A security administrator is reviewing the following network capture:
Which of the following malware is MOST likely to generate the above information?
Click on the arrows to vote for the correct answer
A.