap
page read and write
51F000
unkown
page readonly
511000
unkown
page execute read
13B0000
heap
page read and write
523000
unkown
page read and write
F54000
heap
page read and write
1020000
heap
page read and write
EFC000
stack
page read and write
108E000
stack
page read and write
10D0000
heap
page read and write
523000
unkown
page write copy
526000
unkown
page readonly
F20000
heap
page read and write
511000
unkown
page execute read
2ACF000
stack
page read and write
510000
unkown
page readonly
10E0000
heap
page read and write
2B60000
heap
page read and write
510000
unkown
page readonly
F10000
heap
page read and write
526000
unkown
page readonly
There are 14 hidden memdumps, click here to show them.