I keep getting this message through my FireWall
ran virus scan and trojan and get nothing
what does it mean? its some type of outbound communication?
The executable has changed since the last time you used: C:\WINDOWS\System32\ntoskrnl.exe
File Version : 5.1.2600.1605
File Description : NT Kernel & System
File Path : C:\WINDOWS\System32\ntoskrnl.exe
Process ID : 0x4 (Heximal) 4 (Decimal)
Connection origin : local initiated
Protocol : UDP
Local Address : 188.116.122.100
Local Port : 137
Remote Name :
Remote Address : 188.116.122.255
Remote Port : 137 (NETBIOS-NS - Browsing requests of NetBIOS over TCP/IP)
Ethernet packet details:
Ethernet II (Packet Length: 106)
Destination: ff-ff-ff-ff-ff-ff
Source: 02-33-15-5e-09-e8
Type: IP (0x0800)
Internet Protocol
Version: 4
Header Length: 20 bytes
Flags:
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset:0
Time to live: 128
Protocol: 0x11 (UDP - User Datagram Protocol)
Header checksum: 0x2ee0 (Correct)
Source: 188.116.122.100
Destination: 188.116.122.255
User Datagram Protocol
Source port: 137
Destination port: 137
Length: 8
Checksum: 0xada3 (Correct)
Data (58 Bytes)
Binary dump of the packet:
0000: FF FF FF FF FF FF 00 30 : 05 5E 96 E7 08 00 45 00 | .......0.^....E.
0010: 00 4E 02 2E 00 00 80 11 : E0 2E B1 6F 7A 64 B1 6F | .N.........ozd.o
0020: 7A FF 00 89 00 89 00 3A : A3 AD 80 02 01 10 00 01 | z......:........
0030: 00 00 00 00 00 00 20 46 : 48 46 41 45 42 45 45 43 | ...... FHFAEBEEC
0040: 4F 45 4F 45 46 46 45 43 : 4F 43 4F 43 41 43 41 43 | OEOEFFECOCOCACAC
0050: 41 43 41 43 41 41 41 00 : 00 20 00 01 F7 B7 E8 DD | ACACAAA.. ......
0060: CE 17 03 01 02 30 00 A3 : 60 A1 | .....0..`.
ran virus scan and trojan and get nothing
what does it mean? its some type of outbound communication?
The executable has changed since the last time you used: C:\WINDOWS\System32\ntoskrnl.exe
File Version : 5.1.2600.1605
File Description : NT Kernel & System
File Path : C:\WINDOWS\System32\ntoskrnl.exe
Process ID : 0x4 (Heximal) 4 (Decimal)
Connection origin : local initiated
Protocol : UDP
Local Address : 188.116.122.100
Local Port : 137
Remote Name :
Remote Address : 188.116.122.255
Remote Port : 137 (NETBIOS-NS - Browsing requests of NetBIOS over TCP/IP)
Ethernet packet details:
Ethernet II (Packet Length: 106)
Destination: ff-ff-ff-ff-ff-ff
Source: 02-33-15-5e-09-e8
Type: IP (0x0800)
Internet Protocol
Version: 4
Header Length: 20 bytes
Flags:
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset:0
Time to live: 128
Protocol: 0x11 (UDP - User Datagram Protocol)
Header checksum: 0x2ee0 (Correct)
Source: 188.116.122.100
Destination: 188.116.122.255
User Datagram Protocol
Source port: 137
Destination port: 137
Length: 8
Checksum: 0xada3 (Correct)
Data (58 Bytes)
Binary dump of the packet:
0000: FF FF FF FF FF FF 00 30 : 05 5E 96 E7 08 00 45 00 | .......0.^....E.
0010: 00 4E 02 2E 00 00 80 11 : E0 2E B1 6F 7A 64 B1 6F | .N.........ozd.o
0020: 7A FF 00 89 00 89 00 3A : A3 AD 80 02 01 10 00 01 | z......:........
0030: 00 00 00 00 00 00 20 46 : 48 46 41 45 42 45 45 43 | ...... FHFAEBEEC
0040: 4F 45 4F 45 46 46 45 43 : 4F 43 4F 43 41 43 41 43 | OEOEFFECOCOCACAC
0050: 41 43 41 43 41 41 41 00 : 00 20 00 01 F7 B7 E8 DD | ACACAAA.. ......
0060: CE 17 03 01 02 30 00 A3 : 60 A1 | .....0..`.

Please Scroll Down to See Forums Below 










