HTTP Object Analysis from http://riosec.com/files/lnk-exploit.cap.

Object Stats
Filter Objects:
7 Objects
Frame Filename Content-Type Length SHA-1 Hostname
9 tFVoMPhGQ text/xml 895 B d74222cff2b01f64de49e55f6ba61156c101cf00 192.168.1.118
15 tFVoMPhGQ text/xml 895 B ff8c2ae8d0abc727941bafbc0ac05b6e452f1f38 192.168.1.118
21 tFVoMPhGQ text/xml 1.3 KB a694c8e0b5896388146d3ad98749798265ea2aa3 192.168.1.118
22 tFVoMPhGQ 818 B 8607004337ca290d06480503d1c4ebb672d42feb 192.168.1.118
30 CmirolA.lnk application/octet-stream 212 B 6b39f4ec97587e05c6c2556db06f88f78538648f 192.168.1.118
36 snJl.dll application/octet-stream 1.3 KB 9fc867fcb093153250b85cf1359b97e2f8d6c788 192.168.1.118
37 snJl.dll 1.4 KB 52f26ab7005b7cbd44b06196f412a27880173868 192.168.1.118
Important Announcement: CS Personal is taking a break