Skip to content

Proxy List

Evidence: Proxy List
Description: Collect information about proxy list
Category: Network
Platform: windows
Short Name: prxy
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Windows stores HTTP proxy configuration in the registry. Proxy settings control how Windows and Internet Explorer route HTTP/HTTPS traffic through proxy servers.

Proxy configuration can indicate normal corporate policy or malicious proxy settings used for traffic interception or C2 communication.

This collector gathers structured data about proxy list.

FieldDescriptionExample
ProxyEnabledWhether proxy is enabledFALSE
ProxyAddressProxy server address and portproxy.corp.local:8080

This evidence is collected as part of the System collector by reading:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings - ProxyEnable value
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings - ProxyServer value

Proxy configuration reveals network traffic routing and can indicate traffic interception. Investigators use this data to verify legitimate proxy usage, detect malicious proxy configurations, identify traffic interception attempts, correlate with network traffic patterns, and detect C2 proxy usage.